Justesen codes are created by tilting (n,k) Reed Solomon codes over GF(2^m) into (mn,mk) binary codes for multiple burst error correction. They are very good for long block lengths. Alternant codes are variation of BCH codes with fixed rate and large minimum distance.They are subfield-subcode of a Reed-Solomon codes over GF(q^m).Goppa codes are designed distance d have additional property over Alternant codes that inverse frequency template has width d...
Topics covered in this presentation:
1. RF spectrum and GSM specifications
2. FDMA and TDMA
3. Digital Voice Transmission
4. Channel coding, Interleaving and Burst formatting
5. GMSK
6. Frame structure of GSM
7. Corrective actions against multipath fading
Spread spectrum is a communication technique that spreads a narrowband communication signal over a wide range of frequencies for transmission then de-spreads it into the original data bandwidth at the receive.
Topics covered in this presentation:
1. RF spectrum and GSM specifications
2. FDMA and TDMA
3. Digital Voice Transmission
4. Channel coding, Interleaving and Burst formatting
5. GMSK
6. Frame structure of GSM
7. Corrective actions against multipath fading
Spread spectrum is a communication technique that spreads a narrowband communication signal over a wide range of frequencies for transmission then de-spreads it into the original data bandwidth at the receive.
BCH codes, part of the cyclic codes, are very powerful error correcting codes widely used in the information coding techniques. This presentation explains these codes with an example.
SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION Soumen Santra
SPACE DIVISION MULTIPLE ACCESS (SDMA)
Definition : The communication channel encountered by this array of antennas.
advanced antenna technology.
Smart Antenna
Uplink Transmission
Downlink Transmission
Block Diagram
Features
Beam Frequency Reuse
Advantages
Disadvantages
Modulation schemes used in wireless technologiesVijitaaDas
As we all know, in today's world, Wireless Technology is one of the most important method of communication between one device and other devices. This communication system uses a very clever technique called Modulation Technique or schemes to increase the reach of the signals. Another reason is to allow the use of smaller antenna. This PPT is mainly focused on the modulation schemes that helps in the communication process of Bluetooth, Zigbee, Wi-Fi and UWB.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
BCH codes, part of the cyclic codes, are very powerful error correcting codes widely used in the information coding techniques. This presentation explains these codes with an example.
SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION Soumen Santra
SPACE DIVISION MULTIPLE ACCESS (SDMA)
Definition : The communication channel encountered by this array of antennas.
advanced antenna technology.
Smart Antenna
Uplink Transmission
Downlink Transmission
Block Diagram
Features
Beam Frequency Reuse
Advantages
Disadvantages
Modulation schemes used in wireless technologiesVijitaaDas
As we all know, in today's world, Wireless Technology is one of the most important method of communication between one device and other devices. This communication system uses a very clever technique called Modulation Technique or schemes to increase the reach of the signals. Another reason is to allow the use of smaller antenna. This PPT is mainly focused on the modulation schemes that helps in the communication process of Bluetooth, Zigbee, Wi-Fi and UWB.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
I am Smith A. I am a Digital Communication Exam Helper at liveexamhelper.com. I hold a Masters' Degree in Digital Communication, from The University of North Carolina, USA. I have been helping students with their exams for the past 11 years. You can hire me to take your exam in Digital Communication.
Visit liveexamhelper.com or email info@liveexamhelper.com. You can also call on +1 678 648 4277 for any assistance with the Digital Communication exam.
Error control codes are necessary for transmission and storage of large volumes of date sensitive to errors. BCH codes and Reed Solomon codes are the most important class of multiple error correcting codes for binary and non-binary channels respectively. Peterson and later Berlekamp and Massey discovered powerful algorithms which became viable with the help of new digital technology. Use of Galois fields gave a structured approach to designing of these codes. This presentation deals with above in a very structured and systematic manner.
