首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
The performance of either structured or random turbo-block codes and binary, systematic block codes operating over the additive white Gaussian noise (Awgn) channel, is assessed by upper bounds on the error probalities of maximum likelihood (Ml) decoding. These bounds on the block and bit error probability which depend respectively on the distance spectrum and the input-output weight enumeration function (Iowef) of these codes, are compared, for a variety of cases, to simulated performance of iterative decoding and also to some reported simulated lower bounds on the performance ofMl decoders. The comparisons facilitate to assess the efficiency of iterative decoding (as compared to the optimalMl decoding rule) on one hand and the tightness of the examined upper bounds on the other. We focus here on uniformly interleaved and parallel concatenated turbo-Hamming codes, and to that end theIowefs of Hamming and turbo-Hamming codes are calculated by an efficient algorithm. The usefulness of the bounds is demonstrated for uniformly interleaved turbo-Hamming codes at rates exceeding the cut-off rate, where the results are compared to the simulated performance of iteratively decoded turbo-Hamming codes with structured and statistical interleavers. We consider also the ensemble performance of ‘repeat and accumulate’ (Ka) codes, a family of serially concatenated turbo-block codes, introduced by Divsalar, Jin and McEliece. Although, the outer and inner codes possess a very simple structure: a repetitive and a differential encoder respectively, our upper bounds indicate impressive performance at rates considerably beyond the cut-off rate. This is also evidenced in literature by computer simulations of the performance of iteratively decodedRa codes with a particular structured interleaver.  相似文献   

2.
The superior performance of the binary turbo codes has stimulated vigorous efforts in generating bandwidth efficient modulation schemes adhering to these codes. Several approaches for the integration of turbo-coding and modulation have emerged in recent years but none seem to dominate. In the bit interleaved coded modulation (Bicm) scheme is used to achieve high bandwidth and power efficiency, while separating coding and modulation. As is now well known, theBicm scheme achieves capacity remarkably close to the constellation channel capacity. The turbo-Bicm scheme enjoys high coding diversity (well suited for fading channels), high flexibility as well as design and implementation simplicity, while maintaining good power efficiency. The system comprises one standard turbo code, an interleaver, a mapper and a modulator at the transmitter, corresponding to a demodulator, a de-interleaver and a turbo decoder at the receiver. A modified system, which improves on performance by incorporating the demodulation in the iterative decoding procedure, is investigated, and some performance gain is demonstrated, especially for low rate codes. Information theoretic arguments for the somewhat minor potential improvement in performance are detailed. The preferred mapper and interleaver for this system are considered. Extending previous works, for higher level modulations, we analyze a system including a convolutional code, an interleaver, a differential encoder (De), a mapper and a modulator at the transmitter. As for theBpsk modulation, the serial concatenation of a convolutional code withDe outperforms the single convolutional code. The serial concatenation withDe approach is analyzed also for a turbo code, where it is found to fail in achieving performance improvement. Several structures for the serial concatenation withDe are examined. These results are substantiated through the ‘spectral thinning’ phenomena of the weight distribution of the convolutional and turbocodes.  相似文献   

3.
The decoding of convolutional codes in the maximum likelihood sense is carried out in a traditional way with the Viterbi algorithm (Va). We proposed a soft and hard input decoder where theVa, associated with an relevant metric, is applied to identify the error vector rather than the information message. In this paper, we show that, with this type of decoding, the exhaustive computation of a majority ofAcs (Add Compare Select) is unnecessary. Moreover, we show that optimal performance is achieved in the case of a hard input decoder, and that performance closed to the optimum is achieved in the case of a soft input decoder, while offering of a reduction of the complexity which is all the more important than the Ec/No ratio is high (e. g. for ratio Ec/No greater than 3 dB, more than 80 % of theAcs can be avoided). We also propose an algorithm allowing rejecting a frame without having to carry out any iteration of theVa.  相似文献   

4.
We present a new multilevel coding technique for the quadrature amplitude modulation with a high number of states (64-QAM and 256-QAM). The constellation is partitioned into four subsets, two bits coded with the samebch code selecting the label of each subset. We show that our system, with a double error correctingbch code, gives better results, considering redundancy, decoding simplicity and performance, than the systems known bx now (using the Reed-Solomon code (64,62), the Lee-Nakamura and Hamming codes). Preliminary differential encoding of the two coded bits and utilisation of a transparentbch code can solve the phase ambiguity problem in a simple way.  相似文献   

5.
For coded transmission over a memoryless channel, two kinds of mutual information are considered: the mutual information between a code symbol and its noisy observation and the overall mutual information between encoder input and decoder output. The overall mutual information is interpreted as a combination of the mutual informations associated with the individual code symbols. Thus, exploiting code constraints in the decoding procedure is interpreted as combining mutual informations. For single parity check codes and repetition codes, we present bounds on the overall mutual information, which are based only on the mutual informations associated with the individual code symbols. Using these mutual information bounds, we compute bounds on extrinsic information transfer (exit) functions and bounds on information processing characteristics (ipc) for these codes.  相似文献   

