Spelling suggestions: "subject:"error control coding."" "subject:"arror control coding.""
21 |
Turbo Receiver for Spread Spectrum Systems Employing Parity Bit Selected Spreading SequencesMirzaee, Alireza January 2012 (has links)
In spread spectrum systems employing parity bit selected spreading sequences, parity
bits generated from a linear block encoder are used to select a spreading code from
a set of mutually orthogonal spreading sequences. In this thesis, turbo receivers for
SS-PB systems are proposed and investigated. In the transmitter, data bits are rst
convolutionally encoded before being fed into SS-PB modulator. In fact, the parity
bit spreading code selection technique acts as an inner encoder in this system without
allocating any transmit energy to the additional redundancy provided by this technique.
The receiver implements a turbo processing by iteratively exchanging the soft information
on coded bits between a SISO detector and a SISO decoder. In this system,
detection is performed by incorporating the extrinsic information provided by the decoder
in the last iteration into the received signal to calculate the likelihood of each
detected bit in terms of LLR which is used as the input for a SISO decoder.
In addition, SISO detectors are proposed for MC-CDMA and MIMO-CDMA systems
that employ parity bit selected and permutation spreading. In the case of multiuser
scenario, a turbo SISO multiuser detector is introduced for SS-PB systems for both
synchronous and asynchronous channels. In such systems, MAI is estimated from the
extrinsic information provided by the SISO channel decoder in the previous iteration.
SISO multiuser detectors are also proposed for the case of multiple users in MC-CDMA
and MIMO-CDMA systems when parity bit selected and permutation spreading are used.
Simulations performed for all the proposed turbo receivers show a signi cant reduction
in BER in AWGN and fading channels over multiple iterations.
|
22 |
Cross-layer design for multi-hop two-way relay networkZhang, Haoyuan 28 June 2017 (has links)
Physical layer network coding (PNC) was proposed under the two-way relay hannel (TWRC) scenario, where two sources exchange information aided by a relay. PNC allows the two sources to transmit to the relay simultaneously, where superimposed signals at the relay can be mapped to network-coded symbols and then be broadcast to both sources instead of being treated as interference. Concurrent transmissions using PNC achieve a higher spectrum efficiency compared to time division and network coding solutions. Existing research mainly focused on the symmetric PNC designs, where the same channel coding and modulation configurations are applied by both sources. When the channel conditions of the two source-relay links are asymmetric or unequal amount of data are exchanged, heterogeneous modulation PNC designs are necessary. In additional, the design and optimization of multi-hop PNC, where multiple relays forming a multi-hop path between the two sources, remains an open issue. The above issues motivate the study of this dissertation.
This dissertation investigates the design of heterogeneous modulation physical
layer network coding (HePNC), the integration of channel error control coding into HePNC, the combination of HePNC with hierarchical modulation, and the design and generalization of multi-hop PNC. The contributions of this dissertation are four-fold.
First, under the asymmetric TWRC scenario, where the channel conditions of
the two source-relay links are asymmetric, we designed a HePNC protocol, including the optimization of the adaptive mapping functions and the bit-symbol labeling, to minimize the end-to-end BER. In addition, we developed an analytical framework to derive the BER of HePNC. HePNC can substantially enhance the throughput compared to the existing symmetric PNC under the asymmetric TWRC scenario.
Second, we investigated channel coded HePNC and integrated the channel error
control coding into HePNC in a link-to-link coding, where the relay tries to decode the superimposed codewords in the multi-access stage. A full-state sum-product decoding algorithm is proposed at the relay based on the repeat-accumulate codes to guarantee reliable end-to-end communication.
Third, we proposed hierarchical modulation PNC (H-PNC) under asymmetric TWRC, where additional data exchange between the relay and the source with the relatively better channel condition is achieved in addition to that between the two end sources, benefiting from superimposing the additional data flow on the PNC transmission. When the relay also has the data exchange requirement with the source with a better source-relay channel, H-PNC outperforms HePNC and PNC in terms of the system sum throughput.
