ENERGY-EFFICIENT ALGORITHMS FOR SENSOR NETWORKS

Size: px
Start display at page:

Download "ENERGY-EFFICIENT ALGORITHMS FOR SENSOR NETWORKS"

Transcription

1 ENERGY-EFFICIENT ALGORITHMS FOR SENSOR NETWORKS Prepared for: DARPA Prepared by: Krishnan Eswaran, Engineer Cornell University May 12, 2003 ENGRC 350 RESEARCH GROUP 2003 Krishnan Eswaran

2 Energy-Efficient Algorithms for Sensor Networks Krishnan Eswaran ii TABLE OF CONTENTS ABSTRACT... iii 1 INTRODUCTION METHODS RESULTS IDSQ Definition of Terms Sensor Selection The Algorithm Tracking Implementation DISCUS Asymmetric Approach Symmetric Approach CONCLUSIONS IDSQ Shortcomings DISCUS Shortcomings Addressing Issues LIST OF REFERENCES GLOSSARY.... G.1 LIST OF ILLUSTRATIONS Figure 1. Tracking Example with Sensor Networks Figure 2. Symmetric Coding Figure 3. IDSQ+DISCUS Comparison.... 6

3 Energy-Efficient Algorithms for Sensor Networks Krishnan Eswaran iii ABSTRACT This report presents two algorithms for sensor networks that save the energy used when sensors communicate. The first is Information Driven Sensor Querying (IDSQ). This technique uses a utility measure, such as the Mahalanobis distance or mutual information, to limit the number of sensors that need to communicate. The second technique is Distributed Source Coding Using Syndromes (DISCUS). This approach takes advantage of side information and redundancy among sensor readings to compress data, thereby reducing the number of bits sensors need to transmit. While these approaches save energy, by combining them into a single algorithm that uses IDSQ for tracking, and includes DISCUS as part of the communication system, we can save energy from both techniques.

4 Energy-Efficient Algorithms for Sensor Networks Krishnan Eswaran 1 1. INTRODUCTION Sensor networks inspire a lot of research, particularly in the areas of computer science, signal processing, and communications theory. The military already sees applications in the area of vehicle tracking, as demonstrated in figure 1. One of the major hurdles ad-hoc, wireless sensor networks face before they can be deployed, however, is that they need to use energy efficiently across the sensors. Sensor Tank Figure 1. Sensors can track vehicles by communicating their data from different locations, which interests the military. I will compare two algorithms that reduce energy usage in sensor networks. The first, called Information Driven Sensor Querying (IDSQ), was developed at the Palo Alto Research Center (PARC). This algorithm uses mutual information 1 as a utility measure, so a sensor only communicates with those sensors that will provide it with the most information. Since communication drains energy, by removing unnecessary communication, IDSQ saves energy [1]. The second algorithm, called Distributed Source Coding Using Syndromes (DISCUS), was developed by a professor at Berkeley and explored further at the University of Michigan. DISCUS is a compression technique that eliminates the energy wasted when sensors convey redundant data. Consider two sensors: A and B. When A receives information from B, entropy associated with A s data decreases. DISCUS takes advantage of the Slepian-Wolf coding theorem, which allows A to compress its data to the limit of the lower entropy even if it does not receive information from B [2], [3]. The effect is that sensors remove redundant data without having to communicate beforehand. When we compare IDSQ and DISCUS, certain questions arise. Are they feasible to implement? Do they minimize energy? Can they be combined? I explore these questions in the rest of this report. 2. METHODS My initial research in this area began while I was interning at PARC. I received most of the IDSQ papers there, and the rest of my papers came from engineering databases and the web. IEEE Xplore and Citeseer helped me retrieve papers cited by others and get background information on the topic. Professors who conduct research in sensor networks have web sites that list papers on this topic. This helped me find the DISCUS articles. The articles also cite books that I am using in my classes, so these became my final references. 1 Bold words indicate that the definition is in the glossary.

5 Energy-Efficient Algorithms for Sensor Networks Krishnan Eswaran 2 Although I found over twenty sources, only ten deal with the solutions I described in the introduction. Two of them are books that provide a theoretical framework for solving these problems [3], [4]. The papers base their arguments on the theories developed in these books. Of the eight papers, five explain the elements of IDSQ. Two of these papers describe approaches that the other three combine to develop the algorithm [5], [6], [1], [7], [8]. The final three papers outline the development of DISCUS. Two of these papers describe the general technique [2], [9], and the third puts the solution in the context of sensor networks [10]. The details in these papers form the bulk of my report. The main researchers that wrote these papers come from various institutions. While Feng Zhao, a researcher at PARC, led the development of IDSQ, Leonadis Guibas, a professor at Stanford, developed the theory for energy-efficient sensing used in its development [6]. DISCUS was principally developed at Berkeley by Professor Kannan Ramchandran and Sandeep Pradhan, his graduate student. Pradhan is now an assistant professor at the University of Michigan, where he is continuing research in this area. 3. RESULTS Through my research, I have discovered two algorithmic solutions that would save energy in places where sensor networks are vulnerable to wasting it. The first is IDSQ, which has already been used to track vehicles [7]. The second is DISCUS. While DISCUS has only been tested in simulation, it shows promise to reducing energy use in tracking applications. 3.1 Information Driven Sensor Querying (IDSQ) A trivial way to save energy in a sensor network would be to turn off all the sensors. Such an approach ignores our implicit goal: to use as little energy as possible when estimating the position of the vehicle we are tracking. If we keep only one sensor active, then we save as much energy as possible while still tracking our vehicle. This is the approach IDSQ takes, and we explain how it does so in the remainder of section Definition of Terms In IDSQ, we only have one sensor active. We call this sensor the leader node. The remaining sensors are follower nodes. The leader can use its measurement and measurements from follower nodes to determine the probability the vehicle is in a certain area. We express this probability formally as a conditional density in the following equation: p(x {z i } i U ) (1) where x = position of vehicle z i = measurement of sensor i U = set of sensors with measurements the leader knows.

