ICE1495 Independent Study for Undergraduate Project (IUP) A. Lie Detector. Prof. : Hyunchul Park Student : Jonghun Park Due date : 06/04/04
|
|
- Melissa Ryan
- 6 years ago
- Views:
Transcription
1 ICE1495 Independent Study for Undergraduate Project (IUP) A Lie Detector Prof. : Hyunchul Park Student : Jonghun Park Due date : 06/04/04
2 Contents ABSTRACT INTRODUCTION BASIC OF ECC... 2 BRIEF HISTORY OF ERROR CORRECTION CODE PROBLEM ANALYSIS AND RELATED ISSUES KEY CONCEPTS... 5 Shannon's Theorem... 5 Tradeoffs THEORETICAL REVIEW BEFORE ANALYZING ANALYSIS OF PROBLEM SOLVE THE PROBLEMS DECODING ALGORITHMS IMPLEMENTATION LIE DETECTOR WITH (7, 4, 3) HAMMING CODE BY JAVA SIMULATION AND PERFORMANCE ANALYSIS CONCLUSION REFERENCE [Senior Project] Jong-Hun Park 1
3 Abstract From now on, I explain the history and basic concept of Error Correcting Code. And we solve the given problem which is the system of lie-noise environment. And think about the decoding rules. Moreover, we saw the lie detector with a simple example and simulate one error correcting code for plotting BER curve. Core word : ECC, Hamming code, Hamming bound, decoding rule 1. Introduction When I chose this subject, I thought that process of this project is only to solve given problems, following text box. As time goes by, I however, had known that there were many things included this project. Also we can confirm some advantages using coding method rather than opposite one. However there is short time for completing this project, we constructed plan, and started immediately. The brief plan of this project like as,! First, because I have no idea about this, I had studied about ECC under T.A s assistance.! Second, try to solve the problem based what I had studied! Third, code the lie detector considering user interface! Forth, simulate this code with performance analysis Consequently, the purpose of this project, do my own project and follow upper schedule correctly. Also, I get some ideas of ECC and more familiar with matlab and Java. With such plan I started the project. The given problem description is as follow. Suppose that Bob will ask to Alice. Alice have one integer between zero to nine in her mind and she do not say it to Bob. By Bob s question, he wants to know the number in her mind. Some given questions are as follow. (And she just answer with yes or no ex) (1) Is your number is odd? (2) Is your number a member of {1,3,6,7}? For given situation, you consider the answers of following questions.. Q1. If Alice is saying only truth, how many questions are need to know her number? Q2.If she can say lie at most one times, how many questions are need to know her number? And what are contends of them? Q3. If she can say lie at most given t times (t>0), how many questions are need to know her number? And what are contends of them? Q4. Describe the relationship between upper three questions and Error Correcting Codes in Communication System. Now, let s sail notice the overall contends of ECC < Problem Description> 1.1 Basic of ECC Theoretical issue of this project is based on Error Correcting Code (ECC). Nowadays, ECC is used in many communication systems and storage devices, especially CD and DVD. [Senior Project] Jong-Hun Park 2 These systems and devices use information represented by binary sequences. When binary information is passed from one point to
4 another, there is always some chance that a mistake can be made; a 1 interpreted as a 0 or a 0 taken to be 1. This can be caused by channel noise m, media defects, electronic noise, component failures, poor connections, deterioration due to age, and other factors. When a bit is mistakenly interpreted, a bit error has occurred. Error correction is the process of detecting bit errors and correcting them and can be done in software or hardware. For high data rates, error correction must be done in special-purpose hardware because software is too slow. From now on, we consider ECC in communication system, related to given question. Figure 1 System Diagram Figure 1 is the simple block diagram of Communication system. Information source generate message signal and transmitter change it to others which can be easily and accurately transmitted to other points. Then transmitted signal pass through the channel, which add the noise signal to transmitted signal so, received signal into receiver is distorted compared with transmitted one. So, some devices need in receiver for correcting these errors came from channel. In other words, No digital or analog transmission is perfect. Each system makes errors at a certain rate. As data transfer rates densities increase, the raw error rate also increases. To reduce the error rate, Error correcting code is need. Our problem can be regarded as the problem of communication system between Alice and Bob. Because general noise of sound can be corrected by their ears, so, the lies of Alice s answers can be another noise. So, we can simulate this given situation. Brief history of error correction code. Around , the subject of information theory was created by Claude Shannon. The main result of Shannon's "Mathematical Theory of Communication" is that the only way to get the most storage capacity in a storage device or the fastest transmission through a communications channel is through the use of very powerful error correcting systems. During the same time period, Richard Hamming discovered and implemented a single-bit error correcting code. [Senior Project] Jong-Hun Park 3
5 In 1960, researchers, including Irving Reed and Gustave Solomon, discovered how to construct error correcting codes that could correct for an arbitrary number of bits or an arbitrary number of "bytes" where "byte" means a group of "w" bits. Even though the codes were discovered at this time, there still was no way known to decode the codes. The first textbook on error correcting codes was written in 1961 by W. Wesley Peterson. In 1968, Elwyn Berlekamp and James Massey discovered algorithms needed to build decoders for multiple error correcting codes. They came to be known as the Berlekamp-Massey algorithm for solving the key decoding equation. In the last 30 years, researchers have discovered that the Berlekamp-Massey algorithm is a variation of an ancient algorithm discovered in Egypt around 300 BC by Euclid and known as Euclid's extended algorithm for finding the greatest common divisor of two polynomials. Today, numerous variations of the Berlekamp-Massey and Euclid algorithms exist to solve the key decoding equation. More detail concepts of ECC will be discussed in next section with analyzed given problem. [Senior Project] Jong-Hun Park 4
