Performance Analysis of Turbo Codes Over AWGN Channel

2019 ◽  
Vol 19 (1) ◽  
pp. 43-48 ◽  
Author(s):  
Mohanad Abdulhamid ◽  
Mbugua Thairu

AbstractTurbo coding is a very powerful error correction technique that has made a tremendous impact on channel coding in the past two decades. It outperforms most known coding schemes by achieving near Shannon limit error correction using simple component codes and large interleavers. This paper investigates the turbo coder in detail. It presents a design and a working model of the error correction technique using Simulink, a companion softwareto MATLAB. Finally, graphical and tabular results are presented to show that the designed turbo coder works as expected.

2013 ◽  
Vol 11 ◽  
pp. 87-93 ◽  
Author(s):  
T. Arafa ◽  
W. Sauer-Greff ◽  
R. Urbansky

Abstract. In bandwidth limited communication systems, the high data rate transmission with performance close to capacity limits is achieved by applying multilevel modulation schemes in association with powerful forward error correction (FEC) coding, i.e. coded modulation systems. The most important practical approaches to coded modulation systems are multilevel coding with multistage decoding (MLC/MSD) and bit interleaved coded modulation with iterative demapping and decoding (BICM-ID). Multilevel modulation formats such as M-QAM, which can be used as a part of coded modulation systems, have the capability of multilevel protection. Based on this fact, we investigate the methods to improve the performance of BICM-ID using multiple interleavers with different binary channel coding schemes such as convolutional codes, turbo codes and low-density parity-check (LDPC) codes. Moreover, an MLC system with parallel decoding on levels (PDL) at the receiver is considered. In our contribution, we propose to design the individual coding schemes using the extrinsic information transfer (EXIT) charts for individual bit levels in the constellation. Our simulation results show that the BICM-ID systems, taking into account different bit-level protections, can provide an improvement of 0.65 dB, 1.2 dB and 1.5 dB for 256-QAM with turbo, LDPC and convolutional codes, respectively. On the other hand, MLC systems with PDL designed using EXIT charts for individual bit levels can slightly improve the performance and eliminate the error floor compared to the systems with MSD.


2015 ◽  
Vol 2015 ◽  
pp. 1-11 ◽  
Author(s):  
Tamer H. M. Soliman ◽  
Fengfan Yang ◽  
S. Ejaz

Both reliability and security are two important subjects in modern digital communications, each with a variety of subdisciplines. In this paper we introduce a new proposed secure turbo coding system which combines chaotic dynamics and turbo coding reliability together. As we utilize the chaotic maps as a tool for hiding and securing the coding design in turbo coding system, this proposed system model can provide both data secrecy and data reliability in one process to combat problems in an insecure and unreliable data channel link. To support our research, we provide different schemes to design a chaotic secure reliable turbo coding system which we call chaotic-switched turbo coding schemes. In these schemes the design of turbo codes chaotically changed depending on one or more chaotic maps. Extensions of these chaotic-switched turbo coding schemes to half-duplex relay systems are also described. Results of simulations of these new secure turbo coding schemes are compared to classical turbo codes with the same coding parameters and the proposed system is able to achieve secured reasonable bit error rate performance when it is made to switch between different puncturing and design configuration parameters especially with low switching rates.


Entropy ◽  
2019 ◽  
Vol 21 (7) ◽  
pp. 633 ◽  
Author(s):  
Josu Etxezarreta Martinez ◽  
Pedro M. Crespo ◽  
Javier Garcia-Frías

Quantum turbo codes (QTC) have shown excellent error correction capabilities in the setting of quantum communication, achieving a performance less than 1 dB away from their corresponding hashing bounds. Existing QTCs have been constructed using uniform random interleavers. However, interleaver design plays an important role in the optimization of classical turbo codes. Consequently, inspired by the widely used classical-to-quantum isomorphism, this paper studies the integration of classical interleaving design methods into the paradigm of quantum turbo coding. Simulations results demonstrate that error floors in QTCs can be lowered significantly, while decreasing memory consumption, by proper interleaving design without increasing the overall decoding complexity of the system.


