SlideShare a Scribd company logo
1 of 5
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 557
SIMULATION OF CONVOLUTIONAL ENCODER
Sneha Bawane1
, V.V.Gohokar2
1
M.E student, Dept of Electronics and Telecommunication, SSGMCE Shegaon, Maharashtra-444203, India
2
Professor, Dept of Electronics and Telecommunication, SSGMCE Shegaon, Maharashtra-444203, India
Abstract
Convolutional encoding is a Forward Error Correction (FEC) technique used in continuous one-way and real time communication
links. Wireless devices such as hand phones and broadband modems rely heavily on forward error correction techniques for their
proper functioning, thus sending and receiving information with minimal or no error, while utilizing the available bandwidth. Major
requirements for modern digital wireless communication systems include high throughput, low power consumption and physical size.
This paper presents the simulation of convolutional encoder using MATLAB. The performance and analysis has done by changing
rates of convolutional encoder and error of binary symmetric channel.
Keywords: Constraint Length, Convolutional Encoder, Data rates, Generator polynomials, Poly2trellis structure.
-----------------------------------------------------------------------***-----------------------------------------------------------------------
1. INTRODUCTION
Convolutional encoding is a method of adding redundancy to a
data stream in a controlled manner to give the destination the
ability to correct bit errors without asking the source to
retransmit. Convolutional codes, and other codes which can
correct bit errors at the receiver, are called forward error
correcting (FEC). The ever increasing use of wireless digital
communication has led to a lot of effort invested in FEC
(Forward Error Correction).Convolutional codes are
introduced in 1955 by Elias. Convolutional codes are one of
the powerful and widely used class of codes, These codes are
having many applications, that are used in deep-space
communications, voice band modems, wireless standards(such
as 802.11) and in satellite communications. Convolutional
codes are plays a role in low-latency applications such as
speech transmission.
1.1 Convolutional Encoder
The convolutional encoder maps a continuous information bit
stream into a continuous bit stream of encoder output. The
convolutional encoder is a finite state machine, which is a
machine having memory of past inputs and also having a finite
number of different states.
Convolutional codes are commonly specified by three
parameters; (n, k, m).
n = number of output bits
k = number of input bits
m = number of memory registers
Where, n>k
The quantity k/n is called as code rate. it is a measure of the
efficiency of the code . Commonly k and n parameters range
from 1 to 8, m from 2 to 10 and the code rate from 1/8 to 7/8
except for deep space applications where code rates as low as
1/100 or even longer have been employed. here The quantity L
is called the constraint length of the code and is defined by
Constraint Length, L = k (m-1)
The constraint length L represents the number of bits in the
encoder memory that affect the generation of the n output bits.
The constraint length L is also referred to by the capital letter
K, which can be confusing with the lower case k, which
represents the number of input bits. In some books K is
defined as equal to product the of k and m. Often in
commercial specifications, the codes are specified by (r, K),
where r = the code rate k/n and K is the constraint length.
1.2 Generator Polynomials
Generator Polynomial is defined by-
g(i)
(D)=g0
(i)
+g1
(i)
(D)+ g2
(i)
(D2
)+……..+gM
(i)
(DM
)
Where, D = unit delay variable
M = number of stages of shift registers.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 558
Example:-
Fig-1: Convolutional Encoder
From above the generator polynomials codes are-
G1=133(OCT) and G2=171(OCT)
G1=x0+x2+x3+x5+x6
=1011011=133(OCT)
G2=x0+x1+x2+x3+x6
=1111001=171(OCT)
1.3. Poly2trellis
Syntax:
trellis=poly2trellis( ConstraintLength, CodeGenerator)
The poly2trellis function accepts a polynomial description of a
convolutional encoder and returns the corresponding trellis
structure description. The output of poly2trellis is suitable as
an input to the convenc and vitdec functions, and as a mask
parameter for the Convolutional Encoder, Viterbi Decoder in
the Communications Blockset.
Trellis=poly2trellis (ConstraintLength, CodeGenerator)
Performs the conversion for a rate k/n feedforward encoder.
Constraint Length is a 1-by-k vector that specifies the delay
for the encoder's k input bit streams. Code Generator is a k-by-
n matrix of octal numbers that specifies the n output
connections for each of the encoder's k input bit streams.
2. PERFORMANCE ANALYSIS OF
CONVOLUTIONAL ENCODER
2.1 Rate 1/2 Convolutional Encoder
Fig-2(a): trellis= poly2trellis (3, [7 5])
From the above diagram it shows 3 shift-registers where the
first one takes the incoming data bit and the rest, form the
memory of the encoder. When we perform Exclusive ORing
we get the generator polynomials as-
G1=111=7 and G2=101=5, it shows
trellis =poly2trellis(3,[7 5])
If suppose input code is 11, we have-
First Step: Initially if S0=0 S1=0 and S2=0 then the coded
bits are-
First coded bit= 0 XOR 0 XOR 0 = 0
Second coded bit = 0 XOR 0 = 0
Thus, if input=0 then output=00 ,it shows output for rate ½
convolutional encoder.
Second Step: If input =1 , shift registers perform shifting and
we get S0=1 S1=0 and S2=0
First coded bit= 1 XOR 0 XOR 0 = 1
Second coded bit = 1 XOR 0 = 1
Thus, if input=1 then output=11
Third Step: Similarly if input=1, then S0=1 S1=1 and S2=0
First coded bit= 1 XOR 1 XOR 0 = 0
Second coded bit = 1 XOR 0 = 1
Thus, if input= 1 then output=01
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 559
Same performance has done by using different poly2trellis,
constraint length and data rates of convolutional encoder.
2.2 Rate 1/3 Convolutional Encoder
g1 = 111, g2 = 011, g3=101
Fig-2(b): trellis = poly2trellis (3, [7 3 5])
2.3. Rate 2/3 Convolutional Encoder
Fig-2(c): trellis=poly2trellis ([5 4], 23 35 0; 0 5 13)
The first paragraph under each heading or subheading should
be flush left, and subsequent paragraphs should have a five-
space indentation. A colon is inserted before an equation is
presented, but there is no punctuation following the equation.
All equations are numbered and referred to in the text solely
by a number enclosed in a round bracket (i.e., (3) reads as
"equation 3"). Ensure that any miscellaneous numbering
system you use in your paper cannot be confused with a
reference [4] or an equation (3) designation.
3. SIMULATION
Fig-3: Simulink Model
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 560
Fig-3(a): Simulation results by changing encoder with same BSC error
Fig-3(b): Simulation results by changing error of BSC with same encoder
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 561
4. CONCLUSIONS
Simulation has done by using MATLAB .When signal to
noise ratio changes the change in the output of convolutional
encoder occurs. From the above results,[3(a)] by keeping
signal to noise ratio constant and by changing data rates of
convolutional encoder it can be seen that rate 2/3 gives better
result than 1/2 and 1/3 and [3(b)] by keeping date rate 1/2 and
changing signal to noise ratio it shows that with the minimum
S/N ratio it gives better result.
REFERENCES
[1]. Yan Sun1, Zhizhong Ding2, “ FPGA Design and
Implementation of a Convolutional Encoder and a Viterbi
Decoder Based on 802.11a for OFDM”, Received March 5th,
2012; revised April 1st, 2012; accepted April 9th, 2012,
doi:10.4236/wet.2012.33019.
[2]. Zafar Iqbal, Saeid Nooshabadi, Heung-No Lee, “Analysis
and Design of Coding and Interleaving in a MIMO-OFDM
Communication System”, Vol. 58, No. 3, August 2012.
[3]. JOHN WILEY, “ERROR CONTROL CODING”, Peter
Sweeney, University of Surrey, Guildford, UK
[4]. A. Msir, F. Monteiro*, A. Dandache, B. Lepley, “Design
of a high speed parallel encoder for convolutional codes”,
Microelectronics Journal 35 (2004) 151–166.
BIOGRAPHIES
Sneha W. Bawane is a M.E student in
Digital Electronics in S.S.G.M.C.E.,
Shegaon, Maharashtra. She received the BE
degree in Electronics Engineering from
RTM Nagpur university. Her current
research interests include design of
convolutional encoder.
Vinaya V. Gohokar working as Professor
in department of Electronics and
Telecommunication Engineering,
S.S.G.M.C.E., Shegaon, Maharashtra She
received her PhD from Amaravati
University in the field of video processing.
Her areas of interest are image and video processing,
microwave communication and signal processing.

