SlideShare uma empresa Scribd logo
1 de 16
Implementation of Convolutional 
Encoder and Decoder 
BY-RONIT KUMAR 
111EC0175
INTRODUCTION 
• Maintenance of the quality of data is the most important thing 
in communication. There are various factors that affect the 
quality of data when it is transferred over a communication 
channel like noise, fading etc. 
• To overcome these effects channel coding schemes are 
introduced. 
• In this presentation one type of channel coding is described 
which is Convolutional Codes
Why Channel Coding? 
• In digital communication systems to improve the quality of data 
at output, channel coding is employed. It deals with various 
numbers of techniques that are being used for the 
improvement of performance of our communication system 
• It increases the information transfer rate at a fixed error rate or 
error rate can be reduced with a fixed information transfer rate. 
• The maximum performance of the system is restricted by 
Shannon limit.
Convolutional codes 
 Convolutional codes are represented by three parameters n, k, 
K. where K represents the number of shift registers used in the 
encoding part . 
 The coded sequence of n bits obtained after encoding not only 
depends on the k bit information message but also on the 
previous information bits that is transmitted. 
 Convolutional codes are same as block codes but encoder has 
an additional structure. 
 Convolutional code is a linear code and its mapping is bijective.
SYSTEM MODEL 
System Model Block Diagram
 A sequence of message bits is used as data source 
Convolutional coding is applied on the binary data . After 
encoding of image, modulation is performed. 
 Additive White Gaussian Noise (AWGN) is added when this 
coded data is passed through the channel. This noise 
changes/flips some of the data bits. 
 Convolutional decoding of the received sequence is performed 
at the receiver end. After decoding is demodulation is done and 
original transmitted message is retrieved.
Description of a convolutional encoder
• It has constraint length 3 and because two adders are used in it 
its rate is ½. 
• A bit is shifted into the leftmost stage at each input and the 
bits previously existing in the shift registers are shifted one 
position to right. 
• After applying the modulo-2 operation corresponding 
outputs are obtained. This process continues until the arrival of 
data at the input of encoder. 
• The choice of connection between the shift registers and 
adders describes the characteristics of code. By varying the 
connections, characteristics of the code can be varied.
• To describe an encoder, set of “m” connection vectors are required. 
These vectors have the same dimension as that of K (shift registers). 
These connections describe which shift register is connected with m 
adders. 
• A value of “1” in the position demonstrates that, that shift register is 
connected to the adder and a “0” in given position will indicate that 
not a single connection exits between the stage and adder. 
• For encoder shown in Fig. we can write the connection vector for 
upper connection and for lower connection as follows: 
h1=[1 1 1]…………..(1) 
h2=[1 0 1]…………..(2)
Trellis Diagram Representation 
A code branch produced by a input 0 is drawn as a solid line and that produced by a 1 is 
drawn as a dashed line. 
Each input or message sequence corresponds to specific path through the trelis.
 It explicitly brings out the fact that the convolutional encoder is 
a finite state machine. 
 The state of a convolutional encoder of rate 1/n is defined as 
the most recent (K-1) message bits moved into the encoder’s 
shift register. 
 So at time j the state of the encoder is (mj-K+1,mj-K+2,….mj-1,mj) 
 The trellis contains (L+K) levels where L is the length of the 
message sequence and K is the constraint length of the code.
The Viterbi Algorithm(Decoding of convolutional codes) 
 The viterbi algorithm is used to decode convolutional codes and any 
structure or system that can be described by a trellis. 
 It is a maximum likelihood decoding algorithm that selects the most 
probable path that maximizes the likelihood function. 
 The algorithm is based on add-compare-select the best path each time at 
each state. 
 The steps are : 
1.Walk through the trellis and compute the Hamming distance between 
that branch of r and those in the trellis.
2.At each level, consider the two paths entering the same node 
and are identical from this node onwards. From these two paths, 
the one that is closer to r at this stage will still be so at any time in 
the future. This path is retained, and the other path is discarded. 
3.Proceeding this way, at each stage one path will be saved for 
each node. These paths are called the survivors. The decoded 
sequence (based on Minimum distance Decoding) is guaranteed 
to be one of these survivors. 
4.Each survivor is associated with a metric of the accumulated 
Hamming distance (the Hamming distance up to this stage). 
5.Carry out this process until the received sequence is considered 
completely. Choose the survivor with the smallest metric.
 Simulation Results:
FUTURE WORK 
 VHDL Implementation of convolutional encoding and decoding 
 To improve performance by finding and implementing better 
coding techniques. 
References: 
 Digital Communication By Simon Haykins 
 IEEE Papers on Convolutional Coding and Decoding 
 Google
THANK YOU

