SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Downloaden Sie, um offline zu lesen
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 3, March (2014), pp. 54-63 © IAEME
54
PERFORMANCE OF COMBINED FOUNTAIN CODE WITH NETWORK
CODING OVER WIRELESS CHANNELS
Zainab A. Abduljabbar¹, Dr.Abdulkareem A. Kadhim²
1, 2
College of Information Eng. /Al-Nahrain University, Iraq
ABSTRACT
Recent advances in sparse graph codes have led to the proposal of fountain coding (FC). It
becomes as an error correction coding scheme of choice for many multicasting and broadcasting
systems. Network coding (NC) is used in modern wireless communication networks in order to gain
throughput and some other advantages. In this paper, NC is used in conjunction with FC in order to
obtain advantages of both techniques. A simple packet based network coding for butterfly network
topology with FC is modelled and simulated. The system is tested over different wireless fading
channel models and with different FC-NC arrangements. The results of the tests have shown that
combined FC and NC techniques improve throughput over the original system without FC by more
than (70%) at relatively low signal-to-noise power ratios for the considered models of wireless
channels. An optimum bit error rate performance (zero error) is achieved using the combined FC
with NC over the original system (i.e using NC without FC) under different channel conditions.
Keywords: Fountain Coding, Luby Transform, Network Coding, Throughput, Butterfly Network.
1. INTRODUCTION
1.1 Fountain Code Concepts
Practical networks transmission systems are characterized by packet erasure, which
traditionally dealt with by retransmission based techniques. However, the tremendous growth that
happened recently in data traffic, had led to great interest in erasure codes to overcome the usual
problems encountered with the retransmission of the erased packets. Fountain codes (FC) are
currently the dominant class of erasure codes [1].
Fountain coding principles are introduced by Byers et al. [2] in 1998. FC can be seen as a
code that simulates the action of water falling from a spring into a container [3, 4]. In FC, the
transmitter generates a potentially infinite amount of transmitted packets from the source node and
the receiver can recover the message from any set of these packets [5]. From this point of view, the
rate of a fountain codetends to zero, since the transmission is seen as time unlimited [6]. Thus the
fountain codes are rateless codes. Luby Transform (LT) codes, originally invented by Luby [2], are
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING &
TECHNOLOGY (IJCET)
ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 5, Issue 3, March (2014), pp. 54-63
© IAEME: www.iaeme.com/ijcet.asp
Journal Impact Factor (2014): 8.5328 (Calculated by GISI)
www.jifactor.com
IJCET
© I A E M E
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976
ISSN 0976 - 6375(Online), Volume 5, Issue
a class of fountain codes which are universally capacity
be decoded with message-passing algorithms such as
grows incrementally with time as
decoding attempt is made after the arrival of each new packet
1.2 Network Coding
NC is an approach used to improve transmission throughput of wireless networks in addition
to some other advantages. NC has been suggested to combat the lim
channels in classical networks [7]. With network coding, the router will combine the packets instead
of only store-and-forward the output messages by routing, thus maximizing t
performance [8]. In its simplest form, NC relies on intermediate nodes to combine (using a linear
coding scheme) the incoming packets from different source nodes and then to forward the linearly
encoded packets to all destination nodes in a single transmission. Network coding can
throughput, robustness, complexity, reliability and security [
improvement in resources such as energy efficiency, delay, wireless bandwidth and interference also
can be obtained [8, 9]. Each coding node serves
from different source nodes, in one encoded packet to be transmi
Fig.1 shows an example of simple network, where nodes A and B want to exchange their packets
a router. The classical network in Fig.
packets generated by source nodes A & B via the relay node (R) to th
On the other hand and with network coding defined by linear e
source nodes, 3 transmissions are sufficient as in Fig
Fig
1.3 Research Background
The present research is an attempt to combine fountain coding with network coding so that
the possible advantages from both techniques can be exploited.
block error rate (BLER) performance in cooperative communication, through combining fountain
code with network coding (NC). Based on this, the error
means of integrating fountain code with NC in cooperative communication. They showed by
simulation results that the proposed scheme can obtain lower BLER compared with detect and
forward scheme. In [14] the authors
networks. They proved that by applying NC to fountain
transmissions was reduced over erasure channels and hence the effective throughput was increased.
They demonstrated the role of analogue NC and optimal weight selection by applying and analyzing
it over wireless with Rayleigh fading and AWGN channels.
were proposed for transmitting a collection of packets through communication networks employing
linear NC which generalized FCs and preserved the properties such as ratelessness and low
encoding/decoding complexity. They verified theoretically for certain cases and dem
numerically for the general cases that BATS codes achieved rates very close to the capacity of linear
operator channels. The author in [16
that had the ability to diminish the complexity
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976
6375(Online), Volume 5, Issue 3, March (2014), pp. 54-63 © IAEME
55
des which are universally capacity-achieving for erasure channels.
passing algorithms such as Belief Propagation (BP) with decoding graph
a new packet is received at the destination node
decoding attempt is made after the arrival of each new packet [4].
NC is an approach used to improve transmission throughput of wireless networks in addition
to some other advantages. NC has been suggested to combat the limitations on networks devices and
With network coding, the router will combine the packets instead
forward the output messages by routing, thus maximizing the overall system
simplest form, NC relies on intermediate nodes to combine (using a linear
coding scheme) the incoming packets from different source nodes and then to forward the linearly
encoded packets to all destination nodes in a single transmission. Network coding can
ity, reliability and security [9, 10]. In wireless networks further
improvement in resources such as energy efficiency, delay, wireless bandwidth and interference also
Each coding node serves as a relay node that combines the incoming packets,
from different source nodes, in one encoded packet to be transmitted to all destination nodes [
1 shows an example of simple network, where nodes A and B want to exchange their packets
The classical network in Fig.1(a) needs 4 transmissions to perform complete receptions of
packets generated by source nodes A & B via the relay node (R) to their intended destination nodes.
On the other hand and with network coding defined by linear encoding of the incoming packets from
source nodes, 3 transmissions are sufficient as in Fig.1(b) [12].
Figure-1 two node network
The present research is an attempt to combine fountain coding with network coding so that
th techniques can be exploited. The authors in [13
block error rate (BLER) performance in cooperative communication, through combining fountain
code with network coding (NC). Based on this, the error-tolerant coding scheme was proposed by
means of integrating fountain code with NC in cooperative communication. They showed by
simulation results that the proposed scheme can obtain lower BLER compared with detect and
the authors proposed a transmission strategy of FCs over cooperative relay
networks. They proved that by applying NC to fountain-coded packets, the required number of
transmissions was reduced over erasure channels and hence the effective throughput was increased.
ed the role of analogue NC and optimal weight selection by applying and analyzing
it over wireless with Rayleigh fading and AWGN channels. In [15] batched sparse (BATS) codes
for transmitting a collection of packets through communication networks employing
linear NC which generalized FCs and preserved the properties such as ratelessness and low
encoding/decoding complexity. They verified theoretically for certain cases and dem
numerically for the general cases that BATS codes achieved rates very close to the capacity of linear
16] proposed a series of new encoding and decoding algorithms
that had the ability to diminish the complexity of Random NC and Rateless Codes, while they
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
achieving for erasure channels. LT code can
ropagation (BP) with decoding graph
received at the destination node, and a new
NC is an approach used to improve transmission throughput of wireless networks in addition
itations on networks devices and
With network coding, the router will combine the packets instead
he overall system
simplest form, NC relies on intermediate nodes to combine (using a linear
coding scheme) the incoming packets from different source nodes and then to forward the linearly
encoded packets to all destination nodes in a single transmission. Network coding can improve
In wireless networks further
improvement in resources such as energy efficiency, delay, wireless bandwidth and interference also
as a relay node that combines the incoming packets,
tted to all destination nodes [11].
1 shows an example of simple network, where nodes A and B want to exchange their packets via
1(a) needs 4 transmissions to perform complete receptions of
eir intended destination nodes.
ncoding of the incoming packets from
The present research is an attempt to combine fountain coding with network coding so that
13] investigated the
block error rate (BLER) performance in cooperative communication, through combining fountain
