This document summarizes an iterative network-channel decoding scheme for cooperative space-time transmission with network coding. The scheme uses convolutional codes as network codes at the relay node and Reed-Solomon codes as channel codes at the user nodes. An iterative joint network-channel decoder exchanges soft information between convolutional code-based network decoder and Reed-Solomon code-based channel decoders. Extrinsic information transfer analysis is performed to investigate the convergence properties of the proposed iterative decoder.
This document summarizes research on multi-numerology 5G new radio (NR) systems. It begins with an introduction comparing the flexibility of NR and LTE, noting that NR allows simultaneous use of multiple numerologies. Section II further describes differences in flexibility between NR and LTE regarding 3GPP standards. Section III then outlines potential research opportunities for improving multi-numerology systems, such as addressing interference between non-orthogonal numerologies. Finally, Section IV indicates that simulation results on inter-numerology interference will be presented as a function of guard allocation and parameters.
PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...
The document analyzes the bit error rate (BER) performance of the WiMAX physical layer using different concatenated channel coding schemes and digital modulations under realistic channel conditions. Computer simulations show that a WiMAX system using concatenated CRC-CC channel coding and QAM modulation performs better than one using RS-CC coding, achieving a lower BER at a given SNR in additive white Gaussian noise, Rayleigh fading, and Rician fading channels. Specifically, the CRC-CC coded system reaches a BER of 10-4 at around 6 dB in AWGN channels, compared to over 6.6 dB for RS-CC coding.
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...
This document summarizes a research paper that analyzes the rate outage probability for OFDMA multi-hop broadband wireless networks under Nakagami-m fading channels. The paper derives closed-form expressions for the rate outage probability, moment generating function, probability distribution function, and cumulative distribution function. It considers both single-hop and multi-hop network scenarios. For single-hop networks, the paper formulates an optimization problem to maximize total transmission rate while ensuring fairness for all users.
Performance evaluation of family of prime sequence codes in an ocdma system
This document analyzes and compares the performance of different families of prime sequence codes for optical code division multiple access (OCDMA) systems. It describes prime codes, modified prime codes, new modified prime codes, double padded modified prime codes, and evaluates them based on code length and code weight. Longer codes with higher code weights are found to have better correlation properties and lower bit error rates, allowing more users to be supported in the OCDMA system.
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
This document describes a study that developed a test bed to evaluate load and battery lifetime in wireless mesh networks using a multicast forwarding approach. The test bed used the AODV routing protocol and implemented layer 3 acknowledgments and retransmissions. Results found that the network supported data delivery with acknowledgments even under full load. Battery lifetime across mesh nodes was measured between 19-100% and load was minimum compared to previous work, demonstrating the effectiveness of the multicast forwarding approach. Future work could enhance security and implement cross-layer support between network and MAC layers.
This document contains 30 important questions related to data communication networks for a pre-university exam. The questions cover a range of topics including comparing TCP and OSI models, explaining IPv6, drawing and explaining the TCP/IP architecture, different network devices, transmission mediums, ALOHA protocols, congestion control algorithms, routing algorithms like Dijkstra's, data rates and bandwidth, error detection methods, network switching, application and transport layers, Hamming codes, technologies like Bluetooth, cryptography, ATM, network security, generations of Ethernet, PPP and HDLC frame structures, differences between various guided and unguided media, protocols, topologies, and cables, CSMA/CD networks, and ARQ protocols.
Study of the operational SNR while constructing polar codes IJECEIAES
Channel coding is commonly based on protecting information to be communicated across an unreliable medium, by adding patterns of redundancy into the transmission path. Also referred to as forward error control coding (FECC), the technique is widely used to enable correcting or at least detecting bit errors in digital communication systems. In this paper we study an original FECC known as polar coding which has proven to meet the typical use cases of the next generation mobile standard. This work is motivated by the suitability of polar codes for the new coming wireless era. Hence, we investigate the performance of polar codes in terms of bit error rate (BER) for several codeword lengths and code rates. We first perform a discrete search to find the best operational signal-to-noise ratio (SNR) at two different code rates, while varying the blocklength. We find in our extensive simulations that the BER becomes more sensitive to operational SNR (OSNR) as long as we increase the blocklength and code rate. Finally, we note that increasing blocklength achieves an SNR gain, while increasing code rate changes the OSNR domain. This trade-off sorted out must be taken into consideration while designing polar codes for high-throughput application.
This document summarizes research on combining fountain coding and network coding over wireless channels. Fountain coding is an error correction technique that allows recovery from erased packets. Network coding improves throughput in wireless networks by allowing nodes to combine packets. The study models a simple network using both techniques and simulates its performance over different wireless fading channels. The results show that combining fountain and network coding improves throughput by over 70% compared to using only network coding. It also achieves zero error rate under different channel conditions, outperforming the use of only network coding.
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document summarizes research on multi-numerology 5G new radio (NR) systems. It begins with an introduction comparing the flexibility of NR and LTE, noting that NR allows simultaneous use of multiple numerologies. Section II further describes differences in flexibility between NR and LTE regarding 3GPP standards. Section III then outlines potential research opportunities for improving multi-numerology systems, such as addressing interference between non-orthogonal numerologies. Finally, Section IV indicates that simulation results on inter-numerology interference will be presented as a function of guard allocation and parameters.
PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...ijistjournal
The document analyzes the bit error rate (BER) performance of the WiMAX physical layer using different concatenated channel coding schemes and digital modulations under realistic channel conditions. Computer simulations show that a WiMAX system using concatenated CRC-CC channel coding and QAM modulation performs better than one using RS-CC coding, achieving a lower BER at a given SNR in additive white Gaussian noise, Rayleigh fading, and Rician fading channels. Specifically, the CRC-CC coded system reaches a BER of 10-4 at around 6 dB in AWGN channels, compared to over 6.6 dB for RS-CC coding.
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...IJASCSE
This document summarizes a research paper that analyzes the rate outage probability for OFDMA multi-hop broadband wireless networks under Nakagami-m fading channels. The paper derives closed-form expressions for the rate outage probability, moment generating function, probability distribution function, and cumulative distribution function. It considers both single-hop and multi-hop network scenarios. For single-hop networks, the paper formulates an optimization problem to maximize total transmission rate while ensuring fairness for all users.
Performance evaluation of family of prime sequence codes in an ocdma systemIAEME Publication
This document analyzes and compares the performance of different families of prime sequence codes for optical code division multiple access (OCDMA) systems. It describes prime codes, modified prime codes, new modified prime codes, double padded modified prime codes, and evaluates them based on code length and code weight. Longer codes with higher code weights are found to have better correlation properties and lower bit error rates, allowing more users to be supported in the OCDMA system.
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...IOSR Journals
This document describes a study that developed a test bed to evaluate load and battery lifetime in wireless mesh networks using a multicast forwarding approach. The test bed used the AODV routing protocol and implemented layer 3 acknowledgments and retransmissions. Results found that the network supported data delivery with acknowledgments even under full load. Battery lifetime across mesh nodes was measured between 19-100% and load was minimum compared to previous work, demonstrating the effectiveness of the multicast forwarding approach. Future work could enhance security and implement cross-layer support between network and MAC layers.
This document contains 30 important questions related to data communication networks for a pre-university exam. The questions cover a range of topics including comparing TCP and OSI models, explaining IPv6, drawing and explaining the TCP/IP architecture, different network devices, transmission mediums, ALOHA protocols, congestion control algorithms, routing algorithms like Dijkstra's, data rates and bandwidth, error detection methods, network switching, application and transport layers, Hamming codes, technologies like Bluetooth, cryptography, ATM, network security, generations of Ethernet, PPP and HDLC frame structures, differences between various guided and unguided media, protocols, topologies, and cables, CSMA/CD networks, and ARQ protocols.
1) The document presents upper and lower bounds on the capacity of MIMO relay channels, which are wireless channels with multiple antennas at the source, relay, and destination nodes.
2) For fixed channel conditions, an upper bound is derived involving maximization over covariance matrices and a scalar parameter capturing signal cooperation. A lower bound is found as the maximum of the direct link and cascaded link capacities.
3) The analysis is extended to Rayleigh fading channels, where the ergodic (average) capacity is considered. It is shown that under certain conditions, the upper and lower bounds meet, characterizing the exact ergodic capacity.
This document describes a space-time block coding (STBC) orthogonal frequency-division multiplexing (OFDM) system for text message transmission over fading channels using multiple transmit antennas. It evaluates the bit error rate (BER) performance of the system using different digital modulation schemes (BPSK, QPSK, QAM-8) over additive white Gaussian noise (AWGN) channels and fading channels. Low-density parity-check (LDPC) coding is concatenated with convolutional coding in the system to improve error performance. Simulation results show that the system is effective in retrieving the transmitted text message under noise and fading conditions, and that BER performance degrades with increasing noise power as expected.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Outage and throughput performance of cognitive radio based power domain based...TELKOMNIKA JOURNAL
This paper considers power domain based multiple access (PDMA) in cognitive radio network to serve numerous users who intend to multiple access to core network. In particular, we investigate the effect of signal combination scheme equipped at PDMA end-users as existence of direct link and relay link. This system model using relay scheme provides performance improvement on the outage probability of two PDMA end-users. We first propose a simple scheme of fixed power allocation to PDMA users who exhibit performance gap and fairness. Inspired by PDMA strategy, we then find signal to noise ratio (SNR) to detect separated signal for each user. In addition, the exact expressions of outage probability are derived in assumption that receiver can cancel out the interference completely with successive interference cancellation (SIC). By exploiting theoretical and simulation results, both considered combination schemes (Maximal Ratio Combining (MRC) and Selection Combining (SC) can achieve improved performance of two PDMA users significantly.