6 2 Problem Analysis and related Issues 2.1 Key Concepts The error detecting and correcting capabilities of a particular coding scheme is correlated with its code rate and complexity. The code rate is the ratio of data bits to total bits transmitted in the code words. A high code rate means information content is high and coding overhead is low. However, the fewer bits used for coding redundancy, the less error protection is provided. A tradeoff must be made between bandwidth availability and the amount of error protection required for the communication. Shannon's Theorem Error coding techniques are based on information coding theory, an area developed from work by Claude Shannon. In 1948, Shannon presented a theory that states: given a code with a code rate R that is less than the communication channel capacity C, a code exists, for a block length of n bits, with code rate R that can be transmitted over the channel with an arbitrarily small probability of error. This would indicate that there is still much work to be done improving error coding techniques. Cryptography, the method of encrypting data for security rather than reliability, is also a descendant of Shannon's work. Tradeoffs When choosing a coding scheme for error protection, the types of errors that tend to occur on the communication channel must be considered. There are two types of errors that can occur on a communication channel: random bit errors and burst errors. A channel that usually has random bit errors will tend to have isolated bit flips during data transmissions and the bit errors are independent of each other. A channel with burst errors will tend to have clumps of bit errors that occur during one transmission. Error codes have been developed to specifically protect against both random bit errors and burst errors. 2.2 Theoretical Review before analyzing There are briefly three types of code technique, linear block code, CRC code and convolution code. For this project, before we analyze this problem, we should have some technical concepts of ECC, especially, linear block codes which we will focus on. Figure 2 Ben diagram of code space The basic concept of linear block code is that transmitter send codeword c, which consists of original message bit and other redundancy bits for correcting the errors. [Senior Project] Jong-Hun Park 5
7 Figure 3 Message generation As you can see figure 3, in order to make transmitted signal c, we use some algebraic form, generate matrix G, which is k by n.(n is the length of codeword and k is the length of message signal). Then, generated codeword c is modulated by modulator according to given channel condition. Then received signal includes channel noise. In mathematically, received signal r(t) is, r(t) = c(t) + n(t) : Generally n(t) is AWGN(Addictive White Gaussian Noise). Because of this, received codeword is changed. So, by passing through decoder, we should recover the original signal from detected signal. Recently, there are many linear block codes introduced, for example, Hamming code, Golay code, BCH code, Reed-Solomon codes which is broadly used in satellite communication. The only difference between these codes is how to generate G, H matrices. From now on, let s see more specific algorithm of (7, 4) Hamming code, which I will used for solving this project) In Hamming code, generate matrix is defined as follow, G= [I, A]; I am identity matrix of given dimension, and A is k by (n-k) matrix for making redundancy bits. Briefly, the codeword is generated by product of message signal and Generate matrix, c=m*g. According to composition of G, the kinds of codes are different. For repairing the detected signal, we use H matrix, whose composition is like this, H = [-A, I]; Then G*H =-A *I + I*A = -A + A =0 So, the multiplication of s=h*r(t), called syndrome of r, can be the clue of correction. Simply, syndrome will be (n-k) by 1 matrix. If there is no error, s will be zero vectors, but, if there is at least one error, the syndrome won t be zero vectors. Surprisingly, it will be one of column vector of H. And the position of the same column vector in H is the position of error in codeword. (7, 4) Hamming code has 3 additional [Senior Project] Jong-Hun Park 6
8 bits and it can detect 6 errors and correct one bit error code. 2.3Analysis of problem Figure 4 Problem diagram As I mentioned, situation of this problem can be represent one communication system. The main signals in this problem! m(t) = Alice true number " in binary, it can be represent 4bits code! n(t) = her lies! r(t) = her answers about my questions Then, how can we find her real number, even though we don t know whether she say a lie or not? 2.4 Solve the problems First problem is how many question is need to know the Alice number if she don t say a lie. By intuitive thinking, the solution is very easy. Because, there are only 10 integers, we can recognize the number in 4 (4= [log2 (10) =3.329], [] is upper bound). In other words, you can eliminate half of numbers per question. It is very simple. However, if she can lie one times, like second problem, how many questions are needed? This problem can not be solved by upper intuitive method. We can find the key of solution of this problem in (7, 4) hamming code which I mention at Section 2. Suppose of making encoder and decoder of upper communication system by (7, 4) hamming code. Then the summary of this situation is as follow,! We don t know original message signal m(t)! In order to know m(t), we should find r(t), which has noise bit and c(t), from asking some question to Alice! If we recognize r (t), because we already know G, H matrices, we can generate syndrome vector and c (t). It means that we can recognize original signal. So, the main point is finding r (t) by well constructed questions. Well constructed means, minimizing the number of questions, and generating no error. Generating questions such like this is the [Senior Project] Jong-Hun Park 7
9 hardest work of this project. However, the method is simple. First, we should know how many questions are needed for one error. The answer is related the basic concept of hamming code. This approach is a little bit tricky, but, frankly speaking, because this was my original approach, so I mentioned this. Minimum hamming distance of (7, 4) hamming code is 3. So, it can correct [(3-1)/2] =1 error by properties of this code. And because this code has 3 redundancy bits, so, we can guess for one error correcting we need 3 bits more. Then, how many well constructed questions are needed? The answer is as follow. (Suppose, this system is binary system)! Because the symbol, one bit can represent is only two! And the bit error consists of only two cases, one is decoding one to zero, the other is decoding zero to one! We just determine one bit which is one or zero, per each question. Therefore, we need only 7 questions when Alice is saying one lie. The way to make question is also simple. The i-th bit of code word C, is just zero or not. But we just encode her answer and C i are same. So, if you want to know C i and {A, B, C} where A, B, C are the numbers which of all have the condition, C i =1. Then, you can ask like is your number one of {A, B, C}. Then here answer (yes=1/no=0) will be C i. In follow simulation section, I made lie detector which can recover one lie with JAVA Swing. More specific mechanisms and results will be mentioned at that section. Third problem is the extension of second one, the case that if she is saying lies t-times. This problem cannot be solved by upper tricky approach. However, it also can be solved by one of the concepts of Hamming code, Hamming bound. Figure 5 Vector representations of codes [Senior Project] Jong-Hun Park 8
