SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
World Academy of Science, Engineering and Technology
International Journal of Electrical, Electronic Science and Engineering Vol:3 No:9, 2009

Performance of Block Codes Using the
Eigenstructure of the Code Correlation Matrix
and Soft-Decision Decoding of BPSK
Vitalice K. Oduol, and Cemal Ardil

International Science Index 33, 2009 waset.org/publications/10271

Abstract—A method is presented for obtaining the error
probability for block codes. The method is based on the eigenvalueeigenvector properties of the code correlation matrix. It is found that
under a unary transformation and for an additive white Gaussian
noise environment, the performance evaluation of a block code
becomes a one-dimensional problem in which only one eigenvalue
and its corresponding eigenvector are needed in the computation. The
obtained error rate results show remarkable agreement between
simulations and analysis.
Keywords—bit error rate, block codes, code correlation matrix,
eigenstructure, soft-decision decoding, weight vector.

I.

INTRODUCTION

T

HE topic of error control codes, both block and
convolutional codes is a mature subject on which there
have been many papers and books [1-6]. The computation of
the post-decoding bit error rate (BER) is usually accomplished
using performance bounds. Although many of these bounds
can be very tight, it is still better when an exact result can be
found.
The method presented here obtains the exact probability of
error for block codes using soft-decision decoding in an
additive white Gaussian noise environment. It is based on the
eigen-structure of the code correlation matrix, in that the
eigenvalue-eigenvector properties determine the relevant
parameters needed in the performance evaluation. It is found
that under a suitable unitary transformation of the decision
variables the performance evaluation of a block code becomes
a one-dimensional problem in which only the dominant
eigenvalue and its corresponding eigenvector are needed.Only
the dimension corresponding to the largest eigenvalue need be
considered, all others having collapsed to a point. Use is made
of the fact that the code correlation matrix is real and
symmetric, and therefore the eigenvectors from different
eigenvalues will be orthogonal [7,9].
The paper is organized as follows: Section II gives the
system model used in the analysis. It also introduces the code
correlation matrix. Section III presents the eigenstructure of

V. K. Oduol is with the Department of Electrical and Information
Engineering, University of Nairobi, Nairobi, Kenya (+254-02-318262
ext.28327, vkoduol@uonbi.ac.ke)
Cemal Ardil is with the National Academy of Aviation, Baku, Azerbaijan

the code correlation matrix. This section is really the crux of
the method presented. Section IV presents the performance
analysis together with the properties of the code correlation
matrix. Section V presents the results and conclusion. The
Appendix covers an example to illustrate results used in the
derivations in the body of the paper.
II.

SYSTEM MODEL

The linear block codes considered here consist of codewords
generated by a generator matrix and an information vector.
The system is modelled as a binary phase-shift keying (PSK)
with antipodal signalling and soft-decision decoding at the
receiver. For some block codes selected for illustration, bit
error rate results show remarkable agreement between
simulations and analysis, and are a validation of the method.
Fig.1 depicts the signal flow incorporating the source
encoder and channel. The output of the channel encoder is a
set of bits Ckj, k=1,2,…,M, and j=1,2,…, n. This is then
transformed so as to map binary 0’s into –1, and binary 1’s
into +1, and the result is then multiplied by a positive scalar
constant. The channel is modelled by an additive random
variable nj which is assumed to be a sample of a zero-mean
Gaussian noise process, and is therefore itself a zero-mean
Gaussian random variable with variance N0/2. The Gaussian
assumption is made here for tractability of the analysis.

0 ,1

Source/
Coder

1, 1

x

2 E

+

S

E

rj

S

E

S

n

j

Channel

Transmitter

Fig. 1 Transmitter and channel to generate received symbols

In Fig.2 the receiver correlates the incoming signal rj with
each codeword, and forms the decision variables
U1, U2, …, UM as shown. It then selects the largest of these to
determine the transmitted codeword. Since the codes used are
linear, the analysis assumes that the transmitted sequence
corresponds to the all-zero codeword. The received symbol is
therefore r n
E .
j

37

j

S
World Academy of Science, Engineering and Technology
International Journal of Electrical, Electronic Science and Engineering Vol:3 No:9, 2009

The correlation is achieved by multiplying the received
symbol by 2C 1 E and summing over all values of j.
ij

S

rj

n

X

U2

n

Select
the
Largest

U1

n
j 1

2C

1

ES

2C
1
2j

Mj

ES

1

ES

Fig. 2 The receiver forms the decision variables via correlation

The receiver forms the decision variables Uk as follows:
International Science Index 33, 2009 waset.org/publications/10271

n

U0

nES

Uk

n

ES

j 1

(1)

nj
n

2 wk E S

ES

j 1

2Ckj

1 nj

k=1,2,…,M

(2)

where Es is the signal energy. It is more convenient to work
with the following decision variables
k=1,2,…,M
(3)
2ES
1
Zk

2ES N 0

Uk

U0

wk

N0

where N0/2 is the power spectral density of the white noise. It
can be shown that the mean and variance of Zk are,
respectively, E{Zk}=0 and Var{Zk} = wk. From the definition
of Uk we have
n
(4)
Z
2/ N
C n
k

kj

0

j

j 1

The justifications for the first and last of these properties are
provided next. The remaining two do not need justification
beyond what is already stated.
A. The Weight Vector as an Eigenvector
The code correlation matrix is given by R = CCT. The weight
vector is w = C1n, where 1n is the n 1 vector of all ones. To
show that the weight vector is an eigenvector of the code
correlation matrix, it is considered that
M
(8)
Rw m

the correlation becomes
n

C kj Clj

(6)

rkl

j 1

which is just the inner product of the two codewords Ck and
Cl. The code correlation matrix R is defined to have rkl as its
elements, with the diagonal elements equal to the weight of
the kth codeword. That is, rkk =wk.

R mp w p

n

Using the fact that R

w2

r23

r24

r2 M

r32

w3

r34

r3 M

(7)

rM 2 rM 3 rM 4
wM
The next section discusses the eigenvalue-eigenvector
properties of the code correlation of (7).

and

C mj C pj

mp

j 1

n

wp

C pq

and

q 1

substituting in (7) yields
n

Rw m
p 1j 1

Cmj C pj

n
j 1

Cmj

n
q

C pq
q 1

(9)

M
1p

C C
1 pj pq

where the order of summations has been changed in the last
line. The inner-most sum (over p) is the inner product between
column-j and column-q of the codeword array C.
When the index j is fixed, the sums (over p) are evaluated
for each value of q, and added together from q = 1 to q = n. It
turns out that the resulting sum in parentheses is the same,
regardless of the value of j. This is observed to hold for all
the linear codes examined in this work. The value of this sum
is 1, the eigenvalue for the weight vector. Accordingly,
n
1

R

p 1

M n

A. Code Correlation Matrix
The correlation of the random variables Z k and Z l is
2 n n
(5)
E Zk , Zl
C kj C li E ni n j
N0 j 1 i 1
Since the noise is presumed to be white, E ni n j
N 0 / 2 ij ,

E Zk , Zl

For block codes, the code correlation matrix has the following
properties.
Property 1: The weight vector of the code is an eigenvector
with eigenvalue 1. That is v1 = w, and Rw = 1w. This
eigenvalue has only one eigenvector, the weight vector.
Incidentally 1 happens to be the largest eigenvalue, a fact not
needed in the analysis addressed here, but found to be true in
all the block codes examined.
Property 2: All other eigenvectors are orthogonal to the
weight vector: wTvm = 0, for m 1. This follows from the fact
the code correlation matrix is real and symmetric.
Property 3: Some eigenvalues may be zero; equivalently the
null-space of the code correlation matrix may be non-empty.
Property 4: Except for 1, the other non-zero eigenvalues
have eigenvectors with zero-sum elements. For the eigenvalue
m the corresponding eigenvector vk has elements satisfying
v1,m,+ v2,m + … +vM,m = 0.

j 1

X

2C
1j

EIGEN-STRUCTURE OF THE CODE CORRELATON MATRIX

UM

j 1

X

III.

q

M

(10)

C C
1 pj pq

1p

where j is any legitimate column index. With this result the
expression in (8) becomes
n
(11)
Rw
C
w
m

1

j 1

mj

1 m

from which it is evident that
Rw

38

1w

(12)
World Academy of Science, Engineering and Technology
International Journal of Electrical, Electronic Science and Engineering Vol:3 No:9, 2009

indicating that the weight vector is an eigenvector of the code
correlation matrix, with 1 as the corresponding eigenvalue.
The expression in (10) for the eigenvalue consists of two
nested sums. The inner sum is found to equal 2k-1 for q = j,
and to equal 2k-2 for the remaining n - 1 values of q. This is
found to hold for all the linear block codes examined in this
paper. Of course it can be proved by using the generator
matrix of the code and the information sequences used to
create the code array. The present paper omits that exercise,
and instead uses the observations made from the codes
examined. The total in (10) is 2k-1 + 2k-2 (n-1), which gives
(13)
2k 2 n 1
1
Thus, the eigenvalue depends only on n and k, which are the
two code parameters.
B. Other Non-Zero Eigenvalues
As before vm = Cx is any any of the eigenvectors
corresponding to m for m 1 with the vector x being n 1. In
a parallel development to the case for the weight vector,
M
(14)
International Science Index 33, 2009 waset.org/publications/10271

RCx m

R mp Cx p

p 1

Using the fact that

n

R mp

and Cx
C mj C pj

n
p

and
C pq xq

q 1

j 1

substituting in (14) yields
M n

Rv m

n

C mj C pj

p 1j 1
n
j 1

C mj

n
q 1

xq

C pq x q

(15)

q 1
M

C pj C pq

p 1

The inner-most sum (over p) has appeared before; it equals 2kfor q = j and equals 2k-2 for q j.

1

Rv m

2

k 2

n

C mj 2 x

j 1

q

x
1 q

(16)

This can be re-written as

Rv m

2k 2

C mj x

j 1

2k 2

Cx

T

M n

n

W
p 1j 1

x j C pj

n
j 1

xj

n
q

C pq

(20)

q 1

M
C C
1 pj pq

1p

The double sum in parentheses in (20) brackets has been
shown to equal 1, independent of j. Thus
n
(21)
x
0
j 1

j

an intermediate result which will be used shortly. Continuing
these proceedings, the sum of the elements of this vector is
M
M n
(22)
C pj x j
p 1j 1

Cx p

p 1

Changing the order of summations gives
M

n

p 1

Cx p

j 1

M

xj

(23)

C
1 pj

p

At this point it is important once again to invoke an observed
result form the code array, that the sum in parentheses is the
sum of the elements in column-j of the code array. This sum is
found to be a constant independent of j. In fact, it is found to
equal 2k-1, where k is the number of information bits in the
n-bit codeword. As noted previously in connection with (10)
here too it is possible to prove this using the generator matrix
of the code and the information sequences used to generate the
codewords. For the same reason given earlier, the paper uses
the observations made on the linear codes examined.
M
n
(24)
v
k x
p ,m

j 1

j

The sum on the right has been shown in (21) to be zero.
Therefore
M
(25)
v
0
p,m

n

p 1

n
j

q

x
1 q

(17)

which shows that the eigenvectors belonging to the non-zero
eigenvalue m for m 1 have zero-sum elements. That is the
elements sum to zero.