This document proposes using a Markov chain model and bipartite graphing to efficiently schedule spectrum in cognitive radio networks. It models the cognitive radio network as a k-connected bipartite graph and uses a Markov chain to represent the state transitions of channels between idle and busy. It then applies the Banker's algorithm to the modeled cognitive radio network to allocate spectrum to users while avoiding deadlock. The proposed approach indicates it could improve spectrum scheduling and allocation performance in cognitive radio networks.
This document compares the performance of three mobile ad hoc network (MANET) routing protocols: AODV, FSR, and IERP. It uses the QualNet network simulator to evaluate these protocols based on various metrics like throughput, average jitter, average end-to-end delay, and packet delivery ratio. The protocols are evaluated under different node speeds on a grid topology network with 90 nodes over an area of 1500x1500 meters. Simulation results show that AODV generally performs best in terms of throughput and packet delivery ratio across varying node speeds, while FSR performs worst for these metrics. IERP shows the worst performance for average end-to-end delay and average jitter as node speed increases.
In a network, one-to-all broadcasting is the process of disseminating messages from a source node to all the nodes existing in the network through successive data transmissions between pairs of nodes. Broadcasting is the most primary communication process in a network. In this paper, we study on multiport wormhole-routed multicomputers where nodes are able to send multiple messages into the network at a
time. We propose efficient broadcast algorithms in multi-port wormhole-routed multicomputers which are characterized by 3D mesh topology. The proposed algorithm Three-Dimension Broadcast Layers (3-DBl) is designed such that can send messages to destinations within two start-up communication phases for each 2-D mesh. The second proposed algorithm Three-Dimension Broadcast Surfaces (3-DBS) is designed such that can send messages to destinations within six start-up communication phases. The performance study in
this paper clearly shows the advantage of the proposed algorithm.
PERFORMANCE OF ITERATIVE LDPC-BASED SPACE-TIME TRELLIS CODED MIMO-OFDM SYSTEM...ijcseit
This paper presents the bit error rate (BER) performance of the low density parity check (LDPC) based
space-time trellis coded 2×2 multiple-input multiple-output orthogonal frequency-division multiplexing
(STTC-MIMO-OFDM) system on text message transmission. The system under investigation incorporates
1/2-rated LDPC encoding scheme under various digital modulations (BPSK, QPSK and QAM) over an
additative white gaussian noise (AWGN) and other fading (Raleigh and Rician) channels for two transmit
and two receive antennas. At the receiving section of the simulated system, Minimum Mean-Square-Error
(MMSE) channel equalization technique has been implemented to extract transmitted symbols without
enhancing noise power level. The effectiveness of the proposed system is analyzed in terms of BER with
signal-to-noise ratio (SNR). It is observable from the Matlab based simulation study that the proposed
system outperforms with BPSK as compared to other digital modulation schemes at relatively low SNRs
under AWGN, Rayleigh and Rician fading channels. The transmitted text message is found to have
retrieved effectively at the receiver under implementation of iterative sum-product LDPC decoding
algorithm. It has also been anticipated that the performance of the LDPC-based STTC-MIMO-OFDM
system degrades with the increase of noise power.
Network-on-Chip (NoC) is a new approach for designing the communication subsystem among IP cores in a System-on-Chip (SoC). NoC applies networking theory and related methods to on-chip communication and brings out notable improvements over conventional bus and crossbar interconnections. NoC offers a great improvement over the issues like scalability, productivity, power efficiency and signal integrity challenges of complex SoC design. In an NoC, the communication among different nodes is achieved by routing packets through a pre-designed network fabric according to some routing algorithm. Therefore, architecture and related routing algorithm play an important role to the improvement of overall performance of an NoC. A Diametrical 2D Mesh routing architecture has the facility of having some additional diagonal links with simple 2D Mesh architecture. In this work, we have proposed a Modified Extended 2D routing algorithm for this architecture, which will ensure that a packet always reaches the destination through the possible shortest path, and the path is always deadlock free.
Makalah ini membahas tentang Pancasila sebagai ideologi nasionalisme bangsa Indonesia. Pembahasan dimulai dari pengertian identitas nasional, hakikat suatu bangsa, proses terbentuknya identitas bangsa Indonesia, pengertian Pancasila, dan kedudukan Pancasila sebagai identitas nasional. Proses terbentuknya identitas nasional Indonesia dipengaruhi oleh sejarah, kebudayaan, suku bangsa, dan agama. Pancasila dijadikan dasar ideologi k
BAB I membahas latar belakang penulisan dokumen ini. BAB II membahas biografi Melinda Dee, kasus penggelapan uang nasabah Citibank oleh Melinda Dee, hukuman yang diterima, kondisi kesehatannya, dan pandangan hukum Islam, budaya, dan sosial terhadap korupsi. BAB III berisi kesimpulan dan saran.
Este documento resume una práctica de laboratorio sobre los puntos de ebullición de diferentes ácidos grasos. Los estudiantes calentaron muestras de aceite de almendra, aceite de cocina, aceite de oliva y aceite de vaselina y observaron que el aceite de cocina hierve a 180°C y el aceite de vaselina a 128°C. Luego separaron agua y aceite usando un embudo, demostrando que son líquidos inmiscibles. Concluyeron que las temperaturas de ebullición varían según el tipo de
Wireless sensor networks (WSNs) are regularly deployed in harsh and unattended environments, and
sensor nodes are easily exposed to attacks due to the random arrangement of the sensor field. An attacker
can inject fabricated reports from a compromised node with false votes and false vote-based reports. The
false report attacks can waste the energy of the intermediate nodes, shortening the network lifetime.
Furthermore, false votes cause the filtering out of legitimate reports. A probabilistic voting-based filtering
scheme (PVFS) was proposed as a countermeasure against this type of attacks by Li and Wu. PVFS uses a
vote threshold, a security threshold, and a verification node. The scheme does not make additional use
energy or communications resources because the verification node and threshold values are fixed. There
needs to be a verification node selection method that considers the energy resources of the node. In this
paper, we propose a verification path election scheme based on a fuzzy logic system. In the proposed
scheme, one node transmits reports in the node with a strong state through a fuzzy logic system after which
a neighbor is selected out of two from the surroundings. Experimental results show that the proposed
scheme improves energy savings up to maximum 13% relative to the PVFS.
Artificial neural networks (ANN) consider classification as one of the most dynamic research and
application areas. ANN is the branch of Artificial Intelligence (AI). The neural network was trained by
back propagation algorithm. The different combinations of functions and its effect while using ANN as a
classifier is studied and the correctness of these functions are analyzed for various kinds of datasets. The
back propagation neural network (BPNN) can be used as a highly successful tool for dataset classification
with suitable combination of training, learning and transfer functions. When the maximum likelihood
method was compared with backpropagation neural network method, the BPNN was more accurate than
maximum likelihood method. A high predictive ability with stable and well functioning BPNN is possible.
Multilayer feed-forward neural network algorithm is also used for classification. However BPNN proves to
be more effective than other classification algorithms.
Wireless sensor networks provide ubiquitous computing systems in various open environments. In the
environment, sensor nodes can easily be compromised by adversaries to generate injecting false data
attacks. The injecting false data attack not only consumes unnecessary energy in en-route nodes, but also
causes false alarms at the base station. To detect this type of attack, a bandwidth-efficient cooperative
authentication (BECAN) scheme was proposed to achieve high filtering probability and high reliability
based on random graph characteristics and cooperative bit-compressed authentication techniques. This
scheme may waste energy resources in en-route nodes due to the fixed number of forwarding reports. In
this paper, our proposed method effectively selects a dynamic number of forwarding reports in the source
nodes based on an evaluation function. The experimental results indicate that our proposed method
enhances the energy savings while maintaining security levels as compared to BECAN.
A design pattern is a general solution to a commonly occurring problem in software design. It is a
template to solve a problem that can be used in many different situations. Patterns formalize best practices
that the programmer can use to solve common problems when designing an application or systems. In this
article we have focused our attention on it, how the proposed UML diagrams can be implemented in C#
language and whether it is possible to make the diagram implementation in the program code with the
greatest possible precision.
Conceptual framework of supply chain management information system for curri...ijmvsc
The objectives of this research are (1) to synthesize a conceptual framework of supply chain managementinformation
system (SCM-IS) for curriculum management based on Thailand Qualifications Framework
for Higher Education; and (2) to evaluate the conceptual framework of supply chain managementinformation
system (SCM-IS) for curriculum management based on Thailand Qualifications Framework
for Higher Education. The research sample totaling 10 experts consisted of five experts on supply chain
management, two experts on curriculum, and three experts on information technology. The employed
research instrument is a questionnaire. Statistics employed for data analysis are mean and standard
deviation.
