Viterbi decoding has a fixed decoding time. It is well suited to hardware decoder. Hear we proposed Viterbi algorithm with Decoding rate 1/3. Which dynamically improve performance of the channel
This document describes the implementation of a Viterbi decoder using VHDL. It begins with background on convolutional encoding, the Viterbi algorithm for decoding convolutional codes, and the basic structure of a Viterbi decoder. It then discusses the design and simulation of a rate 1/2 constraint length 3 Viterbi decoder in VHDL targeting the Spartan-3A FPGA. Simulation results and comparisons to other FPGA devices are presented.
Generation and Implementation of Barker and Nested Binary codesIOSR Journals
This document discusses the generation and implementation of Barker and nested binary codes for use in radar applications. It begins with background on Barker codes and nested binary codes, which are types of phase coded waveforms used for pulse compression. Barker codes have the optimal autocorrelation sidelobe properties but are limited in length. Nested binary codes are formed by taking the Kronecker product of two Barker codes, which allows the generation of longer codes while maintaining good autocorrelation. The document then presents the methodology for implementing Barker and nested binary codes using linear feedback shift registers (LFSRs). Finally, it discusses measures for comparing signal performance such as merit factor and proposes an efficient VLSI architecture using LFSRs to generate these codes for implementation
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Vlsi Implementation of Low Power Convolutional Coding With Viterbi Decoding U...IOSR Journals
This document discusses the VLSI implementation of a low power convolutional coding system with Viterbi decoding using finite state machines (FSM). It begins with an introduction to convolutional encoding and Viterbi decoding. It then describes the convolutional encoder which uses a shift register, the state diagram representation, and provides an example of encoding an input sequence. It discusses the Viterbi decoder structure including the branch metric unit, add-compare-select unit, and survivor path memory. It presents the Viterbi algorithm for decoding and shows simulation results of encoding and decoding an input sequence using FSMs. It concludes that the Viterbi algorithm allows for error correction without retransmissions and recovering the original message accurately.
Rs(n,k)exploring n and k in reed solomon fec codeMapYourTech
The document discusses Reed-Solomon FEC coding. It explains that Reed-Solomon RS(n,k) encoding takes k data bytes and calculates n-k parity bytes to create an n-byte codeword. A Reed-Solomon decoder can correct up to t byte errors, where t=(n-k)/2. ITU G.975 and G.709 recommend Reed-Solomon RS(255,239) coding, which can correct up to 8 byte errors and provides a coding gain of around 6dB with a 7% overhead. The document also provides examples of calculating RS(n,k) parameters for an OTN frame.
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...IJERA Editor
In digital communication forward error correction methods have a great practical importance when channel is
noisy. Convolutional error correction code can correct both type of errors random and burst. Convolution
encoding has been used in digital communication systems including deep space communication and wireless
communication. The error correction capability of convolutional code depends on code rate and constraint
length. The low code rate and high constraint length has more error correction capabilities but that also
introduce large overhead. This paper introduces convolutional encoders for various constraint lengths. By
increasing the constraint length the error correction capability can be increased. The performance and error
correction also depends on the selection of generator polynomial. This paper also introduces a good generator
polynomial which has high performance and error correction capabilities.
Hybrid ldpc and stbc algorithms to improve ber reduction in ofdmIAEME Publication
This document discusses improving bit error rate (BER) performance in orthogonal frequency division multiplexing (OFDM) systems using hybrid low-density parity check (LDPC) codes and space-time block coding (STBC). It first describes MMSE and LS channel estimation techniques in OFDM and an adaptive modulation and coding WiMAX system. It then proposes using LDPC codes with STBC across multiple transmit antennas to achieve coding gain and diversity gain. Simulation results show the hybrid LDPC-STBC method provides better BER performance than STBC alone, especially at low signal-to-noise ratios in flat Rayleigh fading channels.
The document discusses turbo codes, which are a type of error correction code used in communication systems. Turbo codes work by concatenating two or more simple convolutional codes with an interleaver between them. This structure allows for iterative decoding that can achieve performance close to the theoretical maximum. The key aspects covered are the turbo code concepts, log likelihood algebra used in decoding, the purpose and types of interleaving, and how recursive systematic convolutional codes are used as the component codes of a turbo code.
This document describes the implementation of a Viterbi decoder using VHDL. It begins with background on convolutional encoding, the Viterbi algorithm for decoding convolutional codes, and the basic structure of a Viterbi decoder. It then discusses the design and simulation of a rate 1/2 constraint length 3 Viterbi decoder in VHDL targeting the Spartan-3A FPGA. Simulation results and comparisons to other FPGA devices are presented.
Generation and Implementation of Barker and Nested Binary codesIOSR Journals
This document discusses the generation and implementation of Barker and nested binary codes for use in radar applications. It begins with background on Barker codes and nested binary codes, which are types of phase coded waveforms used for pulse compression. Barker codes have the optimal autocorrelation sidelobe properties but are limited in length. Nested binary codes are formed by taking the Kronecker product of two Barker codes, which allows the generation of longer codes while maintaining good autocorrelation. The document then presents the methodology for implementing Barker and nested binary codes using linear feedback shift registers (LFSRs). Finally, it discusses measures for comparing signal performance such as merit factor and proposes an efficient VLSI architecture using LFSRs to generate these codes for implementation
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Vlsi Implementation of Low Power Convolutional Coding With Viterbi Decoding U...IOSR Journals
This document discusses the VLSI implementation of a low power convolutional coding system with Viterbi decoding using finite state machines (FSM). It begins with an introduction to convolutional encoding and Viterbi decoding. It then describes the convolutional encoder which uses a shift register, the state diagram representation, and provides an example of encoding an input sequence. It discusses the Viterbi decoder structure including the branch metric unit, add-compare-select unit, and survivor path memory. It presents the Viterbi algorithm for decoding and shows simulation results of encoding and decoding an input sequence using FSMs. It concludes that the Viterbi algorithm allows for error correction without retransmissions and recovering the original message accurately.
Rs(n,k)exploring n and k in reed solomon fec codeMapYourTech
The document discusses Reed-Solomon FEC coding. It explains that Reed-Solomon RS(n,k) encoding takes k data bytes and calculates n-k parity bytes to create an n-byte codeword. A Reed-Solomon decoder can correct up to t byte errors, where t=(n-k)/2. ITU G.975 and G.709 recommend Reed-Solomon RS(255,239) coding, which can correct up to 8 byte errors and provides a coding gain of around 6dB with a 7% overhead. The document also provides examples of calculating RS(n,k) parameters for an OTN frame.
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...IJERA Editor
In digital communication forward error correction methods have a great practical importance when channel is
noisy. Convolutional error correction code can correct both type of errors random and burst. Convolution
encoding has been used in digital communication systems including deep space communication and wireless
communication. The error correction capability of convolutional code depends on code rate and constraint
length. The low code rate and high constraint length has more error correction capabilities but that also
introduce large overhead. This paper introduces convolutional encoders for various constraint lengths. By
increasing the constraint length the error correction capability can be increased. The performance and error
correction also depends on the selection of generator polynomial. This paper also introduces a good generator
polynomial which has high performance and error correction capabilities.
Hybrid ldpc and stbc algorithms to improve ber reduction in ofdmIAEME Publication
This document discusses improving bit error rate (BER) performance in orthogonal frequency division multiplexing (OFDM) systems using hybrid low-density parity check (LDPC) codes and space-time block coding (STBC). It first describes MMSE and LS channel estimation techniques in OFDM and an adaptive modulation and coding WiMAX system. It then proposes using LDPC codes with STBC across multiple transmit antennas to achieve coding gain and diversity gain. Simulation results show the hybrid LDPC-STBC method provides better BER performance than STBC alone, especially at low signal-to-noise ratios in flat Rayleigh fading channels.
The document discusses turbo codes, which are a type of error correction code used in communication systems. Turbo codes work by concatenating two or more simple convolutional codes with an interleaver between them. This structure allows for iterative decoding that can achieve performance close to the theoretical maximum. The key aspects covered are the turbo code concepts, log likelihood algebra used in decoding, the purpose and types of interleaving, and how recursive systematic convolutional codes are used as the component codes of a turbo code.
This document discusses turbo and turbo-like codes. It begins with an introduction to turbo codes, describing them as a class of high-performance error correction codes that were the first practical codes to closely approach channel capacity. It then covers channel coding, Shannon's theory, existing coding schemes like block codes and convolutional codes, and the need for better codes. The document spends significant time explaining turbo codes in detail, including their structure using parallel concatenated convolutional codes, interleaving, and iterative decoding. It also discusses related coding schemes like turbo product codes and low-density parity check codes. Finally, it reviews the performance, practical issues, applications in standards, and future trends of turbo and turbo-like codes.