6 Energy-Efficient Algorithms for Sensor Networks Krishnan Eswaran 3 We call equation (1) the belief state of the vehicle [8]. We can update the belief state to incorporate new measurements using a Kalman filter [4] Sensor Selection Our goal is to prioritize sensors that will provide us with the most useful measurements. To get these priorities, we use a utility function, and then update the belief state by going down a list of sensors ordered by this priority [6]. The leader stops requesting data from these sensors when it is satisfied with the quality of its belief state. The effect is that the leader calculates the belief state using only the sensors that provide the most utility. The right kind of utility measure would allow us to compute a belief state using the least number of sensor measurements possible. We call this utility measure the information utility, which includes information-theoretic measures, the Mahalanobis distance, and conditional expectation on posterior distributions. For more information, refer to [1]. The leader in an IDSQ system uses an information utility measure to determine which sensors to select to update its belief state. We now describe the algorithm used in such a system The Algorithm The algorithm, as described in [8], is as follows: 1. Initialization: The sensor network decides on a leader, and this leader receives sensor characteristics of the remaining sensors in the network, such as their positions. 2. Follower Nodes: If a node is not a leader, it remains idle until it receives a request from the leader to send it information. 3. Initial Sensor Reading: The leader calculates an initial belief state based on equation (1). For this calculation, the leader l knows only its own measurement, so we initialize the set U={l}. 4. Belief Quality Test: If the belief state passes some test of goodness, the leader finishes processing. 5. Sensor Selection: Based upon the belief state in equation (1) and the characteristics of other sensors, the leader selects a sensor j among the remaining sensors not in U that satisfies the criterion of an information utility measure. The leader then: requests sensor j s measurement. updates its belief state to include this measurement. adds sensor j to U, so that U = U {j} The algorithm goes back to step 3 and continues through the remaining steps. After we execute this algorithm, only the leader needs to be active since it contains all the relevant information about the vehicle s position Tracking Implementation Although our IDSQ algorithm outlines an approach to saving energy in sensor networks, a lot of the details in the algorithm are purposely left unspecified. In order to verify that we can track

7 Energy-Efficient Algorithms for Sensor Networks Krishnan Eswaran 4 vehicles using this model, we must implement the IDSQ algorithm into a tracking application. One such implementation already exists, and we describe its results in this section [7]. The IDSQ algorithm glosses over how to update the belief state, what utility measure to use, and how to test for goodness of a belief state. To update the belief state, we use a technique known as sequential Bayesian filtering [8]. The Kalman filter is a special case of sequential Bayesian filtering. To prioritize the measurements, we use mutual information as the utility measure. To track a moving vehicle, the leader should be close to sensors that contain useful data on the vehicle s position. The leader achieves this by making the sensor it selects in step 5 of the algorithm (outlined in section 3.1.3) the new leader [7]. This change, combined with our desire to track the vehicle indefinitely, eliminates the need for a belief quality test. Since the vehicle we track will undoubtedly move, changing the leader prevents the vehicle from moving out of the range of our tracking system. DARPA tested this implementation on an armored assault amphibious vehicle in Twenty-nine Palms, California. The system used acoustic amplitude sensors as well as direction of arrival (DOA) sensors to track the vehicle as it moved at a speed of about 15 miles per hour. Details about these results are in [7]. 3.2 Distributed Source Coding Using Syndromes (DISCUS) The more bits a sensor has to transmit, the more energy it uses. The best way to avoid this problem is to compress the data. We can compress these data with traditional source coding techniques, but the Slepian-Wolf Theorem tells us that sensors can compress their data as if they knew the data of other sensors [3]. Since sensor data is inherently distributed, we consider a distributed source coding approach that uses syndrome decoding to compress correlated data across different sensors [2]. We look at two approaches to DISCUS. The first is the asymmetric approach, which is conceptually straightforward. The second is the symmetric approach, which, while more complicated, is relevant to the type of communication that takes place in sensor networks Asymmetric Approach In channel coding, we use syndromes to locate and correct errors in data. Another way to look at syndromes is that they partition data into cosets, so that each coset contains symbols with the maximum number of differences from one another. We use this fact in the seemingly different case in which two sensors have correlated data such that there is exactly one bit that is different between the two. We call these sensors A and B. If sensor A wants to send its data to sensor B, it wastes data by sending all the bits. Instead, sensor A just sends the syndrome, which requires fewer bits. Sensor B then looks at all the vectors in the coset corresponding to this syndrome. Since the symbols in this coset are as different from one another as possible, only one of them will have a difference in exactly one bit from sensor B, and this is the value of the data in A. In the case of a Hamming-(7,4) code, we only transmit 3 bits instead of 7. This is the asymmetric DISCUS algorithm [2].

8 Energy-Efficient Algorithms for Sensor Networks Krishnan Eswaran 5 Since we might want to consider sending continuous valued data and use codes other than Hamming or repetition codes, we must also be able to construct cosets in these cases. Trellis codes provide a more sophisticated solution to this problem than Hamming-(7,4) codes. For further information, see [2] Symmetric Approach Although the asymmetric approach is conceptually simple, sensors in sensor networks communicate differently. The asymmetric framework assumes that one of the two sensors with correlated data will act as the decoder. This assumption does not hold in most tracking applications. Such applications typically have sensors with correlated data send data to a third sensor, as illustrated in figure 2. This is true of the IDSQ algorithm, in particular. We look at a solution to this problem, which extends the fundamental ideas of DISCUS to the symmetric case. In Figure 2 [10]. When two correlated sources are trying to send date to a third source, we consider a symmetric extension to the DISCUS approach. addition to source coding, we need to design channel subcodes for each encoder. The idea here is to partition a code that considers observations from both sensors into linearly independent subcodes. We then assign each subcode to an encoding sensor. Each encoder then sends the syndrome corresponding to its codeword to the decoding sensor. The decoder then looks at the most-likely codeword pair based on these syndromes [9]. Consider the trellis code based upon the Ungerboeck trellis. In this case, the rows of its generator matrix are linearly independent, and it contains exactly two rows. Using this fact, we can construct the following three-step algorithm [9]: 1. Determining Subcodes: We make each row a subcode, and assign each to one of our encoders. 2. Encoding: The encoders send the syndromes associated with their codewords to the decoder. 3. Decoding: The decoder takes the tensor product of the two syndromes, and uses the Viterbi algorithm to determine the most probable pair. This algorithm allows us to apply DISCUS in the symmetric case.

9 Energy-Efficient Algorithms for Sensor Networks Krishnan Eswaran 6 1 m 16 bits 16 bits (a) (b) 4 bits (c) (d) 4 bits Figure 3. Tracking system with distance between nodes all one meter: (a) This uses no energy-efficient algorithm, so we send a total of 192 bits. (b) In this IDSQ toy implementation, we send only 48 bits. (c) In this DISCUS implementation, we send only 48 bits. (d) In this combination IDSQ+DISCUS implementation, we send just 12 bits. 4. CONCLUSIONS Neither IDSQ nor DISCUS is optimal by itself. By examining their shortcomings, however, we determine ways to combine them to compensate for each other. To illustrate the effect of combining them, we rely on the toy example in figure 3. In the example, all sensors are in a grid format, and adjacent sensors are one meter apart. This setup causes the number of bits sent to correspond directly to the amount of energy required. With these restrictions, we see that a combined algorithm saves more energy than either IDSQ or DISCUS individually. These savings motivate the discussion in the remainder of section 4, in which we describe how to combine these algorithms. 4.1 IDSQ Shortcomings The IDSQ implementation outlined in [7] is a greedy algorithm, which limits its performance. The main problem occurs when IDSQ initially determines its belief state. Since we track moving