(18)

D. Number of Zero-Sum Eigenvectors
The weight vector is the only vector corresponding to the
eigenvalue 1. As for the other non-zero eigenvalues the
condition in (21) involves n variables. This means that there
are n-1 free variables, and therefore n-1 eigenvectors
corresponding to the eigenvalue m for m 1. Specifically the
expression in (21) can be used to obtain the eigenvectors as

The sum over q has been shown to be zero, and therefore

Rv m

0

p 1

n
j

orthogonal to the weight vector. For the presentation here the
vector Cx represents any of the eigenvectors vm, where the
vector x is n 1.

n

C mj x j

j 1

The right hand side is seen to represent the m-th component of
Cv, i.e. the m-th component of the eigenvector, v. This leads
to the result Rv = kv, which says that the non-zero eigenvalue
sought is
k 2
m 1
(19)
m 2
The eigenvalue obtained in (13) is n+1 times m. Since n > 1
a comparison of (19) with (13) shows that 1 corresponding to
the weight vector the largest eigenvalue of the code
correlation matrix.
C. Zero-Sum Eigenvectors
Since the code correlation matrix is real and symmetric, the
eigenvectors vm corresponding to m with m 1 are

1
Cx

0

0

0

1

0

C 0

, C 0

0

, C 1

,

, C

(26)

0
1

1

1

1

1

This says that the eigenvectors are obtained by subtracting the
last column of the code array from each of the first n-1
columns of the code array C. It is noted that while (26) uses
the last column of the code array to create the n-1 vectors, any

39
World Academy of Science, Engineering and Technology
International Journal of Electrical, Electronic Science and Engineering Vol:3 No:9, 2009

one column could have been used. The same set of vectors
will be obtained, although in a different order.
These together with the weight vector constitute a total of n
eigenvectors. Since the code correlation matrix is M M,
where M = 2k – 1, a total of M vectors is required. The
remaining (M – n) vectors must come from the null space of
the code correlation matrix. While it is possible to obtain
expression for the vectors in null space of the code correlation
matrix, this is not addressed here since it is not needed in
meeting the present objectives. These vectors from the null
space can be transformed by the Gram-Schmidt process [7-9]
if necessary, to make them orthogonal to the vectors already
obtained, and also to be mutually orthogonal themselves.
This completes the discussion of the eigen-structure of the
code correlation matrix for the purposes of the paper. It is now
possible to return to the issue of analyzing the performance of
the block codes under the scenario described previously in
Section II.

The random variables Z1, Z2, …, ZM are zero-mean and jointly
Gaussian in distribution. In such cases the result of the
transformation in (29) would normally be a new set of random
variables X1, X2, …, XM which are statistically independent, and
with a Gaussian distribution, given that the original set is Gaussian.
Here the situation is much simpler, in that the transformation has
produced the mapping as shown in Fig.3

2 E S / N 0 w1 , w 2 ,

, wM

Z1 Z 2
,

ZM

,

,

International Science Index 33, 2009 waset.org/publications/10271

IV. PERFORMANCE ANALYSIS
Referring to (1) and (2) and assuming that the transmitted
codeword is the all-zero codeword, the receiver makes the
correct decision if and only if Uk – U0 < 0, for k=1,3, …,M, a
requirement which together with (3) translates to
Zk

wk

2ES
N0

for k=1,2, …,M.

2 ES / N 0 w

Zk

wk

k=1,2,…,M

(29)

(30)

To determine the image of the two points referred to above, it
is considered that the first vector in the matrix V is the
normalized weight vector v1 = w/||w||, and all the other vectors
in V are orthogonal to w. Accordingly the image of the point
(w1, w2, w3, … wM)T will be (||w||, 0, 0, …, 0)T. For the other
is considered, which
point the limit lim B w , w , , w
1

B

gives the image as
B

2

0

X2

X3

0

0

Fig. 3 Mapping of the Limits

(28)

where V is the matrix of eigenvectors selected to have
orthornormal columns. That is
VT V I

XM

0

(27)

A. Transformation of the Decision Variables
The analysis would be easier when the events are disjoint,
which is achieved by applying a unitary transformation to the
space of the random variables Z1, Z2, …, ZM. The
transformation of random variables to facilitate analysis is
employed in many texts [8,10]. Under the transformation, the
two points (- , - , - , …, - )T and (w1, w2, w3, … wM)T will
be mapped into new image points. To this send the following
transformation is applied
X = VTZ

1

X1

The event of a correct symbol detection corresponds to the
joint event E1
E2
E M where

Ek

XM

In the upper part of the figure the variables Z1 Z2,..,ZM each varies
as shown by the arrows. In the lower part of the figure only X1 varies
(as shown by the arrow); the other variables X2, X3…,XM have
collapsed to zero. Therefore the result of the transformation is to
produce one random variable X1, and reduce the others to probability
masses at zero.

B. Probability of Correct Symbol
The probability of correct symbol is then given by

(31)
w 2E S / N 0
The original set of random variables are each Gaussian by
assumption. Therefore since the transformation is linear, the resulting
random variables should also be Gaussian. Here only one random
variable results. The variance of this random variable is the
eigenvalue corresponding to the largest eigenvalue 1 of the code
correlation matrix. Accordingly the probability of correct symbol is
found to be
PCW

X1

Pr

1
2 1

PCW

w 2 ES / N 0

exp

y2
dy
2 1

(32)

By an appropriate change of variable, this can be expressed as

M

lim B w , 0,

, 0 , using the fact that

the other vectors in V are orthogonal to the weight vector.
It must be stated immediately here that the results obtained later
by this consideration are found to be in agreement with those found
by simulation. When the limit is taken, the image of the point in
question is seen to be (- , 0, 0, …, 0)T.

PCW

1
2

1
erf
2

2

w ES
1N 0

1

1
erfc
2

2

w ES

(33)

1N 0

where erf(x) and erfc(x) are the error function and the
complementary error function, respectively.

40
World Academy of Science, Engineering and Technology
International Journal of Electrical, Electronic Science and Engineering Vol:3 No:9, 2009

C. Bit Error Probability
Since a word consists of n bits, an estimate of the bit error probability
Pb can be can be obtained from PCW by using
P
b

1

P
CW

1/n

(34)

where n is the nmber of bits in a codeword.

V. RESULTS AND CONCLUSION
Fig.4 shows results for the correct symbol probabilities for the (7,4,3)
BCH code. One set is obtained via simulation (diamonds) and the
other via analysis (solid line). These are in the upper part of the
figure. Also provided are the corresponding results for the uncoded
symbols. It is observed that there is agreement between the results
from simulation and analysis. Needless to say, the results obtained
via coding are better than those without.

This work has presented a method of computing the error
probability for a block code using the eigenvalue-eigenvector
structure of the code correlation matrix. It is found that there is one
largest eigenvalue whose only eigenvector is the weight vector. The
other eigenvectors have elements that add up to zero.
The largest eigenvalue and its eigenvector (the weight vector) are
used to determine the symbol error probability of a block code using
BPSK and soft-decision decoding. A comparison of the simulation
and analysis results provides validation of the analysis presented.

APPENDIX
The codewords are arranged in rows to form the matrix C as
given below.
C1,1 , C1, 2 ,
C 2,1 , C 2, 2 ,
C M ,1 , C M , 2 ,

C

Comparison of Correct Symbol Probabilities
1

Correct Symbol Probability

, C M ,n

(34)

In this array, the all-zero codeword is not sown. As an
illustration the (7,4,3) BCH code with generator matrix G

0.8

Coded
: Simulation
Solid: Theory

0.7
0.6
0.5

G

0.4

1 0 0 0 1 1 0
0 1 0 0 0 1 1
0 0 1 0 1 1 1

(35)

0 0 0 1 1 0 1

0.3

Uncoded

0.2

has the codewords given in Table I

0.1

TABLE I
Index
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15

0
-20 -18 -16 -14 -12 -10 -8 -6 -4 -2

0

2

4

6

8 10

Signal-to-Nose Ratio, Eb/No [dB]

Fig. 4. Comparison of correct symbol probabilities
Comparison of Bit Error Probabilities
1.0E+00
1.0E-01

Probability of Bit Error

International Science Index 33, 2009 waset.org/publications/10271

0.9

, C1,n
, C 2,n

1.0E-02

Uncoded

1.0E-03

Coded
: Simulation
Solid: Theory

1.0E-04
1.0E-05
1.0E-06
1.0E-07
1.0E-08
1.0E-09
-10

-8

-6

-4

-2

0

2

4

6

8

10

12

Signal-to-Noise Ratio, Eb/No [dB]

Fig. 5. Comparison of bit error probabilities
Fig.5 gives a comparison of bit error probabilities using results from
simulation, analysis, and uncoded symbols. Again, the simulation
and anlysis results exhibit agreement. The uncoded symbol results
(upper trace) indicate a higher bit error probability than the ones
obtained by coding.

CODEWORDS OF THE (7,4,3) BCH CODE
codeword
weight
0 0 0 1 1 0 1
3
0 0 1 0 1 1 1
4
0 0 1 1 0 1 0
3
0 1 0 0 0 1 1
3
0 1 0 1 1 1 0
4
0 1 1 0 1 0 0
3
0 1 1 1 0 0 1
4
1 0 0 0 1 1 0
3
1 0 0 1 0 1 1
4
1 0 1 0 0 0 1
3
1 0 1 1 1 0 0
4
1 1 0 0 1 0 1
4
1 1 0 1 0 0 0
3
1 1 1 0 0 1 0
4
1 1 1 1 1 1 1
7

and the code correlation matrix is given by the array shown in
Fig.6. The elements of the weight vector appear as the
diagonal elements in the matrix. The matrix is seen to be
symmetric and has real elements.
Through other methods of determining the eigenvalue, and
it can be established that the largest eigenvalue is 32, and the
other non-zero eigenvalue is 4. These agree with (13) and
(19), respectively. That is 1 = (7+1) 24-2 = 32 and m = 242
= 4. form m 1..
Other codes are given below so as to enable comparisons
and validation of some the expressions given in the analysis.
The example of the (3,2,2) code is simple enough that the
results can be checked very quickly, without much effort. The
other example is (6,3,3) code.

41
World Academy of Science, Engineering and Technology
International Journal of Electrical, Electronic Science and Engineering Vol:3 No:9, 2009

3
2
1
1
2
1
2
1
2
1
2
2
1
0
3

2
4
2
2
2
2
2
2
2
2
2
2
0
2
4

1
2
3
1
2
1
2
1
2
1
2
0
1
2
3

1
2
1
3
2
1
2
1
2
1
0
2
1
2
3

2
2
2
2
4
2
2
2
2
0
2
2
2
2
4

1
2
1
1
2
3
2
1
0
1
2
2
1
2
3

2
2
2
2
2
2
4
0
2
2
2
2
2
2
4

1
2
1
1
2
1
0
3
2
1
2
2
1
2
3

2
2
2
2
2
0
2
2
4
2
2
2
2
2
4

1
2
1
1
0
1
2
1
2
3
2
2
1
2
3

2
2
2
0
2
2
2
2
2
2
4
2
2
2
4

2
2
0
2
2
2
2
2
2
2
2
4
2
2
4

1
0
1
1
2
1
2
1
2
1
2
2
3
2
3

0
2
2
2
2
2
2
2
2
2
2
2
2
4
4

3
4
3
3
4
3
4
3
4
3
4
4
3
4
7

3

International Science Index 33, 2009 waset.org/publications/10271

The (3,2,2) code has the non-zero codewords given in
Table II,

(36)

The eigenvalues of this matrix are easily computed, and
verified from the text, using k = 2 and n = 3 in(13) and (19),
to be 1 = 4 and 2 = 1. The corresponding eigenvectors,
already orthonormalized are found to be
1
1
1
(37)
1
1
1
3

1 ,
1

v2

2

0 ,

-1

v3

6

-1

-1

0

-1

0

1
0
1
,
-1
2
0
0

0
0
1
,
-1
2
1
-1

1
0
0

1
-1
-1

4
4

0
-1
1
0
2
1
0
1

1

1

3
4
3 ,

,

1
2

1
-1
0

,

1
2

2

= 2.
(38)

1
0
0

There is one vector left, that needs to come from the nullspace of the code correlation matrix. It is observed that the
first vector (parallel to the weight vector) is orthogonal to each
of the others. Also the vectors are not mutually orthogonal,
and will need the Gram-Schmidt process. The codes, their
code correlation matrices and the corresponding eigenstructures are given in this Appendix to provide a means to
verify the findings of the work.
REFERENCES

TABLE II CODEWORDS OF THE (3,2,2) CODE
Index
codeword
weight
1
0
1
1
2
2
1
0
1
2
3
1
1
0
2

v1

14 and

3

1
2 21

Fig. 6 Elements of the code correlation matrix for the (7,4,3) BCH
Code

and the code correlation matrix
2 1 1
R 1 2 1 .
1 1 2

1=

The non-zero eigenvalues are found to be
with the eigenvalectors

[1] Shu Lin and Daniel J. Costello, Jr., Error Control Coding: Fundamentals
and Applications, Prentice Hall: Englewood Cliffs, NJ, 1983.
[2] A. M. Michelson and A. H. Levesque, "Error-Control Techniques for
Digital Communication", a Wiley-Interscience Publication, 1985
[3] W.W. Peterson and E.J. Weldon, Jr., Error-Correcting Codes, 2nd edition,
MIT Press: Cambridge, Mass., 1972.
[4] F.J. MacWilliams and N.J.A. Sloane, The Theory of Error-Correcting
Codes, North-Holland: New York, NY, 1977.
[5] E. R. Berlekamp, R. E. Peile, and S. P. Pope, "The Application of Error
Control to Communications," IEEE Communications Magazine., Vol. 25,
pp. 44–57, 1987.
[6] Wicker, Stephen B., Error Control Systems for Digital Communication
and Storage, Upper Saddle River, N.J., Prentice Hall, 1995.
[7] S. Haykin,
Adaptive Filter Theory, 4th Edition, (Appendix E.
Eigenanalysis), Prentice Hall 2001
[8] S. Haykin, Communication Systems, 4th Edition, John Wiley & Sons 2001
[9] G.H. Golub, C.F. Van Loan, Matrix Computations, 3rd ed. Johns Hopkins,
1996.
[10] J.G. Proakis, Digital Communications, 3rd Ed, McGraw-Hill, 1995.