More Related Content

What's hot

New Approach of Preprocessing For Numeral Recognition
New Approach of Preprocessing For Numeral RecognitionNew Approach of Preprocessing For Numeral Recognition
New Approach of Preprocessing For Numeral RecognitionIJERA Editor
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different mediaseSAT Publishing House
 
Fuzzy Type Image Fusion Using SPIHT Image Compression Technique
Fuzzy Type Image Fusion Using SPIHT Image Compression TechniqueFuzzy Type Image Fusion Using SPIHT Image Compression Technique
Fuzzy Type Image Fusion Using SPIHT Image Compression TechniqueIJERA Editor
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...IOSR Journals
 
Review and comparison of tasks scheduling in cloud computing
Review and comparison of tasks scheduling in cloud computingReview and comparison of tasks scheduling in cloud computing
Review and comparison of tasks scheduling in cloud computingijfcstjournal
 
An odd even block cipher based cryptosystem through modulo arithmatic techniq...
An odd even block cipher based cryptosystem through modulo arithmatic techniq...An odd even block cipher based cryptosystem through modulo arithmatic techniq...
An odd even block cipher based cryptosystem through modulo arithmatic techniq...eSAT Journals
 
An odd even block cipher based cryptosystem through
An odd even block cipher based cryptosystem throughAn odd even block cipher based cryptosystem through
An odd even block cipher based cryptosystem througheSAT Publishing House
 
Inpainting scheme for text in video a survey
Inpainting scheme for text in video   a surveyInpainting scheme for text in video   a survey
Inpainting scheme for text in video a surveyeSAT Journals
 
Recognition Technology for Four Arithmetic Operations
Recognition Technology for Four Arithmetic OperationsRecognition Technology for Four Arithmetic Operations
Recognition Technology for Four Arithmetic OperationsTELKOMNIKA JOURNAL
 