10 Energy-Efficient Algorithms for Sensor Networks Krishnan Eswaran 7 vehicles, if IDSQ relies on only one of its sensors at each iteration, it takes longer for it to get an accurate belief state. If IDSQ does not have an accurate belief state, it can select a new leader that is farther away from the vehicle. This selection could then cause IDSQ to lose track of the vehicle. A solution to this problem would be to develop routing applications on top of IDSQ, but such techniques would remove the energy savings that IDSQ introduces. 4.2 DISCUS Shortcomings The main shortcoming of DISCUS is that it is not designed to be a tracking application. All it does is provide a mechanism to conserve energy when such an application exists. 4.3 Addressing Issues To address the problems outlined in sections 4.2 and 4.3, we can combine the two algorithms. While this is not possible with the implementation described in [7], if we modify it to allow DISCUS to be part of the communication protocol, we can still develop an IDSQ tracker consistent with the algorithm in section When developing this hybrid tracker, we assume that all the sensors are of the same type, which would make the compression possible. In those cases in which different types of sensors exist, DISCUS will be difficult to implement. The main change we make to the implementation in [7] is to reintroduce the belief quality test. The test can simply be a time limit, which ensures the tracker selects a new leader before the vehicle moves out of range. This change will allow the leader to receive data from multiple sensors. These data can then be compressed using DISCUS. With more data, the leader will have a more accurate belief state when its selects a new leader, and because the data is compressed, the energy cost will be minimal. The effect is a more robust algorithm for the same energy cost. REFERENCES [1] F. Zhao, J. Shin, and J. Reich, Information-Driven Dynamic Sensor Collaboration for Tracking Applications, IEEE Signal Processing Magazine, vol. 19, no. 2, pp , March, [2] S. Pradhan and K. Ramchandran, Distributed Source Coding Using Syndromes (DISCUS): Design and Construction, Proceedings of IEEE Data Compression Conference (Snowbird, Utah, March 29-31, 1999, pp ). [3] T.M. Cover and J.A. Thomas, Elements of Information Theory. New York: Wiley, [4] H.V. Poor, Introduction to Signal Detection and Estimation. New York: Springer, [5] L. Guibas, Sensing, Tracking, and Reasoning with Relations, IEEE Signal Processing Magazine, vol. 19, no. 2, pp , March, 2002.

11 Energy-Efficient Algorithms for Sensor Networks Krishnan Eswaran 8 [6] J. Byers and G. Nasser, Utility-Based Decision Making in Wireless Sensor Networks, Proceedings of IEEE MobiHOC 2000 (Boston, MA, August 11, 2000, pp ). [7] J. Liu, J. Reich and F. Zhao, Collaborative In-Network Processing for Target Tracking, Journal on Applied Signal Processing, to appear, [8] M. Chu, H. Haussecker, and F. Zhao, Scalable Information-Driven Sensor Querying and Routing for ad hoc Heterogeneous Sensor Networks, International Journal of High- Performance Computing Applications, vol. 16, no. 3, pp , [9] S. Pradhan and K. Ramchandran, Distributed source coding: Symmetric rates and applications to sensor networks, Proceedings of IEEE Data Compression Conference (Snowbird, Utah, March 28-30, 2000, pp ). [10] S. Pradhan, J. Kusuma, and K. Ramchandran. Distributed Compression in a Dense Microsensor Network, IEEE Signal Processing Magazine, vol. 19, no. 2, pp , March, 2002.

12 Energy-Efficient Algorithms for Sensor Networks Krishnan Eswaran G.1 GLOSSARY Channel Coding Adding redundancy to data in a consistent manner in order to find and correct errors if the data is altered. Coset A set of data with the same syndrome. For instance, the coset corresponding to a syndrome of zero is the set of codewords. Greedy Algorithm This class of algorithms select items that are optimal in the short term. Unfortunately, they do not always lead to the optimal answer in the long term. Mutual information For any two random variables U and V, we define mutual information with the following equation: I(U;V) = p(u,v)log[p(u,v)/(p(u)p(v))]dudv (G.1) where p(u,v) = joint probability density function of U and V p(u) = marginal probability density of U p(v) = marginal probability density of V Source Coding Eliminating redundancy from data in a consistent manner (i.e. compression). Syndrome The syndrome tells us the bits that need to be flipped to turn our received data back into a codeword. For linear codes, we get the syndrome by multiplying our received vector by a parity check matrix. The following equation summarizes the approach: s = Hx (G.2) where H = parity check matrix x = received codeword, represented as a column vector s = syndrome of the parity check matrix If the received vector is one of our codewords, the syndrome will be a vector of zeros. Otherwise, the syndrome will indicate the location of errors from the closest codeword.

EE 8510: Multi-user Information Theory

EE 8510: Multi-user Information Theory EE 8510: Multi-user Information Theory Distributed Source Coding for Sensor Networks: A Coding Perspective Final Project Paper By Vikrham Gowreesunker Acknowledgment: Dr. Nihar Jindal Distributed Source

More information

Distributed Source Coding: A New Paradigm for Wireless Video?

Distributed Source Coding: A New Paradigm for Wireless Video? Distributed Source Coding: A New Paradigm for Wireless Video? Christine Guillemot, IRISA/INRIA, Campus universitaire de Beaulieu, 35042 Rennes Cédex, FRANCE Christine.Guillemot@irisa.fr The distributed

More information

Outline. Communications Engineering 1

Outline. Communications Engineering 1 Outline Introduction Signal, random variable, random process and spectra Analog modulation Analog to digital conversion Digital transmission through baseband channels Signal space representation Optimal

More information

Rate Adaptive Distributed Source-Channel Coding Using IRA Codes for Wireless Sensor Networks

Rate Adaptive Distributed Source-Channel Coding Using IRA Codes for Wireless Sensor Networks Rate Adaptive Distributed Source-Channel Coding Using IRA Codes for Wireless Sensor Networks Saikat Majumder and Shrish Verma Department of Electronics and Telecommunication, National Institute of Technology,

More information

A Computational Approach to the Joint Design of Distributed Data Compression and Data Dissemination in a Field-Gathering Wireless Sensor Network

A Computational Approach to the Joint Design of Distributed Data Compression and Data Dissemination in a Field-Gathering Wireless Sensor Network A Computational Approach to the Joint Design of Distributed Data Compression and Data Dissemination in a Field-Gathering Wireless Sensor Network Enrique J. Duarte-Melo, Mingyan Liu Electrical Engineering

More information

Hamming Codes as Error-Reducing Codes

Hamming Codes as Error-Reducing Codes Hamming Codes as Error-Reducing Codes William Rurik Arya Mazumdar Abstract Hamming codes are the first nontrivial family of error-correcting codes that can correct one error in a block of binary symbols.