Comparison of Turbo Codes and Low Density Parity Check CodesIOSR Journals
Abstract-The most powerful channel coding schemes, namely, those based on turbo codes and LPDC (Low density parity check) codes have in common principle of iterative decoding. Shannon’s predictions for optimal codes would imply random like codes, intuitively implying that the decoding operation on these codes would be prohibitively complex. A brief comparison of Turbo codes and LDPC codes will be given in this section, both in term of performance and complexity. In order to give a fair comparison of the codes, we use codes of the same input word length when comparing. The rate of both codes is R = 1/2. However, the Berrou’s coding scheme could be constructed by combining two or more simple codes. These codes could then be decoded separately, whilst exchanging probabilistic, or uncertainty, information about the quality of the decoding of each bit to each other. This implied that complex codes had now become practical. This discovery triggered a series of new, focused research programmes, and prominent researchers devoted their time to this new area.. Leading on from the work from Turbo codes, MacKay at the University of Cambridge revisited some 35 year old work originally undertaken by Gallagher [5], who had constructed a class of codes dubbed Low Density Parity Check (LDPC) codes. Building on the increased understanding on iterative decoding and probability propagation on graphs that led on from the work on Turbo codes, MacKay could now show that Low Density Parity Check (LDPC) codes could be decoded in a similar manner to Turbo codes, and may actually be able to beat the Turbo codes [6]. As a review, this paper will consider both these classes of codes, and compare the performance and the complexity of these codes. A description of both classes of codes will be given.
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability
I am Emmanuel Ibrahim. I love exploring new topics. Academic writing seemed an interesting option for me. After working for many years with liveexamhelper.com, I have assisted many students with their Digital Communication exams. I can proudly say, each student I have served is happy with the quality of the exam help that I have provided. I have acquired my bachelors from University of Leeds, UK.
INTRODUCTION: Fibre optical sensors offer number of distinct advantages which makes them unique for many applications where conventional sensors are difficult or impossible to deploy or can not provide the same wealth of information. They are completely passive, hence can be used in explosive environment. Immunity to electromagnetic interference makes it ideal for microwave environment. They are resistant to high temperatures and chemically reactive environment, ideal for harsh and hostile environment. Small size makes it ideal for embedding and surface mounting. Has high degree of biocompatibility, non-intrusive nature and electromagnetic immunity, ideal for medical applications like intra-aortic balloon pumping. They can monitor a wide range of physical and chemical parameters. It has potential for very high sensitivity, range and resolution. Complete electrical insulation from high electrostatic potential and Remote operation over several km lengths without any lead sensitivity makes it ideal for deployment in boreholes or measurements in hazardous environment. Unique multiplexed and distributed sensors provide measurements at large number of points along single optical cable, ideal for minimising cable deployment and cable weight, monitoring extended structures like pipelines, dams.
Various types of sensors are Point sensors, Integrated Sensors, Quasidistributed multiplexed sensors, Distributed sensors. Examples of such sensors are Fabry-Perot sensors, Single Fibre Bragg Grating sensors, Integrated strain sensor, Intruder Pressure sensor, Strain/Force sensor, Position sensor, Temperature sensor, Deformation sensor etc.
Orthogonal Frequency Division Multiplexing, OFDM uses a large number of narrow sub-carriers for multi-carrier transmission to overcome the effect of multi path fading problem. LTE uses OFDM for the downlink, from base station to terminal to transmit the data over many narrow band careers of 180 KHz each instead of spreading one signal over the complete 5MHz career bandwidth. OFDM meets the LTE requirement for spectrum flexibility and enables cost-efficient solutions for very wide carriers with high peak rates.
The primary advantage of OFDM over single-carrier schemes is its ability to cope with severe channel conditions. Channel equalization is simplified. The low symbol rate makes the use of a guard interval between symbols affordable, making it possible to eliminate inter symbol interference (ISI).
Small cells are Low-powered radio access nodes, Operate in licensed and unlicensed spectrum, Short range mobile phone base stations, Range from very compact residential femto-cells of area 10 meters to larger equipment used inside commercial offices or outdoor public spaces of area 1 or 2 kilometers, "small" compared to a mobile macro cell, with range of a few tens of kilometers, Complements mobile phone service from larger macro cell towers, Offer excellent mobile phone coverage and data speeds at home, in the office and public areas for both voice and data, Developed for both 3G and the newer 4G/LTE radio technologies.
