ICE1495 Independent Study for Undergraduate Project (IUP) A. Lie Detector. Prof. : Hyunchul Park Student : Jonghun Park Due date : 06/04/04

Size: px
Start display at page:

Download "ICE1495 Independent Study for Undergraduate Project (IUP) A. Lie Detector. Prof. : Hyunchul Park Student : Jonghun Park Due date : 06/04/04"

Transcription

1 ICE1495 Independent Study for Undergraduate Project (IUP) A Lie Detector Prof. : Hyunchul Park Student : Jonghun Park Due date : 06/04/04

2 Contents ABSTRACT INTRODUCTION BASIC OF ECC... 2 BRIEF HISTORY OF ERROR CORRECTION CODE PROBLEM ANALYSIS AND RELATED ISSUES KEY CONCEPTS... 5 Shannon's Theorem... 5 Tradeoffs THEORETICAL REVIEW BEFORE ANALYZING ANALYSIS OF PROBLEM SOLVE THE PROBLEMS DECODING ALGORITHMS IMPLEMENTATION LIE DETECTOR WITH (7, 4, 3) HAMMING CODE BY JAVA SIMULATION AND PERFORMANCE ANALYSIS CONCLUSION REFERENCE [Senior Project] Jong-Hun Park 1

3 Abstract From now on, I explain the history and basic concept of Error Correcting Code. And we solve the given problem which is the system of lie-noise environment. And think about the decoding rules. Moreover, we saw the lie detector with a simple example and simulate one error correcting code for plotting BER curve. Core word : ECC, Hamming code, Hamming bound, decoding rule 1. Introduction When I chose this subject, I thought that process of this project is only to solve given problems, following text box. As time goes by, I however, had known that there were many things included this project. Also we can confirm some advantages using coding method rather than opposite one. However there is short time for completing this project, we constructed plan, and started immediately. The brief plan of this project like as,! First, because I have no idea about this, I had studied about ECC under T.A s assistance.! Second, try to solve the problem based what I had studied! Third, code the lie detector considering user interface! Forth, simulate this code with performance analysis Consequently, the purpose of this project, do my own project and follow upper schedule correctly. Also, I get some ideas of ECC and more familiar with matlab and Java. With such plan I started the project. The given problem description is as follow. Suppose that Bob will ask to Alice. Alice have one integer between zero to nine in her mind and she do not say it to Bob. By Bob s question, he wants to know the number in her mind. Some given questions are as follow. (And she just answer with yes or no ex) (1) Is your number is odd? (2) Is your number a member of {1,3,6,7}? For given situation, you consider the answers of following questions.. Q1. If Alice is saying only truth, how many questions are need to know her number? Q2.If she can say lie at most one times, how many questions are need to know her number? And what are contends of them? Q3. If she can say lie at most given t times (t>0), how many questions are need to know her number? And what are contends of them? Q4. Describe the relationship between upper three questions and Error Correcting Codes in Communication System. Now, let s sail notice the overall contends of ECC < Problem Description> 1.1 Basic of ECC Theoretical issue of this project is based on Error Correcting Code (ECC). Nowadays, ECC is used in many communication systems and storage devices, especially CD and DVD. [Senior Project] Jong-Hun Park 2 These systems and devices use information represented by binary sequences. When binary information is passed from one point to

4 another, there is always some chance that a mistake can be made; a 1 interpreted as a 0 or a 0 taken to be 1. This can be caused by channel noise m, media defects, electronic noise, component failures, poor connections, deterioration due to age, and other factors. When a bit is mistakenly interpreted, a bit error has occurred. Error correction is the process of detecting bit errors and correcting them and can be done in software or hardware. For high data rates, error correction must be done in special-purpose hardware because software is too slow. From now on, we consider ECC in communication system, related to given question. Figure 1 System Diagram Figure 1 is the simple block diagram of Communication system. Information source generate message signal and transmitter change it to others which can be easily and accurately transmitted to other points. Then transmitted signal pass through the channel, which add the noise signal to transmitted signal so, received signal into receiver is distorted compared with transmitted one. So, some devices need in receiver for correcting these errors came from channel. In other words, No digital or analog transmission is perfect. Each system makes errors at a certain rate. As data transfer rates densities increase, the raw error rate also increases. To reduce the error rate, Error correcting code is need. Our problem can be regarded as the problem of communication system between Alice and Bob. Because general noise of sound can be corrected by their ears, so, the lies of Alice s answers can be another noise. So, we can simulate this given situation. Brief history of error correction code. Around , the subject of information theory was created by Claude Shannon. The main result of Shannon's "Mathematical Theory of Communication" is that the only way to get the most storage capacity in a storage device or the fastest transmission through a communications channel is through the use of very powerful error correcting systems. During the same time period, Richard Hamming discovered and implemented a single-bit error correcting code. [Senior Project] Jong-Hun Park 3

5 In 1960, researchers, including Irving Reed and Gustave Solomon, discovered how to construct error correcting codes that could correct for an arbitrary number of bits or an arbitrary number of "bytes" where "byte" means a group of "w" bits. Even though the codes were discovered at this time, there still was no way known to decode the codes. The first textbook on error correcting codes was written in 1961 by W. Wesley Peterson. In 1968, Elwyn Berlekamp and James Massey discovered algorithms needed to build decoders for multiple error correcting codes. They came to be known as the Berlekamp-Massey algorithm for solving the key decoding equation. In the last 30 years, researchers have discovered that the Berlekamp-Massey algorithm is a variation of an ancient algorithm discovered in Egypt around 300 BC by Euclid and known as Euclid's extended algorithm for finding the greatest common divisor of two polynomials. Today, numerous variations of the Berlekamp-Massey and Euclid algorithms exist to solve the key decoding equation. More detail concepts of ECC will be discussed in next section with analyzed given problem. [Senior Project] Jong-Hun Park 4

6 2 Problem Analysis and related Issues 2.1 Key Concepts The error detecting and correcting capabilities of a particular coding scheme is correlated with its code rate and complexity. The code rate is the ratio of data bits to total bits transmitted in the code words. A high code rate means information content is high and coding overhead is low. However, the fewer bits used for coding redundancy, the less error protection is provided. A tradeoff must be made between bandwidth availability and the amount of error protection required for the communication. Shannon's Theorem Error coding techniques are based on information coding theory, an area developed from work by Claude Shannon. In 1948, Shannon presented a theory that states: given a code with a code rate R that is less than the communication channel capacity C, a code exists, for a block length of n bits, with code rate R that can be transmitted over the channel with an arbitrarily small probability of error. This would indicate that there is still much work to be done improving error coding techniques. Cryptography, the method of encrypting data for security rather than reliability, is also a descendant of Shannon's work. Tradeoffs When choosing a coding scheme for error protection, the types of errors that tend to occur on the communication channel must be considered. There are two types of errors that can occur on a communication channel: random bit errors and burst errors. A channel that usually has random bit errors will tend to have isolated bit flips during data transmissions and the bit errors are independent of each other. A channel with burst errors will tend to have clumps of bit errors that occur during one transmission. Error codes have been developed to specifically protect against both random bit errors and burst errors. 2.2 Theoretical Review before analyzing There are briefly three types of code technique, linear block code, CRC code and convolution code. For this project, before we analyze this problem, we should have some technical concepts of ECC, especially, linear block codes which we will focus on. Figure 2 Ben diagram of code space The basic concept of linear block code is that transmitter send codeword c, which consists of original message bit and other redundancy bits for correcting the errors. [Senior Project] Jong-Hun Park 5