This document provides an overview of simulation of a turbo encoder and decoder. It discusses the key components of a turbo encoder including two convolutional encoders separated by an interleaver. It describes convolutional encoding, interleaving, puncturing, and different decoding techniques like SOVA and MAP decoding. It lists applications of turbo codes in areas like mobile radio, digital video, and deep space communications. Finally, it concludes that turbo codes can achieve remarkable performance with low complexity encoding and decoding algorithms, making them well-suited for applications like deep space communications.
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...ijitjournal
Error Correcting Codes are required to have a reliable communication through a medium that has an
unacceptable bit error rate and low signal to noise ratio. In IEEE 802.15.6 2.4GHz Wireless Body Area
Network (WBAN), data gets corrupted during the transmission and reception due to noises and
interferences. Ultra low power operation is crucial to prolong the life of implantable devices. Hence simple
block codes like BCH (63, 51, 2) can be employed in the transceiver design of 802.15.6 Narrowband PHY.
In this paper, implementation of BCH (63, 51, t = 2) Encoder and Decoder using VHDL is discussed. The
incoming 51 bits are encoded into 63 bit code word using (63, 51) BCH encoder. It can detect and correct
up to 2 random errors. The design of an encoder is implemented using Linear Feed Back Shift Register
(LFSR) for polynomial division and the decoder design is based on syndrome calculator, inversion-less
Berlekamp-Massey algorithm (BMA) and Chien search algorithm. Synthesis and simulation were carried
out using Xilinx ISE 14.2 and ModelSim 10.1c. The codes are implemented over Virtex 4 FPGA device and
tested on DN8000K10PCIE Logic Emulation Board. To the best of our knowledge, it is the first time an
implementation of (63, 51) BCH encoder and decoder carried out.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
The document analyzes the performance of a turbo coded WiMAX system over different communication channels, including AWGN, Rayleigh, and Rician channels. It describes the key components of the WiMAX physical layer, including randomization, forward error correction, interleaving, symbol mapping, and encoding of turbo codes. Simulation results are presented comparing the performance of the different channels, with AWGN showing better performance at higher numbers of turbo code iterations. With convolution coding alone performance was weaker, but turbo coding provided about a 7dB enhancement.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IRJET- Simulation and Performance Estimation of BPSK in Rayleigh Channel ...IRJET Journal
This document summarizes research on simulating and estimating the performance of BPSK modulation over Rayleigh fading channels using selection combining (SC), maximal ratio combining (MRC), and equal gain combining (EGC) diversity techniques. It presents the theoretical frameworks for analyzing BER performance using these techniques. Simulation results show that MRC provides the best performance with increasing SNR gain as the number of receivers increases, followed by EGC, then SC. MRC achieves the lowest SNR required to reach a given BER level. The document concludes that MRC is the most effective technique for mitigating the effects of fading in Rayleigh channels.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
This document provides an overview of modern forward error correction (FEC) techniques used in satellite communications (SATCOM). It discusses the motivation for using FEC to combat various link impairments. It then reviews various FEC schemes including block codes, convolutional codes, turbo codes, and compares their performance. Turbo codes are shown to provide the best performance, approaching the theoretical Shannon limit, allowing for reduced transmitter power and bandwidth compared to older FEC schemes. The document concludes that while newer codes like turbo codes offer close to optimal performance, simpler block and convolutional codes also provide good performance for their lower complexity.
Performance Study of RS (255, 239) and RS (255.233) Used Respectively in DVB-...IJERA Editor
The error correction codes have a wide range of applications in digital communication (satellite, wireless) and digital data storage. This paper presents a comparative study of performance between RS (255, 239) and RS (255.233) used respectively in the Digital Video Broadcasting – Terrestrial (DVB-T) and National Aeronautics and Space Administration (NASA). The performances were evaluated by applying modulation scheme in additive white Gaussian noise (AWGN) channel. Performances of modulation with RS codes are evaluated in bit error rate (BER) and signal energy -to- noise power density ratio (Eb / No). The analysis is studied with the help of MATLAB simulator to analyze a communication link with AWGN Channel, and different modulations.
HIGH-SPEED LOW-POWER VITERBI DECODER DESIGN FOR TCM DECODERSLalitha Gosukonda
This document presents a design for a high-speed low-power Viterbi decoder for trellis coded modulation decoders. It proposes a precomputation architecture incorporated with the T-algorithm to reduce power consumption without significantly degrading decoding speed. The architecture calculates branch metric minimum values in advance and compares them to path metrics to eliminate unlikely paths early. Implementation in Verilog and synthesis results show the proposed architecture operates at a lower supply voltage for moderate throughput applications, achieving quadratic power reduction over conventional decoders.
IRJET - Design of RISC-V Bit Manipulation Instruction IP using Bluespec S...IRJET Journal
This document describes the design of a bit manipulation instruction IP using Bluespec SystemVerilog for the RISC-V architecture. The IP implements 106 bit manipulation instructions proposed as an extension to the RISC-V instruction set. The design is a combinational logic block that takes instruction encoding and source operands as input and produces a result register in a single clock cycle. The IP was optimized to reduce logic gates and LUT count. Simulation results showed that all instructions executed correctly in a single cycle. Area analysis showed a reduction in LUT usage from optimizing common functions and reducing decoder multiplexer inputs.
Performance Comparison of Uncoded OFDM & Uncoded Adaptive OFDM System Over AW...IOSR Journals
Adaptive OFDM (AOFDM) is the important approach to fourth generation of mobile
communication. Adaptive modulating scheme is employed according to channel fading condition for improving
the performance of OFDM. This gives improved data rate, spectral efficiency & throughput. OFDM is flexible
to adapt modulation schemes on subcarriers according instantaneous signal-to-noise ratio (SNR). In this paper,
we compare Bit Error Rate (BER),Mean Square Error(MSE), Spectral Efficiency, Throughput performance of
uncoded OFDM & uncoded adaptive OFDM with BPSK,QPSK & QAM modulation over AWGN channel.
Noise Immune Convolutional Encoder Design and Its Implementation in Tanner ijcisjournal
With the rapid advances in integrated circuit(IC) technologies, number of functions on a chip was
increasing at a very fast rate, with which interconnect density is increasing especially in functional logic
chips. The on-chip noise affects are increasing and needs to be addressed. In this paper we have
implemented a convolution encoder using a technique that provides higher noise immunity. The encoder
circuit is simulated in Tanner 15.0 with data rate of 25Mbps and a clock frequency of 250MHz
UNIT III BASEBAND TRANSMISSION
Properties of Line codes- Power Spectral Density of Unipolar / Polar RZ & NRZ – Bipolar NRZ - Manchester- ISI – Nyquist criterion for distortionless transmission – Pulse shaping – Correlative coding - Mary schemes – Eye pattern – Equalization
Design of multi bit multi-phase vco-based adceSAT Journals
This document presents the design of a multi-bit multi-phase VCO-based ADC. A three stage current starved ring VCO is implemented to convert the analog input voltage to an oscillation frequency. Multi-bit quantization is performed on the output phase of each VCO element to increase the resolution of the ADC in a feed-forward architecture. The output of the multi-bit quantized differentiator is counted and the counts from each element are summed. This allows for a 7.6 bit resolution to be achieved, while also providing first-order noise shaping inherently. The VCO achieves a wide tuning range of 66MHz to 875MHz with 94.5% linearity through techniques used to increase the linear
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IRJET - Wireless Transmission of Data using LDPC Codes based on Raspberry PiIRJET Journal
This document summarizes several research papers on low-density parity-check (LDPC) coding for wireless data transmission using Raspberry Pi modules. Specifically:
(1) It discusses implementations of LDPC encoding and decoding of text data using Raspberry Pi modules connected over Wi-Fi, with decoding using sum-product algorithms.
(2) It mentions other research on minimizing bit error rate using specific LDPC parity matrix structures and efficient encoding/decoding techniques.
(3) The document reviews various approaches to LDPC coding implementation including using FPGAs, ZigBee modules, and novel decoding algorithms.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
A Novel Clustering Method for Similarity Measuring in Text DocumentsIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
This document summarizes and compares several routing protocols for wireless sensor networks. It begins with an introduction to wireless sensor networks and discusses some of the key challenges in routing for these networks, such as large numbers of sensor nodes, energy constraints, and random node deployment. The document then categorizes routing protocols as flat-based, hierarchical-based, or location-based and focuses on reviewing various dynamic and static hierarchical/clustering-based routing protocols. Several popular protocols are described in detail, including LEACH, EECS, PEGASIS, and EEPSC. The pros and cons of each approach are discussed.
