SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print),
ISSN 0976 – 6499(Online) Volume 5, Issue 5, May (2014), pp. 51-58 © IAEME
51
TECHNIQUES OF ERROR DETECTION AND CORRECTION IN DATA
COMMUNICATION SYSTEMS
Mr. NITIN S. SONAR1, Dr. R.R. MUDHOLKAR2
1
Faculty, Engineering Department,
Ibra College of Technology, Ministry of Manpower, Oman
2
Associate Professor, Department of Electronics,
Shivaji University, Kolhapur, Maharashtra, India.
ABSTRACT
In information theory and coding theory with applications in computer science and
telecommunication, error detection and correction or error control are techniques that enable reliable
delivery of digital data over unreliable communication channels. Many communication channels are
subject to channel noise, and thus errors may be introduced during transmission from the source to a
receiver. Error detection techniques allow detecting such errors, while error correction enables
reconstruction of the original data. The use of error-correcting codes has proven to be an effective
way to overcome data corruption in digital wireless communication channels, enabling reliable
transmission over noisy and fading channel.. In this paper all mechanisms are studied and best
mechanism on the basis of accuracy, complexity and power consumption is selected. There should be
trade off between complexity of hardware and power consumption in decoder.
Key Words: FEC, Block Codes, Convolutional Codes, ARQ, HARQ, Viterbi Mechanism.
I. INTRODUCTION
Over the years, there has been a tremendous growth in digital communications especially in
the fields of cellular/PCS, satellite, and computer communication. In these communication systems,
the information is represented as a sequence of binary bits. The binary bits are then mapped
(modulated) to analog signal waveforms and transmitted over a communication channel. The
communication channel introduces noise and interference to corrupt the transmitted signal. At the
receiver, the channel corrupted transmitted signal is mapped back to binary bits. The received binary
information is an estimate of the transmitted binary information. Bit errors may result due to the
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH
IN ENGINEERING AND TECHNOLOGY (IJARET)
ISSN 0976 - 6480 (Print)
ISSN 0976 - 6499 (Online)
Volume 5, Issue 5, May (2014), pp. 51-58
© IAEME: www.iaeme.com/ijaret.asp
Journal Impact Factor (2014): 7.8273 (Calculated by GISI)
www.jifactor.com
IJARET
© I A E M E
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print),
ISSN 0976 – 6499(Online) Volume 5, Issue 5, May (2014), pp. 51-58 © IAEME
52
transmission and the number of bit errors depends on the amount of noise and interference in the
communication channel.
The major techniques used are error detection with Automatic Repeat Request (ARQ),
Forward Error Correction (FEC) and hybrid forms of ARQ and FEC (H-ARQ) [9].
Forward Error Correction (FEC) is the method of transmitting error correction information
along with the message. At the receiver, this error correction information is used to correct any bit-
errors that may have occurred during transmission. The improved performance comes at the cost of
introducing a considerable amount of redundancy in the transmitted code. There are various FEC
codes in use today for the purpose of error correction. Most codes fall into either of two major
categories: block codes [11] and convolutional codes [6].
Shannon-theoretic limits, complemented by modern coding-theoretic constructions [3], have
provided codes that are provably good for minimizing transmit power. Can we develop a parallel
approach in order to minimize the total system power? With simplistic encoding/decoding models,
the issue of fundamental limits on total (transmit +encoding+ decoding) power has been addressed in
some recent works [4], [5], [6], [7]. These fundamental limits abstract power consumed in
computational nodes [5], [6] and wiring in the encoder/decoder implementation and can provide
insights into the choice of the code and its corresponding decoding algorithm. While such theoretical
insights can serve to guide the choice of the code family, the simplicity of these theoretical models,
which (to an extent) is needed in order to be able to obtain fundamental bounds, also limits their
applicability.
II. FORWARD ERROR CORRECTION (FEC)
Forward Error Correction is a method used to improve channel capacity by introducing
redundant data into the message [8]. This redundant data allows the receiver to detect and correct
errors without the need for retransmission of the message. Forward Error Correction proves
advantageous in noisy channels when a large number of retransmissions would normally be required
before a packet is received without error. It is also used in cases where no backward channel exists
from the receiver to the transmitter. A complex algorithm or function is used to encode the message
with redundant data. The process of adding redundant data to the message is called channel coding.
This encoded message may or may not contain the original information in an unmodified form.
III. BLOCK CODE
As described by Proakis [10], linear block codes consist of fixed length vectors called code
words. Block codes are described using two integers k and n, and a generator matrix or polynomial.
The integer k is the number of data bits in the input to the block encoder. The integer n is the total
number of bits in the generated codeword. Also, each n bit codeword is uniquely determined by the k
bit input data. Another parameter used to describe is its weight. This is defined as the number of non
zero elements in the code word. In general, each code word has its own weight. If all the M code
words have equal weight it is said to be fixed-weight code [11]. Hamming Codes and Cyclic
Redundancy Checks are two widely used examples of block codes.
IV. CONVOLUTIONAL CODES
Convolutional codes are codes that are generated sequentially by passing the information
sequence through a linear finite-state shift register. A convolutional code is described using three
parameters k, n and K. The integer k represents the number of input bits for each shift of the register.
