SlideShare uma empresa Scribd logo
1 de 18
FANO ALGORITHM
Presented by
Hrudya
OVERVIEW OF CONVOLUTIONAL CODES







k bits are input, n bits are output
Input depends not only on current set of k input bits, but also
on m past input.
An (n,k,m) convolutional code is implemented with a k-input,no/p,linear sequential ckt with input memory m.
The performance of a convolutional code depends on
 The coding rate and
 The constraint length.
CONTINUE.......







Constraint length is the no of shifts over which a single
message bit can affect the encoder o/p.
 In an encoder with an m-stage shift register , the constrain
length is m+1, as m+1 stages are required for a message
to enter the SR and finally come out.
Code Rate= k/n
Longer Constrain Length K
 More powerful code
 More coding gain
 More complex decoder
 More decoding delay
Smaller coding rate R=k/n
 More powerful code due to extra redundancy
 Less bandwidth efficiency
SEQUENTIAL DECODING









Unlike the Viterbi algorithm that locates the best codeword by
exhausting all possibilities,
 sequential decoding concentrates only on a certain
number of likely codeword's.
The purpose of sequential decoding is to search through the
nodes of the code tree in an efficient way to find the maximum
likelihood path.
Each node examined represents a path through part of the
tree.
Whether or not a particular path is likely to be a part of the
maximum likelihood path, depends on the metric value
associated with that path.
The metric is a measure of the “closeness” of a path to the
received sequence.
SEQUENTIAL DECODING ALGORITHMS


The various sequential decoding algorithms are
 Stack Algorithm
 Fano Algorithm
FANO ALGORITHM








The Fano algorithm is a
 sequential decoding algorithm
 does not require a stack.
The Fano algorithm can only operate over a code tree
because it cannot examine path merging.
At each decoding stage, the Fano algorithm retains the
information regarding three paths:
 the current path,
 its immediate predecessor path,
 and one of its successor paths.
Based on this information, the Fano algorithm can move from
the current path to either its immediate predecessor path or
the selected successor path; hence, no stack is required for
queuing all examined paths.
CONTINUE.......







The movement of the Fano algorithm is guided by a
dynamic threshold T that is an integer multiple of a fixed
step size
.
Only the path whose path metric is no less than T can
be next visited.
According to the algorithm, the process of codeword
search continues to move forward along a code path, as
long as the Fano metric along the code path remains
non-decreasing.
Once all the successor path metrics are smaller than T,
the algorithm moves backward to the predecessor path
if the predecessor path metric beats T; thereafter,
threshold examination will be subsequently performed
on another successor path of this revisited predecessor.
CONTINUE.......




In case the predecessor path metric is also less than T, the
threshold T is one-step lowered so that the algorithm is not
trapped on the current path.
For the Fano algorithm, if a path is revisited, the presently
examined dynamic threshold is always lower than the
momentary dynamic threshold at the previous visit,
guaranteeing that looping in the algorithm does not occur, and
that the algorithm can ultimately reach a terminal node of the
code tree, and stop.
WORK FLOW OF FANO ALGORITHM









Figure displays a flowchart of the Fano algorithm, in which are
denoted by Mf, Mb , are the Fano path metrics of forward and
backward nodes respectively .
The algorithm begins with the path that contains only the
origin node.
The algorithm then proceeds to find, among the 2^k
candidates, the successor path with the largest path metric
Mf.
Thereafter it examines whether Mf > T.
If so, the algorithm moves forward to the successor path, and
updates the necessary information.
CONTINUE.......






Then, whether the new current path is a code path is
determined, and a positive result immediately terminates the
algorithm.
A delicate part of the Fano algorithm is “threshold tightening."
Whenever a path is first visited, the dynamic threshold T must
be tightened" such that it is adjusted to the largest possible
value below the current path metric, i.e., T < Mc < T +
Notably, the algorithm can determine whether a path is first
visited by simply examining min{Mb,Mc} < T +
. If
min{Mb,Mc} < T + , holds due to the validity of Mc < T + ,
the threshold is automatically tightened;
CONTINUE.......








Hence only the condition Mb < T +
is required in the
tightening test.
The above procedures are repeated until a code path is finally
reached.
Along the other route of the flowchart, following a negative
answer to the examination of Mf > T (which implicitly implies
that the path metrics of all the successor paths of the current
path are less than T), the algorithm must lower the threshold if
Mb is also less than T; otherwise, a deadlock on the current
path arises.
Using the lowered threshold, the algorithm repeats the
¯finding of the best successor path whose path metric
exceeds the new threshold, and proceeds the follow-up steps.
CONTINUE.......