Dokumen ini memberikan contoh-contoh penulisan bilangan bulat dari 1 hingga 100 dalam bentuk angka dan kata-kata. Terdapat 3 aktiviti pengukuhan yang melibatkan pemadanan bilangan dengan kata-kata dan sebaliknya.
This document discusses turbo and turbo-like codes. It begins with an introduction to turbo codes, describing them as a class of high-performance error correction codes that were the first practical codes to closely approach channel capacity. It then covers channel coding, Shannon's theory, existing coding schemes like block codes and convolutional codes, and the need for better codes. The document spends significant time explaining turbo codes in detail, including their structure using parallel concatenated convolutional codes, interleaving, and iterative decoding. It also discusses related coding schemes like turbo product codes and low-density parity check codes. Finally, it reviews the performance, practical issues, applications in standards, and future trends of turbo and turbo-like codes.
This document provides an overview of simulation of a turbo encoder and decoder. It discusses the key components of a turbo encoder including two convolutional encoders separated by an interleaver. It describes convolutional encoding, interleaving, puncturing, and different decoding techniques like SOVA and MAP decoding. It lists applications of turbo codes in areas like mobile radio, digital video, and deep space communications. Finally, it concludes that turbo codes can achieve remarkable performance with low complexity encoding and decoding algorithms, making them well-suited for applications like deep space communications.
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...ijitjournal
Error Correcting Codes are required to have a reliable communication through a medium that has an
unacceptable bit error rate and low signal to noise ratio. In IEEE 802.15.6 2.4GHz Wireless Body Area
Network (WBAN), data gets corrupted during the transmission and reception due to noises and
interferences. Ultra low power operation is crucial to prolong the life of implantable devices. Hence simple
block codes like BCH (63, 51, 2) can be employed in the transceiver design of 802.15.6 Narrowband PHY.
In this paper, implementation of BCH (63, 51, t = 2) Encoder and Decoder using VHDL is discussed. The
incoming 51 bits are encoded into 63 bit code word using (63, 51) BCH encoder. It can detect and correct
up to 2 random errors. The design of an encoder is implemented using Linear Feed Back Shift Register
(LFSR) for polynomial division and the decoder design is based on syndrome calculator, inversion-less
Berlekamp-Massey algorithm (BMA) and Chien search algorithm. Synthesis and simulation were carried
out using Xilinx ISE 14.2 and ModelSim 10.1c. The codes are implemented over Virtex 4 FPGA device and
tested on DN8000K10PCIE Logic Emulation Board. To the best of our knowledge, it is the first time an
implementation of (63, 51) BCH encoder and decoder carried out.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
The document analyzes the performance of a turbo coded WiMAX system over different communication channels, including AWGN, Rayleigh, and Rician channels. It describes the key components of the WiMAX physical layer, including randomization, forward error correction, interleaving, symbol mapping, and encoding of turbo codes. Simulation results are presented comparing the performance of the different channels, with AWGN showing better performance at higher numbers of turbo code iterations. With convolution coding alone performance was weaker, but turbo coding provided about a 7dB enhancement.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IRJET- Simulation and Performance Estimation of BPSK in Rayleigh Channel ...IRJET Journal
This document summarizes research on simulating and estimating the performance of BPSK modulation over Rayleigh fading channels using selection combining (SC), maximal ratio combining (MRC), and equal gain combining (EGC) diversity techniques. It presents the theoretical frameworks for analyzing BER performance using these techniques. Simulation results show that MRC provides the best performance with increasing SNR gain as the number of receivers increases, followed by EGC, then SC. MRC achieves the lowest SNR required to reach a given BER level. The document concludes that MRC is the most effective technique for mitigating the effects of fading in Rayleigh channels.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
This document provides an overview of modern forward error correction (FEC) techniques used in satellite communications (SATCOM). It discusses the motivation for using FEC to combat various link impairments. It then reviews various FEC schemes including block codes, convolutional codes, turbo codes, and compares their performance. Turbo codes are shown to provide the best performance, approaching the theoretical Shannon limit, allowing for reduced transmitter power and bandwidth compared to older FEC schemes. The document concludes that while newer codes like turbo codes offer close to optimal performance, simpler block and convolutional codes also provide good performance for their lower complexity.
Performance Study of RS (255, 239) and RS (255.233) Used Respectively in DVB-...IJERA Editor
The error correction codes have a wide range of applications in digital communication (satellite, wireless) and digital data storage. This paper presents a comparative study of performance between RS (255, 239) and RS (255.233) used respectively in the Digital Video Broadcasting – Terrestrial (DVB-T) and National Aeronautics and Space Administration (NASA). The performances were evaluated by applying modulation scheme in additive white Gaussian noise (AWGN) channel. Performances of modulation with RS codes are evaluated in bit error rate (BER) and signal energy -to- noise power density ratio (Eb / No). The analysis is studied with the help of MATLAB simulator to analyze a communication link with AWGN Channel, and different modulations.
HIGH-SPEED LOW-POWER VITERBI DECODER DESIGN FOR TCM DECODERSLalitha Gosukonda
This document presents a design for a high-speed low-power Viterbi decoder for trellis coded modulation decoders. It proposes a precomputation architecture incorporated with the T-algorithm to reduce power consumption without significantly degrading decoding speed. The architecture calculates branch metric minimum values in advance and compares them to path metrics to eliminate unlikely paths early. Implementation in Verilog and synthesis results show the proposed architecture operates at a lower supply voltage for moderate throughput applications, achieving quadratic power reduction over conventional decoders.
IRJET - Design of RISC-V Bit Manipulation Instruction IP using Bluespec S...IRJET Journal
This document describes the design of a bit manipulation instruction IP using Bluespec SystemVerilog for the RISC-V architecture. The IP implements 106 bit manipulation instructions proposed as an extension to the RISC-V instruction set. The design is a combinational logic block that takes instruction encoding and source operands as input and produces a result register in a single clock cycle. The IP was optimized to reduce logic gates and LUT count. Simulation results showed that all instructions executed correctly in a single cycle. Area analysis showed a reduction in LUT usage from optimizing common functions and reducing decoder multiplexer inputs.
Performance Comparison of Uncoded OFDM & Uncoded Adaptive OFDM System Over AW...IOSR Journals
Adaptive OFDM (AOFDM) is the important approach to fourth generation of mobile
communication. Adaptive modulating scheme is employed according to channel fading condition for improving
the performance of OFDM. This gives improved data rate, spectral efficiency & throughput. OFDM is flexible
to adapt modulation schemes on subcarriers according instantaneous signal-to-noise ratio (SNR). In this paper,
we compare Bit Error Rate (BER),Mean Square Error(MSE), Spectral Efficiency, Throughput performance of
uncoded OFDM & uncoded adaptive OFDM with BPSK,QPSK & QAM modulation over AWGN channel.
Noise Immune Convolutional Encoder Design and Its Implementation in Tanner ijcisjournal
With the rapid advances in integrated circuit(IC) technologies, number of functions on a chip was
increasing at a very fast rate, with which interconnect density is increasing especially in functional logic
chips. The on-chip noise affects are increasing and needs to be addressed. In this paper we have
implemented a convolution encoder using a technique that provides higher noise immunity. The encoder
circuit is simulated in Tanner 15.0 with data rate of 25Mbps and a clock frequency of 250MHz
UNIT III BASEBAND TRANSMISSION
Properties of Line codes- Power Spectral Density of Unipolar / Polar RZ & NRZ – Bipolar NRZ - Manchester- ISI – Nyquist criterion for distortionless transmission – Pulse shaping – Correlative coding - Mary schemes – Eye pattern – Equalization
Design of multi bit multi-phase vco-based adceSAT Journals
This document presents the design of a multi-bit multi-phase VCO-based ADC. A three stage current starved ring VCO is implemented to convert the analog input voltage to an oscillation frequency. Multi-bit quantization is performed on the output phase of each VCO element to increase the resolution of the ADC in a feed-forward architecture. The output of the multi-bit quantized differentiator is counted and the counts from each element are summed. This allows for a 7.6 bit resolution to be achieved, while also providing first-order noise shaping inherently. The VCO achieves a wide tuning range of 66MHz to 875MHz with 94.5% linearity through techniques used to increase the linear
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IRJET - Wireless Transmission of Data using LDPC Codes based on Raspberry PiIRJET Journal
This document summarizes several research papers on low-density parity-check (LDPC) coding for wireless data transmission using Raspberry Pi modules. Specifically:
(1) It discusses implementations of LDPC encoding and decoding of text data using Raspberry Pi modules connected over Wi-Fi, with decoding using sum-product algorithms.