In materials sciences, a large amount of research data is generated through a broad spectrum of different
experiments. As of today, experimental research data including meta-data in materials science is often
stored decentralized by the researcher(s) conducting the experiments without generally accepted standards
on what and how to store data. The conducted research and experiments often involve a considerable
investment from public funding agencies that desire the results to be made available in order to increase
their impact. In order to achieve the goal of citable and (openly) accessible materials science experimental
research data in the future, not only an adequate infrastructure needs to be established but the question of
how to measure the quality of the experimental research data also to be addressed. In this publication, the
authors identify requirements and challenges towards a systematic methodology to measure experimental
research data quality prior to publication and derive different approaches on that basis. These methods are
critically discussed and assessed by their contribution and limitations towards the set goals. Concluding, a
combination of selected methods is presented as a systematic, functional and practical quality measurement
and assurance approach for experimental research data in materials science with the goal of supporting
the accessibility and dissemination of existing data sets.
Evaluation of some private commercial banks in bangladesh from performance pe...ijmvsc
Banks operate on a huge scale at the heart of the modern economy and the banking system has become an
integral part in the progress of economic development in Bangladesh. Besides, the banking sector has
made their innovation and efficiency crucial to the economy as it competes in an e-commerce world. The
role of banking system in this situation cannot be denied at all. This report intends to evaluate the
performance of selected private commercial banks in Bangladesh. In the study, best efforts have been put
on evaluating the performance. The growing pattern of branches, employees, deposits, loans and
advances, classified loan, net income and earnings per share of selected private commercial banks has
been considered to make an analysis on the performance evaluation of the selected private commercial
banks. To evaluate the performance, data have been collected from the secondary sources. Then the
collected data have been analyzed. From the analysis, it has been found that all of the selected banks are
in a position to make a sustainable growth in respect of branches, employees, deposits, loans and
advances, classified loan, net income and earnings per share during the period of 2007-2011 with some
fluctuation. Besides the growth pattern, other forms of calculations have been used for every selected
variable and they are trend equation and square of correlation coefficient. Under trend equation analysis,
the variables named branches, employees, deposits and net incomes hold more positive value than the
other variables considered. As the value of the slope always shows the positive number, it is a clear
indication that Bangladesh has a very good prospect in case of private commercial banks
Criteria of selecting bank in pakistani banking sector study of banking custo...ijmvsc
This study is designed to evaluate the customer’s behavior towards the bank selection in Sahiwal Division,
Pakistan. Questionnaire is used as instrument to measure the bank selection criteria and distributed to 150
respondents of the nationalized (Bank of Punjab), privatized (United Bank Ltd.) and private bank (Bank
Alfalah Ltd.) in Sahiwal. Eight factors including 34 attributes on 5 point Likert scale were used to
determine the criteria of selecting bank. Frequency table of demographic variables, descriptive statistics
of 8 factors and one sample t-test for testing hypothesis are used by SPSS version 16.0 to analyze the
customer’s bank selection criteria. Eight hypotheses were developed from the literature out of which three
were found to be significant. These three factors are “convenience”, “quality of services” and “price and
cost”.
Ecofriedly dyeing process and ecolabelsChandran Kani
This document discusses eco-friendly dyeing processes and eco-labeling. It defines what makes a product eco-friendly, including limiting harmful chemicals and minimizing pollution. The government of India has banned certain dyes and chemicals containing amines. Requirements for eco-friendly textiles include the absence of banned chemicals and heavy metals, and low levels of formaldehyde. The document then discusses how to make various textile production processes like scouring, bleaching, dyeing and finishing more environmentally friendly, for example by using enzymes. It also covers eco-labeling schemes in India to identify environmentally friendly textile products for consumers.
Jute is the 2nd most important fiber crop. its uses has been a great diversity. Here is a glance of such diversified uses and hence its potential importance in the economy.
Theodore Roosevelt expanded the Monroe Doctrine through his Roosevelt Corollary, asserting that the United States had the right to intervene in the economic affairs of countries in the Americas to prevent European powers from collecting debts. This justified American imperialism and expansion. Roosevelt advocated for "Big Stick Diplomacy" and used the Panama Canal as an example of projecting American power abroad during his presidency from 1901 to 1909.
This document discusses the medicinal uses of tobacco. It notes that tobacco is in the Solanaceae family and the leaves and dried cured leaves are commonly used. Tobacco contains nicotine and other constituents. While smoking tobacco is harmful, the document outlines several traditional medicinal uses of tobacco leaves and nicotine extracts, including as a sedative, expectorant, insecticide, and treatment for toothaches, skin rashes, and snake bites. Some research also suggests nicotine may help treat neurological disorders like Parkinson's and Alzheimer's diseases in small doses. The document concludes by noting tobacco is an effective natural insect repellent for gardens.
This document provides information on designing handloom textile products. It discusses key elements of design like lines, forms, colors, and textures. It also outlines the process of design which includes selecting a theme, researching trends, initial and final sketching, applying design principles such as balance and unity, and rendering the product. The goal is to translate paper designs into finished textile products using techniques like repeats and patterning suited for the production method.
The stage of maturity is utmost important for the harvesting of any crop. and for horticultural and plantation crops, its like the very life of those crops
Every person will become successful, when he/she realizes the power within him/her self. He/she makes every move towards his/her goal that they want to achieve in life. He/she becomes a role model for many. Even ordinary work becomes something special for him/her
IMPLEMENTATION OF JOINT NETWORK CHANNEL DECODING ALGORITHM FOR MULTIPLE ACCES...cscpconf
In this paper, we consider a Joint Network Channel Decoding (JNCD) algorithm applied to a wireless network consisting to M users. For this purpose M sources desire to send information
to one receiver by the help of an intermediate node which is the relay. The Physical Layer Network Coding (PLNC) allows the relay to decode the combined information being sent from different transmitters. Then, it forwards additional information to the destination node which receives also signals from source nodes. An iterative JNCD algorithm is developed at the receiver to estimate the information being sent from each transmitter. Simulation results show that the Bit Error Rate (BER) can be decreased by using this concept comparing to the reference one which doesn’t consider the network coding.
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...eSAT Journals
Abstract The design of Multi Carrier Direct Sequence Code Division Multiple Access (MC-DS-CDMA) structure which generalizes serial and parallel concatenated code is investigated to this project. This model is ideal for designing various codes in the performance of both error floor and water floor region. We propose a concatenated code for transmitter block which is used for multi carrier direct sequence CDMA technique. Simulation results of MC-DS-CDMA uplink system using Cadence software shows the various parameters such as memory, Execution time and number of transient steps required for the Execution of MC-DS-CDMA uplink system was estimated and also power consumed was determined for each block in the transmitter. An improved concatenated code model is used for uplink mobile communication. Further system performance improvements can be obtained by concatenating inner code and outer code and the results of computer simulations demonstrate that the performance of the concatenated code was investigated. Keywords: Code Division Multiple Access, Concatenated code, inner code, outer code, interleaving and power analysis.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Distributed Spatial Modulation based Cooperative Diversity Schemeijwmn
: In this paper, a distributed spatial modulation based cooperative diversity scheme for relay
wireless networks is proposed. Where, the space-time block code is exploited to integrate with distributed
spatial modulation. Therefore, the interested transmission scheme achieves high diversity gain. By using
Monte-Carlo simulation based on computer, we showed that our proposed transmission scheme outperforms
state-of-the-art cooperative relaying schemes in terms bit error rate (BER) performance.
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...IJNSA Journal
With the rapid growth of wireless communication infras,,tructure over the recent few years, new
challenges has been posed on the system and analysis on wireless adhoc networking. Implementation of
MIMO communication in such type of network is enhancing the packet transmission capabilities. There
are different techniques for cooperative transmission and broadcasting packet in MIMO equipped
Mobile Adhoc Network. We have employed a model network in the OPNET environment and propose a
new scheduling algorithm based on investigating the different broadcasting algorithm. The new
broadcasting algorithm improves the packet transmission rate of the network based on energy
performance of the network and minimizes the BER for different transmission mode which is illustrated
in this paper. The simulations are done in MATLAB and OPNET environment and the simulated result
for the packet transmission rate are collected and shown in the tabular form. Also simulate the network
for generating a comparative statement for each mobile node. And performance analysis is also done for
the model network. The main focus is to minimize BER and improve information efficiency of the
network.
OPTICAL SWITCHING CONTROLLER USING FPGA AS A CONTROLLER FOR OCDMA ENCODER SYSTEMEditor IJCATR
This paper proposed a design of optical switching controller using FPGA for OCDMA encoder system. The encoder is one
of the new technologies that use to transmit the coded data in the optical communication system by using FPGA and optical switches.
It is providing a high security for data transmission due to all data will be transmitting in binary code form. The output signals from
FPGA are coded with a binary code that given to an optical switch before it signal modulate with the carrier and transmit to the
receiver. In this paper, AA and 55 data were used for source 1 and source 2. It is generated sample data and sent packet data to the
FPGA and stored it into RAM. The simulation results have done by using software Verilog Spartan 2 programming to simulate. After
that the output will produces at waveform to display the output. The main function of FPGA controlling unit is producing single pulse
and configuring optical switching system.
