SlideShare a Scribd company logo
1 of 5
Download to read offline
IJRET: International Journal of Research in Engineering and TechnologyeISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 228
PERFORMANCE BOUNDS FOR UNEQUALLY PUNCTURED
TERMINATED CONVOLUTIONAL CODES
Nilofer.Sk
Assistant professor, ECE, Mallareddy engineering college for women, AP, India
Abstract
The main objective of this paper is to discuss about the performance of the punctured convolution codes. Generally the punctured
convolution codes are designed for a protection purpose in CDMA.In this paper a systematic method to construct performance upper
bound for a punctured convolution code with an arbitrary pattern is proposed. At the decoder side perfect channel estimation is
assumed and to represent the relation between input information bits and their corresponding Hamming weight outputs a weight
enumerator is defined. Finally the simulations results provided very well agree with their predicted results with the upper bounds.
Keywords:Convolution code, upper bound, weight enumerator, rate matching.
---------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
Efficiency of spectrum utilization is a very important factor in
wireless communications. Several multiple access schemes are
proposed to share radio spectrum which is finite and
constrained. Therefore available spectrum is efficiently used
by sharing the spectrum simultaneously among several
individual users and this process must be done without severer
degradation. And most of the wireless communications
requirehigh spectral efficiency. Therefore for achieving high
spectral efficiency definitely there is a need for high rate codes
which maintains the system requirements such as SNR, BER
and FER (frame-error rate) etc. punctured convolutional codes
are high rate codes which are used to achieve high spectral
efficiency [1]. Puncturing is a well known and most suitable
technique to achieve high data rates. In the process of
puncturing a CC (Convolution Code) can be extracted from
mother code with less code rate. At receiver side in two
subsequent separate processing steps equalization and
decoding are performed [1]. Whenever the equalization is
completed bit probability ½ is inserted before performing
decoding when the symbols punctured. To generate higher
data rates some of the coded symbols are punctured
periodically in convolutional punctured codes and the process
of periodic puncturing is not an optimum method. In this
project, initially based on the transfer function of the Viterbi
decoded convolution code and assumption of that input
sequence is infinite with equal error rates the convolutional
bounds will be obtained. However center position bits contains
higher error rate than the end position bits. Similarly if the
frame length decreases gradually then the bound of BER
becomes loose and FER (Frame Error Rate) upper bound was
designed for terminated trellis code. But it is difficult to
achieve upper bounds for terminated CCs using conventional
transfer function.
A systematic method is proposed to obtain the performance
upper bounds for a terminated CC. for obtaining performance
upper bounds a weight enumerator is defined to represent the
relation between input information bits and their
corresponding Hamming weight outputs. A modified trellis
diagram is proposed to compute the weigh enumerator [4]-
[5].Remaining of this paper arranged as: section II clearly
discusses about system model of the proposed method. Section
IV consists of brief explanation about proposed bounds where
as section IV consists of analysis of results. Finally in section
V we conclude this paper.
2. SYSTEM MODEL
This part of the paper presents a system model for terminated
CC. we assume an arbitrary puncturing. Assume a frame with
1L information bits with 2L zeros as tail bits. Therefore the
input of the convolutional encoder is 21 LL + bits and these
inputs bits are encoded at a rate of 1/n.
Therefore after the process of convolutional encoding the
number of convolutional coded bits is
)LL.(nN 21s += (1)
sN is the total number of convolutional coded symbols.
For generating required length of frame and matching rate
some of the coded symbols are punctured. The symbol
position which is going to puncture isdefined using puncturing
pattern as
]p,p,p[P sN21 L= (2)
IJRET: International Journal of Research in Engineering and TechnologyeISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 229
jp = 0, jth
coded is symbol is punctured
If after convolutional process pN symbols are punctured then
the effective code rate er is defined as
p21
1
e
N)LL.(n
L
r
−+
= (3)
In practical communications it is not possible to puncture the
coded symbols periodically due to the restrictions on number
of symbols. Therefore for getting a required rate matching
aperiodical puncturing is required.
3. PROPOSED UPPER BOUNDS
As discussed previously with an arbitrary puncturing pattern
of a terminated CC average BER of selected input symbol and
upper bounds on FER are established in this section. To obtain
the proposed bounds weight enumerator is defined. Therefore
to obtain upper bounds single error event code words are
considered for weight enumerator.
The weighting vector is defined as
]ww,w[W 1L21 L= (4)
wj= 1, means that jth
bit is considered for weight enumerator.
Therefore the weight enumerator of the convolutional code for
a puncturing pattern P with weighing vector W is defined as
( ) ( )∑∑=
i j
ji
j,ip,w DB.p,wcD,BT (5)
)p,w(c j,i : Total number of composed code words.
J: hamming weight of the output.
i: hamming weight of the input
The average Bit Error Rate of the bits can be obtained from
the weight enumerator as
( ) ∑ ∑
∞
=
≤
freedj i
jj,ib P).p,w(c.i
w
1
p,wP (6)
|w|: w weighing vector’s hamming weight.
dfree: code free distance.
Therefore the upper bound on the average BER is obtained by
allowing only one vector for the weighing vector in equation 6
∑ ∑
∞
=
≤
freedj i
jj,i
1
b P).p,w(c.i
L
1
P (7)
Similarly upper bound on FER is obtained by using weigh
enumerator with an all zero vector for w
∑ ∑
∞
=
≤
freedj i
jj,iFE P).p,w(cP (8)
3.1Procedure for Weight Enumerator for Proposed
Bounds
This method is purely based on trellis diagram of the
terminated CC and chooses a CC encoder with the 2M
number
of states and the trellis depth t is St (St=0,1,2…..2M
-1) and for
the terminated CC the modified trellis diagram is as:
At trellis depth‘t’, if any branch is merging into the ‘0’
state then define another state St=2M
and connect every
new state to a trellis depth t-1 with a gain of 1.
Similarly if any branch is diverging 0 states then connect
0 states from t-1 to t.
More than two branches are merged using an adder.
The branch gain between the St-1 and St states is defined as
GSt-1, St (B, D) and it modified as per puncturing pattern as
)S,S(y)S,S(x
SS
t1tt1t
t1t
DB)D,B(G −−
−
=
(9)
B: input Hamming weights of x(St-1,St)
D: input Hamming weights of y(St-1,St)
For the state StFst(B, D) is the temporary polynomial. From the
trellis depth 1 the weigh enumerator is obtained by initializing
Fs0 (B, D) to 1 if S0 is 0.
)D,B(G.)D,B(F)D,B(F t1t
tS1t
tt S,S
S
1SS −
−
∑Λ∈
−= (10)
tS
Λ : set of the states in trellis depth t-1
Therefore now find the computation for the trellis depth t+1
by increasing all the trellis states at depth at t by 1. And repeat
this for the trellis depth L1+L2.
