This document summarizes an iterative network-channel decoding scheme for cooperative space-time transmission with network coding. The scheme uses convolutional codes as network codes at the relay node and Reed-Solomon codes as channel codes at the user nodes. An iterative joint network-channel decoder exchanges soft information between convolutional code-based network decoder and Reed-Solomon code-based channel decoders. Extrinsic information transfer analysis is performed to investigate the convergence properties of the proposed iterative decoder.
Performances Concatenated LDPC based STBC-OFDM System and MRC Receivers IJECEIAES
This paper presents the bit error rate performance of the low density parity check (LDPC) with the concatenation of convolutional channel coding based orthogonal frequency-division-multiplexing (OFDM) using space time block coded (STBC). The OFDM wireless communication system incorporates 3/4rated convolutional encoder under various digital modulations (BPSK, QPSK and QAM) over an additative white gaussian noise (AWGN) and fading (Raleigh and Rician) channels. At the receiving section of the simulated system, Maximum Ratio combining (MRC) channel equalization technique has been implemented to extract transmitted symbols without enhancing noise power.
In recent years, cooperative communication is a hot topic of research and it is a powerful physical layer
technique to combat fading in wireless relaying scenario. Concerning with the physical layer issues, in this
paper it is focussed on with providing a better space time block coding (STBC) scheme and incorporating it
in the cooperative relaying nodes to upgrade the system performance. Recently, the golden codes have
proven to exhibit a superior performance in a wireless MIMO (Multiple Input Multiple Output) scenario
than any other code. However, a serious limitation associated with it is its increased decoding complexity.
This paper attempts to resolve this challenge through suitable modification of golden code such that a less
complex sphere decoder could be used without much compromising the error rates. The decoder complexity
is analyzed through simulation and it proves to exhibit less complexity compared to the conventional
(Maximum likelihood) ML decoder. The single relay cooperative STBC consisting of source, relay and
destination are considered. The cooperative protocol strategy considered in the relay node is Decode and
forward (DF) protocol. The proposed modified golden code with less complex sphere decoder is
implemented in the nodes of the cooperative relaying system to achieve better performance in the system.
The simulation results have validated the effectiveness of the proposed scheme by offering better BER
performance, minimum outage probability and increased spectral efficiency compared to the non
cooperative transmission method.
Implementation of Joint Network Channel Decoding Algorithm for Multiple Acces...csandit
In this paper, we consider a Joint Network Channel Decoding (JNCD) algorithm applied to a
wireless network consisting to M users. For this purpose M sources desire to send information
to one receiver by the help of an intermediate node which is the relay. The Physical Layer
Network Coding (PLNC) allows the relay to decode the combined information being sent from
different transmitters. Then, it forwards additional information to the destination node which
receives also signals from source nodes. An iterative JNCD algorithm is developed at the
receiver to estimate the information being sent from each transmitter. Simulation results show
that the Bit Error Rate (BER) can be decreased by using this concept comparing to the
reference one which doesn’t consider the network coding.
SECURED TEXT MESSAGE TRANSMISSION IN PRE -CHANNEL EQUALIZATION BASED MIMO- OF...IJNSA Journal
In this paper, we made a comprehensive performance evaluative study of a secured MIMO Orthogonal Frequency-Division Multiplexing wireless communication system with implementation of two pre channel equalization techniques such as Pre-Minimum Mean Square Error (Pre-MMSE) and Pre-Zero
Forcing(Pre-ZF) under QPSK and QAM digital modulations. The simulated system deploys three channel coding techniques(1/2-rated Convolutional, CRC and BCH). In the present simulated system, text message transmission has been secured with concatenated implementation of Electronic Codebook (ECB)
and Cipher Feedback(CFB) cryptographic algorithm. It is remarked from simulation results that the MIMO OFDM system outperforms with pre-ZF channel equalization,QAM digital modulation and BCH channel coding schemes under fading channels(AWGN and Raleigh).In Pre-MMSE/pre-ZF channel
equalization scheme, the system shows comparatively worst performance in convolutional channel coding scheme with QAM/QPSK digital modulation. With increase in noise power as compared to signal power, the system is found to have shown performance deterioration
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...csandit
Mobile Ad Hoc networks (MANETs) are gaining increased interest due to their wide range of
potential applications in civilian and military sectors. The self-control, self-organization,
topology dynamism, and bandwidth limitation of the wireless communication channel make
implementation of MANETs a challenging task. The Connected Dominating Set (CDS) has been
proposed to facilitate MANETs realization. Minimizing the CDS size has several advantages;
however, this minimization is NP complete problem; therefore, approximation algorithms are
used to tackle this problem. The fastest CDS creation algorithm is Wu and Li algorithm;
however, it generates a relatively high signaling overhead. Utilizing the location information of
network members reduces the signaling overhead of Wu and Li algorithm. In this paper, we
compare the performance of Wu and Li algorithm with its Location-Information-Based version
under two types of Medium Access Control protocols, and several network sizes. The MAC
protocols used are: a virtual ideal MAC protocol, and the IEEE 802.11 MAC protocol. The use
of a virtual ideal MAC enables us to investigate how the real-world performance of these
algorithms deviates from their ideal-conditions counterpart. The simulator used in this research
is the ns-2 network simulator.
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...IJERA Editor
Network Coding is most promising aspect of WSN. This Network Coding method is combined with multipath routing protocol to form NCMR protocol.(network coding based multipath routing protocol).This protocol is used to obtain energy efficient wireless sensor network.. These protocol leads to decrease the number of constrain routes & the total time of transmission. This protocol is applied on unicast and multicast network separately. And comparison is done with traditional multipath routing protocol for same unicast and multicast network. Simulation result shows energy consumption of NCMR multicast is lower than NCMR unicast and also than TMR unicast as well as multicast. This work is proved by the simulation analysis results. The used multipath model is based on braided multipath routing, and the network coding method is random linear network coding (practical network coding). In braided network multiple paths to the sink nodes are created for each source node, and the packets encoded at source nodes are transmitted through the braided multipath network model. Then, intermediate nodes re-encode these received packets and transfer these new packets to next cluster. Finally, the multiple sink nodes decode the packets received from different paths and recover the original data. Results of the analysis show that multicast NCMR provides more reliability. We compare multicast NCMR routing protocol with NCMR unicast & also with traditional multipath routing protocol for unicast and multicast networks, in terms of the packet loss, energy consumption, successful delivery ratio & end to end delay when a packet is transmitted Some special simulations are carried out specially for NCMR multicast i.e. effect of number of nodes on energy consumption, packet loss & end to end delay.
Performances Concatenated LDPC based STBC-OFDM System and MRC Receivers IJECEIAES
This paper presents the bit error rate performance of the low density parity check (LDPC) with the concatenation of convolutional channel coding based orthogonal frequency-division-multiplexing (OFDM) using space time block coded (STBC). The OFDM wireless communication system incorporates 3/4rated convolutional encoder under various digital modulations (BPSK, QPSK and QAM) over an additative white gaussian noise (AWGN) and fading (Raleigh and Rician) channels. At the receiving section of the simulated system, Maximum Ratio combining (MRC) channel equalization technique has been implemented to extract transmitted symbols without enhancing noise power.
In recent years, cooperative communication is a hot topic of research and it is a powerful physical layer
technique to combat fading in wireless relaying scenario. Concerning with the physical layer issues, in this
paper it is focussed on with providing a better space time block coding (STBC) scheme and incorporating it
in the cooperative relaying nodes to upgrade the system performance. Recently, the golden codes have
proven to exhibit a superior performance in a wireless MIMO (Multiple Input Multiple Output) scenario
than any other code. However, a serious limitation associated with it is its increased decoding complexity.
This paper attempts to resolve this challenge through suitable modification of golden code such that a less
complex sphere decoder could be used without much compromising the error rates. The decoder complexity
is analyzed through simulation and it proves to exhibit less complexity compared to the conventional
(Maximum likelihood) ML decoder. The single relay cooperative STBC consisting of source, relay and
destination are considered. The cooperative protocol strategy considered in the relay node is Decode and
forward (DF) protocol. The proposed modified golden code with less complex sphere decoder is
implemented in the nodes of the cooperative relaying system to achieve better performance in the system.
The simulation results have validated the effectiveness of the proposed scheme by offering better BER
performance, minimum outage probability and increased spectral efficiency compared to the non
cooperative transmission method.
Implementation of Joint Network Channel Decoding Algorithm for Multiple Acces...csandit
In this paper, we consider a Joint Network Channel Decoding (JNCD) algorithm applied to a
wireless network consisting to M users. For this purpose M sources desire to send information
to one receiver by the help of an intermediate node which is the relay. The Physical Layer
Network Coding (PLNC) allows the relay to decode the combined information being sent from
different transmitters. Then, it forwards additional information to the destination node which
receives also signals from source nodes. An iterative JNCD algorithm is developed at the
receiver to estimate the information being sent from each transmitter. Simulation results show
that the Bit Error Rate (BER) can be decreased by using this concept comparing to the
reference one which doesn’t consider the network coding.