More information

Background Dirty Paper Coding Codeword Binning Code construction Remaining problems. Information Hiding. Phil Regalia

Background Dirty Paper Coding Codeword Binning Code construction Remaining problems. Information Hiding. Phil Regalia Information Hiding Phil Regalia Department of Electrical Engineering and Computer Science Catholic University of America Washington, DC 20064 regalia@cua.edu Baltimore IEEE Signal Processing Society Chapter,

More information

Coding for the Slepian-Wolf Problem With Turbo Codes

Coding for the Slepian-Wolf Problem With Turbo Codes Coding for the Slepian-Wolf Problem With Turbo Codes Jan Bajcsy and Patrick Mitran Department of Electrical and Computer Engineering, McGill University Montréal, Québec, HA A7, Email: {jbajcsy, pmitran}@tsp.ece.mcgill.ca

More information

Course Developer: Ranjan Bose, IIT Delhi

Course Developer: Ranjan Bose, IIT Delhi Course Title: Coding Theory Course Developer: Ranjan Bose, IIT Delhi Part I Information Theory and Source Coding 1. Source Coding 1.1. Introduction to Information Theory 1.2. Uncertainty and Information

More information

Digital Television Lecture 5

Digital Television Lecture 5 Digital Television Lecture 5 Forward Error Correction (FEC) Åbo Akademi University Domkyrkotorget 5 Åbo 8.4. Error Correction in Transmissions Need for error correction in transmissions Loss of data during

More information

The Reachback Channel in Wireless Sensor Networks

The Reachback Channel in Wireless Sensor Networks The Reachback Channel in Wireless Sensor Networks Sergio D Servetto School of lectrical and Computer ngineering Cornell University http://peopleececornelledu/servetto/ DIMACS /1/0 Acknowledgements An-swol

More information

On Event Signal Reconstruction in Wireless Sensor Networks

On Event Signal Reconstruction in Wireless Sensor Networks On Event Signal Reconstruction in Wireless Sensor Networks Barış Atakan and Özgür B. Akan Next Generation Wireless Communications Laboratory Department of Electrical and Electronics Engineering Middle

More information

Collaborative Signal and Information Processing: An Information Directed Approach

Collaborative Signal and Information Processing: An Information Directed Approach PROCEEDINGS OF THE IEEE, 2003, TO APPEAR. 1 Collaborative Signal and Information Processing: An Information Directed Approach Feng Zhao, Jie Liu, Juan Liu, Leonidas Guibas, and James Reich Abstract This

More information

Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network

Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network International Journal Of Computational Engineering Research (ijceronline.com) Vol. 3 Issue. 3 Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network 1, Vinothkumar.G,

More information

Spreading Codes and Characteristics. Error Correction Codes

Spreading Codes and Characteristics. Error Correction Codes Spreading Codes and Characteristics and Error Correction Codes Global Navigational Satellite Systems (GNSS-6) Short course, NERTU Prasad Krishnan International Institute of Information Technology, Hyderabad

More information

Single Error Correcting Codes (SECC) 6.02 Spring 2011 Lecture #9. Checking the parity. Using the Syndrome to Correct Errors

Single Error Correcting Codes (SECC) 6.02 Spring 2011 Lecture #9. Checking the parity. Using the Syndrome to Correct Errors Single Error Correcting Codes (SECC) Basic idea: Use multiple parity bits, each covering a subset of the data bits. No two message bits belong to exactly the same subsets, so a single error will generate

More information

Error Correction with Hamming Codes

Error Correction with Hamming Codes Hamming Codes http://www2.rad.com/networks/1994/err_con/hamming.htm Error Correction with Hamming Codes Forward Error Correction (FEC), the ability of receiving station to correct a transmission error,

More information

Localization (Position Estimation) Problem in WSN

Localization (Position Estimation) Problem in WSN Localization (Position Estimation) Problem in WSN [1] Convex Position Estimation in Wireless Sensor Networks by L. Doherty, K.S.J. Pister, and L.E. Ghaoui [2] Semidefinite Programming for Ad Hoc Wireless

More information

1 This work was partially supported by NSF Grant No. CCR , and by the URI International Engineering Program.

1 This work was partially supported by NSF Grant No. CCR , and by the URI International Engineering Program. Combined Error Correcting and Compressing Codes Extended Summary Thomas Wenisch Peter F. Swaszek Augustus K. Uht 1 University of Rhode Island, Kingston RI Submitted to International Symposium on Information

More information

Error Detection and Correction

Error Detection and Correction . Error Detection and Companies, 27 CHAPTER Error Detection and Networks must be able to transfer data from one device to another with acceptable accuracy. For most applications, a system must guarantee

More information

MATHEMATICS IN COMMUNICATIONS: INTRODUCTION TO CODING. A Public Lecture to the Uganda Mathematics Society

MATHEMATICS IN COMMUNICATIONS: INTRODUCTION TO CODING. A Public Lecture to the Uganda Mathematics Society Abstract MATHEMATICS IN COMMUNICATIONS: INTRODUCTION TO CODING A Public Lecture to the Uganda Mathematics Society F F Tusubira, PhD, MUIPE, MIEE, REng, CEng Mathematical theory and techniques play a vital

More information

EE 435/535: Error Correcting Codes Project 1, Fall 2009: Extended Hamming Code. 1 Introduction. 2 Extended Hamming Code: Encoding. 1.

EE 435/535: Error Correcting Codes Project 1, Fall 2009: Extended Hamming Code. 1 Introduction. 2 Extended Hamming Code: Encoding. 1. EE 435/535: Error Correcting Codes Project 1, Fall 2009: Extended Hamming Code Project #1 is due on Tuesday, October 6, 2009, in class. You may turn the project report in early. Late projects are accepted

More information

Iterative Joint Source/Channel Decoding for JPEG2000

Iterative Joint Source/Channel Decoding for JPEG2000 Iterative Joint Source/Channel Decoding for JPEG Lingling Pu, Zhenyu Wu, Ali Bilgin, Michael W. Marcellin, and Bane Vasic Dept. of Electrical and Computer Engineering The University of Arizona, Tucson,

More information

Communication Theory II

Communication Theory II Communication Theory II Lecture 14: Information Theory (cont d) Ahmed Elnakib, PhD Assistant Professor, Mansoura University, Egypt March 25 th, 2015 1 Previous Lecture: Source Code Generation: Lossless

More information

A Hybrid Technique for Image Compression

A Hybrid Technique for Image Compression Australian Journal of Basic and Applied Sciences, 5(7): 32-44, 2011 ISSN 1991-8178 A Hybrid Technique for Image Compression Hazem (Moh'd Said) Abdel Majid Hatamleh Computer DepartmentUniversity of Al-Balqa