-2

1

Table III gives codewords of the (6,3,3) code and their weight
respective weights
TABLE III CODEWORDS OF THE (6,3,3) BCH CODE
Index
codeword
weight
1
0 0
1
0
1
1
3
2
0 1
0
1
1
0
3
3
0 1
1
1
0
1
4
4
1 0
0
1
0
1
3
5
1 0
1
1
1
0
4
6
1 1
0
0
1
1
4
7
1 1
1
0
0
0
3

The code correlation matrix of this code is found to be
3
1
2
1
2
2
1
1
3
2
1
2
2
1
2
2
4
2
2
2
2
1
1
2
3
2
2
1
2
2
2
2
4
2
2
2
2
2
2
2
4
2
1
1
2
1
2
2
3
Fig.7 Elements of the code correlation matrix for the (6,3,3) Code

Vitalice K. Oduol received his pre-university education at Alliance High
School in Kenya. In 1981 he was awarded a CIDA scholarship to study
electrical engineering at McGill University, Canada, where he received the
B.Eng. (Hons.) and M.Eng. degrees in 1985 and 1987, respectively, both in
electrical engineering. In June 1992, he received the Ph.D. degree in electrical
engineering at McGill University.
He was a research associate and teaching assistant while a graduate student
at McGill University. He joined MPB Technologies, Inc. in 1989, where he
participated in a variety of projects, including meteor burst communication
systems, satellite on-board processing, low probability of intercept radio,
among others. In 1994 he joined INTELSAT where he initiated research and
development work on the integration of terrestrial wireless and satellite
systems. After working at COMSAT Labs. (1996-1997) on VSAT networks,
and TranSwitch Corp.(1998-2002) on product definition and architecture, he
returned to Kenya, where since 2003 he has been with Department of
Electrical and Information Engineering, University of Nairobi.
Dr. Oduol was a two-time recipient of the Douglas tutorial scholarship at
McGill University. He is currently chairman, Department of Electrical and
Information Engineering, University of Nairobi. His research interests include
performance analysis, modeling and simulation of telecommunication
systems, adaptive error control, feedback communication.
Cemal Ardil is with the National Academy of Aviation, Baku, Azerbaijan

42

Weitere ähnliche Inhalte

Was ist angesagt?

Review On 2:4 Decoder By Reversible Logic Gates For Low Power Consumption
Review On 2:4 Decoder By Reversible Logic Gates For Low Power ConsumptionReview On 2:4 Decoder By Reversible Logic Gates For Low Power Consumption
Review On 2:4 Decoder By Reversible Logic Gates For Low Power ConsumptionIRJET Journal
 
Design of Reversible Sequential Circuit Using Reversible Logic Synthesis
Design of Reversible Sequential Circuit Using Reversible Logic SynthesisDesign of Reversible Sequential Circuit Using Reversible Logic Synthesis
Design of Reversible Sequential Circuit Using Reversible Logic SynthesisVLSICS Design
 
Numerical Solutions of Stiff Initial Value Problems Using Modified Extended B...
Numerical Solutions of Stiff Initial Value Problems Using Modified Extended B...Numerical Solutions of Stiff Initial Value Problems Using Modified Extended B...
Numerical Solutions of Stiff Initial Value Problems Using Modified Extended B...IOSR Journals
 
Introduction to the Finite Element Method
Introduction to the Finite Element MethodIntroduction to the Finite Element Method
Introduction to the Finite Element MethodMohammad Tawfik
 
Deep learning book_chap_02
Deep learning book_chap_02Deep learning book_chap_02
Deep learning book_chap_02HyeongGooKang
 
Optimal parameter selection for unsupervised neural network using genetic alg...
Optimal parameter selection for unsupervised neural network using genetic alg...Optimal parameter selection for unsupervised neural network using genetic alg...
Optimal parameter selection for unsupervised neural network using genetic alg...IJCSEA Journal
 
Energy-Efficient LDPC Decoder using DVFS for binary sources
Energy-Efficient LDPC Decoder using DVFS for binary sourcesEnergy-Efficient LDPC Decoder using DVFS for binary sources
Energy-Efficient LDPC Decoder using DVFS for binary sourcesIDES Editor
 
A design of parity check matrix for short irregular ldpc codes via magic
A design of parity check matrix for short irregular ldpc codes via magicA design of parity check matrix for short irregular ldpc codes via magic
A design of parity check matrix for short irregular ldpc codes via magicIAEME Publication
 
Semi-global Leaderless Consensus with Input Saturation Constraints via Adapti...
Semi-global Leaderless Consensus with Input Saturation Constraints via Adapti...Semi-global Leaderless Consensus with Input Saturation Constraints via Adapti...
Semi-global Leaderless Consensus with Input Saturation Constraints via Adapti...IJRES Journal
 
Quasi Cyclic LDPC codes - Algebraic Construction
Quasi Cyclic LDPC codes - Algebraic Construction Quasi Cyclic LDPC codes - Algebraic Construction
Quasi Cyclic LDPC codes - Algebraic Construction Eapen Vpp
 
A new Algorithm to construct LDPC codes with large stopping sets
A new Algorithm to construct LDPC codes with large stopping setsA new Algorithm to construct LDPC codes with large stopping sets
A new Algorithm to construct LDPC codes with large stopping setsNestor Barraza
 
Arithmetic Operations in Multi-Valued Logic
Arithmetic Operations in Multi-Valued LogicArithmetic Operations in Multi-Valued Logic
Arithmetic Operations in Multi-Valued LogicVLSICS Design
 
Design of 4:16 decoder using reversible logic gates
Design of 4:16 decoder using reversible logic gatesDesign of 4:16 decoder using reversible logic gates
Design of 4:16 decoder using reversible logic gatesIJERA Editor
 
DIGITAL WAVE FORMULATION OF QUASI-STATIC PEEC METHOD
DIGITAL WAVE FORMULATION OF QUASI-STATIC PEEC METHODDIGITAL WAVE FORMULATION OF QUASI-STATIC PEEC METHOD
DIGITAL WAVE FORMULATION OF QUASI-STATIC PEEC METHODPiero Belforte
 
Barker_SIAMCSE15
Barker_SIAMCSE15Barker_SIAMCSE15
Barker_SIAMCSE15Karen Pao
 
A Survey Paper on Different Encoding Techniques Based on Quantum Computing
A Survey Paper on Different Encoding Techniques Based on Quantum ComputingA Survey Paper on Different Encoding Techniques Based on Quantum Computing
A Survey Paper on Different Encoding Techniques Based on Quantum ComputingIRJET Journal
 
240164036 ee2092-4-2011-matrix-analysis
240164036 ee2092-4-2011-matrix-analysis240164036 ee2092-4-2011-matrix-analysis
240164036 ee2092-4-2011-matrix-analysishomeworkping4
 

Was ist angesagt? (20)

Review On 2:4 Decoder By Reversible Logic Gates For Low Power Consumption
Review On 2:4 Decoder By Reversible Logic Gates For Low Power ConsumptionReview On 2:4 Decoder By Reversible Logic Gates For Low Power Consumption
Review On 2:4 Decoder By Reversible Logic Gates For Low Power Consumption
 
Design of Reversible Sequential Circuit Using Reversible Logic Synthesis
Design of Reversible Sequential Circuit Using Reversible Logic SynthesisDesign of Reversible Sequential Circuit Using Reversible Logic Synthesis
Design of Reversible Sequential Circuit Using Reversible Logic Synthesis
 
Numerical Solutions of Stiff Initial Value Problems Using Modified Extended B...
Numerical Solutions of Stiff Initial Value Problems Using Modified Extended B...Numerical Solutions of Stiff Initial Value Problems Using Modified Extended B...
Numerical Solutions of Stiff Initial Value Problems Using Modified Extended B...
 
Introduction to the Finite Element Method
Introduction to the Finite Element MethodIntroduction to the Finite Element Method
Introduction to the Finite Element Method
 
Deep learning book_chap_02
Deep learning book_chap_02Deep learning book_chap_02
Deep learning book_chap_02
 
Optimal parameter selection for unsupervised neural network using genetic alg...
Optimal parameter selection for unsupervised neural network using genetic alg...Optimal parameter selection for unsupervised neural network using genetic alg...
Optimal parameter selection for unsupervised neural network using genetic alg...
 
Energy-Efficient LDPC Decoder using DVFS for binary sources
Energy-Efficient LDPC Decoder using DVFS for binary sourcesEnergy-Efficient LDPC Decoder using DVFS for binary sources
Energy-Efficient LDPC Decoder using DVFS for binary sources
 
A design of parity check matrix for short irregular ldpc codes via magic
A design of parity check matrix for short irregular ldpc codes via magicA design of parity check matrix for short irregular ldpc codes via magic
A design of parity check matrix for short irregular ldpc codes via magic
 
Semi-global Leaderless Consensus with Input Saturation Constraints via Adapti...
Semi-global Leaderless Consensus with Input Saturation Constraints via Adapti...Semi-global Leaderless Consensus with Input Saturation Constraints via Adapti...
Semi-global Leaderless Consensus with Input Saturation Constraints via Adapti...
 