Mais conteúdo relacionado

Mais procurados

Error-Correcting codes: Application of convolutional codes to Video Streaming
Error-Correcting codes: Application of convolutional codes to Video StreamingError-Correcting codes: Application of convolutional codes to Video Streaming
Error-Correcting codes: Application of convolutional codes to Video StreamingFacultad de Informática UCM
 
Tele4653 l11
Tele4653 l11Tele4653 l11
Tele4653 l11Vin Voro
 
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...Madhumita Tamhane
 
Convolution codes and turbo codes
Convolution codes and turbo codesConvolution codes and turbo codes
Convolution codes and turbo codesManish Srivastava
 
Reed Soloman and convolution codes
Reed Soloman and convolution codesReed Soloman and convolution codes
Reed Soloman and convolution codesShailesh Tanwar
 
Digital Communication: Channel Coding
Digital Communication: Channel CodingDigital Communication: Channel Coding
Digital Communication: Channel CodingDr. Sanjay M. Gulhane
 
Information Theory and Coding Question Bank
Information Theory and Coding Question BankInformation Theory and Coding Question Bank
Information Theory and Coding Question Bankmiraclebabu
 
Bit interleaved coded modulation
Bit interleaved coded modulationBit interleaved coded modulation
Bit interleaved coded modulationMridula Sharma
 
Linear block coding
Linear block codingLinear block coding
Linear block codingjknm
 
Data Communications (under graduate course) Lecture 5 of 5
Data Communications (under graduate course) Lecture 5 of 5Data Communications (under graduate course) Lecture 5 of 5
Data Communications (under graduate course) Lecture 5 of 5Randa Elanwar
 

Mais procurados (20)

Error-Correcting codes: Application of convolutional codes to Video Streaming
Error-Correcting codes: Application of convolutional codes to Video StreamingError-Correcting codes: Application of convolutional codes to Video Streaming
Error-Correcting codes: Application of convolutional codes to Video Streaming
 
Tele4653 l11
Tele4653 l11Tele4653 l11
Tele4653 l11
 
Coding
CodingCoding
Coding
 
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
 
Convolution codes and turbo codes
Convolution codes and turbo codesConvolution codes and turbo codes
Convolution codes and turbo codes
 
BCH Codes
BCH CodesBCH Codes
BCH Codes
 
Turbo Codes
Turbo CodesTurbo Codes
Turbo Codes
 
Error Control coding
Error Control codingError Control coding
Error Control coding
 
Linear block code
Linear block codeLinear block code
Linear block code
 
Reed Soloman and convolution codes
Reed Soloman and convolution codesReed Soloman and convolution codes
Reed Soloman and convolution codes
 
Channel coding
Channel coding  Channel coding
Channel coding
 
Digital Communication: Channel Coding
Digital Communication: Channel CodingDigital Communication: Channel Coding
Digital Communication: Channel Coding
 
Turbo code
Turbo codeTurbo code
Turbo code
 
Turbo Code
Turbo Code Turbo Code
Turbo Code
 
Information Theory and Coding Question Bank
Information Theory and Coding Question BankInformation Theory and Coding Question Bank
Information Theory and Coding Question Bank
 
Bit interleaved coded modulation
Bit interleaved coded modulationBit interleaved coded modulation
Bit interleaved coded modulation
 