More information

Performance Evaluation of Low Density Parity Check codes with Hard and Soft decision Decoding

Performance Evaluation of Low Density Parity Check codes with Hard and Soft decision Decoding Performance Evaluation of Low Density Parity Check codes with Hard and Soft decision Decoding Shalini Bahel, Jasdeep Singh Abstract The Low Density Parity Check (LDPC) codes have received a considerable

More information

Lab/Project Error Control Coding using LDPC Codes and HARQ

Lab/Project Error Control Coding using LDPC Codes and HARQ Linköping University Campus Norrköping Department of Science and Technology Erik Bergfeldt TNE066 Telecommunications Lab/Project Error Control Coding using LDPC Codes and HARQ Error control coding is an

More information

Basics of Error Correcting Codes

Basics of Error Correcting Codes Basics of Error Correcting Codes Drawing from the book Information Theory, Inference, and Learning Algorithms Downloadable or purchasable: http://www.inference.phy.cam.ac.uk/mackay/itila/book.html CSE

More information

SensIT: Sensor Information Technology For the Warfighter

SensIT: Sensor Information Technology For the Warfighter SensIT: Sensor Information Technology For the Warfighter Srikanta Kumar, Ph.D. DARPA ITO 3701 North Fairfax Drive Arlington, VA 22203-1714 David Shepherd Strategic Analysis, Inc. 3601 Wilson Blvd Suite

More information

A Sphere Decoding Algorithm for MIMO

A Sphere Decoding Algorithm for MIMO A Sphere Decoding Algorithm for MIMO Jay D Thakar Electronics and Communication Dr. S & S.S Gandhy Government Engg College Surat, INDIA ---------------------------------------------------------------------***-------------------------------------------------------------------

More information

Multilevel RS/Convolutional Concatenated Coded QAM for Hybrid IBOC-AM Broadcasting

Multilevel RS/Convolutional Concatenated Coded QAM for Hybrid IBOC-AM Broadcasting IEEE TRANSACTIONS ON BROADCASTING, VOL. 46, NO. 1, MARCH 2000 49 Multilevel RS/Convolutional Concatenated Coded QAM for Hybrid IBOC-AM Broadcasting Sae-Young Chung and Hui-Ling Lou Abstract Bandwidth efficient

More information

International Journal of Scientific & Engineering Research, Volume 7, Issue 2, February ISSN

International Journal of Scientific & Engineering Research, Volume 7, Issue 2, February ISSN International Journal of Scientific & Engineering Research, Volume 7, Issue 2, February-2016 181 A NOVEL RANGE FREE LOCALIZATION METHOD FOR MOBILE SENSOR NETWORKS Anju Thomas 1, Remya Ramachandran 2 1

More information

Error Correcting Code

Error Correcting Code Error Correcting Code Robin Schriebman April 13, 2006 Motivation Even without malicious intervention, ensuring uncorrupted data is a difficult problem. Data is sent through noisy pathways and it is common

More information

n Based on the decision rule Po- Ning Chapter Po- Ning Chapter

n Based on the decision rule Po- Ning Chapter Po- Ning Chapter n Soft decision decoding (can be analyzed via an equivalent binary-input additive white Gaussian noise channel) o The error rate of Ungerboeck codes (particularly at high SNR) is dominated by the two codewords

More information

SHANNON S source channel separation theorem states

SHANNON S source channel separation theorem states IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 9, SEPTEMBER 2009 3927 Source Channel Coding for Correlated Sources Over Multiuser Channels Deniz Gündüz, Member, IEEE, Elza Erkip, Senior Member,

More information

AN INTRODUCTION TO ERROR CORRECTING CODES Part 2

AN INTRODUCTION TO ERROR CORRECTING CODES Part 2 AN INTRODUCTION TO ERROR CORRECTING CODES Part Jack Keil Wolf ECE 54 C Spring BINARY CONVOLUTIONAL CODES A binary convolutional code is a set of infinite length binary sequences which satisfy a certain

More information

Introduction to Coding Theory

Introduction to Coding Theory Coding Theory Massoud Malek Introduction to Coding Theory Introduction. Coding theory originated with the advent of computers. Early computers were huge mechanical monsters whose reliability was low compared

More information

MULTILEVEL CODING (MLC) with multistage decoding

MULTILEVEL CODING (MLC) with multistage decoding 350 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 52, NO. 3, MARCH 2004 Power- and Bandwidth-Efficient Communications Using LDPC Codes Piraporn Limpaphayom, Student Member, IEEE, and Kim A. Winick, Senior

More information

Information Theory and Communication Optimal Codes

Information Theory and Communication Optimal Codes Information Theory and Communication Optimal Codes Ritwik Banerjee rbanerjee@cs.stonybrook.edu c Ritwik Banerjee Information Theory and Communication 1/1 Roadmap Examples and Types of Codes Kraft Inequality

More information

TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS

TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS A Thesis by Masaaki Takahashi Bachelor of Science, Wichita State University, 28 Submitted to the Department of Electrical Engineering

More information

FREDRIK TUFVESSON ELECTRICAL AND INFORMATION TECHNOLOGY

FREDRIK TUFVESSON ELECTRICAL AND INFORMATION TECHNOLOGY 1 Information Transmission Chapter 5, Block codes FREDRIK TUFVESSON ELECTRICAL AND INFORMATION TECHNOLOGY 2 Methods of channel coding For channel coding (error correction) we have two main classes of codes,

More information

Integrated Source-Channel Decoding for Correlated Data-Gathering Sensor Networks

Integrated Source-Channel Decoding for Correlated Data-Gathering Sensor Networks Integrated Source-Channel Decoding for Correlated Data-Gathering Sensor Networks Sheryl L. Howard EE Department Northern Arizona University Flagstaff, AZ 86001 sheryl.howard@nau.edu Paul G. Flikkema EE

More information

Distributed Collaborative Path Planning in Sensor Networks with Multiple Mobile Sensor Nodes

Distributed Collaborative Path Planning in Sensor Networks with Multiple Mobile Sensor Nodes 7th Mediterranean Conference on Control & Automation Makedonia Palace, Thessaloniki, Greece June 4-6, 009 Distributed Collaborative Path Planning in Sensor Networks with Multiple Mobile Sensor Nodes Theofanis

More information

Computing functions over wireless networks

Computing functions over wireless networks This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 Unported License. Based on a work at decision.csl.illinois.edu See last page and http://creativecommons.org/licenses/by-nc-nd/3.0/

More information

Synchronization of Hamming Codes

Synchronization of Hamming Codes SYCHROIZATIO OF HAMMIG CODES 1 Synchronization of Hamming Codes Aveek Dutta, Pinaki Mukherjee Department of Electronics & Telecommunications, Institute of Engineering and Management Abstract In this report

More information

6. FUNDAMENTALS OF CHANNEL CODER

6. FUNDAMENTALS OF CHANNEL CODER 82 6. FUNDAMENTALS OF CHANNEL CODER 6.1 INTRODUCTION The digital information can be transmitted over the channel using different signaling schemes. The type of the signal scheme chosen mainly depends on

More information

3D-Assisted Image Feature Synthesis for Novel Views of an Object

3D-Assisted Image Feature Synthesis for Novel Views of an Object 3D-Assisted Image Feature Synthesis for Novel Views of an Object Hao Su* Fan Wang* Li Yi Leonidas Guibas * Equal contribution View-agnostic Image Retrieval Retrieval using AlexNet features Query Cross-view

More information

Error-Correcting Codes

Error-Correcting Codes Error-Correcting Codes Information is stored and exchanged in the form of streams of characters from some alphabet. An alphabet is a finite set of symbols, such as the lower-case Roman alphabet {a,b,c,,z}.