7 Figure 3 Message generation As you can see figure 3, in order to make transmitted signal c, we use some algebraic form, generate matrix G, which is k by n.(n is the length of codeword and k is the length of message signal). Then, generated codeword c is modulated by modulator according to given channel condition. Then received signal includes channel noise. In mathematically, received signal r(t) is, r(t) = c(t) + n(t) : Generally n(t) is AWGN(Addictive White Gaussian Noise). Because of this, received codeword is changed. So, by passing through decoder, we should recover the original signal from detected signal. Recently, there are many linear block codes introduced, for example, Hamming code, Golay code, BCH code, Reed-Solomon codes which is broadly used in satellite communication. The only difference between these codes is how to generate G, H matrices. From now on, let s see more specific algorithm of (7, 4) Hamming code, which I will used for solving this project) In Hamming code, generate matrix is defined as follow, G= [I, A]; I am identity matrix of given dimension, and A is k by (n-k) matrix for making redundancy bits. Briefly, the codeword is generated by product of message signal and Generate matrix, c=m*g. According to composition of G, the kinds of codes are different. For repairing the detected signal, we use H matrix, whose composition is like this, H = [-A, I]; Then G*H =-A *I + I*A = -A + A =0 So, the multiplication of s=h*r(t), called syndrome of r, can be the clue of correction. Simply, syndrome will be (n-k) by 1 matrix. If there is no error, s will be zero vectors, but, if there is at least one error, the syndrome won t be zero vectors. Surprisingly, it will be one of column vector of H. And the position of the same column vector in H is the position of error in codeword. (7, 4) Hamming code has 3 additional [Senior Project] Jong-Hun Park 6

8 bits and it can detect 6 errors and correct one bit error code. 2.3Analysis of problem Figure 4 Problem diagram As I mentioned, situation of this problem can be represent one communication system. The main signals in this problem! m(t) = Alice true number " in binary, it can be represent 4bits code! n(t) = her lies! r(t) = her answers about my questions Then, how can we find her real number, even though we don t know whether she say a lie or not? 2.4 Solve the problems First problem is how many question is need to know the Alice number if she don t say a lie. By intuitive thinking, the solution is very easy. Because, there are only 10 integers, we can recognize the number in 4 (4= [log2 (10) =3.329], [] is upper bound). In other words, you can eliminate half of numbers per question. It is very simple. However, if she can lie one times, like second problem, how many questions are needed? This problem can not be solved by upper intuitive method. We can find the key of solution of this problem in (7, 4) hamming code which I mention at Section 2. Suppose of making encoder and decoder of upper communication system by (7, 4) hamming code. Then the summary of this situation is as follow,! We don t know original message signal m(t)! In order to know m(t), we should find r(t), which has noise bit and c(t), from asking some question to Alice! If we recognize r (t), because we already know G, H matrices, we can generate syndrome vector and c (t). It means that we can recognize original signal. So, the main point is finding r (t) by well constructed questions. Well constructed means, minimizing the number of questions, and generating no error. Generating questions such like this is the [Senior Project] Jong-Hun Park 7

9 hardest work of this project. However, the method is simple. First, we should know how many questions are needed for one error. The answer is related the basic concept of hamming code. This approach is a little bit tricky, but, frankly speaking, because this was my original approach, so I mentioned this. Minimum hamming distance of (7, 4) hamming code is 3. So, it can correct [(3-1)/2] =1 error by properties of this code. And because this code has 3 redundancy bits, so, we can guess for one error correcting we need 3 bits more. Then, how many well constructed questions are needed? The answer is as follow. (Suppose, this system is binary system)! Because the symbol, one bit can represent is only two! And the bit error consists of only two cases, one is decoding one to zero, the other is decoding zero to one! We just determine one bit which is one or zero, per each question. Therefore, we need only 7 questions when Alice is saying one lie. The way to make question is also simple. The i-th bit of code word C, is just zero or not. But we just encode her answer and C i are same. So, if you want to know C i and {A, B, C} where A, B, C are the numbers which of all have the condition, C i =1. Then, you can ask like is your number one of {A, B, C}. Then here answer (yes=1/no=0) will be C i. In follow simulation section, I made lie detector which can recover one lie with JAVA Swing. More specific mechanisms and results will be mentioned at that section. Third problem is the extension of second one, the case that if she is saying lies t-times. This problem cannot be solved by upper tricky approach. However, it also can be solved by one of the concepts of Hamming code, Hamming bound. Figure 5 Vector representations of codes [Senior Project] Jong-Hun Park 8

10 Upper diagram indicates (n,k) linear block code. The composition of this union is as follow.! There exist 2^n codes in this union.! The number of codeword is 2^k, which is the same as the number of possible symbol.! e is the number of correctable error. It makes circles centered to each codeword So, the relationship among n, k, e is obtained by follow steps 1 the number of codeword is 2^n 2 The total number of e[i] which will be regarded as the codeword[i] is sum of ncj where j is changed from zero to e. 3 total number of correctable codes is the product of 1 and 2 4 the result of 3 can not be larger than 2^n Because n-k is the number of redundancy bits, rearrange this in terms of r. As we found the meaning of r in second problem, the code which can correct e errors, need more redundant bits amount of right side of upper mathematical inequality equation? In ECC, this called Hamming Bound. In (7, 4) Hamming code, e e j= 0 ncj e log 2( ncj) j= 0 Min(r) Therefore, in third problem, by hamming bound, at least r bits which satisfy r = n k log 2( ncj) j= 0 Furthermore, the answer of forth problem is already described. Until now, based on we think about the general ECC concepts, we solved the given problems e [Senior Project] Jong-Hun Park 9

11 2.5 Decoding Algorithms As I mentioned at introduction, solving problems is not the core of this project. In my opinion, considering the reason why modern communication system started to apply the coding system, the main process which decides the efficiency is in the decoding system. If the decoding algorithm doesn t make the transmission system more efficiency compared with uncoding transmission system, there is no reason to use coding theory. First, the contrast of coding, let s think about the non-coding transmission through the noise channel. The decoding algorithm of non-coding transmission is just hard decision. So, there exist one or more decision boundaries which is the half of distance between continuously received two numbers (because of error, it is not integers). Second, let s think about the decoding algorithm of hamming code. The algorithm of hamming code is very simple. Another name of hamming decoding is Syndrome decoding. The reason why they called syndrome is they using it. H matrix which we saw previous, is the generate matrix of s, syndrome vector. The Hamming decoding algorithm, which corrects up to one bit error, is as follows: 1. Compute the syndrome s = y*ht for the received vector y. If s=0, then there are no errors. Return the received vector and exit. 2. Otherwise, determine the position j of the column of H that is the transpose of the syndrome. 3. Change the jth bit in the received word, and output the resulting code. As long as there is at most one bit error in the received vector, the result will be the codeword was sent. Lastly, let s think about Maximum Likelihood decoding. The goal of the sequence estimation is to find the code sequence copt for which the posteriori probability p(c r) is maximized: copt=arg (maxc p(c)*p(c r)). If use Bayes law p(r)p(c r) = p(c)p(r c) and constant factor p(r) is neglected, we can obtain: copt=arg (maxc p(c r)), where p(c) is the a priori probability of the sequence. Assume that the message sequence m = [m0, m1, m2, ] is encoded into the code sequence c = [c0, c1, c2,, ]. The received sequence is r = [r0, r1, r2, ]. The decoder produces an estimate of c based on the observation of r. The estimate is denoted by C =(c1,c2 ) The maximum likelihood (ML) decoder choose c iff P(r c)>p(r c ) or logp(r c) > log(r c ) where c c In general, path metric denoted by M(r, c) is not ML and its bit metric is M(ri, ci): # choose c iff M ( ri, ci) > M ( ri, c' i) where ci c i i For BSC, ML decision rule, choose c iff i dh ( r, ci) < dh ( r, c' i) ( For a ML receiver M ( ri, ci) = logp(ri ci)) Consequently, i ML ireceiver decision which has smaller Hamming distance to received signal. These three basic decision rules are used widely in decoding system. There is no best one, in other words, each method has own system which it perform with best efficiency. Next, let s implement with these different decoding ideas. [Senior Project] Jong-Hun Park 10