Quasi Cyclic LDPC codes - Algebraic Construction
Quasi Cyclic LDPC codes - Algebraic Construction Quasi Cyclic LDPC codes - Algebraic Construction
Quasi Cyclic LDPC codes - Algebraic Construction
 
A new Algorithm to construct LDPC codes with large stopping sets
A new Algorithm to construct LDPC codes with large stopping setsA new Algorithm to construct LDPC codes with large stopping sets
A new Algorithm to construct LDPC codes with large stopping sets
 
Fe25959964
Fe25959964Fe25959964
Fe25959964
 
Arithmetic Operations in Multi-Valued Logic
Arithmetic Operations in Multi-Valued LogicArithmetic Operations in Multi-Valued Logic
Arithmetic Operations in Multi-Valued Logic
 
Design of 4:16 decoder using reversible logic gates
Design of 4:16 decoder using reversible logic gatesDesign of 4:16 decoder using reversible logic gates
Design of 4:16 decoder using reversible logic gates
 
DIGITAL WAVE FORMULATION OF QUASI-STATIC PEEC METHOD
DIGITAL WAVE FORMULATION OF QUASI-STATIC PEEC METHODDIGITAL WAVE FORMULATION OF QUASI-STATIC PEEC METHOD
DIGITAL WAVE FORMULATION OF QUASI-STATIC PEEC METHOD
 
LDPC Encoding and Hamming Encoding
LDPC Encoding and Hamming EncodingLDPC Encoding and Hamming Encoding
LDPC Encoding and Hamming Encoding
 
Barker_SIAMCSE15
Barker_SIAMCSE15Barker_SIAMCSE15
Barker_SIAMCSE15
 
Fd25951958
Fd25951958Fd25951958
Fd25951958
 
A Survey Paper on Different Encoding Techniques Based on Quantum Computing
A Survey Paper on Different Encoding Techniques Based on Quantum ComputingA Survey Paper on Different Encoding Techniques Based on Quantum Computing
A Survey Paper on Different Encoding Techniques Based on Quantum Computing
 
240164036 ee2092-4-2011-matrix-analysis
240164036 ee2092-4-2011-matrix-analysis240164036 ee2092-4-2011-matrix-analysis
240164036 ee2092-4-2011-matrix-analysis
 

Andere mochten auch

Development of-effective-cooling-schemes-of-gas-turbine-blades-based-on-compu...
Development of-effective-cooling-schemes-of-gas-turbine-blades-based-on-compu...Development of-effective-cooling-schemes-of-gas-turbine-blades-based-on-compu...
Development of-effective-cooling-schemes-of-gas-turbine-blades-based-on-compu...Cemal Ardil
 
A combined-conventional-and-differential-evolution-method-for-model-order-red...
A combined-conventional-and-differential-evolution-method-for-model-order-red...A combined-conventional-and-differential-evolution-method-for-model-order-red...
A combined-conventional-and-differential-evolution-method-for-model-order-red...Cemal Ardil
 
A multi-layer-artificial-neural-network-architecture-design-for-load-forecast...
A multi-layer-artificial-neural-network-architecture-design-for-load-forecast...A multi-layer-artificial-neural-network-architecture-design-for-load-forecast...
A multi-layer-artificial-neural-network-architecture-design-for-load-forecast...Cemal Ardil
 
Mathematical modeling-of-gas-turbine-blade-cooling
Mathematical modeling-of-gas-turbine-blade-coolingMathematical modeling-of-gas-turbine-blade-cooling
Mathematical modeling-of-gas-turbine-blade-coolingCemal Ardil
 
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...Cemal Ardil
 
A weighted-sum-technique-for-the-joint-optimization-of-performance-and-power-...
A weighted-sum-technique-for-the-joint-optimization-of-performance-and-power-...A weighted-sum-technique-for-the-joint-optimization-of-performance-and-power-...
A weighted-sum-technique-for-the-joint-optimization-of-performance-and-power-...Cemal Ardil
 
System overflow blocking-transients-for-queues-with-batch-arrivals-using-a-fa...
System overflow blocking-transients-for-queues-with-batch-arrivals-using-a-fa...System overflow blocking-transients-for-queues-with-batch-arrivals-using-a-fa...
System overflow blocking-transients-for-queues-with-batch-arrivals-using-a-fa...Cemal Ardil
 
Complex condition-monitoring-system-of-aircraft-gas-turbine-engine
Complex condition-monitoring-system-of-aircraft-gas-turbine-engineComplex condition-monitoring-system-of-aircraft-gas-turbine-engine
Complex condition-monitoring-system-of-aircraft-gas-turbine-engineCemal Ardil
 
Numerical modeling-of-gas-turbine-engines
Numerical modeling-of-gas-turbine-enginesNumerical modeling-of-gas-turbine-engines
Numerical modeling-of-gas-turbine-enginesCemal Ardil
 
A new-method-of-adaptation-in-integrated-learning-environment
A new-method-of-adaptation-in-integrated-learning-environmentA new-method-of-adaptation-in-integrated-learning-environment
A new-method-of-adaptation-in-integrated-learning-environmentCemal Ardil
 
Investigation of-combined-use-of-mfcc-and-lpc-features-in-speech-recognition-...
Investigation of-combined-use-of-mfcc-and-lpc-features-in-speech-recognition-...Investigation of-combined-use-of-mfcc-and-lpc-features-in-speech-recognition-...
Investigation of-combined-use-of-mfcc-and-lpc-features-in-speech-recognition-...Cemal Ardil
 
Mimo broadcast-scheduling-for-weighted-sum-rate-maximization
Mimo broadcast-scheduling-for-weighted-sum-rate-maximizationMimo broadcast-scheduling-for-weighted-sum-rate-maximization
Mimo broadcast-scheduling-for-weighted-sum-rate-maximizationCemal Ardil
 
Modeling and-simulating-of-gas-turbine-cooled-blades
Modeling and-simulating-of-gas-turbine-cooled-bladesModeling and-simulating-of-gas-turbine-cooled-blades
Modeling and-simulating-of-gas-turbine-cooled-bladesCemal Ardil
 
Neuro -fuzzy-networks-for-identification-of-mathematical-model-parameters-of-...
Neuro -fuzzy-networks-for-identification-of-mathematical-model-parameters-of-...Neuro -fuzzy-networks-for-identification-of-mathematical-model-parameters-of-...
Neuro -fuzzy-networks-for-identification-of-mathematical-model-parameters-of-...Cemal Ardil
 
Multistage condition-monitoring-system-of-aircraft-gas-turbine-engine
Multistage condition-monitoring-system-of-aircraft-gas-turbine-engineMultistage condition-monitoring-system-of-aircraft-gas-turbine-engine
Multistage condition-monitoring-system-of-aircraft-gas-turbine-engineCemal Ardil
 
Efficient realization-of-an-adfe-with-a-new-adaptive-algorithm
Efficient realization-of-an-adfe-with-a-new-adaptive-algorithmEfficient realization-of-an-adfe-with-a-new-adaptive-algorithm
Efficient realization-of-an-adfe-with-a-new-adaptive-algorithmCemal Ardil
 
Frame and-burst-acquisition-in-tdma-satellite-communication-networks-with-tra...
Frame and-burst-acquisition-in-tdma-satellite-communication-networks-with-tra...Frame and-burst-acquisition-in-tdma-satellite-communication-networks-with-tra...
Frame and-burst-acquisition-in-tdma-satellite-communication-networks-with-tra...Cemal Ardil
 

Andere mochten auch (17)

Development of-effective-cooling-schemes-of-gas-turbine-blades-based-on-compu...
Development of-effective-cooling-schemes-of-gas-turbine-blades-based-on-compu...Development of-effective-cooling-schemes-of-gas-turbine-blades-based-on-compu...
Development of-effective-cooling-schemes-of-gas-turbine-blades-based-on-compu...
 
A combined-conventional-and-differential-evolution-method-for-model-order-red...
A combined-conventional-and-differential-evolution-method-for-model-order-red...A combined-conventional-and-differential-evolution-method-for-model-order-red...
A combined-conventional-and-differential-evolution-method-for-model-order-red...
 
A multi-layer-artificial-neural-network-architecture-design-for-load-forecast...
A multi-layer-artificial-neural-network-architecture-design-for-load-forecast...A multi-layer-artificial-neural-network-architecture-design-for-load-forecast...
A multi-layer-artificial-neural-network-architecture-design-for-load-forecast...
 
Mathematical modeling-of-gas-turbine-blade-cooling
Mathematical modeling-of-gas-turbine-blade-coolingMathematical modeling-of-gas-turbine-blade-cooling
Mathematical modeling-of-gas-turbine-blade-cooling
 
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...
 
A weighted-sum-technique-for-the-joint-optimization-of-performance-and-power-...
A weighted-sum-technique-for-the-joint-optimization-of-performance-and-power-...A weighted-sum-technique-for-the-joint-optimization-of-performance-and-power-...
A weighted-sum-technique-for-the-joint-optimization-of-performance-and-power-...
 
System overflow blocking-transients-for-queues-with-batch-arrivals-using-a-fa...
System overflow blocking-transients-for-queues-with-batch-arrivals-using-a-fa...System overflow blocking-transients-for-queues-with-batch-arrivals-using-a-fa...
System overflow blocking-transients-for-queues-with-batch-arrivals-using-a-fa...
 
Complex condition-monitoring-system-of-aircraft-gas-turbine-engine
Complex condition-monitoring-system-of-aircraft-gas-turbine-engineComplex condition-monitoring-system-of-aircraft-gas-turbine-engine
Complex condition-monitoring-system-of-aircraft-gas-turbine-engine
 
Numerical modeling-of-gas-turbine-engines
Numerical modeling-of-gas-turbine-enginesNumerical modeling-of-gas-turbine-engines
Numerical modeling-of-gas-turbine-engines
 
A new-method-of-adaptation-in-integrated-learning-environment
A new-method-of-adaptation-in-integrated-learning-environmentA new-method-of-adaptation-in-integrated-learning-environment
A new-method-of-adaptation-in-integrated-learning-environment
 
Investigation of-combined-use-of-mfcc-and-lpc-features-in-speech-recognition-...
Investigation of-combined-use-of-mfcc-and-lpc-features-in-speech-recognition-...Investigation of-combined-use-of-mfcc-and-lpc-features-in-speech-recognition-...
Investigation of-combined-use-of-mfcc-and-lpc-features-in-speech-recognition-...
 
Mimo broadcast-scheduling-for-weighted-sum-rate-maximization
Mimo broadcast-scheduling-for-weighted-sum-rate-maximizationMimo broadcast-scheduling-for-weighted-sum-rate-maximization
Mimo broadcast-scheduling-for-weighted-sum-rate-maximization
 
Modeling and-simulating-of-gas-turbine-cooled-blades
Modeling and-simulating-of-gas-turbine-cooled-bladesModeling and-simulating-of-gas-turbine-cooled-blades
Modeling and-simulating-of-gas-turbine-cooled-blades
 
Neuro -fuzzy-networks-for-identification-of-mathematical-model-parameters-of-...
Neuro -fuzzy-networks-for-identification-of-mathematical-model-parameters-of-...Neuro -fuzzy-networks-for-identification-of-mathematical-model-parameters-of-...
Neuro -fuzzy-networks-for-identification-of-mathematical-model-parameters-of-...
 
Multistage condition-monitoring-system-of-aircraft-gas-turbine-engine
Multistage condition-monitoring-system-of-aircraft-gas-turbine-engineMultistage condition-monitoring-system-of-aircraft-gas-turbine-engine
Multistage condition-monitoring-system-of-aircraft-gas-turbine-engine
 
Efficient realization-of-an-adfe-with-a-new-adaptive-algorithm
Efficient realization-of-an-adfe-with-a-new-adaptive-algorithmEfficient realization-of-an-adfe-with-a-new-adaptive-algorithm
Efficient realization-of-an-adfe-with-a-new-adaptive-algorithm
 
Frame and-burst-acquisition-in-tdma-satellite-communication-networks-with-tra...
Frame and-burst-acquisition-in-tdma-satellite-communication-networks-with-tra...Frame and-burst-acquisition-in-tdma-satellite-communication-networks-with-tra...
Frame and-burst-acquisition-in-tdma-satellite-communication-networks-with-tra...
 