10 Upper diagram indicates (n,k) linear block code. The composition of this union is as follow.! There exist 2^n codes in this union.! The number of codeword is 2^k, which is the same as the number of possible symbol.! e is the number of correctable error. It makes circles centered to each codeword So, the relationship among n, k, e is obtained by follow steps 1 the number of codeword is 2^n 2 The total number of e[i] which will be regarded as the codeword[i] is sum of ncj where j is changed from zero to e. 3 total number of correctable codes is the product of 1 and 2 4 the result of 3 can not be larger than 2^n Because n-k is the number of redundancy bits, rearrange this in terms of r. As we found the meaning of r in second problem, the code which can correct e errors, need more redundant bits amount of right side of upper mathematical inequality equation? In ECC, this called Hamming Bound. In (7, 4) Hamming code, e e j= 0 ncj e log 2( ncj) j= 0 Min(r) Therefore, in third problem, by hamming bound, at least r bits which satisfy r = n k log 2( ncj) j= 0 Furthermore, the answer of forth problem is already described. Until now, based on we think about the general ECC concepts, we solved the given problems e [Senior Project] Jong-Hun Park 9
11 2.5 Decoding Algorithms As I mentioned at introduction, solving problems is not the core of this project. In my opinion, considering the reason why modern communication system started to apply the coding system, the main process which decides the efficiency is in the decoding system. If the decoding algorithm doesn t make the transmission system more efficiency compared with uncoding transmission system, there is no reason to use coding theory. First, the contrast of coding, let s think about the non-coding transmission through the noise channel. The decoding algorithm of non-coding transmission is just hard decision. So, there exist one or more decision boundaries which is the half of distance between continuously received two numbers (because of error, it is not integers). Second, let s think about the decoding algorithm of hamming code. The algorithm of hamming code is very simple. Another name of hamming decoding is Syndrome decoding. The reason why they called syndrome is they using it. H matrix which we saw previous, is the generate matrix of s, syndrome vector. The Hamming decoding algorithm, which corrects up to one bit error, is as follows: 1. Compute the syndrome s = y*ht for the received vector y. If s=0, then there are no errors. Return the received vector and exit. 2. Otherwise, determine the position j of the column of H that is the transpose of the syndrome. 3. Change the jth bit in the received word, and output the resulting code. As long as there is at most one bit error in the received vector, the result will be the codeword was sent. Lastly, let s think about Maximum Likelihood decoding. The goal of the sequence estimation is to find the code sequence copt for which the posteriori probability p(c r) is maximized: copt=arg (maxc p(c)*p(c r)). If use Bayes law p(r)p(c r) = p(c)p(r c) and constant factor p(r) is neglected, we can obtain: copt=arg (maxc p(c r)), where p(c) is the a priori probability of the sequence. Assume that the message sequence m = [m0, m1, m2, ] is encoded into the code sequence c = [c0, c1, c2,, ]. The received sequence is r = [r0, r1, r2, ]. The decoder produces an estimate of c based on the observation of r. The estimate is denoted by C =(c1,c2 ) The maximum likelihood (ML) decoder choose c iff P(r c)>p(r c ) or logp(r c) > log(r c ) where c c In general, path metric denoted by M(r, c) is not ML and its bit metric is M(ri, ci): # choose c iff M ( ri, ci) > M ( ri, c' i) where ci c i i For BSC, ML decision rule, choose c iff i dh ( r, ci) < dh ( r, c' i) ( For a ML receiver M ( ri, ci) = logp(ri ci)) Consequently, i ML ireceiver decision which has smaller Hamming distance to received signal. These three basic decision rules are used widely in decoding system. There is no best one, in other words, each method has own system which it perform with best efficiency. Next, let s implement with these different decoding ideas. [Senior Project] Jong-Hun Park 10
12 3 Implementation Until now, we see the background and the theoretical analysis of ECC especially linear block code. From now on, let s generates real lie detector and calculates its efficiency and accuracy by plotting BER with many samples. 3.1 Lie Detector with (7, 4, 3) Hamming Code by JAVA This lie detector can correct one lie, which means this has ability of one error correction. The inputs of this are the answers from Alice (user). And the outputs are the questions that will be answered and the report of finding the original number in her mind. Figure 6 Start screen of detector As you can see upper picture, there are one textfield and some buttons including the answer buttons. If you push the Run button program starts with some comments. Before I explain about the core source let s do one game if I think number 7 and I will lie at second question. First, I press run button then the screen was changed, and it give some questions which I answered only yes/no Figure 7 Lie detector Run_1 [Senior Project] Jong-Hun Park 11
13 Figure 8 Lie Detector Run_2 The program catches when I lied and what I think, correctly. Then, I will explain specific operation. Figure 9 Main frame of Lie Detector As you can see this program consists of large two classes. Class Detector is the main visual frame, which is based on JAVA Swing. First, one object of Detector, is visualized with the detector frame which contains menubar panels buttons and textfield. Then object a call method oper which defined at Module class. Class Module has two global variables, input number array actually Alice s answers, and numofq which contains how many numbers program ask. And Mudule class has more methods. Search() method do finding error and return the result report, and hxi() method returns syndrome vector to search() method. [Senior Project] Jong-Hun Park 12
14 And there are more methods for mod calculation and converting binary to decimal. The information flow is as follow 1. main function in class detector make one instance of detector() whose name is a 2. then visual lie detector is shown 3. when the buttons pushed, each actionlisteners act its own work. 4. if numofq is same as 6, the program show the output result. And the decoding method of this is syndrome method which I already mentioned at 2.5 Decoding Algorithm. There is no hard thing to implement with Java language. However, when I complete making this detector, I wondered how much efficiency one bit error correction has? Because, this algorithm can not correct more than single bit error, and it has poor correcting ability when the number of errors is more than 2. When I see the decoding process of following simulation, decoder makes two bit error signal to three bit error signal for decision. So, I am very confused. Let s think about details of this with follow simulation result. 3.2 Simulation and performance analysis As I mentioned, I just wondering the performance of (7, 4) hamming code, actually only one bit corrector performance compared with none coding without redundancy bit. Figure 10 BER per SNR As you can see, upper diagram indicates the BER level due to different SNR, red curve is the performance curve when it doesn t use coding method. (I generate this curve by hard decision.) Second [Senior Project] Jong-Hun Park 13