Presentation
PresentationPresentation
Presentation
 
Linear block coding
Linear block codingLinear block coding
Linear block coding
 
Turbo codes
Turbo codesTurbo codes
Turbo codes
 
Data Communications (under graduate course) Lecture 5 of 5
Data Communications (under graduate course) Lecture 5 of 5Data Communications (under graduate course) Lecture 5 of 5
Data Communications (under graduate course) Lecture 5 of 5
 

Semelhante a Presentation 1

Chapter2-PhysicalLayer.ppt
Chapter2-PhysicalLayer.pptChapter2-PhysicalLayer.ppt
Chapter2-PhysicalLayer.pptfaisalahmed441
 
Gsm Soft Viterbi Code
Gsm Soft Viterbi CodeGsm Soft Viterbi Code
Gsm Soft Viterbi Codefrankie_z
 
ELH – 3.1: ADVANCED DIGITAL COMMUNICATION UNIT – II Coding techniques
ELH – 3.1: ADVANCED DIGITAL COMMUNICATION UNIT – II Coding techniquesELH – 3.1: ADVANCED DIGITAL COMMUNICATION UNIT – II Coding techniques
ELH – 3.1: ADVANCED DIGITAL COMMUNICATION UNIT – II Coding techniquesKuvempu University
 
Ilovepdf merged
Ilovepdf mergedIlovepdf merged
Ilovepdf mergedxyxz
 
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...IJERA Editor
 
Paper id 2720144
Paper id 2720144Paper id 2720144
Paper id 2720144IJRAT
 
simulation of turbo encoding and decoding
simulation of turbo encoding and decodingsimulation of turbo encoding and decoding
simulation of turbo encoding and decodingGulafshan Saifi
 
Hard Decision Viterbi Decoder: Implementation on FPGA and Comparison of Resou...
Hard Decision Viterbi Decoder: Implementation on FPGA and Comparison of Resou...Hard Decision Viterbi Decoder: Implementation on FPGA and Comparison of Resou...
Hard Decision Viterbi Decoder: Implementation on FPGA and Comparison of Resou...IJERA Editor
 
Analysis and Implementation of Hard-Decision Viterbi Decoding In Wireless Com...
Analysis and Implementation of Hard-Decision Viterbi Decoding In Wireless Com...Analysis and Implementation of Hard-Decision Viterbi Decoding In Wireless Com...
Analysis and Implementation of Hard-Decision Viterbi Decoding In Wireless Com...IJERA Editor
 
Ch4 Data communication and networking by neha g. kurale
Ch4 Data communication and networking by neha g. kuraleCh4 Data communication and networking by neha g. kurale
Ch4 Data communication and networking by neha g. kuraleNeha Kurale
 
Unit 4 data link layer
Unit 4 data link layerUnit 4 data link layer
Unit 4 data link layermekind
 
Chapter 2.1.1.pptx
Chapter 2.1.1.pptxChapter 2.1.1.pptx
Chapter 2.1.1.pptxbotAlert
 
Data detection with a progressive parallel ici canceller in mimo ofdm
Data detection with a progressive parallel ici canceller in mimo ofdmData detection with a progressive parallel ici canceller in mimo ofdm
Data detection with a progressive parallel ici canceller in mimo ofdmeSAT Publishing House
 
IMPLEMENTATION OF JOINT NETWORK CHANNEL DECODING ALGORITHM FOR MULTIPLE ACCES...
IMPLEMENTATION OF JOINT NETWORK CHANNEL DECODING ALGORITHM FOR MULTIPLE ACCES...IMPLEMENTATION OF JOINT NETWORK CHANNEL DECODING ALGORITHM FOR MULTIPLE ACCES...
IMPLEMENTATION OF JOINT NETWORK CHANNEL DECODING ALGORITHM FOR MULTIPLE ACCES...cscpconf
 

Semelhante a Presentation 1 (20)