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...IJNSA Journal
With the rapid growth of wireless communication infras,,tructure over the recent few years, new challenges has been posed on the system and analysis on wireless adhoc networking. Implementation of MIMO communication in such type of network is enhancing the packet transmission capabilities. There are different techniques for cooperative transmission and broadcasting packet in MIMO equipped Mobile Adhoc Network. We have employed a model network in the OPNET environment and propose a new scheduling algorithm based on investigating the different broadcasting algorithm. The new broadcasting algorithm improves the packet transmission rate of the network based on energy performance of the network and minimizes the BER for different transmission mode which is illustrated in this paper. The simulations are done in MATLAB and OPNET environment and the simulated result for the packet transmission rate are collected and shown in the tabular form. Also simulate the network for generating a comparative statement for each mobile node. And performance analysis is also done for the model network. The main focus is to minimize BER and improve information efficiency of the network.
The improvement of end to end delays in network management system using netwo...IJCNCJournal
The document summarizes research on improving end-to-end delays in a network management system using network coding. Specifically, it applies network coding to manage radio and television broadcast stations in a wireless network. The study shows that a proposed "Fast Forwarding Strategy" using network coding outperforms a classical routing strategy in reducing end-to-end delays from source to destination. It analyzes end-to-end delays theoretically using network calculus and conducts a practical study on a network of broadcast stations, finding the proposed strategy reduces delays compared to the classical strategy.
High Speed Low-Power Viterbi Decoder Using Trellis Code ModulationMangaiK4
Abstract - High speed low power viterbi decoders for trellis code modulation is well known for the delay consumption in underwater communication. In transmission system wireless communication is the transfer of information between two or more points that are not connected by an electrical conductor. WiMAX is the wireless communication standard designed to provide 30 to 40 Mega bits per second data rates. WiMAX as a standards based technology enabling the delivery of last mile wireless broadband access as an alternative to cable and DSL. WiMAX can provide at home or mobile internet access across whole cities or countries. The address generation of WiMAX is carried out by interleaver and deinterleaver. Interleaving is used to overcome correlated channel noise such as burst error or fading. The interleaver/deinterleaver rearranges input data such that consecutive data are spaced apart. The interleaved memory is to improve the speed of access to memory. The viterbi technique reduces the bit error rate and delay using wimax.
High Speed Low-Power Viterbi Decoder Using Trellis Code ModulationMangaiK4
Abstract - High speed low power viterbi decoders for trellis code modulation is well known for the delay consumption in underwater communication. In transmission system wireless communication is the transfer of information between two or more points that are not connected by an electrical conductor. WiMAX is the wireless communication standard designed to provide 30 to 40 Mega bits per second data rates. WiMAX as a standards based technology enabling the delivery of last mile wireless broadband access as an alternative to cable and DSL. WiMAX can provide at home or mobile internet access across whole cities or countries. The address generation of WiMAX is carried out by interleaver and deinterleaver. Interleaving is used to overcome correlated channel noise such as burst error or fading. The interleaver/deinterleaver rearranges input data such that consecutive data are spaced apart. The interleaved memory is to improve the speed of access to memory. The viterbi technique reduces the bit error rate and delay using wimax.
Index modulation is one of the promising techniques for future communications systems due to many improvement over the classical orthogonal frequency division multiplexing systems such as single RF chain, increased throughput for the same modulation order, achieved tradeoff between the efficiencies of the power and the spectral, and elimination of inter-channel interference. Many forms of index modulation researches exist where symbols are conveyed in antennas, subcarriers, time slots, and the space-time matrix. Spatial modulation is one member of index modulation family where symbols are conveyed in activating transmit/receive antennas. In this paper, a modification to a standard multiple input single output scheme by integrating spatial modulation using simplified mathematical procedure is achieved. In the transmitter side, data and activation symbols are distributed simultaneously using mathematical module and floor functions. At the receiver, a simplified maximum likelihood detector is used to obtain transmitted pair of symbols. To verify this, MATLAB simulink is used to simulate a downlink system where spatial modulation is applied to a base station. Results for different transmit antenna number and modulation order are obtained in the form of bit error rate versus signal to noise ratio.
A low complexity distributed differential scheme based on orthogonal space t...IJECEIAES
The document presents a new low complexity distributed differential scheme for decode-and-forward wireless relay networks. The proposed scheme uses orthogonal space time block coding and does not require channel state information or differential encoding. It achieves high data rates with low decoding complexity at the source, relay, and destination nodes. Computer simulations show the proposed differential technique outperforms reference strategies and enjoys low encoding and decoding complexity while providing full transmission rate.
1) The document analyzes the effect of intercarrier interference (ICI) on single carrier orthogonal frequency division multiplexing (SC-OFDM) systems.
2) It proposes a novel magnitude-keyed modulation scheme that provides SC-OFDM immunity to ICI. This outperforms other modulation schemes like OFDM, SC-OFDM, and MC-CDMA that use phase shift keying or quadrature amplitude modulation in environments with severe ICI.
3) The analysis shows that the effect of ICI on SC-OFDM signals is simply a phase offset on each data symbol, whereas ICI introduces interference between subcarriers for OFDM. Therefore, SC-OFDM has significantly better performance
A New Bit Split and Interleaved Channel Coding for MIMO DecoderIJARBEST JOURNAL
Authors:-C. Amar Singh Feroz1, S. Karthikeyan2, K. Mala3
Abstract– In wireless communications, the use of multiple antennas at both the
transmitter and receiver is a key technology to enable high data transmission without
additional bandwidth or transmit power. MIMO schemes are widely used in many
wireless standards, allowing higher throughput using spatial multiplexing techniques.
Bit split mapping based on JDD is designed. Here ETI coding is used for encoding and
Viterbi is used for decoding. Experimental results for 16-QAM and 64 QAM with the
code rate of ½ and 1/3 codes are shown to verify the proposed approach and to elucidate
the design tradeoffs in terms the BER performance. This bit split mapping based JDD
algorithm can greatly improve BER performance with different system settings.
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...ijngnjournal
WiMAX is Wireless Interoperability for Microwave Access has emerged as a promising solution for transmission of higher data rates for fixed and mobile applications. IEEE 802.16d and e are the standards proposed by WiMAX group for fixed and mobile. As the wireless channel have so many limitation Such as Multipath, Doppler spread, Delay spread and Line Of Sight (LOS)/Non Line Of Sight (NLOS) components. To attain higher data rates the Multi Carrier System with Multiple Input and Multiple Output (MIMO) is incorporated in the WiMAX. The Orthogonal Frequency Division Multiplexing (OFDM) is a multi carrier technique used with the WiMAX systems. In OFDM the available spectrum is split into numerous narrow band channels of dissimilar frequencies to achieve high data rate in a multi path fading environment. And all these sub carriers are considered to be orthogonal to each other. As the number of sub carriers is increased there is no guarantee of sustained orthogonality, i.e. at some point the carriers are not
independent to each other, and hence where the orthogonality can be loosed which leads to interference and also owing to the synchronization between transmitter and receiver local oscillator, it causes interference known as Inter Carrier Interference (ICI). The systems uses MIMO-OFDM will suffer with the effects of ICI and Carrier Frequency Offset (CFO) “ε”. However these affect the power leakage in the midst of sub carriers, consequently degrading the system performance. In this paper a new approach is proposed in order to reduce the ICI caused in WiMAX and improve the system performance. In this scheme at the transmitter side the modulated data and a few predefined pilot symbols are mapped onto the non
neighboring sub carriers with weighting coefficients of +1 and -1. With the aid of pilot symbols the frequency offset is exactly estimated by using Maximum Likelihood Estimation (MLE) and hence can be minimized. At demodulation stage the received signals are linearly combined along with their weighted
coefficients and pilot symbols, called as Pilot Aided Self Cancellation Method (PASCS). And also to realize the various wireless environments the simulations are carried out on Stanford University Interim (SUI) channels. The simulation results shows that by incorporating this method into WiMAX systems it performs better when the Line Of Sight (LOS) component is present in the transmission and also it improves the Bit Error Rate (BER) and Carrier to Interference Ratio (CIR). The CIR can be improved 20 dB. In this paper the effectiveness of PASCS scheme is compared with the Self Cancellation Method (SCM). It provides accurate estimation of frequency offset and when residual CFO is less significant the ICI can be diminished successfully.
MIMO System Performance Evaluation for High Data Rate Wireless Networks usin...IJMER
Space–time block coding is used for data communication in fading channels by multiple
transmit antennas. Message data is encoded by applying a space–time block code and after the encoding
the data is break into ‘n’ streams of simultaneously transmitted strings through n transmit antennas. The
received signal at the receiver end is the superposition of the n transmitted signals distorted due to noise
.For data recovery maximum likelihood decoding scheme is applied through decoupling of the signals
transmitted from different antennas instead of joint detection. The maximum likelihood decoding scheme
applies the orthogonal structure of the space–time block code (OSTBC) and gives a maximum-likelihood
decoding algorithm based on linear processing at the receiver. In this paper orthogonal space–time
block codes based model is developed using Matlab/Simulink to get the maximum diversity order for a
given number of transmit and receive antennas subject with a simple decoding algorithm.