oding scheme was proposed by
means of integrating fountain code with NC in cooperative communication. They showed by
simulation results that the proposed scheme can obtain lower BLER compared with detect and
ransmission strategy of FCs over cooperative relay
coded packets, the required number of
transmissions was reduced over erasure channels and hence the effective throughput was increased.
ed the role of analogue NC and optimal weight selection by applying and analyzing
batched sparse (BATS) codes
for transmitting a collection of packets through communication networks employing
linear NC which generalized FCs and preserved the properties such as ratelessness and low
encoding/decoding complexity. They verified theoretically for certain cases and demonstrated
numerically for the general cases that BATS codes achieved rates very close to the capacity of linear
] proposed a series of new encoding and decoding algorithms
of Random NC and Rateless Codes, while they
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 3, March (2014), pp. 54-63 © IAEME
56
approached the optimality bound. After a theoretical analysis of the proposed techniques, they
analyzed in various applications for content distribution in peer-to-peer networks, distributed storage
systems and network management and monitoring.
In the present work, the research is concerned with the performance evaluation and analysis
of fountain coding with network coding over wireless networks. The main intension here is to
discover the likely advantages of fountain coding when combined with network coding.
The remaining parts of the paper are organized as follows: In the next section LT encoder and
decoder are described. The model of the network used is to be described in the third section. The
topology of network and other main assumptions are given in this section. The fourth section shows
the simulation tests results in the form of error probability and the increase in throughput versus
channel SNR. The last section deals with the main concluding remarks of the work.
2. LUBY TRANSFORM CODE
2.1 Encoder Operation
Each encoded packet ‫ݕ‬௡ is produced from the source packetsܵଵ; ܵଶ; ܵଷ;…; ܵ௞ as follows [17]:
- Randomly choosing a degree ݀௡ of the source packets from a degree distribution µ (d); the
appropriate choice of µ depends on the source file size K (where the degree distribution will be
described in paragraph c).
- Choose, uniformly at random, ݀௡ distinct input packets, and set ‫ݕ‬௡ equal to the bitwise sum,
modulo-2 addition of those ݀௡ packets. This sum can be done by successively modulo-2 addition
of the packets together.
This encoding operation defines a sparse-graph connecting encoded packets to source
packets. It is assumed that, both the encoder and the decoder have synchronized clocks (to choose
identical random degrees and set of connections). So that the degree of each received packet, and to
which source packets is connected in the graph are known at the decoder side.
2.2 Decoding Algorithm
The decoder's task is to recover S୩ from y୬=S୩Gୢ
, where Gୢ
is the degree distribution matrix
associated with the graph [16]. According to the erasure channel and the BP decoding algorithm
used, all messages are either completely uncertain messages or completely certain messages.
Uncertain messages assert that a message packet S୩ could have any value, with equal probability,
certain messages assert that S୩ has a particular value, with probability one. This simplicity of the
messages allows a simple description of the decoding process. The following are the main steps used
in decoding of LT code [18]:
- Find the node y୬ that is connected to only one S୩ packet. If there is no such y୬ node, this
decoding algorithm halts at this point, and fails to recover all the source packets.
- Set S୩ =y୬.
- Add S୩ to all y୬ that are connected to S୩:
y୬ = y୬ + S୩ … (1)
For all nʹ such that G୬୩
ୢ
= 1.
- Remove all edges connected to the S୩ packet.
- Repeat the above until all S୩ are determined.
The above LT decoding process is illustrated in Fig.2, where each packet is just one bit.
There are three source packets (shown by the upper circles) and four received packets (shown by the
lower rectangles), which have the values; [yଵ;yଶ;yଷ;yସ] = [1011] at the start of the algorithm [3, 17].
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 3, March (2014), pp. 54-63 © IAEME
57
At the first iteration, the only y୬ node that is connected to a sole source bit is the first yଵ node
(panel-a). Source bit Sଵ is then set accordingly as in panel-b. Now, the yଵ node is discarded followed
by adding the value of Sଵ (i.e. 1) to the all y୬ nodes to which it is connected as in panel-c.
Sଵ is then disconnected from the graph. At the start of the second iteration (panel-c), the
fourth y୬ node is connected to a sole source bitSଶ. Sଶ is then set to yସ (0, in panel-d), and add Sଶ to
the two y୬ it is connected to (panel-e). Finally, as panel-e shows, two y୬ nodes are both connected to
Sଷ, and they agree about the value of Sଷ, which is restored as in (panel-f).
2.3 Robust Soliton Distribution
The possibility of always finding new degree-one rows during the process is important to the
BP algorithm. The degree distribution of LT codes is designed to keep the expected number of
degree-one rows equal to 1 at each iteration. It is theoretically approved that, the best distribution is
the Ideal Soliton Distribution (ISD) defined by the following probability distribution [4]:
ρሺdሻ=ቊ
1/K for d ൌ 1
భ
ౚሺౚషభሻ
for d ൌ 2, 3, … , Kቋ
… (2)
It has been shown in [4] that, this distribution performs poorly in practice because of the large
variance for the probability of finding degree-one rows during the BP decoding process. To solve
this problem, Luby proposes Robust Soliton Distribution (RSD), originated by ISD with two
parameters added. RSD relies on using two parameters c and δ, in order to ensure that the expected
number of the degree-one received nodes during the BP decoding process is about [4]:
m = c logୣሺK/δሻ √K … (3)
Using these parameters, the positive function (߬ ሺ݀ሻ) is calculated:
߬ ሺ݀ሻ =
‫ە‬
ۖ
‫۔‬
ۖ
‫ۓ‬
೘
಼
భ
೏
݂‫݀ݎ݋‬ ൌ 1, 2, … , ቀ
௄
௠
ቁ െ 1
೘
಼
logሺ೘
ഃ
ሻ ݂‫݀ݎ݋‬ ൌ ሺ
௄
௠
ሻ
0 ݂‫݀ݎ݋‬ ൐ ሺ
௄
௠
ሻ ۙ
ۖ
ۘ
ۖ
ۗ
… (4)
Figure-2 decoding example for LT code with K=3 andN=4 [3, 17]
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 3, March (2014), pp. 54-63 © IAEME
58
Finally, the RSD (µሺdሻ) is given by [4]:
µሺdሻ=
ρሺୢሻାτ ሺୢሻ
୞
… (5)
where Z is given by:
Z ൌ ෍ ሺρሺdሻ ൅ τ ሺdሻሻ
ୢ
... (6)
3. SYSTEM MODEL
The network considered in the present work is a wireless network that is interconnected by
wireless links. Fig.3 illustrates the basic model used here. S1 and S2 are source nodes, while D1 and
D2 are destination nodes. The aim here is to deliver all packets generated from different source
nodes to its destination ones with least number of transmissions to increase the overall throughput of
the network. S1 and D2 (also S2 and D1) are out of each other's communication range, thus they
have a data to be exchanged through the relay node V. The network coding process is applied at
packet level (in the network layer) to improve throughput. The relay node creates queues for the
arrived packets from each different source. The queue is used here to make the packets ready to be
encoded with NC if such opportunity is met. Finally, the relay node sends the network coded packets
to the destination nodes in First in First out (FIFO) principle.
Figure-3 network model.
Each wireless link together with the required operation at each pair of connected nodes can
be represented by the transmission model of Fig.4. This represents a general case for all nodes shown
in Fig.3. The source output is either FC-NC coded packets if the source node is a relay node with
network coding opportunity, or else FC coded packets without NC (network coding block is not
used) that transmit directly from source nodes (S1 and S2) to their corresponding destination nodes
(D1 and D2). Also, there is a possibility that source node is a relay node without network coding
opportunity. This latter case occurs when there are no packets in the queue of one of the sources at
the relay node. In either case, when coding is involved at the relay node, the jth coded packet at the
relay node r୨ is given by:
‫ݎ‬௝ ൌ ܽ௞ ْ ܾ௞ … (7)
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 3, March (2014), pp. 54-63 © IAEME
59
whereܽ௞and ܾ௞are the generated packets at source nodes S1and S2, respectively, and
ْdenote mod-2 addition.Whether NC is used or not, the contents of the transmitted packets are
encoded with FC code (as described in section 2.1) and dealt with as bit stream at the physical layer.
The bit stream is then modulated using Binary Phase Shift Keying (BPSK) modulation.
Figure-4 the system model
LT code which is a class of FC is used in this paper. Therefore at the receiving nodes
(whether NC is used or not) the received packets are decoded using LT decoder (as in section 2.2).
Following the reconstruction of the received packets at the receiving node in the network considered
here, it is either passed to the higher layer, if the packets are network uncoded, or else decoded if the
intended destination node has sufficient information to do so. At each destination node, the received
network coded packet from the relay node is used with the aid of the packet received by direct
transmission (network uncoded packets) from its intended source. This means that destination node
D1, for example, which already received the packet, can decode the packet as shown below:
a୩ ْ r୩ ൌ a୩ ْ a୩ ْ b୩ ൌ b୩ … (8)
Similarly, the packet is decoded at the destination node D2. For more details about the
complete algorithm steps for NC and LT code of the intended network can be found in [19].
4. SIMULATION RESULTS & ASSESSMENT
Simulation tests were performed to evaluate the performance of systems considered here with
and without network coding. The performance measure covers both the evaluation of Bit Error Rate
(BER) and the equivalent normalized throughput. These are determined for different SNR's. The
SNR is taken here as the ratio of the average energy per information bit to AWGN noise power