The rightmost loop of the flowchart considers the case for Mf < T
and Mb > T.



In this case, the algorithm can only move backward, since the
predecessor path is the only one whose path metric is no smaller
than the dynamic threshold.



The Fano algorithm then checks for the existence of a new
successor path that is not the current successor path which the
algorithm has just moved from, and whose associated path
metric exceeds the current Mf.



this step finds the best successor path other than those that have
already been examined



If such a new successor path does not exist, then the algorithm
seeks either to reduce the dynamic threshold or to move
backward again, depending on whether Mp > T.



In case such a new successor path is located, the algorithm refocuses on the new successor path, and repeats the entire
process.
STEP SIZE OF FANO ALGORITHM








The number of computations performed by fano algorithm
depends on how the threshold increment is selected.
In general if
is too small, larger number of computations
results and larger
usually reduces the number of
computations .
When
is too large, the dynamic threshold T might be
lowered too much in a single adjustment, forcing an increase
in both the decoding error and the computational effort.
Experiments suggest that a better performance can be
obtained by taking
within 2 and 8 for the unscaled Fano
metric (
should be analogously scaled if a scaled Fano
metric is used).
COMPARISON OF STACK AND FANO
ALGORITHMS













The Fano algorithm, perhaps surprisingly, while quite different in its design from
the stack algorithm, exhibits broadly the same searching behavior as the stack
algorithm.
In fact, with a slight modification to the update procedure of the dynamic threshold,
both algorithms have been proven to visit almost the same set of paths during the
decoding process.
Their only dissimilarity is that unlike the stack algorithm which visits each path only
once, the Fano algorithm may revisit a path several times, and thus has a higher
computational complexity.
Thus Fano algorithm requires more computations that stack algorithm.
But hardware implementation features apparently favour the no-stack Fano
algorithm, even when the number of its computations required is larger than the
stack algorithm.
An evident drawback of the stack algorithm in comparison with the Fano algorithm
is its demand for an extra stack space. In hardware implementation, stack
maintenance normally requires accessing external memory a certain number of
times, which usually bottlenecks the system performance.
In a normal case , we can say that fano algorithm is faster than stack algorithm,
because it is not slowed down by the stack control problems. But it suffers a speed
disadvantage on a very noisy channel since it must do significant back searching.
FANO METRIC






In information Theory metric is a measure of the “closeness”
of a path to the received sequence.
Since its discovery in 1963 [3], the Fano metric has become a
typical path metric in sequential decoding.
Originally, the Fano metric was discovered through mass
simulations, and was first used by Fano in his sequential
decoding algorithm on a code tree.
CONTINUE......


For any path v(ℓn−1) that ends at level ℓ on a code tree, the
Fano metric is defined as:



r = (r0, r1, . . . , rN−1) is the received vector, and

is the bit metric.
CONTINUE.......


The calculation of Pr(rj) follows the convention that the code
bits— 0 and 1—are transmitted with equal probability, i.e.,

and R = k/n is the code rate.

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Convolution codes and turbo codes
Convolution codes and turbo codesConvolution codes and turbo codes
Convolution codes and turbo codes
 
5 linear block codes
5 linear block codes5 linear block codes
5 linear block codes
 
Delta modulation
Delta modulationDelta modulation
Delta modulation
 
The stack algorithm vs viterbi algorithm
The stack algorithm vs viterbi algorithmThe stack algorithm vs viterbi algorithm
The stack algorithm vs viterbi algorithm
 
Synchronization
SynchronizationSynchronization
Synchronization
 
Turbo code
Turbo codeTurbo code
Turbo code
 
Turbo Code
Turbo Code Turbo Code
Turbo Code
 
LDPC
LDPCLDPC
LDPC
 
UNIT-3 : CHANNEL CODING
UNIT-3 : CHANNEL CODINGUNIT-3 : CHANNEL CODING
UNIT-3 : CHANNEL CODING
 
Pcm
PcmPcm
Pcm
 
Diversity Techniques in mobile communications
Diversity Techniques in mobile communicationsDiversity Techniques in mobile communications
Diversity Techniques in mobile communications
 