More information

Vector-LDPC Codes for Mobile Broadband Communications

Vector-LDPC Codes for Mobile Broadband Communications Vector-LDPC Codes for Mobile Broadband Communications Whitepaper November 23 Flarion Technologies, Inc. Bedminster One 35 Route 22/26 South Bedminster, NJ 792 Tel: + 98-947-7 Fax: + 98-947-25 www.flarion.com

More information

Introduction. Introduction ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS. Smart Wireless Sensor Systems 1

Introduction. Introduction ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS. Smart Wireless Sensor Systems 1 ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS Xiang Ji and Hongyuan Zha Material taken from Sensor Network Operations by Shashi Phoa, Thomas La Porta and Christopher Griffin, John Wiley,

More information

Nonuniform multi level crossing for signal reconstruction

Nonuniform multi level crossing for signal reconstruction 6 Nonuniform multi level crossing for signal reconstruction 6.1 Introduction In recent years, there has been considerable interest in level crossing algorithms for sampling continuous time signals. Driven

More information

On the Capacity of Multi-Hop Wireless Networks with Partial Network Knowledge

On the Capacity of Multi-Hop Wireless Networks with Partial Network Knowledge On the Capacity of Multi-Hop Wireless Networks with Partial Network Knowledge Alireza Vahid Cornell University Ithaca, NY, USA. av292@cornell.edu Vaneet Aggarwal Princeton University Princeton, NJ, USA.

More information

IEEE C /02R1. IEEE Mobile Broadband Wireless Access <http://grouper.ieee.org/groups/802/mbwa>

IEEE C /02R1. IEEE Mobile Broadband Wireless Access <http://grouper.ieee.org/groups/802/mbwa> 23--29 IEEE C82.2-3/2R Project Title Date Submitted IEEE 82.2 Mobile Broadband Wireless Access Soft Iterative Decoding for Mobile Wireless Communications 23--29

More information

Multicasting over Multiple-Access Networks

Multicasting over Multiple-Access Networks ing oding apacity onclusions ing Department of Electrical Engineering and omputer Sciences University of alifornia, Berkeley May 9, 2006 EE 228A Outline ing oding apacity onclusions 1 2 3 4 oding 5 apacity

More information

XOR Coding Scheme for Data Retransmissions with Different Benefits in DVB-IPDC Networks

XOR Coding Scheme for Data Retransmissions with Different Benefits in DVB-IPDC Networks XOR Coding Scheme for Data Retransmissions with Different Benefits in DVB-IPDC Networks You-Chiun Wang Department of Computer Science and Engineering, National Sun Yat-sen University, Kaohsiung, 80424,

More information

Design of Simulcast Paging Systems using the Infostream Cypher. Document Number Revsion B 2005 Infostream Pty Ltd. All rights reserved

Design of Simulcast Paging Systems using the Infostream Cypher. Document Number Revsion B 2005 Infostream Pty Ltd. All rights reserved Design of Simulcast Paging Systems using the Infostream Cypher Document Number 95-1003. Revsion B 2005 Infostream Pty Ltd. All rights reserved 1 INTRODUCTION 2 2 TRANSMITTER FREQUENCY CONTROL 3 2.1 Introduction

More information

DEGRADED broadcast channels were first studied by

DEGRADED broadcast channels were first studied by 4296 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 54, NO 9, SEPTEMBER 2008 Optimal Transmission Strategy Explicit Capacity Region for Broadcast Z Channels Bike Xie, Student Member, IEEE, Miguel Griot,

More information

Burst Error Correction Method Based on Arithmetic Weighted Checksums

Burst Error Correction Method Based on Arithmetic Weighted Checksums Engineering, 0, 4, 768-773 http://dxdoiorg/0436/eng04098 Published Online November 0 (http://wwwscirporg/journal/eng) Burst Error Correction Method Based on Arithmetic Weighted Checksums Saleh Al-Omar,

More information

On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT

On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT Syed Ali Jafar University of California Irvine Irvine, CA 92697-2625 Email: syed@uciedu Andrea Goldsmith Stanford University Stanford,

More information

Detecting and Correcting Bit Errors. COS 463: Wireless Networks Lecture 8 Kyle Jamieson

Detecting and Correcting Bit Errors. COS 463: Wireless Networks Lecture 8 Kyle Jamieson Detecting and Correcting Bit Errors COS 463: Wireless Networks Lecture 8 Kyle Jamieson Bit errors on links Links in a network go through hostile environments Both wired, and wireless: Scattering Diffraction

More information

A Numerical Approach to Understanding Oscillator Neural Networks

A Numerical Approach to Understanding Oscillator Neural Networks A Numerical Approach to Understanding Oscillator Neural Networks Natalie Klein Mentored by Jon Wilkins Networks of coupled oscillators are a form of dynamical network originally inspired by various biological

More information

Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks

Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks Ying Dai and Jie Wu Department of Computer and Information Sciences Temple University, Philadelphia, PA 19122 Email: {ying.dai,

More information

Error Protection: Detection and Correction

Error Protection: Detection and Correction Error Protection: Detection and Correction Communication channels are subject to noise. Noise distorts analog signals. Noise can cause digital signals to be received as different values. Bits can be flipped

More information

TCET3202 Analog and digital Communications II

TCET3202 Analog and digital Communications II NEW YORK CITY COLLEGE OF TECHNOLOGY The City University of New York DEPARTMENT: SUBJECT CODE AND TITLE: COURSE DESCRIPTION: REQUIRED COURSE Electrical and Telecommunications Engineering Technology TCET3202

More information

Nonlinear Multi-Error Correction Codes for Reliable MLC NAND Flash Memories Zhen Wang, Mark Karpovsky, Fellow, IEEE, and Ajay Joshi, Member, IEEE