Fourth, we designed and generalized multi-hop PNC, where multiple relays located in a linear topology are scheduled to support the data exchange between two end sources. The impact of error propagation and mutual interference among the nodes are addressed and optimized. The proposed designs outperform the existing ones in terms of end-to-end BER and end-to-end throughout. / Graduate
|
23 |
Distance Distribution and Error Performance of Reduced Dimensional Circular Trellis Coded ModulationBaldiwala, Aliasgar M. January 2003 (has links)
No description available.
|
24 |
Projective Space Codes for the Injection MetricKhaleghi, Azadeh 12 February 2010 (has links)
In the context of error control in random linear network coding, it is useful to construct codes that comprise well-separated collections of subspaces of a vector space over a finite field.
This thesis concerns the construction of non-constant-dimension projective space codes for adversarial error-correction in random linear network coding. The metric used
is the so-called injection distance introduced by Silva and Kschischang, which perfectly reflects the adversarial nature of the channel.
A Gilbert-Varshamov-type bound for such codes is derived and its asymptotic behaviour is analysed. It is shown that in the limit as the ambient space dimension approaches infinity, the Gilbert-Varshamov bound on the size of non-constant-dimension codes behaves similar to the Gilbert-Varshamov bound on the size of constant-dimension codes contained within the largest Grassmannians in the projective space.
Using the code-construction framework of Etzion and Silberstein, new non-constant-dimension codes are constructed; these codes contain more codewords than comparable codes designed for the subspace metric. To our knowledge this work is the first to address
the construction of non-constant-dimension codes designed for the injection metric.
|
25 |
Projective Space Codes for the Injection MetricKhaleghi, Azadeh 12 February 2010 (has links)
In the context of error control in random linear network coding, it is useful to construct codes that comprise well-separated collections of subspaces of a vector space over a finite field.
This thesis concerns the construction of non-constant-dimension projective space codes for adversarial error-correction in random linear network coding. The metric used
is the so-called injection distance introduced by Silva and Kschischang, which perfectly reflects the adversarial nature of the channel.
A Gilbert-Varshamov-type bound for such codes is derived and its asymptotic behaviour is analysed. It is shown that in the limit as the ambient space dimension approaches infinity, the Gilbert-Varshamov bound on the size of non-constant-dimension codes behaves similar to the Gilbert-Varshamov bound on the size of constant-dimension codes contained within the largest Grassmannians in the projective space.
Using the code-construction framework of Etzion and Silberstein, new non-constant-dimension codes are constructed; these codes contain more codewords than comparable codes designed for the subspace metric. To our knowledge this work is the first to address
the construction of non-constant-dimension codes designed for the injection metric.