12 3 Implementation Until now, we see the background and the theoretical analysis of ECC especially linear block code. From now on, let s generates real lie detector and calculates its efficiency and accuracy by plotting BER with many samples. 3.1 Lie Detector with (7, 4, 3) Hamming Code by JAVA This lie detector can correct one lie, which means this has ability of one error correction. The inputs of this are the answers from Alice (user). And the outputs are the questions that will be answered and the report of finding the original number in her mind. Figure 6 Start screen of detector As you can see upper picture, there are one textfield and some buttons including the answer buttons. If you push the Run button program starts with some comments. Before I explain about the core source let s do one game if I think number 7 and I will lie at second question. First, I press run button then the screen was changed, and it give some questions which I answered only yes/no Figure 7 Lie detector Run_1 [Senior Project] Jong-Hun Park 11

13 Figure 8 Lie Detector Run_2 The program catches when I lied and what I think, correctly. Then, I will explain specific operation. Figure 9 Main frame of Lie Detector As you can see this program consists of large two classes. Class Detector is the main visual frame, which is based on JAVA Swing. First, one object of Detector, is visualized with the detector frame which contains menubar panels buttons and textfield. Then object a call method oper which defined at Module class. Class Module has two global variables, input number array actually Alice s answers, and numofq which contains how many numbers program ask. And Mudule class has more methods. Search() method do finding error and return the result report, and hxi() method returns syndrome vector to search() method. [Senior Project] Jong-Hun Park 12

14 And there are more methods for mod calculation and converting binary to decimal. The information flow is as follow 1. main function in class detector make one instance of detector() whose name is a 2. then visual lie detector is shown 3. when the buttons pushed, each actionlisteners act its own work. 4. if numofq is same as 6, the program show the output result. And the decoding method of this is syndrome method which I already mentioned at 2.5 Decoding Algorithm. There is no hard thing to implement with Java language. However, when I complete making this detector, I wondered how much efficiency one bit error correction has? Because, this algorithm can not correct more than single bit error, and it has poor correcting ability when the number of errors is more than 2. When I see the decoding process of following simulation, decoder makes two bit error signal to three bit error signal for decision. So, I am very confused. Let s think about details of this with follow simulation result. 3.2 Simulation and performance analysis As I mentioned, I just wondering the performance of (7, 4) hamming code, actually only one bit corrector performance compared with none coding without redundancy bit. Figure 10 BER per SNR As you can see, upper diagram indicates the BER level due to different SNR, red curve is the performance curve when it doesn t use coding method. (I generate this curve by hard decision.) Second [Senior Project] Jong-Hun Park 13

15 blue curve indicate BER curve using (7, 4) hamming coding, which use syndrome decoding method. And the last one is theoretical curve of (7, 4) hamming code correction. When I saw this performance curve, first, it s hard to understand this graph. However, I realize what I confused. This system send only 7bit, actually 4bit signal m, so, the channel which make the signal with 3bit error, can not used in communication system. So, simply just one bit error correcting can afford high correcting performance. From the paper, Heidi Steendam and Marc Moeneclaey ML-Performance of Low-Density Parity-Check Codes, I can get the upper bound of theoretical curve. BER k Q( 2 N 2 j= 0 dh ( bj,0) * SNR * dh( cj,0))* K When BER = about 10 4, the SNR difference between theoretical curve and syndrome decoding is about 1.5 db, however, the difference between Syndrome decoding and no coding curve is more than 2dB, actually difference between uncoding curve and theoretical curve is about 4 db of SNR. So, we can conclude this simulated (7,4) hamming code has more performance is good and when using coding method the BER value is decreased when it doesn t. Figure 11 BER comparison between ML decode and Syndrome decode Figure 11 is the optional comparison which compare the performance between ML decoding and Syndrome decoding. In this experiment, we can find the performances are almost same. The reason why this two are same is, I think, this code delivery only 4bit signal. From my research, ML decoding is generally more efficient than syndrome decoding. [Senior Project] Jong-Hun Park 14

16 5. Conclusion Though this reports, we confirm history and basic concept of Error Correcting Code. And we solve the given problem which is the system of lie-noise environment. Furthermore, we saw the lie detector with a simple example and simulate one error correcting code for plotting BER curve. From this curve, we confirm the coding method decrease BER, efficiently. Hamming code is almost primitive Error Correcting code, because now days no one uses for main encode/decode method. However, we confirm even hamming code have more powerful performance rather than non_coding transmission system. So, though frequency spectrum capability is decreased by using ECC, if using more powerful coding such as Golay, BCH, or Reed-Solomon Code, the BER curve will be more closed to Shannon s bound. And this technique will be used wildly at storage and communication technology such as DVD, and special communication system which needs non error but high bit rate or symbol rate. I hope that with closing, the appearance of more powerful code which will break the Shannon bound. 6. Reference 1. Wade Trappe and Lwarence C. Washington Introduction to Cryptography with Coding Theory 2. Shu Lin and Daniel Costello, Jr. Error Control Coding, prentice Hall, W.Weslet Peterson and E.J.Weldon, Jr. Error-correcting Codes,2 nd ed., MIT press, Ling-Pei Kung introduction to Error correcting code 5. 이윤미황인경시립인천대학교, [7,4] Hamming Code Encoder 와 Decoder 의설계 6. Heidi Steendam and Marc Moeneclaey ML-Performance of Low-Density Parity-Check Codes [Senior Project] Jong-Hun Park 15

Outline. Communications Engineering 1

Outline. Communications Engineering 1 Outline Introduction Signal, random variable, random process and spectra Analog modulation Analog to digital conversion Digital transmission through baseband channels Signal space representation Optimal

More information

Lecture 17 Components Principles of Error Control Borivoje Nikolic March 16, 2004.

Lecture 17 Components Principles of Error Control Borivoje Nikolic March 16, 2004. EE29C - Spring 24 Advanced Topics in Circuit Design High-Speed Electrical Interfaces Lecture 17 Components Principles of Error Control Borivoje Nikolic March 16, 24. Announcements Project phase 1 is posted

More information

EE 435/535: Error Correcting Codes Project 1, Fall 2009: Extended Hamming Code. 1 Introduction. 2 Extended Hamming Code: Encoding. 1.