A Universal Bit Level Block Encoding Technique Using Session Based Symmetric ...
A Universal Bit Level Block Encoding Technique Using Session Based Symmetric ...A Universal Bit Level Block Encoding Technique Using Session Based Symmetric ...
A Universal Bit Level Block Encoding Technique Using Session Based Symmetric ...ijait
 
IRJET- Data Embedding using Image Steganography
IRJET-  	  Data Embedding using Image SteganographyIRJET-  	  Data Embedding using Image Steganography
IRJET- Data Embedding using Image SteganographyIRJET Journal
 
Design and Analysis of High Performance Floating Point Arithmetic Unit
Design and Analysis of High Performance Floating Point Arithmetic UnitDesign and Analysis of High Performance Floating Point Arithmetic Unit
Design and Analysis of High Performance Floating Point Arithmetic Unitijtsrd
 
IRJET- Advanced Character based Recognition and Phone Handling for Blind ...
IRJET-  	  Advanced Character based Recognition and Phone Handling for Blind ...IRJET-  	  Advanced Character based Recognition and Phone Handling for Blind ...
IRJET- Advanced Character based Recognition and Phone Handling for Blind ...IRJET Journal
 
Performance bounds for unequally punctured
Performance bounds for unequally puncturedPerformance bounds for unequally punctured
Performance bounds for unequally puncturedeSAT Publishing House
 
Implementation for Data Hiding using Visual Cryptography
Implementation for Data Hiding using Visual Cryptography           Implementation for Data Hiding using Visual Cryptography
Implementation for Data Hiding using Visual Cryptography IRJET Journal
 
Agent based intrusion detection system in manet
Agent based intrusion detection system in manetAgent based intrusion detection system in manet
Agent based intrusion detection system in manetcsandit
 

What's hot (18)

New Approach of Preprocessing For Numeral Recognition
New Approach of Preprocessing For Numeral RecognitionNew Approach of Preprocessing For Numeral Recognition
New Approach of Preprocessing For Numeral Recognition
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different medias
 
Fuzzy Type Image Fusion Using SPIHT Image Compression Technique
Fuzzy Type Image Fusion Using SPIHT Image Compression TechniqueFuzzy Type Image Fusion Using SPIHT Image Compression Technique
Fuzzy Type Image Fusion Using SPIHT Image Compression Technique
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
 
Review and comparison of tasks scheduling in cloud computing
Review and comparison of tasks scheduling in cloud computingReview and comparison of tasks scheduling in cloud computing
Review and comparison of tasks scheduling in cloud computing
 
An odd even block cipher based cryptosystem through modulo arithmatic techniq...
An odd even block cipher based cryptosystem through modulo arithmatic techniq...An odd even block cipher based cryptosystem through modulo arithmatic techniq...
An odd even block cipher based cryptosystem through modulo arithmatic techniq...
 
An odd even block cipher based cryptosystem through
An odd even block cipher based cryptosystem throughAn odd even block cipher based cryptosystem through
An odd even block cipher based cryptosystem through
 
Inpainting scheme for text in video a survey
Inpainting scheme for text in video   a surveyInpainting scheme for text in video   a survey
Inpainting scheme for text in video a survey
 
Recognition Technology for Four Arithmetic Operations
Recognition Technology for Four Arithmetic OperationsRecognition Technology for Four Arithmetic Operations
Recognition Technology for Four Arithmetic Operations
 
A Universal Bit Level Block Encoding Technique Using Session Based Symmetric ...
A Universal Bit Level Block Encoding Technique Using Session Based Symmetric ...A Universal Bit Level Block Encoding Technique Using Session Based Symmetric ...
A Universal Bit Level Block Encoding Technique Using Session Based Symmetric ...
 
IRJET- Data Embedding using Image Steganography
IRJET-  	  Data Embedding using Image SteganographyIRJET-  	  Data Embedding using Image Steganography
IRJET- Data Embedding using Image Steganography
 
Design and Analysis of High Performance Floating Point Arithmetic Unit
Design and Analysis of High Performance Floating Point Arithmetic UnitDesign and Analysis of High Performance Floating Point Arithmetic Unit
Design and Analysis of High Performance Floating Point Arithmetic Unit
 
B280916
B280916B280916
B280916
 
20120140504016
2012014050401620120140504016
20120140504016
 
IRJET- Advanced Character based Recognition and Phone Handling for Blind ...
IRJET-  	  Advanced Character based Recognition and Phone Handling for Blind ...IRJET-  	  Advanced Character based Recognition and Phone Handling for Blind ...
IRJET- Advanced Character based Recognition and Phone Handling for Blind ...
 