spectral density (Eb/No). The BER rate is taken as the ratio average number of errors in receiving the
data at all destination nodes to the total number of data bits transmitted by the source nodes
[20].Three different channels are considered here, the ideal AWGN channel, flat fading channel and
multipath fading channel with three paths. The characteristics of the latter are given by; delays for
the paths are 0, 0.4, and 0.9 µs, while their gains are 0, -5, and -10 dB, respectively. The multipath
fading channel is known in the literature as SUI-3 and widely used to model wireless networks.
Details of the actual channel modelling and complete system simulation can be found elsewhere
[20].Four different systems are considered in this work, these are: System#1 neither FC nor NC is
used, System#2 without FC but NC is used, System#3 FC is used but without NC, System#4 both FC
& NC are used.
The performances of the systems are presented in Fig.5& 6. The BER performance is only
shown for the cases were FC is not used (i.e only for System#1 & System#2), since the error will be
vanished with fountain coding. This is based on the assumption that FC decoders (for System#3 &
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 3, March (2014), pp. 54-63 © IAEME
60
System#4) at the destination nodes and the relay node have enough encoded packets. Thus it will
produce zero errors for the range of SNR considered in the tests. Therefore Fig.5 shows the BER
performances for the systems without FCs. Fig.5 (a) shows the BER performance for the systems
without FC code over AWGN channel. This figure shows that both systems (with and without NC)
have the same BER performance at high SNR, with slight difference in favour of NC based system
(System#2) at low SNR. This is due to the fact that AWGN channel dose not introduce any
distortion.
It is clear from Fig.5 (b) and (c) that for both fading channels the improvement of NC at high
SNR is relatively large. With fading, more SNR is required to achieve the same BER rate as
compared with the case of AWGN channel as expected. Summarizing the BER performance for the
channels tested in Fig.5 one can say that the use of FC improves the error performance (no error) on
the expense of the overhead in transmitting packets. There is an improvement in systems that use NC
over fading channels whether FC is used or not.
a) AWGN channel
b) Single path fading channel
c) SUI-3 channel
Figure-5 BER performancesfor system#1 & system#2
Combining FC with NC should improve the throughput in addition to BER performance.
Thus Fig.6 provides the performances of different systems, in the form of the resultant throughput,
against SNR. In most literature the general definition of the throughput is given by the average rate
of data that transmitted successfully from a given source node to its intended destination in a
specified amount of time. Therefore, the throughput (Th) measure considered here is calculated as
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 3, March (2014), pp. 54-63 © IAEME
61
the percentage of all correctly received packets from source nodes (or relay node) to their intended
destination nodes in a specified amount of time multiplied by the nominal bit rate. Thus;
Th =
ே௢.௢௙௖௢௥௥௘௖௧୪୷ ௥௘௖௘௜௩௘ௗ௣௔௖௞௘௧௦
ே௢.௢௙௧௥௔௡௦௠௜௧௧௘ௗ௣௔௖௞௘௧௦
ൈ ܾ݅‫݁ݐܽݎݐ‬ … (9)
The bit rate considered in the work is 10 Mbps. The three channel models are also considered
in the throughput tests. As expected the measured throughput is directly proportional to SNR in
general. Further, the improvement in throughput also depends on the topology of the network
considered [11]. Fig-6 shows that there is always an increase in throughput for the network coded
systems over that achieved with uncoded counterparts. Further, the throughputs for FC coded
systems (system#3& System#4) at relatively low SNRs are greater than those systems without FC
(system#1& System#2).This is due to the fact that FC code always provides the least BER, thus
allow more correct packets to be delivered to the destination nodes whether NC is used or not. The
advantage of NC is vital, whether the system uses FC code or not, where the throughput performance
is improved over all ranges of SNRs. The throughput in either case will reach a steady state value at
very high SNR. This is determined by the network topology and the type of coding used. The
percentage increase in throughput could be used to compare different systems tested here. For the
system using both FC& NC (System#4)this percentage is about 35% as compared to NC without
FCsystem (System#2) over AWGN channel at very low SNR ( Eb/No = 0 dB).
a) AWGN channel b) Single path fading channel
c) SUI-3 channel
Figure-6 Throughput performance of different systems
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 3, March (2014), pp. 54-63 © IAEME
62
The corresponding percentages over single path fading channel and SUI-3 channel are at least
70%. While the percentage increase in throughput of the combined FC and NC (System#4)
compared to that using FC without NC (System#3) is more than 33%, 34%, and 31% over AWGN,
single path fading, and SUI-3 channels, respectively. This is valid for SNR greater than 10 dB as
shown in the Fig.6. Apart from the better BER performance provided by FC code, it is clear that
combining FC with NC will provide improvement in throughput at relatively low SNRs.
5. CONCLUSION
A combination of fountain coding (FC) and network coding (NC) arrangement was studied
here aiming to improve system performance. The simulation results have shown that the packet loss
in NC can be reduced further with the use of FC. Further improvement in throughput can be
achieved also by combining FC with NC especially at low SNRs. The percentage improvements in
throughput become clear when models of fading channels are used. As much as 70% increase in
throughput can be obtained at relatively low SNRs when FC-NC system is used over the considered
models of wireless channels. Finally, the results reveals that FC-NC system reserves the advantages
of both Fountain Coding (low BER) and Network Coding (throughput improvement) at all ranges of
SNRs over wireless fading channels.
REFERENCES
[1] J. Qureshi, C. Foh, & J. Cai, "Primer and Recent Developments on Fountain Codes", Cornell
University Library, arXiv: 1305.0918v1 [cs.IT], May 2013.
[2] J. Byers, M. Luby, M. Mitzenmacher, & A. Rege, “A Digital Fountain Approach to Reliable
Distribution of Bulk Data,” SIGCOMM, pp. 56–67, September 1998.
[3] D. MacKay, " Fountain Codes", IEE Proc. Com., UK, Vol. 152, No. 6, pp. 1062-1068,
December 2005.
[4] M. Luby, "LT Codes", Proc. 43rd, IEEE, Foundations of Computer Science, pp. 271–282,
16–19 November 2002.
[5] J. Maria, J. Cordeiro, & B. Shishkov, "Software and Data Technologies", 6th International
Conference, ICSOFT 2001, Seville, Spain, July 18-21 2011.
[6] J. Moreira & P. Farrell, "Essentials of Error-Control Coding", J. Wiley & S. Ltd, England,
2006.
[7] G. Kramer, “Lecture on Network Coding and Information Theory,” Alcatel Lucent, Sep.
2007.
[8] R. Ahlswedeet al., "Network information flow," IEEE Transactions on Information Theory,
Vol. 46, No. 4, pp. 1204-1216, July 2000.
[9] S. Katti, “Network Coded Wireless Architecture,” Ph.D. Thesis, Department of Electrical
Engineering and Computer Science, Massachusetts Institute of Technology, Aug. 2008.
[10] C. Fragouli& E. Soljanin, “Network Coding Fundamentals”, Foundations and Trends in
Networking, Boston, Vol. 2, Issue 1, 2007.
[11] T. Ho& D. Lun, “Network Coding: An Introduction,” Cambridge University Press, New
York, 2008.
[12] I. Qazi& P. Gandhi, “Performance Evaluation of Wireless Network Coding under Practical
Settings”, Tech. Report TR-07-150, University of Pittsburgh, 2007.
[13] M. Yang, J. An, X. Li & L. Yuan, "Combined Fountain Code with Network Coding in
Cooperative Communication", IEEE Networks Security Wireless Communications and
Trusted Computing (NSWCTC), Vol. 2, pp. 24-27, China, April 2010.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 3, March (2014), pp. 54-63 © IAEME
63
[14] E. Kurniawan, S. Sun, K. Yen, & K. Chong, "Network Coded Transmission of Fountain
Codes over Cooperative Relay Networks", Institute for Infocomm Research, Connexis,
Singapore, May 2010.
[15] S. Yang & R. Yeung, "Coding for a Network Coded Fountain", IEEE International
Symposium on Information Theory Proceedings, pp. 2647-2651, The Chinese University of
Hong Kong, Hong Kong SAR, China, 2011.
[16] V. Bioglio, "Data Dissemination in Distributed Systems Using Rateless Codes", Ph.D.
Dissertation, Univerisita' DegliStudi di Torino, Dipartimento di Informatica, Torino, Italy,
2011.
[17] D. MacKay, "Information Theory, Inference, and Learning Algorithms," 1st Ed., Cambridge
University Press, Cambridge, UK, 2005.
[18] I. Reed and G. Solomon, "Polynomial Codes Over Certain Finite Fields," Journal of the
Society of Industrial and Applied Mathematics, Vol. 8, No. 2, pp. 300-304, June 1960.
[19] Z. Abduljabbar, "Performance Evaluation of Fountain Codes Based Network Coding," M.Sc.
Thesis, Al-Nahrain University, Iraq, February, 2014.
[20] A. Mahmood, "Combined Multi Input Multi Output and Network Coding for Wireless
Networks", M.Sc. Thesis, Al-Nahrain University, Iraq, June 2012.
[21] B. Sklar, “Digital Communications: Fundamentals and Applications”, 2nd Ed., Prentice Hall,
2001.
[22] Kalpana Chikatwar, Ramesh D and Satish Kannale, “Design of ARQ And Hybrid ARQ
Protocols For Wireless Channels Using Bch Codes” International Journal of Advanced
Research in Engineering & Technology (IJARET), Volume 4, Issue 3, 2013, pp. 49 - 54,
ISSN Print: 0976-6480, ISSN Online: 0976-6499.
[23] S.R.Shankar and Dr.G.Kalivarathan, “Feasibility Studies of Wireless Sensor Network and It’s
Implications”, International Journal of Electrical Engineering & Technology (IJEET),
Volume 4, Issue 2, 2012, pp. 105 - 111, ISSN Print: 0976-6545, ISSN Online: 0976-6553.
[24] T.Regu and Dr.G.Kalivarathan, “Prediction of a Reliable Code for Wireless Communication
Systems”, International Journal of Electrical Engineering & Technology (IJEET), Volume 4,
Issue 1, 2013, pp. 19 - 26, ISSN Print: 0976-6545, ISSN Online: 0976-6553.