EE 435/535: Error Correcting Codes Project 1, Fall 2009: Extended Hamming Code. 1 Introduction. 2 Extended Hamming Code: Encoding. 1. EE 435/535: Error Correcting Codes Project 1, Fall 2009: Extended Hamming Code Project #1 is due on Tuesday, October 6, 2009, in class. You may turn the project report in early. Late projects are accepted

More information

Simulink Modelling of Reed-Solomon (Rs) Code for Error Detection and Correction

Simulink Modelling of Reed-Solomon (Rs) Code for Error Detection and Correction Simulink Modelling of Reed-Solomon (Rs) Code for Error Detection and Correction Okeke. C Department of Electrical /Electronics Engineering, Michael Okpara University of Agriculture, Umudike, Abia State,

More information

Basics of Error Correcting Codes

Basics of Error Correcting Codes Basics of Error Correcting Codes Drawing from the book Information Theory, Inference, and Learning Algorithms Downloadable or purchasable: http://www.inference.phy.cam.ac.uk/mackay/itila/book.html CSE

More information

Digital Television Lecture 5

Digital Television Lecture 5 Digital Television Lecture 5 Forward Error Correction (FEC) Åbo Akademi University Domkyrkotorget 5 Åbo 8.4. Error Correction in Transmissions Need for error correction in transmissions Loss of data during

More information

S Coding Methods (5 cr) P. Prerequisites. Literature (1) Contents

S Coding Methods (5 cr) P. Prerequisites. Literature (1) Contents S-72.3410 Introduction 1 S-72.3410 Introduction 3 S-72.3410 Coding Methods (5 cr) P Lectures: Mondays 9 12, room E110, and Wednesdays 9 12, hall S4 (on January 30th this lecture will be held in E111!)

More information

MATHEMATICS IN COMMUNICATIONS: INTRODUCTION TO CODING. A Public Lecture to the Uganda Mathematics Society

MATHEMATICS IN COMMUNICATIONS: INTRODUCTION TO CODING. A Public Lecture to the Uganda Mathematics Society Abstract MATHEMATICS IN COMMUNICATIONS: INTRODUCTION TO CODING A Public Lecture to the Uganda Mathematics Society F F Tusubira, PhD, MUIPE, MIEE, REng, CEng Mathematical theory and techniques play a vital

More information

Channel Coding/Decoding. Hamming Method

Channel Coding/Decoding. Hamming Method Channel Coding/Decoding Hamming Method INFORMATION TRANSFER ACROSS CHANNELS Sent Received messages symbols messages source encoder Source coding Channel coding Channel Channel Source decoder decoding decoding

More information

Decoding of Block Turbo Codes

Decoding of Block Turbo Codes Decoding of Block Turbo Codes Mathematical Methods for Cryptography Dedicated to Celebrate Prof. Tor Helleseth s 70 th Birthday September 4-8, 2017 Kyeongcheol Yang Pohang University of Science and Technology

More information

Single Error Correcting Codes (SECC) 6.02 Spring 2011 Lecture #9. Checking the parity. Using the Syndrome to Correct Errors

Single Error Correcting Codes (SECC) 6.02 Spring 2011 Lecture #9. Checking the parity. Using the Syndrome to Correct Errors Single Error Correcting Codes (SECC) Basic idea: Use multiple parity bits, each covering a subset of the data bits. No two message bits belong to exactly the same subsets, so a single error will generate

More information

Implementation of Reed-Solomon RS(255,239) Code

Implementation of Reed-Solomon RS(255,239) Code Implementation of Reed-Solomon RS(255,239) Code Maja Malenko SS. Cyril and Methodius University - Faculty of Electrical Engineering and Information Technologies Karpos II bb, PO Box 574, 1000 Skopje, Macedonia

More information

Spreading Codes and Characteristics. Error Correction Codes

Spreading Codes and Characteristics. Error Correction Codes Spreading Codes and Characteristics and Error Correction Codes Global Navigational Satellite Systems (GNSS-6) Short course, NERTU Prasad Krishnan International Institute of Information Technology, Hyderabad

More information

IJESRT. (I2OR), Publication Impact Factor: 3.785

IJESRT. (I2OR), Publication Impact Factor: 3.785 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY ERROR DETECTION USING BINARY BCH (55, 15, 5) CODES Sahana C*, V Anandi *M.Tech,Dept of Electronics & Communication, M S Ramaiah

More information

Error Protection: Detection and Correction

Error Protection: Detection and Correction Error Protection: Detection and Correction Communication channels are subject to noise. Noise distorts analog signals. Noise can cause digital signals to be received as different values. Bits can be flipped

More information

ECE 6640 Digital Communications

ECE 6640 Digital Communications ECE 6640 Digital Communications Dr. Bradley J. Bazuin Assistant Professor Department of Electrical and Computer Engineering College of Engineering and Applied Sciences Chapter 8 8. Channel Coding: Part

More information

International Journal of Engineering Research in Electronics and Communication Engineering (IJERECE) Vol 1, Issue 5, April 2015

International Journal of Engineering Research in Electronics and Communication Engineering (IJERECE) Vol 1, Issue 5, April 2015 Implementation of Error Trapping Techniqe In Cyclic Codes Using Lab VIEW [1] Aneetta Jose, [2] Hena Prince, [3] Jismy Tom, [4] Malavika S, [5] Indu Reena Varughese Electronics and Communication Dept. Amal

More information

BER Analysis of BPSK for Block Codes and Convolution Codes Over AWGN Channel

BER Analysis of BPSK for Block Codes and Convolution Codes Over AWGN Channel International Journal of Pure and Applied Mathematics Volume 114 No. 11 2017, 221-230 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu BER Analysis

More information

LDPC Decoding: VLSI Architectures and Implementations

LDPC Decoding: VLSI Architectures and Implementations LDPC Decoding: VLSI Architectures and Implementations Module : LDPC Decoding Ned Varnica varnica@gmail.com Marvell Semiconductor Inc Overview Error Correction Codes (ECC) Intro to Low-density parity-check

More information

Introduction to Coding Theory

Introduction to Coding Theory Coding Theory Massoud Malek Introduction to Coding Theory Introduction. Coding theory originated with the advent of computers. Early computers were huge mechanical monsters whose reliability was low compared

More information

Physical Layer: Modulation, FEC. Wireless Networks: Guevara Noubir. S2001, COM3525 Wireless Networks Lecture 3, 1

Physical Layer: Modulation, FEC. Wireless Networks: Guevara Noubir. S2001, COM3525 Wireless Networks Lecture 3, 1 Wireless Networks: Physical Layer: Modulation, FEC Guevara Noubir Noubir@ccsneuedu S, COM355 Wireless Networks Lecture 3, Lecture focus Modulation techniques Bit Error Rate Reducing the BER Forward Error

More information

ERROR CONTROL CODING From Theory to Practice

ERROR CONTROL CODING From Theory to Practice ERROR CONTROL CODING From Theory to Practice Peter Sweeney University of Surrey, Guildford, UK JOHN WILEY & SONS, LTD Contents 1 The Principles of Coding in Digital Communications 1.1 Error Control Schemes

More information

Block code Encoder. In some applications, message bits come in serially rather than in large blocks. WY Tam - EIE POLYU

Block code Encoder. In some applications, message bits come in serially rather than in large blocks. WY Tam - EIE POLYU Convolutional Codes In block coding, the encoder accepts a k-bit message block and generates an n-bit code word. Thus, codewords are produced on a block-by-block basis. Buffering is needed. m 1 m 2 Block

More information

Digital Transmission using SECC Spring 2010 Lecture #7. (n,k,d) Systematic Block Codes. How many parity bits to use?