Ähnlich wie Performance of-block-codes-using-the-eigenstructure-of-the-code-correlation-matrixand-soft-decision-decoding-of-bpsk

A method to determine partial weight enumerator for linear block codes
A method to determine partial weight enumerator for linear block codesA method to determine partial weight enumerator for linear block codes
A method to determine partial weight enumerator for linear block codesAlexander Decker
 
International journal of applied sciences and innovation vol 2015 - no 1 - ...
International journal of applied sciences and innovation   vol 2015 - no 1 - ...International journal of applied sciences and innovation   vol 2015 - no 1 - ...
International journal of applied sciences and innovation vol 2015 - no 1 - ...sophiabelthome
 
Performance bounds for unequally punctured terminated convolutional codes
Performance bounds for unequally punctured terminated convolutional codesPerformance bounds for unequally punctured terminated convolutional codes
Performance bounds for unequally punctured terminated convolutional codeseSAT Journals
 
Analytical, Numerical and Experimental Validation of Coil Voltage in Inductio...
Analytical, Numerical and Experimental Validation of Coil Voltage in Inductio...Analytical, Numerical and Experimental Validation of Coil Voltage in Inductio...
Analytical, Numerical and Experimental Validation of Coil Voltage in Inductio...ijeljournal
 
Analytical, Numerical and Experimental Validation of Coil Voltage in Inductio...
Analytical, Numerical and Experimental Validation of Coil Voltage in Inductio...Analytical, Numerical and Experimental Validation of Coil Voltage in Inductio...
Analytical, Numerical and Experimental Validation of Coil Voltage in Inductio...ijeljournal
 
ANALYTICAL, NUMERICAL AND EXPERIMENTAL VALIDATION OF COIL VOLTAGE IN INDUCTIO...
ANALYTICAL, NUMERICAL AND EXPERIMENTAL VALIDATION OF COIL VOLTAGE IN INDUCTIO...ANALYTICAL, NUMERICAL AND EXPERIMENTAL VALIDATION OF COIL VOLTAGE IN INDUCTIO...
ANALYTICAL, NUMERICAL AND EXPERIMENTAL VALIDATION OF COIL VOLTAGE IN INDUCTIO...ijeljournal
 
ANALYTICAL, NUMERICAL AND EXPERIMENTAL VALIDATION OF COIL VOLTAGE IN INDUCTIO...
ANALYTICAL, NUMERICAL AND EXPERIMENTAL VALIDATION OF COIL VOLTAGE IN INDUCTIO...ANALYTICAL, NUMERICAL AND EXPERIMENTAL VALIDATION OF COIL VOLTAGE IN INDUCTIO...
ANALYTICAL, NUMERICAL AND EXPERIMENTAL VALIDATION OF COIL VOLTAGE IN INDUCTIO...ijeljournal
 
Performance bounds for unequally punctured
Performance bounds for unequally puncturedPerformance bounds for unequally punctured
Performance bounds for unequally puncturedeSAT Publishing House
 
New folderelec425_2016_hw5.pdfMar 25, 2016 ELEC 425 S.docx
New folderelec425_2016_hw5.pdfMar 25, 2016 ELEC 425 S.docxNew folderelec425_2016_hw5.pdfMar 25, 2016 ELEC 425 S.docx
New folderelec425_2016_hw5.pdfMar 25, 2016 ELEC 425 S.docxcurwenmichaela
 
Analytical, Numerical and Experimental Validation of Coil Voltage in Inductio...
Analytical, Numerical and Experimental Validation of Coil Voltage in Inductio...Analytical, Numerical and Experimental Validation of Coil Voltage in Inductio...
Analytical, Numerical and Experimental Validation of Coil Voltage in Inductio...ijeljournal
 
Analytical, Numerical and Experimental Validation of Coil Voltage in Inductio...
Analytical, Numerical and Experimental Validation of Coil Voltage in Inductio...Analytical, Numerical and Experimental Validation of Coil Voltage in Inductio...
Analytical, Numerical and Experimental Validation of Coil Voltage in Inductio...ijujournal
 
Performance comparison of eg ldpc codes
Performance comparison of eg ldpc codesPerformance comparison of eg ldpc codes
Performance comparison of eg ldpc codesijcsity
 
Reduced Energy Min-Max Decoding Algorithm for Ldpc Code with Adder Correction...
Reduced Energy Min-Max Decoding Algorithm for Ldpc Code with Adder Correction...Reduced Energy Min-Max Decoding Algorithm for Ldpc Code with Adder Correction...
Reduced Energy Min-Max Decoding Algorithm for Ldpc Code with Adder Correction...ijceronline
 
2-Dimensional and 3-Dimesional Electromagnetic Fields Using Finite element me...
2-Dimensional and 3-Dimesional Electromagnetic Fields Using Finite element me...2-Dimensional and 3-Dimesional Electromagnetic Fields Using Finite element me...
2-Dimensional and 3-Dimesional Electromagnetic Fields Using Finite element me...IOSR Journals
 
Steven Duplij, Raimund Vogl, "Polyadic Braid Operators and Higher Braiding Ga...
Steven Duplij, Raimund Vogl, "Polyadic Braid Operators and Higher Braiding Ga...Steven Duplij, Raimund Vogl, "Polyadic Braid Operators and Higher Braiding Ga...
Steven Duplij, Raimund Vogl, "Polyadic Braid Operators and Higher Braiding Ga...Steven Duplij (Stepan Douplii)
 
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC Codes
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC CodesPerformance Analysis of Steepest Descent Decoding Algorithm for LDPC Codes
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC Codesidescitation
 

Ähnlich wie Performance of-block-codes-using-the-eigenstructure-of-the-code-correlation-matrixand-soft-decision-decoding-of-bpsk (20)

A method to determine partial weight enumerator for linear block codes
A method to determine partial weight enumerator for linear block codesA method to determine partial weight enumerator for linear block codes
A method to determine partial weight enumerator for linear block codes
 
International journal of applied sciences and innovation vol 2015 - no 1 - ...
International journal of applied sciences and innovation   vol 2015 - no 1 - ...International journal of applied sciences and innovation   vol 2015 - no 1 - ...
International journal of applied sciences and innovation vol 2015 - no 1 - ...
 
Performance bounds for unequally punctured terminated convolutional codes
Performance bounds for unequally punctured terminated convolutional codesPerformance bounds for unequally punctured terminated convolutional codes
Performance bounds for unequally punctured terminated convolutional codes
 
Analytical, Numerical and Experimental Validation of Coil Voltage in Inductio...
Analytical, Numerical and Experimental Validation of Coil Voltage in Inductio...Analytical, Numerical and Experimental Validation of Coil Voltage in Inductio...
Analytical, Numerical and Experimental Validation of Coil Voltage in Inductio...
 
Analytical, Numerical and Experimental Validation of Coil Voltage in Inductio...
Analytical, Numerical and Experimental Validation of Coil Voltage in Inductio...Analytical, Numerical and Experimental Validation of Coil Voltage in Inductio...
Analytical, Numerical and Experimental Validation of Coil Voltage in Inductio...
 
ANALYTICAL, NUMERICAL AND EXPERIMENTAL VALIDATION OF COIL VOLTAGE IN INDUCTIO...
ANALYTICAL, NUMERICAL AND EXPERIMENTAL VALIDATION OF COIL VOLTAGE IN INDUCTIO...ANALYTICAL, NUMERICAL AND EXPERIMENTAL VALIDATION OF COIL VOLTAGE IN INDUCTIO...
ANALYTICAL, NUMERICAL AND EXPERIMENTAL VALIDATION OF COIL VOLTAGE IN INDUCTIO...
 
ANALYTICAL, NUMERICAL AND EXPERIMENTAL VALIDATION OF COIL VOLTAGE IN INDUCTIO...
ANALYTICAL, NUMERICAL AND EXPERIMENTAL VALIDATION OF COIL VOLTAGE IN INDUCTIO...ANALYTICAL, NUMERICAL AND EXPERIMENTAL VALIDATION OF COIL VOLTAGE IN INDUCTIO...
ANALYTICAL, NUMERICAL AND EXPERIMENTAL VALIDATION OF COIL VOLTAGE IN INDUCTIO...
 
Performance bounds for unequally punctured
Performance bounds for unequally puncturedPerformance bounds for unequally punctured
Performance bounds for unequally punctured
 
New folderelec425_2016_hw5.pdfMar 25, 2016 ELEC 425 S.docx
New folderelec425_2016_hw5.pdfMar 25, 2016 ELEC 425 S.docxNew folderelec425_2016_hw5.pdfMar 25, 2016 ELEC 425 S.docx
New folderelec425_2016_hw5.pdfMar 25, 2016 ELEC 425 S.docx
 
Analytical, Numerical and Experimental Validation of Coil Voltage in Inductio...
Analytical, Numerical and Experimental Validation of Coil Voltage in Inductio...Analytical, Numerical and Experimental Validation of Coil Voltage in Inductio...
Analytical, Numerical and Experimental Validation of Coil Voltage in Inductio...
 
Analytical, Numerical and Experimental Validation of Coil Voltage in Inductio...
Analytical, Numerical and Experimental Validation of Coil Voltage in Inductio...Analytical, Numerical and Experimental Validation of Coil Voltage in Inductio...
Analytical, Numerical and Experimental Validation of Coil Voltage in Inductio...
 
Performance comparison of eg ldpc codes
Performance comparison of eg ldpc codesPerformance comparison of eg ldpc codes
Performance comparison of eg ldpc codes
 
Chua's circuit
Chua's circuitChua's circuit
Chua's circuit
 
Quantum Noise and Error Correction
Quantum Noise and Error CorrectionQuantum Noise and Error Correction
Quantum Noise and Error Correction
 
Reduced Energy Min-Max Decoding Algorithm for Ldpc Code with Adder Correction...
Reduced Energy Min-Max Decoding Algorithm for Ldpc Code with Adder Correction...Reduced Energy Min-Max Decoding Algorithm for Ldpc Code with Adder Correction...
Reduced Energy Min-Max Decoding Algorithm for Ldpc Code with Adder Correction...
 
2-Dimensional and 3-Dimesional Electromagnetic Fields Using Finite element me...
2-Dimensional and 3-Dimesional Electromagnetic Fields Using Finite element me...2-Dimensional and 3-Dimesional Electromagnetic Fields Using Finite element me...
2-Dimensional and 3-Dimesional Electromagnetic Fields Using Finite element me...
 
Steven Duplij, Raimund Vogl, "Polyadic Braid Operators and Higher Braiding Ga...
Steven Duplij, Raimund Vogl, "Polyadic Braid Operators and Higher Braiding Ga...Steven Duplij, Raimund Vogl, "Polyadic Braid Operators and Higher Braiding Ga...
Steven Duplij, Raimund Vogl, "Polyadic Braid Operators and Higher Braiding Ga...
 
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC Codes
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC CodesPerformance Analysis of Steepest Descent Decoding Algorithm for LDPC Codes
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC Codes
 
vector QUANTIZATION
vector QUANTIZATIONvector QUANTIZATION
vector QUANTIZATION
 
vector QUANTIZATION
vector QUANTIZATIONvector QUANTIZATION
vector QUANTIZATION
 

Mehr von Cemal Ardil

Upfc supplementary-controller-design-using-real-coded-genetic-algorithm-for-d...
Upfc supplementary-controller-design-using-real-coded-genetic-algorithm-for-d...Upfc supplementary-controller-design-using-real-coded-genetic-algorithm-for-d...
Upfc supplementary-controller-design-using-real-coded-genetic-algorithm-for-d...Cemal Ardil
 
The main-principles-of-text-to-speech-synthesis-system
The main-principles-of-text-to-speech-synthesis-systemThe main-principles-of-text-to-speech-synthesis-system
The main-principles-of-text-to-speech-synthesis-systemCemal Ardil
 
The feedback-control-for-distributed-systems
The feedback-control-for-distributed-systemsThe feedback-control-for-distributed-systems
The feedback-control-for-distributed-systemsCemal Ardil
 
Sonic localization-cues-for-classrooms-a-structural-model-proposal
Sonic localization-cues-for-classrooms-a-structural-model-proposalSonic localization-cues-for-classrooms-a-structural-model-proposal
Sonic localization-cues-for-classrooms-a-structural-model-proposalCemal Ardil
 
Robust fuzzy-observer-design-for-nonlinear-systems
Robust fuzzy-observer-design-for-nonlinear-systemsRobust fuzzy-observer-design-for-nonlinear-systems
Robust fuzzy-observer-design-for-nonlinear-systemsCemal Ardil
 
Response quality-evaluation-in-heterogeneous-question-answering-system-a-blac...
Response quality-evaluation-in-heterogeneous-question-answering-system-a-blac...Response quality-evaluation-in-heterogeneous-question-answering-system-a-blac...
Response quality-evaluation-in-heterogeneous-question-answering-system-a-blac...Cemal Ardil
 
Reduction of-linear-time-invariant-systems-using-routh-approximation-and-pso
Reduction of-linear-time-invariant-systems-using-routh-approximation-and-psoReduction of-linear-time-invariant-systems-using-routh-approximation-and-pso
Reduction of-linear-time-invariant-systems-using-routh-approximation-and-psoCemal Ardil
 