The integer n represents the number of output bits generated at each shift of the register. K is an
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print),
ISSN 0976 – 6499(Online) Volume 5, Issue 5, May (2014), pp. 51-58 © IAEME
53
integer known as constraint length, which represents the number of k bit stages present in the
encoding shift register [11]. Each possible combination of shift registers together forms a possible
state of the encoder. For a code of constraint length K, there exist 2K-1 possible states. The
following tables and figures show how a state diagram is drawn for a convolutional encoder.
Figure 1: Convolutional encoder with a rate ½ and K =3, (7, 5).
Rate ½ is used to denote the fact that for each bit of input the encoder a two bit output. K, the
constraint length of the encoder being three, establishes that the input persists for 3 clock cycles. By
looking at the transition of shift registers (also known as Flip Flops) FF1 and FF2, the State transition
table is created for each combination of Input and Current State. This is shown in Table1. Another
table can be created to demonstrate the change in output for each combination of input and previous
output.
Table 1: State Transition Table
This is called the Output Table and is shown in Table 2.
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print),
ISSN 0976 – 6499(Online) Volume 5, Issue 5, May (2014), pp. 51-58 © IAEME
54
Table 2: Output Table
Finally, using the information from Table 1 and Table 2, the state diagram is created as
shown in Figure 2. The values inside the circles indicate the state of the flip flops. The values on the
arrows indicate the output of the encoder.
Figure 2: State Diagram
B. Trellis Diagram In a trellis diagram the mappings from current state to next state are done in a
slightly different manner as shown in Figure 3. Additionally, the diagram is extended to represent all
the time instances until the whole message is decoded. In the following Figure 3, a trellis diagram is
drawn for the above mentioned convolutional encoder. The complete trellis diagram will replicate
this figure for each time instance that is to be considered.
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print),
ISSN 0976 – 6499(Online) Volume 5, Issue 5, May (2014), pp. 51-58 © IAEME
55
Figure 3: Trellis Diagaram
V. AUTOMATIC REPEAT REQUEST (ARQ)
Automatic Repeat request or ARQ is a method in which the receiver sends back a positive
acknowledgement if no errors are detected in the received message. In order to do this, the
transmitter sends a Cyclic Redundancy Check or CRC along with the message. The CRC check bits
are calculated based on the data to be transmitted. At the receiver, the CRC is calculated again using
the received bits. If the calculated CRC bits match those received, the data received is considered
accurate and an acknowledgement is sent back to the transmitter. The sender waits for this
acknowledgement. If it does not receive an acknowledgement (ACK) within a predefined time, or if
it receives a negative acknowledgement (NAK), it retransmits the message [11]. This retransmission
is done either until it receives an ACK or until it exceeds a specified number of retransmissions. This
method has a number of drawbacks. Firstly, transmission of a whole message takes much longer as
the sender has to keep waiting for acknowledgements from the receiver. Secondly, due to this delay,
it is not possible to have practical, real-time, two-way communications [9].
VI. HYBRID AUTOMATIC REPEAT REQUEST (H-ARQ)
Hybrid Automatic Repeat Request or H-ARQ is another variation of the ARQ method. In this
technique, error correction information is also transmitted along with the code. This gives a better
performance especially when there are a lot of errors occurring. On the flip side, it introduces a
larger amount of redundancy in the information sent and therefore reduces the rate at which the
actual information can be transmitted.
VII. VITERBI MECHANISM
Viterbi algorithm is the best error correction method used currently in communication
systems. It is trade off between complexity of hardware and power consumption. There are two main
mechanisms, by which Viterbi decoding may be carried out namely, the Register Exchange
mechanism and the Traceback mechanism. Register exchange mechanisms, as explained by Ranpara
and Sam Ha [12] store the partially decoded output sequence along the path. The advantage of this
approach is that it eliminates the need for traceback and hence reduces latency. However at each
stage, the contents of each register needs to be copied to the next stage. This makes the hardware
complex and more energy consuming than the traceback mechanism. Traceback mechanisms use a
single bit to indicate whether the survivor branch came from the upper or lower path. This
information is used to traceback the surviving path from the final state to the initial state [9]. This
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print),
ISSN 0976 – 6499(Online) Volume 5, Issue 5, May (2014), pp. 51-58 © IAEME
56
path can then be used to obtain the decoded sequence. Traceback mechanisms prove to be less
energy consuming and will hence be the approach followed in this project. Decoding may be done
using either hard decision inputs or soft decision inputs. Inputs that arrive at the receiver may not be
exactly zero or one. Having been affected by noise, they will have values in between and even higher
or lower than zero and one. The values may also be complex in nature. In the hard decision Viterbi
decoder, each input that arrives at the receiver is converted into a binary value (either 0 or 1). In the
soft decision Viterbi decoder, several levels are created and the arriving input is categorized into a
level that is closest to its value. If the possible values are split into 8 decision levels, these levels may
be represented by 3 bits and this is known as a 3 bit Soft decision. Figure 4 shows the various stages
required to decode data using the Viterbi Algorithm. The decoding mechanism comprises of three
major stages namely the Branch Metric Computation Unit, the Path Metric Computation and Add-
Compare-Select (ACS) Unit and the Traceback Unit. A schematic representation of the decoder is