15 blue curve indicate BER curve using (7, 4) hamming coding, which use syndrome decoding method. And the last one is theoretical curve of (7, 4) hamming code correction. When I saw this performance curve, first, it s hard to understand this graph. However, I realize what I confused. This system send only 7bit, actually 4bit signal m, so, the channel which make the signal with 3bit error, can not used in communication system. So, simply just one bit error correcting can afford high correcting performance. From the paper, Heidi Steendam and Marc Moeneclaey ML-Performance of Low-Density Parity-Check Codes, I can get the upper bound of theoretical curve. BER k Q( 2 N 2 j= 0 dh ( bj,0) * SNR * dh( cj,0))* K When BER = about 10 4, the SNR difference between theoretical curve and syndrome decoding is about 1.5 db, however, the difference between Syndrome decoding and no coding curve is more than 2dB, actually difference between uncoding curve and theoretical curve is about 4 db of SNR. So, we can conclude this simulated (7,4) hamming code has more performance is good and when using coding method the BER value is decreased when it doesn t. Figure 11 BER comparison between ML decode and Syndrome decode Figure 11 is the optional comparison which compare the performance between ML decoding and Syndrome decoding. In this experiment, we can find the performances are almost same. The reason why this two are same is, I think, this code delivery only 4bit signal. From my research, ML decoding is generally more efficient than syndrome decoding. [Senior Project] Jong-Hun Park 14
16 5. Conclusion Though this reports, we confirm history and basic concept of Error Correcting Code. And we solve the given problem which is the system of lie-noise environment. Furthermore, we saw the lie detector with a simple example and simulate one error correcting code for plotting BER curve. From this curve, we confirm the coding method decrease BER, efficiently. Hamming code is almost primitive Error Correcting code, because now days no one uses for main encode/decode method. However, we confirm even hamming code have more powerful performance rather than non_coding transmission system. So, though frequency spectrum capability is decreased by using ECC, if using more powerful coding such as Golay, BCH, or Reed-Solomon Code, the BER curve will be more closed to Shannon s bound. And this technique will be used wildly at storage and communication technology such as DVD, and special communication system which needs non error but high bit rate or symbol rate. I hope that with closing, the appearance of more powerful code which will break the Shannon bound. 6. Reference 1. Wade Trappe and Lwarence C. Washington Introduction to Cryptography with Coding Theory 2. Shu Lin and Daniel Costello, Jr. Error Control Coding, prentice Hall, W.Weslet Peterson and E.J.Weldon, Jr. Error-correcting Codes,2 nd ed., MIT press, Ling-Pei Kung introduction to Error correcting code 5. 이윤미황인경시립인천대학교, [7,4] Hamming Code Encoder 와 Decoder 의설계 6. Heidi Steendam and Marc Moeneclaey ML-Performance of Low-Density Parity-Check Codes [Senior Project] Jong-Hun Park 15
Outline. Communications Engineering 1
Outline Introduction Signal, random variable, random process and spectra Analog modulation Analog to digital conversion Digital transmission through baseband channels Signal space representation Optimal
More informationLecture 17 Components Principles of Error Control Borivoje Nikolic March 16, 2004.
EE29C - Spring 24 Advanced Topics in Circuit Design High-Speed Electrical Interfaces Lecture 17 Components Principles of Error Control Borivoje Nikolic March 16, 24. Announcements Project phase 1 is posted
More informationEE 435/535: Error Correcting Codes Project 1, Fall 2009: Extended Hamming Code. 1 Introduction. 2 Extended Hamming Code: Encoding. 1.
EE 435/535: Error Correcting Codes Project 1, Fall 2009: Extended Hamming Code Project #1 is due on Tuesday, October 6, 2009, in class. You may turn the project report in early. Late projects are accepted
More informationSimulink Modelling of Reed-Solomon (Rs) Code for Error Detection and Correction
Simulink Modelling of Reed-Solomon (Rs) Code for Error Detection and Correction Okeke. C Department of Electrical /Electronics Engineering, Michael Okpara University of Agriculture, Umudike, Abia State,
More informationBasics of Error Correcting Codes
Basics of Error Correcting Codes Drawing from the book Information Theory, Inference, and Learning Algorithms Downloadable or purchasable: http://www.inference.phy.cam.ac.uk/mackay/itila/book.html CSE
More informationDigital Television Lecture 5
Digital Television Lecture 5 Forward Error Correction (FEC) Åbo Akademi University Domkyrkotorget 5 Åbo 8.4. Error Correction in Transmissions Need for error correction in transmissions Loss of data during
More informationS Coding Methods (5 cr) P. Prerequisites. Literature (1) Contents
S-72.3410 Introduction 1 S-72.3410 Introduction 3 S-72.3410 Coding Methods (5 cr) P Lectures: Mondays 9 12, room E110, and Wednesdays 9 12, hall S4 (on January 30th this lecture will be held in E111!)
More informationMATHEMATICS IN COMMUNICATIONS: INTRODUCTION TO CODING. A Public Lecture to the Uganda Mathematics Society
Abstract MATHEMATICS IN COMMUNICATIONS: INTRODUCTION TO CODING A Public Lecture to the Uganda Mathematics Society F F Tusubira, PhD, MUIPE, MIEE, REng, CEng Mathematical theory and techniques play a vital
More informationChannel Coding/Decoding. Hamming Method
Channel Coding/Decoding Hamming Method INFORMATION TRANSFER ACROSS CHANNELS Sent Received messages symbols messages source encoder Source coding Channel coding Channel Channel Source decoder decoding decoding
More informationDecoding of Block Turbo Codes
Decoding of Block Turbo Codes Mathematical Methods for Cryptography Dedicated to Celebrate Prof. Tor Helleseth s 70 th Birthday September 4-8, 2017 Kyeongcheol Yang Pohang University of Science and Technology
More informationSingle Error Correcting Codes (SECC) 6.02 Spring 2011 Lecture #9. Checking the parity. Using the Syndrome to Correct Errors
Single Error Correcting Codes (SECC) Basic idea: Use multiple parity bits, each covering a subset of the data bits. No two message bits belong to exactly the same subsets, so a single error will generate
More informationImplementation of Reed-Solomon RS(255,239) Code
Implementation of Reed-Solomon RS(255,239) Code Maja Malenko SS. Cyril and Methodius University - Faculty of Electrical Engineering and Information Technologies Karpos II bb, PO Box 574, 1000 Skopje, Macedonia
More informationSpreading Codes and Characteristics. Error Correction Codes
Spreading Codes and Characteristics and Error Correction Codes Global Navigational Satellite Systems (GNSS-6) Short course, NERTU Prasad Krishnan International Institute of Information Technology, Hyderabad
More informationIJESRT. (I2OR), Publication Impact Factor: 3.785
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY ERROR DETECTION USING BINARY BCH (55, 15, 5) CODES Sahana C*, V Anandi *M.Tech,Dept of Electronics & Communication, M S Ramaiah
More informationError Protection: Detection and Correction