SECURED TEXT MESSAGE TRANSMISSION IN PRE -CHANNEL EQUALIZATION BASED MIMO- OF...IJNSA Journal
In this paper, we made a comprehensive performance evaluative study of a secured MIMO Orthogonal Frequency-Division Multiplexing wireless communication system with implementation of two pre channel equalization techniques such as Pre-Minimum Mean Square Error (Pre-MMSE) and Pre-Zero
Forcing(Pre-ZF) under QPSK and QAM digital modulations. The simulated system deploys three channel coding techniques(1/2-rated Convolutional, CRC and BCH). In the present simulated system, text message transmission has been secured with concatenated implementation of Electronic Codebook (ECB)
and Cipher Feedback(CFB) cryptographic algorithm. It is remarked from simulation results that the MIMO OFDM system outperforms with pre-ZF channel equalization,QAM digital modulation and BCH channel coding schemes under fading channels(AWGN and Raleigh).In Pre-MMSE/pre-ZF channel
equalization scheme, the system shows comparatively worst performance in convolutional channel coding scheme with QAM/QPSK digital modulation. With increase in noise power as compared to signal power, the system is found to have shown performance deterioration
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...csandit
Mobile Ad Hoc networks (MANETs) are gaining increased interest due to their wide range of
potential applications in civilian and military sectors. The self-control, self-organization,
topology dynamism, and bandwidth limitation of the wireless communication channel make
implementation of MANETs a challenging task. The Connected Dominating Set (CDS) has been
proposed to facilitate MANETs realization. Minimizing the CDS size has several advantages;
however, this minimization is NP complete problem; therefore, approximation algorithms are
used to tackle this problem. The fastest CDS creation algorithm is Wu and Li algorithm;
however, it generates a relatively high signaling overhead. Utilizing the location information of
network members reduces the signaling overhead of Wu and Li algorithm. In this paper, we
compare the performance of Wu and Li algorithm with its Location-Information-Based version
under two types of Medium Access Control protocols, and several network sizes. The MAC
protocols used are: a virtual ideal MAC protocol, and the IEEE 802.11 MAC protocol. The use
of a virtual ideal MAC enables us to investigate how the real-world performance of these
algorithms deviates from their ideal-conditions counterpart. The simulator used in this research
is the ns-2 network simulator.
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...IJERA Editor
Network Coding is most promising aspect of WSN. This Network Coding method is combined with multipath routing protocol to form NCMR protocol.(network coding based multipath routing protocol).This protocol is used to obtain energy efficient wireless sensor network.. These protocol leads to decrease the number of constrain routes & the total time of transmission. This protocol is applied on unicast and multicast network separately. And comparison is done with traditional multipath routing protocol for same unicast and multicast network. Simulation result shows energy consumption of NCMR multicast is lower than NCMR unicast and also than TMR unicast as well as multicast. This work is proved by the simulation analysis results. The used multipath model is based on braided multipath routing, and the network coding method is random linear network coding (practical network coding). In braided network multiple paths to the sink nodes are created for each source node, and the packets encoded at source nodes are transmitted through the braided multipath network model. Then, intermediate nodes re-encode these received packets and transfer these new packets to next cluster. Finally, the multiple sink nodes decode the packets received from different paths and recover the original data. Results of the analysis show that multicast NCMR provides more reliability. We compare multicast NCMR routing protocol with NCMR unicast & also with traditional multipath routing protocol for unicast and multicast networks, in terms of the packet loss, energy consumption, successful delivery ratio & end to end delay when a packet is transmitted Some special simulations are carried out specially for NCMR multicast i.e. effect of number of nodes on energy consumption, packet loss & end to end delay.
Study of the operational SNR while constructing polar codes IJECEIAES
Channel coding is commonly based on protecting information to be communicated across an unreliable medium, by adding patterns of redundancy into the transmission path. Also referred to as forward error control coding (FECC), the technique is widely used to enable correcting or at least detecting bit errors in digital communication systems. In this paper we study an original FECC known as polar coding which has proven to meet the typical use cases of the next generation mobile standard. This work is motivated by the suitability of polar codes for the new coming wireless era. Hence, we investigate the performance of polar codes in terms of bit error rate (BER) for several codeword lengths and code rates. We first perform a discrete search to find the best operational signal-to-noise ratio (SNR) at two different code rates, while varying the blocklength. We find in our extensive simulations that the BER becomes more sensitive to operational SNR (OSNR) as long as we increase the blocklength and code rate. Finally, we note that increasing blocklength achieves an SNR gain, while increasing code rate changes the OSNR domain. This trade-off sorted out must be taken into consideration while designing polar codes for high-throughput application.
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...ijistjournal
The aim of this paper is to analyze the bit error rate (BER) performance of WiMAX physical layer with the implementation of different concatenated channel coding schemes under QAM and 16QAM digital modulations over realistic channel conditions (i.e. noise and multipath fading). In concatenated channel coding, the WiMAX system incorporates CRC-CC (Cyclic Redundancy Check and Convolutional) or RSCC (Reed-Solomon and Convolutional) encoder over an additative white gaussian noise (AWGN) and other multipath fading (Raleigh and Rician) channels. A segment of synthetic data is used for the analysis. Computer simulation results based on BER and signal to noise ratio (SNR) demonstrate that the performance of concatenated CRC-CC coded WiMAX system under QAM modulation is better as compared to RS-CC coded system over noisy and fading environments.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Outage and throughput performance of cognitive radio based power domain based...TELKOMNIKA JOURNAL
This paper considers power domain based multiple access (PDMA) in cognitive radio network to serve numerous users who intend to multiple access to core network. In particular, we investigate the effect of signal combination scheme equipped at PDMA end-users as existence of direct link and relay link. This system model using relay scheme provides performance improvement on the outage probability of two PDMA end-users. We first propose a simple scheme of fixed power allocation to PDMA users who exhibit performance gap and fairness. Inspired by PDMA strategy, we then find signal to noise ratio (SNR) to detect separated signal for each user. In addition, the exact expressions of outage probability are derived in assumption that receiver can cancel out the interference completely with successive interference cancellation (SIC). By exploiting theoretical and simulation results, both considered combination schemes (Maximal Ratio Combining (MRC) and Selection Combining (SC) can achieve improved performance of two PDMA users significantly.
In a network, one-to-all broadcasting is the process of disseminating messages from a source node to all the nodes existing in the network through successive data transmissions between pairs of nodes. Broadcasting is the most primary communication process in a network. In this paper, we study on multiport wormhole-routed multicomputers where nodes are able to send multiple messages into the network at a
time. We propose efficient broadcast algorithms in multi-port wormhole-routed multicomputers which are characterized by 3D mesh topology. The proposed algorithm Three-Dimension Broadcast Layers (3-DBl) is designed such that can send messages to destinations within two start-up communication phases for each 2-D mesh. The second proposed algorithm Three-Dimension Broadcast Surfaces (3-DBS) is designed such that can send messages to destinations within six start-up communication phases. The performance study in
this paper clearly shows the advantage of the proposed algorithm.
PERFORMANCE OF ITERATIVE LDPC-BASED SPACE-TIME TRELLIS CODED MIMO-OFDM SYSTEM...ijcseit
This paper presents the bit error rate (BER) performance of the low density parity check (LDPC) based
space-time trellis coded 2×2 multiple-input multiple-output orthogonal frequency-division multiplexing
(STTC-MIMO-OFDM) system on text message transmission. The system under investigation incorporates
1/2-rated LDPC encoding scheme under various digital modulations (BPSK, QPSK and QAM) over an
additative white gaussian noise (AWGN) and other fading (Raleigh and Rician) channels for two transmit
and two receive antennas. At the receiving section of the simulated system, Minimum Mean-Square-Error
(MMSE) channel equalization technique has been implemented to extract transmitted symbols without
enhancing noise power level. The effectiveness of the proposed system is analyzed in terms of BER with
signal-to-noise ratio (SNR). It is observable from the Matlab based simulation study that the proposed
system outperforms with BPSK as compared to other digital modulation schemes at relatively low SNRs
under AWGN, Rayleigh and Rician fading channels. The transmitted text message is found to have
retrieved effectively at the receiver under implementation of iterative sum-product LDPC decoding
algorithm. It has also been anticipated that the performance of the LDPC-based STTC-MIMO-OFDM
system degrades with the increase of noise power.
Network-on-Chip (NoC) is a new approach for designing the communication subsystem among IP cores in a System-on-Chip (SoC). NoC applies networking theory and related methods to on-chip communication and brings out notable improvements over conventional bus and crossbar interconnections. NoC offers a great improvement over the issues like scalability, productivity, power efficiency and signal integrity challenges of complex SoC design. In an NoC, the communication among different nodes is achieved by routing packets through a pre-designed network fabric according to some routing algorithm. Therefore, architecture and related routing algorithm play an important role to the improvement of overall performance of an NoC. A Diametrical 2D Mesh routing architecture has the facility of having some additional diagonal links with simple 2D Mesh architecture. In this work, we have proposed a Modified Extended 2D routing algorithm for this architecture, which will ensure that a packet always reaches the destination through the possible shortest path, and the path is always deadlock free.
La biología (del griego «βίος» bíos, vida, y «-λογία» -logía, tratado, estudio, ciencia) es la ciencia que tiene como objeto de estudio a los seres vivos y, más específicamente, su origen, su evolución y sus propiedades: nutrición, morfogénesis, reproducción, patogenia, etc. Se ocupa tanto de la descripción de las características y los comportamientos de los organismos individuales, como de las especies en su conjunto, así como de la reproducción de los seres vivos y de las interacciones entre ellos y el entorno. De este modo, trata de estudiar la estructura y la dinámica funcional comunes a todos los seres vivos, con el fin de establecer las leyes generales que rigen la vida orgánica y los principios explicativos fundamentales de esta.