Weitere ähnliche Inhalte

Was ist angesagt?

Iterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmissionIterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmissionijasuc
 
NS2 Projects 2014 in HCL velachery
NS2 Projects 2014 in HCL velacheryNS2 Projects 2014 in HCL velachery
NS2 Projects 2014 in HCL velacherySenthilvel S
 
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor NetworksThe Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networksgraphhoc
 
Physical layer network coding
Physical layer network codingPhysical layer network coding
Physical layer network codingNguyen Tan
 
SECURED TEXT MESSAGE TRANSMISSION IN PRE -CHANNEL EQUALIZATION BASED MIMO- OF...
SECURED TEXT MESSAGE TRANSMISSION IN PRE -CHANNEL EQUALIZATION BASED MIMO- OF...SECURED TEXT MESSAGE TRANSMISSION IN PRE -CHANNEL EQUALIZATION BASED MIMO- OF...
SECURED TEXT MESSAGE TRANSMISSION IN PRE -CHANNEL EQUALIZATION BASED MIMO- OF...IJNSA Journal
 
A low complex modified golden
A low complex modified goldenA low complex modified golden
A low complex modified goldenIJCNCJournal
 
Comparative evaluation of bit error rate for different ofdm subcarriers in ra...
Comparative evaluation of bit error rate for different ofdm subcarriers in ra...Comparative evaluation of bit error rate for different ofdm subcarriers in ra...
Comparative evaluation of bit error rate for different ofdm subcarriers in ra...ijmnct
 
Network coding
Network codingNetwork coding
Network codingLishi He
 
5. 7771 8116-1-pb
5. 7771 8116-1-pb5. 7771 8116-1-pb
5. 7771 8116-1-pbIAESIJEECS
 
Design and Implementation of an Embedded System for Software Defined Radio
Design and Implementation of an Embedded System for Software Defined RadioDesign and Implementation of an Embedded System for Software Defined Radio
Design and Implementation of an Embedded System for Software Defined RadioIJECEIAES
 
Data detection with a progressive parallel ici canceller in mimo ofdm
Data detection with a progressive parallel ici canceller in mimo ofdmData detection with a progressive parallel ici canceller in mimo ofdm
Data detection with a progressive parallel ici canceller in mimo ofdmeSAT Publishing House
 

Was ist angesagt? (18)

Iterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmissionIterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmission
 
NS2 Projects 2014 in HCL velachery
NS2 Projects 2014 in HCL velacheryNS2 Projects 2014 in HCL velachery
NS2 Projects 2014 in HCL velachery
 
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor NetworksThe Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
 
Physical layer network coding
Physical layer network codingPhysical layer network coding
Physical layer network coding
 
SECURED TEXT MESSAGE TRANSMISSION IN PRE -CHANNEL EQUALIZATION BASED MIMO- OF...
SECURED TEXT MESSAGE TRANSMISSION IN PRE -CHANNEL EQUALIZATION BASED MIMO- OF...SECURED TEXT MESSAGE TRANSMISSION IN PRE -CHANNEL EQUALIZATION BASED MIMO- OF...
SECURED TEXT MESSAGE TRANSMISSION IN PRE -CHANNEL EQUALIZATION BASED MIMO- OF...
 
A low complex modified golden
A low complex modified goldenA low complex modified golden
A low complex modified golden
 
Ijairp14 radhe
Ijairp14 radheIjairp14 radhe
Ijairp14 radhe
 
Comparative evaluation of bit error rate for different ofdm subcarriers in ra...
Comparative evaluation of bit error rate for different ofdm subcarriers in ra...Comparative evaluation of bit error rate for different ofdm subcarriers in ra...
Comparative evaluation of bit error rate for different ofdm subcarriers in ra...
 
Co35503507
Co35503507Co35503507
Co35503507
 
Network coding
Network codingNetwork coding
Network coding
 
5. 7771 8116-1-pb
5. 7771 8116-1-pb5. 7771 8116-1-pb
5. 7771 8116-1-pb
 
E213152
E213152E213152
E213152
 
Design and Implementation of an Embedded System for Software Defined Radio
Design and Implementation of an Embedded System for Software Defined RadioDesign and Implementation of an Embedded System for Software Defined Radio
Design and Implementation of an Embedded System for Software Defined Radio
 
paper1
paper1paper1
paper1
 
G010323739
G010323739G010323739
G010323739
 
Data detection with a progressive parallel ici canceller in mimo ofdm
Data detection with a progressive parallel ici canceller in mimo ofdmData detection with a progressive parallel ici canceller in mimo ofdm
Data detection with a progressive parallel ici canceller in mimo ofdm
 
K017426872
K017426872K017426872
K017426872
 
N017428692
N017428692N017428692
N017428692
 

Andere mochten auch

Separation of heart murmur aortic regurgitation sound from sound mixture usin...
Separation of heart murmur aortic regurgitation sound from sound mixture usin...Separation of heart murmur aortic regurgitation sound from sound mixture usin...
Separation of heart murmur aortic regurgitation sound from sound mixture usin...IAEME Publication
 
Design fabrication and analysis of wideband high gain dielectric resonator an...
Design fabrication and analysis of wideband high gain dielectric resonator an...Design fabrication and analysis of wideband high gain dielectric resonator an...
Design fabrication and analysis of wideband high gain dielectric resonator an...IAEME Publication
 
Effect of silicon oxide sio2 reinforced particles on ageing behavior of al 20...
Effect of silicon oxide sio2 reinforced particles on ageing behavior of al 20...Effect of silicon oxide sio2 reinforced particles on ageing behavior of al 20...
Effect of silicon oxide sio2 reinforced particles on ageing behavior of al 20...IAEME Publication
 
Stf nega liminar a marcos seguro de turvo
Stf nega liminar a marcos seguro de turvoStf nega liminar a marcos seguro de turvo
Stf nega liminar a marcos seguro de turvo27081970
 
Artesanías del Caribe
Artesanías del CaribeArtesanías del Caribe
Artesanías del CaribeAna Cecilia
 
Gerencia de projetos
Gerencia de projetosGerencia de projetos
Gerencia de projetosEdson Armando
 
Autoridade moral religiosa e comportamento sexual
Autoridade moral religiosa e comportamento sexualAutoridade moral religiosa e comportamento sexual
Autoridade moral religiosa e comportamento sexualZedzedzed123
 
Transparência de missões jogo 1
Transparência de missões   jogo 1Transparência de missões   jogo 1
Transparência de missões jogo 1Paulo César
 
0707079a decreto de desarrollo de la ly de igualdad
0707079a decreto de desarrollo de la ly de igualdad0707079a decreto de desarrollo de la ly de igualdad
0707079a decreto de desarrollo de la ly de igualdadkidetza1
 

Andere mochten auch (20)

40220140504009
4022014050400940220140504009
40220140504009
 
40120140507003
4012014050700340120140507003
40120140507003
 
Separation of heart murmur aortic regurgitation sound from sound mixture usin...
Separation of heart murmur aortic regurgitation sound from sound mixture usin...Separation of heart murmur aortic regurgitation sound from sound mixture usin...
Separation of heart murmur aortic regurgitation sound from sound mixture usin...
 
Design fabrication and analysis of wideband high gain dielectric resonator an...
Design fabrication and analysis of wideband high gain dielectric resonator an...Design fabrication and analysis of wideband high gain dielectric resonator an...
Design fabrication and analysis of wideband high gain dielectric resonator an...
 