6.
This paper deals with a family of error correcting codes based on circular recursive systematic convolutional (Crsc) codes. A multiple or multidimensional parallel concatenation ofCrsc codes is proposed in order to reach minimum distances comparable to those of random codes. For information blocks of size k, minimum distances as large as k/4, for a 1/2 coding rate, may be obtained if the code dimension is raised to 4 or 5. Such codes can be decoded using an iterative (“turbo”) process relying on the extrinsic information concept.  相似文献   

7.
Algebraic decoding procedures can be greatly simplified in case the number of errors being corrected is small. The authors present here a decoder which is capable of correcting errors occuring on four bits packets. The considered code is a (15, 11) Reed-Solomon code over GF (16). A Meggitttype decoder has been selected. The hardware implementation consists of 49 ttl (ls) packages and operates for the present at a rate of 5 Mbit/s. The utilisation of this decoding scheme is considered for other Reed-Solomon codes.  相似文献   

8.
This paper presents the latest results on a block turbo decoder design. We propose a block turbo decoder circuit for the error protection of small data blocks such asAtm cells on anAwgn (additive white Gaussian noise) channel with a code rate close to 0.5. A prototype was developed atEnst Bretagne. It allowsBer (bit error rate) measurements down to 10?9 and uses programmable gate arrays (Fpga Xilinx circuits). The elementary extendedBch code and the data block size can be modified to fit specifications of different applications.  相似文献   

9.
In this paper we study some turbo receiver architectures employing low-density parity check (Ldpc) codes together with orthogonal frequency division multiplexing (Ofdm) for high data rate wireless transmissions. Different demodulation schemes based on expectation-maximization (Em) algorithm are studied along with the channel impulse response (Em) algorithms. We studied differentCir guessing algorithms including the EM-based algorithms such as a space-alternating generalized expectation-maximization algorithm (Sage). It is shown that the proposed turbo-Em receiver employing a soft maximum a posteriori (Map)Em demodulator and a belief propagationLdpc decoder can perform within 1 dB from the ergodic capacity of the studiedMimo ofdm channels. Besides, we find that a suboptimum structure based on a soft interference cancellationMmse filtering demodulator exhibits negligible loss in non-correlated fadingMimo channels but suffer extra performance loss in highly correlatedMimo channels.  相似文献   

10.
The turbo decoding is a sub-optimal decoding, i.e. it is not a maximum likelihood decoding. It is important to be aware of this fact when the parameters for the scheme are chosen. This goes especially for the selection of component codes, where the selection often has been based solely on the performance at highSnr’s. We will show that it is important to base the choice on the performance at lowSnr’s. i.e. the convergence properties, as well. Further, the study of the performance with different component codes may lead to an understanding of the convergence process in the turbo decoder.  相似文献   

11.
In this paper, an iterative low-complexity receiver is proposed for Code Division Multiple Access (cdma) systems with small spreading factors. Theumts (Universal Mobile Télecommunication System) radio interface based oncdma has been designed to offer a wide range of data rates using variable spreading factors. High data rate services are obtained by using small spreading factors. For such services, the spreading sequences have bad autocor-relation properties causing the degradation of the Rake receiver performance because of the InterSymbol Interférence (isi). In order to improve the receiver performance, we propose to add a Decision Feedback Sequence Estimation (dfse) equalizer at the Rake receiver output. Thedfse is a low complexity equalizer which is able to take into accounta priori probability ratios and to deliver a posteriori probability ratios on bits in order to exchange soft information with the channel decoder, so that the proposed receiver benefits from the turbo-processing gains. Channel estimation is also treated in an iterative fashion. The complete receiver is well suited to theumts downlink system as it drastically reduces theisi while keeping a reasonable computational complexity.  相似文献   

12.
The superior performance of tree encoding and vector quantization (vq) over scalar quantization (sq) is well known. However, large constraint length (in tree encoding) and large vector length (invq), which are required for a close-to-optimum performance, are limited by the exponentially growing complexity of the source encoder. The intention of our work has been to combine tree encoding andvq, each of moderate complexity, to preserve the advantages of both block and convolutional codes. This principle was applied to the prediction error signals of images as produced by non-adaptive and adaptive linear predictors.  相似文献   

13.
This paper introduces a new environment for developing distributed systems. It is based on theTurtle uml profile. Analysis and design phases, described in previous papers, have been extended with an additional deployment phase. In this new step,Turtle components are deployed over hardware execution nodes, and nodes are connected together throughout links,Turtle deployment diagrams are given a formal semantics inRt-lotos, therefore following the approach used forTurtle analysis and design diagrams. Moreover, the paper presents a Java code generator which outputs appropriate Java code forTurtle deployment diagrams. This code is automatically deployable on networks because it implements node communication using network protocols such asUdp orRmi. ttool, the turtle toolkit has been extended to support these new diagrams and code generators. The attack of protected data exchanged throughout securedHttp sessions serves as example.  相似文献   