Reed solomon codes
Reed solomon codesReed solomon codes
Reed solomon codes
 
Convolutional Codes And Their Decoding
Convolutional Codes And Their DecodingConvolutional Codes And Their Decoding
Convolutional Codes And Their Decoding
 
Convolutional Error Control Coding
Convolutional Error Control CodingConvolutional Error Control Coding
Convolutional Error Control Coding
 
Ec 2401 wireless communication unit 4
Ec 2401 wireless communication   unit 4Ec 2401 wireless communication   unit 4
Ec 2401 wireless communication unit 4
 
Linear block coding
Linear block codingLinear block coding
Linear block coding
 
Hamming code system
Hamming code systemHamming code system
Hamming code system
 
Turbo Codes
Turbo CodesTurbo Codes
Turbo Codes
 
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
 
Line coding
Line codingLine coding
Line coding
 

Destaque

Destaque (20)

Shannon Fano
Shannon FanoShannon Fano
Shannon Fano
 
Dictionary Based Compression
Dictionary Based CompressionDictionary Based Compression
Dictionary Based Compression
 
Compression
CompressionCompression
Compression
 
Implementation of Viterbi Decoder on FPGA to Improve Design
Implementation of Viterbi Decoder on FPGA to Improve DesignImplementation of Viterbi Decoder on FPGA to Improve Design
Implementation of Viterbi Decoder on FPGA to Improve Design
 
Noise infotheory1
Noise infotheory1Noise infotheory1
Noise infotheory1
 
Distributed Graph Algorithms
Distributed Graph AlgorithmsDistributed Graph Algorithms
Distributed Graph Algorithms
 
Viterbi algorithm
Viterbi algorithmViterbi algorithm
Viterbi algorithm
 
Dictor
DictorDictor
Dictor
 
Source coding theorem
Source coding theoremSource coding theorem
Source coding theorem
 
1535 graph algorithms
1535 graph algorithms1535 graph algorithms
1535 graph algorithms
 
18 Basic Graph Algorithms
18 Basic Graph Algorithms18 Basic Graph Algorithms
18 Basic Graph Algorithms
 
Topological Sort
Topological SortTopological Sort
Topological Sort
 
Graph Traversal Algorithm
Graph Traversal AlgorithmGraph Traversal Algorithm
Graph Traversal Algorithm
 
Lz77 (sliding window)
Lz77 (sliding window)Lz77 (sliding window)
Lz77 (sliding window)
 
Chapter 03 cyclic codes
Chapter 03   cyclic codesChapter 03   cyclic codes
Chapter 03 cyclic codes
 
Amplitude shift keying
Amplitude shift keyingAmplitude shift keying
Amplitude shift keying
 
Linear block code
Linear block codeLinear block code
Linear block code
 
PSK (PHASE SHIFT KEYING )
PSK (PHASE SHIFT KEYING )PSK (PHASE SHIFT KEYING )
PSK (PHASE SHIFT KEYING )
 
Graph Traversal Algorithms - Depth First Search Traversal
Graph Traversal Algorithms - Depth First Search TraversalGraph Traversal Algorithms - Depth First Search Traversal
Graph Traversal Algorithms - Depth First Search Traversal
 
2.2 topological sort 02
2.2 topological sort 022.2 topological sort 02
2.2 topological sort 02
 

Semelhante a Fano algorithm

Exploiting clustering techniques
Exploiting clustering techniquesExploiting clustering techniques
Exploiting clustering techniquesmejjagiri
 
Fast and Reliable Estimation Schemes in RFID Systems.ppt
Fast and Reliable Estimation Schemes in RFID Systems.pptFast and Reliable Estimation Schemes in RFID Systems.ppt
Fast and Reliable Estimation Schemes in RFID Systems.pptnovrain1
 
Congestion Control in Wireless Sensor Networks Using Genetic Algorithm
Congestion Control in Wireless Sensor Networks Using Genetic AlgorithmCongestion Control in Wireless Sensor Networks Using Genetic Algorithm
Congestion Control in Wireless Sensor Networks Using Genetic AlgorithmEditor IJCATR
 
Acquisition of Long Pseudo Code in Dsss Signal
Acquisition of Long Pseudo Code in Dsss SignalAcquisition of Long Pseudo Code in Dsss Signal
Acquisition of Long Pseudo Code in Dsss SignalIJMER
 