Performance bounds for unequally punctured
Performance bounds for unequally puncturedPerformance bounds for unequally punctured
Performance bounds for unequally punctured
 
Implementation for Data Hiding using Visual Cryptography
Implementation for Data Hiding using Visual Cryptography           Implementation for Data Hiding using Visual Cryptography
Implementation for Data Hiding using Visual Cryptography
 
Agent based intrusion detection system in manet
Agent based intrusion detection system in manetAgent based intrusion detection system in manet
Agent based intrusion detection system in manet
 

Viewers also liked

Pe2 a public encryption with two ack approach to
Pe2 a public encryption with two ack approach toPe2 a public encryption with two ack approach to
Pe2 a public encryption with two ack approach toeSAT Publishing House
 
Monitoring and gis mapping of groundwater level
Monitoring and gis mapping of groundwater levelMonitoring and gis mapping of groundwater level
Monitoring and gis mapping of groundwater leveleSAT Publishing House
 
Structure, microstructure and dielectric study of (ba0.6 sr0.4)(zr0.6ti0.4)o3...
Structure, microstructure and dielectric study of (ba0.6 sr0.4)(zr0.6ti0.4)o3...Structure, microstructure and dielectric study of (ba0.6 sr0.4)(zr0.6ti0.4)o3...
Structure, microstructure and dielectric study of (ba0.6 sr0.4)(zr0.6ti0.4)o3...eSAT Publishing House
 
Variable step size of lms algorithem using partical swarm optimization
Variable step size of lms algorithem using partical swarm optimizationVariable step size of lms algorithem using partical swarm optimization
Variable step size of lms algorithem using partical swarm optimizationeSAT Publishing House
 
Effects of filtering on ber performance of an ofdm system
Effects of filtering on ber performance of an ofdm systemEffects of filtering on ber performance of an ofdm system
Effects of filtering on ber performance of an ofdm systemeSAT Publishing House
 
Load frequency control in co ordination with
Load frequency control in co ordination withLoad frequency control in co ordination with
Load frequency control in co ordination witheSAT Publishing House
 
3 d modeling and dynamic charectarization of steam turbine packet blade and c...
3 d modeling and dynamic charectarization of steam turbine packet blade and c...3 d modeling and dynamic charectarization of steam turbine packet blade and c...
3 d modeling and dynamic charectarization of steam turbine packet blade and c...eSAT Publishing House
 
Performance analysis of al fec raptor code over 3 gpp embms network
Performance analysis of al fec raptor code over 3 gpp embms networkPerformance analysis of al fec raptor code over 3 gpp embms network
Performance analysis of al fec raptor code over 3 gpp embms networkeSAT Publishing House
 
An efficient approach for squared crest factor
An efficient approach for squared crest factorAn efficient approach for squared crest factor
An efficient approach for squared crest factoreSAT Publishing House
 
To analyses the effects of turning parameters on
To analyses the effects of turning parameters onTo analyses the effects of turning parameters on
To analyses the effects of turning parameters oneSAT Publishing House
 
Effect of soft segment chain length on tailoring the properties
Effect of soft segment chain length on tailoring the propertiesEffect of soft segment chain length on tailoring the properties
Effect of soft segment chain length on tailoring the propertieseSAT Publishing House
 
Secure and efficient handover authentication and detection of spoofing attack
Secure and efficient handover authentication and detection of spoofing attackSecure and efficient handover authentication and detection of spoofing attack
Secure and efficient handover authentication and detection of spoofing attackeSAT Publishing House
 
Flood modeling of river godavari using hec ras
Flood modeling of river godavari using hec rasFlood modeling of river godavari using hec ras
Flood modeling of river godavari using hec raseSAT Publishing House
 
A scheme for optical pulse generation using
A scheme for optical pulse generation usingA scheme for optical pulse generation using
A scheme for optical pulse generation usingeSAT Publishing House
 
Maintenance performance metrics for manufacturing industry
Maintenance performance metrics for manufacturing industryMaintenance performance metrics for manufacturing industry
Maintenance performance metrics for manufacturing industryeSAT Publishing House
 
Analytical review of loss reduction techniques in indian power distribution s...
Analytical review of loss reduction techniques in indian power distribution s...Analytical review of loss reduction techniques in indian power distribution s...
Analytical review of loss reduction techniques in indian power distribution s...eSAT Publishing House
 
Progressive collapse analysis of reinforced concrete
Progressive collapse analysis of reinforced concreteProgressive collapse analysis of reinforced concrete
Progressive collapse analysis of reinforced concreteeSAT Publishing House
 
Studies on effects of short coir fiber reinforcement on
Studies on effects of short coir fiber reinforcement onStudies on effects of short coir fiber reinforcement on
Studies on effects of short coir fiber reinforcement oneSAT Publishing House
 
Experimental study on performance of diesel engine
Experimental study on performance of diesel engineExperimental study on performance of diesel engine
Experimental study on performance of diesel engineeSAT Publishing House
 

Viewers also liked (20)

Pe2 a public encryption with two ack approach to
Pe2 a public encryption with two ack approach toPe2 a public encryption with two ack approach to
Pe2 a public encryption with two ack approach to
 
Monitoring and gis mapping of groundwater level
Monitoring and gis mapping of groundwater levelMonitoring and gis mapping of groundwater level
Monitoring and gis mapping of groundwater level
 
Structure, microstructure and dielectric study of (ba0.6 sr0.4)(zr0.6ti0.4)o3...
Structure, microstructure and dielectric study of (ba0.6 sr0.4)(zr0.6ti0.4)o3...Structure, microstructure and dielectric study of (ba0.6 sr0.4)(zr0.6ti0.4)o3...
Structure, microstructure and dielectric study of (ba0.6 sr0.4)(zr0.6ti0.4)o3...
 