|
26 |
Avaliação de desempenho de esquemas de modulação e codificação na presença de interferência de co-canal / Performance evaluation of modulation and coding schemes in the presence of co-channel interferenceAltamirano Carrillo, Carlos Daniel 19 August 2018 (has links)
Orientador: Celso de Almeida / Dissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia Elétrica e de Computação / Made available in DSpace on 2018-08-19T04:18:46Z (GMT). No. of bitstreams: 1
AltamiranoCarrillo_CarlosDaniel_M.pdf: 813233 bytes, checksum: 862b6d12c2e773acbd4f388a59e9eadd (MD5)
Previous issue date: 2011 / Resumo: Este trabalho avalia os efeitos da interferência de co-canal na taxa de erro de bits (BER) de sistemas de transmissão digitais sem fio. O ambiente do sistema considera canais com ruído gaussiano (AWGN) e canais com desvanecimento Rayleigh na presença de um interferente de co-canal dominante, onde os usuários empregam esquemas de modulação BPSK e M-QAM e também códigos corretores de erros. Os códigos corretores de erros utilizados em sistemas com expansão de banda são os códigos convolucional e turbo, e em sistemas sem expansão de banda são a modulação-codificada por treliça (TCM) e a modulação-codificada turbo (TTCM). Os efeitos da interferência de co-canal na taxa de erro de bit serão avaliados derivando-se expressões teóricas e mediante a simulação de Monte Carlo, variando o tipo de canal e os esquemas de modulação e codificação. Este trabalho mostra que a interferência de co-canal introduz patamares na taxa de erro de bit, que os sistemas sem expansão de banda são mais susceptíveis à interferência e que os códigos corretores de erro são uma boa ferramenta para mitigar os efeitos da interferência de co-canal / Abstract: This work evaluates the effects of co-channel interference on the bit error rate (BER) of digital transmission systems. The transmission system considers gaussian noise channels (AWGN) and Rayleigh fading channels in the presence of a dominant co-channel interferer, where all users employ BPSK and M-QAM modulations and error control coding. For systems that present bandwidth expansion the considered error control codes are convolutional and turbo codes, and for systems that do not present bandwidth expansion are considered trellis coded modulation (TCM) and turbo trellis coded modulation (TTCM). The effects of co-channel interference on the bit error rate are evaluated by deriving theoretical expressions and via Monte Carlo simulation, varying the channel type, the modulation and coding schemes. This work shows that co-channel interference introduces floors on the bit error rate, that systems without bandwidth expansion are more susceptible to interference, and that error control codes are a good tool to mitigate the co-channel interference effects / Mestrado / Telecomunicações e Telemática / Mestre em Engenharia Elétrica
|
27 |
Modern Error Control Codes and Applications to Distributed Source CodingSartipi, Mina 15 August 2006 (has links)
This dissertation first studies two-dimensional wavelet codes (TDWCs). TDWCs
are introduced as a solution to the problem of designing a 2-D code that has low decoding-
complexity and has the maximum erasure-correcting property for rectangular burst erasures.
The half-rate TDWCs of dimensions N<sub>1</sub> X N<sub>2</sub> satisfy the Reiger bound with equality for
burst erasures of dimensions N<sub>1</sub> X N<sub>2</sub>/2 and N<sub>1</sub>/2 X N<sub>2</sub>, where GCD(N<sub>1</sub>,N<sub>2</sub>) = 2. Examples
of TDWC are provided that recover any rectangular burst erasure of area N<sub>1</sub>N<sub>2</sub>/2. These
lattice-cyclic codes can recover burst erasures with a simple and efficient ML decoding.
This work then studies the problem of distributed source coding for two and three correlated signals using channel codes. We propose to model the distributed source coding
problem with a set of parallel channel that simplifies the distributed source coding to de-
signing non-uniform channel codes. This design criterion improves the performance of the
source coding considerably. LDPC codes are used for lossless and lossy distributed source
coding, when the correlation parameter is known or unknown at the time of code design.
We show that distributed source coding at the corner point using LDPC codes is simplified
to non-uniform LDPC code and semi-random punctured LDPC codes for a system of two
and three correlated sources, respectively. We also investigate distributed source coding at
any arbitrary rate on the Slepian-Wolf rate region. This problem is simplified to designing
a rate-compatible LDPC code that has unequal error protection property. This dissertation
finally studies the distributed source coding problem for applications whose wireless channel is an erasure channel with unknown erasure probability. For these application, rateless
codes are better candidates than LDPC codes. Non-uniform rateless codes and improved
decoding algorithm are proposed for this purpose. We introduce a reliable, rate-optimal,
and energy-efficient multicast algorithm that uses distributed source coding and rateless
coding. The proposed multicast algorithm performs very close to network coding, while it
has lower complexity and higher adaptability.
|
28 |
Low Overhead Soft Error Mitigation MethodologiesPrasanth, V January 2012 (has links) (PDF)
CMOS technology scaling is bringing new challenges to the designers in the form of new failure modes. The challenges include long term reliability failures and particle strike induced random failures. Studies have shown that increasingly, the largest contributor to the device reliability failures will be soft errors. Due to reliability concerns, the adoption of soft error mitigation techniques is on the increase. As the soft error mitigation techniques are increasingly adopted, the area and performance overhead incurred in their implementation also becomes pertinent. This thesis addresses the problem of providing low cost soft error mitigation.