Error Protection: Detection and Correction Communication channels are subject to noise. Noise distorts analog signals. Noise can cause digital signals to be received as different values. Bits can be flipped
More informationECE 6640 Digital Communications
ECE 6640 Digital Communications Dr. Bradley J. Bazuin Assistant Professor Department of Electrical and Computer Engineering College of Engineering and Applied Sciences Chapter 8 8. Channel Coding: Part
More informationInternational Journal of Engineering Research in Electronics and Communication Engineering (IJERECE) Vol 1, Issue 5, April 2015
Implementation of Error Trapping Techniqe In Cyclic Codes Using Lab VIEW [1] Aneetta Jose, [2] Hena Prince, [3] Jismy Tom, [4] Malavika S, [5] Indu Reena Varughese Electronics and Communication Dept. Amal
More informationBER Analysis of BPSK for Block Codes and Convolution Codes Over AWGN Channel
International Journal of Pure and Applied Mathematics Volume 114 No. 11 2017, 221-230 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu BER Analysis
More informationLDPC Decoding: VLSI Architectures and Implementations
LDPC Decoding: VLSI Architectures and Implementations Module : LDPC Decoding Ned Varnica varnica@gmail.com Marvell Semiconductor Inc Overview Error Correction Codes (ECC) Intro to Low-density parity-check
More informationIntroduction to Coding Theory
Coding Theory Massoud Malek Introduction to Coding Theory Introduction. Coding theory originated with the advent of computers. Early computers were huge mechanical monsters whose reliability was low compared
More informationPhysical Layer: Modulation, FEC. Wireless Networks: Guevara Noubir. S2001, COM3525 Wireless Networks Lecture 3, 1
Wireless Networks: Physical Layer: Modulation, FEC Guevara Noubir Noubir@ccsneuedu S, COM355 Wireless Networks Lecture 3, Lecture focus Modulation techniques Bit Error Rate Reducing the BER Forward Error
More informationERROR CONTROL CODING From Theory to Practice
ERROR CONTROL CODING From Theory to Practice Peter Sweeney University of Surrey, Guildford, UK JOHN WILEY & SONS, LTD Contents 1 The Principles of Coding in Digital Communications 1.1 Error Control Schemes
More informationBlock code Encoder. In some applications, message bits come in serially rather than in large blocks. WY Tam - EIE POLYU
Convolutional Codes In block coding, the encoder accepts a k-bit message block and generates an n-bit code word. Thus, codewords are produced on a block-by-block basis. Buffering is needed. m 1 m 2 Block
More informationDigital Transmission using SECC Spring 2010 Lecture #7. (n,k,d) Systematic Block Codes. How many parity bits to use?
Digital Transmission using SECC 6.02 Spring 2010 Lecture #7 How many parity bits? Dealing with burst errors Reed-Solomon codes message Compute Checksum # message chk Partition Apply SECC Transmit errors
More informationError Control Coding. Aaron Gulliver Dept. of Electrical and Computer Engineering University of Victoria
Error Control Coding Aaron Gulliver Dept. of Electrical and Computer Engineering University of Victoria Topics Introduction The Channel Coding Problem Linear Block Codes Cyclic Codes BCH and Reed-Solomon
More informationEDI042 Error Control Coding (Kodningsteknik)
EDI042 Error Control Coding (Kodningsteknik) Chapter 1: Introduction Michael Lentmaier November 3, 2014 Michael Lentmaier, Fall 2014 EDI042 Error Control Coding: Chapter 1 1 / 26 Course overview I Lectures:
More informationCommunications Theory and Engineering
Communications Theory and Engineering Master's Degree in Electronic Engineering Sapienza University of Rome A.A. 2018-2019 Channel Coding The channel encoder Source bits Channel encoder Coded bits Pulse
More informationPerformance of Combined Error Correction and Error Detection for very Short Block Length Codes
Performance of Combined Error Correction and Error Detection for very Short Block Length Codes Matthias Breuninger and Joachim Speidel Institute of Telecommunications, University of Stuttgart Pfaffenwaldring
More informationUsing TCM Techniques to Decrease BER Without Bandwidth Compromise. Using TCM Techniques to Decrease BER Without Bandwidth Compromise. nutaq.
Using TCM Techniques to Decrease BER Without Bandwidth Compromise 1 Using Trellis Coded Modulation Techniques to Decrease Bit Error Rate Without Bandwidth Compromise Written by Jean-Benoit Larouche INTRODUCTION
More informationA Survey of Advanced FEC Systems
A Survey of Advanced FEC Systems Eric Jacobsen Minister of Algorithms, Intel Labs Communication Technology Laboratory/ Radio Communications Laboratory July 29, 2004 With a lot of material from Bo Xia,
More informationFREDRIK TUFVESSON ELECTRICAL AND INFORMATION TECHNOLOGY
1 Information Transmission Chapter 5, Block codes FREDRIK TUFVESSON ELECTRICAL AND INFORMATION TECHNOLOGY 2 Methods of channel coding For channel coding (error correction) we have two main classes of codes,
More informationAN IMPROVED NEURAL NETWORK-BASED DECODER SCHEME FOR SYSTEMATIC CONVOLUTIONAL CODE. A Thesis by. Andrew J. Zerngast
AN IMPROVED NEURAL NETWORK-BASED DECODER SCHEME FOR SYSTEMATIC CONVOLUTIONAL CODE A Thesis by Andrew J. Zerngast Bachelor of Science, Wichita State University, 2008 Submitted to the Department of Electrical
More information6. FUNDAMENTALS OF CHANNEL CODER
82 6. FUNDAMENTALS OF CHANNEL CODER 6.1 INTRODUCTION The digital information can be transmitted over the channel using different signaling schemes. The type of the signal scheme chosen mainly depends on
More informationDetecting and Correcting Bit Errors. COS 463: Wireless Networks Lecture 8 Kyle Jamieson
Detecting and Correcting Bit Errors COS 463: Wireless Networks Lecture 8 Kyle Jamieson Bit errors on links Links in a network go through hostile environments Both wired, and wireless: Scattering Diffraction
More information6.004 Computation Structures Spring 2009
MIT OpenCourseWare http://ocw.mit.edu 6.004 Computation Structures Spring 2009 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. Welcome to 6.004! Course
More informationIntuitive Guide to Principles of Communications By Charan Langton Coding Concepts and Block Coding
Intuitive Guide to Principles of Communications By Charan Langton www.complextoreal.com Coding Concepts and Block Coding It s hard to work in a noisy room as it makes it harder to think. Work done in such
More informationECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013
ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013 Lecture 18 Today: (1) da Silva Discussion, (2) Error Correction Coding, (3) Error Detection (CRC) HW 8 due Tue. HW 9 (on Lectures
More informationLab/Project Error Control Coding using LDPC Codes and HARQ
Linköping University Campus Norrköping Department of Science and Technology Erik Bergfeldt TNE066 Telecommunications Lab/Project Error Control Coding using LDPC Codes and HARQ Error control coding is an
More informationCourse Developer: Ranjan Bose, IIT Delhi
Course Title: Coding Theory Course Developer: Ranjan Bose, IIT Delhi Part I Information Theory and Source Coding 1. Source Coding 1.1. Introduction to Information Theory 1.2. Uncertainty and Information
More informationIMPERIAL COLLEGE of SCIENCE, TECHNOLOGY and MEDICINE, DEPARTMENT of ELECTRICAL and ELECTRONIC ENGINEERING.