Variable step size of lms algorithem using partical swarm optimization
Variable step size of lms algorithem using partical swarm optimizationVariable step size of lms algorithem using partical swarm optimization
Variable step size of lms algorithem using partical swarm optimization
 
Effects of filtering on ber performance of an ofdm system
Effects of filtering on ber performance of an ofdm systemEffects of filtering on ber performance of an ofdm system
Effects of filtering on ber performance of an ofdm system
 
Load frequency control in co ordination with
Load frequency control in co ordination withLoad frequency control in co ordination with
Load frequency control in co ordination with
 
3 d modeling and dynamic charectarization of steam turbine packet blade and c...
3 d modeling and dynamic charectarization of steam turbine packet blade and c...3 d modeling and dynamic charectarization of steam turbine packet blade and c...
3 d modeling and dynamic charectarization of steam turbine packet blade and c...
 
Performance analysis of al fec raptor code over 3 gpp embms network
Performance analysis of al fec raptor code over 3 gpp embms networkPerformance analysis of al fec raptor code over 3 gpp embms network
Performance analysis of al fec raptor code over 3 gpp embms network
 
An efficient approach for squared crest factor
An efficient approach for squared crest factorAn efficient approach for squared crest factor
An efficient approach for squared crest factor
 
To analyses the effects of turning parameters on
To analyses the effects of turning parameters onTo analyses the effects of turning parameters on
To analyses the effects of turning parameters on
 
Effect of soft segment chain length on tailoring the properties
Effect of soft segment chain length on tailoring the propertiesEffect of soft segment chain length on tailoring the properties
Effect of soft segment chain length on tailoring the properties
 
Path planning using vrep
Path planning using vrepPath planning using vrep
Path planning using vrep
 
Secure and efficient handover authentication and detection of spoofing attack
Secure and efficient handover authentication and detection of spoofing attackSecure and efficient handover authentication and detection of spoofing attack
Secure and efficient handover authentication and detection of spoofing attack
 
Flood modeling of river godavari using hec ras
Flood modeling of river godavari using hec rasFlood modeling of river godavari using hec ras
Flood modeling of river godavari using hec ras
 
A scheme for optical pulse generation using
A scheme for optical pulse generation usingA scheme for optical pulse generation using
A scheme for optical pulse generation using
 
Maintenance performance metrics for manufacturing industry
Maintenance performance metrics for manufacturing industryMaintenance performance metrics for manufacturing industry
Maintenance performance metrics for manufacturing industry
 
Analytical review of loss reduction techniques in indian power distribution s...
Analytical review of loss reduction techniques in indian power distribution s...Analytical review of loss reduction techniques in indian power distribution s...
Analytical review of loss reduction techniques in indian power distribution s...
 
Progressive collapse analysis of reinforced concrete
Progressive collapse analysis of reinforced concreteProgressive collapse analysis of reinforced concrete
Progressive collapse analysis of reinforced concrete
 
Studies on effects of short coir fiber reinforcement on
Studies on effects of short coir fiber reinforcement onStudies on effects of short coir fiber reinforcement on
Studies on effects of short coir fiber reinforcement on
 
Experimental study on performance of diesel engine
Experimental study on performance of diesel engineExperimental study on performance of diesel engine
Experimental study on performance of diesel engine
 

Similar to Simulation of convolutional encoder

Denoising of heart sound signal using wavelet transform
Denoising of heart sound signal using wavelet transformDenoising of heart sound signal using wavelet transform
Denoising of heart sound signal using wavelet transformeSAT Publishing House
 
Design of all digital phase locked loop (d pll) with fast acquisition time
Design of all digital phase locked loop (d pll) with fast acquisition timeDesign of all digital phase locked loop (d pll) with fast acquisition time
Design of all digital phase locked loop (d pll) with fast acquisition timeeSAT Journals
 
Low cost data acquisition from digital caliper to pc
Low cost data acquisition from digital caliper to pcLow cost data acquisition from digital caliper to pc
Low cost data acquisition from digital caliper to pceSAT Journals
 
Data detection with a progressive parallel ici canceller in mimo ofdm
Data detection with a progressive parallel ici canceller in mimo ofdmData detection with a progressive parallel ici canceller in mimo ofdm
Data detection with a progressive parallel ici canceller in mimo ofdmeSAT Publishing House
 
Low cost data acquisition from digital caliper to pc
Low cost data acquisition from digital caliper to pcLow cost data acquisition from digital caliper to pc
Low cost data acquisition from digital caliper to pceSAT Publishing House
 
Fpga implementation of various lines coding technique for efficient transmiss...
Fpga implementation of various lines coding technique for efficient transmiss...Fpga implementation of various lines coding technique for efficient transmiss...
Fpga implementation of various lines coding technique for efficient transmiss...eSAT Publishing House
 
Design of all digital phase locked loop
Design of all digital phase locked loopDesign of all digital phase locked loop
Design of all digital phase locked loopeSAT Publishing House
 
Normalization Cross Correlation Value of Rotational Attack on Digital Image W...
Normalization Cross Correlation Value of Rotational Attack on Digital Image W...Normalization Cross Correlation Value of Rotational Attack on Digital Image W...
Normalization Cross Correlation Value of Rotational Attack on Digital Image W...Komal Goyal
 
