Efficient implementation of Gaussian elimination method to recover generator polynomials of convolutional codes

M. Atif, A. Rauf
{"title":"Efficient implementation of Gaussian elimination method to recover generator polynomials of convolutional codes","authors":"M. Atif, A. Rauf","doi":"10.1109/ICET.2009.5353183","DOIUrl":null,"url":null,"abstract":"One of the most important objectives in wireless communication is to transmit the information free of errors and to detect the data correctly. With a view to avoid occurrence of errors in communication channel, error correction techniques, also called channel coding, are used. Convolution encoding technique is the forerunner amongst those employed. In wireless communication systems, signal strength decreases logarithmically and results in fading. This fading causes random errors or burst errors (in case of deep fades). The burst errors are converted to random errors by interleaving techniques and then channel coding is used to combat the random errors. In convolutional codes, information bits are encoded by using primitive polynomials implemented in the form of shift registers. In this paper a method is proposed to detect the generator polynomial and the code rate of the convolution encoded data, once received. The information is encoded by Convolution (n, k, m) codes and then its generator polynomial is detected by using the Gaussian Elimination Method. Here n shows the data bit (parity and information), k represents the information bits and m shows the length of the registers. In Gaussian elimination method the variables are removed step by step. This elimination is different from the normal one in a sense that it is implemented over GF (2). This detection algorithm can be utilized efficiently to match convolutionally encoded reference stream to the one generated by above-mentioned convolutional encoder. This can also be utilized to verify the generator polynomial of the encoded output stream before feeding it to the complex decoder to avoid time-consuming and exhaustive debugging.","PeriodicalId":307661,"journal":{"name":"2009 International Conference on Emerging Technologies","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Emerging Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICET.2009.5353183","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

Abstract

One of the most important objectives in wireless communication is to transmit the information free of errors and to detect the data correctly. With a view to avoid occurrence of errors in communication channel, error correction techniques, also called channel coding, are used. Convolution encoding technique is the forerunner amongst those employed. In wireless communication systems, signal strength decreases logarithmically and results in fading. This fading causes random errors or burst errors (in case of deep fades). The burst errors are converted to random errors by interleaving techniques and then channel coding is used to combat the random errors. In convolutional codes, information bits are encoded by using primitive polynomials implemented in the form of shift registers. In this paper a method is proposed to detect the generator polynomial and the code rate of the convolution encoded data, once received. The information is encoded by Convolution (n, k, m) codes and then its generator polynomial is detected by using the Gaussian Elimination Method. Here n shows the data bit (parity and information), k represents the information bits and m shows the length of the registers. In Gaussian elimination method the variables are removed step by step. This elimination is different from the normal one in a sense that it is implemented over GF (2). This detection algorithm can be utilized efficiently to match convolutionally encoded reference stream to the one generated by above-mentioned convolutional encoder. This can also be utilized to verify the generator polynomial of the encoded output stream before feeding it to the complex decoder to avoid time-consuming and exhaustive debugging.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
高斯消去法在卷积码生成器多项式恢复中的高效实现
无线通信中最重要的目标之一是准确无误地传输信息并正确地检测数据。为了避免在通信信道中发生错误,使用了纠错技术,也称为信道编码。卷积编码技术是其中的先驱。在无线通信系统中,信号强度呈对数递减并导致衰落。这种衰落导致随机错误或突发错误(在深度衰落的情况下)。通过交错技术将突发错误转换为随机错误,然后使用信道编码来对抗随机错误。在卷积码中,信息位通过使用移位寄存器形式实现的原始多项式进行编码。本文提出了一种检测接收到的卷积编码数据的产生多项式和码率的方法。利用卷积(n, k, m)码对信息进行编码,然后利用高斯消去法检测其产生多项式。这里n表示数据位(奇偶校验和信息),k表示信息位,m表示寄存器的长度。在高斯消去法中,变量是逐步去除的。这种消除与常规的消除不同之处在于它是在GF(2)上实现的。该检测算法可以有效地将卷积编码的参考流与上述卷积编码器生成的参考流进行匹配。这也可以用来验证编码输出流的生成器多项式,然后再将其提供给复杂的解码器,以避免耗时和详尽的调试。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Analysis and verification of Two-Phase Commit & Three-Phase Commit Protocols New innovations in healthcare delivery and laparoscopic surgery in Pakistan An invisible dual watermarking scheme for authentication and copyrights protection Efficient metadata loading algorithm for generation and parsing of health level 7 version 3 messages A Self Organizing Map based Urdu Nasakh character recognition
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1