Repeat this iteration until the trellis depth L1 + L2. After the
completion of iteration the required weight enumerator is
)D,B(2F M
LS 21L
=+
IJRET: International Journal of Research in Engineering and TechnologyeISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 230
Here the proposed modified trellis diagram method consists
the of (L1+L2).2M
complexity additions. This proposed new
approach is applicable to almost all practical terminated CCs
decoded with a Viterbi decoder.
For understanding the proposed approach consider an
modified trellis diagram for a rate ½ CC C1 with L1=5 and
L2=2 as shown in figure 1 and the generation matrix of C1 is
[x2
+1, x2
+x+1]
Fig 1: Modified trellis diagram for convolutional code C1.
For obtaining the upper bound on average BER assume that all
the puncturing and weighing vectors are set to 1 which means
that coded symbols are not punctured and the weight
enumerator is obtained as
958473625
1,1 DBDB5DB8DB7BD5)D,B(T ++++= (11)
By using above equation (11)the upper bound on average BER
is
98765b PP4P8.4P8.2PP ++++≤ (12)
The transfer function for the CC C1is computed as
L+++=−= 7362515
DB4DB2DB)BD21/(BD)D,B(T
(13)
The conventional upper bound on BER is computed for this
code as
L++++≤ 8765b P32P12P4PP
(14)
Therefore the upper bound for considered example and
simulation results are shown in figure 2. And it is clear that the
proposed bound is tighter than conventional bound. Thereforer
the by setting the corresponding ith
component wi of weighing
vector, upper bound for the ith
information bit is calculated as
wi=1 for j=i, oterwise 0
Fig 2: BER performance of convolutional code C1.
For the terminated CC C2, for the purpose of rate matching the
weight enumerator is obtained before the puncturing and it is
as
L+++
+++=
206205
20418318218
1,1
DB21DB42
DB99DB53DB54BD29)D,B(T
(15)
Due to the puncturing the performance of the CC degraded.
With the end position symbols are punctured with the
puncturing pattern p2
. The weight enumerator of the CC after
the puncturing is defined as
IJRET: International Journal of Research in Engineering and TechnologyeISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 231
L+++
+++++
+++++
+++=
127126
125124123122121
117116115114113
11211103102
p,1
DB2DB4
DBDB2DB5DB2DB3
DBDBDB3DBDB4
DB3D5DBDB2)D,B(T 2
(16)
Therefore by comparing equation 15 and 16 it is clear that
distance is decreased from 18 to 10 with the puncturing.
Therefore the upper bound on FER and average BER are as
)P99P51P7(
29
1
P
P22P14P3P
121110b
121110FE
L
L
+++≤
+++≤
Therefore by applying the proposed method on CC C2, the
performance results are shown in Fig 3-Fig 6. Here C2 is
terminated convolutional code in the second part of HS-SCCS.
And the coded output Hamming distances are less than
dmin+10, where mind is the minimum distance between the
codewords.
4. RESULTS
Fig.3: BER performance of C2 for different bit positions
(before end puncturing).
Above figure represents the simulation results for CC C2 and
upper bound on BER before end puncturing. And at the center
position bits the error rate is 4 times larger than those of end
position bits. At Eb/N0 = 2.0 dB and 4.0 dB, the 15-th
information bit error rate is 4.3 and 4.0 times larger than that
of the first information bit, respectively
Fig. 4:BER performance of C2 for different bit positions (after
end puncturing).
Similarly fig 4 represents the simulation results of CC C2 and
upper bound on BER after end puncturing. From the results it
is clear that depending on the position of the bit in the frame
the variation of the BER is small with low Eb/N0. Since the
minimum distance of the end position bits are decreased
compared to center position bits the BER of the center
position bits is low.
Fig 5:BER performance of C2 before end puncturing.
IJRET: International Journal of Research in Engineering and TechnologyeISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 232
Figure 5 shows simulation results for the initial and 15th
information bits in C2 before the puncturing. The performance
difference present between initial and 15th
bit is 0.6dB.And
with the increment in Eb/N0 the performance difference is
maintained regularly.
Fig.6:BER performance of C2 after end puncturing.
Similarly figure 6 represents simulation results for the
information bits of 17th
and 28th
positions. Here the 17th
bit
shows the best BER performance where as 28th
bit shows the
worst BER performance. At low Eb/N0 both the bits are similar
to each other. When compared to 17th
bit, the 28th
bit
performance increases more slowly with increment in Eb/N0.
CONCLUSIONS
Using this project performance of upper bounds for a
terminated CC with arbitrary puncturing is proposed and
weight enumerator is proposed to compute proposed bounds
which define the relation between the input information bit
and their corresponding Hamming code outputs. Using the
coefficients of weight enumerator the upper bounds on
average BER and on FER are computed. Here the proposed
method is based on modified trellis diagram by considering
the puncturing pattern and finally the results show that the
proposed bounds are tighter to the actual performance of
terminated CCs.
REFERENCES
[1]. A. J. Viterbi, “Convolutional codes and their performance
in communication systems," IEEE Trans. Commun. Tech., vol.
COM-19, no. 5, 751-772, Oct. 1971.
[2]. R. J. McEliece, The Theory of Information and Coding - A
Mathematical Framework for Communication. Boston, MA:
Addison-Wesley, 1977.
[3]. C. Berrou, A. Glavieux, and P. Thitimasjshima, “Near
Shannon limit error-correcting coding and decoding: turbo
codes," in Proc. IEEE International Conf. Commun., 1993, pp.
1064-1070.
[4]. C. Berrou, “The ten-year-old turbo codes are entering into
service,"IEEE Commun. Mag., vol. 41, no. 8, pp. 110-116,
Aug. 2003.
[5]. 3GPP, “Multiplexing and channel coding (FDD)," 3GPP
TS25.212, v. 6.8.0, June 2006.
[6]. J. Cain, G. Clard, and J. Geister, “Punctured convolutional
codes ofrate (n − 1)/n and simplified maximum likelihood
decoding," IEEETrans. Inform Theory, vol. 25, no. 1, pp. 97-
100, Jan. 1979.
[7]. J. Hagenauer, “Rate compatible punctured convolutional
codes andtheir applications," IEEE Trans. Commun., vol. 36,
no. 4, pp. 389-400,Apr. 1988
[8]. Y. Yasuda, K. Kashiki, and Y. Hirata, “High rate
punctured convolutional codes for soft decision viterbi
decoding," IEEE Trans. Commun., vol. 32, no. 3, pp. 315-319,
Mar. 1984.
[9]. G. Caire and E. Viterbo, “Upper bound on the frame error
probability of terminated trellis codes," IEEE Commun.Lett.,
vol. 2, no. 1, pp. 2-4, Jan. 1998.
[10]. K. M. Rege and S. Nanda, “Irreducible FER for
convolutional codes with random bit puncturing: application
to CDMA forward channel," in Proc. IEEE Veh. Technol.
Conf., 1996, pp. 1336-1340.
[11]. H. Moon, “Improved upper bound on bit error rate for
truncatedconvolutional codes," IEE Electron. Lett., vol. 34,
no. 1, pp. 65-66,Jan. 1998
[12]. H. Moon and D. C. Cox, “Improved performance upper
bound forterminated convolutional codes," IEEE Commun.
Lett., vol. 11, no. 6,pp. 519-521, June 2007.
[13]. H. Moon and D. C. Cox, “Performance upper bounds for
terminated convolutional codes," in Proc. IEEE Wireless
Commun.Networking Conf., 2003, pp. 252-256.
BIOGRAPHIES
Ms .Shaik. Nilofer is working as an Assistant
Professor in Mallareddy engineering College
for women, Hyderabad. She has 3
yearsteaching experience at UG level.