Nonlinear Multi-Error Correction Codes for Reliable MLC NAND Flash Memories Zhen Wang, Mark Karpovsky, Fellow, IEEE, and Ajay Joshi, Member, IEEE IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 20, NO. 7, JULY 2012 1221 Nonlinear Multi-Error Correction Codes for Reliable MLC NAND Flash Memories Zhen Wang, Mark Karpovsky, Fellow,

More information

Channel Coding/Decoding. Hamming Method

Channel Coding/Decoding. Hamming Method Channel Coding/Decoding Hamming Method INFORMATION TRANSFER ACROSS CHANNELS Sent Received messages symbols messages source encoder Source coding Channel coding Channel Channel Source decoder decoding decoding

More information

Computing and Communications 2. Information Theory -Channel Capacity

Computing and Communications 2. Information Theory -Channel Capacity 1896 1920 1987 2006 Computing and Communications 2. Information Theory -Channel Capacity Ying Cui Department of Electronic Engineering Shanghai Jiao Tong University, China 2017, Autumn 1 Outline Communication

More information

A Practical Approach to Bitrate Control in Wireless Mesh Networks using Wireless Network Utility Maximization

A Practical Approach to Bitrate Control in Wireless Mesh Networks using Wireless Network Utility Maximization A Practical Approach to Bitrate Control in Wireless Mesh Networks using Wireless Network Utility Maximization EE359 Course Project Mayank Jain Department of Electrical Engineering Stanford University Introduction

More information

Collaborative transmission in wireless sensor networks

Collaborative transmission in wireless sensor networks Collaborative transmission in wireless sensor networks Cooperative transmission schemes Stephan Sigg Distributed and Ubiquitous Systems Technische Universität Braunschweig November 22, 2010 Stephan Sigg

More information

SENSOR PLACEMENT FOR MAXIMIZING LIFETIME PER UNIT COST IN WIRELESS SENSOR NETWORKS

SENSOR PLACEMENT FOR MAXIMIZING LIFETIME PER UNIT COST IN WIRELESS SENSOR NETWORKS SENSOR PACEMENT FOR MAXIMIZING IFETIME PER UNIT COST IN WIREESS SENSOR NETWORKS Yunxia Chen, Chen-Nee Chuah, and Qing Zhao Department of Electrical and Computer Engineering University of California, Davis,

More information

Joint Relaying and Network Coding in Wireless Networks

Joint Relaying and Network Coding in Wireless Networks Joint Relaying and Network Coding in Wireless Networks Sachin Katti Ivana Marić Andrea Goldsmith Dina Katabi Muriel Médard MIT Stanford Stanford MIT MIT Abstract Relaying is a fundamental building block

More information

Robust Reed Solomon Coded MPSK Modulation

Robust Reed Solomon Coded MPSK Modulation ITB J. ICT, Vol. 4, No. 2, 2, 95-4 95 Robust Reed Solomon Coded MPSK Modulation Emir M. Husni School of Electrical Engineering & Informatics, Institut Teknologi Bandung, Jl. Ganesha, Bandung 432, Email:

More information

Rab Nawaz. Prof. Zhang Wenyi

Rab Nawaz. Prof. Zhang Wenyi Rab Nawaz PhD Scholar (BL16006002) School of Information Science and Technology University of Science and Technology of China, Hefei Email: rabnawaz@mail.ustc.edu.cn Submitted to Prof. Zhang Wenyi wenyizha@ustc.edu.cn

More information

Column Generation. A short Introduction. Martin Riedler. AC Retreat

Column Generation. A short Introduction. Martin Riedler. AC Retreat Column Generation A short Introduction Martin Riedler AC Retreat Contents 1 Introduction 2 Motivation 3 Further Notes MR Column Generation June 29 July 1 2 / 13 Basic Idea We already heard about Cutting

More information

An Agent-based Heterogeneous UAV Simulator Design

An Agent-based Heterogeneous UAV Simulator Design An Agent-based Heterogeneous UAV Simulator Design MARTIN LUNDELL 1, JINGPENG TANG 1, THADDEUS HOGAN 1, KENDALL NYGARD 2 1 Math, Science and Technology University of Minnesota Crookston Crookston, MN56716

More information

Department of Electronics and Communication Engineering 1

Department of Electronics and Communication Engineering 1 UNIT I SAMPLING AND QUANTIZATION Pulse Modulation 1. Explain in detail the generation of PWM and PPM signals (16) (M/J 2011) 2. Explain in detail the concept of PWM and PAM (16) (N/D 2012) 3. What is the

More information

OFDM Pilot Optimization for the Communication and Localization Trade Off

OFDM Pilot Optimization for the Communication and Localization Trade Off SPCOMNAV Communications and Navigation OFDM Pilot Optimization for the Communication and Localization Trade Off A. Lee Swindlehurst Dept. of Electrical Engineering and Computer Science The Henry Samueli

More information

Intro to coding and convolutional codes

Intro to coding and convolutional codes Intro to coding and convolutional codes Lecture 11 Vladimir Stojanović 6.973 Communication System Design Spring 2006 Massachusetts Institute of Technology 802.11a Convolutional Encoder Rate 1/2 convolutional

More information

Lecture #2. EE 471C / EE 381K-17 Wireless Communication Lab. Professor Robert W. Heath Jr.

Lecture #2. EE 471C / EE 381K-17 Wireless Communication Lab. Professor Robert W. Heath Jr. Lecture #2 EE 471C / EE 381K-17 Wireless Communication Lab Professor Robert W. Heath Jr. Preview of today s lecture u Introduction to digital communication u Components of a digital communication system

More information

Contents Chapter 1: Introduction... 2

Contents Chapter 1: Introduction... 2 Contents Chapter 1: Introduction... 2 1.1 Objectives... 2 1.2 Introduction... 2 Chapter 2: Principles of turbo coding... 4 2.1 The turbo encoder... 4 2.1.1 Recursive Systematic Convolutional Codes... 4

More information

Block Markov Encoding & Decoding

Block Markov Encoding & Decoding 1 Block Markov Encoding & Decoding Deqiang Chen I. INTRODUCTION Various Markov encoding and decoding techniques are often proposed for specific channels, e.g., the multi-access channel (MAC) with feedback,

More information

A Brief Introduction to Information Theory and Lossless Coding

A Brief Introduction to Information Theory and Lossless Coding A Brief Introduction to Information Theory and Lossless Coding 1 INTRODUCTION This document is intended as a guide to students studying 4C8 who have had no prior exposure to information theory. All of

More information

Optimized Codes for the Binary Coded Side-Information Problem

Optimized Codes for the Binary Coded Side-Information Problem Optimized Codes for the Binary Coded Side-Information Problem Anne Savard, Claudio Weidmann ETIS / ENSEA - Université de Cergy-Pontoise - CNRS UMR 8051 F-95000 Cergy-Pontoise Cedex, France Outline 1 Introduction

More information

Digital Transmission using SECC Spring 2010 Lecture #7. (n,k,d) Systematic Block Codes. How many parity bits to use?