La biología (del griego «βίος» bíos, vida, y «-λογία» -logía, tratado, estudio, ciencia) es la ciencia que tiene como objeto de estudio a los seres vivos y, más específicamente, su origen, su evolución y sus propiedades: nutrición, morfogénesis, reproducción, patogenia, etc. Se ocupa tanto de la descripción de las características y los comportamientos de los organismos individuales, como de las especies en su conjunto, así como de la reproducción de los seres vivos y de las interacciones entre ellos y el entorno. De este modo, trata de estudiar la estructura y la dinámica funcional comunes a todos los seres vivos, con el fin de establecer las leyes generales que rigen la vida orgánica y los principios explicativos fundamentales de esta.
La biología (del griego «βίος» bíos, vida, y «-λογία» -logía, tratado, estudio, ciencia) es la ciencia que tiene como objeto de estudio a los seres vivos y, más específicamente, su origen, su evolución y sus propiedades: nutrición, morfogénesis, reproducción, patogenia, etc. Se ocupa tanto de la descripción de las características y los comportamientos de los organismos individuales, como de las especies en su conjunto, así como de la reproducción de los seres vivos y de las interacciones entre ellos y el entorno. De este modo, trata de estudiar la estructura y la dinámica funcional comunes a todos los seres vivos, con el fin de establecer las leyes generales que rigen la vida orgánica y los principios explicativos fundamentales de esta.
La biología (del griego «βίος» bíos, vida, y «-λογία» -logía, tratado, estudio, ciencia) es la ciencia que tiene como objeto de estudio a los seres vivos y, más específicamente, su origen, su evolución y sus propiedades: nutrición, morfogénesis, reproducción, patogenia, etc. Se ocupa tanto de la descripción de las características y los comportamientos de los organismos individuales, como de las especies en su conjunto, así como de la reproducción de los seres vivos y de las interacciones entre ellos y el entorno. De este modo, trata de estudiar la estructura y la dinámica funcional comunes a todos los seres vivos, con el fin de establece
Wireless sensor networks (WSNs) are regularly deployed in harsh and unattended environments, and
sensor nodes are easily exposed to attacks due to the random arrangement of the sensor field. An attacker
can inject fabricated reports from a compromised node with false votes and false vote-based reports. The
false report attacks can waste the energy of the intermediate nodes, shortening the network lifetime.
Furthermore, false votes cause the filtering out of legitimate reports. A probabilistic voting-based filtering
scheme (PVFS) was proposed as a countermeasure against this type of attacks by Li and Wu. PVFS uses a
vote threshold, a security threshold, and a verification node. The scheme does not make additional use
energy or communications resources because the verification node and threshold values are fixed. There
needs to be a verification node selection method that considers the energy resources of the node. In this
paper, we propose a verification path election scheme based on a fuzzy logic system. In the proposed
scheme, one node transmits reports in the node with a strong state through a fuzzy logic system after which
a neighbor is selected out of two from the surroundings. Experimental results show that the proposed
scheme improves energy savings up to maximum 13% relative to the PVFS.
Study of the operational SNR while constructing polar codes IJECEIAES
Channel coding is commonly based on protecting information to be communicated across an unreliable medium, by adding patterns of redundancy into the transmission path. Also referred to as forward error control coding (FECC), the technique is widely used to enable correcting or at least detecting bit errors in digital communication systems. In this paper we study an original FECC known as polar coding which has proven to meet the typical use cases of the next generation mobile standard. This work is motivated by the suitability of polar codes for the new coming wireless era. Hence, we investigate the performance of polar codes in terms of bit error rate (BER) for several codeword lengths and code rates. We first perform a discrete search to find the best operational signal-to-noise ratio (SNR) at two different code rates, while varying the blocklength. We find in our extensive simulations that the BER becomes more sensitive to operational SNR (OSNR) as long as we increase the blocklength and code rate. Finally, we note that increasing blocklength achieves an SNR gain, while increasing code rate changes the OSNR domain. This trade-off sorted out must be taken into consideration while designing polar codes for high-throughput application.
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...ijistjournal
The aim of this paper is to analyze the bit error rate (BER) performance of WiMAX physical layer with the implementation of different concatenated channel coding schemes under QAM and 16QAM digital modulations over realistic channel conditions (i.e. noise and multipath fading). In concatenated channel coding, the WiMAX system incorporates CRC-CC (Cyclic Redundancy Check and Convolutional) or RSCC (Reed-Solomon and Convolutional) encoder over an additative white gaussian noise (AWGN) and other multipath fading (Raleigh and Rician) channels. A segment of synthetic data is used for the analysis. Computer simulation results based on BER and signal to noise ratio (SNR) demonstrate that the performance of concatenated CRC-CC coded WiMAX system under QAM modulation is better as compared to RS-CC coded system over noisy and fading environments.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Outage and throughput performance of cognitive radio based power domain based...TELKOMNIKA JOURNAL
This paper considers power domain based multiple access (PDMA) in cognitive radio network to serve numerous users who intend to multiple access to core network. In particular, we investigate the effect of signal combination scheme equipped at PDMA end-users as existence of direct link and relay link. This system model using relay scheme provides performance improvement on the outage probability of two PDMA end-users. We first propose a simple scheme of fixed power allocation to PDMA users who exhibit performance gap and fairness. Inspired by PDMA strategy, we then find signal to noise ratio (SNR) to detect separated signal for each user. In addition, the exact expressions of outage probability are derived in assumption that receiver can cancel out the interference completely with successive interference cancellation (SIC). By exploiting theoretical and simulation results, both considered combination schemes (Maximal Ratio Combining (MRC) and Selection Combining (SC) can achieve improved performance of two PDMA users significantly.
In a network, one-to-all broadcasting is the process of disseminating messages from a source node to all the nodes existing in the network through successive data transmissions between pairs of nodes. Broadcasting is the most primary communication process in a network. In this paper, we study on multiport wormhole-routed multicomputers where nodes are able to send multiple messages into the network at a
time. We propose efficient broadcast algorithms in multi-port wormhole-routed multicomputers which are characterized by 3D mesh topology. The proposed algorithm Three-Dimension Broadcast Layers (3-DBl) is designed such that can send messages to destinations within two start-up communication phases for each 2-D mesh. The second proposed algorithm Three-Dimension Broadcast Surfaces (3-DBS) is designed such that can send messages to destinations within six start-up communication phases. The performance study in
this paper clearly shows the advantage of the proposed algorithm.
PERFORMANCE OF ITERATIVE LDPC-BASED SPACE-TIME TRELLIS CODED MIMO-OFDM SYSTEM...ijcseit
This paper presents the bit error rate (BER) performance of the low density parity check (LDPC) based
space-time trellis coded 2×2 multiple-input multiple-output orthogonal frequency-division multiplexing
(STTC-MIMO-OFDM) system on text message transmission. The system under investigation incorporates
1/2-rated LDPC encoding scheme under various digital modulations (BPSK, QPSK and QAM) over an
additative white gaussian noise (AWGN) and other fading (Raleigh and Rician) channels for two transmit
and two receive antennas. At the receiving section of the simulated system, Minimum Mean-Square-Error
(MMSE) channel equalization technique has been implemented to extract transmitted symbols without
enhancing noise power level. The effectiveness of the proposed system is analyzed in terms of BER with
signal-to-noise ratio (SNR). It is observable from the Matlab based simulation study that the proposed
system outperforms with BPSK as compared to other digital modulation schemes at relatively low SNRs
under AWGN, Rayleigh and Rician fading channels. The transmitted text message is found to have
retrieved effectively at the receiver under implementation of iterative sum-product LDPC decoding
algorithm. It has also been anticipated that the performance of the LDPC-based STTC-MIMO-OFDM
system degrades with the increase of noise power.
Network-on-Chip (NoC) is a new approach for designing the communication subsystem among IP cores in a System-on-Chip (SoC). NoC applies networking theory and related methods to on-chip communication and brings out notable improvements over conventional bus and crossbar interconnections. NoC offers a great improvement over the issues like scalability, productivity, power efficiency and signal integrity challenges of complex SoC design. In an NoC, the communication among different nodes is achieved by routing packets through a pre-designed network fabric according to some routing algorithm. Therefore, architecture and related routing algorithm play an important role to the improvement of overall performance of an NoC. A Diametrical 2D Mesh routing architecture has the facility of having some additional diagonal links with simple 2D Mesh architecture. In this work, we have proposed a Modified Extended 2D routing algorithm for this architecture, which will ensure that a packet always reaches the destination through the possible shortest path, and the path is always deadlock free.
La biología (del griego «βίος» bíos, vida, y «-λογία» -logía, tratado, estudio, ciencia) es la ciencia que tiene como objeto de estudio a los seres vivos y, más específicamente, su origen, su evolución y sus propiedades: nutrición, morfogénesis, reproducción, patogenia, etc. Se ocupa tanto de la descripción de las características y los comportamientos de los organismos individuales, como de las especies en su conjunto, así como de la reproducción de los seres vivos y de las interacciones entre ellos y el entorno. De este modo, trata de estudiar la estructura y la dinámica funcional comunes a todos los seres vivos, con el fin de establecer las leyes generales que rigen la vida orgánica y los principios explicativos fundamentales de esta.
La biología (del griego «βίος» bíos, vida, y «-λογία» -logía, tratado, estudio, ciencia) es la ciencia que tiene como objeto de estudio a los seres vivos y, más específicamente, su origen, su evolución y sus propiedades: nutrición, morfogénesis, reproducción, patogenia, etc. Se ocupa tanto de la descripción de las características y los comportamientos de los organismos individuales, como de las especies en su conjunto, así como de la reproducción de los seres vivos y de las interacciones entre ellos y el entorno. De este modo, trata de estudiar la estructura y la dinámica funcional comunes a todos los seres vivos, con el fin de establecer las leyes generales que rigen la vida orgánica y los principios explicativos fundamentales de esta.