More Related Content

What's hot

Analysis of CANADAIR CL-215 retractable landing gear.
Analysis of CANADAIR CL-215 retractable landing gear.Analysis of CANADAIR CL-215 retractable landing gear.
Analysis of CANADAIR CL-215 retractable landing gear.Nagesh NARASIMHA PRASAD
 
Low complexity design of non binary ldpc decoder using extended min-sum algor...
Low complexity design of non binary ldpc decoder using extended min-sum algor...Low complexity design of non binary ldpc decoder using extended min-sum algor...
Low complexity design of non binary ldpc decoder using extended min-sum algor...eSAT Journals
 
FPGA based BCH Decoder
FPGA based BCH DecoderFPGA based BCH Decoder
FPGA based BCH Decoderijsrd.com
 
Reduced Complexity Maximum Likelihood Decoding Algorithm for LDPC Code Correc...
Reduced Complexity Maximum Likelihood Decoding Algorithm for LDPC Code Correc...Reduced Complexity Maximum Likelihood Decoding Algorithm for LDPC Code Correc...
Reduced Complexity Maximum Likelihood Decoding Algorithm for LDPC Code Correc...Associate Professor in VSB Coimbatore
 
Low cost high-performance vlsi architecture for montgomery modular multiplica...
Low cost high-performance vlsi architecture for montgomery modular multiplica...Low cost high-performance vlsi architecture for montgomery modular multiplica...
Low cost high-performance vlsi architecture for montgomery modular multiplica...Ratnakar Varun
 
Investigative Compression Of Lossy Images By Enactment Of Lattice Vector Quan...
Investigative Compression Of Lossy Images By Enactment Of Lattice Vector Quan...Investigative Compression Of Lossy Images By Enactment Of Lattice Vector Quan...
Investigative Compression Of Lossy Images By Enactment Of Lattice Vector Quan...IJERA Editor
 
Arithmetic Operations in Multi-Valued Logic
Arithmetic Operations in Multi-Valued LogicArithmetic Operations in Multi-Valued Logic
Arithmetic Operations in Multi-Valued LogicVLSICS Design
 
An Efficient Interpolation-Based Chase BCH Decoder
An Efficient Interpolation-Based Chase BCH DecoderAn Efficient Interpolation-Based Chase BCH Decoder
An Efficient Interpolation-Based Chase BCH Decoderijsrd.com
 
A High Throughput CFA AES S-Box with Error Correction Capability
A High Throughput CFA AES S-Box with Error Correction CapabilityA High Throughput CFA AES S-Box with Error Correction Capability
A High Throughput CFA AES S-Box with Error Correction CapabilityIOSR Journals
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
How Matlab Helps
How Matlab HelpsHow Matlab Helps
How Matlab Helpssiufu
 
Improving The Performance of Viterbi Decoder using Window System
Improving The Performance of Viterbi Decoder using Window System Improving The Performance of Viterbi Decoder using Window System
Improving The Performance of Viterbi Decoder using Window System IJECEIAES
 
Design and implementation of address generator for wi max deinterleaver on fpga
Design and implementation of address generator for wi max deinterleaver on fpgaDesign and implementation of address generator for wi max deinterleaver on fpga
Design and implementation of address generator for wi max deinterleaver on fpgaeSAT Publishing House
 
Lecture Notes: EEEC6440315 Communication Systems - Information Theory
Lecture Notes:  EEEC6440315 Communication Systems - Information TheoryLecture Notes:  EEEC6440315 Communication Systems - Information Theory
Lecture Notes: EEEC6440315 Communication Systems - Information TheoryAIMST University
 
Novel Parallel - Perfix Structure Binary to Residue Number System Conversion ...
Novel Parallel - Perfix Structure Binary to Residue Number System Conversion ...Novel Parallel - Perfix Structure Binary to Residue Number System Conversion ...
Novel Parallel - Perfix Structure Binary to Residue Number System Conversion ...CSCJournals
 
Efficient realization-of-an-adfe-with-a-new-adaptive-algorithm
Efficient realization-of-an-adfe-with-a-new-adaptive-algorithmEfficient realization-of-an-adfe-with-a-new-adaptive-algorithm
Efficient realization-of-an-adfe-with-a-new-adaptive-algorithmCemal Ardil
 
Matlab Implementation of Baseline JPEG Image Compression Using Hardware Optim...
Matlab Implementation of Baseline JPEG Image Compression Using Hardware Optim...Matlab Implementation of Baseline JPEG Image Compression Using Hardware Optim...
Matlab Implementation of Baseline JPEG Image Compression Using Hardware Optim...inventionjournals
 
Paper id 37201520
Paper id 37201520Paper id 37201520
Paper id 37201520IJRAT
 

What's hot (20)

Analysis of CANADAIR CL-215 retractable landing gear.
Analysis of CANADAIR CL-215 retractable landing gear.Analysis of CANADAIR CL-215 retractable landing gear.
Analysis of CANADAIR CL-215 retractable landing gear.
 