Femto cells are Initially designed for residential and small business use with a short range and a limited number of channels. Femtocell devices use licenced radio spectrum. Femto cells must be operated and controlled by a mobile phone company, One cell with one mobile phone operator. When in range, the mobile phone will detect cell and use it in preference to the larger macrocell sites. Calls are made and received in exactly the same way as macrocell. Except, the signals are sent encrypted from the small cell via the public or private broadband IP network to one of the mobile operators main switching centres.
Light Fidelity (Li-Fi) is a bidirectional, high speed , fully networked wireless communication technology similar to Wi-Fi. Li-Fi was first put forward by Professor Harald Haas,University of Edinburgh, during a TED Talk in 2011. Li-Fi is a form of visible light communication and a subset of optical wireless communications (OWC) and could be a complement to RF communication (Wi-Fi or Cellular network), or even a replacement in contexts of data broadcasting. It is so far measured to be about 100 times faster than some Wi-Fi implementations, reaching speeds of 224 gigabits per second.
Optical Fiber Communication Part 3 Optical Digital ReceiverMadhumita Tamhane
Current generated by photodetector is very weak and is adversely effected by random noises associated with photo detection process. When amplified, this signal further gets corrupted by amplifiers. Noise considerations are thus important in designing optical receivers.
Most meaningful criteria for measuring performance of a digital communication system is average error probability, and in analog system, it is peak signal to rms noise ratio. ...
Optical fiber communication Part 2 Sources and DetectorsMadhumita Tamhane
For optical fiber communication, major light sources are hetero-junction-structured semiconductor laser diode and light emitting diodes. Heterojunction consists of two adjoining semiconductor materials with different bandgap energies. They have adequate power for wide range of applications. Detectors used are PiN diode and Avalanche Photodiode. Being very small in size and feeding to small core optical fiber, it is very important to study emission characteristics of sources and their coupling to fiber. As it can operate for low power over a long distance, received power is very small, hence study of noise characteristics of detectors is very essential...
Optical fiber communication Part 1 Optical Fiber FundamentalsMadhumita Tamhane
Optical fiber systems grew from combination of semiconductor technology, which provided necessary light sources and photodetectors and optical waveguide technology. It has significant inherent advantages over conventional copper systems- low transmission loss, wide BW, light weight and size, immunity to interferences, signal security to name a few. One principle characteristic of optical fiber is its attenuation as a function of wavelength. Hence it is operated in two major low attenuation wavelength windows 800-900nm and 1100-1600nm . Light travels inside optical fiber waveguide on principle of total internal reflection. Fiber is available as single mode and multiple mode, step index and graded index depending on applications and expenditures. Principle of fiber can be understood by ray theory or mode theory. ...
Main constraint for colour TV was compatibility with existing monochrome system. It should produce normal black and white picture on monochrome receiver without any modification on receiver circuitry. Moreover colour receiver must produce a black and white picture if transmission is monochrome.
Hence it should have same - bandwidth, location & spacing of sound and video frequencies, luminance information as a monochromatic signal. Colour information in signal should not effect picture on a monochrome receiver. Other circuit details of colour receiver should be same as that of monochromatic receiver..
Fundamental aim of Television is to extend the sense of sight beyond its natural limits, along with associated sound. It is radio communication of sound along with picture details. The picture signal is amplitude modulated sound signal frequency modulated before transmission. Carrier frequencies are suitably spaced so that combined signal can be radiated through a common antenna. Each broadcasting station can have its own carrier frequency and receiver can be tuned to select desired stations by tuning to respective frequency...
Field of telecommunications has evolved from crudest form of communications to electrical, radio and electro-optical communications. From manual exchange like local battery, central battery exchange, to crossbar switching, director system and to common control systems, telephone communications had started evolving to cater to better and better specifications and needs. Touch tone dial telephone opened a new horizon in the field of end to end signalling. Then came computerised stored program control systems, various multiplexing techniques. With increase in traffic there was a need to study traffic and blocking capabilities....