(2) It mentions other research on minimizing bit error rate using specific LDPC parity matrix structures and efficient encoding/decoding techniques.
(3) The document reviews various approaches to LDPC coding implementation including using FPGAs, ZigBee modules, and novel decoding algorithms.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
A Novel Clustering Method for Similarity Measuring in Text DocumentsIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
This document summarizes and compares several routing protocols for wireless sensor networks. It begins with an introduction to wireless sensor networks and discusses some of the key challenges in routing for these networks, such as large numbers of sensor nodes, energy constraints, and random node deployment. The document then categorizes routing protocols as flat-based, hierarchical-based, or location-based and focuses on reviewing various dynamic and static hierarchical/clustering-based routing protocols. Several popular protocols are described in detail, including LEACH, EECS, PEGASIS, and EEPSC. The pros and cons of each approach are discussed.
Dokumen ini memberikan contoh-contoh penulisan bilangan bulat dari 1 hingga 100 dalam bentuk angka dan kata-kata. Terdapat 3 aktiviti pengukuhan yang melibatkan pemadanan bilangan dengan kata-kata dan sebaliknya.
Electric Load Forecasting Using Genetic Algorithm – A Review IJMER
Many real-world problems from operations research and management science are very
complex in nature and quite hard to solve by conventional optimization techniques. So, intelligent
solutions based on genetic algorithm (GA), to solve these complicated practical problems in various
sectors are becoming more and more widespread nowadays. GAs are being developed and deployed
worldwide in myriad applications, mainly because of their symbolic reasoning, flexibility and
explanation capabilities.
This paper provides an overview of GAs, as well as their current use in the field of electric load
forecasting. The types of GA are outlined, leading to a discussion of the various types and parameters of
load forecasting. The paper concludes by sharing thoughts and estimations on GA for load forecasting
for future prospects in this area. This review reveals that although still regarded as a novel
methodology, GA technologies are shown to have matured to the point of offering real practical benefits
in many of their applications.
A Chord based Service Discovery Approach for Peer- to- Peer NetworksIJMER
The document proposes a Chord-based decentralized service discovery approach called Chord4S. Chord4S improves on the basic Chord P2P overlay network by distributing descriptions of functionally equivalent services across different nodes. This improves availability in volatile environments by allowing services to still be discovered even if a node fails. Chord4S also supports wildcard queries to search multiple service categories at once and considers quality of service information during discovery. The approach aims to enable more robust and scalable service discovery compared to traditional centralized registry methods.
Application of Parabolic Trough Collectorfor Reduction of Pressure Drop in Oi...IJMER
Pipelines are the least expensive and most effective method for the oil transportation.
Due to high viscosity of crude oil, the pressure drop and pumping power requirements are very high.
So it is necessary to bring down the viscosity of crude oil. Heated pipelines are used reduce the oil
viscosity by increasing the oil temperature. Electrical heating and direct flame heating are the common
method used for heating the oil pipeline. In this work, a new application of Parabolic Trough Collector
in the field of oil pipeline transport is introduced for reducing pressure drop in oil pipelines. Oil
pipeline is heated by applying concentrated solar radiation on the pipe surface using a Parabolic
Trough Collector in which the oil pipeline acts as the absorber pipe. 3-D steady state analysis is
carried out on a heated oil pipeline using commercial CFD software package ANSYS Fluent 14.5. In
this work an effort is made to investigate the effect of concentrated solar radiation for reducing
pressure drop in the oil pipeline. The results from the numerical analysis shows that the pressure drop
in oil pipeline is get reduced by heating the pipe line using concentrated solar radiation. From this
work, the application of PTC in oil pipeline transportation is justified.
This document contains two short phrases: "38 group" and "Nino talabadze". It does not provide enough context or details to generate a meaningful multi-sentence summary. The document appears to list a group name and a person's name but without additional context around what they refer to or their significance.
The Impacts of Social Networking and Its AnalysisIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Dynamic Response Analysis of Automatic Generation Control in a 2-Area (Reheat...IJMER
This document summarizes a study on the dynamic response analysis of an automatic generation control system in a two-area interconnected power system with one area having reheat thermal units and the other non-reheat units. Mathematical models of the system are developed using state space equations. The frequency and tie-line power deviations are analyzed using MATLAB-SIMULINK for 1% step load changes in both areas with conventional PI control and with a proposed discrete controller to improve dynamic performance. Keywords include automatic generation control, modeling of interconnected power systems, and dynamic performance analysis.
This document contains two pieces of information: the number "416 group" and the name "Nino talabadze". No other context is provided about what these entries refer to or their significance. In summary, the document lists a number and a name but does not provide any explanation of their meaning or connection.
This document summarizes research that uses a binary coded genetic algorithm to optimize the design of fin arrays on an internal combustion engine cylinder. The goal is to maximize heat transfer through either rectangular or triangular fin profiles. Mathematical models are developed to calculate the heat transfer based on parameters like fin length, thickness, spacing, and material properties. Constraints related to fin mass and dimensions are also considered. The genetic algorithm operates on a population of potential designs encoded as binary strings. Over generations, the algorithms applies reproduction, crossover and mutation to arrive at optimal fin array designs that maximize heat transfer within the given constraints. Results show that the triangular fin profile provides advantages over the rectangular profile in terms of heat transfer per unit mass.
The document discusses polynomial normal matrices and polynomial unitary matrices. Some key points:
- Polynomial normal matrices are polynomial matrices whose coefficient matrices are normal matrices. Properties of polynomial normal matrices are discussed, including that the product of two polynomial normal matrices is also polynomial normal if they commute.
- A polynomial matrix is unitary if each coefficient matrix is unitary. It is shown that a polynomial matrix is polynomial normal if and only if every polynomial matrix unitarily equivalent to it is also polynomial normal.
- Results are presented, including that the product of the coefficient matrices of two polynomial matrices is zero if the coefficient matrices are normal and the products of the coefficients are zero.
Live Streaming With Receiver-Based P2P Multiplexing for Future IPTV NetworkIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
This document presents models for problems that arise in Yang-Mills theory. It factors Yang-Mills theory and provides a model for the left-hand side and right-hand side of the Yang-Mills equations. The models consider parameters like symmetry breaking, mass acquisition, strong and electroweak interactions, gauge invariance, gauge fields, and non-commutative symmetry groups. Differential equations are provided for six modules analyzing these concepts. The goal is to lay a foundation for further factorizations and solutions to problems at the Planck scale.
Comparative study on Garments dyeing process and Fabric dyeing process on var...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Optimization of Turning Parameters Using Taguchi MethodIJMER
Abstract: Today in manufacturing and metal industries customer satisfaction is very important to
make own place in competitive market and also to make mirror image with faith in the heart of
customer, because customer gives preference to buy good quality product. In the metal and
manufacturing industries for the product low surface roughness is very important. Lowest surface
roughness assures not only good quality but also reduces manufacturing cost. In this paper the main
objective is to study effect of cutting speed, feed rate and depth of cut on surface roughness of mild steel
in turning operation and as a result of that the combination of optimum level of factors was obtained to
get lowest surface roughness. Experiments have been conducted using Taguchi’s experimental design
technique. An orthogonal array, signal to noise ratio, and analysis of variance are employed to
investigate cutting characteristics of mild steel using high speed steel. Experimental results show that
among the cutting parameter cutting speed is the most significant machining parameter for surface
roughness followed by feed rate and depth of cut.
If you are on the search for specialized rug cleaners for your rugs in New York City, it is recommended that once check the background of the company before one seeks their services. It is an added benefit provided that the professional cleaners have adequate experience in cleaning services.
Impact of Mechanical System in Machining Of AISI 1018 Using Taguchi Design o...IJMER
The imperative objective of the science of metal cutting is the solution of practical problems
associated with the efficient and precise removal of metal from work piece. Optimization of process
parameters is done to have great control over quality, productivity and cost aspects of the process.