IMPERIAL COLLEGE of SCIENCE, TECHNOLOGY and MEDICINE, DEPARTMENT of ELECTRICAL and ELECTRONIC ENGINEERING. COMPACT LECTURE NOTES on COMMUNICATION THEORY. Prof. Athanassios Manikas, version Spring 22 Digital
More informationPerformance Optimization of Hybrid Combination of LDPC and RS Codes Using Image Transmission System Over Fading Channels
European Journal of Scientific Research ISSN 1450-216X Vol.35 No.1 (2009), pp 34-42 EuroJournals Publishing, Inc. 2009 http://www.eurojournals.com/ejsr.htm Performance Optimization of Hybrid Combination
More informationError Correction with Hamming Codes
Hamming Codes http://www2.rad.com/networks/1994/err_con/hamming.htm Error Correction with Hamming Codes Forward Error Correction (FEC), the ability of receiving station to correct a transmission error,
More informationLecture 4: Wireless Physical Layer: Channel Coding. Mythili Vutukuru CS 653 Spring 2014 Jan 16, Thursday
Lecture 4: Wireless Physical Layer: Channel Coding Mythili Vutukuru CS 653 Spring 2014 Jan 16, Thursday Channel Coding Modulated waveforms disrupted by signal propagation through wireless channel leads
More informationECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013
ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013 Lecture 18 Today: (1) da Silva Discussion, (2) Error Correction Coding, (3) Error Detection (CRC) HW 8 due Tue. HW 9 (on Lectures
More informationSynchronization of Hamming Codes
SYCHROIZATIO OF HAMMIG CODES 1 Synchronization of Hamming Codes Aveek Dutta, Pinaki Mukherjee Department of Electronics & Telecommunications, Institute of Engineering and Management Abstract In this report
More informationPage 1. Outline. Basic Idea. Hamming Distance. Hamming Distance Visual: HD=2
Outline Basic Concepts Physical Redundancy Error Detecting/Correcting Codes Re-Execution Techniques Backward Error Recovery Techniques Basic Idea Start with k-bit data word Add r check bits Total = n-bit
More informationIEEE C /02R1. IEEE Mobile Broadband Wireless Access <http://grouper.ieee.org/groups/802/mbwa>
23--29 IEEE C82.2-3/2R Project Title Date Submitted IEEE 82.2 Mobile Broadband Wireless Access Soft Iterative Decoding for Mobile Wireless Communications 23--29
More informationHamming Codes as Error-Reducing Codes
Hamming Codes as Error-Reducing Codes William Rurik Arya Mazumdar Abstract Hamming codes are the first nontrivial family of error-correcting codes that can correct one error in a block of binary symbols.
More informationECE 6640 Digital Communications
ECE 6640 Digital Communications Dr. Bradley J. Bazuin Assistant Professor Department of Electrical and Computer Engineering College of Engineering and Applied Sciences Chapter 8 8. Channel Coding: Part
More informationCT-516 Advanced Digital Communications
CT-516 Advanced Digital Communications Yash Vasavada Winter 2017 DA-IICT Lecture 17 Channel Coding and Power/Bandwidth Tradeoff 20 th April 2017 Power and Bandwidth Tradeoff (for achieving a particular
More informationPerformance Evaluation of Low Density Parity Check codes with Hard and Soft decision Decoding
Performance Evaluation of Low Density Parity Check codes with Hard and Soft decision Decoding Shalini Bahel, Jasdeep Singh Abstract The Low Density Parity Check (LDPC) codes have received a considerable
More informationImprovement Of Block Product Turbo Coding By Using A New Concept Of Soft Hamming Decoder
European Scientific Journal June 26 edition vol.2, No.8 ISSN: 857 788 (Print) e - ISSN 857-743 Improvement Of Block Product Turbo Coding By Using A New Concept Of Soft Hamming Decoder Alaa Ghaith, PhD
More informationError-Correcting Codes
Error-Correcting Codes Information is stored and exchanged in the form of streams of characters from some alphabet. An alphabet is a finite set of symbols, such as the lower-case Roman alphabet {a,b,c,,z}.
More informationConvolutional Coding Using Booth Algorithm For Application in Wireless Communication
Available online at www.interscience.in Convolutional Coding Using Booth Algorithm For Application in Wireless Communication Sishir Kalita, Parismita Gogoi & Kandarpa Kumar Sarma Department of Electronics
More informationError Correcting Code
Error Correcting Code Robin Schriebman April 13, 2006 Motivation Even without malicious intervention, ensuring uncorrupted data is a difficult problem. Data is sent through noisy pathways and it is common
More informationContents Chapter 1: Introduction... 2
Contents Chapter 1: Introduction... 2 1.1 Objectives... 2 1.2 Introduction... 2 Chapter 2: Principles of turbo coding... 4 2.1 The turbo encoder... 4 2.1.1 Recursive Systematic Convolutional Codes... 4
More informationImplementation of Different Interleaving Techniques for Performance Evaluation of CDMA System
Implementation of Different Interleaving Techniques for Performance Evaluation of CDMA System Anshu Aggarwal 1 and Vikas Mittal 2 1 Anshu Aggarwal is student of M.Tech. in the Department of Electronics
More informationDepartment of Electronic Engineering FINAL YEAR PROJECT REPORT
Department of Electronic Engineering FINAL YEAR PROJECT REPORT BEngECE-2009/10-- Student Name: CHEUNG Yik Juen Student ID: Supervisor: Prof.