The simulink block of orthogonal space coding block with space–time block codes is applied with and
without gray coding. The OSTBC codes gives the maximum possible transmission rate for any number of
transmit antennas using any arbitrary real constellation such of M-PSK array. For different complex
constellation of M- PSK space–time block codes are applied that achieve 1/2 and 3/4 of the maximum
possible transmission rate for MIMO transmit antennas using different complex constellations.
This document presents an intelligent link adaptation scheme for OFDM systems that adapts coding, modulation, and power allocation to maximize throughput. It uses a fuzzy rule-based system to select the optimal modulation and coding scheme based on channel state information and quality of service requirements. It then uses a differential evolution algorithm to find the optimal power vector to transmit over OFDM subcarriers while satisfying total power and bit error rate constraints. The proposed scheme is shown through simulations to outperform conventional fixed schemes and adaptive schemes that only optimize a subset of parameters. Product codes and QAM are used as the coding and modulation schemes, respectively.
The document discusses investigating packet transmission strategies in a MIMO equipped mobile ad hoc network using space-time coding. It proposes a new scheduling algorithm that improves packet transmission rate and energy performance. The system is modeled in OPNET using 40 randomly distributed nodes. Simulation results show the new algorithm enhances transmission efficiency compared to other methods by controlling node firing and scheduling packet transmissions based on network conditions and traffic demands.
A High Performance Hybrid Two Dimensional Spectral/Spatial NZCC/MD Code for S...IJCNCJournal
This paper proposes a new technique to construct a hybrid zero cross-correlation (NZCC) based on multiple diagonal (MD) code for two-dimensional (2D) spectral amplitude coding for optical code division multiple access code division multiple access (SAC-OCDMA) systems. The proposed hybrid code eliminates totally the multiple access interference (MAI) between a large number of users and allows them to connect simultaneously via the optical communication link with a high speed to receive huge data and serve various areas such as Internet, telephony, DAB radio, digital audio broadcasting, and DVB video. Simulation results demonstrate that the performance of such a SAC-OCDA system based on novel 2D hybrid NZCC/MD code can be easily improved keeping a less complex structure using couplers for direct spectral/spatial dimension (SDD) detection and show superior bit error rate (BER) values comparing to previously developed two-dimensional codes including perfect difference (2D-PD), diagonal Eigen-value units (2D-DEU), multi-service (2D-MS) and balanced incomplete block design (2D-BIBD) codes.
A HIGH PERFORMANCE HYBRID TWO DIMENSIONAL SPECTRAL/SPATIAL NZCC/MD CODE FOR S...IJCNCJournal
This paper proposes a new technique to construct a hybrid zero cross-correlation (NZCC) based on
multiple diagonal (MD) code for two-dimensional (2D) spectral amplitude coding for optical code division
multiple access code division multiple access (SAC-OCDMA) systems. The proposed hybrid code
eliminates totally the multiple access interference (MAI) between a large number of users and allows them
to connect simultaneously via the optical communication link with a high speed to receive huge data and
serve various areas such as Internet, telephony, DAB radio, digital audio broadcasting, and DVB video.
Simulation results demonstrate that the performance of such a SAC-OCDA system based on novel 2D
hybrid NZCC/MD code can be easily improved keeping a less complex structure using couplers for direct
spectral/spatial dimension (SDD) detection and show superior bit error rate (BER) values comparing to
previously developed two-dimensional codes including perfect difference (2D-PD), diagonal Eigen-value
units (2D-DEU), multi-service (2D-MS) and balanced incomplete block design (2D-BIBD) codes.
Similar to Iterative network channel decoding with cooperative space-time transmission (20)
Advanced Techniques for Cyber Security Analysis and Anomaly DetectionBert Blevins
Cybersecurity is a major concern in today's connected digital world. Threats to organizations are constantly evolving and have the potential to compromise sensitive information, disrupt operations, and lead to significant financial losses. Traditional cybersecurity techniques often fall short against modern attackers. Therefore, advanced techniques for cyber security analysis and anomaly detection are essential for protecting digital assets. This blog explores these cutting-edge methods, providing a comprehensive overview of their application and importance.
Details of description part II: Describing images in practice - Tech Forum 2024BookNet Canada
This presentation explores the practical application of image description techniques. Familiar guidelines will be demonstrated in practice, and descriptions will be developed “live”! If you have learned a lot about the theory of image description techniques but want to feel more confident putting them into practice, this is the presentation for you. There will be useful, actionable information for everyone, whether you are working with authors, colleagues, alone, or leveraging AI as a collaborator.
Link to presentation recording and transcript: https://bnctechforum.ca/sessions/details-of-description-part-ii-describing-images-in-practice/
Presented by BookNet Canada on June 25, 2024, with support from the Department of Canadian Heritage.
An invited talk given by Mark Billinghurst on Research Directions for Cross Reality Interfaces. This was given on July 2nd 2024 as part of the 2024 Summer School on Cross Reality in Hagenberg, Austria (July 1st - 7th)
UiPath Community Day Kraków: Devs4Devs ConferenceUiPathCommunity
We are honored to launch and host this event for our UiPath Polish Community, with the help of our partners - Proservartner!
We certainly hope we have managed to spike your interest in the subjects to be presented and the incredible networking opportunities at hand, too!
Check out our proposed agenda below 👇👇
08:30 ☕ Welcome coffee (30')
09:00 Opening note/ Intro to UiPath Community (10')
Cristina Vidu, Global Manager, Marketing Community @UiPath
Dawid Kot, Digital Transformation Lead @Proservartner
09:10 Cloud migration - Proservartner & DOVISTA case study (30')
Marcin Drozdowski, Automation CoE Manager @DOVISTA
Pawel Kamiński, RPA developer @DOVISTA
Mikolaj Zielinski, UiPath MVP, Senior Solutions Engineer @Proservartner
09:40 From bottlenecks to breakthroughs: Citizen Development in action (25')
Pawel Poplawski, Director, Improvement and Automation @McCormick & Company
Michał Cieślak, Senior Manager, Automation Programs @McCormick & Company
10:05 Next-level bots: API integration in UiPath Studio (30')
Mikolaj Zielinski, UiPath MVP, Senior Solutions Engineer @Proservartner
10:35 ☕ Coffee Break (15')
10:50 Document Understanding with my RPA Companion (45')
Ewa Gruszka, Enterprise Sales Specialist, AI & ML @UiPath
11:35 Power up your Robots: GenAI and GPT in REFramework (45')
Krzysztof Karaszewski, Global RPA Product Manager
12:20 🍕 Lunch Break (1hr)
13:20 From Concept to Quality: UiPath Test Suite for AI-powered Knowledge Bots (30')
Kamil Miśko, UiPath MVP, Senior RPA Developer @Zurich Insurance
13:50 Communications Mining - focus on AI capabilities (30')
Thomasz Wierzbicki, Business Analyst @Office Samurai
14:20 Polish MVP panel: Insights on MVP award achievements and career profiling
Support en anglais diffusé lors de l'événement 100% IA organisé dans les locaux parisiens d'Iguane Solutions, le mardi 2 juillet 2024 :
- Présentation de notre plateforme IA plug and play : ses fonctionnalités avancées, telles que son interface utilisateur intuitive, son copilot puissant et des outils de monitoring performants.
- REX client : Cyril Janssens, CTO d’ easybourse, partage son expérience d’utilisation de notre plateforme IA plug & play.
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfNeo4j
Presented at Gartner Data & Analytics, London Maty 2024. BT Group has used the Neo4j Graph Database to enable impressive digital transformation programs over the last 6 years. By re-imagining their operational support systems to adopt self-serve and data lead principles they have substantially reduced the number of applications and complexity of their operations. The result has been a substantial reduction in risk and costs while improving time to value, innovation, and process automation. Join this session to hear their story, the lessons they learned along the way and how their future innovation plans include the exploration of uses of EKG + Generative AI.
Choose our Linux Web Hosting for a seamless and successful online presencerajancomputerfbd
Our Linux Web Hosting plans offer unbeatable performance, security, and scalability, ensuring your website runs smoothly and efficiently.
Visit- https://onliveserver.com/linux-web-hosting/
Are you interested in dipping your toes in the cloud native observability waters, but as an engineer you are not sure where to get started with tracing problems through your microservices and application landscapes on Kubernetes? Then this is the session for you, where we take you on your first steps in an active open-source project that offers a buffet of languages, challenges, and opportunities for getting started with telemetry data.
The project is called openTelemetry, but before diving into the specifics, we’ll start with de-mystifying key concepts and terms such as observability, telemetry, instrumentation, cardinality, percentile to lay a foundation. After understanding the nuts and bolts of observability and distributed traces, we’ll explore the openTelemetry community; its Special Interest Groups (SIGs), repositories, and how to become not only an end-user, but possibly a contributor.We will wrap up with an overview of the components in this project, such as the Collector, the OpenTelemetry protocol (OTLP), its APIs, and its SDKs.
Attendees will leave with an understanding of key observability concepts, become grounded in distributed tracing terminology, be aware of the components of openTelemetry, and know how to take their first steps to an open-source contribution!
Key Takeaways: Open source, vendor neutral instrumentation is an exciting new reality as the industry standardizes on openTelemetry for observability. OpenTelemetry is on a mission to enable effective observability by making high-quality, portable telemetry ubiquitous. The world of observability and monitoring today has a steep learning curve and in order to achieve ubiquity, the project would benefit from growing our contributor community.