40120140507007
4012014050700740120140507007
40120140507007
 
Effect of silicon oxide sio2 reinforced particles on ageing behavior of al 20...
Effect of silicon oxide sio2 reinforced particles on ageing behavior of al 20...Effect of silicon oxide sio2 reinforced particles on ageing behavior of al 20...
Effect of silicon oxide sio2 reinforced particles on ageing behavior of al 20...
 
50120140507014
5012014050701450120140507014
50120140507014
 
10120140507006
1012014050700610120140507006
10120140507006
 
40120140506003
4012014050600340120140506003
40120140506003
 
10120140506001
1012014050600110120140506001
10120140506001
 
50120140504023 2-3
50120140504023 2-350120140504023 2-3
50120140504023 2-3
 
40120140504005 2
40120140504005 240120140504005 2
40120140504005 2
 
40120140506002
4012014050600240120140506002
40120140506002
 
Uso de las tic´s en la educación
Uso de las tic´s en la educaciónUso de las tic´s en la educación
Uso de las tic´s en la educación
 
Stf nega liminar a marcos seguro de turvo
Stf nega liminar a marcos seguro de turvoStf nega liminar a marcos seguro de turvo
Stf nega liminar a marcos seguro de turvo
 
Artesanías del Caribe
Artesanías del CaribeArtesanías del Caribe
Artesanías del Caribe
 
Gerencia de projetos
Gerencia de projetosGerencia de projetos
Gerencia de projetos
 
Autoridade moral religiosa e comportamento sexual
Autoridade moral religiosa e comportamento sexualAutoridade moral religiosa e comportamento sexual
Autoridade moral religiosa e comportamento sexual
 
Transparência de missões jogo 1
Transparência de missões   jogo 1Transparência de missões   jogo 1
Transparência de missões jogo 1
 
0707079a decreto de desarrollo de la ly de igualdad
0707079a decreto de desarrollo de la ly de igualdad0707079a decreto de desarrollo de la ly de igualdad
0707079a decreto de desarrollo de la ly de igualdad
 

Ähnlich wie 50120140503006 2-3

Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...IJERA Editor
 
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESCODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESijmnct
 
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESCODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESijmnct_journal
 
The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...IJCNCJournal
 
UAN (Underwater Acoustic Network)
UAN (Underwater Acoustic Network)UAN (Underwater Acoustic Network)
UAN (Underwater Acoustic Network)Prof Ansari
 
Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377Editor IJARCET
 
An effective transmit packet coding with trust-based relay nodes in VANETs
An effective transmit packet coding with trust-based relay nodes in VANETsAn effective transmit packet coding with trust-based relay nodes in VANETs
An effective transmit packet coding with trust-based relay nodes in VANETsjournalBEEI
 
Estimation of bit error rate in 2×2 and 4×4 multi-input multioutput-orthogon...
Estimation of bit error rate in 2×2 and 4×4 multi-input multioutput-orthogon...Estimation of bit error rate in 2×2 and 4×4 multi-input multioutput-orthogon...
Estimation of bit error rate in 2×2 and 4×4 multi-input multioutput-orthogon...IJECEIAES
 
Lightweight hamming product code based multiple bit error correction coding s...
Lightweight hamming product code based multiple bit error correction coding s...Lightweight hamming product code based multiple bit error correction coding s...
Lightweight hamming product code based multiple bit error correction coding s...journalBEEI
 
Capsulization of Existing Space Time Techniques
Capsulization of Existing Space Time TechniquesCapsulization of Existing Space Time Techniques
Capsulization of Existing Space Time TechniquesIJEEE
 
PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...
PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...
PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...ijistjournal
 
PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...
PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...
PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...ijistjournal
 
Nocs performance improvement using parallel transmission through wireless links
Nocs performance improvement using parallel transmission through wireless linksNocs performance improvement using parallel transmission through wireless links
Nocs performance improvement using parallel transmission through wireless linksijcsa
 
Distributed differential beamforming and power allocation for cooperative com...
Distributed differential beamforming and power allocation for cooperative com...Distributed differential beamforming and power allocation for cooperative com...
Distributed differential beamforming and power allocation for cooperative com...IJECEIAES
 
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...ijngnjournal
 
A New Bit Split and Interleaved Channel Coding for MIMO Decoder
A New Bit Split and Interleaved Channel Coding for MIMO DecoderA New Bit Split and Interleaved Channel Coding for MIMO Decoder
A New Bit Split and Interleaved Channel Coding for MIMO DecoderIJARBEST JOURNAL
 
A performance enhancement of physical layer at Wi-MAX system with RLDPC code
A performance enhancement of physical layer at Wi-MAX  system with RLDPC codeA performance enhancement of physical layer at Wi-MAX  system with RLDPC code
A performance enhancement of physical layer at Wi-MAX system with RLDPC codenooriasukmaningtyas
 
BLOCK CODES,STBCs & STTCs.pptx
BLOCK CODES,STBCs & STTCs.pptxBLOCK CODES,STBCs & STTCs.pptx
BLOCK CODES,STBCs & STTCs.pptxFAIZAN SHAFI
 

Ähnlich wie 50120140503006 2-3 (20)

Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
 
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESCODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
 
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESCODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
 
The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...
 
UAN (Underwater Acoustic Network)
UAN (Underwater Acoustic Network)UAN (Underwater Acoustic Network)
UAN (Underwater Acoustic Network)
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377
 
An effective transmit packet coding with trust-based relay nodes in VANETs
An effective transmit packet coding with trust-based relay nodes in VANETsAn effective transmit packet coding with trust-based relay nodes in VANETs
An effective transmit packet coding with trust-based relay nodes in VANETs
 
Estimation of bit error rate in 2×2 and 4×4 multi-input multioutput-orthogon...
Estimation of bit error rate in 2×2 and 4×4 multi-input multioutput-orthogon...Estimation of bit error rate in 2×2 and 4×4 multi-input multioutput-orthogon...
Estimation of bit error rate in 2×2 and 4×4 multi-input multioutput-orthogon...
 
Lightweight hamming product code based multiple bit error correction coding s...
Lightweight hamming product code based multiple bit error correction coding s...Lightweight hamming product code based multiple bit error correction coding s...
Lightweight hamming product code based multiple bit error correction coding s...
 
Capsulization of Existing Space Time Techniques
Capsulization of Existing Space Time TechniquesCapsulization of Existing Space Time Techniques
Capsulization of Existing Space Time Techniques
 
PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...
PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...
PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...
 
PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...
PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...
PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...
 
Nocs performance improvement using parallel transmission through wireless links
Nocs performance improvement using parallel transmission through wireless linksNocs performance improvement using parallel transmission through wireless links
Nocs performance improvement using parallel transmission through wireless links
 
Distributed differential beamforming and power allocation for cooperative com...
Distributed differential beamforming and power allocation for cooperative com...Distributed differential beamforming and power allocation for cooperative com...
Distributed differential beamforming and power allocation for cooperative com...
 
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...
 
Ff34970973
Ff34970973Ff34970973
Ff34970973
 
A New Bit Split and Interleaved Channel Coding for MIMO Decoder
A New Bit Split and Interleaved Channel Coding for MIMO DecoderA New Bit Split and Interleaved Channel Coding for MIMO Decoder
A New Bit Split and Interleaved Channel Coding for MIMO Decoder
 
A performance enhancement of physical layer at Wi-MAX system with RLDPC code
A performance enhancement of physical layer at Wi-MAX  system with RLDPC codeA performance enhancement of physical layer at Wi-MAX  system with RLDPC code
A performance enhancement of physical layer at Wi-MAX system with RLDPC code
 
BLOCK CODES,STBCs & STTCs.pptx
BLOCK CODES,STBCs & STTCs.pptxBLOCK CODES,STBCs & STTCs.pptx
BLOCK CODES,STBCs & STTCs.pptx
 

Mehr von IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

Mehr von IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Kürzlich hochgeladen

Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdfJamie (Taka) Wang
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataCloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataSafe Software
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?SANGHEE SHIN
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
RAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIRAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIUdaiappa Ramachandran
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
PicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer ServicePicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer ServiceRenan Moreira de Oliveira
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
Things you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceThings you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceMartin Humpolec
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 

Kürzlich hochgeladen (20)

Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataCloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
RAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIRAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AI
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
PicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer ServicePicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer Service
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
Things you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceThings you didn't know you can use in your Salesforce
Things you didn't know you can use in your Salesforce
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 