Taguchi method stresses the importance of studying the response variation using the signal–to–noise
(S/N) ratio, resulting in minimization of quality characteristic variation due to uncontrollable
parameter. Orthogonal array was adopted in order to planning the (L9) experimental runs in turning of
AISI 1018 by taking the help of software Minitab 16. The MRR and time
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
FPGA Implementation of Efficient Viterbi Decoder for Multi-Carrier SystemsIJMER
In this paper, we concern with designing and implementing a Convolutional encoder and
Adaptive Viterbi Decoder (AVD) which are the essential blocks in digital communication system using
FPGA technology. Convolutional coding is a coding scheme used in communication systems for error
correction employed in applications like deep space communications and wireless communications. It
provides an alternative approach to block codes for transmission over a noisy channel. The block
codes can be applied only for the blocks of data where as the Convolutional coding has an advantage
that it can be applied to both continuous data stream and blocks of data. The Viterbi decoder with
PNPH (Permutation Network based Path History) management unit which is a special path
management unit for faster decoding speed with less routing area. The proposed architecture can be
realized by an Adaptive Viterbi Decoder having constraint length, K of 3 and a code rate (k/n) of 1/2
using Verilog HDL. Simulation is done using Xilinx ISE 12.4i design software and it is targeted into
Xilinx Virtex-5, XC5VLX110T FPGA
Implementation of Viterbi Decoder on FPGA to Improve Designijsrd.com
This document discusses the implementation of a Viterbi decoder on an FPGA to improve its design. It begins with an introduction to convolutional encoding and the Viterbi algorithm. It then describes the basic components of a Viterbi decoder including the branch metric unit, path metric unit, and survivor memory management unit. It discusses different techniques for Viterbi decoding including hard decision, soft decision, and various register exchange methods. It concludes that increasing the constraint length improves the decoder's performance and that traceback methods are more area efficient than register exchange methods for large constraint lengths.
Simulation of Turbo Convolutional Codes for Deep Space MissionIJERA Editor
In satellite communication deep space mission are the most challenging mission, where system has to work at very low Eb/No. Concatenated codes are the ideal choice for such deep space mission. The paper describes simulation of Turbo codes in SIMULINK . The performance of Turbo code is depend upon various factor. In this paper ,we have consider impact of interleaver design in the performance of Turbo code. A details simulation is presented and compare the performance with different interleaver design .
This document discusses the design of an asynchronous Viterbi decoder using a bundled data protocol to reduce power consumption. Viterbi decoders are commonly used in wireless communications and other applications, but synchronous implementations consume significant power due to global clock distribution. The proposed asynchronous design uses local handshaking signals between blocks rather than a global clock. It employs a 4-phase bundled data protocol to communicate data between units like the branch metric unit, add-compare-select unit, and survivor path memory unit. The goal is to optimize these power-intensive units and achieve lower power operation through an asynchronous, clock-free design approach compared to traditional synchronous Viterbi decoders.
Hamming net based Low Complexity Successive Cancellation Polar DecoderRSIS International
This paper aims to implement hybrid based Polar
encoder using the knowledge of mutual information and channel
capacity. Further a Hamming weight successive cancellation
decoder is simulated with QPSK modulation technique in
presence of additive white gaussian noise. The experimentation
performed with the effect of channel polarization has shown that
for 256- bit data stream, 30% channels has zero bit and 49%
channels are with a one bit capacity. The decoding complexity is
reduced to almost half as compared to conventional successive
cancellation decoding algorithm. However, the required SNR of
7 dB is achieved at the targeted BER of 10 -4. The penalty paid is
in terms of training time required at the decoding end.
A new channel coding technique to approach the channel capacityijwmn
After Shannon’s 1948 channel coding theorem, we have witnessed many channel coding techniques developed to achieve the Shannon limit. A wide range of channel codes is available with different complexity levels and error correction performance. Many powerful coding schemes have been deployed in the power-limited Additive White Gaussian Noise (AWGN) channel. However, it seems like we have arrived at an end of advancement path, for most of the existing channel codes. This article introduces a new coding technique that can either be used as the last coding stage of concatenated coding scheme or in parallel configuration with other powerful channel codes to achieve reliable error performance with moderately complex decoding. We will go through an example to understand the overall approach of the proposed coding technique, and finally we will look at some simulation results over an AWGN channel to demonstrate its potential.
This document summarizes a research paper that proposes using parallel concatenated turbo codes in wireless sensor networks in an adaptive way. The key points are:
1) Turbo codes can achieve near-Shannon limit performance but decoding is complex, making them difficult to implement on energy-constrained sensor nodes.
2) The proposed approach shifts the complex turbo decoding to the base station while sensor nodes implement encoding and basic error correction.
3) At sensor nodes, a parallel concatenated convolutional code (PCCC) circuit encodes data and detects/corrects errors in forwarded packets. This improves energy efficiency and reliability over the wireless sensor network.
Iaetsd vlsi implementation of efficient convolutionalIaetsd Iaetsd
This document describes the implementation of an efficient convolutional encoder and modified Viterbi decoder using FPGA technology. It begins with an introduction to convolutional encoding and Viterbi decoding. It then discusses the implementation of a convolutional encoder, including the state diagram and state table. Next, it describes the Viterbi algorithm and its components: branch metric calculation, path metric calculation using an add-compare-select unit, and traceback. It introduces the modified Viterbi algorithm and how it reduces computations and path storage requirements. It presents the design of the convolutional encoder and modified Viterbi decoder in Verilog HDL. Finally, it shows simulation results of the convolutional encoder and components of the modified Viterbi decoder.
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
Performances Concatenated LDPC based STBC-OFDM System and MRC Receivers IJECEIAES
This document presents a study on the performance of a low density parity check (LDPC) coded orthogonal frequency division multiplexing (OFDM) system using space time block coding (STBC) under various digital modulations and channel conditions. The system incorporates a 3/4 rate convolutional encoder and a LDPC encoder. At the receiver, maximum ratio combining is implemented for channel equalization. Simulation results show that the LDPC coded OFDM system outperforms an uncoded system, and provides lower bit error rates under binary phase shift keying modulation in an additive white Gaussian noise channel.
The document compares the performance of single stage and double stage interleavers in communication systems using turbo codes. A single stage interleaver uses one random interleaver between two convolutional encoders, while a double stage interleaver uses two interleavers in series. The document suggests that a double stage interleaver can improve the bit error rate (BER) of the system compared to a single stage interleaver by further scrambling the input bits. It also provides details on the components of a turbo code system such as convolutional encoders, interleavers, puncturing, and iterative decoding.
A NOVEL APPROACH FOR LOWER POWER DESIGN IN TURBO CODING SYSTEMVLSICS Design
Low Power is an extremely important issue for future mobile communication systems; The focus of this paper is to implementat turbo codes for low power solutions. The effect on performance due to variation in parameters like frame length, number of iterations, type of encoding scheme and type of the interleave in the presence of additive white Gaussian noise is studied with the floating point model. In order to obtain the effect of quantization and word length variation, a fixed point model of the application is also developed.. The application performance measure, namely bit-error rate (BER) is used as a design constraint while optimizing for power and area coverage. Low power Optimization is Performed on Implementation levels by the use of Voltage scaling. With those Techniques we can reduced the power 98.5%and Area(LUT) is 57% and speed grade is Increased .This type of Power maneger is proposed and implemented based on the timing details of the turbo decoder in the VHDL model.
Performance Analysis of MIMO Equalization Techniques with Highly Efficient Ch...IJMTST Journal
1. The document analyzes the performance of MIMO equalization techniques when combined with highly efficient channel coding schemes like turbo codes.
2. It simulates the combination of MIMO techniques (ML, MMSE) with turbo codes and analyzes the bit error rate (BER) achieved at different signal to noise ratios (SNR).
3. The results show that combining MIMO with channel coding achieves a BER of 10-6 at much lower SNR values (between -3 to 5 dB) compared to using MIMO alone (which requires 10-20 dB SNR). The best performance was obtained using a 2x4 MIMO configuration with ML equalization.
Performance analysis of viterbi decoder for wireless applicationsacijjournal
Viterbi decoder is employed in wireless communication to decode the convolutional codes; those codes are
used in every robust digital communication systems. Convolutional encoding and viterbi decoding is a
powerful method for forward error correction. This paper deals with synthesis and implementation of
viterbi decoder with a constraint length of three as well as seven and the code rate of ½ in FPGA (Field
Programmable Gate Array). The performance of viterbi decoder is analyzed in terms of resource
utilization. The design of viterbi decoder is simulated using Verilog HDL. It is synthesized and implemented
using Xilinx 9.1ise and Spartan 3E Kit. It is compatible with many common standards such as 3GPP, IEEE
802.16 and LTE.