X.25 is a packet-switched network, developed by ITU-T as an interface between data terminal equipment DTE and data circuit-terminating equipment DCE for terminal operation in packet mode on public data network. It is an end-to-end protocol, but actual movement of packet through the network is invisible to the user.The user sees the network as a cloud through which each packet passes on its way to the receiving DTE.
It defines how a packet-mode terminal can be connected to a packet network for exchange of data. It describes procedures necessary for establishing, maintaining and terminating connections. It uses virtual network approach to packet switching, SVC and PVC and uses asynchronous TDM to multiplex data...
SDLC is synchronous bit oriented protocol developed by IBM for serial-by-bit information transfer over a data communication channel. Using EBCDIC, data is transferred in frames. Primary station controls data transfer and issues command while secondary station receives command responses to primary.
HDLC is superset of SDLC. Hence, it gives added facilities of extended addressing, CRC-16, extended control field, where 127 frames can be sent together without receiving an acknowledgement. It also allows balance mode of operation analogous to point to point communication...
Data communication protocols in centralised networks (in master:slave environ...Madhumita Tamhane
Data communication protocols can be asynchronous or synchronous handling respective data formats. Asynchronous protocols are character oriented while synchronous protocols can be either character oriented or bit oriented protocols. Most commonly used Asynchronous character oriented protocol is IBM's asynchronous data link protocol 83B. Most commonly used Synchronous character oriented protocol is IBM's BISYNC which is addressed in this presentation while most common bit oriented portals are SDLC and HDLC which are addressed in next presentation.
The line control unit LCU has several important functions. LCU at primary station serves as an interface between the host computer and the circuit it serves. The LCU directs the flow of input and output data between the different data communications links and their respective applications program. The LCU performs parallel-to-serial and serial-to-parallel conversion of data and transfers to modem serially. LCU also performs error detection and correction apart from inserting and deleting data link control characters.
When a device has multiple paths to reach a destination, it always selects one path by preferring it over others. This selection process is termed as Routing. Routing is done by special network devices called routers or it can be done by means of software processes.The software based routers have limited functionality and limited scope.In case there are multiple path existing to reach the same destination, router can make decision based on Hop Count, Bandwidth, Metric, Prefix-length or Delay. Routing decision in networks, are mostly taken on the basis of cost between source and destination. Hop count plays major role here. Shortest path is a technique which uses various algorithms to decide a path with minimum number of hops. Common shortest path algorithms are Dijkstra's algorithm, Bellman Ford algorithm or Floyd algorithm. This presentation simplifies Floyd's algorithm with pictures and example.
A digital signal is a sequence of discrete, discontinuous voltage pulses. Each pulse is a signal element. Binary data '0' and '1' are transmitted over digital channel by encoding each data bit into signal elements. Encoding scheme is mapping from data bits to signal elements. Line coding is done to prevent DC wandering and loss of synchronisation on long strings of '0' and '1'. It may give some amount of error detection as in AMT.
Developed by ITU-T, ISDN is a set of protocols that combines digital telephony and data transport services to digitise the telephone network to permit the transmission of audio, video and text over existing telephone line. ISDN is an effort to standardise subscriber services, provide user or network interface and facilitate the inter-networking capabilities of existing voice and data networks. The goal of ISDN is to form a wide area network that provides universal end-to-end connectivity over digital media by integrating separate transmission services into one without adding new links or subscriber links.
Asynchronous Transfer Mode ATM is the cell relay protocol designed by ATM Forum and adopted by the ITU-T. Cell, a small fixed size block of information with asynchronous TDM ensures high speed real time transmission with efficient and cheaper technology. Instead of user addresses, it uses virtual circuit identifier and virtual path identifier, which can be repeated at unrelated locations. This technology ensures connectivity to much more users than normal packet switching networks.
ATM and ISDN-B combination allows high-speed interconnection of world's network.