50120140503006 2-3

  • 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 3, March (2014), pp. 54-63 © IAEME 54 PERFORMANCE OF COMBINED FOUNTAIN CODE WITH NETWORK CODING OVER WIRELESS CHANNELS Zainab A. Abduljabbar¹, Dr.Abdulkareem A. Kadhim² 1, 2 College of Information Eng. /Al-Nahrain University, Iraq ABSTRACT Recent advances in sparse graph codes have led to the proposal of fountain coding (FC). It becomes as an error correction coding scheme of choice for many multicasting and broadcasting systems. Network coding (NC) is used in modern wireless communication networks in order to gain throughput and some other advantages. In this paper, NC is used in conjunction with FC in order to obtain advantages of both techniques. A simple packet based network coding for butterfly network topology with FC is modelled and simulated. The system is tested over different wireless fading channel models and with different FC-NC arrangements. The results of the tests have shown that combined FC and NC techniques improve throughput over the original system without FC by more than (70%) at relatively low signal-to-noise power ratios for the considered models of wireless channels. An optimum bit error rate performance (zero error) is achieved using the combined FC with NC over the original system (i.e using NC without FC) under different channel conditions. Keywords: Fountain Coding, Luby Transform, Network Coding, Throughput, Butterfly Network. 1. INTRODUCTION 1.1 Fountain Code Concepts Practical networks transmission systems are characterized by packet erasure, which traditionally dealt with by retransmission based techniques. However, the tremendous growth that happened recently in data traffic, had led to great interest in erasure codes to overcome the usual problems encountered with the retransmission of the erased packets. Fountain codes (FC) are currently the dominant class of erasure codes [1]. Fountain coding principles are introduced by Byers et al. [2] in 1998. FC can be seen as a code that simulates the action of water falling from a spring into a container [3, 4]. In FC, the transmitter generates a potentially infinite amount of transmitted packets from the source node and the receiver can recover the message from any set of these packets [5]. From this point of view, the rate of a fountain codetends to zero, since the transmission is seen as time unlimited [6]. Thus the fountain codes are rateless codes. Luby Transform (LT) codes, originally invented by Luby [2], are INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 5, Issue 3, March (2014), pp. 54-63 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2014): 8.5328 (Calculated by GISI) www.jifactor.com IJCET © I A E M E
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 ISSN 0976 - 6375(Online), Volume 5, Issue a class of fountain codes which are universally capacity be decoded with message-passing algorithms such as grows incrementally with time as decoding attempt is made after the arrival of each new packet 1.2 Network Coding NC is an approach used to improve transmission throughput of wireless networks in addition to some other advantages. NC has been suggested to combat the lim channels in classical networks [7]. With network coding, the router will combine the packets instead of only store-and-forward the output messages by routing, thus maximizing t performance [8]. In its simplest form, NC relies on intermediate nodes to combine (using a linear coding scheme) the incoming packets from different source nodes and then to forward the linearly encoded packets to all destination nodes in a single transmission. Network coding can throughput, robustness, complexity, reliability and security [ improvement in resources such as energy efficiency, delay, wireless bandwidth and interference also can be obtained [8, 9]. Each coding node serves from different source nodes, in one encoded packet to be transmi Fig.1 shows an example of simple network, where nodes A and B want to exchange their packets a router. The classical network in Fig. packets generated by source nodes A & B via the relay node (R) to th On the other hand and with network coding defined by linear e source nodes, 3 transmissions are sufficient as in Fig Fig 1.3 Research Background The present research is an attempt to combine fountain coding with network coding so that the possible advantages from both techniques can be exploited. block error rate (BLER) performance in cooperative communication, through combining fountain code with network coding (NC). Based on this, the error means of integrating fountain code with NC in cooperative communication. They showed by simulation results that the proposed scheme can obtain lower BLER compared with detect and forward scheme. In [14] the authors networks. They proved that by applying NC to fountain transmissions was reduced over erasure channels and hence the effective throughput was increased. They demonstrated the role of analogue NC and optimal weight selection by applying and analyzing it over wireless with Rayleigh fading and AWGN channels. were proposed for transmitting a collection of packets through communication networks employing linear NC which generalized FCs and preserved the properties such as ratelessness and low encoding/decoding complexity. They verified theoretically for certain cases and dem numerically for the general cases that BATS codes achieved rates very close to the capacity of linear operator channels. The author in [16 that had the ability to diminish the complexity International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 6375(Online), Volume 5, Issue 3, March (2014), pp. 54-63 © IAEME 55 des which are universally capacity-achieving for erasure channels. passing algorithms such as Belief Propagation (BP) with decoding graph a new packet is received at the destination node decoding attempt is made after the arrival of each new packet [4]. NC is an approach used to improve transmission throughput of wireless networks in addition to some other advantages. NC has been suggested to combat the limitations on networks devices and With network coding, the router will combine the packets instead forward the output messages by routing, thus maximizing the overall system simplest form, NC relies on intermediate nodes to combine (using a linear coding scheme) the incoming packets from different source nodes and then to forward the linearly encoded packets to all destination nodes in a single transmission. Network coding can ity, reliability and security [9, 10]. In wireless networks further improvement in resources such as energy efficiency, delay, wireless bandwidth and interference also Each coding node serves as a relay node that combines the incoming packets, from different source nodes, in one encoded packet to be transmitted to all destination nodes [ 1 shows an example of simple network, where nodes A and B want to exchange their packets The classical network in Fig.1(a) needs 4 transmissions to perform complete receptions of packets generated by source nodes A & B via the relay node (R) to their intended destination nodes. On the other hand and with network coding defined by linear encoding of the incoming packets from source nodes, 3 transmissions are sufficient as in Fig.1(b) [12]. Figure-1 two node network The present research is an attempt to combine fountain coding with network coding so that th techniques can be exploited. The authors in [13 block error rate (BLER) performance in cooperative communication, through combining fountain code with network coding (NC). Based on this, the error-tolerant coding scheme was proposed by means of integrating fountain code with NC in cooperative communication. They showed by simulation results that the proposed scheme can obtain lower BLER compared with detect and the authors proposed a transmission strategy of FCs over cooperative relay networks. They proved that by applying NC to fountain-coded packets, the required number of transmissions was reduced over erasure channels and hence the effective throughput was increased. ed the role of analogue NC and optimal weight selection by applying and analyzing it over wireless with Rayleigh fading and AWGN channels. In [15] batched sparse (BATS) codes for transmitting a collection of packets through communication networks employing linear NC which generalized FCs and preserved the properties such as ratelessness and low encoding/decoding complexity. They verified theoretically for certain cases and dem numerically for the general cases that BATS codes achieved rates very close to the capacity of linear 16] proposed a series of new encoding and decoding algorithms that had the ability to diminish the complexity of Random NC and Rateless Codes, while they International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), achieving for erasure channels. LT code can ropagation (BP) with decoding graph received at the destination node, and a new NC is an approach used to improve transmission throughput of wireless networks in addition itations on networks devices and With network coding, the router will combine the packets instead he overall system simplest form, NC relies on intermediate nodes to combine (using a linear coding scheme) the incoming packets from different source nodes and then to forward the linearly encoded packets to all destination nodes in a single transmission. Network coding can improve In wireless networks further improvement in resources such as energy efficiency, delay, wireless bandwidth and interference also as a relay node that combines the incoming packets, tted to all destination nodes [11]. 1 shows an example of simple network, where nodes A and B want to exchange their packets via 1(a) needs 4 transmissions to perform complete receptions of eir intended destination nodes. ncoding of the incoming packets from The present research is an attempt to combine fountain coding with network coding so that 13] investigated the block error rate (BLER) performance in cooperative communication, through combining fountain oding scheme was proposed by means of integrating fountain code with NC in cooperative communication. They showed by simulation results that the proposed scheme can obtain lower BLER compared with detect and ransmission strategy of FCs over cooperative relay coded packets, the required number of transmissions was reduced over erasure channels and hence the effective throughput was increased. ed the role of analogue NC and optimal weight selection by applying and analyzing batched sparse (BATS) codes for transmitting a collection of packets through communication networks employing linear NC which generalized FCs and preserved the properties such as ratelessness and low encoding/decoding complexity. They verified theoretically for certain cases and demonstrated numerically for the general cases that BATS codes achieved rates very close to the capacity of linear ] proposed a series of new encoding and decoding algorithms of Random NC and Rateless Codes, while they