2014 ◽  
Vol 644-650 ◽  
pp. 4407-4410
Author(s):  
Shao Ping Guo

The Turbo coding ingeniously combine two simple component coders, use pseudo random interleaver parallelly to construct long code which obtains random characteristic , and take advantage of iterations between the two input/output (SISO)[1,2] decoder to realize pseudorandom decoding. This paper introduces encoding and decoding principle, design and simulation performance of Turbo codes. The simulation results prove that the design scheme is correct. From the spectral character we are acknowledged: not only can Turbo code effectively against the Gauss noise, but also has strong resistance to fading and interference properties. Based on our resuls, the Turbo code in modern communication has more advantages and will play more important role.


2012 ◽  
Vol 433-440 ◽  
pp. 7213-7217
Author(s):  
Niladri Pratap Maity ◽  
Reshmi Maity

In this paper secure channel coding schemes based on Turbo Codes are suggested and implemented. The design of encoder using Recursive Systematic Code (RSC) with puncturing techniques is presented. Component decoders are implemented by Log-Maximum-a-Posteriori (Log-MAP) algorithm and thereafter implementation of overall turbo decoder is illustrated in detail. Finally we have investigated low power design technique of the turbo decoder design with variable iteration techniques.


Sensors ◽  
2021 ◽  
Vol 21 (6) ◽  
pp. 2009
Author(s):  
Fatemeh Najafi ◽  
Masoud Kaveh ◽  
Diego Martín ◽  
Mohammad Reza Mosavi

Traditional authentication techniques, such as cryptographic solutions, are vulnerable to various attacks occurring on session keys and data. Physical unclonable functions (PUFs) such as dynamic random access memory (DRAM)-based PUFs are introduced as promising security blocks to enable cryptography and authentication services. However, PUFs are often sensitive to internal and external noises, which cause reliability issues. The requirement of additional robustness and reliability leads to the involvement of error-reduction methods such as error correction codes (ECCs) and pre-selection schemes that cause considerable extra overheads. In this paper, we propose deep PUF: a deep convolutional neural network (CNN)-based scheme using the latency-based DRAM PUFs without the need for any additional error correction technique. The proposed framework provides a higher number of challenge-response pairs (CRPs) by eliminating the pre-selection and filtering mechanisms. The entire complexity of device identification is moved to the server side that enables the authentication of resource-constrained nodes. The experimental results from a 1Gb DDR3 show that the responses under varying conditions can be classified with at least a 94.9% accuracy rate by using CNN. After applying the proposed authentication steps to the classification results, we show that the probability of identification error can be drastically reduced, which leads to a highly reliable authentication.


Societies ◽  
2021 ◽  
Vol 11 (1) ◽  
pp. 6
Author(s):  
Ilyas Mohammed

Decolonisation of knowledge over the past few years has gained much traction among scholars and students in many countries. This situation has led to calls for the decolonisation of knowledge, academia, the university, and university curricula. That said, the knowledge production side of the terrorism industry, which sits inside academia, so far has escaped calls to decolonise. This situation is somewhat surprising because the terrorism industry has had a tremendous impact on many countries, especially Muslim majority ones. The 9/11 terrorist attacks have resulted in a tremendous amount of knowledge being produced and published on terrorism and counterterrorism. However, little is known about “who is publishing on terrorism and where they are based”. To this end, this paper adopts a decolonial approach and addresses the questions of “who is publishing on terrorism and where they are based” by analysing seven terrorism journals. It argues that most of the publications and knowledge on terrorism in the seven terrorism journals are produced by scholars with Western heritage and are based at Western institutions, which is connected to the coloniality of knowledge.


Author(s):  
Jung Hyun Bae ◽  
Ahmed Abotabl ◽  
Hsien-Ping Lin ◽  
Kee-Bong Song ◽  
Jungwon Lee

AbstractA 5G new radio cellular system is characterized by three main usage scenarios of enhanced mobile broadband (eMBB), ultra-reliable and low latency communications (URLLC), and massive machine type communications, which require improved throughput, latency, and reliability compared with a 4G system. This overview paper discusses key characteristics of 5G channel coding schemes which are mainly designed for the eMBB scenario as well as for partial support of the URLLC scenario focusing on low latency. Two capacity-achieving channel coding schemes of low-density parity-check (LDPC) codes and polar codes have been adopted for 5G where the former is for user data and the latter is for control information. As a coding scheme for data, 5G LDPC codes are designed to support high throughput, a variable code rate and length and hybrid automatic repeat request in addition to good error correcting capability. 5G polar codes, as a coding scheme for control, are designed to perform well with short block length while addressing a latency issue of successive cancellation decoding.


Sign in / Sign up

Export Citation Format

Share Document