14.
15.
This paper presents a Multi-Carrier Code Division Multiple Access (Mc-Cdma) system analysis in a software radio context. Based on a combination of multi-carrier modulation and code division multiple access,Mc-Cdma benefits from the main advantages from both schemes: high spectral efficiency, high flexibility, multiple access capabilities, etc. It is firstly shown why, nowadays,Mc-Cdma is undoubtedly a high potential candidate for the air interface of the 4G cellular networks. TheMc-Cdma concept and the block-diagrams of the transmitter and the receiver are presented first. Afterwards, the technical issues concerning the processing devices for the implementation ofMc-Cdma systems in a software radio context are analysed. The advantages and disadvantages of Digital Signal Processors (Dsps) and Field Programmable Gate Arrays (Fgpas) components are discussed. The implementation ofMc-Cdma systems and the integration of signal processing algorithms as Fast Hadamard Transform (Fht) and Inverse Fast Fourier Transform (Ifft) are considered and analysed for the first time. Finally, implementation results with a mixed prototyping board are presented. Then, it is shown that a new combination of the flow graphs ofFht andIfft leads to interesting computation savings and that hardware structures asFgpas are more adapted thanDsps to those intensive computation functions. Finally, for the completeMc-Cdma modem implementation, the necessity of a Co-Design methodology is highlighted in order to obtain the best matching between algorithms and architecture.  相似文献   

16.
The aim of this paper is to evaluate the robustness of Parallel Interference Cancellation (Pic) to noise contribution for an optical Code Division Multiple Access system. The theoretical expression of thePic error probability is developed in the case of white additive Gaussian noise. From theoretical analysis, we show that, even with noise contribution, thePic receiver outperforms the Conventional Correlation Receiver (Ccr). Moreover, the results highlight that, for a given performance, thePic receiver relaxes not only the constraint on the code length, but also the Signal to Noise Ratio compared toCcr. Particularly, this is proofed in access network context, i.e. 30 users withBer lt; 10?9.  相似文献   

17.
StandardTcp (RenoTcp) does not perform well on fast long distance networks, due to its AMD congestion control algorithm. In this paper we consider the effectiveness of various alternatives, in particular with respect to their applicability to a production environment. We then characterize and evaluate the achievable throughput, stability and intra-protocol fairness of differentTcp stacks (Scalable,Hstcp,Htcp, FastTcp, Reno,Bictcp, hstcp-lp andLtcp) and aUdp based application level transport protocol (Udtv2) on both production and testbed networks. The characterization is made with respect to both the transient traffic (entry and exit of different streams) and the steady state traffic on production Academic and Research networks, using paths withRtts differing by a factor of 10. We also report on measurements made with 10 Gbit/secNics with and withoutTcp Offload Engines, on 10 Gbit/s dedicated paths set up forSc2004.  相似文献   

18.
This paper presents a novel active architecture for building and deploying network services:aswa, Web Services based Active network Architecture. At the architectural level,aswa defines an active node whose functionalities are divided into the Node Operating System, the Execution Environment, and the Active Applications. At the implementation level,aswa is a Web Services based platform where new components could be added and deployed, in order to dynamically modify network nodes behavior. Applications can be developed with any language and communicate across heterogeneous environments, and across Internet and Intranet structures. At the deployment levelaswa uses an active node approach, and offers a controlled deployment mode. In terms of security, Authentication of deployed code and protection of the nodes is achieved by the use ofhttps and the header extensions of thesoap envelope. Finally to validate this architecture,aswa defines a Firewall as an Active Application to secure the code deployment.  相似文献   

19.
In this paper,Lp-ofdm is combined with differentMimo schemes in order to improve performance in terms of diversity gain and to exploit capacity brought by theMimo channel. The original contribution is the development of a generic iterative receiver designed forLp mimo transmission able to work whatever the antenna configuration and the spatial coding scheme. By using a globalMmse criterion, interference terms coming from space-time coding and linear precoding are jointly treated leading to a very good trade-off between performance and complexity compared to trellis based detectors particularly for high order modulations, high number of antennas and/or large size of precoding matrices.  相似文献   

20.
In this article, we introduce a new class of product codes based on convolutional codes, called convolutional product codes. The structure of product codes enables parallel decoding, which can significantly increase decoder speed in practice. The use of convolutional codes in a product code setting makes it possible to use the vast knowledge base for convolutional codes as well as their flexibility in fast parallel decoders. Just as in turbo codes, interleaving turns out to be critical for the performance of convolutional product codes. The practical decoding advantages over serially‐concatenated convolutional codes are emphasized.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号