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 3, March (2014), pp. 54-63 © IAEME 56 approached the optimality bound. After a theoretical analysis of the proposed techniques, they analyzed in various applications for content distribution in peer-to-peer networks, distributed storage systems and network management and monitoring. In the present work, the research is concerned with the performance evaluation and analysis of fountain coding with network coding over wireless networks. The main intension here is to discover the likely advantages of fountain coding when combined with network coding. The remaining parts of the paper are organized as follows: In the next section LT encoder and decoder are described. The model of the network used is to be described in the third section. The topology of network and other main assumptions are given in this section. The fourth section shows the simulation tests results in the form of error probability and the increase in throughput versus channel SNR. The last section deals with the main concluding remarks of the work. 2. LUBY TRANSFORM CODE 2.1 Encoder Operation Each encoded packet ‫ݕ‬௡ is produced from the source packetsܵଵ; ܵଶ; ܵଷ;…; ܵ௞ as follows [17]: - Randomly choosing a degree ݀௡ of the source packets from a degree distribution µ (d); the appropriate choice of µ depends on the source file size K (where the degree distribution will be described in paragraph c). - Choose, uniformly at random, ݀௡ distinct input packets, and set ‫ݕ‬௡ equal to the bitwise sum, modulo-2 addition of those ݀௡ packets. This sum can be done by successively modulo-2 addition of the packets together. This encoding operation defines a sparse-graph connecting encoded packets to source packets. It is assumed that, both the encoder and the decoder have synchronized clocks (to choose identical random degrees and set of connections). So that the degree of each received packet, and to which source packets is connected in the graph are known at the decoder side. 2.2 Decoding Algorithm The decoder's task is to recover S୩ from y୬=S୩Gୢ , where Gୢ is the degree distribution matrix associated with the graph [16]. According to the erasure channel and the BP decoding algorithm used, all messages are either completely uncertain messages or completely certain messages. Uncertain messages assert that a message packet S୩ could have any value, with equal probability, certain messages assert that S୩ has a particular value, with probability one. This simplicity of the messages allows a simple description of the decoding process. The following are the main steps used in decoding of LT code [18]: - Find the node y୬ that is connected to only one S୩ packet. If there is no such y୬ node, this decoding algorithm halts at this point, and fails to recover all the source packets. - Set S୩ =y୬. - Add S୩ to all y୬ that are connected to S୩: y୬ = y୬ + S୩ … (1) For all nʹ such that G୬୩ ୢ = 1. - Remove all edges connected to the S୩ packet. - Repeat the above until all S୩ are determined. The above LT decoding process is illustrated in Fig.2, where each packet is just one bit. There are three source packets (shown by the upper circles) and four received packets (shown by the lower rectangles), which have the values; [yଵ;yଶ;yଷ;yସ] = [1011] at the start of the algorithm [3, 17].
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 3, March (2014), pp. 54-63 © IAEME 57 At the first iteration, the only y୬ node that is connected to a sole source bit is the first yଵ node (panel-a). Source bit Sଵ is then set accordingly as in panel-b. Now, the yଵ node is discarded followed by adding the value of Sଵ (i.e. 1) to the all y୬ nodes to which it is connected as in panel-c. Sଵ is then disconnected from the graph. At the start of the second iteration (panel-c), the fourth y୬ node is connected to a sole source bitSଶ. Sଶ is then set to yସ (0, in panel-d), and add Sଶ to the two y୬ it is connected to (panel-e). Finally, as panel-e shows, two y୬ nodes are both connected to Sଷ, and they agree about the value of Sଷ, which is restored as in (panel-f). 2.3 Robust Soliton Distribution The possibility of always finding new degree-one rows during the process is important to the BP algorithm. The degree distribution of LT codes is designed to keep the expected number of degree-one rows equal to 1 at each iteration. It is theoretically approved that, the best distribution is the Ideal Soliton Distribution (ISD) defined by the following probability distribution [4]: ρሺdሻ=ቊ 1/K for d ൌ 1 భ ౚሺౚషభሻ for d ൌ 2, 3, … , Kቋ … (2) It has been shown in [4] that, this distribution performs poorly in practice because of the large variance for the probability of finding degree-one rows during the BP decoding process. To solve this problem, Luby proposes Robust Soliton Distribution (RSD), originated by ISD with two parameters added. RSD relies on using two parameters c and δ, in order to ensure that the expected number of the degree-one received nodes during the BP decoding process is about [4]: m = c logୣሺK/δሻ √K … (3) Using these parameters, the positive function (߬ ሺ݀ሻ) is calculated: ߬ ሺ݀ሻ = ‫ە‬ ۖ ‫۔‬ ۖ ‫ۓ‬ ೘ ಼ భ ೏ ݂‫݀ݎ݋‬ ൌ 1, 2, … , ቀ ௄ ௠ ቁ െ 1 ೘ ಼ logሺ೘ ഃ ሻ ݂‫݀ݎ݋‬ ൌ ሺ ௄ ௠ ሻ 0 ݂‫݀ݎ݋‬ ൐ ሺ ௄ ௠ ሻ ۙ ۖ ۘ ۖ ۗ … (4) Figure-2 decoding example for LT code with K=3 andN=4 [3, 17]
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 3, March (2014), pp. 54-63 © IAEME 58 Finally, the RSD (µሺdሻ) is given by [4]: µሺdሻ= ρሺୢሻାτ ሺୢሻ ୞ … (5) where Z is given by: Z ൌ ෍ ሺρሺdሻ ൅ τ ሺdሻሻ ୢ ... (6) 3. SYSTEM MODEL The network considered in the present work is a wireless network that is interconnected by wireless links. Fig.3 illustrates the basic model used here. S1 and S2 are source nodes, while D1 and D2 are destination nodes. The aim here is to deliver all packets generated from different source nodes to its destination ones with least number of transmissions to increase the overall throughput of the network. S1 and D2 (also S2 and D1) are out of each other's communication range, thus they have a data to be exchanged through the relay node V. The network coding process is applied at packet level (in the network layer) to improve throughput. The relay node creates queues for the arrived packets from each different source. The queue is used here to make the packets ready to be encoded with NC if such opportunity is met. Finally, the relay node sends the network coded packets to the destination nodes in First in First out (FIFO) principle. Figure-3 network model. Each wireless link together with the required operation at each pair of connected nodes can be represented by the transmission model of Fig.4. This represents a general case for all nodes shown in Fig.3. The source output is either FC-NC coded packets if the source node is a relay node with network coding opportunity, or else FC coded packets without NC (network coding block is not used) that transmit directly from source nodes (S1 and S2) to their corresponding destination nodes (D1 and D2). Also, there is a possibility that source node is a relay node without network coding opportunity. This latter case occurs when there are no packets in the queue of one of the sources at the relay node. In either case, when coding is involved at the relay node, the jth coded packet at the relay node r୨ is given by: ‫ݎ‬௝ ൌ ܽ௞ ْ ܾ௞ … (7)
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 3, March (2014), pp. 54-63 © IAEME 59 whereܽ௞and ܾ௞are the generated packets at source nodes S1and S2, respectively, and ْdenote mod-2 addition.Whether NC is used or not, the contents of the transmitted packets are encoded with FC code (as described in section 2.1) and dealt with as bit stream at the physical layer. The bit stream is then modulated using Binary Phase Shift Keying (BPSK) modulation. Figure-4 the system model LT code which is a class of FC is used in this paper. Therefore at the receiving nodes (whether NC is used or not) the received packets are decoded using LT decoder (as in section 2.2). Following the reconstruction of the received packets at the receiving node in the network considered here, it is either passed to the higher layer, if the packets are network uncoded, or else decoded if the intended destination node has sufficient information to do so. At each destination node, the received network coded packet from the relay node is used with the aid of the packet received by direct transmission (network uncoded packets) from its intended source. This means that destination node D1, for example, which already received the packet, can decode the packet as shown below: a୩ ْ r୩ ൌ a୩ ْ a୩ ْ b୩ ൌ b୩ … (8) Similarly, the packet is decoded at the destination node D2. For more details about the complete algorithm steps for NC and LT code of the intended network can be found in [19]. 4. SIMULATION RESULTS & ASSESSMENT Simulation tests were performed to evaluate the performance of systems considered here with and without network coding. The performance measure covers both the evaluation of Bit Error Rate (BER) and the equivalent normalized throughput. These are determined for different SNR's. The SNR is taken here as the ratio of the average energy per information bit to AWGN noise power spectral density (Eb/No). The BER rate is taken as the ratio average number of errors in receiving the data at all destination nodes to the total number of data bits transmitted by the source nodes [20].Three different channels are considered here, the ideal AWGN channel, flat fading channel and multipath fading channel with three paths. The characteristics of the latter are given by; delays for the paths are 0, 0.4, and 0.9 µs, while their gains are 0, -5, and -10 dB, respectively. The multipath fading channel is known in the literature as SUI-3 and widely used to model wireless networks. Details of the actual channel modelling and complete system simulation can be found elsewhere [20].Four different systems are considered in this work, these are: System#1 neither FC nor NC is used, System#2 without FC but NC is used, System#3 FC is used but without NC, System#4 both FC & NC are used. The performances of the systems are presented in Fig.5& 6. The BER performance is only shown for the cases were FC is not used (i.e only for System#1 & System#2), since the error will be vanished with fountain coding. This is based on the assumption that FC decoders (for System#3 &