Effect of fiber distance on various sac ocdma detection techniques
Effect of fiber distance on various sac ocdma detection techniquesEffect of fiber distance on various sac ocdma detection techniques
Effect of fiber distance on various sac ocdma detection techniqueseSAT Journals
 
Effect of fiber distance on various sac ocdma detection techniques
Effect of fiber distance on various sac ocdma detection techniquesEffect of fiber distance on various sac ocdma detection techniques
Effect of fiber distance on various sac ocdma detection techniqueseSAT Publishing House
 
Application of ann for ultimate shear strength of fly ash concrete beams
Application of ann for ultimate shear strength of fly ash concrete beamsApplication of ann for ultimate shear strength of fly ash concrete beams
Application of ann for ultimate shear strength of fly ash concrete beamseSAT Journals
 
Application of ann for ultimate shear strength of fly
Application of ann for ultimate shear strength of flyApplication of ann for ultimate shear strength of fly
Application of ann for ultimate shear strength of flyeSAT Publishing House
 
Application of ann for ultimate shear strength of fly ash concrete beams
Application of ann for ultimate shear strength of fly ash concrete beamsApplication of ann for ultimate shear strength of fly ash concrete beams
Application of ann for ultimate shear strength of fly ash concrete beamseSAT Journals
 
Td ams processing for vlsi implementation of ldpc decoder
Td ams processing for vlsi implementation of ldpc decoderTd ams processing for vlsi implementation of ldpc decoder
Td ams processing for vlsi implementation of ldpc decodereSAT Publishing House
 
Td ams processing for vlsi implementation of ldpc decoder
Td ams processing for vlsi implementation of ldpc decoderTd ams processing for vlsi implementation of ldpc decoder
Td ams processing for vlsi implementation of ldpc decodereSAT Publishing House
 
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...IJERA Editor
 
Design of area and power efficient half adder using transmission gate
Design of area and power efficient half adder using transmission gateDesign of area and power efficient half adder using transmission gate
Design of area and power efficient half adder using transmission gateeSAT Journals
 
Wireless communication without pre shared secrets using spread spectrum techn...
Wireless communication without pre shared secrets using spread spectrum techn...Wireless communication without pre shared secrets using spread spectrum techn...
Wireless communication without pre shared secrets using spread spectrum techn...eSAT Journals
 
Feature extraction from asthma patient’s voice using mel frequency cepstral c...
Feature extraction from asthma patient’s voice using mel frequency cepstral c...Feature extraction from asthma patient’s voice using mel frequency cepstral c...
Feature extraction from asthma patient’s voice using mel frequency cepstral c...eSAT Publishing House
 
Design and simulation of passive uhf rfid temperature sensor tag using 3 d em...
Design and simulation of passive uhf rfid temperature sensor tag using 3 d em...Design and simulation of passive uhf rfid temperature sensor tag using 3 d em...
Design and simulation of passive uhf rfid temperature sensor tag using 3 d em...eSAT Publishing House
 

Similar to Simulation of convolutional encoder (20)

Denoising of heart sound signal using wavelet transform
Denoising of heart sound signal using wavelet transformDenoising of heart sound signal using wavelet transform
Denoising of heart sound signal using wavelet transform
 
Design of all digital phase locked loop (d pll) with fast acquisition time
Design of all digital phase locked loop (d pll) with fast acquisition timeDesign of all digital phase locked loop (d pll) with fast acquisition time
Design of all digital phase locked loop (d pll) with fast acquisition time
 
Low cost data acquisition from digital caliper to pc
Low cost data acquisition from digital caliper to pcLow cost data acquisition from digital caliper to pc
Low cost data acquisition from digital caliper to pc
 
Data detection with a progressive parallel ici canceller in mimo ofdm
Data detection with a progressive parallel ici canceller in mimo ofdmData detection with a progressive parallel ici canceller in mimo ofdm
Data detection with a progressive parallel ici canceller in mimo ofdm
 
Low cost data acquisition from digital caliper to pc
Low cost data acquisition from digital caliper to pcLow cost data acquisition from digital caliper to pc
Low cost data acquisition from digital caliper to pc
 
Fpga implementation of various lines coding technique for efficient transmiss...
Fpga implementation of various lines coding technique for efficient transmiss...Fpga implementation of various lines coding technique for efficient transmiss...
Fpga implementation of various lines coding technique for efficient transmiss...
 
Design of all digital phase locked loop
Design of all digital phase locked loopDesign of all digital phase locked loop
Design of all digital phase locked loop
 
Normalization Cross Correlation Value of Rotational Attack on Digital Image W...
Normalization Cross Correlation Value of Rotational Attack on Digital Image W...Normalization Cross Correlation Value of Rotational Attack on Digital Image W...
Normalization Cross Correlation Value of Rotational Attack on Digital Image W...
 