Real coded-genetic-algorithm-for-robust-power-system-stabilizer-design
Real coded-genetic-algorithm-for-robust-power-system-stabilizer-designReal coded-genetic-algorithm-for-robust-power-system-stabilizer-design
Real coded-genetic-algorithm-for-robust-power-system-stabilizer-designCemal Ardil
 
Optimal supplementary-damping-controller-design-for-tcsc-employing-rcga
Optimal supplementary-damping-controller-design-for-tcsc-employing-rcgaOptimal supplementary-damping-controller-design-for-tcsc-employing-rcga
Optimal supplementary-damping-controller-design-for-tcsc-employing-rcgaCemal Ardil
 
Optimal straight-line-trajectory-generation-in-3 d-space-using-deviation-algo...
Optimal straight-line-trajectory-generation-in-3 d-space-using-deviation-algo...Optimal straight-line-trajectory-generation-in-3 d-space-using-deviation-algo...
Optimal straight-line-trajectory-generation-in-3 d-space-using-deviation-algo...Cemal Ardil
 
On the-optimal-number-of-smart-dust-particles
On the-optimal-number-of-smart-dust-particlesOn the-optimal-number-of-smart-dust-particles
On the-optimal-number-of-smart-dust-particlesCemal Ardil
 
On the-joint-optimization-of-performance-and-power-consumption-in-data-centers
On the-joint-optimization-of-performance-and-power-consumption-in-data-centersOn the-joint-optimization-of-performance-and-power-consumption-in-data-centers
On the-joint-optimization-of-performance-and-power-consumption-in-data-centersCemal Ardil
 
On the-approximate-solution-of-a-nonlinear-singular-integral-equation
On the-approximate-solution-of-a-nonlinear-singular-integral-equationOn the-approximate-solution-of-a-nonlinear-singular-integral-equation
On the-approximate-solution-of-a-nonlinear-singular-integral-equationCemal Ardil
 
On problem-of-parameters-identification-of-dynamic-object
On problem-of-parameters-identification-of-dynamic-objectOn problem-of-parameters-identification-of-dynamic-object
On problem-of-parameters-identification-of-dynamic-objectCemal Ardil
 
New technologies-for-modeling-of-gas-turbine-cooled-blades
New technologies-for-modeling-of-gas-turbine-cooled-bladesNew technologies-for-modeling-of-gas-turbine-cooled-blades
New technologies-for-modeling-of-gas-turbine-cooled-bladesCemal Ardil
 
Multivariate high-order-fuzzy-time-series-forecasting-for-car-road-accidents
Multivariate high-order-fuzzy-time-series-forecasting-for-car-road-accidentsMultivariate high-order-fuzzy-time-series-forecasting-for-car-road-accidents
Multivariate high-order-fuzzy-time-series-forecasting-for-car-road-accidentsCemal Ardil
 
Multi objective-optimization-with-fuzzy-based-ranking-for-tcsc-supplementary-...
Multi objective-optimization-with-fuzzy-based-ranking-for-tcsc-supplementary-...Multi objective-optimization-with-fuzzy-based-ranking-for-tcsc-supplementary-...
Multi objective-optimization-with-fuzzy-based-ranking-for-tcsc-supplementary-...Cemal Ardil
 
Model reduction-of-linear-systems-by conventional-and-evolutionary-techniques
Model reduction-of-linear-systems-by conventional-and-evolutionary-techniquesModel reduction-of-linear-systems-by conventional-and-evolutionary-techniques
Model reduction-of-linear-systems-by conventional-and-evolutionary-techniquesCemal Ardil
 
Mimo system-order-reduction-using-real-coded-genetic-algorithm
Mimo system-order-reduction-using-real-coded-genetic-algorithmMimo system-order-reduction-using-real-coded-genetic-algorithm
Mimo system-order-reduction-using-real-coded-genetic-algorithmCemal Ardil
 
Library aware-power-conscious-realization-of-complementary-boolean-functions-
Library aware-power-conscious-realization-of-complementary-boolean-functions-Library aware-power-conscious-realization-of-complementary-boolean-functions-
Library aware-power-conscious-realization-of-complementary-boolean-functions-Cemal Ardil
 

Mehr von Cemal Ardil (20)

Upfc supplementary-controller-design-using-real-coded-genetic-algorithm-for-d...
Upfc supplementary-controller-design-using-real-coded-genetic-algorithm-for-d...Upfc supplementary-controller-design-using-real-coded-genetic-algorithm-for-d...
Upfc supplementary-controller-design-using-real-coded-genetic-algorithm-for-d...
 
The main-principles-of-text-to-speech-synthesis-system
The main-principles-of-text-to-speech-synthesis-systemThe main-principles-of-text-to-speech-synthesis-system
The main-principles-of-text-to-speech-synthesis-system
 
The feedback-control-for-distributed-systems
The feedback-control-for-distributed-systemsThe feedback-control-for-distributed-systems
The feedback-control-for-distributed-systems
 
Sonic localization-cues-for-classrooms-a-structural-model-proposal
Sonic localization-cues-for-classrooms-a-structural-model-proposalSonic localization-cues-for-classrooms-a-structural-model-proposal
Sonic localization-cues-for-classrooms-a-structural-model-proposal
 
Robust fuzzy-observer-design-for-nonlinear-systems
Robust fuzzy-observer-design-for-nonlinear-systemsRobust fuzzy-observer-design-for-nonlinear-systems
Robust fuzzy-observer-design-for-nonlinear-systems
 
Response quality-evaluation-in-heterogeneous-question-answering-system-a-blac...
Response quality-evaluation-in-heterogeneous-question-answering-system-a-blac...Response quality-evaluation-in-heterogeneous-question-answering-system-a-blac...
Response quality-evaluation-in-heterogeneous-question-answering-system-a-blac...
 
Reduction of-linear-time-invariant-systems-using-routh-approximation-and-pso
Reduction of-linear-time-invariant-systems-using-routh-approximation-and-psoReduction of-linear-time-invariant-systems-using-routh-approximation-and-pso
Reduction of-linear-time-invariant-systems-using-routh-approximation-and-pso
 
Real coded-genetic-algorithm-for-robust-power-system-stabilizer-design
Real coded-genetic-algorithm-for-robust-power-system-stabilizer-designReal coded-genetic-algorithm-for-robust-power-system-stabilizer-design
Real coded-genetic-algorithm-for-robust-power-system-stabilizer-design
 
Optimal supplementary-damping-controller-design-for-tcsc-employing-rcga
Optimal supplementary-damping-controller-design-for-tcsc-employing-rcgaOptimal supplementary-damping-controller-design-for-tcsc-employing-rcga
Optimal supplementary-damping-controller-design-for-tcsc-employing-rcga
 
Optimal straight-line-trajectory-generation-in-3 d-space-using-deviation-algo...
Optimal straight-line-trajectory-generation-in-3 d-space-using-deviation-algo...Optimal straight-line-trajectory-generation-in-3 d-space-using-deviation-algo...
Optimal straight-line-trajectory-generation-in-3 d-space-using-deviation-algo...
 
On the-optimal-number-of-smart-dust-particles
On the-optimal-number-of-smart-dust-particlesOn the-optimal-number-of-smart-dust-particles
On the-optimal-number-of-smart-dust-particles
 
On the-joint-optimization-of-performance-and-power-consumption-in-data-centers
On the-joint-optimization-of-performance-and-power-consumption-in-data-centersOn the-joint-optimization-of-performance-and-power-consumption-in-data-centers
On the-joint-optimization-of-performance-and-power-consumption-in-data-centers
 
On the-approximate-solution-of-a-nonlinear-singular-integral-equation
On the-approximate-solution-of-a-nonlinear-singular-integral-equationOn the-approximate-solution-of-a-nonlinear-singular-integral-equation
On the-approximate-solution-of-a-nonlinear-singular-integral-equation
 
On problem-of-parameters-identification-of-dynamic-object
On problem-of-parameters-identification-of-dynamic-objectOn problem-of-parameters-identification-of-dynamic-object
On problem-of-parameters-identification-of-dynamic-object
 
New technologies-for-modeling-of-gas-turbine-cooled-blades
New technologies-for-modeling-of-gas-turbine-cooled-bladesNew technologies-for-modeling-of-gas-turbine-cooled-blades
New technologies-for-modeling-of-gas-turbine-cooled-blades
 
Multivariate high-order-fuzzy-time-series-forecasting-for-car-road-accidents
Multivariate high-order-fuzzy-time-series-forecasting-for-car-road-accidentsMultivariate high-order-fuzzy-time-series-forecasting-for-car-road-accidents
Multivariate high-order-fuzzy-time-series-forecasting-for-car-road-accidents
 
Multi objective-optimization-with-fuzzy-based-ranking-for-tcsc-supplementary-...
Multi objective-optimization-with-fuzzy-based-ranking-for-tcsc-supplementary-...Multi objective-optimization-with-fuzzy-based-ranking-for-tcsc-supplementary-...
Multi objective-optimization-with-fuzzy-based-ranking-for-tcsc-supplementary-...
 
Model reduction-of-linear-systems-by conventional-and-evolutionary-techniques
Model reduction-of-linear-systems-by conventional-and-evolutionary-techniquesModel reduction-of-linear-systems-by conventional-and-evolutionary-techniques
Model reduction-of-linear-systems-by conventional-and-evolutionary-techniques
 
Mimo system-order-reduction-using-real-coded-genetic-algorithm
Mimo system-order-reduction-using-real-coded-genetic-algorithmMimo system-order-reduction-using-real-coded-genetic-algorithm
Mimo system-order-reduction-using-real-coded-genetic-algorithm
 
Library aware-power-conscious-realization-of-complementary-boolean-functions-
Library aware-power-conscious-realization-of-complementary-boolean-functions-Library aware-power-conscious-realization-of-complementary-boolean-functions-
Library aware-power-conscious-realization-of-complementary-boolean-functions-
 

Kürzlich hochgeladen

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Kürzlich hochgeladen (20)

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

Performance of-block-codes-using-the-eigenstructure-of-the-code-correlation-matrixand-soft-decision-decoding-of-bpsk