Chapter2-PhysicalLayer.ppt
Chapter2-PhysicalLayer.pptChapter2-PhysicalLayer.ppt
Chapter2-PhysicalLayer.ppt
 
Gsm Soft Viterbi Code
Gsm Soft Viterbi CodeGsm Soft Viterbi Code
Gsm Soft Viterbi Code
 
ELH – 3.1: ADVANCED DIGITAL COMMUNICATION UNIT – II Coding techniques
ELH – 3.1: ADVANCED DIGITAL COMMUNICATION UNIT – II Coding techniquesELH – 3.1: ADVANCED DIGITAL COMMUNICATION UNIT – II Coding techniques
ELH – 3.1: ADVANCED DIGITAL COMMUNICATION UNIT – II Coding techniques
 
Ilovepdf merged
Ilovepdf mergedIlovepdf merged
Ilovepdf merged
 
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...
 
Paper id 2720144
Paper id 2720144Paper id 2720144
Paper id 2720144
 
Channel Coding (Error Control Coding)
Channel Coding (Error Control Coding)Channel Coding (Error Control Coding)
Channel Coding (Error Control Coding)
 
simulation of turbo encoding and decoding
simulation of turbo encoding and decodingsimulation of turbo encoding and decoding
simulation of turbo encoding and decoding
 
Hard Decision Viterbi Decoder: Implementation on FPGA and Comparison of Resou...
Hard Decision Viterbi Decoder: Implementation on FPGA and Comparison of Resou...Hard Decision Viterbi Decoder: Implementation on FPGA and Comparison of Resou...
Hard Decision Viterbi Decoder: Implementation on FPGA and Comparison of Resou...
 
Line Coding.pptx
Line Coding.pptxLine Coding.pptx
Line Coding.pptx
 
Analysis and Implementation of Hard-Decision Viterbi Decoding In Wireless Com...
Analysis and Implementation of Hard-Decision Viterbi Decoding In Wireless Com...Analysis and Implementation of Hard-Decision Viterbi Decoding In Wireless Com...
Analysis and Implementation of Hard-Decision Viterbi Decoding In Wireless Com...
 
D5242023
D5242023D5242023
D5242023
 
Ch4 Data communication and networking by neha g. kurale
Ch4 Data communication and networking by neha g. kuraleCh4 Data communication and networking by neha g. kurale
Ch4 Data communication and networking by neha g. kurale
 
Wcdma
WcdmaWcdma
Wcdma
 
lec5_13.pptx
lec5_13.pptxlec5_13.pptx
lec5_13.pptx
 
D04561722
D04561722D04561722
D04561722
 
Unit 4 data link layer
Unit 4 data link layerUnit 4 data link layer
Unit 4 data link layer
 
Chapter 2.1.1.pptx
Chapter 2.1.1.pptxChapter 2.1.1.pptx
Chapter 2.1.1.pptx
 
Data detection with a progressive parallel ici canceller in mimo ofdm
Data detection with a progressive parallel ici canceller in mimo ofdmData detection with a progressive parallel ici canceller in mimo ofdm
Data detection with a progressive parallel ici canceller in mimo ofdm
 
IMPLEMENTATION OF JOINT NETWORK CHANNEL DECODING ALGORITHM FOR MULTIPLE ACCES...
IMPLEMENTATION OF JOINT NETWORK CHANNEL DECODING ALGORITHM FOR MULTIPLE ACCES...IMPLEMENTATION OF JOINT NETWORK CHANNEL DECODING ALGORITHM FOR MULTIPLE ACCES...
IMPLEMENTATION OF JOINT NETWORK CHANNEL DECODING ALGORITHM FOR MULTIPLE ACCES...
 