Implementation of m qam modulation techniques in 4 g communication
Implementation of m qam modulation techniques in 4 g communicationImplementation of m qam modulation techniques in 4 g communication
Implementation of m qam modulation techniques in 4 g communicationShatrughanPatel1
 
Peak detection using wavelet transform
Peak detection using wavelet transformPeak detection using wavelet transform
Peak detection using wavelet transformIJCNCJournal
 
Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization (E...
Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization (E...Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization (E...
Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization (E...IRJET Journal
 
Pulse code modulation (PCM)
Pulse code modulation (PCM)Pulse code modulation (PCM)
Pulse code modulation (PCM)Mahima Shastri
 
An Improvement on Route Recovery by Using Triangular Fuzzy Numbers on Route E...
An Improvement on Route Recovery by Using Triangular Fuzzy Numbers on Route E...An Improvement on Route Recovery by Using Triangular Fuzzy Numbers on Route E...
An Improvement on Route Recovery by Using Triangular Fuzzy Numbers on Route E...IOSR Journals
 
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDINGAN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDINGijfcstjournal
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
An optimized hybrid approach for path
An optimized hybrid approach for pathAn optimized hybrid approach for path
An optimized hybrid approach for pathijfcstjournal
 
Turbo equalizer
Turbo equalizerTurbo equalizer
Turbo equalizerrashp8
 
Frequency offset estimation with fast acquisition in OFDM system assignment h...
Frequency offset estimation with fast acquisition in OFDM system assignment h...Frequency offset estimation with fast acquisition in OFDM system assignment h...
Frequency offset estimation with fast acquisition in OFDM system assignment h...Sample Assignment
 

Semelhante a Fano algorithm (20)

Exploiting clustering techniques
Exploiting clustering techniquesExploiting clustering techniques
Exploiting clustering techniques
 
Fast and Reliable Estimation Schemes in RFID Systems.ppt
Fast and Reliable Estimation Schemes in RFID Systems.pptFast and Reliable Estimation Schemes in RFID Systems.ppt
Fast and Reliable Estimation Schemes in RFID Systems.ppt
 
Fakhre alam
Fakhre alamFakhre alam
Fakhre alam
 
Congestion Control in Wireless Sensor Networks Using Genetic Algorithm
Congestion Control in Wireless Sensor Networks Using Genetic AlgorithmCongestion Control in Wireless Sensor Networks Using Genetic Algorithm
Congestion Control in Wireless Sensor Networks Using Genetic Algorithm
 
Acquisition of Long Pseudo Code in Dsss Signal
Acquisition of Long Pseudo Code in Dsss SignalAcquisition of Long Pseudo Code in Dsss Signal
Acquisition of Long Pseudo Code in Dsss Signal
 
Implementation of m qam modulation techniques in 4 g communication
Implementation of m qam modulation techniques in 4 g communicationImplementation of m qam modulation techniques in 4 g communication
Implementation of m qam modulation techniques in 4 g communication
 
Peak detection using wavelet transform
Peak detection using wavelet transformPeak detection using wavelet transform
Peak detection using wavelet transform
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization (E...
Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization (E...Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization (E...
Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization (E...
 
Pulse code modulation (PCM)
Pulse code modulation (PCM)Pulse code modulation (PCM)
Pulse code modulation (PCM)
 
mimo
mimomimo
mimo
 
An Improvement on Route Recovery by Using Triangular Fuzzy Numbers on Route E...
An Improvement on Route Recovery by Using Triangular Fuzzy Numbers on Route E...An Improvement on Route Recovery by Using Triangular Fuzzy Numbers on Route E...
An Improvement on Route Recovery by Using Triangular Fuzzy Numbers on Route E...
 
O0262090097
O0262090097O0262090097
O0262090097
 
O0262090097
O0262090097O0262090097
O0262090097
 
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDINGAN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
An optimized hybrid approach for path
An optimized hybrid approach for pathAn optimized hybrid approach for path
An optimized hybrid approach for path
 
Turbo equalizer
Turbo equalizerTurbo equalizer
Turbo equalizer
 
Frequency offset estimation with fast acquisition in OFDM system assignment h...
Frequency offset estimation with fast acquisition in OFDM system assignment h...Frequency offset estimation with fast acquisition in OFDM system assignment h...
Frequency offset estimation with fast acquisition in OFDM system assignment h...
 