Effect of fiber distance on various sac ocdma detection techniques
Effect of fiber distance on various sac ocdma detection techniquesEffect of fiber distance on various sac ocdma detection techniques
Effect of fiber distance on various sac ocdma detection techniques
 
Effect of fiber distance on various sac ocdma detection techniques
Effect of fiber distance on various sac ocdma detection techniquesEffect of fiber distance on various sac ocdma detection techniques
Effect of fiber distance on various sac ocdma detection techniques
 
Application of ann for ultimate shear strength of fly ash concrete beams
Application of ann for ultimate shear strength of fly ash concrete beamsApplication of ann for ultimate shear strength of fly ash concrete beams
Application of ann for ultimate shear strength of fly ash concrete beams
 
Application of ann for ultimate shear strength of fly
Application of ann for ultimate shear strength of flyApplication of ann for ultimate shear strength of fly
Application of ann for ultimate shear strength of fly
 
Application of ann for ultimate shear strength of fly ash concrete beams
Application of ann for ultimate shear strength of fly ash concrete beamsApplication of ann for ultimate shear strength of fly ash concrete beams
Application of ann for ultimate shear strength of fly ash concrete beams
 
Td ams processing for vlsi implementation of ldpc decoder
Td ams processing for vlsi implementation of ldpc decoderTd ams processing for vlsi implementation of ldpc decoder
Td ams processing for vlsi implementation of ldpc decoder
 
Td ams processing for vlsi implementation of ldpc decoder
Td ams processing for vlsi implementation of ldpc decoderTd ams processing for vlsi implementation of ldpc decoder
Td ams processing for vlsi implementation of ldpc decoder
 
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...
 
Design of area and power efficient half adder using transmission gate
Design of area and power efficient half adder using transmission gateDesign of area and power efficient half adder using transmission gate
Design of area and power efficient half adder using transmission gate
 
Wireless communication without pre shared secrets using spread spectrum techn...
Wireless communication without pre shared secrets using spread spectrum techn...Wireless communication without pre shared secrets using spread spectrum techn...
Wireless communication without pre shared secrets using spread spectrum techn...
 
Feature extraction from asthma patient’s voice using mel frequency cepstral c...
Feature extraction from asthma patient’s voice using mel frequency cepstral c...Feature extraction from asthma patient’s voice using mel frequency cepstral c...
Feature extraction from asthma patient’s voice using mel frequency cepstral c...
 
Design and simulation of passive uhf rfid temperature sensor tag using 3 d em...
Design and simulation of passive uhf rfid temperature sensor tag using 3 d em...Design and simulation of passive uhf rfid temperature sensor tag using 3 d em...
Design and simulation of passive uhf rfid temperature sensor tag using 3 d em...
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...Call girls in Ahmedabad High profile
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 

Recently uploaded (20)

Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 

Simulation of convolutional encoder

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 557 SIMULATION OF CONVOLUTIONAL ENCODER Sneha Bawane1 , V.V.Gohokar2 1 M.E student, Dept of Electronics and Telecommunication, SSGMCE Shegaon, Maharashtra-444203, India 2 Professor, Dept of Electronics and Telecommunication, SSGMCE Shegaon, Maharashtra-444203, India Abstract Convolutional encoding is a Forward Error Correction (FEC) technique used in continuous one-way and real time communication links. Wireless devices such as hand phones and broadband modems rely heavily on forward error correction techniques for their proper functioning, thus sending and receiving information with minimal or no error, while utilizing the available bandwidth. Major requirements for modern digital wireless communication systems include high throughput, low power consumption and physical size. This paper presents the simulation of convolutional encoder using MATLAB. The performance and analysis has done by changing rates of convolutional encoder and error of binary symmetric channel. Keywords: Constraint Length, Convolutional Encoder, Data rates, Generator polynomials, Poly2trellis structure. -----------------------------------------------------------------------***----------------------------------------------------------------------- 1. INTRODUCTION Convolutional encoding is a method of adding redundancy to a data stream in a controlled manner to give the destination the ability to correct bit errors without asking the source to retransmit. Convolutional codes, and other codes which can correct bit errors at the receiver, are called forward error correcting (FEC). The ever increasing use of wireless digital communication has led to a lot of effort invested in FEC (Forward Error Correction).Convolutional codes are introduced in 1955 by Elias. Convolutional codes are one of the powerful and widely used class of codes, These codes are having many applications, that are used in deep-space communications, voice band modems, wireless standards(such as 802.11) and in satellite communications. Convolutional codes are plays a role in low-latency applications such as speech transmission. 1.1 Convolutional Encoder The convolutional encoder maps a continuous information bit stream into a continuous bit stream of encoder output. The convolutional encoder is a finite state machine, which is a machine having memory of past inputs and also having a finite number of different states. Convolutional codes are commonly specified by three parameters; (n, k, m). n = number of output bits k = number of input bits m = number of memory registers Where, n>k The quantity k/n is called as code rate. it is a measure of the efficiency of the code . Commonly k and n parameters range from 1 to 8, m from 2 to 10 and the code rate from 1/8 to 7/8 except for deep space applications where code rates as low as 1/100 or even longer have been employed. here The quantity L is called the constraint length of the code and is defined by Constraint Length, L = k (m-1) The constraint length L represents the number of bits in the encoder memory that affect the generation of the n output bits. The constraint length L is also referred to by the capital letter K, which can be confusing with the lower case k, which represents the number of input bits. In some books K is defined as equal to product the of k and m. Often in commercial specifications, the codes are specified by (r, K), where r = the code rate k/n and K is the constraint length. 1.2 Generator Polynomials Generator Polynomial is defined by- g(i) (D)=g0 (i) +g1 (i) (D)+ g2 (i) (D2 )+……..+gM (i) (DM ) Where, D = unit delay variable M = number of stages of shift registers.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 558 Example:- Fig-1: Convolutional Encoder From above the generator polynomials codes are- G1=133(OCT) and G2=171(OCT) G1=x0+x2+x3+x5+x6 =1011011=133(OCT) G2=x0+x1+x2+x3+x6 =1111001=171(OCT) 1.3. Poly2trellis Syntax: trellis=poly2trellis( ConstraintLength, CodeGenerator) The poly2trellis function accepts a polynomial description of a convolutional encoder and returns the corresponding trellis structure description. The output of poly2trellis is suitable as an input to the convenc and vitdec functions, and as a mask parameter for the Convolutional Encoder, Viterbi Decoder in the Communications Blockset. Trellis=poly2trellis (ConstraintLength, CodeGenerator) Performs the conversion for a rate k/n feedforward encoder. Constraint Length is a 1-by-k vector that specifies the delay for the encoder's k input bit streams. Code Generator is a k-by- n matrix of octal numbers that specifies the n output connections for each of the encoder's k input bit streams. 2. PERFORMANCE ANALYSIS OF CONVOLUTIONAL ENCODER 2.1 Rate 1/2 Convolutional Encoder Fig-2(a): trellis= poly2trellis (3, [7 5]) From the above diagram it shows 3 shift-registers where the first one takes the incoming data bit and the rest, form the memory of the encoder. When we perform Exclusive ORing we get the generator polynomials as- G1=111=7 and G2=101=5, it shows trellis =poly2trellis(3,[7 5]) If suppose input code is 11, we have- First Step: Initially if S0=0 S1=0 and S2=0 then the coded bits are- First coded bit= 0 XOR 0 XOR 0 = 0 Second coded bit = 0 XOR 0 = 0 Thus, if input=0 then output=00 ,it shows output for rate ½ convolutional encoder. Second Step: If input =1 , shift registers perform shifting and we get S0=1 S1=0 and S2=0 First coded bit= 1 XOR 0 XOR 0 = 1 Second coded bit = 1 XOR 0 = 1 Thus, if input=1 then output=11 Third Step: Similarly if input=1, then S0=1 S1=1 and S2=0 First coded bit= 1 XOR 1 XOR 0 = 0 Second coded bit = 1 XOR 0 = 1 Thus, if input= 1 then output=01
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 559 Same performance has done by using different poly2trellis, constraint length and data rates of convolutional encoder. 2.2 Rate 1/3 Convolutional Encoder g1 = 111, g2 = 011, g3=101 Fig-2(b): trellis = poly2trellis (3, [7 3 5]) 2.3. Rate 2/3 Convolutional Encoder Fig-2(c): trellis=poly2trellis ([5 4], 23 35 0; 0 5 13) The first paragraph under each heading or subheading should be flush left, and subsequent paragraphs should have a five- space indentation. A colon is inserted before an equation is presented, but there is no punctuation following the equation. All equations are numbered and referred to in the text solely by a number enclosed in a round bracket (i.e., (3) reads as "equation 3"). Ensure that any miscellaneous numbering system you use in your paper cannot be confused with a reference [4] or an equation (3) designation. 3. SIMULATION Fig-3: Simulink Model
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 560 Fig-3(a): Simulation results by changing encoder with same BSC error Fig-3(b): Simulation results by changing error of BSC with same encoder
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 561 4. CONCLUSIONS Simulation has done by using MATLAB .When signal to noise ratio changes the change in the output of convolutional encoder occurs. From the above results,[3(a)] by keeping signal to noise ratio constant and by changing data rates of convolutional encoder it can be seen that rate 2/3 gives better result than 1/2 and 1/3 and [3(b)] by keeping date rate 1/2 and changing signal to noise ratio it shows that with the minimum S/N ratio it gives better result. REFERENCES [1]. Yan Sun1, Zhizhong Ding2, “ FPGA Design and Implementation of a Convolutional Encoder and a Viterbi Decoder Based on 802.11a for OFDM”, Received March 5th, 2012; revised April 1st, 2012; accepted April 9th, 2012, doi:10.4236/wet.2012.33019. [2]. Zafar Iqbal, Saeid Nooshabadi, Heung-No Lee, “Analysis and Design of Coding and Interleaving in a MIMO-OFDM Communication System”, Vol. 58, No. 3, August 2012. [3]. JOHN WILEY, “ERROR CONTROL CODING”, Peter Sweeney, University of Surrey, Guildford, UK [4]. A. Msir, F. Monteiro*, A. Dandache, B. Lepley, “Design of a high speed parallel encoder for convolutional codes”, Microelectronics Journal 35 (2004) 151–166. BIOGRAPHIES Sneha W. Bawane is a M.E student in Digital Electronics in S.S.G.M.C.E., Shegaon, Maharashtra. She received the BE degree in Electronics Engineering from RTM Nagpur university. Her current research interests include design of convolutional encoder. Vinaya V. Gohokar working as Professor in department of Electronics and Telecommunication Engineering, S.S.G.M.C.E., Shegaon, Maharashtra She received her PhD from Amaravati University in the field of video processing. Her areas of interest are image and video processing, microwave communication and signal processing.