High Speed Low-Power Viterbi Decoder Using Trellis Code ModulationMangaiK4
Abstract - High speed low power viterbi decoders for trellis code modulation is well known for the delay consumption in underwater communication. In transmission system wireless communication is the transfer of information between two or more points that are not connected by an electrical conductor. WiMAX is the wireless communication standard designed to provide 30 to 40 Mega bits per second data rates. WiMAX as a standards based technology enabling the delivery of last mile wireless broadband access as an alternative to cable and DSL. WiMAX can provide at home or mobile internet access across whole cities or countries. The address generation of WiMAX is carried out by interleaver and deinterleaver. Interleaving is used to overcome correlated channel noise such as burst error or fading. The interleaver/deinterleaver rearranges input data such that consecutive data are spaced apart. The interleaved memory is to improve the speed of access to memory. The viterbi technique reduces the bit error rate and delay using wimax.
High Speed Low-Power Viterbi Decoder Using Trellis Code ModulationMangaiK4
Abstract - High speed low power viterbi decoders for trellis code modulation is well known for the delay consumption in underwater communication. In transmission system wireless communication is the transfer of information between two or more points that are not connected by an electrical conductor. WiMAX is the wireless communication standard designed to provide 30 to 40 Mega bits per second data rates. WiMAX as a standards based technology enabling the delivery of last mile wireless broadband access as an alternative to cable and DSL. WiMAX can provide at home or mobile internet access across whole cities or countries. The address generation of WiMAX is carried out by interleaver and deinterleaver. Interleaving is used to overcome correlated channel noise such as burst error or fading. The interleaver/deinterleaver rearranges input data such that consecutive data are spaced apart. The interleaved memory is to improve the speed of access to memory. The viterbi technique reduces the bit error rate and delay using wimax.
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...IJCSEA Journal
In this paper we describe novel non-statistical Euclidean distance soft-input, soft-output (SISO) decoding
algorithms for the three currently most important error-correcting codes: the low-density parity-check
(LDPC), turbo and polar codes. The metric is squared Euclidean distance, and the decoders operate using
an antilog-log (AL) process. We have investigated the simulated bit-error rate (BER) performance of these
non-statistical algorithms on three channel models: the additive White Gaussian noise (AWGN), the
Rayleigh fading and Middleton’s Class-A impulsive noise channels, and compare them with the BER
performances of the corresponding statistical decoding algorithms for the three codes and channels. In all
cases the performance over the AWGN channel of the non-statistical algorithms is almost the same or
slightly better than that of the statistical algorithms. In some cases the performance over the two nonGaussian channels of the non-statistical algorithms is worse than that of the statistical algorithms, but the
use of a simple signal amplitude limiter placed before the decoder input significantly improves the actual
and relative performances of the algorithms. Thus there is no performance loss, and sometimes a
significant performance gain, for the proposed decoding algorithms. A major advantage of our algorithms
is that estimation of the channel signal-to-noise ratio is not required, which in practice simplifies system
implementation. In addition, we have found that the processing complexity of the non-statistical algorithms
is similar or slightly less than that of the corresponding statistical algorithms, and is significantly less for
the LDPC codes over all of the channels.
Similar to BER Performance for Convalutional Code with Soft & Hard Viterbi Decoding (20)
A Study on Translucent Concrete Product and Its Properties by Using Optical F...IJMER
- Translucent concrete is a concrete based material with light-transferring properties,
obtained due to embedded light optical elements like Optical fibers used in concrete. Light is conducted
through the concrete from one end to the other. This results into a certain light pattern on the other
surface, depending on the fiber structure. Optical fibers transmit light so effectively that there is
virtually no loss of light conducted through the fibers. This paper deals with the modeling of such
translucent or transparent concrete blocks and panel and their usage and also the advantages it brings
in the field. The main purpose is to use sunlight as a light source to reduce the power consumption of
illumination and to use the optical fiber to sense the stress of structures and also use this concrete as an
architectural purpose of the building
Developing Cost Effective Automation for Cotton Seed DelintingIJMER
A low cost automation system for removal of lint from cottonseed is to be designed and
developed. The setup consists of stainless steel drum with stirrer in which cottonseeds having lint is mixed
with concentrated sulphuric acid. So lint will get burn. This lint free cottonseed treated with lime water to
neutralize acidic nature. After water washing this cottonseeds are used for agriculter purpose
Study & Testing Of Bio-Composite Material Based On Munja FibreIJMER
The incorporation of natural fibres such as munja fiber composites has gained
increasing applications both in many areas of Engineering and Technology. The aim of this study is to
evaluate mechanical properties such as flexural and tensile properties of reinforced epoxy composites.
This is mainly due to their applicable benefits as they are light weight and offer low cost compared to
synthetic fibre composites. Munja fibres recently have been a substitute material in many weight-critical
applications in areas such as aerospace, automotive and other high demanding industrial sectors. In
this study, natural munja fibre composites and munja/fibreglass hybrid composites were fabricated by a
combination of hand lay-up and cold-press methods. A new variety in munja fibre is the present work
the main aim of the work is to extract the neat fibre and is characterized for its flexural characteristics.
The composites are fabricated by reinforcing untreated and treated fibre and are tested for their
mechanical, properties strictly as per ASTM procedures.
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)IJMER
Hybrid engine is a combination of Stirling engine, IC engine and Electric motor. All these 3 are
connected together to a single shaft. The power source of the Stirling engine will be a Solar Panel. The aim of
this is to run the automobile using a Hybrid engine
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...IJMER
This document summarizes research on the fabrication and characterization of bio-composite materials using sunnhemp fibre. The document discusses how sunnhemp fibre was used to reinforce an epoxy matrix through hand lay-up methods. Various mechanical properties of the bio-composites were tested, including tensile, flexural, and impact properties. The results of the mechanical tests on the bio-composite specimens are presented. Potential applications of the sunnhemp fibre bio-composites are also suggested, such as in fall ceilings, partitions, packaging, automotive interiors, and toys.
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...IJMER
The Greenstone belts of Karnataka are enriched in BIFs in Dharwar craton, where Iron
formations are confined to the basin shelf, clearly separated from the deeper-water iron formation that
accumulated at the basin margin and flanking the marine basin. Geochemical data procured in terms of
major, trace and REE are plotted in various diagrams to interpret the genesis of BIFs. Al2O3, Fe2O3 (T),
TiO2, CaO, and SiO2 abundances and ratios show a wide variation. Ni, Co, Zr, Sc, V, Rb, Sr, U, Th,
ΣREE, La, Ce and Eu anomalies and their binary relationships indicate that wherever the terrigenous
component has increased, the concentration of elements of felsic such as Zr and Hf has gone up. Elevated
concentrations of Ni, Co and Sc are contributed by chlorite and other components characteristic of basic
volcanic debris. The data suggest that these formations were generated by chemical and clastic
sedimentary processes on a shallow shelf. During transgression, chemical precipitation took place at the
sediment-water interface, whereas at the time of regression. Iron ore formed with sedimentary structures
and textures in Kammatturu area, in a setting where the water column was oxygenated.
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...IJMER
In this paper, the mechanical characteristics of C45 medium carbon steel are investigated
under various working conditions. The main characteristic to be studied on this paper is impact toughness
of the material with different configurations and the experiment were carried out on charpy impact testing
equipment. This study reveals the ability of the material to absorb energy up to failure for various
specimen configurations under different heat treated conditions and the corresponding results were
compared with the analysis outcome
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...IJMER
Robot guns are being increasingly employed in automotive manufacturing to replace
risky jobs and also to increase productivity. Using a single robot for a single operation proves to be
expensive. Hence for cost optimization, multiple guns are mounted on a single robot and multiple
operations are performed. Robot Gun structure is an efficient way in which multiple welds can be done
simultaneously. However mounting several weld guns on a single structure induces a variety of
dynamic loads, especially during movement of the robot arm as it maneuvers to reach the weld
locations. The primary idea employed in this paper, is to model those dynamic loads as equivalent G
force loads in FEA. This approach will be on the conservative side, and will be saving time and
subsequently cost efficient. The approach of the paper is towards creating a standard operating
procedure when it comes to analysis of such structures, with emphasis on deploying various technical
aspects of FEA such as Non Linear Geometry, Multipoint Constraint Contact Algorithm, Multizone
meshing .
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationIJMER
This paper aims to do modelling, simulation and performing the static analysis of a go
kart chassis consisting of Circular beams. Modelling, simulations and analysis are performed using 3-D
modelling software i.e. Solid Works and ANSYS according to the rulebook provided by Indian Society of
New Era Engineers (ISNEE) for National Go Kart Championship (NGKC-14).The maximum deflection is
determined by performing static analysis. Computed results are then compared to analytical calculation,
where it is found that the location of maximum deflection agrees well with theoretical approximation but
varies on magnitude aspect.