1 PCM & Encoding
1  PCM & Encoding1  PCM & Encoding
1 PCM & Encoding
 

Mais de Hrudya Balachandran

Mais de Hrudya Balachandran (12)

Tta protocolsfinalppt-140305235749-phpapp02
Tta protocolsfinalppt-140305235749-phpapp02Tta protocolsfinalppt-140305235749-phpapp02
Tta protocolsfinalppt-140305235749-phpapp02
 
KSC Paper
KSC Paper KSC Paper
KSC Paper
 
Kerala Science Congress - Poster Presentation
Kerala Science Congress - Poster PresentationKerala Science Congress - Poster Presentation
Kerala Science Congress - Poster Presentation
 
Transport layer security
Transport layer securityTransport layer security
Transport layer security
 
Catv
CatvCatv
Catv
 
Wavelength selection based on wavelength availability
Wavelength selection based on wavelength availabilityWavelength selection based on wavelength availability
Wavelength selection based on wavelength availability
 
Team work
Team work Team work
Team work
 
Amplifier classes of operation and biasing networks latest
Amplifier classes of operation and biasing networks latestAmplifier classes of operation and biasing networks latest
Amplifier classes of operation and biasing networks latest
 
Transport layer security
Transport layer securityTransport layer security
Transport layer security
 
Two dimensional signals and systems
Two dimensional signals and systemsTwo dimensional signals and systems
Two dimensional signals and systems
 
GPRS
GPRSGPRS
GPRS
 
Fiber bragg gratings
Fiber bragg gratingsFiber bragg gratings
Fiber bragg gratings
 

Último

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Último (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Fano algorithm