Ros Gra10
Ros Gra10Ros Gra10
Ros Gra10
 
Low complexity design of non binary ldpc decoder using extended min-sum algor...
Low complexity design of non binary ldpc decoder using extended min-sum algor...Low complexity design of non binary ldpc decoder using extended min-sum algor...
Low complexity design of non binary ldpc decoder using extended min-sum algor...
 
FPGA based BCH Decoder
FPGA based BCH DecoderFPGA based BCH Decoder
FPGA based BCH Decoder
 
Reduced Complexity Maximum Likelihood Decoding Algorithm for LDPC Code Correc...
Reduced Complexity Maximum Likelihood Decoding Algorithm for LDPC Code Correc...Reduced Complexity Maximum Likelihood Decoding Algorithm for LDPC Code Correc...
Reduced Complexity Maximum Likelihood Decoding Algorithm for LDPC Code Correc...
 
Low cost high-performance vlsi architecture for montgomery modular multiplica...
Low cost high-performance vlsi architecture for montgomery modular multiplica...Low cost high-performance vlsi architecture for montgomery modular multiplica...
Low cost high-performance vlsi architecture for montgomery modular multiplica...
 
Investigative Compression Of Lossy Images By Enactment Of Lattice Vector Quan...
Investigative Compression Of Lossy Images By Enactment Of Lattice Vector Quan...Investigative Compression Of Lossy Images By Enactment Of Lattice Vector Quan...
Investigative Compression Of Lossy Images By Enactment Of Lattice Vector Quan...
 
Arithmetic Operations in Multi-Valued Logic
Arithmetic Operations in Multi-Valued LogicArithmetic Operations in Multi-Valued Logic
Arithmetic Operations in Multi-Valued Logic
 
An Efficient Interpolation-Based Chase BCH Decoder
An Efficient Interpolation-Based Chase BCH DecoderAn Efficient Interpolation-Based Chase BCH Decoder
An Efficient Interpolation-Based Chase BCH Decoder
 
A High Throughput CFA AES S-Box with Error Correction Capability
A High Throughput CFA AES S-Box with Error Correction CapabilityA High Throughput CFA AES S-Box with Error Correction Capability
A High Throughput CFA AES S-Box with Error Correction Capability
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
How Matlab Helps
How Matlab HelpsHow Matlab Helps
How Matlab Helps
 
Improving The Performance of Viterbi Decoder using Window System
Improving The Performance of Viterbi Decoder using Window System Improving The Performance of Viterbi Decoder using Window System
Improving The Performance of Viterbi Decoder using Window System
 
Design and implementation of address generator for wi max deinterleaver on fpga
Design and implementation of address generator for wi max deinterleaver on fpgaDesign and implementation of address generator for wi max deinterleaver on fpga
Design and implementation of address generator for wi max deinterleaver on fpga
 
Lecture Notes: EEEC6440315 Communication Systems - Information Theory
Lecture Notes:  EEEC6440315 Communication Systems - Information TheoryLecture Notes:  EEEC6440315 Communication Systems - Information Theory
Lecture Notes: EEEC6440315 Communication Systems - Information Theory
 
Novel Parallel - Perfix Structure Binary to Residue Number System Conversion ...
Novel Parallel - Perfix Structure Binary to Residue Number System Conversion ...Novel Parallel - Perfix Structure Binary to Residue Number System Conversion ...
Novel Parallel - Perfix Structure Binary to Residue Number System Conversion ...
 
Efficient realization-of-an-adfe-with-a-new-adaptive-algorithm
Efficient realization-of-an-adfe-with-a-new-adaptive-algorithmEfficient realization-of-an-adfe-with-a-new-adaptive-algorithm
Efficient realization-of-an-adfe-with-a-new-adaptive-algorithm
 
Matlab Implementation of Baseline JPEG Image Compression Using Hardware Optim...
Matlab Implementation of Baseline JPEG Image Compression Using Hardware Optim...Matlab Implementation of Baseline JPEG Image Compression Using Hardware Optim...
Matlab Implementation of Baseline JPEG Image Compression Using Hardware Optim...
 
Paper id 37201520
Paper id 37201520Paper id 37201520
Paper id 37201520
 
Performance Analysis of GDFT with Non Linear Phase on Real Time System
Performance Analysis of GDFT with Non Linear Phase on Real Time SystemPerformance Analysis of GDFT with Non Linear Phase on Real Time System
Performance Analysis of GDFT with Non Linear Phase on Real Time System
 

Viewers also liked

CURRICULUM VITAE 1 Hloni
CURRICULUM VITAE 1 HloniCURRICULUM VITAE 1 Hloni
CURRICULUM VITAE 1 HloniH Lukonga
 
Andrea paola duran 11- 03 trabajo
Andrea paola duran 11- 03 trabajoAndrea paola duran 11- 03 trabajo
Andrea paola duran 11- 03 trabajoAndrea Duran ʚïɞ
 
A language independent web data extraction using vision based page segmentati...
A language independent web data extraction using vision based page segmentati...A language independent web data extraction using vision based page segmentati...
A language independent web data extraction using vision based page segmentati...eSAT Publishing House
 
Stone Reuling- PPP
Stone Reuling- PPPStone Reuling- PPP
Stone Reuling- PPPStoneReuling
 
A robust dlqg controller for damping of sub synchronous oscillations in a se...
A robust dlqg controller for damping of sub  synchronous oscillations in a se...A robust dlqg controller for damping of sub  synchronous oscillations in a se...
A robust dlqg controller for damping of sub synchronous oscillations in a se...eSAT Publishing House
 
Космическое фотопутешествие с телескопом хаббл
Космическое фотопутешествие с телескопом хабблКосмическое фотопутешествие с телескопом хаббл
Космическое фотопутешествие с телескопом хабблdrugsem
 
Solentive / InRule AADI Gartner Summit 2014
Solentive / InRule AADI Gartner Summit 2014Solentive / InRule AADI Gartner Summit 2014
Solentive / InRule AADI Gartner Summit 2014Solentive
 