  • 1. World Academy of Science, Engineering and Technology International Journal of Electrical, Electronic Science and Engineering Vol:3 No:9, 2009 Performance of Block Codes Using the Eigenstructure of the Code Correlation Matrix and Soft-Decision Decoding of BPSK Vitalice K. Oduol, and Cemal Ardil International Science Index 33, 2009 waset.org/publications/10271 Abstract—A method is presented for obtaining the error probability for block codes. The method is based on the eigenvalueeigenvector properties of the code correlation matrix. It is found that under a unary transformation and for an additive white Gaussian noise environment, the performance evaluation of a block code becomes a one-dimensional problem in which only one eigenvalue and its corresponding eigenvector are needed in the computation. The obtained error rate results show remarkable agreement between simulations and analysis. Keywords—bit error rate, block codes, code correlation matrix, eigenstructure, soft-decision decoding, weight vector. I. INTRODUCTION T HE topic of error control codes, both block and convolutional codes is a mature subject on which there have been many papers and books [1-6]. The computation of the post-decoding bit error rate (BER) is usually accomplished using performance bounds. Although many of these bounds can be very tight, it is still better when an exact result can be found. The method presented here obtains the exact probability of error for block codes using soft-decision decoding in an additive white Gaussian noise environment. It is based on the eigen-structure of the code correlation matrix, in that the eigenvalue-eigenvector properties determine the relevant parameters needed in the performance evaluation. It is found that under a suitable unitary transformation of the decision variables the performance evaluation of a block code becomes a one-dimensional problem in which only the dominant eigenvalue and its corresponding eigenvector are needed.Only the dimension corresponding to the largest eigenvalue need be considered, all others having collapsed to a point. Use is made of the fact that the code correlation matrix is real and symmetric, and therefore the eigenvectors from different eigenvalues will be orthogonal [7,9]. The paper is organized as follows: Section II gives the system model used in the analysis. It also introduces the code correlation matrix. Section III presents the eigenstructure of V. K. Oduol is with the Department of Electrical and Information Engineering, University of Nairobi, Nairobi, Kenya (+254-02-318262 ext.28327, vkoduol@uonbi.ac.ke) Cemal Ardil is with the National Academy of Aviation, Baku, Azerbaijan the code correlation matrix. This section is really the crux of the method presented. Section IV presents the performance analysis together with the properties of the code correlation matrix. Section V presents the results and conclusion. The Appendix covers an example to illustrate results used in the derivations in the body of the paper. II. SYSTEM MODEL The linear block codes considered here consist of codewords generated by a generator matrix and an information vector. The system is modelled as a binary phase-shift keying (PSK) with antipodal signalling and soft-decision decoding at the receiver. For some block codes selected for illustration, bit error rate results show remarkable agreement between simulations and analysis, and are a validation of the method. Fig.1 depicts the signal flow incorporating the source encoder and channel. The output of the channel encoder is a set of bits Ckj, k=1,2,…,M, and j=1,2,…, n. This is then transformed so as to map binary 0’s into –1, and binary 1’s into +1, and the result is then multiplied by a positive scalar constant. The channel is modelled by an additive random variable nj which is assumed to be a sample of a zero-mean Gaussian noise process, and is therefore itself a zero-mean Gaussian random variable with variance N0/2. The Gaussian assumption is made here for tractability of the analysis. 0 ,1 Source/ Coder 1, 1 x 2 E + S E rj S E S n j Channel Transmitter Fig. 1 Transmitter and channel to generate received symbols In Fig.2 the receiver correlates the incoming signal rj with each codeword, and forms the decision variables U1, U2, …, UM as shown. It then selects the largest of these to determine the transmitted codeword. Since the codes used are linear, the analysis assumes that the transmitted sequence corresponds to the all-zero codeword. The received symbol is therefore r n E . j 37 j S
  • 2. World Academy of Science, Engineering and Technology International Journal of Electrical, Electronic Science and Engineering Vol:3 No:9, 2009 The correlation is achieved by multiplying the received symbol by 2C 1 E and summing over all values of j. ij S rj n X U2 n Select the Largest U1 n j 1 2C 1 ES 2C 1 2j Mj ES 1 ES Fig. 2 The receiver forms the decision variables via correlation The receiver forms the decision variables Uk as follows: International Science Index 33, 2009 waset.org/publications/10271 n U0 nES Uk n ES j 1 (1) nj n 2 wk E S ES j 1 2Ckj 1 nj k=1,2,…,M (2) where Es is the signal energy. It is more convenient to work with the following decision variables k=1,2,…,M (3) 2ES 1 Zk 2ES N 0 Uk U0 wk N0 where N0/2 is the power spectral density of the white noise. It can be shown that the mean and variance of Zk are, respectively, E{Zk}=0 and Var{Zk} = wk. From the definition of Uk we have n (4) Z 2/ N C n k kj 0 j j 1 The justifications for the first and last of these properties are provided next. The remaining two do not need justification beyond what is already stated. A. The Weight Vector as an Eigenvector The code correlation matrix is given by R = CCT. The weight vector is w = C1n, where 1n is the n 1 vector of all ones. To show that the weight vector is an eigenvector of the code correlation matrix, it is considered that M (8) Rw m the correlation becomes n C kj Clj (6) rkl j 1 which is just the inner product of the two codewords Ck and Cl. The code correlation matrix R is defined to have rkl as its elements, with the diagonal elements equal to the weight of the kth codeword. That is, rkk =wk. R mp w p n Using the fact that R w2 r23 r24 r2 M r32 w3 r34 r3 M (7) rM 2 rM 3 rM 4 wM The next section discusses the eigenvalue-eigenvector properties of the code correlation of (7). and C mj C pj mp j 1 n wp C pq and q 1 substituting in (7) yields n Rw m p 1j 1 Cmj C pj n j 1 Cmj n q C pq q 1 (9) M 1p C C 1 pj pq where the order of summations has been changed in the last line. The inner-most sum (over p) is the inner product between column-j and column-q of the codeword array C. When the index j is fixed, the sums (over p) are evaluated for each value of q, and added together from q = 1 to q = n. It turns out that the resulting sum in parentheses is the same, regardless of the value of j. This is observed to hold for all the linear codes examined in this work. The value of this sum is 1, the eigenvalue for the weight vector. Accordingly, n 1 R p 1 M n A. Code Correlation Matrix The correlation of the random variables Z k and Z l is 2 n n (5) E Zk , Zl C kj C li E ni n j N0 j 1 i 1 Since the noise is presumed to be white, E ni n j N 0 / 2 ij , E Zk , Zl For block codes, the code correlation matrix has the following properties. Property 1: The weight vector of the code is an eigenvector with eigenvalue 1. That is v1 = w, and Rw = 1w. This eigenvalue has only one eigenvector, the weight vector. Incidentally 1 happens to be the largest eigenvalue, a fact not needed in the analysis addressed here, but found to be true in all the block codes examined. Property 2: All other eigenvectors are orthogonal to the weight vector: wTvm = 0, for m 1. This follows from the fact the code correlation matrix is real and symmetric. Property 3: Some eigenvalues may be zero; equivalently the null-space of the code correlation matrix may be non-empty. Property 4: Except for 1, the other non-zero eigenvalues have eigenvectors with zero-sum elements. For the eigenvalue m the corresponding eigenvector vk has elements satisfying v1,m,+ v2,m + … +vM,m = 0. j 1 X 2C 1j EIGEN-STRUCTURE OF THE CODE CORRELATON MATRIX UM j 1 X III. q M (10) C C 1 pj pq 1p where j is any legitimate column index. With this result the expression in (8) becomes n (11) Rw C w m 1 j 1 mj 1 m from which it is evident that Rw 38 1w (12)
  • 3. World Academy of Science, Engineering and Technology International Journal of Electrical, Electronic Science and Engineering Vol:3 No:9, 2009 indicating that the weight vector is an eigenvector of the code correlation matrix, with 1 as the corresponding eigenvalue. The expression in (10) for the eigenvalue consists of two nested sums. The inner sum is found to equal 2k-1 for q = j, and to equal 2k-2 for the remaining n - 1 values of q. This is found to hold for all the linear block codes examined in this paper. Of course it can be proved by using the generator matrix of the code and the information sequences used to create the code array. The present paper omits that exercise, and instead uses the observations made from the codes examined. The total in (10) is 2k-1 + 2k-2 (n-1), which gives (13) 2k 2 n 1 1 Thus, the eigenvalue depends only on n and k, which are the two code parameters. B. Other Non-Zero Eigenvalues As before vm = Cx is any any of the eigenvectors corresponding to m for m 1 with the vector x being n 1. In a parallel development to the case for the weight vector, M (14) International Science Index 33, 2009 waset.org/publications/10271 RCx m R mp Cx p p 1 Using the fact that n R mp and Cx C mj C pj n p and C pq xq q 1 j 1 substituting in (14) yields M n Rv m n C mj C pj p 1j 1 n j 1 C mj n q 1 xq C pq x q (15) q 1 M C pj C pq p 1 The inner-most sum (over p) has appeared before; it equals 2kfor q = j and equals 2k-2 for q j. 1 Rv m 2 k 2 n C mj 2 x j 1 q x 1 q (16) This can be re-written as Rv m 2k 2 C mj x j 1 2k 2 Cx T M n n W p 1j 1 x j C pj n j 1 xj n q C pq (20) q 1 M C C 1 pj pq 1p The double sum in parentheses in (20) brackets has been shown to equal 1, independent of j. Thus n (21) x 0 j 1 j an intermediate result which will be used shortly. Continuing these proceedings, the sum of the elements of this vector is M M n (22) C pj x j p 1j 1 Cx p p 1 Changing the order of summations gives M n p 1 Cx p j 1 M xj (23) C 1 pj p At this point it is important once again to invoke an observed result form the code array, that the sum in parentheses is the sum of the elements in column-j of the code array. This sum is found to be a constant independent of j. In fact, it is found to equal 2k-1, where k is the number of information bits in the n-bit codeword. As noted previously in connection with (10) here too it is possible to prove this using the generator matrix of the code and the information sequences used to generate the codewords. For the same reason given earlier, the paper uses the observations made on the linear codes examined. M n (24) v k x p ,m j 1 j The sum on the right has been shown in (21) to be zero. Therefore M (25) v 0 p,m n p 1 n j q x 1 q (17) which shows that the eigenvectors belonging to the non-zero eigenvalue m for m 1 have zero-sum elements. That is the elements sum to zero. (18) D. Number of Zero-Sum Eigenvectors The weight vector is the only vector corresponding to the eigenvalue 1. As for the other non-zero eigenvalues the condition in (21) involves n variables. This means that there are n-1 free variables, and therefore n-1 eigenvectors corresponding to the eigenvalue m for m 1. Specifically the expression in (21) can be used to obtain the eigenvectors as The sum over q has been shown to be zero, and therefore Rv m 0 p 1 n j orthogonal to the weight vector. For the presentation here the vector Cx represents any of the eigenvectors vm, where the vector x is n 1. n C mj x j j 1 The right hand side is seen to represent the m-th component of Cv, i.e. the m-th component of the eigenvector, v. This leads to the result Rv = kv, which says that the non-zero eigenvalue sought is k 2 m 1 (19) m 2 The eigenvalue obtained in (13) is n+1 times m. Since n > 1 a comparison of (19) with (13) shows that 1 corresponding to the weight vector the largest eigenvalue of the code correlation matrix. C. Zero-Sum Eigenvectors Since the code correlation matrix is real and symmetric, the eigenvectors vm corresponding to m with m 1 are 1 Cx 0 0 0 1 0 C 0 , C 0 0 , C 1 , , C (26) 0 1 1 1 1 1 This says that the eigenvectors are obtained by subtracting the last column of the code array from each of the first n-1 columns of the code array C. It is noted that while (26) uses the last column of the code array to create the n-1 vectors, any 39