Último

AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 

Último (20)

AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 

Presentation 1

  • 1. Implementation of Convolutional Encoder and Decoder BY-RONIT KUMAR 111EC0175
  • 2. INTRODUCTION • Maintenance of the quality of data is the most important thing in communication. There are various factors that affect the quality of data when it is transferred over a communication channel like noise, fading etc. • To overcome these effects channel coding schemes are introduced. • In this presentation one type of channel coding is described which is Convolutional Codes
  • 3. Why Channel Coding? • In digital communication systems to improve the quality of data at output, channel coding is employed. It deals with various numbers of techniques that are being used for the improvement of performance of our communication system • It increases the information transfer rate at a fixed error rate or error rate can be reduced with a fixed information transfer rate. • The maximum performance of the system is restricted by Shannon limit.
  • 4. Convolutional codes  Convolutional codes are represented by three parameters n, k, K. where K represents the number of shift registers used in the encoding part .  The coded sequence of n bits obtained after encoding not only depends on the k bit information message but also on the previous information bits that is transmitted.  Convolutional codes are same as block codes but encoder has an additional structure.  Convolutional code is a linear code and its mapping is bijective.
  • 5. SYSTEM MODEL System Model Block Diagram
  • 6.  A sequence of message bits is used as data source Convolutional coding is applied on the binary data . After encoding of image, modulation is performed.  Additive White Gaussian Noise (AWGN) is added when this coded data is passed through the channel. This noise changes/flips some of the data bits.  Convolutional decoding of the received sequence is performed at the receiver end. After decoding is demodulation is done and original transmitted message is retrieved.
  • 7. Description of a convolutional encoder
  • 8. • It has constraint length 3 and because two adders are used in it its rate is ½. • A bit is shifted into the leftmost stage at each input and the bits previously existing in the shift registers are shifted one position to right. • After applying the modulo-2 operation corresponding outputs are obtained. This process continues until the arrival of data at the input of encoder. • The choice of connection between the shift registers and adders describes the characteristics of code. By varying the connections, characteristics of the code can be varied.
  • 9. • To describe an encoder, set of “m” connection vectors are required. These vectors have the same dimension as that of K (shift registers). These connections describe which shift register is connected with m adders. • A value of “1” in the position demonstrates that, that shift register is connected to the adder and a “0” in given position will indicate that not a single connection exits between the stage and adder. • For encoder shown in Fig. we can write the connection vector for upper connection and for lower connection as follows: h1=[1 1 1]…………..(1) h2=[1 0 1]…………..(2)
  • 10. Trellis Diagram Representation A code branch produced by a input 0 is drawn as a solid line and that produced by a 1 is drawn as a dashed line. Each input or message sequence corresponds to specific path through the trelis.
  • 11.  It explicitly brings out the fact that the convolutional encoder is a finite state machine.  The state of a convolutional encoder of rate 1/n is defined as the most recent (K-1) message bits moved into the encoder’s shift register.  So at time j the state of the encoder is (mj-K+1,mj-K+2,….mj-1,mj)  The trellis contains (L+K) levels where L is the length of the message sequence and K is the constraint length of the code.
  • 12. The Viterbi Algorithm(Decoding of convolutional codes)  The viterbi algorithm is used to decode convolutional codes and any structure or system that can be described by a trellis.  It is a maximum likelihood decoding algorithm that selects the most probable path that maximizes the likelihood function.  The algorithm is based on add-compare-select the best path each time at each state.  The steps are : 1.Walk through the trellis and compute the Hamming distance between that branch of r and those in the trellis.
  • 13. 2.At each level, consider the two paths entering the same node and are identical from this node onwards. From these two paths, the one that is closer to r at this stage will still be so at any time in the future. This path is retained, and the other path is discarded. 3.Proceeding this way, at each stage one path will be saved for each node. These paths are called the survivors. The decoded sequence (based on Minimum distance Decoding) is guaranteed to be one of these survivors. 4.Each survivor is associated with a metric of the accumulated Hamming distance (the Hamming distance up to this stage). 5.Carry out this process until the received sequence is considered completely. Choose the survivor with the smallest metric.
  • 15. FUTURE WORK  VHDL Implementation of convolutional encoding and decoding  To improve performance by finding and implementing better coding techniques. References:  Digital Communication By Simon Haykins  IEEE Papers on Convolutional Coding and Decoding  Google