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxSynapseIndia
Your comprehensive guide to RPA in healthcare for 2024. Explore the benefits, use cases, and emerging trends of robotic process automation. Understand the challenges and prepare for the future of healthcare automation
Transcript: Details of description part II: Describing images in practice - T...BookNet Canada
This presentation explores the practical application of image description techniques. Familiar guidelines will be demonstrated in practice, and descriptions will be developed “live”! If you have learned a lot about the theory of image description techniques but want to feel more confident putting them into practice, this is the presentation for you. There will be useful, actionable information for everyone, whether you are working with authors, colleagues, alone, or leveraging AI as a collaborator.
Link to presentation recording and slides: https://bnctechforum.ca/sessions/details-of-description-part-ii-describing-images-in-practice/
Presented by BookNet Canada on June 25, 2024, with support from the Department of Canadian Heritage.
Mitigating the Impact of State Management in Cloud Stream Processing SystemsScyllaDB
Stream processing is a crucial component of modern data infrastructure, but constructing an efficient and scalable stream processing system can be challenging. Decoupling compute and storage architecture has emerged as an effective solution to these challenges, but it can introduce high latency issues, especially when dealing with complex continuous queries that necessitate managing extra-large internal states.
In this talk, we focus on addressing the high latency issues associated with S3 storage in stream processing systems that employ a decoupled compute and storage architecture. We delve into the root causes of latency in this context and explore various techniques to minimize the impact of S3 latency on stream processing performance. Our proposed approach is to implement a tiered storage mechanism that leverages a blend of high-performance and low-cost storage tiers to reduce data movement between the compute and storage layers while maintaining efficient processing.
Throughout the talk, we will present experimental results that demonstrate the effectiveness of our approach in mitigating the impact of S3 latency on stream processing. By the end of the talk, attendees will have gained insights into how to optimize their stream processing systems for reduced latency and improved cost-efficiency.
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - MydbopsMydbops
This presentation, delivered at the Postgres Bangalore (PGBLR) Meetup-2 on June 29th, 2024, dives deep into connection pooling for PostgreSQL databases. Aakash M, a PostgreSQL Tech Lead at Mydbops, explores the challenges of managing numerous connections and explains how connection pooling optimizes performance and resource utilization.
Key Takeaways:
* Understand why connection pooling is essential for high-traffic applications
* Explore various connection poolers available for PostgreSQL, including pgbouncer
* Learn the configuration options and functionalities of pgbouncer
* Discover best practices for monitoring and troubleshooting connection pooling setups
* Gain insights into real-world use cases and considerations for production environments
This presentation is ideal for:
* Database administrators (DBAs)
* Developers working with PostgreSQL
* DevOps engineers
* Anyone interested in optimizing PostgreSQL performance
Contact info@mydbops.com for PostgreSQL Managed, Consulting and Remote DBA Services
What’s New in Teams Calling, Meetings and Devices May 2024
Iterative network channel decoding with cooperative space-time transmission
1. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.6, December 2014
DOI : 10.5121/ijasuc.2014.5602 9
ITERATIVE NETWORK-CHANNEL DECODING
WITH COOPERATIVE SPACE-TIME
TRANSMISSION
Saikat Majumder and Shrish Verma
Department of Electronics and Telecommunication Engineering,
National Institute of Technology Raipur, India
ABSTRACT
One of the most efficient methods of exploiting space diversity for portable wireless devices is cooperative
communication utilizing space-time block codes. In cooperative communication, users besides
communicating their own information, also relay the information of other users. In this paper we
investigate a scheme where cooperation is achieved using two methods, namely, distributed space-time
coding and network coding. Two cooperating users utilize Alamouti space time code for inter-user
cooperation and in addition utilize a third relay which performs network coding. The third relay does not
have any of its information to be sent. In this paper we propose a scheme utilizing convolutional code based
network coding, instead of conventional XOR based network code and utilize iterative joint network-
channel decoder for efficient decoding. Extrinsic information transfer (EXIT) chart analysis is performed to
investigate the convergence property of the proposed decoder.
KEYWORDS
Network coding, Iterative decoder, Space-time code, Cooperative communication
1. INTRODUCTION
Wireless adhoc and sensor networks having a large number of low power wireless nodes have
attracted a lot of attention from the researchers recently. The main challenge of wireless sensor
networks is to achieve proper balance between transmit/processing power and quality of service.
However, such multi-terminal systems are limited by impairments due to wireless channels, such
as fading, and interference. Such low power portable devices are further constrained by limited
computational capabilities and power consumption due to computationally complex algorithms.
This limitation due to low computational capabilities of sensor nodes can be addressed by
utilizing modern development in power efficient microelectronic devices or by shifting the
computational load to the base station. The later technique involves designing systems with low
encoder complexity and relatively computationally intensive decoder at the base-station.
On the other hand, due to fading the transmission over wireless channels suffer from severe time
varying attenuation in signal strength. For a point to point wireless communication system, effect
of fading is mitigated using multiple antennas at transmitter and receiver. Since, wireless sensor
nodes are too small to accommodate multiple antennas on a single terminal, several nodes can
cooperate to form a virtual multiple-input multiple output (MIMO) system [1-2]. Cooperative
communication has emerged as an accepted method for achieving transmit diversity for
mitigation of fading effect at the receivers. In cooperative communication transmitting users use
one another’s antenna to realize the benefit of MIMO. There are many cooperative strategies to
achieve efficient node cooperation, such as amplify and forward (AF) [2,3,4], decode and forward
2. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.6, December 2014
10
(DF) [5], and coded cooperation [6,7]. In AF protocol, relay nodes retransmit amplified versions
of the signal received from source. Amplification coefficients at the relay nodes control the
performance at the destination. Whereas in DF, relay nodes first detect the received symbol using
hard decision and then forwards the reencoded signal to destination. Coded cooperation achieves
space diversity by forwarding different segment of a channel code through different paths.
Various improvements in these fundamental techniques has been proposed in recent years. An AF
technique is proposed in [8] where the expected distortion performances with progressive
transmission and superposition coding is investigated. Zhou et. al [7] proposed a distributed joint
source-channel coding technique that exploits source relay correlation.
Besides distributed MIMO techniques, network coding [9] has also emerged as preferred method
for obtaining cooperative diversity. A simple model where diversity can be obtained with network
coding is multiple access relay channel (MARC). A simple such model consists of two
cooperating user nodes and an intermediate relay with performs network coding [10] and
decoding is performed at the base station on the principles of turbo code. Ahsin and Slimane [11]
proposed a similar scheme for MARC using the principles of product codes. Authors in [12,13]
proposed schemes which combines the benefits of space-time codes and network coding for
cooperative communication. The authors use simple XOR based network coding at the relay for
obtaining diversity. They have demonstrated that combination of Alamouti space-time code and
network coding outperforms system based only on Alamouti coded cooperation.
In this paper, we improve upon the research in [12] by application of the concept of product code
and iterative network-channel decoding. The proposed scheme uses punctured convolutional code
as network code at the relay and Reed-Solomon code as channel code. The class of Reed-
Solomon error correction codes is well known in technical literature and is adopted in many
communication protocols. Our main innovation is iterative network-channel decoding at the
receiver using the principles derived from soft decoding of concatenated Reed-Solomon
convolutional codes [14]. The proposed algorithm enables network code and channel decoders to
exchange soft information iteratively and may yield a capacity approaching performance. We
apply extrinsic information obtained from soft network decoder to soft-input soft-out (SISO)
decoder for Reed-Solomon code [19,15] through an interleaver. The extrinsic output of SISO
Reed-Solomon decoder is applied back to network-decoder. SISO decoding of Reed-Solomon
code allows its decoding beyond minimum separable distance (MDS) capability, in contrast to
popular approach of hard decision decoding of Reed-Solomon code. An extrinsic information
transfer (EXIT) [21] characteristics of the proposed algorithm is presented, leading to the insights
of its iterative decoding behaviour and design criteria for network and channel code.
Figure 1. Space-time and network coded cooperation. (a) In first phase, user nodes broadcast information
to relay, base station and other user node. (b) Second phase consists of retransmission by user nodes and
relay node.
Rest of the article is organized as follows. Section 2 describes the system model under
consideration. Cooperative space-time transmission, network coding and the proposed iterative
network-channel decoder is discussed in this section. Section 3 analyzes the decoder using EXIT
3. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.6, December 2014
11
chart for fading channel. Simulation results are given in section 5. Finally, section 6 provides the
concluding remarks and suggestion for future work.
2. SYSTEM MODEL
We consider the scenario shown in Figure 1, with two mobile users (MU1 and MU2) nodes
communicating information to a common base station (BS). The two MU nodes cooperate with
each other using Alamouti space-time block code. In addition, a dedicated relay node performs
network coding on the information received from both the information nodes. We further assume
that all the nodes are using orthogonal channels with relay node operating in half-duplex mode.
Similar scenario is presented in [12] for evaluating the performance improvement due to
additional network coding node. But instead of simple XOR based network coding, we consider
convolutional encoder as network code and evaluate the performance of the system in iterative
decoding scenario. Next we describe the channel coding operation at the MU nodes and relay.