La biología (del griego «βίος» bíos, vida, y «-λογία» -logía, tratado, estudio, ciencia) es la ciencia que tiene como objeto de estudio a los seres vivos y, más específicamente, su origen, su evolución y sus propiedades: nutrición, morfogénesis, reproducción, patogenia, etc. Se ocupa tanto de la descripción de las características y los comportamientos de los organismos individuales, como de las especies en su conjunto, así como de la reproducción de los seres vivos y de las interacciones entre ellos y el entorno. De este modo, trata de estudiar la estructura y la dinámica funcional comunes a todos los seres vivos, con el fin de establecer las leyes generales que rigen la vida orgánica y los principios explicativos fundamentales de esta.
La biología (del griego «βίος» bíos, vida, y «-λογία» -logía, tratado, estudio, ciencia) es la ciencia que tiene como objeto de estudio a los seres vivos y, más específicamente, su origen, su evolución y sus propiedades: nutrición, morfogénesis, reproducción, patogenia, etc. Se ocupa tanto de la descripción de las características y los comportamientos de los organismos individuales, como de las especies en su conjunto, así como de la reproducción de los seres vivos y de las interacciones entre ellos y el entorno. De este modo, trata de estudiar la estructura y la dinámica funcional comunes a todos los seres vivos, con el fin de establece
Wireless sensor networks (WSNs) are regularly deployed in harsh and unattended environments, and
sensor nodes are easily exposed to attacks due to the random arrangement of the sensor field. An attacker
can inject fabricated reports from a compromised node with false votes and false vote-based reports. The
false report attacks can waste the energy of the intermediate nodes, shortening the network lifetime.
Furthermore, false votes cause the filtering out of legitimate reports. A probabilistic voting-based filtering
scheme (PVFS) was proposed as a countermeasure against this type of attacks by Li and Wu. PVFS uses a
vote threshold, a security threshold, and a verification node. The scheme does not make additional use
energy or communications resources because the verification node and threshold values are fixed. There
needs to be a verification node selection method that considers the energy resources of the node. In this
paper, we propose a verification path election scheme based on a fuzzy logic system. In the proposed
scheme, one node transmits reports in the node with a strong state through a fuzzy logic system after which
a neighbor is selected out of two from the surroundings. Experimental results show that the proposed
scheme improves energy savings up to maximum 13% relative to the PVFS.
Artificial neural networks (ANN) consider classification as one of the most dynamic research and
application areas. ANN is the branch of Artificial Intelligence (AI). The neural network was trained by
back propagation algorithm. The different combinations of functions and its effect while using ANN as a
classifier is studied and the correctness of these functions are analyzed for various kinds of datasets. The
back propagation neural network (BPNN) can be used as a highly successful tool for dataset classification
with suitable combination of training, learning and transfer functions. When the maximum likelihood
method was compared with backpropagation neural network method, the BPNN was more accurate than
maximum likelihood method. A high predictive ability with stable and well functioning BPNN is possible.
Multilayer feed-forward neural network algorithm is also used for classification. However BPNN proves to
be more effective than other classification algorithms.
Wireless sensor networks provide ubiquitous computing systems in various open environments. In the
environment, sensor nodes can easily be compromised by adversaries to generate injecting false data
attacks. The injecting false data attack not only consumes unnecessary energy in en-route nodes, but also
causes false alarms at the base station. To detect this type of attack, a bandwidth-efficient cooperative
authentication (BECAN) scheme was proposed to achieve high filtering probability and high reliability
based on random graph characteristics and cooperative bit-compressed authentication techniques. This
scheme may waste energy resources in en-route nodes due to the fixed number of forwarding reports. In
this paper, our proposed method effectively selects a dynamic number of forwarding reports in the source
nodes based on an evaluation function. The experimental results indicate that our proposed method
enhances the energy savings while maintaining security levels as compared to BECAN.
A design pattern is a general solution to a commonly occurring problem in software design. It is a
template to solve a problem that can be used in many different situations. Patterns formalize best practices
that the programmer can use to solve common problems when designing an application or systems. In this
article we have focused our attention on it, how the proposed UML diagrams can be implemented in C#
language and whether it is possible to make the diagram implementation in the program code with the
greatest possible precision.
Conceptual framework of supply chain management information system for curri...ijmvsc
The objectives of this research are (1) to synthesize a conceptual framework of supply chain managementinformation
system (SCM-IS) for curriculum management based on Thailand Qualifications Framework
for Higher Education; and (2) to evaluate the conceptual framework of supply chain managementinformation
system (SCM-IS) for curriculum management based on Thailand Qualifications Framework
for Higher Education. The research sample totaling 10 experts consisted of five experts on supply chain
management, two experts on curriculum, and three experts on information technology. The employed
research instrument is a questionnaire. Statistics employed for data analysis are mean and standard
deviation.
In materials sciences, a large amount of research data is generated through a broad spectrum of different
experiments. As of today, experimental research data including meta-data in materials science is often
stored decentralized by the researcher(s) conducting the experiments without generally accepted standards
on what and how to store data. The conducted research and experiments often involve a considerable
investment from public funding agencies that desire the results to be made available in order to increase
their impact. In order to achieve the goal of citable and (openly) accessible materials science experimental
research data in the future, not only an adequate infrastructure needs to be established but the question of
how to measure the quality of the experimental research data also to be addressed. In this publication, the
authors identify requirements and challenges towards a systematic methodology to measure experimental
research data quality prior to publication and derive different approaches on that basis. These methods are
critically discussed and assessed by their contribution and limitations towards the set goals. Concluding, a
combination of selected methods is presented as a systematic, functional and practical quality measurement
and assurance approach for experimental research data in materials science with the goal of supporting
the accessibility and dissemination of existing data sets.
Evaluation of some private commercial banks in bangladesh from performance pe...ijmvsc
Banks operate on a huge scale at the heart of the modern economy and the banking system has become an
integral part in the progress of economic development in Bangladesh. Besides, the banking sector has
made their innovation and efficiency crucial to the economy as it competes in an e-commerce world. The
role of banking system in this situation cannot be denied at all. This report intends to evaluate the
performance of selected private commercial banks in Bangladesh. In the study, best efforts have been put
on evaluating the performance. The growing pattern of branches, employees, deposits, loans and
advances, classified loan, net income and earnings per share of selected private commercial banks has
been considered to make an analysis on the performance evaluation of the selected private commercial
banks. To evaluate the performance, data have been collected from the secondary sources. Then the
collected data have been analyzed. From the analysis, it has been found that all of the selected banks are
in a position to make a sustainable growth in respect of branches, employees, deposits, loans and
advances, classified loan, net income and earnings per share during the period of 2007-2011 with some
fluctuation. Besides the growth pattern, other forms of calculations have been used for every selected
variable and they are trend equation and square of correlation coefficient. Under trend equation analysis,
the variables named branches, employees, deposits and net incomes hold more positive value than the
other variables considered. As the value of the slope always shows the positive number, it is a clear
indication that Bangladesh has a very good prospect in case of private commercial banks
Criteria of selecting bank in pakistani banking sector study of banking custo...ijmvsc
This study is designed to evaluate the customer’s behavior towards the bank selection in Sahiwal Division,
Pakistan. Questionnaire is used as instrument to measure the bank selection criteria and distributed to 150
respondents of the nationalized (Bank of Punjab), privatized (United Bank Ltd.) and private bank (Bank
Alfalah Ltd.) in Sahiwal. Eight factors including 34 attributes on 5 point Likert scale were used to
determine the criteria of selecting bank. Frequency table of demographic variables, descriptive statistics
of 8 factors and one sample t-test for testing hypothesis are used by SPSS version 16.0 to analyze the
customer’s bank selection criteria. Eight hypotheses were developed from the literature out of which three
were found to be significant. These three factors are “convenience”, “quality of services” and “price and
cost”.
Jute is the 2nd most important fiber crop. its uses has been a great diversity. Here is a glance of such diversified uses and hence its potential importance in the economy.
In general Tobacco is always considered to be useful for its nicotine content. but there are far more important uses of it, such as in medicinal fields.
The stage of maturity is utmost important for the harvesting of any crop. and for horticultural and plantation crops, its like the very life of those crops
Every person will become successful, when he/she realizes the power within him/her self. He/she makes every move towards his/her goal that they want to achieve in life. He/she becomes a role model for many. Even ordinary work becomes something special for him/her
IMPLEMENTATION OF JOINT NETWORK CHANNEL DECODING ALGORITHM FOR MULTIPLE ACCES...cscpconf
In this paper, we consider a Joint Network Channel Decoding (JNCD) algorithm applied to a wireless network consisting to M users. For this purpose M sources desire to send information
to one receiver by the help of an intermediate node which is the relay. The Physical Layer Network Coding (PLNC) allows the relay to decode the combined information being sent from different transmitters. Then, it forwards additional information to the destination node which receives also signals from source nodes. An iterative JNCD algorithm is developed at the receiver to estimate the information being sent from each transmitter. Simulation results show that the Bit Error Rate (BER) can be decreased by using this concept comparing to the reference one which doesn’t consider the network coding.