  • 2. OVERVIEW OF CONVOLUTIONAL CODES     k bits are input, n bits are output Input depends not only on current set of k input bits, but also on m past input. An (n,k,m) convolutional code is implemented with a k-input,no/p,linear sequential ckt with input memory m. The performance of a convolutional code depends on  The coding rate and  The constraint length.
  • 3. CONTINUE.......     Constraint length is the no of shifts over which a single message bit can affect the encoder o/p.  In an encoder with an m-stage shift register , the constrain length is m+1, as m+1 stages are required for a message to enter the SR and finally come out. Code Rate= k/n Longer Constrain Length K  More powerful code  More coding gain  More complex decoder  More decoding delay Smaller coding rate R=k/n  More powerful code due to extra redundancy  Less bandwidth efficiency
  • 4. SEQUENTIAL DECODING      Unlike the Viterbi algorithm that locates the best codeword by exhausting all possibilities,  sequential decoding concentrates only on a certain number of likely codeword's. The purpose of sequential decoding is to search through the nodes of the code tree in an efficient way to find the maximum likelihood path. Each node examined represents a path through part of the tree. Whether or not a particular path is likely to be a part of the maximum likelihood path, depends on the metric value associated with that path. The metric is a measure of the “closeness” of a path to the received sequence.
  • 5. SEQUENTIAL DECODING ALGORITHMS  The various sequential decoding algorithms are  Stack Algorithm  Fano Algorithm
  • 6. FANO ALGORITHM     The Fano algorithm is a  sequential decoding algorithm  does not require a stack. The Fano algorithm can only operate over a code tree because it cannot examine path merging. At each decoding stage, the Fano algorithm retains the information regarding three paths:  the current path,  its immediate predecessor path,  and one of its successor paths. Based on this information, the Fano algorithm can move from the current path to either its immediate predecessor path or the selected successor path; hence, no stack is required for queuing all examined paths.
  • 7. CONTINUE.......     The movement of the Fano algorithm is guided by a dynamic threshold T that is an integer multiple of a fixed step size . Only the path whose path metric is no less than T can be next visited. According to the algorithm, the process of codeword search continues to move forward along a code path, as long as the Fano metric along the code path remains non-decreasing. Once all the successor path metrics are smaller than T, the algorithm moves backward to the predecessor path if the predecessor path metric beats T; thereafter, threshold examination will be subsequently performed on another successor path of this revisited predecessor.
  • 8. CONTINUE.......   In case the predecessor path metric is also less than T, the threshold T is one-step lowered so that the algorithm is not trapped on the current path. For the Fano algorithm, if a path is revisited, the presently examined dynamic threshold is always lower than the momentary dynamic threshold at the previous visit, guaranteeing that looping in the algorithm does not occur, and that the algorithm can ultimately reach a terminal node of the code tree, and stop.
  • 9.
  • 10. WORK FLOW OF FANO ALGORITHM      Figure displays a flowchart of the Fano algorithm, in which are denoted by Mf, Mb , are the Fano path metrics of forward and backward nodes respectively . The algorithm begins with the path that contains only the origin node. The algorithm then proceeds to find, among the 2^k candidates, the successor path with the largest path metric Mf. Thereafter it examines whether Mf > T. If so, the algorithm moves forward to the successor path, and updates the necessary information.
  • 11. CONTINUE.......    Then, whether the new current path is a code path is determined, and a positive result immediately terminates the algorithm. A delicate part of the Fano algorithm is “threshold tightening." Whenever a path is first visited, the dynamic threshold T must be tightened" such that it is adjusted to the largest possible value below the current path metric, i.e., T < Mc < T + Notably, the algorithm can determine whether a path is first visited by simply examining min{Mb,Mc} < T + . If min{Mb,Mc} < T + , holds due to the validity of Mc < T + , the threshold is automatically tightened;
  • 12. CONTINUE.......     Hence only the condition Mb < T + is required in the tightening test. The above procedures are repeated until a code path is finally reached. Along the other route of the flowchart, following a negative answer to the examination of Mf > T (which implicitly implies that the path metrics of all the successor paths of the current path are less than T), the algorithm must lower the threshold if Mb is also less than T; otherwise, a deadlock on the current path arises. Using the lowered threshold, the algorithm repeats the ¯finding of the best successor path whose path metric exceeds the new threshold, and proceeds the follow-up steps.
  • 13. CONTINUE.......  The rightmost loop of the flowchart considers the case for Mf < T and Mb > T.  In this case, the algorithm can only move backward, since the predecessor path is the only one whose path metric is no smaller than the dynamic threshold.  The Fano algorithm then checks for the existence of a new successor path that is not the current successor path which the algorithm has just moved from, and whose associated path metric exceeds the current Mf.  this step finds the best successor path other than those that have already been examined  If such a new successor path does not exist, then the algorithm seeks either to reduce the dynamic threshold or to move backward again, depending on whether Mp > T.  In case such a new successor path is located, the algorithm refocuses on the new successor path, and repeats the entire process.
  • 14. STEP SIZE OF FANO ALGORITHM     The number of computations performed by fano algorithm depends on how the threshold increment is selected. In general if is too small, larger number of computations results and larger usually reduces the number of computations . When is too large, the dynamic threshold T might be lowered too much in a single adjustment, forcing an increase in both the decoding error and the computational effort. Experiments suggest that a better performance can be obtained by taking within 2 and 8 for the unscaled Fano metric ( should be analogously scaled if a scaled Fano metric is used).
  • 15. COMPARISON OF STACK AND FANO ALGORITHMS        The Fano algorithm, perhaps surprisingly, while quite different in its design from the stack algorithm, exhibits broadly the same searching behavior as the stack algorithm. In fact, with a slight modification to the update procedure of the dynamic threshold, both algorithms have been proven to visit almost the same set of paths during the decoding process. Their only dissimilarity is that unlike the stack algorithm which visits each path only once, the Fano algorithm may revisit a path several times, and thus has a higher computational complexity. Thus Fano algorithm requires more computations that stack algorithm. But hardware implementation features apparently favour the no-stack Fano algorithm, even when the number of its computations required is larger than the stack algorithm. An evident drawback of the stack algorithm in comparison with the Fano algorithm is its demand for an extra stack space. In hardware implementation, stack maintenance normally requires accessing external memory a certain number of times, which usually bottlenecks the system performance. In a normal case , we can say that fano algorithm is faster than stack algorithm, because it is not slowed down by the stack control problems. But it suffers a speed disadvantage on a very noisy channel since it must do significant back searching.
  • 16. FANO METRIC    In information Theory metric is a measure of the “closeness” of a path to the received sequence. Since its discovery in 1963 [3], the Fano metric has become a typical path metric in sequential decoding. Originally, the Fano metric was discovered through mass simulations, and was first used by Fano in his sequential decoding algorithm on a code tree.
  • 17. CONTINUE......  For any path v(ℓn−1) that ends at level ℓ on a code tree, the Fano metric is defined as:  r = (r0, r1, . . . , rN−1) is the received vector, and is the bit metric.
  • 18. CONTINUE.......  The calculation of Pr(rj) follows the convention that the code bits— 0 and 1—are transmitted with equal probability, i.e., and R = k/n is the code rate.