Digital Transmission using SECC Spring 2010 Lecture #7. (n,k,d) Systematic Block Codes. How many parity bits to use? Digital Transmission using SECC 6.02 Spring 2010 Lecture #7 How many parity bits? Dealing with burst errors Reed-Solomon codes message Compute Checksum # message chk Partition Apply SECC Transmit errors

More information

Error Control Coding. Aaron Gulliver Dept. of Electrical and Computer Engineering University of Victoria

Error Control Coding. Aaron Gulliver Dept. of Electrical and Computer Engineering University of Victoria Error Control Coding Aaron Gulliver Dept. of Electrical and Computer Engineering University of Victoria Topics Introduction The Channel Coding Problem Linear Block Codes Cyclic Codes BCH and Reed-Solomon

More information

EDI042 Error Control Coding (Kodningsteknik)

EDI042 Error Control Coding (Kodningsteknik) EDI042 Error Control Coding (Kodningsteknik) Chapter 1: Introduction Michael Lentmaier November 3, 2014 Michael Lentmaier, Fall 2014 EDI042 Error Control Coding: Chapter 1 1 / 26 Course overview I Lectures:

More information

Communications Theory and Engineering

Communications Theory and Engineering Communications Theory and Engineering Master's Degree in Electronic Engineering Sapienza University of Rome A.A. 2018-2019 Channel Coding The channel encoder Source bits Channel encoder Coded bits Pulse

More information

Performance of Combined Error Correction and Error Detection for very Short Block Length Codes

Performance of Combined Error Correction and Error Detection for very Short Block Length Codes Performance of Combined Error Correction and Error Detection for very Short Block Length Codes Matthias Breuninger and Joachim Speidel Institute of Telecommunications, University of Stuttgart Pfaffenwaldring

More information

Using TCM Techniques to Decrease BER Without Bandwidth Compromise. Using TCM Techniques to Decrease BER Without Bandwidth Compromise. nutaq.

Using TCM Techniques to Decrease BER Without Bandwidth Compromise. Using TCM Techniques to Decrease BER Without Bandwidth Compromise. nutaq. Using TCM Techniques to Decrease BER Without Bandwidth Compromise 1 Using Trellis Coded Modulation Techniques to Decrease Bit Error Rate Without Bandwidth Compromise Written by Jean-Benoit Larouche INTRODUCTION

More information

A Survey of Advanced FEC Systems

A Survey of Advanced FEC Systems A Survey of Advanced FEC Systems Eric Jacobsen Minister of Algorithms, Intel Labs Communication Technology Laboratory/ Radio Communications Laboratory July 29, 2004 With a lot of material from Bo Xia,

More information

FREDRIK TUFVESSON ELECTRICAL AND INFORMATION TECHNOLOGY

FREDRIK TUFVESSON ELECTRICAL AND INFORMATION TECHNOLOGY 1 Information Transmission Chapter 5, Block codes FREDRIK TUFVESSON ELECTRICAL AND INFORMATION TECHNOLOGY 2 Methods of channel coding For channel coding (error correction) we have two main classes of codes,

More information

AN IMPROVED NEURAL NETWORK-BASED DECODER SCHEME FOR SYSTEMATIC CONVOLUTIONAL CODE. A Thesis by. Andrew J. Zerngast

AN IMPROVED NEURAL NETWORK-BASED DECODER SCHEME FOR SYSTEMATIC CONVOLUTIONAL CODE. A Thesis by. Andrew J. Zerngast AN IMPROVED NEURAL NETWORK-BASED DECODER SCHEME FOR SYSTEMATIC CONVOLUTIONAL CODE A Thesis by Andrew J. Zerngast Bachelor of Science, Wichita State University, 2008 Submitted to the Department of Electrical

More information

6. FUNDAMENTALS OF CHANNEL CODER

6. FUNDAMENTALS OF CHANNEL CODER 82 6. FUNDAMENTALS OF CHANNEL CODER 6.1 INTRODUCTION The digital information can be transmitted over the channel using different signaling schemes. The type of the signal scheme chosen mainly depends on

More information

Detecting and Correcting Bit Errors. COS 463: Wireless Networks Lecture 8 Kyle Jamieson

Detecting and Correcting Bit Errors. COS 463: Wireless Networks Lecture 8 Kyle Jamieson Detecting and Correcting Bit Errors COS 463: Wireless Networks Lecture 8 Kyle Jamieson Bit errors on links Links in a network go through hostile environments Both wired, and wireless: Scattering Diffraction

More information

6.004 Computation Structures Spring 2009

6.004 Computation Structures Spring 2009 MIT OpenCourseWare http://ocw.mit.edu 6.004 Computation Structures Spring 2009 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. Welcome to 6.004! Course

More information

Intuitive Guide to Principles of Communications By Charan Langton Coding Concepts and Block Coding

Intuitive Guide to Principles of Communications By Charan Langton  Coding Concepts and Block Coding Intuitive Guide to Principles of Communications By Charan Langton www.complextoreal.com Coding Concepts and Block Coding It s hard to work in a noisy room as it makes it harder to think. Work done in such

More information

ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013

ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013 ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013 Lecture 18 Today: (1) da Silva Discussion, (2) Error Correction Coding, (3) Error Detection (CRC) HW 8 due Tue. HW 9 (on Lectures

More information

Lab/Project Error Control Coding using LDPC Codes and HARQ

Lab/Project Error Control Coding using LDPC Codes and HARQ Linköping University Campus Norrköping Department of Science and Technology Erik Bergfeldt TNE066 Telecommunications Lab/Project Error Control Coding using LDPC Codes and HARQ Error control coding is an

More information

Course Developer: Ranjan Bose, IIT Delhi

Course Developer: Ranjan Bose, IIT Delhi Course Title: Coding Theory Course Developer: Ranjan Bose, IIT Delhi Part I Information Theory and Source Coding 1. Source Coding 1.1. Introduction to Information Theory 1.2. Uncertainty and Information

More information

IMPERIAL COLLEGE of SCIENCE, TECHNOLOGY and MEDICINE, DEPARTMENT of ELECTRICAL and ELECTRONIC ENGINEERING.