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...eSAT Journals
Abstract The design of Multi Carrier Direct Sequence Code Division Multiple Access (MC-DS-CDMA) structure which generalizes serial and parallel concatenated code is investigated to this project. This model is ideal for designing various codes in the performance of both error floor and water floor region. We propose a concatenated code for transmitter block which is used for multi carrier direct sequence CDMA technique. Simulation results of MC-DS-CDMA uplink system using Cadence software shows the various parameters such as memory, Execution time and number of transient steps required for the Execution of MC-DS-CDMA uplink system was estimated and also power consumed was determined for each block in the transmitter. An improved concatenated code model is used for uplink mobile communication. Further system performance improvements can be obtained by concatenating inner code and outer code and the results of computer simulations demonstrate that the performance of the concatenated code was investigated. Keywords: Code Division Multiple Access, Concatenated code, inner code, outer code, interleaving and power analysis.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Distributed Spatial Modulation based Cooperative Diversity Schemeijwmn
: In this paper, a distributed spatial modulation based cooperative diversity scheme for relay
wireless networks is proposed. Where, the space-time block code is exploited to integrate with distributed
spatial modulation. Therefore, the interested transmission scheme achieves high diversity gain. By using
Monte-Carlo simulation based on computer, we showed that our proposed transmission scheme outperforms
state-of-the-art cooperative relaying schemes in terms bit error rate (BER) performance.
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...IJNSA Journal
With the rapid growth of wireless communication infras,,tructure over the recent few years, new
challenges has been posed on the system and analysis on wireless adhoc networking. Implementation of
MIMO communication in such type of network is enhancing the packet transmission capabilities. There
are different techniques for cooperative transmission and broadcasting packet in MIMO equipped
Mobile Adhoc Network. We have employed a model network in the OPNET environment and propose a
new scheduling algorithm based on investigating the different broadcasting algorithm. The new
broadcasting algorithm improves the packet transmission rate of the network based on energy
performance of the network and minimizes the BER for different transmission mode which is illustrated
in this paper. The simulations are done in MATLAB and OPNET environment and the simulated result
for the packet transmission rate are collected and shown in the tabular form. Also simulate the network
for generating a comparative statement for each mobile node. And performance analysis is also done for
the model network. The main focus is to minimize BER and improve information efficiency of the
network.
OPTICAL SWITCHING CONTROLLER USING FPGA AS A CONTROLLER FOR OCDMA ENCODER SYSTEMEditor IJCATR
This paper proposed a design of optical switching controller using FPGA for OCDMA encoder system. The encoder is one
of the new technologies that use to transmit the coded data in the optical communication system by using FPGA and optical switches.
It is providing a high security for data transmission due to all data will be transmitting in binary code form. The output signals from
FPGA are coded with a binary code that given to an optical switch before it signal modulate with the carrier and transmit to the
receiver. In this paper, AA and 55 data were used for source 1 and source 2. It is generated sample data and sent packet data to the
FPGA and stored it into RAM. The simulation results have done by using software Verilog Spartan 2 programming to simulate. After
that the output will produces at waveform to display the output. The main function of FPGA controlling unit is producing single pulse
and configuring optical switching system.
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...IJNSA Journal
With the rapid growth of wireless communication infras,,tructure over the recent few years, new challenges has been posed on the system and analysis on wireless adhoc networking. Implementation of MIMO communication in such type of network is enhancing the packet transmission capabilities. There are different techniques for cooperative transmission and broadcasting packet in MIMO equipped Mobile Adhoc Network. We have employed a model network in the OPNET environment and propose a new scheduling algorithm based on investigating the different broadcasting algorithm. The new broadcasting algorithm improves the packet transmission rate of the network based on energy performance of the network and minimizes the BER for different transmission mode which is illustrated in this paper. The simulations are done in MATLAB and OPNET environment and the simulated result for the packet transmission rate are collected and shown in the tabular form. Also simulate the network for generating a comparative statement for each mobile node. And performance analysis is also done for the model network. The main focus is to minimize BER and improve information efficiency of the network.
High Speed Low-Power Viterbi Decoder Using Trellis Code ModulationMangaiK4
Abstract - High speed low power viterbi decoders for trellis code modulation is well known for the delay consumption in underwater communication. In transmission system wireless communication is the transfer of information between two or more points that are not connected by an electrical conductor. WiMAX is the wireless communication standard designed to provide 30 to 40 Mega bits per second data rates. WiMAX as a standards based technology enabling the delivery of last mile wireless broadband access as an alternative to cable and DSL. WiMAX can provide at home or mobile internet access across whole cities or countries. The address generation of WiMAX is carried out by interleaver and deinterleaver. Interleaving is used to overcome correlated channel noise such as burst error or fading. The interleaver/deinterleaver rearranges input data such that consecutive data are spaced apart. The interleaved memory is to improve the speed of access to memory. The viterbi technique reduces the bit error rate and delay using wimax.
High Speed Low-Power Viterbi Decoder Using Trellis Code ModulationMangaiK4
Abstract - High speed low power viterbi decoders for trellis code modulation is well known for the delay consumption in underwater communication. In transmission system wireless communication is the transfer of information between two or more points that are not connected by an electrical conductor. WiMAX is the wireless communication standard designed to provide 30 to 40 Mega bits per second data rates. WiMAX as a standards based technology enabling the delivery of last mile wireless broadband access as an alternative to cable and DSL. WiMAX can provide at home or mobile internet access across whole cities or countries. The address generation of WiMAX is carried out by interleaver and deinterleaver. Interleaving is used to overcome correlated channel noise such as burst error or fading. The interleaver/deinterleaver rearranges input data such that consecutive data are spaced apart. The interleaved memory is to improve the speed of access to memory. The viterbi technique reduces the bit error rate and delay using wimax.
Index modulation is one of the promising techniques for future communications systems due to many improvement over the classical orthogonal frequency division multiplexing systems such as single RF chain, increased throughput for the same modulation order, achieved tradeoff between the efficiencies of the power and the spectral, and elimination of inter-channel interference. Many forms of index modulation researches exist where symbols are conveyed in antennas, subcarriers, time slots, and the space-time matrix. Spatial modulation is one member of index modulation family where symbols are conveyed in activating transmit/receive antennas. In this paper, a modification to a standard multiple input single output scheme by integrating spatial modulation using simplified mathematical procedure is achieved. In the transmitter side, data and activation symbols are distributed simultaneously using mathematical module and floor functions. At the receiver, a simplified maximum likelihood detector is used to obtain transmitted pair of symbols. To verify this, MATLAB simulink is used to simulate a downlink system where spatial modulation is applied to a base station. Results for different transmit antenna number and modulation order are obtained in the form of bit error rate versus signal to noise ratio.
A low complexity distributed differential scheme based on orthogonal space t...IJECEIAES
This work proposes a new differential cooperative diversity scheme with high data rate and low decoding complexity using the decode-and-forward protocol. The proposed model does not require either differential encoding or channel state information at the source node, relay nodes, or destination node where the data sequence is directly transmitted and the differential detection method is applied at the relay nodes and the destination node. The proposed technique enjoys a low encoding and decoding complexity at the source node, the relay nodes, and the destination node. Furthermore, the performance of the proposed strategy is analyzed by computer simulations in quasi-static Rayleigh fading channel and using the decode-and-forward protocol. The simulation results show that the proposed differential technique outperforms the corresponding reference strategies.
A New Bit Split and Interleaved Channel Coding for MIMO DecoderIJARBEST JOURNAL
Authors:-C. Amar Singh Feroz1, S. Karthikeyan2, K. Mala3
Abstract– In wireless communications, the use of multiple antennas at both the
transmitter and receiver is a key technology to enable high data transmission without
additional bandwidth or transmit power. MIMO schemes are widely used in many
wireless standards, allowing higher throughput using spatial multiplexing techniques.
Bit split mapping based on JDD is designed. Here ETI coding is used for encoding and
Viterbi is used for decoding. Experimental results for 16-QAM and 64 QAM with the
code rate of ½ and 1/3 codes are shown to verify the proposed approach and to elucidate
the design tradeoffs in terms the BER performance. This bit split mapping based JDD
algorithm can greatly improve BER performance with different system settings.
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...ijngnjournal
WiMAX is Wireless Interoperability for Microwave Access has emerged as a promising solution for transmission of higher data rates for fixed and mobile applications. IEEE 802.16d and e are the standards proposed by WiMAX group for fixed and mobile. As the wireless channel have so many limitation Such as Multipath, Doppler spread, Delay spread and Line Of Sight (LOS)/Non Line Of Sight (NLOS) components. To attain higher data rates the Multi Carrier System with Multiple Input and Multiple Output (MIMO) is incorporated in the WiMAX. The Orthogonal Frequency Division Multiplexing (OFDM) is a multi carrier technique used with the WiMAX systems. In OFDM the available spectrum is split into numerous narrow band channels of dissimilar frequencies to achieve high data rate in a multi path fading environment. And all these sub carriers are considered to be orthogonal to each other. As the number of sub carriers is increased there is no guarantee of sustained orthogonality, i.e. at some point the carriers are not
independent to each other, and hence where the orthogonality can be loosed which leads to interference and also owing to the synchronization between transmitter and receiver local oscillator, it causes interference known as Inter Carrier Interference (ICI). The systems uses MIMO-OFDM will suffer with the effects of ICI and Carrier Frequency Offset (CFO) “ε”. However these affect the power leakage in the midst of sub carriers, consequently degrading the system performance. In this paper a new approach is proposed in order to reduce the ICI caused in WiMAX and improve the system performance. In this scheme at the transmitter side the modulated data and a few predefined pilot symbols are mapped onto the non
neighboring sub carriers with weighting coefficients of +1 and -1. With the aid of pilot symbols the frequency offset is exactly estimated by using Maximum Likelihood Estimation (MLE) and hence can be minimized. At demodulation stage the received signals are linearly combined along with their weighted
coefficients and pilot symbols, called as Pilot Aided Self Cancellation Method (PASCS). And also to realize the various wireless environments the simulations are carried out on Stanford University Interim (SUI) channels. The simulation results shows that by incorporating this method into WiMAX systems it performs better when the Line Of Sight (LOS) component is present in the transmission and also it improves the Bit Error Rate (BER) and Carrier to Interference Ratio (CIR). The CIR can be improved 20 dB. In this paper the effectiveness of PASCS scheme is compared with the Self Cancellation Method (SCM). It provides accurate estimation of frequency offset and when residual CFO is less significant the ICI can be diminished successfully.