2.1. Encoding at Mobile User Nodes
The bits from each source is grouped into m bit symbols belonging to Galois field GF(N+1), with
N = 2m
– 1. The encoding at MU nodes is shown in Figure 2(a). The symbols are coded with (N,
K) Reed-Solomon code, where K is the number of information symbols in a codeword. The Reed-
Solomon code has dual functions; first, it is efficient against burst errors, since a sequence of m +
1 consecutive bit errors can affect at most two code symbols. Second, Reed-Solomon code aids in
iterative joint network-channel decoding as discussed in next sections. In time slot 1 and 2, Li
codewords are generated (each codeword consists of N symbols), where ݅ = 1, 2 indicates the
MU. They are grouped into a frame and interleaved with Πi. The stream is then formed into
matrix of size Li × N, where each row forms a packet. The symbols are translated into bits,
modulated and broadcast to BS, relay and other MU.
2.2. Network Coding at Relay
Figure 2(b) shows the encoding operation at the relay node. The relay node overhears
transmission from both the MU nodes during time slot ݐ = 1, 2, decodes and reencodes them. The
reencoded packets are ordered into matrix of size (L1 + L2) × mN bits. The rows from the two
cooperating sources are arranged alternately as shown in Figure 3. In this research we use
recursive systematic convolutional code (RSCC) as network code [11] instead of XOR based
network code. RSCC of rate (L1 + L2)/NN is applied on each column of (L1 + L2) bits, and parity
bits are obtained. Puncturing may be applied on the parity bits to attain necessary code rates.
Network code is obtained from these parity check bits and each row is transmitted as packet to the
BS. Thus each row encounters different channel and bits in a row suffer from same amount of
fading.
2.3. Cooperative Communication Protocol
The transmission of the message is accomplished in two phase or five time slots. In the first phase
(Figure 1(a)), the mobile users MU1 and MU2 broadcast their messages S1 and S2 over wireless
channel, respectively. This being broadcast phase, the transmitted messages are received by the
BS, relay and the other user.
Table I
Time Slot (t) 1 2 3 4 5
Transmitter MS1 MS2 MS1 MS2 RN
Message S1 S2 S3 S4 S5
4. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.6, December 2014
12
Figure 2. (a) Block diagram of encoder at mobile user nodes, (b) Network coding operation at relay node.
Figure 3. Data packets from two sources are ordered in alternate rows. Total number of rows from two
sources is L1+L2. Remaining rows of parity check bits are calculated and transmitted from the relay node.
In the next multiple access phase, the cooperating users MU1 and MU2, using Alamouti STBC
scheme, transmit S3 = -S2*and S4 = S1*, respectively to the BS. The relay node decodes the signal
received from both the users, reencodes them using Reed-Solomon code. Bits from both the
sources are combined, network coded and transmitted to the destination. The scenario in second
phase is illustrated in Figure 1(b). As mentioned earlier, all the nodes transmit in orthogonal
channels (separate time slots), the Table 1 details the channel assignment for different
transmitting nodes.
2.4. Iterative Network-Channel Decoder
The signal received at the BS after two phases of transmission and cooperative Alamouti relaying
from two MS, in matrix vector notation, is
ቂ
ݕଵ
ݕଶ
ቃ =
ℎଵ ℎଶ
ℎଶ
∗
−ℎଵ
∗൨ ቂ
ݏଵ
ݏଶ
ቃ + ቂ
݊ଵ
݊ଶ
ቃ (1)
where, ℎ, ݅ = 1, 2 denotes complex multiplicative fading coefficients for MU-BS channel with
ܧሼ|ℎ|ଶሽ = 1 and is assumed to be constant for at least one codeword duration. It is worth
mentioning again that each row of bits of matrix in Figure 3 undergoes different fading. Utilizing
(1), log-liklihood ratios (LLR) of the received packets from the two sources are obtained as Γ1, Γ2,
respectively, using soft-output Alamouti decoder [17]. On the other hand, signal received from
the relay node is
ݕଷ = ℎଷݏଷ + ݊ଷ (2)
and the corresponding LLR is calculated as Γ3 = ሺ|ݕଷ + ℎଷ|ଶ
− |ݕଷ − ℎଷ|ଶሻ/ܰ. Channel state
information ℎ is assumed to be available at the base station. The rows of LLR Γi, i = 1, 2, 3 are
5. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.6, December 2014
13
stacked over one another to form the matrix Γch
in the order given in Figure 3. Output Γch
of soft
Alamouti decoder consists of alternate rows of LLRs of bits of Reed-Solomon codes from MU1
and MU2, while last (NN – L1 – L2) rows are LLR of bits received form RN.
At the receiver RSCC and Reed-Solomon code can be considered a concatenated code structure
and can be decoded iteratively [14]. The next stages consists of iterative soft decoding process in
which BCJR algorithm [18] is applied along the columns for soft decoding of RSCC and Jiang-
Narayanan (JN) algorithm [19] for iterative soft decoding of Reed-Solomon codes along rows. JN
algorithm or adaptive belief propagation (ABP) is a significant departure from the traditional hard
decision decoding of Reed-Solomon codes. This algorithm operates in three stages. In the first
stage the parity check matrix is adapted according to the incoming LLR, and in the second stage
sum-product algorithm [20] is applied to calculate the extrinsic information. After finite number
of iterations, Berlekemp-Messy algorithm for decoding Reed-Solomon code is applied to the
hard-decisions made on the updated LLR. Besides being able to decode errors beyond maximum
distance separable (MDS) capability, JN algorithm enables iterative soft decision decoding in
conjunction with other soft decision decoders and equalizers. Extrinsic information is passed
between the two SISO decoders for finite number of iterations or until decoding of all the Reed-
Solomon codes is successful. The block diagram of the proposed decoder is shown in Figure 4.
An iteration of BCJR algorithm on the columns of LLR matrix Γch
generates extrinsic LLR
denoted by Γe
. The LLR matrix Γe
consists of alternate rows of extrinsic LLR for the two sources,
which are isolated at next stage into Γ1
e
and Γ2
e
. Applying deinterleaving mapping Πi
-1
on
extrinsic LLR Γi
e
, a priori LLR Li
a
for next stage of iterative decoder is obtained. An iteration of
JN algorithm is applied on all the rows of Li
a
independently and resulting extrinsic information is
saved as Li
e
. If a row of Reed-Solomon code satisfies the parity check requirement, it is decoded
and saved in Sത. Extrinsic information from both the RS decoders is interleaved, combined (into
the matrix in Figure 3) and applied as a priori information to the BCJR decoder. This constitutes
an iteration of the proposed decoder.
Figure 4. Block diagram of the proposed decoder
3. EXIT CHART ANALYSIS
Extrinsic information transfer (EXIT) chart has emerged as a successful method for predicting the
convergence behaviour of various concatenated and iterative systems. In this section, EXIT chart
is used to analyze the iterative decoding behaviour of the proposed scheme. The fundamental
assumption of EXIT chart is that extrinsic information passed from one SISO decoder to other is
a Gaussian random variable. The LLR a of a priori input for uncoded information s is modelled as
ܽ = ߤ ݔ + ݊ (3)
6. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.6, December 2014
14
where x is binary antipodal form of information symbols, na is a Gaussian random variable with
zero mean and variance ߪ
ଶ
. The variance must satisfy the condition ߤ = ߪ
ଶ
/2. The mutual
information between a and x is defined as
ξ
ξξ
ξ
ξ d
xfxf
xf
xfaxI
aa
a
x
a
)1|()1|(
)|(2
log)|(
2
1
),( 2
1 +=−=
= ∑∫±=
+∞
∞− (4)
where )|( xfa ξ is conditional probability density function associated with a priori LLR a.
Therefore, for a priori LLR a, mutual information is given as );( asIIa = . Similarly, mutual
information for extrinsic output e is obtained as );( esIIe = . To obtain EXIT chart, for given
values of )1,0(=aI we artificially generate the a priori inputs a, which are fed to SISO module.
Then the corresponding decoding algorithm of the block is invoked to produce extrinsic output e.
The mutual information eI is then evaluated using relation (4). Finally, EXIT chart is obtained as
the graphical plot between aI and eI . For decoding without any residual error, eI should equal 1
for some value of aI .
Figure 5(a) shows the EXIT characteristics of the proposed decoder with (31,25) Reed-Solomon
code. The inner decoder (decoder 1) consists of the cooperative Alamouti space-time decoder and
punctured (7,5)8 convolutional code acting as network code with overall code rate of 2/5. The
(ܫ, ܫ) curves are plotted with inner decoder 1 for average channel Eb/N0 of 2 dB and 3 dB.
Inverse EXIT characteristics ሺܫ, ܫሻ of decoder 2 (outer RS decoder consisting of JN algorithm)
is also shown in the figure. It shows, at 6 dB, the tunnel starts to open between EXIT curve of
decoder 1 and decoder 2, and at 7 dB, the tunnel is completely open. Therefore, the decoder bit
error rate (BER) cliff is expected to start at 6 dB and can be verified in Figure 7. Similarly, EXIT
chart for the proposed system with (15,7) is given in Figure 5(b), where turbo-cliff starts at 5 dB.