IMPERIAL COLLEGE of SCIENCE, TECHNOLOGY and MEDICINE, DEPARTMENT of ELECTRICAL and ELECTRONIC ENGINEERING. IMPERIAL COLLEGE of SCIENCE, TECHNOLOGY and MEDICINE, DEPARTMENT of ELECTRICAL and ELECTRONIC ENGINEERING. COMPACT LECTURE NOTES on COMMUNICATION THEORY. Prof. Athanassios Manikas, version Spring 22 Digital

More information

Performance Optimization of Hybrid Combination of LDPC and RS Codes Using Image Transmission System Over Fading Channels

Performance Optimization of Hybrid Combination of LDPC and RS Codes Using Image Transmission System Over Fading Channels European Journal of Scientific Research ISSN 1450-216X Vol.35 No.1 (2009), pp 34-42 EuroJournals Publishing, Inc. 2009 http://www.eurojournals.com/ejsr.htm Performance Optimization of Hybrid Combination

More information

Error Correction with Hamming Codes

Error Correction with Hamming Codes Hamming Codes http://www2.rad.com/networks/1994/err_con/hamming.htm Error Correction with Hamming Codes Forward Error Correction (FEC), the ability of receiving station to correct a transmission error,

More information

Lecture 4: Wireless Physical Layer: Channel Coding. Mythili Vutukuru CS 653 Spring 2014 Jan 16, Thursday

Lecture 4: Wireless Physical Layer: Channel Coding. Mythili Vutukuru CS 653 Spring 2014 Jan 16, Thursday Lecture 4: Wireless Physical Layer: Channel Coding Mythili Vutukuru CS 653 Spring 2014 Jan 16, Thursday Channel Coding Modulated waveforms disrupted by signal propagation through wireless channel leads

More information

ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013

ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013 ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013 Lecture 18 Today: (1) da Silva Discussion, (2) Error Correction Coding, (3) Error Detection (CRC) HW 8 due Tue. HW 9 (on Lectures

More information

Synchronization of Hamming Codes

Synchronization of Hamming Codes SYCHROIZATIO OF HAMMIG CODES 1 Synchronization of Hamming Codes Aveek Dutta, Pinaki Mukherjee Department of Electronics & Telecommunications, Institute of Engineering and Management Abstract In this report

More information

Page 1. Outline. Basic Idea. Hamming Distance. Hamming Distance Visual: HD=2

Page 1. Outline. Basic Idea. Hamming Distance. Hamming Distance Visual: HD=2 Outline Basic Concepts Physical Redundancy Error Detecting/Correcting Codes Re-Execution Techniques Backward Error Recovery Techniques Basic Idea Start with k-bit data word Add r check bits Total = n-bit

More information

IEEE C /02R1. IEEE Mobile Broadband Wireless Access <http://grouper.ieee.org/groups/802/mbwa>

IEEE C /02R1. IEEE Mobile Broadband Wireless Access <http://grouper.ieee.org/groups/802/mbwa> 23--29 IEEE C82.2-3/2R Project Title Date Submitted IEEE 82.2 Mobile Broadband Wireless Access Soft Iterative Decoding for Mobile Wireless Communications 23--29

More information

Hamming Codes as Error-Reducing Codes

Hamming Codes as Error-Reducing Codes Hamming Codes as Error-Reducing Codes William Rurik Arya Mazumdar Abstract Hamming codes are the first nontrivial family of error-correcting codes that can correct one error in a block of binary symbols.

More information

ECE 6640 Digital Communications

ECE 6640 Digital Communications ECE 6640 Digital Communications Dr. Bradley J. Bazuin Assistant Professor Department of Electrical and Computer Engineering College of Engineering and Applied Sciences Chapter 8 8. Channel Coding: Part

More information

CT-516 Advanced Digital Communications

CT-516 Advanced Digital Communications CT-516 Advanced Digital Communications Yash Vasavada Winter 2017 DA-IICT Lecture 17 Channel Coding and Power/Bandwidth Tradeoff 20 th April 2017 Power and Bandwidth Tradeoff (for achieving a particular

More information

Performance Evaluation of Low Density Parity Check codes with Hard and Soft decision Decoding

Performance Evaluation of Low Density Parity Check codes with Hard and Soft decision Decoding Performance Evaluation of Low Density Parity Check codes with Hard and Soft decision Decoding Shalini Bahel, Jasdeep Singh Abstract The Low Density Parity Check (LDPC) codes have received a considerable

More information

Improvement Of Block Product Turbo Coding By Using A New Concept Of Soft Hamming Decoder

Improvement Of Block Product Turbo Coding By Using A New Concept Of Soft Hamming Decoder European Scientific Journal June 26 edition vol.2, No.8 ISSN: 857 788 (Print) e - ISSN 857-743 Improvement Of Block Product Turbo Coding By Using A New Concept Of Soft Hamming Decoder Alaa Ghaith, PhD

More information

Error-Correcting Codes

Error-Correcting Codes Error-Correcting Codes Information is stored and exchanged in the form of streams of characters from some alphabet. An alphabet is a finite set of symbols, such as the lower-case Roman alphabet {a,b,c,,z}.

More information

Convolutional Coding Using Booth Algorithm For Application in Wireless Communication

Convolutional Coding Using Booth Algorithm For Application in Wireless Communication Available online at www.interscience.in Convolutional Coding Using Booth Algorithm For Application in Wireless Communication Sishir Kalita, Parismita Gogoi & Kandarpa Kumar Sarma Department of Electronics

More information

Error Correcting Code

Error Correcting Code Error Correcting Code Robin Schriebman April 13, 2006 Motivation Even without malicious intervention, ensuring uncorrupted data is a difficult problem. Data is sent through noisy pathways and it is common

More information

Contents Chapter 1: Introduction... 2

Contents Chapter 1: Introduction... 2 Contents Chapter 1: Introduction... 2 1.1 Objectives... 2 1.2 Introduction... 2 Chapter 2: Principles of turbo coding... 4 2.1 The turbo encoder... 4 2.1.1 Recursive Systematic Convolutional Codes... 4

More information

Implementation of Different Interleaving Techniques for Performance Evaluation of CDMA System

Implementation of Different Interleaving Techniques for Performance Evaluation of CDMA System Implementation of Different Interleaving Techniques for Performance Evaluation of CDMA System Anshu Aggarwal 1 and Vikas Mittal 2 1 Anshu Aggarwal is student of M.Tech. in the Department of Electronics

More information

Department of Electronic Engineering FINAL YEAR PROJECT REPORT

Department of Electronic Engineering FINAL YEAR PROJECT REPORT Department of Electronic Engineering FINAL YEAR PROJECT REPORT BEngECE-2009/10-- Student Name: CHEUNG Yik Juen Student ID: Supervisor: Prof.

More information

White Paper FEC In Optical Transmission. Giacomo Losio ProLabs Head of Technology

White Paper FEC In Optical Transmission. Giacomo Losio ProLabs Head of Technology White Paper FEC In Optical Transmission Giacomo Losio ProLabs Head of Technology 2014 FEC In Optical Transmission When we introduced the DWDM optics, we left out one important ingredient that really makes

More information

High-Rate Non-Binary Product Codes

High-Rate Non-Binary Product Codes High-Rate Non-Binary Product Codes Farzad Ghayour, Fambirai Takawira and Hongjun Xu School of Electrical, Electronic and Computer Engineering University of KwaZulu-Natal, P. O. Box 4041, Durban, South

More information

QUESTION BANK EC 1351 DIGITAL COMMUNICATION YEAR / SEM : III / VI UNIT I- PULSE MODULATION PART-A (2 Marks) 1. What is the purpose of sample and hold

QUESTION BANK EC 1351 DIGITAL COMMUNICATION YEAR / SEM : III / VI UNIT I- PULSE MODULATION PART-A (2 Marks) 1. What is the purpose of sample and hold QUESTION BANK EC 1351 DIGITAL COMMUNICATION YEAR / SEM : III / VI UNIT I- PULSE MODULATION PART-A (2 Marks) 1. What is the purpose of sample and hold circuit 2. What is the difference between natural sampling