described below.
Figure 4: Schematic representation of the Viterbi decoding block
Block 1. Branch Metric Computation (BMC): For each state, the Hamming distance between the
received bits and the expected bits is calculated. Hamming distance between two symbols of the
same length is calculated as the number of bits that are different between them. These branch metric
values are passed to Block 2. If soft decision inputs were to be used, branch metric would be
calculated as the squared Euclidean distance between the received symbols. The squared Euclidean
distance is given as (a1-b1)2 + (a2-b2)2 + (a3-b3)2 where a1, a2, a3 and b1, b2, b3 are the three soft
decision bits of the received and expected bits respectively.
A path metric unit summarizes branch metrics to get metrics for paths, where K is the
constraint length of the code, one of which can eventually be chosen as optimal. Every clock it
makes decisions, throwing off wittingly nonoptimal paths. The results of these decisions are
written to the memory of a traceback unit. The core elements of a PMU are ACS (Add-Compare-
Select) units. The way in which they are connected between themselves is defined by a specific
code's trellis diagram. It is possible to monitor the noise level on the incoming bit stream by
monitoring the rate of growth of the "best" path metric. A simpler way to do this is to monitor a
single location or "state" and watch it pass "upward" through say four discrete levels within the range
of the accumulator. As it passes upward through each of these thresholds, a counter is incremented
that reflects the "noise" present on the incoming signal. Block 3. Traceback Unit: The global winner
for the current state is received from Block 2. Its predecessor is selected in the manner described in
previous section. In this way, working backwards through the trellis, the path with the minimum
accumulated path metric is selected. This path is known as the traceback path. A diagrammatic
description will help visualize this process. Figure 5 describes the trellis diagram for a ½ K=3 (7, 5)
coder with sample input taken as the received data.
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print),
ISSN 0976 – 6499(Online) Volume 5, Issue 5, May (2014), pp. 51-58 © IAEME
57
Figure 5: Selected minimum error path for a ½ K = 3 (7, 5) coder
VII. CONCLUSION
Convolutional encoding with Viterbi decoding is a powerful method for forward error
correction. It has been widely deployed in many wireless communication systems to improve the
limited capacity of the communication channels. Now a days convolutional encoders are used in all
communication at the transmitter and the transmitter channel is more prone to Additive White
Gaussian Noise (AWGN) which introduces error in data. To correct errors either sequential decoding
(Fano coding) or most likelihood mechanism (viterbi decoder) is used. But viterbi decoder corrects
error exactly. Viterbi decoder assumes that errors occur infrequently, the probability of error is small
and errors are distributed randomly.
REFERENCES
[1]. Sklar, B., 2001. Digital Communications – Fundamentals and Applications. 2nd ed. New
Jersey: Prentice Hall .
[2]. C. E. Shannon, ―A mathematical theory of communication,ǁ Bell Sys. Tech. Jour., vol. 27,
pp. 379–423, 623–656, Jul./Oct. 1948.
[3]. T. Richardson and R. Urbanke, Modern Coding Theory. Cambridge University Press, 2007.
[4]. Z. Zhang, V. Anantharam, M. Wainwright, and B. Nikolic, ―An efficient 10 GBASE-T
ethernet LDPC decoder design with low error floors,ǁ IEEE Journal of Solid-State Circuits,
vol. 45, no. 4, pp. 843 –855, Apr. 2010.
[5]. P. Grover, K. Woyach, and A. Sahai, ―Towards a communication theoretic understanding
of system-level power consumption,ǁ IEEE J. Select. Areas Commun., vol. 29, no. 8,
pp. 1744 – 1755, Sept. 2011.
[6]. P. Grover, A. Goldsmith, and A. Sahai, ―Fundamental limits on complexity and power
consumption in coded communication,ǁ in extended version of paper presented at ISIT‘12,
Feb. 2012.
[7]. P. Grover and A. Sahai, ―Fundamental bounds on the interconnect complexity of decoder
implementations,ǁ in Proc. of the 45th Annual Conference on Information Sciences and
Systems (CISS), March 2011, pp. 1 – 6.
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print),
ISSN 0976 – 6499(Online) Volume 5, Issue 5, May (2014), pp. 51-58 © IAEME
58
[8]. Green codes: Energy-efficient short-range communication,ǁ in Proceedings of the 2008 IEEE
Symposium on Information Theory, Toronto, Canada, Jul. 2008.
[9]. Vikas Gupta and Dr. Chanderkant Verma , International Journal of Advanced Research in
Computer Science and Software Engineering 2 (11), November- 2012, pp. 212-218.
[10]. Proakis, J.G., 2003. Digital Communications. 3rd ed. New York: McGraw-Hill, Inc.
[11]. Wikipedia. General Algorithm - Hamming Codes. [Online]. Available at:
<http://en.wikipedia.org/wiki/Hamming_code#General_algorithm> [Accessed 15 May 2010].
[12]. Ranpara, S.; Dong Sam Ha, 1999. A low-power Viterbi decoder design for wireless
communications applications. IEEE Proceedings of the Twelfth Annual IEEE International
Int. ASIC Conference 1999, Washington, DC, 15-18 Sept. 1999, pp. 377-381.
[13]. Hanamane M.D, Atar K.D and Mudholkar R.R, “Fuzzy Based Co-Generation Power Plant
Optimization Model for Sugar Industry”, International Journal of Electronics
and Communication Engineering & Technology (IJECET), Volume 4, Issue 3, 2013,
pp. 139 - 147, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472.
[14]. Dr. Vinodkumar Jacob, Dr. M. Bhasi and Dr. Gopikakumari, “Characterization of
Measurement Error and Uncertainty in Working Standards”, International Journal of
Advanced Research in Engineering & Technology (IJARET), Volume 4, Issue 5, 2013,
pp. 106 - 125, ISSN Print: 0976-6480, ISSN Online: 0976-6499.
[15]. Prof. Vijay K. Patel and Dr D. J. Shah,, “Comparison and Analysis of Combining Techniques
for Spatial Multiplexing/Space Time Block Coded Systems in Rayleigh Fading Channel”,
International Journal of Electronics and Communication Engineering & Technology
(IJECET), Volume 2, Issue 1, 2011, pp. 1 - 10, ISSN Print: 0976- 6464, ISSN Online:
0976 –6472.