  • 4. World Academy of Science, Engineering and Technology International Journal of Electrical, Electronic Science and Engineering Vol:3 No:9, 2009 one column could have been used. The same set of vectors will be obtained, although in a different order. These together with the weight vector constitute a total of n eigenvectors. Since the code correlation matrix is M M, where M = 2k – 1, a total of M vectors is required. The remaining (M – n) vectors must come from the null space of the code correlation matrix. While it is possible to obtain expression for the vectors in null space of the code correlation matrix, this is not addressed here since it is not needed in meeting the present objectives. These vectors from the null space can be transformed by the Gram-Schmidt process [7-9] if necessary, to make them orthogonal to the vectors already obtained, and also to be mutually orthogonal themselves. This completes the discussion of the eigen-structure of the code correlation matrix for the purposes of the paper. It is now possible to return to the issue of analyzing the performance of the block codes under the scenario described previously in Section II. The random variables Z1, Z2, …, ZM are zero-mean and jointly Gaussian in distribution. In such cases the result of the transformation in (29) would normally be a new set of random variables X1, X2, …, XM which are statistically independent, and with a Gaussian distribution, given that the original set is Gaussian. Here the situation is much simpler, in that the transformation has produced the mapping as shown in Fig.3 2 E S / N 0 w1 , w 2 , , wM Z1 Z 2 , ZM , , International Science Index 33, 2009 waset.org/publications/10271 IV. PERFORMANCE ANALYSIS Referring to (1) and (2) and assuming that the transmitted codeword is the all-zero codeword, the receiver makes the correct decision if and only if Uk – U0 < 0, for k=1,3, …,M, a requirement which together with (3) translates to Zk wk 2ES N0 for k=1,2, …,M. 2 ES / N 0 w Zk wk k=1,2,…,M (29) (30) To determine the image of the two points referred to above, it is considered that the first vector in the matrix V is the normalized weight vector v1 = w/||w||, and all the other vectors in V are orthogonal to w. Accordingly the image of the point (w1, w2, w3, … wM)T will be (||w||, 0, 0, …, 0)T. For the other is considered, which point the limit lim B w , w , , w 1 B gives the image as B 2 0 X2 X3 0 0 Fig. 3 Mapping of the Limits (28) where V is the matrix of eigenvectors selected to have orthornormal columns. That is VT V I XM 0 (27) A. Transformation of the Decision Variables The analysis would be easier when the events are disjoint, which is achieved by applying a unitary transformation to the space of the random variables Z1, Z2, …, ZM. The transformation of random variables to facilitate analysis is employed in many texts [8,10]. Under the transformation, the two points (- , - , - , …, - )T and (w1, w2, w3, … wM)T will be mapped into new image points. To this send the following transformation is applied X = VTZ 1 X1 The event of a correct symbol detection corresponds to the joint event E1 E2 E M where Ek XM In the upper part of the figure the variables Z1 Z2,..,ZM each varies as shown by the arrows. In the lower part of the figure only X1 varies (as shown by the arrow); the other variables X2, X3…,XM have collapsed to zero. Therefore the result of the transformation is to produce one random variable X1, and reduce the others to probability masses at zero. B. Probability of Correct Symbol The probability of correct symbol is then given by (31) w 2E S / N 0 The original set of random variables are each Gaussian by assumption. Therefore since the transformation is linear, the resulting random variables should also be Gaussian. Here only one random variable results. The variance of this random variable is the eigenvalue corresponding to the largest eigenvalue 1 of the code correlation matrix. Accordingly the probability of correct symbol is found to be PCW X1 Pr 1 2 1 PCW w 2 ES / N 0 exp y2 dy 2 1 (32) By an appropriate change of variable, this can be expressed as M lim B w , 0, , 0 , using the fact that the other vectors in V are orthogonal to the weight vector. It must be stated immediately here that the results obtained later by this consideration are found to be in agreement with those found by simulation. When the limit is taken, the image of the point in question is seen to be (- , 0, 0, …, 0)T. PCW 1 2 1 erf 2 2 w ES 1N 0 1 1 erfc 2 2 w ES (33) 1N 0 where erf(x) and erfc(x) are the error function and the complementary error function, respectively. 40
  • 5. World Academy of Science, Engineering and Technology International Journal of Electrical, Electronic Science and Engineering Vol:3 No:9, 2009 C. Bit Error Probability Since a word consists of n bits, an estimate of the bit error probability Pb can be can be obtained from PCW by using P b 1 P CW 1/n (34) where n is the nmber of bits in a codeword. V. RESULTS AND CONCLUSION Fig.4 shows results for the correct symbol probabilities for the (7,4,3) BCH code. One set is obtained via simulation (diamonds) and the other via analysis (solid line). These are in the upper part of the figure. Also provided are the corresponding results for the uncoded symbols. It is observed that there is agreement between the results from simulation and analysis. Needless to say, the results obtained via coding are better than those without. This work has presented a method of computing the error probability for a block code using the eigenvalue-eigenvector structure of the code correlation matrix. It is found that there is one largest eigenvalue whose only eigenvector is the weight vector. The other eigenvectors have elements that add up to zero. The largest eigenvalue and its eigenvector (the weight vector) are used to determine the symbol error probability of a block code using BPSK and soft-decision decoding. A comparison of the simulation and analysis results provides validation of the analysis presented. APPENDIX The codewords are arranged in rows to form the matrix C as given below. C1,1 , C1, 2 , C 2,1 , C 2, 2 , C M ,1 , C M , 2 , C Comparison of Correct Symbol Probabilities 1 Correct Symbol Probability , C M ,n (34) In this array, the all-zero codeword is not sown. As an illustration the (7,4,3) BCH code with generator matrix G 0.8 Coded : Simulation Solid: Theory 0.7 0.6 0.5 G 0.4 1 0 0 0 1 1 0 0 1 0 0 0 1 1 0 0 1 0 1 1 1 (35) 0 0 0 1 1 0 1 0.3 Uncoded 0.2 has the codewords given in Table I 0.1 TABLE I Index 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 0 -20 -18 -16 -14 -12 -10 -8 -6 -4 -2 0 2 4 6 8 10 Signal-to-Nose Ratio, Eb/No [dB] Fig. 4. Comparison of correct symbol probabilities Comparison of Bit Error Probabilities 1.0E+00 1.0E-01 Probability of Bit Error International Science Index 33, 2009 waset.org/publications/10271 0.9 , C1,n , C 2,n 1.0E-02 Uncoded 1.0E-03 Coded : Simulation Solid: Theory 1.0E-04 1.0E-05 1.0E-06 1.0E-07 1.0E-08 1.0E-09 -10 -8 -6 -4 -2 0 2 4 6 8 10 12 Signal-to-Noise Ratio, Eb/No [dB] Fig. 5. Comparison of bit error probabilities Fig.5 gives a comparison of bit error probabilities using results from simulation, analysis, and uncoded symbols. Again, the simulation and anlysis results exhibit agreement. The uncoded symbol results (upper trace) indicate a higher bit error probability than the ones obtained by coding. CODEWORDS OF THE (7,4,3) BCH CODE codeword weight 0 0 0 1 1 0 1 3 0 0 1 0 1 1 1 4 0 0 1 1 0 1 0 3 0 1 0 0 0 1 1 3 0 1 0 1 1 1 0 4 0 1 1 0 1 0 0 3 0 1 1 1 0 0 1 4 1 0 0 0 1 1 0 3 1 0 0 1 0 1 1 4 1 0 1 0 0 0 1 3 1 0 1 1 1 0 0 4 1 1 0 0 1 0 1 4 1 1 0 1 0 0 0 3 1 1 1 0 0 1 0 4 1 1 1 1 1 1 1 7 and the code correlation matrix is given by the array shown in Fig.6. The elements of the weight vector appear as the diagonal elements in the matrix. The matrix is seen to be symmetric and has real elements. Through other methods of determining the eigenvalue, and it can be established that the largest eigenvalue is 32, and the other non-zero eigenvalue is 4. These agree with (13) and (19), respectively. That is 1 = (7+1) 24-2 = 32 and m = 242 = 4. form m 1.. Other codes are given below so as to enable comparisons and validation of some the expressions given in the analysis. The example of the (3,2,2) code is simple enough that the results can be checked very quickly, without much effort. The other example is (6,3,3) code. 41
  • 6. World Academy of Science, Engineering and Technology International Journal of Electrical, Electronic Science and Engineering Vol:3 No:9, 2009 3 2 1 1 2 1 2 1 2 1 2 2 1 0 3 2 4 2 2 2 2 2 2 2 2 2 2 0 2 4 1 2 3 1 2 1 2 1 2 1 2 0 1 2 3 1 2 1 3 2 1 2 1 2 1 0 2 1 2 3 2 2 2 2 4 2 2 2 2 0 2 2 2 2 4 1 2 1 1 2 3 2 1 0 1 2 2 1 2 3 2 2 2 2 2 2 4 0 2 2 2 2 2 2 4 1 2 1 1 2 1 0 3 2 1 2 2 1 2 3 2 2 2 2 2 0 2 2 4 2 2 2 2 2 4 1 2 1 1 0 1 2 1 2 3 2 2 1 2 3 2 2 2 0 2 2 2 2 2 2 4 2 2 2 4 2 2 0 2 2 2 2 2 2 2 2 4 2 2 4 1 0 1 1 2 1 2 1 2 1 2 2 3 2 3 0 2 2 2 2 2 2 2 2 2 2 2 2 4 4 3 4 3 3 4 3 4 3 4 3 4 4 3 4 7 3 International Science Index 33, 2009 waset.org/publications/10271 The (3,2,2) code has the non-zero codewords given in Table II, (36) The eigenvalues of this matrix are easily computed, and verified from the text, using k = 2 and n = 3 in(13) and (19), to be 1 = 4 and 2 = 1. The corresponding eigenvectors, already orthonormalized are found to be 1 1 1 (37) 1 1 1 3 1 , 1 v2 2 0 , -1 v3 6 -1 -1 0 -1 0 1 0 1 , -1 2 0 0 0 0 1 , -1 2 1 -1 1 0 0 1 -1 -1 4 4 0 -1 1 0 2 1 0 1 1 1 3 4 3 , , 1 2 1 -1 0 , 1 2 2 = 2. (38) 1 0 0 There is one vector left, that needs to come from the nullspace of the code correlation matrix. It is observed that the first vector (parallel to the weight vector) is orthogonal to each of the others. Also the vectors are not mutually orthogonal, and will need the Gram-Schmidt process. The codes, their code correlation matrices and the corresponding eigenstructures are given in this Appendix to provide a means to verify the findings of the work. REFERENCES TABLE II CODEWORDS OF THE (3,2,2) CODE Index codeword weight 1 0 1 1 2 2 1 0 1 2 3 1 1 0 2 v1 14 and 3 1 2 21 Fig. 6 Elements of the code correlation matrix for the (7,4,3) BCH Code and the code correlation matrix 2 1 1 R 1 2 1 . 1 1 2 1= The non-zero eigenvalues are found to be with the eigenvalectors [1] Shu Lin and Daniel J. Costello, Jr., Error Control Coding: Fundamentals and Applications, Prentice Hall: Englewood Cliffs, NJ, 1983. [2] A. M. Michelson and A. H. Levesque, "Error-Control Techniques for Digital Communication", a Wiley-Interscience Publication, 1985 [3] W.W. Peterson and E.J. Weldon, Jr., Error-Correcting Codes, 2nd edition, MIT Press: Cambridge, Mass., 1972. [4] F.J. MacWilliams and N.J.A. Sloane, The Theory of Error-Correcting Codes, North-Holland: New York, NY, 1977. [5] E. R. Berlekamp, R. E. Peile, and S. P. Pope, "The Application of Error Control to Communications," IEEE Communications Magazine., Vol. 25, pp. 44–57, 1987. [6] Wicker, Stephen B., Error Control Systems for Digital Communication and Storage, Upper Saddle River, N.J., Prentice Hall, 1995. [7] S. Haykin, Adaptive Filter Theory, 4th Edition, (Appendix E. Eigenanalysis), Prentice Hall 2001 [8] S. Haykin, Communication Systems, 4th Edition, John Wiley & Sons 2001 [9] G.H. Golub, C.F. Van Loan, Matrix Computations, 3rd ed. Johns Hopkins, 1996. [10] J.G. Proakis, Digital Communications, 3rd Ed, McGraw-Hill, 1995. -2 1 Table III gives codewords of the (6,3,3) code and their weight respective weights TABLE III CODEWORDS OF THE (6,3,3) BCH CODE Index codeword weight 1 0 0 1 0 1 1 3 2 0 1 0 1 1 0 3 3 0 1 1 1 0 1 4 4 1 0 0 1 0 1 3 5 1 0 1 1 1 0 4 6 1 1 0 0 1 1 4 7 1 1 1 0 0 0 3 The code correlation matrix of this code is found to be 3 1 2 1 2 2 1 1 3 2 1 2 2 1 2 2 4 2 2 2 2 1 1 2 3 2 2 1 2 2 2 2 4 2 2 2 2 2 2 2 4 2 1 1 2 1 2 2 3 Fig.7 Elements of the code correlation matrix for the (6,3,3) Code Vitalice K. Oduol received his pre-university education at Alliance High School in Kenya. In 1981 he was awarded a CIDA scholarship to study electrical engineering at McGill University, Canada, where he received the B.Eng. (Hons.) and M.Eng. degrees in 1985 and 1987, respectively, both in electrical engineering. In June 1992, he received the Ph.D. degree in electrical engineering at McGill University. He was a research associate and teaching assistant while a graduate student at McGill University. He joined MPB Technologies, Inc. in 1989, where he participated in a variety of projects, including meteor burst communication systems, satellite on-board processing, low probability of intercept radio, among others. In 1994 he joined INTELSAT where he initiated research and development work on the integration of terrestrial wireless and satellite systems. After working at COMSAT Labs. (1996-1997) on VSAT networks, and TranSwitch Corp.(1998-2002) on product definition and architecture, he returned to Kenya, where since 2003 he has been with Department of Electrical and Information Engineering, University of Nairobi. Dr. Oduol was a two-time recipient of the Douglas tutorial scholarship at McGill University. He is currently chairman, Department of Electrical and Information Engineering, University of Nairobi. His research interests include performance analysis, modeling and simulation of telecommunication systems, adaptive error control, feedback communication. Cemal Ardil is with the National Academy of Aviation, Baku, Azerbaijan 42