和食って何?
和食って何?和食って何?
和食って何?Maho Isono
 
NBPC 1613 San Diego, CA Proposed 2014 bylaws draft_july_24_unanimous_consensu...
NBPC 1613 San Diego, CA Proposed 2014 bylaws draft_july_24_unanimous_consensu...NBPC 1613 San Diego, CA Proposed 2014 bylaws draft_july_24_unanimous_consensu...
NBPC 1613 San Diego, CA Proposed 2014 bylaws draft_july_24_unanimous_consensu...NBPCSanDiego
 
Загадки о животных
Загадки о животныхЗагадки о животных
Загадки о животныхdrugsem
 
Utilization of industrial waste in the construction industry
Utilization of industrial waste in the construction industryUtilization of industrial waste in the construction industry
Utilization of industrial waste in the construction industryeSAT Publishing House
 
Productivity improvement at assembly station using work study techniques
Productivity improvement at assembly station using work study techniquesProductivity improvement at assembly station using work study techniques
Productivity improvement at assembly station using work study techniqueseSAT Publishing House
 
Jonanthan Leopard's Visual Resume
Jonanthan Leopard's Visual ResumeJonanthan Leopard's Visual Resume
Jonanthan Leopard's Visual Resumejonleopard
 
Multidimensional schema for agricultural data warehouse
Multidimensional schema for agricultural data warehouseMultidimensional schema for agricultural data warehouse
Multidimensional schema for agricultural data warehouseeSAT Publishing House
 
Implementation of delay measurement technique using signature register for sm...
Implementation of delay measurement technique using signature register for sm...Implementation of delay measurement technique using signature register for sm...
Implementation of delay measurement technique using signature register for sm...eSAT Publishing House
 

Viewers also liked (20)

Compute System
Compute System Compute System
Compute System
 
CURRICULUM VITAE 1 Hloni
CURRICULUM VITAE 1 HloniCURRICULUM VITAE 1 Hloni
CURRICULUM VITAE 1 Hloni
 
Andrea paola duran 11- 03 trabajo
Andrea paola duran 11- 03 trabajoAndrea paola duran 11- 03 trabajo
Andrea paola duran 11- 03 trabajo
 
A language independent web data extraction using vision based page segmentati...
A language independent web data extraction using vision based page segmentati...A language independent web data extraction using vision based page segmentati...
A language independent web data extraction using vision based page segmentati...
 
IVT Företagspresentation
IVT FöretagspresentationIVT Företagspresentation
IVT Företagspresentation
 
Stone Reuling- PPP
Stone Reuling- PPPStone Reuling- PPP
Stone Reuling- PPP
 
Biofuel precursor from potato waste
Biofuel precursor from potato wasteBiofuel precursor from potato waste
Biofuel precursor from potato waste
 
A robust dlqg controller for damping of sub synchronous oscillations in a se...
A robust dlqg controller for damping of sub  synchronous oscillations in a se...A robust dlqg controller for damping of sub  synchronous oscillations in a se...
A robust dlqg controller for damping of sub synchronous oscillations in a se...
 
Космическое фотопутешествие с телескопом хаббл
Космическое фотопутешествие с телескопом хабблКосмическое фотопутешествие с телескопом хаббл
Космическое фотопутешествие с телескопом хаббл
 
Reosto ppt
Reosto pptReosto ppt
Reosto ppt
 
Solentive / InRule AADI Gartner Summit 2014
Solentive / InRule AADI Gartner Summit 2014Solentive / InRule AADI Gartner Summit 2014
Solentive / InRule AADI Gartner Summit 2014
 
和食って何?
和食って何?和食って何?
和食って何?
 
NBPC 1613 San Diego, CA Proposed 2014 bylaws draft_july_24_unanimous_consensu...
NBPC 1613 San Diego, CA Proposed 2014 bylaws draft_july_24_unanimous_consensu...NBPC 1613 San Diego, CA Proposed 2014 bylaws draft_july_24_unanimous_consensu...
NBPC 1613 San Diego, CA Proposed 2014 bylaws draft_july_24_unanimous_consensu...
 
Загадки о животных
Загадки о животныхЗагадки о животных
Загадки о животных
 
Utilization of industrial waste in the construction industry
Utilization of industrial waste in the construction industryUtilization of industrial waste in the construction industry
Utilization of industrial waste in the construction industry
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
Productivity improvement at assembly station using work study techniques
Productivity improvement at assembly station using work study techniquesProductivity improvement at assembly station using work study techniques
Productivity improvement at assembly station using work study techniques
 
Jonanthan Leopard's Visual Resume
Jonanthan Leopard's Visual ResumeJonanthan Leopard's Visual Resume
Jonanthan Leopard's Visual Resume
 
Multidimensional schema for agricultural data warehouse
Multidimensional schema for agricultural data warehouseMultidimensional schema for agricultural data warehouse
Multidimensional schema for agricultural data warehouse
 
Implementation of delay measurement technique using signature register for sm...
Implementation of delay measurement technique using signature register for sm...Implementation of delay measurement technique using signature register for sm...
Implementation of delay measurement technique using signature register for sm...
 

Similar to Performance bounds for unequally punctured

MDCT audio coding with pulse vector quantizers
MDCT audio coding with pulse vector quantizersMDCT audio coding with pulse vector quantizers
MDCT audio coding with pulse vector quantizersEricsson
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
A Configurable and Low Power Hard-Decision Viterbi Decoder in VLSI Architecture
A Configurable and Low Power Hard-Decision Viterbi Decoder in VLSI ArchitectureA Configurable and Low Power Hard-Decision Viterbi Decoder in VLSI Architecture
A Configurable and Low Power Hard-Decision Viterbi Decoder in VLSI ArchitectureIRJET Journal
 
Performance Improvement of Vector Quantization with Bit-parallelism Hardware
Performance Improvement of Vector Quantization with Bit-parallelism HardwarePerformance Improvement of Vector Quantization with Bit-parallelism Hardware
Performance Improvement of Vector Quantization with Bit-parallelism HardwareCSCJournals
 
Reduced Energy Min-Max Decoding Algorithm for Ldpc Code with Adder Correction...
Reduced Energy Min-Max Decoding Algorithm for Ldpc Code with Adder Correction...Reduced Energy Min-Max Decoding Algorithm for Ldpc Code with Adder Correction...
Reduced Energy Min-Max Decoding Algorithm for Ldpc Code with Adder Correction...ijceronline
 
Design and implementation of log domain decoder
Design and implementation of log domain decoder Design and implementation of log domain decoder
Design and implementation of log domain decoder IJECEIAES
 