More information

Error Control Codes. Tarmo Anttalainen

Error Control Codes. Tarmo Anttalainen Tarmo Anttalainen email: tarmo.anttalainen@evitech.fi.. Abstract: This paper gives a brief introduction to error control coding. It introduces bloc codes, convolutional codes and trellis coded modulation

More information

Error Detection and Correction

Error Detection and Correction . Error Detection and Companies, 27 CHAPTER Error Detection and Networks must be able to transfer data from one device to another with acceptable accuracy. For most applications, a system must guarantee

More information

New Forward Error Correction and Modulation Technologies Low Density Parity Check (LDPC) Coding and 8-QAM Modulation in the CDM-600 Satellite Modem

New Forward Error Correction and Modulation Technologies Low Density Parity Check (LDPC) Coding and 8-QAM Modulation in the CDM-600 Satellite Modem New Forward Error Correction and Modulation Technologies Low Density Parity Check (LDPC) Coding and 8-QAM Modulation in the CDM-600 Satellite Modem Richard Miller Senior Vice President, New Technology

More information

Nonlinear Multi-Error Correction Codes for Reliable MLC NAND Flash Memories Zhen Wang, Mark Karpovsky, Fellow, IEEE, and Ajay Joshi, Member, IEEE

Nonlinear Multi-Error Correction Codes for Reliable MLC NAND Flash Memories Zhen Wang, Mark Karpovsky, Fellow, IEEE, and Ajay Joshi, Member, IEEE IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 20, NO. 7, JULY 2012 1221 Nonlinear Multi-Error Correction Codes for Reliable MLC NAND Flash Memories Zhen Wang, Mark Karpovsky, Fellow,

More information

Channel Coding RADIO SYSTEMS ETIN15. Lecture no: Ove Edfors, Department of Electrical and Information Technology

Channel Coding RADIO SYSTEMS ETIN15. Lecture no: Ove Edfors, Department of Electrical and Information Technology RADIO SYSTEMS ETIN15 Lecture no: 7 Channel Coding Ove Edfors, Department of Electrical and Information Technology Ove.Edfors@eit.lth.se 2012-04-23 Ove Edfors - ETIN15 1 Contents (CHANNEL CODING) Overview

More information

Revision of Lecture Eleven

Revision of Lecture Eleven Revision of Lecture Eleven Previous lecture we have concentrated on carrier recovery for QAM, and modified early-late clock recovery for multilevel signalling as well as star 16QAM scheme Thus we have

More information

Multiple-Bases Belief-Propagation for Decoding of Short Block Codes

Multiple-Bases Belief-Propagation for Decoding of Short Block Codes Multiple-Bases Belief-Propagation for Decoding of Short Block Codes Thorsten Hehn, Johannes B. Huber, Stefan Laendner, Olgica Milenkovic Institute for Information Transmission, University of Erlangen-Nuremberg,

More information

Computer Science 1001.py. Lecture 25 : Intro to Error Correction and Detection Codes

Computer Science 1001.py. Lecture 25 : Intro to Error Correction and Detection Codes Computer Science 1001.py Lecture 25 : Intro to Error Correction and Detection Codes Instructors: Daniel Deutch, Amiram Yehudai Teaching Assistants: Michal Kleinbort, Amir Rubinstein School of Computer

More information

Communication Theory and Engineering

Communication Theory and Engineering Communication Theory and Engineering Master's Degree in Electronic Engineering Sapienza University of Rome A.A. 208-209 Practice work 8 Soft vs. Hard decoding Hard vs. Soft decoding Hard decoding: the

More information

International Journal of Digital Application & Contemporary research Website: (Volume 1, Issue 7, February 2013)

International Journal of Digital Application & Contemporary research Website:   (Volume 1, Issue 7, February 2013) Performance Analysis of OFDM under DWT, DCT based Image Processing Anshul Soni soni.anshulec14@gmail.com Ashok Chandra Tiwari Abstract In this paper, the performance of conventional discrete cosine transform

More information

International Journal of Computer Trends and Technology (IJCTT) Volume 40 Number 2 - October2016

International Journal of Computer Trends and Technology (IJCTT) Volume 40 Number 2 - October2016 Signal Power Consumption in Digital Communication using Convolutional Code with Compared to Un-Coded Madan Lal Saini #1, Dr. Vivek Kumar Sharma *2 # Ph. D. Scholar, Jagannath University, Jaipur * Professor,

More information

ECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 9: Error Control Coding

ECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 9: Error Control Coding ECE 476/ECE 501C/CS 513 - Wireless Communication Systems Winter 2005 Lecture 9: Error Control Coding Chapter 8 Coding and Error Control From: Wireless Communications and Networks by William Stallings,

More information

Improved concatenated (RS-CC) for OFDM systems

Improved concatenated (RS-CC) for OFDM systems Improved concatenated (RS-CC) for OFDM systems Mustafa Dh. Hassib 1a), JS Mandeep 1b), Mardina Abdullah 1c), Mahamod Ismail 1d), Rosdiadee Nordin 1e), and MT Islam 2f) 1 Department of Electrical, Electronics,

More information

Study of Turbo Coded OFDM over Fading Channel

Study of Turbo Coded OFDM over Fading Channel International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 3, Issue 2 (August 2012), PP. 54-58 Study of Turbo Coded OFDM over Fading Channel

More information

EECS 380: Wireless Technologies Week 7-8

EECS 380: Wireless Technologies Week 7-8 EECS 380: Wireless Technologies Week 7-8 Michael L. Honig Northwestern University May 2018 Outline Diversity, MIMO Multiple Access techniques FDMA, TDMA OFDMA (LTE) CDMA (3G, 802.11b, Bluetooth) Random

More information

RADIO SYSTEMS ETIN15. Channel Coding. Ove Edfors, Department of Electrical and Information Technology

RADIO SYSTEMS ETIN15. Channel Coding. Ove Edfors, Department of Electrical and Information Technology RADIO SYSTEMS ETIN15 Lecture no: 7 Channel Coding Ove Edfors, Department of Electrical and Information Technology Ove.Edfors@eit.lth.se 2016-04-18 Ove Edfors - ETIN15 1 Contents (CHANNEL CODING) Overview

More information

SIGNALS AND SYSTEMS LABORATORY 13: Digital Communication

SIGNALS AND SYSTEMS LABORATORY 13: Digital Communication SIGNALS AND SYSTEMS LABORATORY 13: Digital Communication INTRODUCTION Digital Communication refers to the transmission of binary, or digital, information over analog channels. In this laboratory you will

More information

Chapter 10 Error Detection and Correction 10.1

Chapter 10 Error Detection and Correction 10.1 Data communication and networking fourth Edition by Behrouz A. Forouzan Chapter 10 Error Detection and Correction 10.1 Note Data can be corrupted during transmission. Some applications require that errors

More information

n Based on the decision rule Po- Ning Chapter Po- Ning Chapter

n Based on the decision rule Po- Ning Chapter Po- Ning Chapter n Soft decision decoding (can be analyzed via an equivalent binary-input additive white Gaussian noise channel) o The error rate of Ungerboeck codes (particularly at high SNR) is dominated by the two codewords