The main contributions of this thesis include, (i) proposal of a new delayed capture methodology for low overhead soft error detection, (ii) adopting Error Control Coding (ECC) for delayed capture methodology for correction of single event upsets, (iii) analyzing the impact of different derating factors to reduce the hardware overhead incurred by the above implementations, and (iv) proposal for hardware software co-design for reliability based upon critical component identification determined by the application executing on the hardware (as against standalone hardware analysis).
This thesis first surveys existing soft error mitigation techniques and their associated limitations. It proposes a new delayed capture methodology as a low overhead soft error detection technique. Delayed capture methodology is an enhancement of the Razor flip-flop methodology. In the delayed capture methodology, the parity for a set of flip-flops is calculated at their inputs and outputs. The input parity is latched on a second clock, which is delayed with respect to the functional clock by more than the soft error pulse width. It requires an extra flip-flop for each set of flip-flops. On the other hand, in the Razor flip-flop methodology an additional flip-flop is required for every functional flip-flop. Due to the skew in the clocks, either the parity flip-flop or the functional flip-flop will capture the effect of transient, and hence by comparing the output parity and latched input parity an error can be detected. Fault injection experiments are performed to evaluate the bneefits and limitations of the proposed approach.
The limitations include soft error detection escapes and lack of error correction capability. Different cases of soft error detection escapes are analyzed. They are attributed mainly to a Single Event Upset (SEU) causing multiple flip-flops within a group to be in error. The error space due to SEUs is analyzed and an intelligent flip-flop grouping method using graph theoretic formulations is proposed such that no SEU can cause multiple flip-flops within a group to be in error. Once the error occurs, leaving the correction aspects to the application may not be desirable. The proposed delayed capture methodology is extended to replace parity codes with codes having higher redundancy to enable correction. The hardware overhead due to the proposed methodology is analyzed and an area savings of about 15% is obtained when compared to an existing soft error mitigation methodology with equivalent coverage.
The impact of different derating factors in determining the hardware overhead due to the soft error mitigation methodology is then analyzed. We have considered electrical derating and timing derating information for the evaluation purpose. The area overhead of the circuit with implementation of delayed capture methodology, considering different derating factors standalone and in combination is then analyzed. Results indicate that in different circuits, either a combination of these derating factors yield optimal results, or each of them considered standalone. This is due to the dependency of the solution on the heuristic nature of the algorithms used. About 23% area savings are obtained by employing these derating factors for a more optimal grouping of flip-flops.
A new paradigm of hardware software co-design for reliability is finally proposed. This is based on application derating in which the application / firmware code is profiled to identify the critical components which must be guarded from soft errors. This identification is based on the ability of the application software to tolerate certain errors in hardware. An algorithm to identify critical components in the control logic based on fault injection is developed. Experimental results indicated that for a safety critical automotive application, only 12% of the sequential logic elements were found to be critical. This approach provides a framework for investigating how software methods can complement hardware methods, to provide a reduced hardware solution for soft error mitigation.
|
29 |
Coding for wireless ad-hoc and sensor networks: unequal error protection and efficient data broadcastingRahnavard, Nazanin 27 August 2007 (has links)
This thesis investigates both theoretical and practical aspects of
the design and analysis of modern error-control coding schemes,
namely low-density parity-check (LDPC) codes and rateless codes for
unequal error protection (UEP). It also studies the application of
modern error-control codes in efficient data dissemination in
wireless ad-hoc and sensor networks.