An artificial Neural Network (ANN) is an efficient approach for solving a variety of tasks using teaching methods and sample data on the principal of training. With proper training, ANN are capable of generalizing and recognizing similarity among different input patterns.The main problem in using ANN is parameter setting, because there is no definite and explicit method to select optimal parameters of the ANN. There are a number pf parameters that must be decided upon like number of layers, number of neurons per layer, number of training iteration, number of samples etc...
Weight enumerators of block codes and the mc williamsMadhumita Tamhane
Best possible error control codes of a certain rate and block length can be adjudged depending on bounds such that no codes can exist beyond the bounds and codes are sure to exist within the bounds. This presentation gives composition structure of Block codes and the probability of decoding error and of decoding failure.Mac William's Identities is relationship between weight distribution of a linear code and weight distribution of its dual code, which hold for any linear code and are based on vector space structure of linear codes and on the fact that dual code of a code is the orthogonal compliment of the code...
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
2. Justesen Codes
Mapping codes converts (N,K) linear code over GF(qm
) into
(mN,mK) linear code over GF(q) by ‘tilting’ each qm
-ary
symbol into m q-ary symbols.
d* nonzero symbols of min wt. codeword tilts to md*
symbols, not all symbols zero.
Code rate remains unchanged but minimum distance is
much smaller fraction of block length.
Justesen modified the construction to give a good code for
long block lengths.
Advantage: Creates a simple form of multiple burst-error
correcting codes.
Gives infinite family of good binary codes.
3. Justesen Codes - Construction
Construction starts with all the codewords of a single fixed
(N,K) Reed-Solomon code that has the same number of
codewords as desired Justesen code.
Let α be the primitive element of GF(qm
).
Starting with codeword C = (c0, c1, … cN-1) from Reed-
Solomon code, first form the 2 by N array of GF(qm
)-ary
symbols. (ci Є GF(qm
) )
c0 c1 c2 … cN-1
α0c0 α1c1 α2c2 … αN-1cN-1
C’ = (c0,α0c0 ; c1,α1c1 ; c2,α2c2 ; … cN-1,αN-1cN-1)
Replace each element by binary m-tuple symbols we obtain
binary vector of length 2mN.
This gives one code word of the Jestesen Code.
Code rate R = K/2N, half of RS code.
4. Justesen Codes
Justesen code is the concatenation code of an RS code and
linear binary codes.
A natural decoding algorithm for Justesen code would be
one that reverses the process of concatenation.
Algorithm:
Decode each set of m bits to yi over GF(qm
).
Ties are broken arbitrarily to give two set.
Decode y = (y0, . . . , yn−1) using any decoding algorithms for
RS code.
The decoding algorithm can be used to correct all errors up
to less than dD/4 in number.
5. Justesen Codes
Theorem: The minimum distance of the (2mN, mK)
Justesen code constructed from an (N,K) RS code is
bounded by --
6. Justesen Codes
Proof:
The minimum weight RS codeword has N-K+1 distinct non-
zero symbols.
These will make N-K+1 nonzero pairs (ci,αici ) which appear
as distinct 2m-tuples.
The weight is atleast as large as word constructed by filling
N-K+1 2m-tuples by N-K+1 distinct 2m-tuples of smallest
weight.
In an m-tuple, there are (2
i
m) ways of picking i non-zero
places and (q-1) different non-zero values at each place.
Hence there is a weight I for every I that satisfies (2).
The minimum distance is at-least as large as the sum of the
weights of these pairs. Hence (1).
7. Justesen Codes
Disadvantage: Not very attractive for random error
correction.
Good only for long block-lengths.
Hence did not get popular.
Hence they do not have well developed collection of
decoding algorithms.
8. Alternant Codes- Limitations of BCH codes:
A BCH code over GF(q) of block length n = qm-1 is a
subfield-subcode of a Reed-Solomon code over GF(qm).
subfield-subcode has same length as original but fewer
codes.
BCH code consists of all those Reed-Solomon codes that
are GF(q)-valued.
BCH codes with large block length and large minimum
distance contain fewer codes.
