block code
Recently Published Documents


TOTAL DOCUMENTS

539
(FIVE YEARS 72)

H-INDEX

23
(FIVE YEARS 2)

2021 ◽  
pp. 157-163
Author(s):  
Anirban Patra ◽  
Arindam Banerjee ◽  
Aniruddha Ghosh ◽  
Mainuck Das ◽  
Samiran Roy ◽  
...  

2021 ◽  
Author(s):  
Abiodun Sholiyi ◽  
Timothy O Farrell

Abstract The term Block Turbo Code typically refers to the iterative decoding of a serially concatenated two-dimensional systematic block code. This paper introduces a Vector Turbo Code that is irregular but with code rates comparable to those of a Block Turbo Code (BTC) when the Bahl Cocke Jelinek Raviv (BCJR) algorithm is used. In Block Turbo Codes, the horizontal (or vertical) blocks are encoded first and the vertical (or horizontal) blocks second. The irregular Vector Turbo Code (iVTC) uses information bits that participate in varying numbers of trellis sections, which are organized into blocks that are encoded horizontally (or vertical) without vertical (or horizontal) encoding. The decoding requires only one soft-input soft-output (SISO) decoder. In general, a reduction in complexity, in comparison to a Block Turbo Code was achieved for the same very low probability of bit error (10−5 ). Performance in the AWGN channel shows that iVTC is capable of achieving a significant coding gain of 1.28 dB for a 64QAM modulation scheme, at a bit error rate (BER) of 10−5over its corresponding Block Turbo Code. Simulation results also show that some of these codes perform within 0.49 dB of capacity for binary transmission over an AWGN channel.


Security plays a crucial role in the field of Social media network. Securing the data become one among the largest challenges in the present scenario. Whenever we expect concerning the cyber security, the primary issue that involves our mind is ‘cyber crimes’ that are increasing vastly day by day. Embedding secret message into the image (Steganography) is associated with art and science of secure data communication wherever the key information or confidential information is hidden in host file. It's employed incompletely different helpful applications like secure electronic communication, health care and military. Confidential information’s are unremarkably keep in digital media and transmitted via network cause of rapid growth of internet. In this paper, steganography techniques which might be used to safeguard the information from intruders. Here, Steganographic technique is used to hide multiple secret images into a single 24-bit cover image using Least Significant Bit (LSB) and dual steganography method. Multiple secret images are scrambled and encoded before hiding into cover image using Arnold Transform and Block Code Encoding. The Proposed technique is Block Code Encoding to convert Secret message to binary and bit pairs to form safer information. The main goals of proposed work offers security and high limit based steganography plan of concealing a massive size secret image into a bit size cover image, to enhance security using dual steganography, image quality and to reduce error.


2021 ◽  
Vol 9 (4) ◽  
pp. 0-0

Most modern relational database systems use triggers to implement automatic tasks in response to specific events happening inside or outside a system. A database trigger is a human readable block code without any formal semantics. Frequently, people can check if a trigger is designed correctly after it is executed or with human inspection. In this article, the authors introduce a new method to model and verify database trigger systems using Event-B formal method at early design phase. First, the authors make use of the similar mechanism between triggers and Event-B events to propose a set of rules translating a database trigger system into Event-B constructs. Then, the authors show how to verify data constraint preservation properties and detect infinite loops of trigger execution with RODIN/Event-B. The authors also illustrate the proposed method on a case study. Finally, a tool named Trigger2B which partly supports the automatic modeling process is presented.


Author(s):  
Wurod Qasim Mohamed ◽  
Marwa Al–Sultani ◽  
Haraa Raheem Hatem

The modern technologies of the image transmission look for ultra-reducing of the error transmission in addition to enhancing the security over a wireless communication channel. This paper is applied and discussed two different techniques to achieve these requirements, which are linear block code (LBC) and two-dimensions (2-D) interleaving approach. We investigate a new approach of 2-D interleaving that increases the security of the image transmission and helps to diminution the bit error probability (BER). Using an investigated 2-D interleaving grouping LBC approach on image transmission, the system achieves a higher-security information and a better BER comparing with the other systems. It was done by means of peak signal to noise ratio (PSNR) and histogram analysis tests. Simulation results state these enhancements.


2021 ◽  
Vol 9 (4) ◽  
pp. 1-16
Author(s):  
Anh Hong Le ◽  
To Van Khanh ◽  
Truong Ninh Thuan

Most modern relational database systems use triggers to implement automatic tasks in response to specific events happening inside or outside a system. A database trigger is a human readable block code without any formal semantics. Frequently, people can check if a trigger is designed correctly after it is executed or by manual checking. In this article, the authors introduce a new method to model and verify database trigger systems using Event-B formal method at design phase. First, the authors make use of similar mechanism between triggers and Event-B events to propose a set of rules translating a database trigger system into Event-B constructs. Then, the authors show how to verify data constraint preservation properties and detect infinite loops of trigger execution with RODIN/Event-B. The authors also illustrate the proposed method with a case study. Finally, a tool named Trigger2B which partly supports the automatic modeling process is presented.


Author(s):  
Ravi Shankar ◽  
Patteti Krishna ◽  
Naraiah R

With the tremendous increase in wireless user traffic, investigation on the end-to-end reliability of wireless networks in practical conditions such as non-homogeneous fading channel conditions is becoming increasingly widespread. Because they fit well to the experimental data, generalized channel fading distributions like κ–μ are well suited for modeling diverse fading channels. This paper analyzes the symbol error rate (SER) and outage probability (OP) performance of multiple-input multiple-output (MIMO) space-time block-code (STBC) selective decode and forward (S-DF) network over κ–μ fading channel conditions considering the additive white Gaussian noise (AWGN). First, the closed-form (CF) analytical expressions for the probability density function (PDF) and the cumulative distribution function (CDF) of the received signal-to-noise ratio (SNR) as well as its moment generating function (MGF) are derived. Second, the OP performance is then investigated for various values of the channel fading parameter and SNR regimes. The simulation findings show an increase in SER performance with an improved line-of-sight (LOS) component. Furthermore, the results show that the S-DF relaying systems can function properly even when there is no fading or LOS component. The OP has been increasing with the increase in the value of μ and κ. In medium and high SNR regimes, simulation results exactly match with analytical results.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Nitin Tejram Deotale

Purpose To enhance the performance transmit antenna selection (TAS) of spatial modulation (SM), systems technique needs to be essential. This TAS is an effective technique for reducing the multiple input multiple output (MIMO) systems computational difficulty, and bit error rate (BER) can increase remarkably by various TAS algorithms. But these selection methods cannot provide code gain, so it is essential to join the TAS with external code to obtain cy -ode gain advantages in BER. Design/methodology/approach In this paper, Bose–Chaudhuri–Hocquenghem (BCH)-Turbo code TC is combined with the orthogonal space time block code system. Findings In some existing work, the improved BER has been perceived by joining forward error correction code and space time block code (STBC) for MIMO systems provided greater code gain. The proposed work can provide increasing code gain and the effective advantages of the TAS-OSTBC system. Originality/value To perform the system analysis, Rayleigh channel is used. In the case with multiple TAS-OSTBC systems, better performance can provide by this new joint of the BCH-Turbo compared to the conventional Turbo code for the Rayleigh fading.


Sign in / Sign up

Export Citation Format

Share Document