In récent year various vehicle introduced in market but due to limitation in
carbon émission and BS Séries limitd speed availability vehicle in the market and causing of
environnent pollution over few year There is need to decrease dependancy on fuel vehicle.
bicycle is to be modified for optional in the future To implement new technique using change in
pedal assembly and variable speed gearbox such as planetary gear optimise speed of vehicle
with variable speed ratio.To increase the efficiency of bicycle for confortable drive and to
reduce torque appli éd on bicycle. we introduced epicyclic gear box in which transmission done
throgh Chain Drive (i.e. Sprocket )to rear wheel with help of Epicyclical gear Box to give
number of différent Speed during driving.To reduce torque requirent in the cycle with change in
the pedal mechanism
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIJMER
This document discusses integrating the Spring, Struts, and Hibernate frameworks to develop enterprise applications. It provides an overview of each framework and their features. The Spring Framework is a lightweight, modular framework that allows for inversion of control and aspect-oriented programming. It can be used to develop any or all tiers of an application. The document proposes an architecture for an e-commerce website that integrates these three frameworks, with Spring handling the business layer, Struts the presentation layer, and Hibernate the data access layer. This modular approach allows for clear separation of concerns and reduces complexity in application development.
Microcontroller Based Automatic Sprinkler Irrigation SystemIJMER
Microcontroller based Automatic Sprinkler System is a new concept of using
intelligence power of embedded technology in the sprinkler irrigation work. Designed system replaces
the conventional manual work involved in sprinkler irrigation to automatic process. Using this system a
farmer is protected against adverse inhuman weather conditions, tedious work of changing over of
sprinkler water pipe lines & risk of accident due to high pressure in the water pipe line. Overall
sprinkler irrigation work is transformed in to a comfortableautomatic work. This system provides
flexibility & accuracy in respect of time set for the operation of a sprinkler water pipe lines. In present
work the author has designed and developed an automatic sprinkler irrigation system which is
controlled and monitored by a microcontroller interfaced with solenoid valves.
On some locally closed sets and spaces in Ideal Topological SpacesIJMER
This document introduces and studies the concept of δˆ s-locally closed sets in ideal topological spaces. Some key points:
- A subset A is δˆ s-locally closed if A can be written as the intersection of a δˆ s-open set and a δˆ s-closed set.
- Various properties of δˆ s-locally closed sets are introduced and characterized, including relationships to other concepts like generalized locally closed sets.
- It is shown that a subset A is δˆ s-locally closed if and only if A can be written as the intersection of a δˆ s-open set and the δˆ s-closure of A.
- Theore
Intrusion Detection and Forensics based on decision tree and Association rule...IJMER
This paper present an approach based on the combination of, two techniques using
decision tree and Association rule mining for Probe attack detection. This approach proves to be
better than the traditional approach of generating rules for fuzzy expert system by clustering methods.
Association rule mining for selecting the best attributes together and decision tree for identifying the
best parameters together to create the rules for fuzzy expert system. After that rules for fuzzy expert
system are generated using association rule mining and decision trees. Decision trees is generated for
dataset and to find the basic parameters for creating the membership functions of fuzzy inference
system. Membership functions are generated for the probe attack. Based on these rules we have
created the fuzzy inference system that is used as an input to neuro-fuzzy system. Fuzzy inference
system is loaded to neuro-fuzzy toolbox as an input and the final ANFIS structure is generated for
outcome of neuro-fuzzy approach. The experiments and evaluations of the proposed method were
done with NSL-KDD intrusion detection dataset. As the experimental results, the proposed approach
based on the combination of, two techniques using decision tree and Association rule mining
efficiently detected probe attacks. Experimental results shows better results for detecting intrusions as
compared to others existing methods
Natural Language Ambiguity and its Effect on Machine LearningIJMER
This document discusses natural language ambiguity and its effect on machine learning. It begins by introducing different types of ambiguity that exist in natural languages, including lexical, syntactic, semantic, discourse, and pragmatic ambiguities. It then examines how these ambiguities present challenges for computational linguistics and machine translation systems. Specifically, it notes that ambiguity is a major problem for computers in processing human language as they lack the world knowledge and context that humans use to resolve ambiguities. The document concludes by outlining the typical process of machine translation and how ambiguities can interfere with tasks like analysis, transfer, and generation of text in the target language.
Today in era of software industry there is no perfect software framework available for
analysis and software development. Currently there are enormous number of software development
process exists which can be implemented to stabilize the process of developing a software system. But no
perfect system is recognized till yet which can help software developers for opting of best software
development process. This paper present the framework of skillful system combined with Likert scale. With
the help of Likert scale we define a rule based model and delegate some mass score to every process and
develop one tool name as MuxSet which will help the software developers to select an appropriate
development process that may enhance the probability of system success.
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersIJMER
The present study investigates the creep in a thick-walled composite cylinders made
up of aluminum/aluminum alloy matrix and reinforced with silicon carbide particles. The distribution
of SiCp is assumed to be either uniform or decreasing linearly from the inner to the outer radius of
the cylinder. The creep behavior of the cylinder has been described by threshold stress based creep
law with a stress exponent of 5. The composite cylinders are subjected to internal pressure which is
applied gradually and steady state condition of stress is assumed. The creep parameters required to
be used in creep law, are extracted by conducting regression analysis on the available experimental
results. The mathematical models have been developed to describe steady state creep in the composite
cylinder by using von-Mises criterion. Regression analysis is used to obtain the creep parameters
required in the study. The basic equilibrium equation of the cylinder and other constitutive equations
have been solved to obtain creep stresses in the cylinder. The effect of varying particle size, particle
content and temperature on the stresses in the composite cylinder has been analyzed. The study
revealed that the stress distributions in the cylinder do not vary significantly for various combinations
of particle size, particle content and operating temperature except for slight variation observed for
varying particle content. Functionally Graded Materials (FGMs) emerged and led to the development
of superior heat resistant materials.
Energy Audit is the systematic process for finding out the energy conservation
opportunities in industrial processes. The project carried out studies on various energy conservation
measures application in areas like lighting, motors, compressors, transformer, ventilation system etc.
In this investigation, studied the technical aspects of the various measures along with its cost benefit
analysis.
Investigation found that major areas of energy conservation are-
1. Energy efficient lighting schemes.
2. Use of electronic ballast instead of copper ballast.
3. Use of wind ventilators for ventilation.
4. Use of VFD for compressor.
5. Transparent roofing sheets to reduce energy consumption.
So Energy Audit is the only perfect & analyzed way of meeting the Industrial Energy Conservation.
An Implementation of I2C Slave Interface using Verilog HDLIJMER
This document describes the implementation of an I2C slave interface using Verilog HDL. It introduces the I2C protocol which uses only two bidirectional lines (SDA and SCL) for communication. The document discusses the I2C protocol specifications including start/stop conditions, addressing, read/write operations, and acknowledgements. It then provides details on designing an I2C slave module in Verilog that responds to commands from an I2C master and allows synchronization through clock stretching. The module is simulated in ModelSim and synthesized in Xilinx. Simulation waveforms demonstrate successful read and write operations to the slave device.