MIMO System Performance Evaluation for High Data Rate Wireless Networks usin...IJMER
Space–time block coding is used for data communication in fading channels by multiple
transmit antennas. Message data is encoded by applying a space–time block code and after the encoding
the data is break into ‘n’ streams of simultaneously transmitted strings through n transmit antennas. The
received signal at the receiver end is the superposition of the n transmitted signals distorted due to noise
.For data recovery maximum likelihood decoding scheme is applied through decoupling of the signals
transmitted from different antennas instead of joint detection. The maximum likelihood decoding scheme
applies the orthogonal structure of the space–time block code (OSTBC) and gives a maximum-likelihood
decoding algorithm based on linear processing at the receiver. In this paper orthogonal space–time
block codes based model is developed using Matlab/Simulink to get the maximum diversity order for a
given number of transmit and receive antennas subject with a simple decoding algorithm.
The simulink block of orthogonal space coding block with space–time block codes is applied with and
without gray coding. The OSTBC codes gives the maximum possible transmission rate for any number of
transmit antennas using any arbitrary real constellation such of M-PSK array. For different complex
constellation of M- PSK space–time block codes are applied that achieve 1/2 and 3/4 of the maximum
possible transmission rate for MIMO transmit antennas using different complex constellations.
A High Performance Hybrid Two Dimensional Spectral/Spatial NZCC/MD Code for S...IJCNCJournal
This paper proposes a new technique to construct a hybrid zero cross-correlation (NZCC) based on multiple diagonal (MD) code for two-dimensional (2D) spectral amplitude coding for optical code division multiple access code division multiple access (SAC-OCDMA) systems. The proposed hybrid code eliminates totally the multiple access interference (MAI) between a large number of users and allows them to connect simultaneously via the optical communication link with a high speed to receive huge data and serve various areas such as Internet, telephony, DAB radio, digital audio broadcasting, and DVB video. Simulation results demonstrate that the performance of such a SAC-OCDA system based on novel 2D hybrid NZCC/MD code can be easily improved keeping a less complex structure using couplers for direct spectral/spatial dimension (SDD) detection and show superior bit error rate (BER) values comparing to previously developed two-dimensional codes including perfect difference (2D-PD), diagonal Eigen-value units (2D-DEU), multi-service (2D-MS) and balanced incomplete block design (2D-BIBD) codes.
A HIGH PERFORMANCE HYBRID TWO DIMENSIONAL SPECTRAL/SPATIAL NZCC/MD CODE FOR S...IJCNCJournal
This paper proposes a new technique to construct a hybrid zero cross-correlation (NZCC) based on
multiple diagonal (MD) code for two-dimensional (2D) spectral amplitude coding for optical code division
multiple access code division multiple access (SAC-OCDMA) systems. The proposed hybrid code
eliminates totally the multiple access interference (MAI) between a large number of users and allows them
to connect simultaneously via the optical communication link with a high speed to receive huge data and
serve various areas such as Internet, telephony, DAB radio, digital audio broadcasting, and DVB video.
Simulation results demonstrate that the performance of such a SAC-OCDA system based on novel 2D
hybrid NZCC/MD code can be easily improved keeping a less complex structure using couplers for direct
spectral/spatial dimension (SDD) detection and show superior bit error rate (BER) values comparing to
previously developed two-dimensional codes including perfect difference (2D-PD), diagonal Eigen-value
units (2D-DEU), multi-service (2D-MS) and balanced incomplete block design (2D-BIBD) codes.
Similar to Iterative network channel decoding with cooperative space-time transmission (20)
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
How world-class product teams are winning in the AI era by CEO and Founder, P...
Iterative network channel decoding with cooperative space-time transmission
1. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.6, December 2014
DOI : 10.5121/ijasuc.2014.5602 9
ITERATIVE NETWORK-CHANNEL DECODING
WITH COOPERATIVE SPACE-TIME
TRANSMISSION
Saikat Majumder and Shrish Verma
Department of Electronics and Telecommunication Engineering,
National Institute of Technology Raipur, India
ABSTRACT
One of the most efficient methods of exploiting space diversity for portable wireless devices is cooperative
communication utilizing space-time block codes. In cooperative communication, users besides
communicating their own information, also relay the information of other users. In this paper we
investigate a scheme where cooperation is achieved using two methods, namely, distributed space-time
coding and network coding. Two cooperating users utilize Alamouti space time code for inter-user
cooperation and in addition utilize a third relay which performs network coding. The third relay does not
have any of its information to be sent. In this paper we propose a scheme utilizing convolutional code based
network coding, instead of conventional XOR based network code and utilize iterative joint network-
channel decoder for efficient decoding. Extrinsic information transfer (EXIT) chart analysis is performed to
investigate the convergence property of the proposed decoder.
KEYWORDS
Network coding, Iterative decoder, Space-time code, Cooperative communication
1. INTRODUCTION
Wireless adhoc and sensor networks having a large number of low power wireless nodes have
attracted a lot of attention from the researchers recently. The main challenge of wireless sensor
networks is to achieve proper balance between transmit/processing power and quality of service.
However, such multi-terminal systems are limited by impairments due to wireless channels, such
as fading, and interference. Such low power portable devices are further constrained by limited
computational capabilities and power consumption due to computationally complex algorithms.
This limitation due to low computational capabilities of sensor nodes can be addressed by
utilizing modern development in power efficient microelectronic devices or by shifting the
computational load to the base station. The later technique involves designing systems with low
encoder complexity and relatively computationally intensive decoder at the base-station.
On the other hand, due to fading the transmission over wireless channels suffer from severe time
varying attenuation in signal strength. For a point to point wireless communication system, effect
of fading is mitigated using multiple antennas at transmitter and receiver. Since, wireless sensor
nodes are too small to accommodate multiple antennas on a single terminal, several nodes can
cooperate to form a virtual multiple-input multiple output (MIMO) system [1-2]. Cooperative
communication has emerged as an accepted method for achieving transmit diversity for
mitigation of fading effect at the receivers. In cooperative communication transmitting users use
one another’s antenna to realize the benefit of MIMO. There are many cooperative strategies to
achieve efficient node cooperation, such as amplify and forward (AF) [2,3,4], decode and forward
2. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.6, December 2014
10
(DF) [5], and coded cooperation [6,7]. In AF protocol, relay nodes retransmit amplified versions
of the signal received from source. Amplification coefficients at the relay nodes control the
performance at the destination. Whereas in DF, relay nodes first detect the received symbol using
hard decision and then forwards the reencoded signal to destination. Coded cooperation achieves
space diversity by forwarding different segment of a channel code through different paths.
Various improvements in these fundamental techniques has been proposed in recent years. An AF
technique is proposed in [8] where the expected distortion performances with progressive
transmission and superposition coding is investigated. Zhou et. al [7] proposed a distributed joint
source-channel coding technique that exploits source relay correlation.
Besides distributed MIMO techniques, network coding [9] has also emerged as preferred method
for obtaining cooperative diversity. A simple model where diversity can be obtained with network
coding is multiple access relay channel (MARC). A simple such model consists of two
cooperating user nodes and an intermediate relay with performs network coding [10] and
decoding is performed at the base station on the principles of turbo code. Ahsin and Slimane [11]
proposed a similar scheme for MARC using the principles of product codes. Authors in [12,13]
proposed schemes which combines the benefits of space-time codes and network coding for
cooperative communication. The authors use simple XOR based network coding at the relay for
obtaining diversity. They have demonstrated that combination of Alamouti space-time code and
network coding outperforms system based only on Alamouti coded cooperation.
In this paper, we improve upon the research in [12] by application of the concept of product code
and iterative network-channel decoding. The proposed scheme uses punctured convolutional code
as network code at the relay and Reed-Solomon code as channel code. The class of Reed-
Solomon error correction codes is well known in technical literature and is adopted in many
communication protocols. Our main innovation is iterative network-channel decoding at the
receiver using the principles derived from soft decoding of concatenated Reed-Solomon
convolutional codes [14]. The proposed algorithm enables network code and channel decoders to
exchange soft information iteratively and may yield a capacity approaching performance. We
apply extrinsic information obtained from soft network decoder to soft-input soft-out (SISO)
decoder for Reed-Solomon code [19,15] through an interleaver. The extrinsic output of SISO
Reed-Solomon decoder is applied back to network-decoder. SISO decoding of Reed-Solomon
code allows its decoding beyond minimum separable distance (MDS) capability, in contrast to
popular approach of hard decision decoding of Reed-Solomon code. An extrinsic information
transfer (EXIT) [21] characteristics of the proposed algorithm is presented, leading to the insights
of its iterative decoding behaviour and design criteria for network and channel code.
Figure 1. Space-time and network coded cooperation. (a) In first phase, user nodes broadcast information
to relay, base station and other user node. (b) Second phase consists of retransmission by user nodes and
relay node.
Rest of the article is organized as follows. Section 2 describes the system model under
consideration. Cooperative space-time transmission, network coding and the proposed iterative
network-channel decoder is discussed in this section. Section 3 analyzes the decoder using EXIT
3. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.6, December 2014
11
chart for fading channel. Simulation results are given in section 5. Finally, section 6 provides the
concluding remarks and suggestion for future work.