More informationWhite Paper FEC In Optical Transmission. Giacomo Losio ProLabs Head of Technology
White Paper FEC In Optical Transmission Giacomo Losio ProLabs Head of Technology 2014 FEC In Optical Transmission When we introduced the DWDM optics, we left out one important ingredient that really makes
More informationHigh-Rate Non-Binary Product Codes
High-Rate Non-Binary Product Codes Farzad Ghayour, Fambirai Takawira and Hongjun Xu School of Electrical, Electronic and Computer Engineering University of KwaZulu-Natal, P. O. Box 4041, Durban, South
More informationQUESTION BANK EC 1351 DIGITAL COMMUNICATION YEAR / SEM : III / VI UNIT I- PULSE MODULATION PART-A (2 Marks) 1. What is the purpose of sample and hold
QUESTION BANK EC 1351 DIGITAL COMMUNICATION YEAR / SEM : III / VI UNIT I- PULSE MODULATION PART-A (2 Marks) 1. What is the purpose of sample and hold circuit 2. What is the difference between natural sampling
More informationError Control Codes. Tarmo Anttalainen
Tarmo Anttalainen email: tarmo.anttalainen@evitech.fi.. Abstract: This paper gives a brief introduction to error control coding. It introduces bloc codes, convolutional codes and trellis coded modulation
More informationError Detection and Correction
. Error Detection and Companies, 27 CHAPTER Error Detection and Networks must be able to transfer data from one device to another with acceptable accuracy. For most applications, a system must guarantee
More informationNew Forward Error Correction and Modulation Technologies Low Density Parity Check (LDPC) Coding and 8-QAM Modulation in the CDM-600 Satellite Modem
New Forward Error Correction and Modulation Technologies Low Density Parity Check (LDPC) Coding and 8-QAM Modulation in the CDM-600 Satellite Modem Richard Miller Senior Vice President, New Technology
More informationNonlinear Multi-Error Correction Codes for Reliable MLC NAND Flash Memories Zhen Wang, Mark Karpovsky, Fellow, IEEE, and Ajay Joshi, Member, IEEE
IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 20, NO. 7, JULY 2012 1221 Nonlinear Multi-Error Correction Codes for Reliable MLC NAND Flash Memories Zhen Wang, Mark Karpovsky, Fellow,
More informationChannel Coding RADIO SYSTEMS ETIN15. Lecture no: Ove Edfors, Department of Electrical and Information Technology
RADIO SYSTEMS ETIN15 Lecture no: 7 Channel Coding Ove Edfors, Department of Electrical and Information Technology Ove.Edfors@eit.lth.se 2012-04-23 Ove Edfors - ETIN15 1 Contents (CHANNEL CODING) Overview
More informationRevision of Lecture Eleven
Revision of Lecture Eleven Previous lecture we have concentrated on carrier recovery for QAM, and modified early-late clock recovery for multilevel signalling as well as star 16QAM scheme Thus we have
More informationMultiple-Bases Belief-Propagation for Decoding of Short Block Codes
Multiple-Bases Belief-Propagation for Decoding of Short Block Codes Thorsten Hehn, Johannes B. Huber, Stefan Laendner, Olgica Milenkovic Institute for Information Transmission, University of Erlangen-Nuremberg,
More informationComputer Science 1001.py. Lecture 25 : Intro to Error Correction and Detection Codes
Computer Science 1001.py Lecture 25 : Intro to Error Correction and Detection Codes Instructors: Daniel Deutch, Amiram Yehudai Teaching Assistants: Michal Kleinbort, Amir Rubinstein School of Computer
More informationCommunication Theory and Engineering
Communication Theory and Engineering Master's Degree in Electronic Engineering Sapienza University of Rome A.A. 208-209 Practice work 8 Soft vs. Hard decoding Hard vs. Soft decoding Hard decoding: the
More informationInternational Journal of Digital Application & Contemporary research Website: (Volume 1, Issue 7, February 2013)
Performance Analysis of OFDM under DWT, DCT based Image Processing Anshul Soni soni.anshulec14@gmail.com Ashok Chandra Tiwari Abstract In this paper, the performance of conventional discrete cosine transform
More informationInternational Journal of Computer Trends and Technology (IJCTT) Volume 40 Number 2 - October2016
Signal Power Consumption in Digital Communication using Convolutional Code with Compared to Un-Coded Madan Lal Saini #1, Dr. Vivek Kumar Sharma *2 # Ph. D. Scholar, Jagannath University, Jaipur * Professor,
More informationECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 9: Error Control Coding
ECE 476/ECE 501C/CS 513 - Wireless Communication Systems Winter 2005 Lecture 9: Error Control Coding Chapter 8 Coding and Error Control From: Wireless Communications and Networks by William Stallings,
More informationImproved concatenated (RS-CC) for OFDM systems
Improved concatenated (RS-CC) for OFDM systems Mustafa Dh. Hassib 1a), JS Mandeep 1b), Mardina Abdullah 1c), Mahamod Ismail 1d), Rosdiadee Nordin 1e), and MT Islam 2f) 1 Department of Electrical, Electronics,
More informationStudy of Turbo Coded OFDM over Fading Channel
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 3, Issue 2 (August 2012), PP. 54-58 Study of Turbo Coded OFDM over Fading Channel
More informationEECS 380: Wireless Technologies Week 7-8
EECS 380: Wireless Technologies Week 7-8 Michael L. Honig Northwestern University May 2018 Outline Diversity, MIMO Multiple Access techniques FDMA, TDMA OFDMA (LTE) CDMA (3G, 802.11b, Bluetooth) Random
More informationRADIO SYSTEMS ETIN15. Channel Coding. Ove Edfors, Department of Electrical and Information Technology
RADIO SYSTEMS ETIN15 Lecture no: 7 Channel Coding Ove Edfors, Department of Electrical and Information Technology Ove.Edfors@eit.lth.se 2016-04-18 Ove Edfors - ETIN15 1 Contents (CHANNEL CODING) Overview
More informationSIGNALS AND SYSTEMS LABORATORY 13: Digital Communication
SIGNALS AND SYSTEMS LABORATORY 13: Digital Communication INTRODUCTION Digital Communication refers to the transmission of binary, or digital, information over analog channels. In this laboratory you will
More informationChapter 10 Error Detection and Correction 10.1