Multimedia lossy compression algorithms
Multimedia lossy compression algorithmsMultimedia lossy compression algorithms
Multimedia lossy compression algorithmsMazin Alwaaly
 
Analysis of LDPC Codes under Wi-Max IEEE 802.16e
Analysis of LDPC Codes under Wi-Max IEEE 802.16eAnalysis of LDPC Codes under Wi-Max IEEE 802.16e
Analysis of LDPC Codes under Wi-Max IEEE 802.16eIJERD Editor
 
Sinan Sami.docx
Sinan Sami.docxSinan Sami.docx
Sinan Sami.docxraaed5
 
Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...
Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...
Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...IJERA Editor
 
Convolutional Error Control Coding
Convolutional Error Control CodingConvolutional Error Control Coding
Convolutional Error Control CodingMohammed Abuibaid
 
Implementation performance analysis of cordic
Implementation performance analysis of cordicImplementation performance analysis of cordic
Implementation performance analysis of cordiciaemedu
 
Design and Implementation of Encoder for (15, k) Binary BCH Code Using VHDL a...
Design and Implementation of Encoder for (15, k) Binary BCH Code Using VHDL a...Design and Implementation of Encoder for (15, k) Binary BCH Code Using VHDL a...
Design and Implementation of Encoder for (15, k) Binary BCH Code Using VHDL a...IOSR Journals
 
Image Representation & Descriptors
Image Representation & DescriptorsImage Representation & Descriptors
Image Representation & DescriptorsPundrikPatel
 
High Speed Decoding of Non-Binary Irregular LDPC Codes Using GPUs (Paper)
High Speed Decoding of Non-Binary Irregular LDPC Codes Using GPUs (Paper)High Speed Decoding of Non-Binary Irregular LDPC Codes Using GPUs (Paper)
High Speed Decoding of Non-Binary Irregular LDPC Codes Using GPUs (Paper)Enrique Monzo Solves
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...ijceronline
 

Similar to Performance bounds for unequally punctured (20)

MDCT audio coding with pulse vector quantizers
MDCT audio coding with pulse vector quantizersMDCT audio coding with pulse vector quantizers
MDCT audio coding with pulse vector quantizers
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
A Configurable and Low Power Hard-Decision Viterbi Decoder in VLSI Architecture
A Configurable and Low Power Hard-Decision Viterbi Decoder in VLSI ArchitectureA Configurable and Low Power Hard-Decision Viterbi Decoder in VLSI Architecture
A Configurable and Low Power Hard-Decision Viterbi Decoder in VLSI Architecture
 
05725150
0572515005725150
05725150
 
Performance Improvement of Vector Quantization with Bit-parallelism Hardware
Performance Improvement of Vector Quantization with Bit-parallelism HardwarePerformance Improvement of Vector Quantization with Bit-parallelism Hardware
Performance Improvement of Vector Quantization with Bit-parallelism Hardware
 
Reduced Energy Min-Max Decoding Algorithm for Ldpc Code with Adder Correction...
Reduced Energy Min-Max Decoding Algorithm for Ldpc Code with Adder Correction...Reduced Energy Min-Max Decoding Algorithm for Ldpc Code with Adder Correction...
Reduced Energy Min-Max Decoding Algorithm for Ldpc Code with Adder Correction...
 
G364246
G364246G364246
G364246
 
Design and implementation of log domain decoder
Design and implementation of log domain decoder Design and implementation of log domain decoder
Design and implementation of log domain decoder
 
Multimedia lossy compression algorithms
Multimedia lossy compression algorithmsMultimedia lossy compression algorithms
Multimedia lossy compression algorithms
 
Lossy
LossyLossy
Lossy
 
Analysis of LDPC Codes under Wi-Max IEEE 802.16e
Analysis of LDPC Codes under Wi-Max IEEE 802.16eAnalysis of LDPC Codes under Wi-Max IEEE 802.16e
Analysis of LDPC Codes under Wi-Max IEEE 802.16e
 
Sinan Sami.docx
Sinan Sami.docxSinan Sami.docx
Sinan Sami.docx
 
Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...
Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...
Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...
 
Convolutional Error Control Coding
Convolutional Error Control CodingConvolutional Error Control Coding
Convolutional Error Control Coding
 
Implementation performance analysis of cordic
Implementation performance analysis of cordicImplementation performance analysis of cordic
Implementation performance analysis of cordic
 
Design and Implementation of Encoder for (15, k) Binary BCH Code Using VHDL a...
Design and Implementation of Encoder for (15, k) Binary BCH Code Using VHDL a...Design and Implementation of Encoder for (15, k) Binary BCH Code Using VHDL a...
Design and Implementation of Encoder for (15, k) Binary BCH Code Using VHDL a...
 
Image Representation & Descriptors
Image Representation & DescriptorsImage Representation & Descriptors
Image Representation & Descriptors
 
High Speed Decoding of Non-Binary Irregular LDPC Codes Using GPUs (Paper)
High Speed Decoding of Non-Binary Irregular LDPC Codes Using GPUs (Paper)High Speed Decoding of Non-Binary Irregular LDPC Codes Using GPUs (Paper)
High Speed Decoding of Non-Binary Irregular LDPC Codes Using GPUs (Paper)
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 
Channel Coding (Error Control Coding)
Channel Coding (Error Control Coding)Channel Coding (Error Control Coding)
Channel Coding (Error Control Coding)
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 

Recently uploaded (20)

CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 

Performance bounds for unequally punctured

  • 1. IJRET: International Journal of Research in Engineering and TechnologyeISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 228 PERFORMANCE BOUNDS FOR UNEQUALLY PUNCTURED TERMINATED CONVOLUTIONAL CODES Nilofer.Sk Assistant professor, ECE, Mallareddy engineering college for women, AP, India Abstract The main objective of this paper is to discuss about the performance of the punctured convolution codes. Generally the punctured convolution codes are designed for a protection purpose in CDMA.In this paper a systematic method to construct performance upper bound for a punctured convolution code with an arbitrary pattern is proposed. At the decoder side perfect channel estimation is assumed and to represent the relation between input information bits and their corresponding Hamming weight outputs a weight enumerator is defined. Finally the simulations results provided very well agree with their predicted results with the upper bounds. Keywords:Convolution code, upper bound, weight enumerator, rate matching. ---------------------------------------------------------------------***---------------------------------------------------------------------- 1. INTRODUCTION Efficiency of spectrum utilization is a very important factor in wireless communications. Several multiple access schemes are proposed to share radio spectrum which is finite and constrained. Therefore available spectrum is efficiently used by sharing the spectrum simultaneously among several individual users and this process must be done without severer degradation. And most of the wireless communications requirehigh spectral efficiency. Therefore for achieving high spectral efficiency definitely there is a need for high rate codes which maintains the system requirements such as SNR, BER and FER (frame-error rate) etc. punctured convolutional codes are high rate codes which are used to achieve high spectral efficiency [1]. Puncturing is a well known and most suitable technique to achieve high data rates. In the process of puncturing a CC (Convolution Code) can be extracted from mother code with less code rate. At receiver side in two subsequent separate processing steps equalization and decoding are performed [1]. Whenever the equalization is completed bit probability ½ is inserted before performing decoding when the symbols punctured. To generate higher data rates some of the coded symbols are punctured periodically in convolutional punctured codes and the process of periodic puncturing is not an optimum method. In this project, initially based on the transfer function of the Viterbi decoded convolution code and assumption of that input sequence is infinite with equal error rates the convolutional bounds will be obtained. However center position bits contains higher error rate than the end position bits. Similarly if the frame length decreases gradually then the bound of BER becomes loose and FER (Frame Error Rate) upper bound was designed for terminated trellis code. But it is difficult to achieve upper bounds for terminated CCs using conventional transfer function. A systematic method is proposed to obtain the performance upper bounds for a terminated CC. for obtaining performance upper bounds a weight enumerator is defined to represent the relation between input information bits and their corresponding Hamming weight outputs. A modified trellis diagram is proposed to compute the weigh enumerator [4]- [5].Remaining of this paper arranged as: section II clearly discusses about system model of the proposed method. Section IV consists of brief explanation about proposed bounds where as section IV consists of analysis of results. Finally in section V we conclude this paper. 2. SYSTEM MODEL This part of the paper presents a system model for terminated CC. we assume an arbitrary puncturing. Assume a frame with 1L information bits with 2L zeros as tail bits. Therefore the input of the convolutional encoder is 21 LL + bits and these inputs bits are encoded at a rate of 1/n. Therefore after the process of convolutional encoding the number of convolutional coded bits is )LL.(nN 21s += (1) sN is the total number of convolutional coded symbols. For generating required length of frame and matching rate some of the coded symbols are punctured. The symbol position which is going to puncture isdefined using puncturing pattern as ]p,p,p[P sN21 L= (2)
  • 2. IJRET: International Journal of Research in Engineering and TechnologyeISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 229 jp = 0, jth coded is symbol is punctured If after convolutional process pN symbols are punctured then the effective code rate er is defined as p21 1 e N)LL.(n L r −+ = (3) In practical communications it is not possible to puncture the coded symbols periodically due to the restrictions on number of symbols. Therefore for getting a required rate matching aperiodical puncturing is required. 3. PROPOSED UPPER BOUNDS As discussed previously with an arbitrary puncturing pattern of a terminated CC average BER of selected input symbol and upper bounds on FER are established in this section. To obtain the proposed bounds weight enumerator is defined. Therefore to obtain upper bounds single error event code words are considered for weight enumerator. The weighting vector is defined as ]ww,w[W 1L21 L= (4) wj= 1, means that jth bit is considered for weight enumerator. Therefore the weight enumerator of the convolutional code for a puncturing pattern P with weighing vector W is defined as ( ) ( )∑∑= i j ji j,ip,w DB.p,wcD,BT (5) )p,w(c j,i : Total number of composed code words. J: hamming weight of the output. i: hamming weight of the input The average Bit Error Rate of the bits can be obtained from the weight enumerator as ( ) ∑ ∑ ∞ = ≤ freedj i jj,ib P).p,w(c.i w 1 p,wP (6) |w|: w weighing vector’s hamming weight. dfree: code free distance. Therefore the upper bound on the average BER is obtained by allowing only one vector for the weighing vector in equation 6 ∑ ∑ ∞ = ≤ freedj i jj,i 1 b P).p,w(c.i L 1 P (7) Similarly upper bound on FER is obtained by using weigh enumerator with an all zero vector for w ∑ ∑ ∞ = ≤ freedj i jj,iFE P).p,w(cP (8) 3.1Procedure for Weight Enumerator for Proposed Bounds This method is purely based on trellis diagram of the terminated CC and chooses a CC encoder with the 2M number of states and the trellis depth t is St (St=0,1,2…..2M -1) and for the terminated CC the modified trellis diagram is as: At trellis depth‘t’, if any branch is merging into the ‘0’ state then define another state St=2M and connect every new state to a trellis depth t-1 with a gain of 1. Similarly if any branch is diverging 0 states then connect 0 states from t-1 to t. More than two branches are merged using an adder. The branch gain between the St-1 and St states is defined as GSt-1, St (B, D) and it modified as per puncturing pattern as )S,S(y)S,S(x SS t1tt1t t1t DB)D,B(G −− − = (9) B: input Hamming weights of x(St-1,St) D: input Hamming weights of y(St-1,St) For the state StFst(B, D) is the temporary polynomial. From the trellis depth 1 the weigh enumerator is obtained by initializing Fs0 (B, D) to 1 if S0 is 0. )D,B(G.)D,B(F)D,B(F t1t tS1t tt S,S S 1SS − − ∑Λ∈ −= (10) tS Λ : set of the states in trellis depth t-1 Therefore now find the computation for the trellis depth t+1 by increasing all the trellis states at depth at t by 1. And repeat this for the trellis depth L1+L2. Repeat this iteration until the trellis depth L1 + L2. After the completion of iteration the required weight enumerator is )D,B(2F M LS 21L =+