Weitere ähnliche Inhalte

Was ist angesagt?

Multiple Valued Logic for Synthesis and Simulation of Digital Circuits
Multiple Valued Logic for Synthesis and Simulation of Digital CircuitsMultiple Valued Logic for Synthesis and Simulation of Digital Circuits
Multiple Valued Logic for Synthesis and Simulation of Digital CircuitsIJERA Editor
 
ANALOG MODELING OF RECURSIVE ESTIMATOR DESIGN WITH FILTER DESIGN MODEL
ANALOG MODELING OF RECURSIVE ESTIMATOR DESIGN WITH FILTER DESIGN MODELANALOG MODELING OF RECURSIVE ESTIMATOR DESIGN WITH FILTER DESIGN MODEL
ANALOG MODELING OF RECURSIVE ESTIMATOR DESIGN WITH FILTER DESIGN MODELVLSICS Design
 
Design and implementation of log domain decoder
Design and implementation of log domain decoder Design and implementation of log domain decoder
Design and implementation of log domain decoder IJECEIAES
 
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...eSAT Journals
 
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...IJCSEA Journal
 
Performance analysis of new binary orthogonal codes for ds cdma communicat
Performance analysis of new binary orthogonal codes for ds cdma communicatPerformance analysis of new binary orthogonal codes for ds cdma communicat
Performance analysis of new binary orthogonal codes for ds cdma communicatIAEME Publication
 
AN EFFICIENT VITERBI DECODER
AN EFFICIENT VITERBI DECODERAN EFFICIENT VITERBI DECODER
AN EFFICIENT VITERBI DECODERIJCSEA Journal
 
I slip algorithm for low latency on hybrid noc architecture
I slip algorithm for low latency on hybrid noc architectureI slip algorithm for low latency on hybrid noc architecture
I slip algorithm for low latency on hybrid noc architectureeSAT Publishing House
 
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...ijitjournal
 
COMPUTER COMMUNICATION NETWORKS -IPv4
COMPUTER COMMUNICATION NETWORKS -IPv4COMPUTER COMMUNICATION NETWORKS -IPv4
COMPUTER COMMUNICATION NETWORKS -IPv4Krishna Nanda
 
IRJET- Survey on Wireless Body Area Network Security Algorithms
IRJET- Survey on Wireless Body Area Network Security AlgorithmsIRJET- Survey on Wireless Body Area Network Security Algorithms
IRJET- Survey on Wireless Body Area Network Security AlgorithmsIRJET Journal
 
A Review on Analysis on Codes using Different Algorithms
A Review on Analysis on Codes using Different AlgorithmsA Review on Analysis on Codes using Different Algorithms
A Review on Analysis on Codes using Different AlgorithmsAM Publications
 
Hard Decision Viterbi Decoder: Implementation on FPGA and Comparison of Resou...
Hard Decision Viterbi Decoder: Implementation on FPGA and Comparison of Resou...Hard Decision Viterbi Decoder: Implementation on FPGA and Comparison of Resou...
Hard Decision Viterbi Decoder: Implementation on FPGA and Comparison of Resou...IJERA Editor
 
IRJET- Review Paper on Study of Various Interleavers and their Significance
IRJET- Review Paper on Study of Various Interleavers and their SignificanceIRJET- Review Paper on Study of Various Interleavers and their Significance
IRJET- Review Paper on Study of Various Interleavers and their SignificanceIRJET Journal
 
Fpga implementation of (15,7) bch encoder and decoder
Fpga implementation of (15,7) bch encoder and decoderFpga implementation of (15,7) bch encoder and decoder
Fpga implementation of (15,7) bch encoder and decodereSAT Publishing House
 
A short introduction to Network coding
A short introduction to Network codingA short introduction to Network coding
A short introduction to Network codingArash Pourdamghani
 
Fpga implementation of linear ldpc encoder
Fpga implementation of linear ldpc encoderFpga implementation of linear ldpc encoder
Fpga implementation of linear ldpc encodereSAT Publishing House
 

Was ist angesagt? (20)

Multiple Valued Logic for Synthesis and Simulation of Digital Circuits
Multiple Valued Logic for Synthesis and Simulation of Digital CircuitsMultiple Valued Logic for Synthesis and Simulation of Digital Circuits
Multiple Valued Logic for Synthesis and Simulation of Digital Circuits
 
ANALOG MODELING OF RECURSIVE ESTIMATOR DESIGN WITH FILTER DESIGN MODEL
ANALOG MODELING OF RECURSIVE ESTIMATOR DESIGN WITH FILTER DESIGN MODELANALOG MODELING OF RECURSIVE ESTIMATOR DESIGN WITH FILTER DESIGN MODEL
ANALOG MODELING OF RECURSIVE ESTIMATOR DESIGN WITH FILTER DESIGN MODEL
 
Design and implementation of log domain decoder
Design and implementation of log domain decoder Design and implementation of log domain decoder
Design and implementation of log domain decoder
 
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
 
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
 
Performance analysis of new binary orthogonal codes for ds cdma communicat
Performance analysis of new binary orthogonal codes for ds cdma communicatPerformance analysis of new binary orthogonal codes for ds cdma communicat
Performance analysis of new binary orthogonal codes for ds cdma communicat
 
AN EFFICIENT VITERBI DECODER
AN EFFICIENT VITERBI DECODERAN EFFICIENT VITERBI DECODER
AN EFFICIENT VITERBI DECODER
 
I slip algorithm for low latency on hybrid noc architecture
I slip algorithm for low latency on hybrid noc architectureI slip algorithm for low latency on hybrid noc architecture
I slip algorithm for low latency on hybrid noc architecture
 
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...
 
COMPUTER COMMUNICATION NETWORKS -IPv4
COMPUTER COMMUNICATION NETWORKS -IPv4COMPUTER COMMUNICATION NETWORKS -IPv4
COMPUTER COMMUNICATION NETWORKS -IPv4
 
IRJET- Survey on Wireless Body Area Network Security Algorithms
IRJET- Survey on Wireless Body Area Network Security AlgorithmsIRJET- Survey on Wireless Body Area Network Security Algorithms
IRJET- Survey on Wireless Body Area Network Security Algorithms
 
D04561722
D04561722D04561722
D04561722
 
40120130406011 2-3
40120130406011 2-340120130406011 2-3
40120130406011 2-3
 
A Review on Analysis on Codes using Different Algorithms
A Review on Analysis on Codes using Different AlgorithmsA Review on Analysis on Codes using Different Algorithms
A Review on Analysis on Codes using Different Algorithms
 
Hard Decision Viterbi Decoder: Implementation on FPGA and Comparison of Resou...
Hard Decision Viterbi Decoder: Implementation on FPGA and Comparison of Resou...Hard Decision Viterbi Decoder: Implementation on FPGA and Comparison of Resou...
Hard Decision Viterbi Decoder: Implementation on FPGA and Comparison of Resou...
 