  • 7. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 3, March (2014), pp. 54-63 © IAEME 60 System#4) at the destination nodes and the relay node have enough encoded packets. Thus it will produce zero errors for the range of SNR considered in the tests. Therefore Fig.5 shows the BER performances for the systems without FCs. Fig.5 (a) shows the BER performance for the systems without FC code over AWGN channel. This figure shows that both systems (with and without NC) have the same BER performance at high SNR, with slight difference in favour of NC based system (System#2) at low SNR. This is due to the fact that AWGN channel dose not introduce any distortion. It is clear from Fig.5 (b) and (c) that for both fading channels the improvement of NC at high SNR is relatively large. With fading, more SNR is required to achieve the same BER rate as compared with the case of AWGN channel as expected. Summarizing the BER performance for the channels tested in Fig.5 one can say that the use of FC improves the error performance (no error) on the expense of the overhead in transmitting packets. There is an improvement in systems that use NC over fading channels whether FC is used or not. a) AWGN channel b) Single path fading channel c) SUI-3 channel Figure-5 BER performancesfor system#1 & system#2 Combining FC with NC should improve the throughput in addition to BER performance. Thus Fig.6 provides the performances of different systems, in the form of the resultant throughput, against SNR. In most literature the general definition of the throughput is given by the average rate of data that transmitted successfully from a given source node to its intended destination in a specified amount of time. Therefore, the throughput (Th) measure considered here is calculated as
  • 8. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 3, March (2014), pp. 54-63 © IAEME 61 the percentage of all correctly received packets from source nodes (or relay node) to their intended destination nodes in a specified amount of time multiplied by the nominal bit rate. Thus; Th = ே௢.௢௙௖௢௥௥௘௖௧୪୷ ௥௘௖௘௜௩௘ௗ௣௔௖௞௘௧௦ ே௢.௢௙௧௥௔௡௦௠௜௧௧௘ௗ௣௔௖௞௘௧௦ ൈ ܾ݅‫݁ݐܽݎݐ‬ … (9) The bit rate considered in the work is 10 Mbps. The three channel models are also considered in the throughput tests. As expected the measured throughput is directly proportional to SNR in general. Further, the improvement in throughput also depends on the topology of the network considered [11]. Fig-6 shows that there is always an increase in throughput for the network coded systems over that achieved with uncoded counterparts. Further, the throughputs for FC coded systems (system#3& System#4) at relatively low SNRs are greater than those systems without FC (system#1& System#2).This is due to the fact that FC code always provides the least BER, thus allow more correct packets to be delivered to the destination nodes whether NC is used or not. The advantage of NC is vital, whether the system uses FC code or not, where the throughput performance is improved over all ranges of SNRs. The throughput in either case will reach a steady state value at very high SNR. This is determined by the network topology and the type of coding used. The percentage increase in throughput could be used to compare different systems tested here. For the system using both FC& NC (System#4)this percentage is about 35% as compared to NC without FCsystem (System#2) over AWGN channel at very low SNR ( Eb/No = 0 dB). a) AWGN channel b) Single path fading channel c) SUI-3 channel Figure-6 Throughput performance of different systems
  • 9. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 3, March (2014), pp. 54-63 © IAEME 62 The corresponding percentages over single path fading channel and SUI-3 channel are at least 70%. While the percentage increase in throughput of the combined FC and NC (System#4) compared to that using FC without NC (System#3) is more than 33%, 34%, and 31% over AWGN, single path fading, and SUI-3 channels, respectively. This is valid for SNR greater than 10 dB as shown in the Fig.6. Apart from the better BER performance provided by FC code, it is clear that combining FC with NC will provide improvement in throughput at relatively low SNRs. 5. CONCLUSION A combination of fountain coding (FC) and network coding (NC) arrangement was studied here aiming to improve system performance. The simulation results have shown that the packet loss in NC can be reduced further with the use of FC. Further improvement in throughput can be achieved also by combining FC with NC especially at low SNRs. The percentage improvements in throughput become clear when models of fading channels are used. As much as 70% increase in throughput can be obtained at relatively low SNRs when FC-NC system is used over the considered models of wireless channels. Finally, the results reveals that FC-NC system reserves the advantages of both Fountain Coding (low BER) and Network Coding (throughput improvement) at all ranges of SNRs over wireless fading channels. REFERENCES [1] J. Qureshi, C. Foh, & J. Cai, "Primer and Recent Developments on Fountain Codes", Cornell University Library, arXiv: 1305.0918v1 [cs.IT], May 2013. [2] J. Byers, M. Luby, M. Mitzenmacher, & A. Rege, “A Digital Fountain Approach to Reliable Distribution of Bulk Data,” SIGCOMM, pp. 56–67, September 1998. [3] D. MacKay, " Fountain Codes", IEE Proc. Com., UK, Vol. 152, No. 6, pp. 1062-1068, December 2005. [4] M. Luby, "LT Codes", Proc. 43rd, IEEE, Foundations of Computer Science, pp. 271–282, 16–19 November 2002. [5] J. Maria, J. Cordeiro, & B. Shishkov, "Software and Data Technologies", 6th International Conference, ICSOFT 2001, Seville, Spain, July 18-21 2011. [6] J. Moreira & P. Farrell, "Essentials of Error-Control Coding", J. Wiley & S. Ltd, England, 2006. [7] G. Kramer, “Lecture on Network Coding and Information Theory,” Alcatel Lucent, Sep. 2007. [8] R. Ahlswedeet al., "Network information flow," IEEE Transactions on Information Theory, Vol. 46, No. 4, pp. 1204-1216, July 2000. [9] S. Katti, “Network Coded Wireless Architecture,” Ph.D. Thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, Aug. 2008. [10] C. Fragouli& E. Soljanin, “Network Coding Fundamentals”, Foundations and Trends in Networking, Boston, Vol. 2, Issue 1, 2007. [11] T. Ho& D. Lun, “Network Coding: An Introduction,” Cambridge University Press, New York, 2008. [12] I. Qazi& P. Gandhi, “Performance Evaluation of Wireless Network Coding under Practical Settings”, Tech. Report TR-07-150, University of Pittsburgh, 2007. [13] M. Yang, J. An, X. Li & L. Yuan, "Combined Fountain Code with Network Coding in Cooperative Communication", IEEE Networks Security Wireless Communications and Trusted Computing (NSWCTC), Vol. 2, pp. 24-27, China, April 2010.
  • 10. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 3, March (2014), pp. 54-63 © IAEME 63 [14] E. Kurniawan, S. Sun, K. Yen, & K. Chong, "Network Coded Transmission of Fountain Codes over Cooperative Relay Networks", Institute for Infocomm Research, Connexis, Singapore, May 2010. [15] S. Yang & R. Yeung, "Coding for a Network Coded Fountain", IEEE International Symposium on Information Theory Proceedings, pp. 2647-2651, The Chinese University of Hong Kong, Hong Kong SAR, China, 2011. [16] V. Bioglio, "Data Dissemination in Distributed Systems Using Rateless Codes", Ph.D. Dissertation, Univerisita' DegliStudi di Torino, Dipartimento di Informatica, Torino, Italy, 2011. [17] D. MacKay, "Information Theory, Inference, and Learning Algorithms," 1st Ed., Cambridge University Press, Cambridge, UK, 2005. [18] I. Reed and G. Solomon, "Polynomial Codes Over Certain Finite Fields," Journal of the Society of Industrial and Applied Mathematics, Vol. 8, No. 2, pp. 300-304, June 1960. [19] Z. Abduljabbar, "Performance Evaluation of Fountain Codes Based Network Coding," M.Sc. Thesis, Al-Nahrain University, Iraq, February, 2014. [20] A. Mahmood, "Combined Multi Input Multi Output and Network Coding for Wireless Networks", M.Sc. Thesis, Al-Nahrain University, Iraq, June 2012. [21] B. Sklar, “Digital Communications: Fundamentals and Applications”, 2nd Ed., Prentice Hall, 2001. [22] Kalpana Chikatwar, Ramesh D and Satish Kannale, “Design of ARQ And Hybrid ARQ Protocols For Wireless Channels Using Bch Codes” International Journal of Advanced Research in Engineering & Technology (IJARET), Volume 4, Issue 3, 2013, pp. 49 - 54, ISSN Print: 0976-6480, ISSN Online: 0976-6499. [23] S.R.Shankar and Dr.G.Kalivarathan, “Feasibility Studies of Wireless Sensor Network and It’s Implications”, International Journal of Electrical Engineering & Technology (IJEET), Volume 4, Issue 2, 2012, pp. 105 - 111, ISSN Print: 0976-6545, ISSN Online: 0976-6553. [24] T.Regu and Dr.G.Kalivarathan, “Prediction of a Reliable Code for Wireless Communication Systems”, International Journal of Electrical Engineering & Technology (IJEET), Volume 4, Issue 1, 2013, pp. 19 - 26, ISSN Print: 0976-6545, ISSN Online: 0976-6553.