4. SIMULATION RESULTS
In this section we demonstrate through simulations that cooperative space-time coded iterative
network-channel decoder outperforms system utilizing XOR based network coding. The
performance is evaluated for BPSK modulated signal transmitted over Rayleigh block fading
channel, i.e. the channel fading coefficient is assumed to be constant for the duration of one
codeword. As explained earlier, we consider MARC scheme with two users cooperatively
transmitting using Alamouti STBC to the BS. An intermediate relay node assists in the
transmission through network coding. The SNR of MU-BS and RN-BS is assumed to be same
unless mentioned otherwise.
First we investigate the iterative convergence behavior of the proposed design. Figure 6 shows
BER performance of the proposed network-channel decoder with (31, 25) Reed-Solomon code as
component. It can be observed that iterative decoding gain is obtained for Eb/N0 ≥ 6 dB, as
predicted in EXIT chart of Figure 5(a). Error rate decreases with increase in iterations and there is
no significant improvement in BER after 20 iterations. Figure 7 shows the performance of the
iterative decoder with (15,7) Reed-Solomon code, in which iteration gain starts for Eb/N0 ≥ 5 dB.
Best BER performance is achieved for 5 iterations or more. This corresponds to EXIT chart in
Figure 5(b).
7. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.6, December 2014
15
Figure 5. EXIT chart of the proposed iterative soft decoder utilizing (a) (31,25) and (b) (15,7) Reed-
Solomon code as decoder 2.
8. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.6, December 2014
16
Figure 6.BER performance of the proposed scheme using (31,25) Reed-Solomon code with number of
decoding iterations over Rayleigh block fading channel.
Figure 7. BER performance of the proposed scheme using (15,7) Reed-Solomon code with number of
decoding iterations over Rayleigh block fading channel.
9. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.6, December 2014
17
Figure 8. Performance comparison of the proposed network-channel iterative decoder with a reference
scheme employing XOR based network code. (31,25) Reed-Solomon code is used as channel code in both
cases for fair comparison. BER performance are also compared for the case when SNR at relay is 10 dB
higher than direct links. BER curves of the reference system without using Reed-Solomon code is also
shown.
Next we compare the BER performance of the proposed system to baseline scheme in [12] which
applies XOR based network coding. Figure 8 illustrates the BER curves of proposed scheme with
(31,25) Reed-Solomon codes as channel encoder. The network code is derived by puncturing rate
½ RSCC of generator polynomial (5,7)8 to rate 2/3 code. The result is compared to BER curve
obtained with baseline system utilizing (31,25) Reed-Solomon code as channel code at the MU
nodes and XOR based network coding at RN. Overall code rate in both the cases is 2/5. It can be
observed that proposed scheme benefits from iterative decoding of network and channel codes,
where there is an improvement of 5 dB in Eb/N0 for achieving BER of 10-4
. Performance of all the
schemes can be improved if the link between relay node and the base station is better. Figure 6
also illustrates BER for the all the above cases with SNR of relay-base station link 10 dB better
than direct link. Performance of the baseline scheme without RS coding at the source is also
shown for reference. Stronger RSCC used as network code can improve the error performance of
the scheme as illustrated in Figure 9.
5. CONCLUSION
In this paper we proposed a novel iterative decoder for space-time-network coded cooperation
over wireless network. With Reed-Solomon code as channel code and convolutional code based
network coding and transmitted with space-time cooperation, the receiver is a cascade of SISO
modules of BCJR decoder and ABP algorithm. Significant improvement in error rate performance
is obtained with proposed scheme compared to scheme using XOR based network code. The
EXIT analysis of the proposed decoder is presented to validate the decoding convergence results.
Future work could be to reduce the complexity of the iterative decoder by using lesser complex
algorithm compared to ABP algorithm.
10. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.6, December 2014
18
Figure 9. Performance of the proposed iterative scheme using (31,25) Reed-Solomon code for different
RSCC used as network code.
REFERENCES
[1] Yindi Jing, Hassibi, B. (2006) Distributed Space-Time Coding in Wireless Relay Networks. IEEE
Transactions on Wireless communications, 5(12), pp.3524-3536. doi: 10.1109/TWC.2006.256975
[2] Laneman, J.N., Wornell, G. W. (2003) Distributed space-time-coded protocols for exploiting
cooperative diversity in wireless networks, IEEE Transactions on Information Theory, 49(10),
pp.2415-2425. doi: 10.1109/TIT.2003.817829
[3] Yi Zhao, Adve, R., Teng Joon Lim (2006) Improving Amplify-and-Forward Relay Networks:
Optimal Power Allocation versus Selection. Proceedings of the 2006 IEEE International Symposium
on Information Theory, 9-14 July 2006, pp.1234-1238.
[4] Sheng Yang, Belfiore, J.-C. (2007) Towards the Optimal Amplify-and-Forward Cooperative Diversity
Scheme," IEEE Transactions on Information Theory, 53(9), pp.3114-3126. doi:
10.1109/TIT.2007.903133
[5] Zhao, B., Valenti, M.C. (2003) Distributed turbo coded diversity for relay channel. Electronics Letters
, 39(10), pp.786-787. doi: 10.1049/el:20030526
[6] Hunter, T.E., Nosratinia, A. (2006) Diversity through coded cooperation. IEEE Transactions on
Wireless communications, 5(2), pp.283-289. doi: 10.1109/TWC.2006.1611050
[7] Xiaobo Zhou, Meng Cheng, Anwar, K., and Matsumoto, T. (2012) Distributed joint source-channel
coding for relay systems exploiting source-relay correlation and source memory. EURASIP Journal
on Wireless Communications and Networking, 2012:260. doi:10.1186/1687-1499-2012-260
[8] Sethakaset, U., Quek, T.Q.S., Sumei Sun (2011) Joint Source-Channel Optimization over Wireless
Relay Networks. IEEE Transactions on Communications, 59(4), pp.1114-1122. doi:
10.1109/TCOMM.2011.012711.090614
[9] Yingda Chen, Kishore, S., Jing Li (2006) Wireless diversity through network coding. Proceedings of
the Wireless Communications and Networking Conference, (WCNC 2006). pp.1681-1686. doi:
10.1109/WCNC.2006.1696541
[10] Hausl, C., Dupraz, P. (2006) Joint Network-Channel Coding for the Multiple-Access Relay Channel,
Proceedings of the Sensor and Ad Hoc Communications and Networks (SECON '06). pp.817-822, 28-
28 Sept. 2006. doi: 10.1109/SAHCN.2006.288566
[11] Ahsin, Tafzeel ur Rehman and Slimane, Slimane Ben (2012) A Joint Channel-network Coding Based
on Product Codes for the Multiple-access Relay Channel. ISRN Communications and Networking,
2012. doi: 10.5402/2012/837815
11. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.6, December 2014
19
[12] Menghwar, G. D. et al. (2012) Cooperative space-time codes with network coding. EURASIP Journal
on Wireless Communications and Networking, 2012(1). doi: 10.1186/1687-1499-2012-205
[13] Menghwar, G.D., Shah, A.A., Mecklenbrauker, C.F. (2009) Cooperative space-time codes with
opportunistic network coding with increasing numbers of nodes. Proceedings of the 6th International
Symposium on Wireless Communication Systems (ISWCS 2009), pp.536-539, 7-10 Sept. 2009. doi:
10.1109/ISWCS.2009.5285254
[14] Chen, L. (2013). Iterative Soft Decoding of Reed-Solomon Convolutional Concatenated Codes. IEEE
Transactions on Communications, 61(10), pp.4076-4085. doi: 10.1109/TCOMM.2013.
082813.120943
[15] Bellorado, J., Kavčić, A., Marrow, M., Li Ping (2010) Low-Complexity Soft-Decoding Algorithms
for Reed–Solomon Codes—Part II: Soft-Input Soft-Output Iterative Decoding. IEEE Transactions on
Information Theory, 56(3), pp.960-967. doi: 10.1109/TIT.2009.2039091
[16] Maunder, R. G., Wang, J., Yang, L. L. (2010). Near-capacity variable-length coding: regular and
EXIT-chart-aided irregular designs (Vol. 20). John Wiley & Sons.
[17] Cho, Y. S., Kim, J., Yang, W. Y., Kang, C. G. (2010). MIMO-OFDM wireless communications with
MATLAB. John Wiley & Sons.
[18] Bahl, L., Cocke, J., Jelinek, F., Raviv, J. (1974) Optimal decoding of linear codes for minimizing
symbol error rate. IEEE Transactions on Information Theory, 20, (2), pp.284-287. doi:
10.1109/TIT.1974.1055186
[19] Jiang, Jing, Narayanan, K.R. (2006) Iterative Soft-Input Soft-Output Decoding of Reed-Solomon
Codes by Adapting the Parity-Check Matrix. IEEE Transactions on Information Theory, 52(8),
pp.3746-3756. doi: 10.1109/TIT.2006.878176
[20] Costello, D., & Lin, S. (2004). Error control coding. Pearson Higher Education.
[21] Ten Brink, S. (2001). Convergence behavior of iteratively decoded parallel concatenated codes. IEEE
Transactions on Communications, 49(10), 1727-1737.