IRJET- Review Paper on Study of Various Interleavers and their Significance
IRJET- Review Paper on Study of Various Interleavers and their SignificanceIRJET- Review Paper on Study of Various Interleavers and their Significance
IRJET- Review Paper on Study of Various Interleavers and their Significance
 
Fpga implementation of (15,7) bch encoder and decoder
Fpga implementation of (15,7) bch encoder and decoderFpga implementation of (15,7) bch encoder and decoder
Fpga implementation of (15,7) bch encoder and decoder
 
J0445255
J0445255J0445255
J0445255
 
A short introduction to Network coding
A short introduction to Network codingA short introduction to Network coding
A short introduction to Network coding
 
Fpga implementation of linear ldpc encoder
Fpga implementation of linear ldpc encoderFpga implementation of linear ldpc encoder
Fpga implementation of linear ldpc encoder
 

Ähnlich wie 20120140505006

Design of arq and hybrid arq protocols for wireless channels using bch codes
Design of arq and hybrid arq protocols for wireless channels using bch codesDesign of arq and hybrid arq protocols for wireless channels using bch codes
Design of arq and hybrid arq protocols for wireless channels using bch codesIAEME Publication
 
Estimation of bit error rate in 2×2 and 4×4 multi-input multioutput-orthogon...
Estimation of bit error rate in 2×2 and 4×4 multi-input multioutput-orthogon...Estimation of bit error rate in 2×2 and 4×4 multi-input multioutput-orthogon...
Estimation of bit error rate in 2×2 and 4×4 multi-input multioutput-orthogon...IJECEIAES
 
IRJET-Simulation of Channel-Estimation for Digital Communication System based...
IRJET-Simulation of Channel-Estimation for Digital Communication System based...IRJET-Simulation of Channel-Estimation for Digital Communication System based...
IRJET-Simulation of Channel-Estimation for Digital Communication System based...IRJET Journal
 
IRJET- Performance Analysis of a Synchronized Receiver over Noiseless and Fad...
IRJET- Performance Analysis of a Synchronized Receiver over Noiseless and Fad...IRJET- Performance Analysis of a Synchronized Receiver over Noiseless and Fad...
IRJET- Performance Analysis of a Synchronized Receiver over Noiseless and Fad...IRJET Journal
 
Design of high speed reconfigurable coprocessor for interleaver and de interl...
Design of high speed reconfigurable coprocessor for interleaver and de interl...Design of high speed reconfigurable coprocessor for interleaver and de interl...
Design of high speed reconfigurable coprocessor for interleaver and de interl...IAEME Publication
 
Implementation of a bit error rate tester of a wireless communication system ...
Implementation of a bit error rate tester of a wireless communication system ...Implementation of a bit error rate tester of a wireless communication system ...
Implementation of a bit error rate tester of a wireless communication system ...eSAT Publishing House
 
Indexed-channel estimation under frequency and time-selective fading channels...
Indexed-channel estimation under frequency and time-selective fading channels...Indexed-channel estimation under frequency and time-selective fading channels...
Indexed-channel estimation under frequency and time-selective fading channels...IJECEIAES
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...ijceronline
 
Data detection with a progressive parallel ici canceller in mimo ofdm
Data detection with a progressive parallel ici canceller in mimo ofdmData detection with a progressive parallel ici canceller in mimo ofdm
Data detection with a progressive parallel ici canceller in mimo ofdmeSAT Publishing House
 
Performance Enhancement of MIMO-OFDM using Redundant Residue Number System
Performance Enhancement of MIMO-OFDM using Redundant Residue Number System Performance Enhancement of MIMO-OFDM using Redundant Residue Number System
Performance Enhancement of MIMO-OFDM using Redundant Residue Number System IJECEIAES
 
BLOCK CODES,STBCs & STTCs.pptx
BLOCK CODES,STBCs & STTCs.pptxBLOCK CODES,STBCs & STTCs.pptx
BLOCK CODES,STBCs & STTCs.pptxFAIZAN SHAFI
 
Paper id 312201514
Paper id 312201514Paper id 312201514
Paper id 312201514IJRAT
 
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESCODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESijmnct
 
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESCODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESijmnct_journal
 
A New Bit Split and Interleaved Channel Coding for MIMO Decoder
A New Bit Split and Interleaved Channel Coding for MIMO DecoderA New Bit Split and Interleaved Channel Coding for MIMO Decoder
A New Bit Split and Interleaved Channel Coding for MIMO DecoderIJARBEST JOURNAL
 

Ähnlich wie 20120140505006 (20)

40120140505011
4012014050501140120140505011
40120140505011
 
Design of arq and hybrid arq protocols for wireless channels using bch codes
Design of arq and hybrid arq protocols for wireless channels using bch codesDesign of arq and hybrid arq protocols for wireless channels using bch codes
Design of arq and hybrid arq protocols for wireless channels using bch codes
 
srivastava2018.pdf
srivastava2018.pdfsrivastava2018.pdf
srivastava2018.pdf
 
Estimation of bit error rate in 2×2 and 4×4 multi-input multioutput-orthogon...
Estimation of bit error rate in 2×2 and 4×4 multi-input multioutput-orthogon...Estimation of bit error rate in 2×2 and 4×4 multi-input multioutput-orthogon...
Estimation of bit error rate in 2×2 and 4×4 multi-input multioutput-orthogon...
 
Ijetcas14 378
Ijetcas14 378Ijetcas14 378
Ijetcas14 378
 
Co35503507
Co35503507Co35503507
Co35503507
 
IRJET-Simulation of Channel-Estimation for Digital Communication System based...
IRJET-Simulation of Channel-Estimation for Digital Communication System based...IRJET-Simulation of Channel-Estimation for Digital Communication System based...
IRJET-Simulation of Channel-Estimation for Digital Communication System based...
 
IRJET- Performance Analysis of a Synchronized Receiver over Noiseless and Fad...
IRJET- Performance Analysis of a Synchronized Receiver over Noiseless and Fad...IRJET- Performance Analysis of a Synchronized Receiver over Noiseless and Fad...
IRJET- Performance Analysis of a Synchronized Receiver over Noiseless and Fad...
 