Discrete Model of Two Predators competing for One PreyIJMER
This paper investigates the dynamical behavior of a discrete model of one prey two
predator systems. The equilibrium points and their stability are analyzed. Time series plots are obtained
for different sets of parameter values. Also bifurcation diagrams are plotted to show dynamical behavior
of the system in selected range of growth parameter
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSIJNSA Journal
The smart irrigation system represents an innovative approach to optimize water usage in agricultural and landscaping practices. The integration of cutting-edge technologies, including sensors, actuators, and data analysis, empowers this system to provide accurate monitoring and control of irrigation processes by leveraging real-time environmental conditions. The main objective of a smart irrigation system is to optimize water efficiency, minimize expenses, and foster the adoption of sustainable water management methods. This paper conducts a systematic risk assessment by exploring the key components/assets and their functionalities in the smart irrigation system. The crucial role of sensors in gathering data on soil moisture, weather patterns, and plant well-being is emphasized in this system. These sensors enable intelligent decision-making in irrigation scheduling and water distribution, leading to enhanced water efficiency and sustainable water management practices. Actuators enable automated control of irrigation devices, ensuring precise and targeted water delivery to plants. Additionally, the paper addresses the potential threat and vulnerabilities associated with smart irrigation systems. It discusses limitations of the system, such as power constraints and computational capabilities, and calculates the potential security risks. The paper suggests possible risk treatment methods for effective secure system operation. In conclusion, the paper emphasizes the significant benefits of implementing smart irrigation systems, including improved water conservation, increased crop yield, and reduced environmental impact. Additionally, based on the security analysis conducted, the paper recommends the implementation of countermeasures and security approaches to address vulnerabilities and ensure the integrity and reliability of the system. By incorporating these measures, smart irrigation technology can revolutionize water management practices in agriculture, promoting sustainability, resource efficiency, and safeguarding against potential security threats.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
BER Performance for Convalutional Code with Soft & Hard Viterbi Decoding
1. International
OPEN ACCESS Journal
Of Modern Engineering Research (IJMER)
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss.7| July. 2014 | 24|
BER Performance for Convalutional Code with Soft & Hard Viterbi Decoding Umesh Kumar Pandey1, Prashant Purohit2 1MTECH Schooler, RITS, Bhopal 2HOD, Dept. of EC, RITS, Bhopal
I. INTRODUCTION In recent years, there has been an increasing demand for efficient and reliable digital data transmission and storage systems. This demand has been accelerated by the emergence of large-scale, high-speed data networks for the exchange, processing, and storage of digital information in the military, governmental, and private spheres. The two key system parameters available to the designer are transmitted signal power and channel bandwidth. These two parameters, together with the power spectral density of receiver noise, determine the signal energy per bit-to-noise power spectral density ratio E b/ N o. This ratio uniquely determines the bit error rate for a particular modulation scheme [1]. Practical considerations usually place a limit on the value that we can assign to E b/ N o. Accordingly, in practice, one can often arrive at a modulation scheme and find that it is not possible to provide acceptable data quality (i.e., low enough error performance). For a fixed E b/ N o, the only practical a prescribed rule, thereby producing encoded data at a higher bit rate. The channel decoder in the receiver exploits the redundancy to decide which message bits were actually transmitted. The combined goal of the channel encoder and decoder is to minimize the effect of channel noise. That is, the number of errors between the channel encoder input (derived from the source) and the channel decoder output (delivered to the user) are minimized. There are many error-correcting codes, with roots in diverse mathematical disciplines that are used. Historically, these codes have been classified into block codes and convolutional codes. The distinguishing feature for this particular classification is the presence or absence of memory in the encoders for the two coding systems Fig. 1 Simplified models of digital communication system (a) Coding and modulation performed separately. (b) Coding and modulation combined
Abstract: Viterbi decoding has a fixed decoding time. It is well suited to hardware decoder. Hear we proposed Viterbi algorithm with Decoding rate 1/3. Which dynamically improve performance of the channel.
Keywords: Convolution code, Sova Decoder, Viterbi Decoding, soft & hard viterbi decoding, AWGN channel.
2. BER Performance for Convalutional Code with Soft & Hard Viterbi Decoding
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss.7| July. 2014 | 25|
These Viterbi Decoding has the advantage that it has a fixed decoding time but its computational requirement grow exponentially as a function of the constraint length, so it is usually limitation in practice to constrain lengths of V=9 or less. Convolution code with 1/3 Coding Rate in BPSK and AWGN channel.
II. VITERBI ALGORITHM Viterbi Decoing was developed by Andrew j. Viterbi in 1967 and in the late 1970’s become the dominant technique for convolutional codes.The Viterbi algorithm is a dynamic programming algorith m for finding the most likely sequence of hidden states – called the Viterbi path – that results in a sequence of observed events, especially in the context of Markov information sources and hidden Markov models. The terms Viterbi path and Viterbi algorithm are also applied to related dynamic programming algorithms that discover the single most likely explanation for an observation. For example, in statistical parsing a dynamic programming algorithm can be used to discover the single most likely context-free derivation (parse) of a string, which is sometimes called the Viterbi parse. Fig. 2 : Trellis for the convolutional encoder
III. PROBLEM FORMULATION
With Viterbi Decoding the following advantage like:-
1) A highly satisfactory bit error performance
2) High speed of operation
3) Ease of implementation
4) Low cost
Most of all parameter I have tried to cover in given simulation. Simulation Setup The simulation setup is composed of three distinct parts, namely the encoder, the channel, and the decoder. The simulated convolutional encoder is use modulo-2 adder and shift register or constraint length (K) with code memory, of size m. In the sim- ulation, the Additive White Gaussian Noise (AWGN) channel is used and Viterbi decoder is used as convolutional decoder for hard decision as well as soft decision Fig. 3 : Fundamental turbo code encoder Second, the simulation for the Turbo code encoder is composed of two identical RSC component encoders. These two component encoders are separated by a random in- terleaver. The random interleaver is a permutation of bit order in a bit stream. This permutation of bit order is stored so that the interleaved bit stream can be deinterleaved at the decoder. The output of the turbo code encoder is described by three streams, one systematic (uncoded) bit stream and two coded bit streams (parity bits), and SOVA decoder.
3. BER Performance for Convalutional Code with Soft & Hard Viterbi Decoding
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss.7| July. 2014 | 26|
Fig. 4 RSC encoder
However, in many journal papers, the published computer simulations of above codes often use rate 1/2
,1/3,2/3 and 3/4. This is accomplished by puncturing the coded bit streams of the above code
.
Comparison Table-
E b/No
(dB)
Uncoded
(BER)
BPSK
(BER)
BER improved
over Uncoded
1.5 4.46 x 10-2 4 x 10-2 13.8 %
2.5 2.9 x 10-2 6.1 x 10-2 79.46 %
3.5 1.7 x 10-2 3.1 x 10-2 98.16 %
Table 1. Result of convolutional code with BPSK modulation
E b/No
(dB)
Uncoded
(BER)
8-PSK
(BER)
BER improved
over Uncoded
6 2.05 x 10-2 1.08 x 10-2 47.11 %
7 1.2 x 10-2 1.6 x 10-3 86.34 %
8 6.2 x 10-3 1.16 x 10-4 98.11 %
Table 2. Result for Rate- 1/3 soft decision convolutional code
IV. SIMULATON RESULT
Simulation results for a convolutional code are based on bit error rate (BER) performance over a range
of E b/ N o. The BER is simply the ratio of incorrect data bits divided by the total number of data bits
transmitted. The SNR is computed by di-viding the energy per received data bit Eb by the single-sided noise
spectral density no of the channel. For simulation rate 1/3,2/3 and 1/2 convolutional codes and turbo
codes rates using two RSC encoder and interleaver is used.
First, the simulation results are shown for convolutional code using different modulation technique (BPSK,
QPSK and 8-PSK) with rate 1/2 and different rate (using one modulation technique (BPSK) in AWGN
channel. The simulation is carried out on the basis of BER improvement over uncoded BER given by equation:
BER uncoded – BER coded
___________________________________ 100%
BER uncoded
Second, the performance of rate turbo code encoder is shown with RSC encoder and SOVA
decoder
Fig. 5 Convolutional code with Different Coding Rate in BPSK and AWGN channel
4. BER Performance for Convalutional Code with Soft & Hard Viterbi Decoding
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss.7| July. 2014 | 27|
V. CONCLUSION
After simulation it is showing that Decoding rate performance best with BPSK. simulations of the convolution codes has been carried out in the MATLAB. Viterbi Decoding is very powerful algorithm for AWGN channel.
REFERENCES
[1] J. Hagenauer. “ Source-controlled channel decoding.” IEEE Trans. Commun., vol.43, pp. 2449-2457, 1995. [2] K. M. S. Soyjaudah and M. T. Russool. “Comparative study of turbo codes in awgn channel using map and sova decoding”. Department of Electrical and Electronic Engineering, University of Mauritius.2009 [3] S. Lin J. Chen, M. P. Fossorier and C. Xu. “Bi-directional sova decoding for turbocodes”.IEEE Commun. Lett., vol. 4, no. 12, pp. 405-408, 2000. [4] Lutz Papke, Patrick Robertson, “Improved Decoding with the SOVA in a Parallel Concatenated (Turbo-code) Scheme”. France Telecom, CNET, 38-40 Ave. du General Le Clerc, F-92131 Issy-Les-Moulineaux, France Bhaskaracharya Inst for Space App/Geo-Informatics,2010 [5] M. K. Gupta, Vishwas Sharma, “To Improve Bit Error Rate Of Turbo Coded Ofdm Transmisalgorithm with soft- decision outputs and its applications. in Proc., IEEE Globecom Conj, pp. 1680-1686, 1989. [7] Claude Berrou. “ A low complexity soft-output viterbi decoder architecture.” IEEE Trans. Commun., pp. 737-745, 1996.