But in BCH code, with increasing block length and fixed rate
R’ (k/n≥R’),normalized minimum distance d*/n approaches
zero.
Hence, the BCH code uses very few of many code words of
RS code or else has poor distance structure.
Alternant codes, a variation of BCH code, increases
minimum distance by reducing RS code to a subfield by
new way.
9. Alternant Codes
Alternant codes are linear codes that are a variation of BCH
codes defined such that in spite of fixed rate, large minimum
distance can be obtained.
Let n = qm-1,
A fixed n-vector h of nonzero components over GF(qm)
called (time-domain) template, is chosen.
Reed-Solomon code over GF(qm) with designed distance
2t+1 is chosen.
If Alternant code is GF(q)-valued vectors C and C’ is
codeword in RS code then-
c’i = ci hi for i= 0,1,…n-1 . (component-wise in Time domain)
hi is always nonzero.
So, let gi = hi
-1.
ci = gic’I for i= 0,1,…n-1 .
10. Alternant Codes
Minimum distance very large if template chosen properly.
Can be defined in frequency domain also.
Let h ≠ 0 and H is its frequency domain template.
Cyclic convolution H*C gives Reed-Solomon spectrum.
∑n-1
k=0
H((j-k)) Ck = 0 j = j0, … j0+ 2t-1.
If G is transform of vector gi ( =hi
-1), H*G is a delta function.
(If j=0, (H*G)j =1; otherwise (H*G)j =0.)
As polynomial this convolution becomes
H(x)G(x) = 1 (mod xn-1).
H(x) is a polynomial over GF(q), it has no roots in GF(qm).
Hence H(x) is prime to xn-1.
H(x)G(x) + (xn-1) F(x) =1
Hence H(x)G(x) = 1 (mod xn-1).
11. Alternant Codes
The alternant code C(α, h ) consists of all codewords of
GRSk0
which have components from GF(q).
C(α,h) consists of all vectors C over GF(q) such that CHT=0,
where H is given by H = Vr(α1 …αn) .diag(h1 …hn)
1 … 1 h1 0 . 0
α1 … αn 0 h2 . 0
H= α1
2 . αn
2 . 0 . 0
. . . . . . .
(α1)r-1 … (αn)r-1 0 0 . hn
h1 … hn
h1α1 … hnαn
H= . . .
. . .
h1(α1)r-1 … hn(αn)r-1
12. Alternant Codes - example
Decoding by any method used for BCH or RS codes.
GF(8)
BCH Code Reed-Solomon Code (7, 5, 3) Alternant code
g=(5, 6, 1, 4, 1, 1, 7)
0000000 0000000 0000000
0000163
0000276
0000315
0001011 0001011
0001172
0001304
0007077 0001011
0007114 0001111
0007217
0010073
0010110 0010110 0010110
13. Goppa Codes
Goppa code is the generalization of the class of BCH code.
BCH code can also be described alternately as –
Let a(x) and G(x) be two polynomials over same field with
no common factors.
By Euclid”s algorithm, a polynomial u(x) exists such that –
a(x) u(x) Ξ 1 mod G(x)
One option u(x) can be a-1(x) -- can be found under
modG(x).
THEOREM:- The q-ary narrow sense BCH code of length n
with designed distance d is equivalent to code
{ c єVn(q) ׀∑i=0
n-1
ci / (x – αi’ ) Ξ 0 (mod xd -1)}
-where α є GF(qm).
PROOF--
14. Goppa Codes
PROOF—
C will be a code of BCH if S1+ S2+ S3… S2t= 0
∑j=1
d-1
Sj= 0 (2t = d-1)
Hence S(x) =0 where S(x) = ∑j=1
d-1
Sjxj-1
with Sj= c(αj )
S(x) Ξ ∑j=1
d-1
∑i=0
n-1
ci αij xj-1
αi +α2i +α3i +…α(d-1)i
Ξ ∑i=0
n-1
ci ∑j=1
d-1
αij xj-1
Take αi out and expand the rest.