Design of high speed reconfigurable coprocessor for interleaver and de interl...
Design of high speed reconfigurable coprocessor for interleaver and de interl...Design of high speed reconfigurable coprocessor for interleaver and de interl...
Design of high speed reconfigurable coprocessor for interleaver and de interl...
 
Implementation of a bit error rate tester of a wireless communication system ...
Implementation of a bit error rate tester of a wireless communication system ...Implementation of a bit error rate tester of a wireless communication system ...
Implementation of a bit error rate tester of a wireless communication system ...
 
Indexed-channel estimation under frequency and time-selective fading channels...
Indexed-channel estimation under frequency and time-selective fading channels...Indexed-channel estimation under frequency and time-selective fading channels...
Indexed-channel estimation under frequency and time-selective fading channels...
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 
Data detection with a progressive parallel ici canceller in mimo ofdm
Data detection with a progressive parallel ici canceller in mimo ofdmData detection with a progressive parallel ici canceller in mimo ofdm
Data detection with a progressive parallel ici canceller in mimo ofdm
 
Performance Enhancement of MIMO-OFDM using Redundant Residue Number System
Performance Enhancement of MIMO-OFDM using Redundant Residue Number System Performance Enhancement of MIMO-OFDM using Redundant Residue Number System
Performance Enhancement of MIMO-OFDM using Redundant Residue Number System
 
BLOCK CODES,STBCs & STTCs.pptx
BLOCK CODES,STBCs & STTCs.pptxBLOCK CODES,STBCs & STTCs.pptx
BLOCK CODES,STBCs & STTCs.pptx
 
Paper id 312201514
Paper id 312201514Paper id 312201514
Paper id 312201514
 
Ff34970973
Ff34970973Ff34970973
Ff34970973
 
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESCODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
 
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESCODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
 
A New Bit Split and Interleaved Channel Coding for MIMO Decoder
A New Bit Split and Interleaved Channel Coding for MIMO DecoderA New Bit Split and Interleaved Channel Coding for MIMO Decoder
A New Bit Split and Interleaved Channel Coding for MIMO Decoder
 

Mehr von IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

Mehr von IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Kürzlich hochgeladen