2. SYSTEM MODEL
We consider the scenario shown in Figure 1, with two mobile users (MU1 and MU2) nodes
communicating information to a common base station (BS). The two MU nodes cooperate with
each other using Alamouti space-time block code. In addition, a dedicated relay node performs
network coding on the information received from both the information nodes. We further assume
that all the nodes are using orthogonal channels with relay node operating in half-duplex mode.
Similar scenario is presented in [12] for evaluating the performance improvement due to
additional network coding node. But instead of simple XOR based network coding, we consider
convolutional encoder as network code and evaluate the performance of the system in iterative
decoding scenario. Next we describe the channel coding operation at the MU nodes and relay.
2.1. Encoding at Mobile User Nodes
The bits from each source is grouped into m bit symbols belonging to Galois field GF(N+1), with
N = 2m
– 1. The encoding at MU nodes is shown in Figure 2(a). The symbols are coded with (N,
K) Reed-Solomon code, where K is the number of information symbols in a codeword. The Reed-
Solomon code has dual functions; first, it is efficient against burst errors, since a sequence of m +
1 consecutive bit errors can affect at most two code symbols. Second, Reed-Solomon code aids in
iterative joint network-channel decoding as discussed in next sections. In time slot 1 and 2, Li
codewords are generated (each codeword consists of N symbols), where ݅ = 1, 2 indicates the
MU. They are grouped into a frame and interleaved with Πi. The stream is then formed into
matrix of size Li × N, where each row forms a packet. The symbols are translated into bits,
modulated and broadcast to BS, relay and other MU.
2.2. Network Coding at Relay
Figure 2(b) shows the encoding operation at the relay node. The relay node overhears
transmission from both the MU nodes during time slot ݐ = 1, 2, decodes and reencodes them. The
reencoded packets are ordered into matrix of size (L1 + L2) × mN bits. The rows from the two
cooperating sources are arranged alternately as shown in Figure 3. In this research we use
recursive systematic convolutional code (RSCC) as network code [11] instead of XOR based
network code. RSCC of rate (L1 + L2)/NN is applied on each column of (L1 + L2) bits, and parity
bits are obtained. Puncturing may be applied on the parity bits to attain necessary code rates.
Network code is obtained from these parity check bits and each row is transmitted as packet to the
BS. Thus each row encounters different channel and bits in a row suffer from same amount of
fading.
2.3. Cooperative Communication Protocol
The transmission of the message is accomplished in two phase or five time slots. In the first phase
(Figure 1(a)), the mobile users MU1 and MU2 broadcast their messages S1 and S2 over wireless
channel, respectively. This being broadcast phase, the transmitted messages are received by the
BS, relay and the other user.
Table I
Time Slot (t) 1 2 3 4 5
Transmitter MS1 MS2 MS1 MS2 RN
Message S1 S2 S3 S4 S5
4. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.6, December 2014
12
Figure 2. (a) Block diagram of encoder at mobile user nodes, (b) Network coding operation at relay node.
Figure 3. Data packets from two sources are ordered in alternate rows. Total number of rows from two
sources is L1+L2. Remaining rows of parity check bits are calculated and transmitted from the relay node.
In the next multiple access phase, the cooperating users MU1 and MU2, using Alamouti STBC
scheme, transmit S3 = -S2*and S4 = S1*, respectively to the BS. The relay node decodes the signal
received from both the users, reencodes them using Reed-Solomon code. Bits from both the
sources are combined, network coded and transmitted to the destination. The scenario in second
phase is illustrated in Figure 1(b). As mentioned earlier, all the nodes transmit in orthogonal
channels (separate time slots), the Table 1 details the channel assignment for different
transmitting nodes.
2.4. Iterative Network-Channel Decoder
The signal received at the BS after two phases of transmission and cooperative Alamouti relaying
from two MS, in matrix vector notation, is
ቂ
ݕଵ
ݕଶ
ቃ =
ℎଵ ℎଶ
ℎଶ
∗
−ℎଵ
∗൨ ቂ
ݏଵ
ݏଶ
ቃ + ቂ
݊ଵ
݊ଶ
ቃ (1)
where, ℎ, ݅ = 1, 2 denotes complex multiplicative fading coefficients for MU-BS channel with
ܧሼ|ℎ|ଶሽ = 1 and is assumed to be constant for at least one codeword duration. It is worth
mentioning again that each row of bits of matrix in Figure 3 undergoes different fading. Utilizing
(1), log-liklihood ratios (LLR) of the received packets from the two sources are obtained as Γ1, Γ2,
respectively, using soft-output Alamouti decoder [17]. On the other hand, signal received from
the relay node is
ݕଷ = ℎଷݏଷ + ݊ଷ (2)
and the corresponding LLR is calculated as Γ3 = ሺ|ݕଷ + ℎଷ|ଶ
− |ݕଷ − ℎଷ|ଶሻ/ܰ. Channel state
information ℎ is assumed to be available at the base station. The rows of LLR Γi, i = 1, 2, 3 are
5. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.6, December 2014
13
stacked over one another to form the matrix Γch
in the order given in Figure 3. Output Γch
of soft
Alamouti decoder consists of alternate rows of LLRs of bits of Reed-Solomon codes from MU1
and MU2, while last (NN – L1 – L2) rows are LLR of bits received form RN.
At the receiver RSCC and Reed-Solomon code can be considered a concatenated code structure
and can be decoded iteratively [14]. The next stages consists of iterative soft decoding process in
which BCJR algorithm [18] is applied along the columns for soft decoding of RSCC and Jiang-
Narayanan (JN) algorithm [19] for iterative soft decoding of Reed-Solomon codes along rows. JN
algorithm or adaptive belief propagation (ABP) is a significant departure from the traditional hard
decision decoding of Reed-Solomon codes. This algorithm operates in three stages. In the first
stage the parity check matrix is adapted according to the incoming LLR, and in the second stage
sum-product algorithm [20] is applied to calculate the extrinsic information. After finite number
of iterations, Berlekemp-Messy algorithm for decoding Reed-Solomon code is applied to the
hard-decisions made on the updated LLR. Besides being able to decode errors beyond maximum
distance separable (MDS) capability, JN algorithm enables iterative soft decision decoding in
conjunction with other soft decision decoders and equalizers. Extrinsic information is passed
between the two SISO decoders for finite number of iterations or until decoding of all the Reed-
Solomon codes is successful. The block diagram of the proposed decoder is shown in Figure 4.
An iteration of BCJR algorithm on the columns of LLR matrix Γch
generates extrinsic LLR
denoted by Γe
. The LLR matrix Γe
consists of alternate rows of extrinsic LLR for the two sources,
which are isolated at next stage into Γ1
e
and Γ2
e
. Applying deinterleaving mapping Πi
-1
on
extrinsic LLR Γi
e
, a priori LLR Li
a
for next stage of iterative decoder is obtained. An iteration of
JN algorithm is applied on all the rows of Li
a
independently and resulting extrinsic information is
saved as Li
e
. If a row of Reed-Solomon code satisfies the parity check requirement, it is decoded
and saved in Sത. Extrinsic information from both the RS decoders is interleaved, combined (into
the matrix in Figure 3) and applied as a priori information to the BCJR decoder. This constitutes
an iteration of the proposed decoder.
Figure 4. Block diagram of the proposed decoder
3. EXIT CHART ANALYSIS
Extrinsic information transfer (EXIT) chart has emerged as a successful method for predicting the
convergence behaviour of various concatenated and iterative systems. In this section, EXIT chart
is used to analyze the iterative decoding behaviour of the proposed scheme. The fundamental
assumption of EXIT chart is that extrinsic information passed from one SISO decoder to other is
a Gaussian random variable. The LLR a of a priori input for uncoded information s is modelled as
ܽ = ߤ ݔ + ݊ (3)
6. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.6, December 2014
14
where x is binary antipodal form of information symbols, na is a Gaussian random variable with
zero mean and variance ߪ
ଶ
. The variance must satisfy the condition ߤ = ߪ
ଶ
/2. The mutual
information between a and x is defined as
ξ
ξξ
ξ
ξ d
xfxf
xf
xfaxI
aa
a
x
a
)1|()1|(
)|(2
log)|(
2
1
),( 2
1 +=−=
= ∑∫±=
+∞
∞− (4)
where )|( xfa ξ is conditional probability density function associated with a priori LLR a.
Therefore, for a priori LLR a, mutual information is given as );( asIIa = . Similarly, mutual
information for extrinsic output e is obtained as );( esIIe = . To obtain EXIT chart, for given
values of )1,0(=aI we artificially generate the a priori inputs a, which are fed to SISO module.
Then the corresponding decoding algorithm of the block is invoked to produce extrinsic output e.
The mutual information eI is then evaluated using relation (4). Finally, EXIT chart is obtained as
the graphical plot between aI and eI . For decoding without any residual error, eI should equal 1
for some value of aI .
Figure 5(a) shows the EXIT characteristics of the proposed decoder with (31,25) Reed-Solomon
code. The inner decoder (decoder 1) consists of the cooperative Alamouti space-time decoder and
punctured (7,5)8 convolutional code acting as network code with overall code rate of 2/5. The
(ܫ, ܫ) curves are plotted with inner decoder 1 for average channel Eb/N0 of 2 dB and 3 dB.