Ξ ∑i=0
n-1
ci αi[1+αi x+α2i x2
+… +α(d-1)i xd-1
] GP
Ξ ∑i=0
n-1
ci αi[1- α(d-1)i xd-1
]/ [1-αi x] mod(xd-1
)
15. Goppa Codes
Ξ ∑i=0
n-1
ci αi [1- α(d-1)i xd-1
]/ [1-αi x] mod(xd-1
)
Ξ ∑i=0
n-1
ci αi [1]/ [1-αi x] mod(xd-1
) 2nd term remainder is 0.
Ξ ∑i=0
n-1
ci / [α-i - x] mod(xd-1
)
Ξ - ∑i=0
n-1
ci / [x-α-i] mod(xd-1
)
Replacing α by 1/α will not alter the summation.
Hence proved for BCH code.
16. Goppa Codes
Goppa code of designed distance d is an alternant code of
designed distance d, with additional property that—
The inverse frequency template G has width d.
Inverse frequency template, called Goppa polynomial can
be described as G(x) with degree d-1.
A narrow sense Goppa code is a Goppa code with 2t parity
frequencies at locations α0, …..αn-2t+2, αn-2t+1
THEOREM:- Let L = {α0 , α1 , …, αn-1} be a subset of GF(qm)
of size n,and let G(x) be a polynomial of degree s over
GF(qm) but has no root from L then—Goppa code is given
by
Ғ(L,G) = { c єVn(q) ׀∑i=0
n-1
ci / (x – αi ) Ξ 0 (mod G(x))}
Taking G(x) = xd-1
–
Goppa codes contain BCH code as subclass.
17. Goppa Codes
THEOREM:- The narrow sense Goppa code over GF(q)
with block length n = qm -1 and with Goppa polynomial G(x)
is given by the set of all vectors c = (c0, …cn-1) over GF(q)
satisfying
∑i=0
n-1
ci’ Π (x – α-i) = 0 (mod G(x)) excluding self i≠i’
18. Goppa Codes -Example
Smallest example is (8, 2, 5) binary Goppa code.
G(x) = x2 + x + 1.
Roots(zeros) of G(x) are in GF(4) or in any extension of
GF(4).
Hence none are in GF(8).
Hence G(x) can be used to obtain a Goppa code with
blocklength 8, minimum distance of 5 and 2 information
symbols.
19. Goppa Codes -Example
Example: Let α be the primitive element in GF(24) satisfying
α4 + α3 + 1=0. Consider the binary Goppa code Ғ(L,G) of
length 12 with G(x)=(x+ α)(x+ α14) and L={αi ׀ 2 ≤ i ≤ 13}.
Find parity check matrix H.
G(x)=(x+ α)(x+ α14)= x2 + α8x + 1
α and α14 are used to generate G(x), while rest of 12
elements are member of L.
∑i=0
n-1
ci / (x – αi ) Ξ 0 (mod G(x))} for ci to be code.
Product of C and H should be zero for correct code ,
otherwise would give syndrome.
Hence H becomes inverse of (x – αi ). {αi ׀ 2 ≤ i ≤ 13}.
e.g. Lets find inverse of (x – α2 ) modulo G(x).
Let inverse of (x – α2 ) modulo G(x) is ax+b.
(x – α2 )(ax+b) Ξ 1(mod G(x))
22. Goppa Codes-- Decoding
THEOREM:- Let σ(x) and ω(x) be the error locator and error
evaluator polynomials of an error pattern of weight at most
[s/2] where s is degree of polynomial G(x) of Goppa code. (
s= n-k =d+1. i.e. s/2=t)
Then σ(x) = λ vi(x) and ω(x) = λ si(x)
where si(x) and vi(x) are obtained from Euclid’s Algorithm
applied to G(x) and S(x) (to find hcf or gcd λ) until
deg(si(x))<[s/2] for the first time and where λ is chosen such
that λ vi(x) is monic.
(Proof omitted. Ref:
hyperelliptic.org/tanja/teaching/CCI11/CODING.pdf.)
Roots of σ(x) and ω(x) together will give error location and
magnitude.