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 

Kürzlich hochgeladen (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 

20120140505006

  • 1. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 5, May (2014), pp. 51-58 © IAEME 51 TECHNIQUES OF ERROR DETECTION AND CORRECTION IN DATA COMMUNICATION SYSTEMS Mr. NITIN S. SONAR1, Dr. R.R. MUDHOLKAR2 1 Faculty, Engineering Department, Ibra College of Technology, Ministry of Manpower, Oman 2 Associate Professor, Department of Electronics, Shivaji University, Kolhapur, Maharashtra, India. ABSTRACT In information theory and coding theory with applications in computer science and telecommunication, error detection and correction or error control are techniques that enable reliable delivery of digital data over unreliable communication channels. Many communication channels are subject to channel noise, and thus errors may be introduced during transmission from the source to a receiver. Error detection techniques allow detecting such errors, while error correction enables reconstruction of the original data. The use of error-correcting codes has proven to be an effective way to overcome data corruption in digital wireless communication channels, enabling reliable transmission over noisy and fading channel.. In this paper all mechanisms are studied and best mechanism on the basis of accuracy, complexity and power consumption is selected. There should be trade off between complexity of hardware and power consumption in decoder. Key Words: FEC, Block Codes, Convolutional Codes, ARQ, HARQ, Viterbi Mechanism. I. INTRODUCTION Over the years, there has been a tremendous growth in digital communications especially in the fields of cellular/PCS, satellite, and computer communication. In these communication systems, the information is represented as a sequence of binary bits. The binary bits are then mapped (modulated) to analog signal waveforms and transmitted over a communication channel. The communication channel introduces noise and interference to corrupt the transmitted signal. At the receiver, the channel corrupted transmitted signal is mapped back to binary bits. The received binary information is an estimate of the transmitted binary information. Bit errors may result due to the INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND TECHNOLOGY (IJARET) ISSN 0976 - 6480 (Print) ISSN 0976 - 6499 (Online) Volume 5, Issue 5, May (2014), pp. 51-58 © IAEME: www.iaeme.com/ijaret.asp Journal Impact Factor (2014): 7.8273 (Calculated by GISI) www.jifactor.com IJARET © I A E M E
  • 2. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 5, May (2014), pp. 51-58 © IAEME 52 transmission and the number of bit errors depends on the amount of noise and interference in the communication channel. The major techniques used are error detection with Automatic Repeat Request (ARQ), Forward Error Correction (FEC) and hybrid forms of ARQ and FEC (H-ARQ) [9]. Forward Error Correction (FEC) is the method of transmitting error correction information along with the message. At the receiver, this error correction information is used to correct any bit- errors that may have occurred during transmission. The improved performance comes at the cost of introducing a considerable amount of redundancy in the transmitted code. There are various FEC codes in use today for the purpose of error correction. Most codes fall into either of two major categories: block codes [11] and convolutional codes [6]. Shannon-theoretic limits, complemented by modern coding-theoretic constructions [3], have provided codes that are provably good for minimizing transmit power. Can we develop a parallel approach in order to minimize the total system power? With simplistic encoding/decoding models, the issue of fundamental limits on total (transmit +encoding+ decoding) power has been addressed in some recent works [4], [5], [6], [7]. These fundamental limits abstract power consumed in computational nodes [5], [6] and wiring in the encoder/decoder implementation and can provide insights into the choice of the code and its corresponding decoding algorithm. While such theoretical insights can serve to guide the choice of the code family, the simplicity of these theoretical models, which (to an extent) is needed in order to be able to obtain fundamental bounds, also limits their applicability. II. FORWARD ERROR CORRECTION (FEC) Forward Error Correction is a method used to improve channel capacity by introducing redundant data into the message [8]. This redundant data allows the receiver to detect and correct errors without the need for retransmission of the message. Forward Error Correction proves advantageous in noisy channels when a large number of retransmissions would normally be required before a packet is received without error. It is also used in cases where no backward channel exists from the receiver to the transmitter. A complex algorithm or function is used to encode the message with redundant data. The process of adding redundant data to the message is called channel coding. This encoded message may or may not contain the original information in an unmodified form. III. BLOCK CODE As described by Proakis [10], linear block codes consist of fixed length vectors called code words. Block codes are described using two integers k and n, and a generator matrix or polynomial. The integer k is the number of data bits in the input to the block encoder. The integer n is the total number of bits in the generated codeword. Also, each n bit codeword is uniquely determined by the k bit input data. Another parameter used to describe is its weight. This is defined as the number of non zero elements in the code word. In general, each code word has its own weight. If all the M code words have equal weight it is said to be fixed-weight code [11]. Hamming Codes and Cyclic Redundancy Checks are two widely used examples of block codes. IV. CONVOLUTIONAL CODES Convolutional codes are codes that are generated sequentially by passing the information sequence through a linear finite-state shift register. A convolutional code is described using three parameters k, n and K. The integer k represents the number of input bits for each shift of the register. The integer n represents the number of output bits generated at each shift of the register. K is an
  • 3. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 5, May (2014), pp. 51-58 © IAEME 53 integer known as constraint length, which represents the number of k bit stages present in the encoding shift register [11]. Each possible combination of shift registers together forms a possible state of the encoder. For a code of constraint length K, there exist 2K-1 possible states. The following tables and figures show how a state diagram is drawn for a convolutional encoder. Figure 1: Convolutional encoder with a rate ½ and K =3, (7, 5). Rate ½ is used to denote the fact that for each bit of input the encoder a two bit output. K, the constraint length of the encoder being three, establishes that the input persists for 3 clock cycles. By looking at the transition of shift registers (also known as Flip Flops) FF1 and FF2, the State transition table is created for each combination of Input and Current State. This is shown in Table1. Another table can be created to demonstrate the change in output for each combination of input and previous output. Table 1: State Transition Table This is called the Output Table and is shown in Table 2.
  • 4. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 5, May (2014), pp. 51-58 © IAEME 54 Table 2: Output Table Finally, using the information from Table 1 and Table 2, the state diagram is created as shown in Figure 2. The values inside the circles indicate the state of the flip flops. The values on the arrows indicate the output of the encoder. Figure 2: State Diagram B. Trellis Diagram In a trellis diagram the mappings from current state to next state are done in a slightly different manner as shown in Figure 3. Additionally, the diagram is extended to represent all the time instances until the whole message is decoded. In the following Figure 3, a trellis diagram is drawn for the above mentioned convolutional encoder. The complete trellis diagram will replicate this figure for each time instance that is to be considered.