Inverse EXIT characteristics ሺܫ, ܫሻ of decoder 2 (outer RS decoder consisting of JN algorithm)
is also shown in the figure. It shows, at 6 dB, the tunnel starts to open between EXIT curve of
decoder 1 and decoder 2, and at 7 dB, the tunnel is completely open. Therefore, the decoder bit
error rate (BER) cliff is expected to start at 6 dB and can be verified in Figure 7. Similarly, EXIT
chart for the proposed system with (15,7) is given in Figure 5(b), where turbo-cliff starts at 5 dB.
4. SIMULATION RESULTS
In this section we demonstrate through simulations that cooperative space-time coded iterative
network-channel decoder outperforms system utilizing XOR based network coding. The
performance is evaluated for BPSK modulated signal transmitted over Rayleigh block fading
channel, i.e. the channel fading coefficient is assumed to be constant for the duration of one
codeword. As explained earlier, we consider MARC scheme with two users cooperatively
transmitting using Alamouti STBC to the BS. An intermediate relay node assists in the
transmission through network coding. The SNR of MU-BS and RN-BS is assumed to be same
unless mentioned otherwise.
First we investigate the iterative convergence behavior of the proposed design. Figure 6 shows
BER performance of the proposed network-channel decoder with (31, 25) Reed-Solomon code as
component. It can be observed that iterative decoding gain is obtained for Eb/N0 ≥ 6 dB, as
predicted in EXIT chart of Figure 5(a). Error rate decreases with increase in iterations and there is
no significant improvement in BER after 20 iterations. Figure 7 shows the performance of the
iterative decoder with (15,7) Reed-Solomon code, in which iteration gain starts for Eb/N0 ≥ 5 dB.
Best BER performance is achieved for 5 iterations or more. This corresponds to EXIT chart in
Figure 5(b).
7. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.6, December 2014
15
Figure 5. EXIT chart of the proposed iterative soft decoder utilizing (a) (31,25) and (b) (15,7) Reed-
Solomon code as decoder 2.
8. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.6, December 2014
16
Figure 6.BER performance of the proposed scheme using (31,25) Reed-Solomon code with number of
decoding iterations over Rayleigh block fading channel.
Figure 7. BER performance of the proposed scheme using (15,7) Reed-Solomon code with number of
decoding iterations over Rayleigh block fading channel.
9. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.6, December 2014
17
Figure 8. Performance comparison of the proposed network-channel iterative decoder with a reference
scheme employing XOR based network code. (31,25) Reed-Solomon code is used as channel code in both
cases for fair comparison. BER performance are also compared for the case when SNR at relay is 10 dB
higher than direct links. BER curves of the reference system without using Reed-Solomon code is also
shown.
Next we compare the BER performance of the proposed system to baseline scheme in [12] which
applies XOR based network coding. Figure 8 illustrates the BER curves of proposed scheme with
(31,25) Reed-Solomon codes as channel encoder. The network code is derived by puncturing rate
½ RSCC of generator polynomial (5,7)8 to rate 2/3 code. The result is compared to BER curve
obtained with baseline system utilizing (31,25) Reed-Solomon code as channel code at the MU
nodes and XOR based network coding at RN. Overall code rate in both the cases is 2/5. It can be
observed that proposed scheme benefits from iterative decoding of network and channel codes,
where there is an improvement of 5 dB in Eb/N0 for achieving BER of 10-4
. Performance of all the
schemes can be improved if the link between relay node and the base station is better. Figure 6
also illustrates BER for the all the above cases with SNR of relay-base station link 10 dB better
than direct link. Performance of the baseline scheme without RS coding at the source is also
shown for reference. Stronger RSCC used as network code can improve the error performance of
the scheme as illustrated in Figure 9.
5. CONCLUSION
In this paper we proposed a novel iterative decoder for space-time-network coded cooperation
over wireless network. With Reed-Solomon code as channel code and convolutional code based
network coding and transmitted with space-time cooperation, the receiver is a cascade of SISO
modules of BCJR decoder and ABP algorithm. Significant improvement in error rate performance
is obtained with proposed scheme compared to scheme using XOR based network code. The
EXIT analysis of the proposed decoder is presented to validate the decoding convergence results.
Future work could be to reduce the complexity of the iterative decoder by using lesser complex
algorithm compared to ABP algorithm.
10. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.6, December 2014
18
Figure 9. Performance of the proposed iterative scheme using (31,25) Reed-Solomon code for different
RSCC used as network code.
REFERENCES
[1] Yindi Jing, Hassibi, B. (2006) Distributed Space-Time Coding in Wireless Relay Networks. IEEE
Transactions on Wireless communications, 5(12), pp.3524-3536. doi: 10.1109/TWC.2006.256975
[2] Laneman, J.N., Wornell, G. W. (2003) Distributed space-time-coded protocols for exploiting
cooperative diversity in wireless networks, IEEE Transactions on Information Theory, 49(10),
pp.2415-2425. doi: 10.1109/TIT.2003.817829
[3] Yi Zhao, Adve, R., Teng Joon Lim (2006) Improving Amplify-and-Forward Relay Networks:
Optimal Power Allocation versus Selection. Proceedings of the 2006 IEEE International Symposium
on Information Theory, 9-14 July 2006, pp.1234-1238.
[4] Sheng Yang, Belfiore, J.-C. (2007) Towards the Optimal Amplify-and-Forward Cooperative Diversity
Scheme," IEEE Transactions on Information Theory, 53(9), pp.3114-3126. doi:
10.1109/TIT.2007.903133
[5] Zhao, B., Valenti, M.C. (2003) Distributed turbo coded diversity for relay channel. Electronics Letters
, 39(10), pp.786-787. doi: 10.1049/el:20030526
[6] Hunter, T.E., Nosratinia, A. (2006) Diversity through coded cooperation. IEEE Transactions on
Wireless communications, 5(2), pp.283-289. doi: 10.1109/TWC.2006.1611050
[7] Xiaobo Zhou, Meng Cheng, Anwar, K., and Matsumoto, T. (2012) Distributed joint source-channel
coding for relay systems exploiting source-relay correlation and source memory. EURASIP Journal
on Wireless Communications and Networking, 2012:260. doi:10.1186/1687-1499-2012-260
[8] Sethakaset, U., Quek, T.Q.S., Sumei Sun (2011) Joint Source-Channel Optimization over Wireless
Relay Networks. IEEE Transactions on Communications, 59(4), pp.1114-1122. doi:
10.1109/TCOMM.2011.012711.090614
[9] Yingda Chen, Kishore, S., Jing Li (2006) Wireless diversity through network coding. Proceedings of
the Wireless Communications and Networking Conference, (WCNC 2006). pp.1681-1686. doi:
10.1109/WCNC.2006.1696541
[10] Hausl, C., Dupraz, P. (2006) Joint Network-Channel Coding for the Multiple-Access Relay Channel,
Proceedings of the Sensor and Ad Hoc Communications and Networks (SECON '06). pp.817-822, 28-
28 Sept. 2006. doi: 10.1109/SAHCN.2006.288566
[11] Ahsin, Tafzeel ur Rehman and Slimane, Slimane Ben (2012) A Joint Channel-network Coding Based
on Product Codes for the Multiple-access Relay Channel. ISRN Communications and Networking,
2012. doi: 10.5402/2012/837815
11. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.6, December 2014
19
[12] Menghwar, G. D. et al. (2012) Cooperative space-time codes with network coding. EURASIP Journal
on Wireless Communications and Networking, 2012(1). doi: 10.1186/1687-1499-2012-205
[13] Menghwar, G.D., Shah, A.A., Mecklenbrauker, C.F. (2009) Cooperative space-time codes with
opportunistic network coding with increasing numbers of nodes. Proceedings of the 6th International
Symposium on Wireless Communication Systems (ISWCS 2009), pp.536-539, 7-10 Sept. 2009. doi:
10.1109/ISWCS.2009.5285254
[14] Chen, L. (2013). Iterative Soft Decoding of Reed-Solomon Convolutional Concatenated Codes. IEEE
Transactions on Communications, 61(10), pp.4076-4085. doi: 10.1109/TCOMM.2013.
082813.120943
[15] Bellorado, J., Kavčić, A., Marrow, M., Li Ping (2010) Low-Complexity Soft-Decoding Algorithms
for Reed–Solomon Codes—Part II: Soft-Input Soft-Output Iterative Decoding. IEEE Transactions on
Information Theory, 56(3), pp.960-967. doi: 10.1109/TIT.2009.2039091
[16] Maunder, R. G., Wang, J., Yang, L. L. (2010). Near-capacity variable-length coding: regular and
EXIT-chart-aided irregular designs (Vol. 20). John Wiley & Sons.
[17] Cho, Y. S., Kim, J., Yang, W. Y., Kang, C. G. (2010). MIMO-OFDM wireless communications with
MATLAB. John Wiley & Sons.
[18] Bahl, L., Cocke, J., Jelinek, F., Raviv, J. (1974) Optimal decoding of linear codes for minimizing
symbol error rate. IEEE Transactions on Information Theory, 20, (2), pp.284-287. doi:
10.1109/TIT.1974.1055186
[19] Jiang, Jing, Narayanan, K.R. (2006) Iterative Soft-Input Soft-Output Decoding of Reed-Solomon
Codes by Adapting the Parity-Check Matrix. IEEE Transactions on Information Theory, 52(8),
pp.3746-3756. doi: 10.1109/TIT.2006.878176
[20] Costello, D., & Lin, S. (2004). Error control coding. Pearson Higher Education.
[21] Ten Brink, S. (2001). Convergence behavior of iteratively decoded parallel concatenated codes. IEEE
Transactions on Communications, 49(10), 1727-1737.