More information

Hamming net based Low Complexity Successive Cancellation Polar Decoder

Hamming net based Low Complexity Successive Cancellation Polar Decoder Hamming net based Low Complexity Successive Cancellation Polar Decoder [1] Makarand Jadhav, [2] Dr. Ashok Sapkal, [3] Prof. Ram Patterkine [1] Ph.D. Student, [2] Professor, Government COE, Pune, [3] Ex-Head

More information

Department of Electronics and Communication Engineering 1

Department of Electronics and Communication Engineering 1 UNIT I SAMPLING AND QUANTIZATION Pulse Modulation 1. Explain in detail the generation of PWM and PPM signals (16) (M/J 2011) 2. Explain in detail the concept of PWM and PAM (16) (N/D 2012) 3. What is the

More information

Umudike. Abia State, Nigeria

Umudike. Abia State, Nigeria A Comparative Study between Hamming Code and Reed-Solomon Code in Byte Error Detection and Correction Chukwuma Okeke 1, M.Eng 2 1,2 Department of Electrical/Electronics Engineering, Michael Okpara University

More information

AHA Application Note. Primer: Reed-Solomon Error Correction Codes (ECC)

AHA Application Note. Primer: Reed-Solomon Error Correction Codes (ECC) AHA Application Note Primer: Reed-Solomon Error Correction Codes (ECC) ANRS01_0404 Comtech EF Data Corporation 1126 Alturas Drive Moscow ID 83843 tel: 208.892.5600 fax: 208.892.5601 www.aha.com Table of

More information

Implementation of Reed Solomon Encoding Algorithm

Implementation of Reed Solomon Encoding Algorithm Implementation of Reed Solomon Encoding Algorithm P.Sunitha 1, G.V.Ujwala 2 1 2 Associate Professor, Pragati Engineering College,ECE --------------------------------------------------------------------------------------------------------------------

More information

16.36 Communication Systems Engineering

16.36 Communication Systems Engineering MIT OpenCourseWare http://ocw.mit.edu 16.36 Communication Systems Engineering Spring 2009 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 16.36: Communication

More information

Mathematics Explorers Club Fall 2012 Number Theory and Cryptography

Mathematics Explorers Club Fall 2012 Number Theory and Cryptography Mathematics Explorers Club Fall 2012 Number Theory and Cryptography Chapter 0: Introduction Number Theory enjoys a very long history in short, number theory is a study of integers. Mathematicians over

More information

Error Correction Codes for Non-Volatile Memories

Error Correction Codes for Non-Volatile Memories Error Correction Codes for Non-Volatile Memories Error Correction Codes for Non-Volatile Memories R. Micheloni, A. Marelli and R. Ravasio Qimonda Italy srl, Design Center Vimercate, Italy Rino Micheloni

More information

MULTILEVEL CODING (MLC) with multistage decoding

MULTILEVEL CODING (MLC) with multistage decoding 350 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 52, NO. 3, MARCH 2004 Power- and Bandwidth-Efficient Communications Using LDPC Codes Piraporn Limpaphayom, Student Member, IEEE, and Kim A. Winick, Senior

More information

UNIT I Source Coding Systems

UNIT I Source Coding Systems SIDDHARTH GROUP OF INSTITUTIONS: PUTTUR Siddharth Nagar, Narayanavanam Road 517583 QUESTION BANK (DESCRIPTIVE) Subject with Code: DC (16EC421) Year & Sem: III-B. Tech & II-Sem Course & Branch: B. Tech

More information

Performance comparison of convolutional and block turbo codes

Performance comparison of convolutional and block turbo codes Performance comparison of convolutional and block turbo codes K. Ramasamy 1a), Mohammad Umar Siddiqi 2, Mohamad Yusoff Alias 1, and A. Arunagiri 1 1 Faculty of Engineering, Multimedia University, 63100,

More information

FPGA Implementation Of An LDPC Decoder And Decoding. Algorithm Performance

FPGA Implementation Of An LDPC Decoder And Decoding. Algorithm Performance FPGA Implementation Of An LDPC Decoder And Decoding Algorithm Performance BY LUIGI PEPE B.S., Politecnico di Torino, Turin, Italy, 2011 THESIS Submitted as partial fulfillment of the requirements for the

More information

Lab 3.0. Pulse Shaping and Rayleigh Channel. Faculty of Information Engineering & Technology. The Communications Department

Lab 3.0. Pulse Shaping and Rayleigh Channel. Faculty of Information Engineering & Technology. The Communications Department Faculty of Information Engineering & Technology The Communications Department Course: Advanced Communication Lab [COMM 1005] Lab 3.0 Pulse Shaping and Rayleigh Channel 1 TABLE OF CONTENTS 2 Summary...

More information

Performance Evaluation and Comparative Analysis of Various Concatenated Error Correcting Codes Using BPSK Modulation for AWGN Channel

Performance Evaluation and Comparative Analysis of Various Concatenated Error Correcting Codes Using BPSK Modulation for AWGN Channel International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 5, Number 3 (2012), pp. 235-244 International Research Publication House http://www.irphouse.com Performance Evaluation

More information

Chapter 2 Channel Equalization

Chapter 2 Channel Equalization Chapter 2 Channel Equalization 2.1 Introduction In wireless communication systems signal experiences distortion due to fading [17]. As signal propagates, it follows multiple paths between transmitter and

More information

Hamming Codes and Decoding Methods

Hamming Codes and Decoding Methods Hamming Codes and Decoding Methods Animesh Ramesh 1, Raghunath Tewari 2 1 Fourth year Student of Computer Science Indian institute of Technology Kanpur 2 Faculty of Computer Science Advisor to the UGP

More information

Introduction to Error Control Coding

Introduction to Error Control Coding Introduction to Error Control Coding 1 Content 1. What Error Control Coding Is For 2. How Coding Can Be Achieved 3. Types of Coding 4. Types of Errors & Channels 5. Types of Codes 6. Types of Error Control

More information

SIMULATIONS OF ERROR CORRECTION CODES FOR DATA COMMUNICATION OVER POWER LINES

SIMULATIONS OF ERROR CORRECTION CODES FOR DATA COMMUNICATION OVER POWER LINES SIMULATIONS OF ERROR CORRECTION CODES FOR DATA COMMUNICATION OVER POWER LINES Michelle Foltran Miranda Eduardo Parente Ribeiro mifoltran@hotmail.com edu@eletrica.ufpr.br Departament of Electrical Engineering,

More information

Q-ary LDPC Decoders with Reduced Complexity

Q-ary LDPC Decoders with Reduced Complexity Q-ary LDPC Decoders with Reduced Complexity X. H. Shen & F. C. M. Lau Department of Electronic and Information Engineering, The Hong Kong Polytechnic University, Hong Kong Email: shenxh@eie.polyu.edu.hk

More information

Lecture #2. EE 471C / EE 381K-17 Wireless Communication Lab. Professor Robert W. Heath Jr.

Lecture #2. EE 471C / EE 381K-17 Wireless Communication Lab. Professor Robert W. Heath Jr. Lecture #2 EE 471C / EE 381K-17 Wireless Communication Lab Professor Robert W. Heath Jr. Preview of today s lecture u Introduction to digital communication u Components of a digital communication system

More information