  • 5. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 5, May (2014), pp. 51-58 © IAEME 55 Figure 3: Trellis Diagaram V. AUTOMATIC REPEAT REQUEST (ARQ) Automatic Repeat request or ARQ is a method in which the receiver sends back a positive acknowledgement if no errors are detected in the received message. In order to do this, the transmitter sends a Cyclic Redundancy Check or CRC along with the message. The CRC check bits are calculated based on the data to be transmitted. At the receiver, the CRC is calculated again using the received bits. If the calculated CRC bits match those received, the data received is considered accurate and an acknowledgement is sent back to the transmitter. The sender waits for this acknowledgement. If it does not receive an acknowledgement (ACK) within a predefined time, or if it receives a negative acknowledgement (NAK), it retransmits the message [11]. This retransmission is done either until it receives an ACK or until it exceeds a specified number of retransmissions. This method has a number of drawbacks. Firstly, transmission of a whole message takes much longer as the sender has to keep waiting for acknowledgements from the receiver. Secondly, due to this delay, it is not possible to have practical, real-time, two-way communications [9]. VI. HYBRID AUTOMATIC REPEAT REQUEST (H-ARQ) Hybrid Automatic Repeat Request or H-ARQ is another variation of the ARQ method. In this technique, error correction information is also transmitted along with the code. This gives a better performance especially when there are a lot of errors occurring. On the flip side, it introduces a larger amount of redundancy in the information sent and therefore reduces the rate at which the actual information can be transmitted. VII. VITERBI MECHANISM Viterbi algorithm is the best error correction method used currently in communication systems. It is trade off between complexity of hardware and power consumption. There are two main mechanisms, by which Viterbi decoding may be carried out namely, the Register Exchange mechanism and the Traceback mechanism. Register exchange mechanisms, as explained by Ranpara and Sam Ha [12] store the partially decoded output sequence along the path. The advantage of this approach is that it eliminates the need for traceback and hence reduces latency. However at each stage, the contents of each register needs to be copied to the next stage. This makes the hardware complex and more energy consuming than the traceback mechanism. Traceback mechanisms use a single bit to indicate whether the survivor branch came from the upper or lower path. This information is used to traceback the surviving path from the final state to the initial state [9]. This
  • 6. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 5, May (2014), pp. 51-58 © IAEME 56 path can then be used to obtain the decoded sequence. Traceback mechanisms prove to be less energy consuming and will hence be the approach followed in this project. Decoding may be done using either hard decision inputs or soft decision inputs. Inputs that arrive at the receiver may not be exactly zero or one. Having been affected by noise, they will have values in between and even higher or lower than zero and one. The values may also be complex in nature. In the hard decision Viterbi decoder, each input that arrives at the receiver is converted into a binary value (either 0 or 1). In the soft decision Viterbi decoder, several levels are created and the arriving input is categorized into a level that is closest to its value. If the possible values are split into 8 decision levels, these levels may be represented by 3 bits and this is known as a 3 bit Soft decision. Figure 4 shows the various stages required to decode data using the Viterbi Algorithm. The decoding mechanism comprises of three major stages namely the Branch Metric Computation Unit, the Path Metric Computation and Add- Compare-Select (ACS) Unit and the Traceback Unit. A schematic representation of the decoder is described below. Figure 4: Schematic representation of the Viterbi decoding block Block 1. Branch Metric Computation (BMC): For each state, the Hamming distance between the received bits and the expected bits is calculated. Hamming distance between two symbols of the same length is calculated as the number of bits that are different between them. These branch metric values are passed to Block 2. If soft decision inputs were to be used, branch metric would be calculated as the squared Euclidean distance between the received symbols. The squared Euclidean distance is given as (a1-b1)2 + (a2-b2)2 + (a3-b3)2 where a1, a2, a3 and b1, b2, b3 are the three soft decision bits of the received and expected bits respectively. A path metric unit summarizes branch metrics to get metrics for paths, where K is the constraint length of the code, one of which can eventually be chosen as optimal. Every clock it makes decisions, throwing off wittingly nonoptimal paths. The results of these decisions are written to the memory of a traceback unit. The core elements of a PMU are ACS (Add-Compare- Select) units. The way in which they are connected between themselves is defined by a specific code's trellis diagram. It is possible to monitor the noise level on the incoming bit stream by monitoring the rate of growth of the "best" path metric. A simpler way to do this is to monitor a single location or "state" and watch it pass "upward" through say four discrete levels within the range of the accumulator. As it passes upward through each of these thresholds, a counter is incremented that reflects the "noise" present on the incoming signal. Block 3. Traceback Unit: The global winner for the current state is received from Block 2. Its predecessor is selected in the manner described in previous section. In this way, working backwards through the trellis, the path with the minimum accumulated path metric is selected. This path is known as the traceback path. A diagrammatic description will help visualize this process. Figure 5 describes the trellis diagram for a ½ K=3 (7, 5) coder with sample input taken as the received data.
  • 7. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 5, May (2014), pp. 51-58 © IAEME 57 Figure 5: Selected minimum error path for a ½ K = 3 (7, 5) coder VII. CONCLUSION Convolutional encoding with Viterbi decoding is a powerful method for forward error correction. It has been widely deployed in many wireless communication systems to improve the limited capacity of the communication channels. Now a days convolutional encoders are used in all communication at the transmitter and the transmitter channel is more prone to Additive White Gaussian Noise (AWGN) which introduces error in data. To correct errors either sequential decoding (Fano coding) or most likelihood mechanism (viterbi decoder) is used. But viterbi decoder corrects error exactly. Viterbi decoder assumes that errors occur infrequently, the probability of error is small and errors are distributed randomly. REFERENCES [1]. Sklar, B., 2001. Digital Communications – Fundamentals and Applications. 2nd ed. New Jersey: Prentice Hall . [2]. C. E. Shannon, ―A mathematical theory of communication,ǁ Bell Sys. Tech. Jour., vol. 27, pp. 379–423, 623–656, Jul./Oct. 1948. [3]. T. Richardson and R. Urbanke, Modern Coding Theory. Cambridge University Press, 2007. [4]. Z. Zhang, V. Anantharam, M. Wainwright, and B. Nikolic, ―An efficient 10 GBASE-T ethernet LDPC decoder design with low error floors,ǁ IEEE Journal of Solid-State Circuits, vol. 45, no. 4, pp. 843 –855, Apr. 2010. [5]. P. Grover, K. Woyach, and A. Sahai, ―Towards a communication theoretic understanding of system-level power consumption,ǁ IEEE J. Select. Areas Commun., vol. 29, no. 8, pp. 1744 – 1755, Sept. 2011. [6]. P. Grover, A. Goldsmith, and A. Sahai, ―Fundamental limits on complexity and power consumption in coded communication,ǁ in extended version of paper presented at ISIT‘12, Feb. 2012. [7]. P. Grover and A. Sahai, ―Fundamental bounds on the interconnect complexity of decoder implementations,ǁ in Proc. of the 45th Annual Conference on Information Sciences and Systems (CISS), March 2011, pp. 1 – 6.
  • 8. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 5, May (2014), pp. 51-58 © IAEME 58 [8]. Green codes: Energy-efficient short-range communication,ǁ in Proceedings of the 2008 IEEE Symposium on Information Theory, Toronto, Canada, Jul. 2008. [9]. Vikas Gupta and Dr. Chanderkant Verma , International Journal of Advanced Research in Computer Science and Software Engineering 2 (11), November- 2012, pp. 212-218. [10]. Proakis, J.G., 2003. Digital Communications. 3rd ed. New York: McGraw-Hill, Inc. [11]. Wikipedia. General Algorithm - Hamming Codes. [Online]. Available at: <http://en.wikipedia.org/wiki/Hamming_code#General_algorithm> [Accessed 15 May 2010]. [12]. Ranpara, S.; Dong Sam Ha, 1999. A low-power Viterbi decoder design for wireless communications applications. IEEE Proceedings of the Twelfth Annual IEEE International Int. ASIC Conference 1999, Washington, DC, 15-18 Sept. 1999, pp. 377-381. [13]. Hanamane M.D, Atar K.D and Mudholkar R.R, “Fuzzy Based Co-Generation Power Plant Optimization Model for Sugar Industry”, International Journal of Electronics and Communication Engineering & Technology (IJECET), Volume 4, Issue 3, 2013, pp. 139 - 147, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472. [14]. Dr. Vinodkumar Jacob, Dr. M. Bhasi and Dr. Gopikakumari, “Characterization of Measurement Error and Uncertainty in Working Standards”, International Journal of Advanced Research in Engineering & Technology (IJARET), Volume 4, Issue 5, 2013, pp. 106 - 125, ISSN Print: 0976-6480, ISSN Online: 0976-6499. [15]. Prof. Vijay K. Patel and Dr D. J. Shah,, “Comparison and Analysis of Combining Techniques for Spatial Multiplexing/Space Time Block Coded Systems in Rayleigh Fading Channel”, International Journal of Electronics and Communication Engineering & Technology (IJECET), Volume 2, Issue 1, 2011, pp. 1 - 10, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472.