Two methodologies for the design and analysis of UEP-LDPC codes are
proposed. For these proposed ensembles, density evolution formulas
over the binary erasure channel are derived and used to optimize the
degree distribution of the codes. Furthermore, for the first time,
rateless codes that can provide UEP are developed. In addition to
providing UEP, the proposed codes can be used in applications for
which unequal recovery time is desirable, i.e., when more important
parts of data are required to be recovered faster than less
important parts. Asymptotic behavior of the UEP-rateless codes under
the iterative decoding is investigated. In addition, the performance
of the proposed codes is examined under the maximum-likelihood
decoding, when the codes have short to moderate lengths. Results
show that UEP-rateless codes are able to provide very low error
rates for more important bits with only a subtle loss in the
performance of less important bits. Moreover, it is shown that given
a target bit error rate, different parts of the information symbols
can be decoded after receiving different numbers of encoded symbols.
This implies that information can be recovered in a progressive
manner, which is of interest in many practical applications such as
media-on-demand systems.
This work also explores fundamental research problems related to
applying error-control coding such as rateless coding to the problem
of reliable and energy-efficient broadcasting in multihop wireless
ad-hoc sensor networks. The proposed research touches on the four
very large fields of wireless networking, coding theory, graph
theory, and percolation theory. Based on the level of information
that each node has about the network topology, several reliable and
energy-efficient schemes are proposed, all of which are distributed
and have low complexity of implementation. The first protocol does
not require any information about the network topology. Another
protocol, which is more energy efficient, assumes each node has
local information about the network topology. In addition, this work
proposes a distributed scheme for finding low-cost broadcast trees
in wireless networks. This scheme takes into account various
parameters such as distances between nodes and link losses. This
protocol is then extended to find low-cost multicast trees. Several
schemes are extensively simulated and are compared.
|
30 |
Možnosti kódového zabezpečení stanic s kmitočtovým skákáním / Possibilities of Error Controls in Frequency hopping StationsPust, Radim January 2012 (has links)
The doctoral thesis deals with design of coding for frequency hopping stations in band with intensive jamming. In digital modulations erroneous determination of the modulation state occurs due to jam at the receiver side. The result is erroneously transferred symbols of the message. Errors created during the transmission can be eliminated by using error control systems. It is also possible to prevent these errors by using algorithms (techniques) of frequency hopping which select the appropriate channel. Appropriate communication channel is a channel with a lower probability of erroneous symbol in the message. The main contribution of this thesis is to design a new frequency hopping technique with collision avoidance (FH/CA). The station with FH/CA technique measures signal levels in the considered several channels before every jump. Based on the measurements the most appropriate channel with the lowest value of measured signal level is selected. Therefore, it is more probable that a jump to an unoccupied channel with a transmission will occur. Using a mathematical model, the performance of the newly proposed FH/CA technique is compared with the currently used techniques FH and AFH. Comparison criteria are the probability of a collision between an FH/CA communication system and a static (device transmitting continuously at a fixed frequency) or dynamic jammer (i.e. other FH or AFH systems). By comparing the values of the probability of jammed transmission, indisputable theoretical advantages of the new FH/CA technique were found, compared to the currently used FH and AFH techniques. The FH/CA technique always has better or equal results compared with the FH technique in the case of interference by static and dynamic jammers. The FH/CA technique in a band with static and dynamic jammers usually has better results than the AFH technique. A significant contribution of the FH/CA technique can be seen in the case of dynamic jammers. On the other hand, in the case of static jammers the FH/CA technique is in certain situations worse than the AFH technique. The accuracy of the mathematical models were successfully verified on a simulation model that was created as a part of this thesis in the MATLAB environment. Based on the obtained data from the model there was designed coding for frequency hopping stations with the new technique of frequency hopping FH/CA which is designed for small-volume data transfer in a band with intensive jamming.
|
Page generated in 0.0848 seconds