Digital Transmission using SECC Spring 2010 Lecture #7. (n,k,d) Systematic Block Codes. How many parity bits to use? Digital Transmission using SECC 6.02 Spring 2010 Lecture #7 How many parity bits? Dealing with burst errors Reed-Solomon codes message Compute Checksum # message chk Partition Apply SECC Transmit errors

More information

Intuitive Guide to Principles of Communications By Charan Langton Coding Concepts and Block Coding

Intuitive Guide to Principles of Communications By Charan Langton  Coding Concepts and Block Coding Intuitive Guide to Principles of Communications By Charan Langton www.complextoreal.com Coding Concepts and Block Coding It s hard to work in a noisy room as it makes it harder to think. Work done in such

More information

Time Synchronization and Distributed Modulation in Large-Scale Sensor Networks

Time Synchronization and Distributed Modulation in Large-Scale Sensor Networks Time Synchronization and Distributed Modulation in Large-Scale Sensor Networks Sergio D. Servetto School of Electrical and Computer Engineering Cornell University http://cn.ece.cornell.edu/ RPI Workshop

More information

Lecture 13 February 23

Lecture 13 February 23 EE/Stats 376A: Information theory Winter 2017 Lecture 13 February 23 Lecturer: David Tse Scribe: David L, Tong M, Vivek B 13.1 Outline olar Codes 13.1.1 Reading CT: 8.1, 8.3 8.6, 9.1, 9.2 13.2 Recap -

More information

Problem Sheet 1 Probability, random processes, and noise

Problem Sheet 1 Probability, random processes, and noise Problem Sheet 1 Probability, random processes, and noise 1. If F X (x) is the distribution function of a random variable X and x 1 x 2, show that F X (x 1 ) F X (x 2 ). 2. Use the definition of the cumulative

More information

On the Capacity Regions of Two-Way Diamond. Channels

On the Capacity Regions of Two-Way Diamond. Channels On the Capacity Regions of Two-Way Diamond 1 Channels Mehdi Ashraphijuo, Vaneet Aggarwal and Xiaodong Wang arxiv:1410.5085v1 [cs.it] 19 Oct 2014 Abstract In this paper, we study the capacity regions of

More information

Performance Analysis and Improvements for the Future Aeronautical Mobile Airport Communications System. Candidate: Paola Pulini Advisor: Marco Chiani

Performance Analysis and Improvements for the Future Aeronautical Mobile Airport Communications System. Candidate: Paola Pulini Advisor: Marco Chiani Performance Analysis and Improvements for the Future Aeronautical Mobile Airport Communications System (AeroMACS) Candidate: Paola Pulini Advisor: Marco Chiani Outline Introduction and Motivations Thesis

More information

Analysis on Color Filter Array Image Compression Methods

Analysis on Color Filter Array Image Compression Methods Analysis on Color Filter Array Image Compression Methods Sung Hee Park Electrical Engineering Stanford University Email: shpark7@stanford.edu Albert No Electrical Engineering Stanford University Email:

More information

AN IMPROVED NEURAL NETWORK-BASED DECODER SCHEME FOR SYSTEMATIC CONVOLUTIONAL CODE. A Thesis by. Andrew J. Zerngast

AN IMPROVED NEURAL NETWORK-BASED DECODER SCHEME FOR SYSTEMATIC CONVOLUTIONAL CODE. A Thesis by. Andrew J. Zerngast AN IMPROVED NEURAL NETWORK-BASED DECODER SCHEME FOR SYSTEMATIC CONVOLUTIONAL CODE A Thesis by Andrew J. Zerngast Bachelor of Science, Wichita State University, 2008 Submitted to the Department of Electrical

More information

Using TCM Techniques to Decrease BER Without Bandwidth Compromise. Using TCM Techniques to Decrease BER Without Bandwidth Compromise. nutaq.

Using TCM Techniques to Decrease BER Without Bandwidth Compromise. Using TCM Techniques to Decrease BER Without Bandwidth Compromise. nutaq. Using TCM Techniques to Decrease BER Without Bandwidth Compromise 1 Using Trellis Coded Modulation Techniques to Decrease Bit Error Rate Without Bandwidth Compromise Written by Jean-Benoit Larouche INTRODUCTION

More information

Bit-permuted coded modulation for polar codes

Bit-permuted coded modulation for polar codes Bit-permuted coded modulation for polar codes Saurabha R. Tavildar Email: tavildar at gmail arxiv:1609.09786v1 [cs.it] 30 Sep 2016 Abstract We consider the problem of using polar codes with higher order

More information

ECE 4400:693 - Information Theory

ECE 4400:693 - Information Theory ECE 4400:693 - Information Theory Dr. Nghi Tran Lecture 1: Introduction & Overview Dr. Nghi Tran (ECE-University of Akron) ECE 4400:693 Information Theory 1 / 26 Outline 1 Course Information 2 Course Overview

More information

LDPC Communication Project

LDPC Communication Project Communication Project Implementation and Analysis of codes over BEC Bar-Ilan university, school of engineering Chen Koker and Maytal Toledano Outline Definitions of Channel and Codes. Introduction to.

More information

Simple Algorithm in (older) Selection Diversity. Receiver Diversity Can we Do Better? Receiver Diversity Optimization.

Simple Algorithm in (older) Selection Diversity. Receiver Diversity Can we Do Better? Receiver Diversity Optimization. 18-452/18-750 Wireless Networks and Applications Lecture 6: Physical Layer Diversity and Coding Peter Steenkiste Carnegie Mellon University Spring Semester 2017 http://www.cs.cmu.edu/~prs/wirelesss17/

More information

EE521 Analog and Digital Communications

EE521 Analog and Digital Communications EE521 Analog and Digital Communications Questions Problem 1: SystemView... 3 Part A (25%... 3... 3 Part B (25%... 3... 3 Voltage... 3 Integer...3 Digital...3 Part C (25%... 3... 4 Part D (25%... 4... 4

More information

Decoding of Block Turbo Codes

Decoding of Block Turbo Codes Decoding of Block Turbo Codes Mathematical Methods for Cryptography Dedicated to Celebrate Prof. Tor Helleseth s 70 th Birthday September 4-8, 2017 Kyeongcheol Yang Pohang University of Science and Technology

More information

Visible Light Communication-based Indoor Positioning with Mobile Devices

Visible Light Communication-based Indoor Positioning with Mobile Devices Visible Light Communication-based Indoor Positioning with Mobile Devices Author: Zsolczai Viktor Introduction With the spreading of high power LED lighting fixtures, there is a growing interest in communication

More information