Data communication and networking fourth Edition by Behrouz A. Forouzan Chapter 10 Error Detection and Correction 10.1 Note Data can be corrupted during transmission. Some applications require that errors
More informationn Based on the decision rule Po- Ning Chapter Po- Ning Chapter
n Soft decision decoding (can be analyzed via an equivalent binary-input additive white Gaussian noise channel) o The error rate of Ungerboeck codes (particularly at high SNR) is dominated by the two codewords
More informationHamming net based Low Complexity Successive Cancellation Polar Decoder
Hamming net based Low Complexity Successive Cancellation Polar Decoder [1] Makarand Jadhav, [2] Dr. Ashok Sapkal, [3] Prof. Ram Patterkine [1] Ph.D. Student, [2] Professor, Government COE, Pune, [3] Ex-Head
More informationDepartment of Electronics and Communication Engineering 1
UNIT I SAMPLING AND QUANTIZATION Pulse Modulation 1. Explain in detail the generation of PWM and PPM signals (16) (M/J 2011) 2. Explain in detail the concept of PWM and PAM (16) (N/D 2012) 3. What is the
More informationUmudike. Abia State, Nigeria
A Comparative Study between Hamming Code and Reed-Solomon Code in Byte Error Detection and Correction Chukwuma Okeke 1, M.Eng 2 1,2 Department of Electrical/Electronics Engineering, Michael Okpara University
More informationAHA Application Note. Primer: Reed-Solomon Error Correction Codes (ECC)
AHA Application Note Primer: Reed-Solomon Error Correction Codes (ECC) ANRS01_0404 Comtech EF Data Corporation 1126 Alturas Drive Moscow ID 83843 tel: 208.892.5600 fax: 208.892.5601 www.aha.com Table of
More informationImplementation of Reed Solomon Encoding Algorithm
Implementation of Reed Solomon Encoding Algorithm P.Sunitha 1, G.V.Ujwala 2 1 2 Associate Professor, Pragati Engineering College,ECE --------------------------------------------------------------------------------------------------------------------
More information16.36 Communication Systems Engineering
MIT OpenCourseWare http://ocw.mit.edu 16.36 Communication Systems Engineering Spring 2009 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 16.36: Communication
More informationMathematics Explorers Club Fall 2012 Number Theory and Cryptography
Mathematics Explorers Club Fall 2012 Number Theory and Cryptography Chapter 0: Introduction Number Theory enjoys a very long history in short, number theory is a study of integers. Mathematicians over
More informationError Correction Codes for Non-Volatile Memories
Error Correction Codes for Non-Volatile Memories Error Correction Codes for Non-Volatile Memories R. Micheloni, A. Marelli and R. Ravasio Qimonda Italy srl, Design Center Vimercate, Italy Rino Micheloni
More informationMULTILEVEL CODING (MLC) with multistage decoding
350 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 52, NO. 3, MARCH 2004 Power- and Bandwidth-Efficient Communications Using LDPC Codes Piraporn Limpaphayom, Student Member, IEEE, and Kim A. Winick, Senior
More informationUNIT I Source Coding Systems
SIDDHARTH GROUP OF INSTITUTIONS: PUTTUR Siddharth Nagar, Narayanavanam Road 517583 QUESTION BANK (DESCRIPTIVE) Subject with Code: DC (16EC421) Year & Sem: III-B. Tech & II-Sem Course & Branch: B. Tech
More informationPerformance comparison of convolutional and block turbo codes
Performance comparison of convolutional and block turbo codes K. Ramasamy 1a), Mohammad Umar Siddiqi 2, Mohamad Yusoff Alias 1, and A. Arunagiri 1 1 Faculty of Engineering, Multimedia University, 63100,
More informationFPGA Implementation Of An LDPC Decoder And Decoding. Algorithm Performance
FPGA Implementation Of An LDPC Decoder And Decoding Algorithm Performance BY LUIGI PEPE B.S., Politecnico di Torino, Turin, Italy, 2011 THESIS Submitted as partial fulfillment of the requirements for the
More informationLab 3.0. Pulse Shaping and Rayleigh Channel. Faculty of Information Engineering & Technology. The Communications Department
Faculty of Information Engineering & Technology The Communications Department Course: Advanced Communication Lab [COMM 1005] Lab 3.0 Pulse Shaping and Rayleigh Channel 1 TABLE OF CONTENTS 2 Summary...
More informationPerformance Evaluation and Comparative Analysis of Various Concatenated Error Correcting Codes Using BPSK Modulation for AWGN Channel
International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 5, Number 3 (2012), pp. 235-244 International Research Publication House http://www.irphouse.com Performance Evaluation
More informationChapter 2 Channel Equalization
Chapter 2 Channel Equalization 2.1 Introduction In wireless communication systems signal experiences distortion due to fading [17]. As signal propagates, it follows multiple paths between transmitter and
More informationHamming Codes and Decoding Methods
Hamming Codes and Decoding Methods Animesh Ramesh 1, Raghunath Tewari 2 1 Fourth year Student of Computer Science Indian institute of Technology Kanpur 2 Faculty of Computer Science Advisor to the UGP
More informationIntroduction to Error Control Coding
Introduction to Error Control Coding 1 Content 1. What Error Control Coding Is For 2. How Coding Can Be Achieved 3. Types of Coding 4. Types of Errors & Channels 5. Types of Codes 6. Types of Error Control
More informationSIMULATIONS OF ERROR CORRECTION CODES FOR DATA COMMUNICATION OVER POWER LINES
SIMULATIONS OF ERROR CORRECTION CODES FOR DATA COMMUNICATION OVER POWER LINES Michelle Foltran Miranda Eduardo Parente Ribeiro mifoltran@hotmail.com edu@eletrica.ufpr.br Departament of Electrical Engineering,
More informationQ-ary LDPC Decoders with Reduced Complexity
Q-ary LDPC Decoders with Reduced Complexity X. H. Shen & F. C. M. Lau Department of Electronic and Information Engineering, The Hong Kong Polytechnic University, Hong Kong Email: shenxh@eie.polyu.edu.hk
More informationLecture #2. EE 471C / EE 381K-17 Wireless Communication Lab. Professor Robert W. Heath Jr.
Lecture #2 EE 471C / EE 381K-17 Wireless Communication Lab Professor Robert W. Heath Jr. Preview of today s lecture u Introduction to digital communication u Components of a digital communication system
More information