  • 3. IJRET: International Journal of Research in Engineering and TechnologyeISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 230 Here the proposed modified trellis diagram method consists the of (L1+L2).2M complexity additions. This proposed new approach is applicable to almost all practical terminated CCs decoded with a Viterbi decoder. For understanding the proposed approach consider an modified trellis diagram for a rate ½ CC C1 with L1=5 and L2=2 as shown in figure 1 and the generation matrix of C1 is [x2 +1, x2 +x+1] Fig 1: Modified trellis diagram for convolutional code C1. For obtaining the upper bound on average BER assume that all the puncturing and weighing vectors are set to 1 which means that coded symbols are not punctured and the weight enumerator is obtained as 958473625 1,1 DBDB5DB8DB7BD5)D,B(T ++++= (11) By using above equation (11)the upper bound on average BER is 98765b PP4P8.4P8.2PP ++++≤ (12) The transfer function for the CC C1is computed as L+++=−= 7362515 DB4DB2DB)BD21/(BD)D,B(T (13) The conventional upper bound on BER is computed for this code as L++++≤ 8765b P32P12P4PP (14) Therefore the upper bound for considered example and simulation results are shown in figure 2. And it is clear that the proposed bound is tighter than conventional bound. Thereforer the by setting the corresponding ith component wi of weighing vector, upper bound for the ith information bit is calculated as wi=1 for j=i, oterwise 0 Fig 2: BER performance of convolutional code C1. For the terminated CC C2, for the purpose of rate matching the weight enumerator is obtained before the puncturing and it is as L+++ +++= 206205 20418318218 1,1 DB21DB42 DB99DB53DB54BD29)D,B(T (15) Due to the puncturing the performance of the CC degraded. With the end position symbols are punctured with the puncturing pattern p2 . The weight enumerator of the CC after the puncturing is defined as
  • 4. IJRET: International Journal of Research in Engineering and TechnologyeISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 231 L+++ +++++ +++++ +++= 127126 125124123122121 117116115114113 11211103102 p,1 DB2DB4 DBDB2DB5DB2DB3 DBDBDB3DBDB4 DB3D5DBDB2)D,B(T 2 (16) Therefore by comparing equation 15 and 16 it is clear that distance is decreased from 18 to 10 with the puncturing. Therefore the upper bound on FER and average BER are as )P99P51P7( 29 1 P P22P14P3P 121110b 121110FE L L +++≤ +++≤ Therefore by applying the proposed method on CC C2, the performance results are shown in Fig 3-Fig 6. Here C2 is terminated convolutional code in the second part of HS-SCCS. And the coded output Hamming distances are less than dmin+10, where mind is the minimum distance between the codewords. 4. RESULTS Fig.3: BER performance of C2 for different bit positions (before end puncturing). Above figure represents the simulation results for CC C2 and upper bound on BER before end puncturing. And at the center position bits the error rate is 4 times larger than those of end position bits. At Eb/N0 = 2.0 dB and 4.0 dB, the 15-th information bit error rate is 4.3 and 4.0 times larger than that of the first information bit, respectively Fig. 4:BER performance of C2 for different bit positions (after end puncturing). Similarly fig 4 represents the simulation results of CC C2 and upper bound on BER after end puncturing. From the results it is clear that depending on the position of the bit in the frame the variation of the BER is small with low Eb/N0. Since the minimum distance of the end position bits are decreased compared to center position bits the BER of the center position bits is low. Fig 5:BER performance of C2 before end puncturing.
  • 5. IJRET: International Journal of Research in Engineering and TechnologyeISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 232 Figure 5 shows simulation results for the initial and 15th information bits in C2 before the puncturing. The performance difference present between initial and 15th bit is 0.6dB.And with the increment in Eb/N0 the performance difference is maintained regularly. Fig.6:BER performance of C2 after end puncturing. Similarly figure 6 represents simulation results for the information bits of 17th and 28th positions. Here the 17th bit shows the best BER performance where as 28th bit shows the worst BER performance. At low Eb/N0 both the bits are similar to each other. When compared to 17th bit, the 28th bit performance increases more slowly with increment in Eb/N0. CONCLUSIONS Using this project performance of upper bounds for a terminated CC with arbitrary puncturing is proposed and weight enumerator is proposed to compute proposed bounds which define the relation between the input information bit and their corresponding Hamming code outputs. Using the coefficients of weight enumerator the upper bounds on average BER and on FER are computed. Here the proposed method is based on modified trellis diagram by considering the puncturing pattern and finally the results show that the proposed bounds are tighter to the actual performance of terminated CCs. REFERENCES [1]. A. J. Viterbi, “Convolutional codes and their performance in communication systems," IEEE Trans. Commun. Tech., vol. COM-19, no. 5, 751-772, Oct. 1971. [2]. R. J. McEliece, The Theory of Information and Coding - A Mathematical Framework for Communication. Boston, MA: Addison-Wesley, 1977. [3]. C. Berrou, A. Glavieux, and P. Thitimasjshima, “Near Shannon limit error-correcting coding and decoding: turbo codes," in Proc. IEEE International Conf. Commun., 1993, pp. 1064-1070. [4]. C. Berrou, “The ten-year-old turbo codes are entering into service,"IEEE Commun. Mag., vol. 41, no. 8, pp. 110-116, Aug. 2003. [5]. 3GPP, “Multiplexing and channel coding (FDD)," 3GPP TS25.212, v. 6.8.0, June 2006. [6]. J. Cain, G. Clard, and J. Geister, “Punctured convolutional codes ofrate (n − 1)/n and simplified maximum likelihood decoding," IEEETrans. Inform Theory, vol. 25, no. 1, pp. 97- 100, Jan. 1979. [7]. J. Hagenauer, “Rate compatible punctured convolutional codes andtheir applications," IEEE Trans. Commun., vol. 36, no. 4, pp. 389-400,Apr. 1988 [8]. Y. Yasuda, K. Kashiki, and Y. Hirata, “High rate punctured convolutional codes for soft decision viterbi decoding," IEEE Trans. Commun., vol. 32, no. 3, pp. 315-319, Mar. 1984. [9]. G. Caire and E. Viterbo, “Upper bound on the frame error probability of terminated trellis codes," IEEE Commun.Lett., vol. 2, no. 1, pp. 2-4, Jan. 1998. [10]. K. M. Rege and S. Nanda, “Irreducible FER for convolutional codes with random bit puncturing: application to CDMA forward channel," in Proc. IEEE Veh. Technol. Conf., 1996, pp. 1336-1340. [11]. H. Moon, “Improved upper bound on bit error rate for truncatedconvolutional codes," IEE Electron. Lett., vol. 34, no. 1, pp. 65-66,Jan. 1998 [12]. H. Moon and D. C. Cox, “Improved performance upper bound forterminated convolutional codes," IEEE Commun. Lett., vol. 11, no. 6,pp. 519-521, June 2007. [13]. H. Moon and D. C. Cox, “Performance upper bounds for terminated convolutional codes," in Proc. IEEE Wireless Commun.Networking Conf., 2003, pp. 252-256. BIOGRAPHIES Ms .Shaik. Nilofer is working as an Assistant Professor in Mallareddy engineering College for women, Hyderabad. She has 3 yearsteaching experience at UG level.