SlideShare a Scribd company logo
ACEEE Int. J. on Information Technology, Vol. 01, No. 01, Mar 2011



     Energy-Efficient LDPC Decoder using DVFS for
                      binary sources
                                                 S.karthikeyan1, S.Jayashri2
               1
                Sathyabama university/Dept of Electronics and communication Engineering, Chennai, India
                                         Email: urkarthikeyan@rediffmail.com
                        2
                          Adhiparasakthi Engineering college/Principal, Melmaruvathur,TN,India
                                           Email: jayaravi2010@gmail.com


Abstract- This paper deals with reduction of the transmission         a codeword has been found). Also, LDPC codes of almost
power usage in the wireless sensor networks. A system with            any rate and block length can be created simply by specifying
FEC can provide an objective reliability using less power             the shape of the parity check matrix, while the rate of turbo
than a system without FEC. We propose to study LDPC                   codes is governed largely by a puncturing schedule, so
codes to provide reliable communication while saving power            flexibility in rate is obtained only through considerable
in the sensor networks. As shown later, LDPC codes are more
                                                                      design effort. Also, since the validity of a codeword is
energy efficient than those that use BCH codes. Another
method to reduce the transmission cost is to compress the             validated if its parity checks, even if errors occur, they are
correlated data among a number of sensor nodes before                 almost always detected errors (especially for long codes).
transmission. A suitable source encoder that removes the              As an additional boon on the commercial side, LDPC codes
redundant information bits can save the transmission power.           are not patent protected. On the negative side, LDPC codes
Such a system requires distributed source coding. We propose          have a significantly higher encode complexity than turbo
to apply LDPC codes for both distributed source coding and            codes, being generically quadratic in the code dimension,
source-channel coding to obtain a two-fold energy savings.            although this can be reduced to some extent. Also, decoding
Source and channel coding with LDPC for two correlated nodes          may require many more iterations than turbo decoding, which
under AWGN channel is implemented in this paper. In this
                                                                      has implications for latency.
iterative decoding algorithm is used for decoding the data, and
it’s efficiency is compared with the new decoding algorithm           B. Constructing LDPC Codes:
called layered decoding algorithm which based on offset min
sum algorithm. The usage of layered decoding algorithm and                Several different algorithms exists to construct suitable
Adaptive LDPC decoding for AWGN channel reduces the                   LDPC codes. Only binary LDPC codes are considered here.
decoding complexity and its number of iterations. So the power        We use N to denote the length of the code and K to denote
will be saved, and it can be implemented in hardware.                 its dimension and M = N-K. Since the parity check matrices
                                                                      we consider are generally not in systemic form, we usually
Index Terms- LDPC codes, Distributed Source coding, Source            use the symbol A to represent parity check matrices, reserving
Channel coding, iterative decoding algorithm, layered decoding
                                                                      the symbol H for parity check matrices in systematic form.
algorithm.
                                                                      Following the general vector m is a K x 1 vector; a codeword
                                                                      is a N x 1 vector. The generator matrix G is N x K and the
                      I. INTRODUCTION
                                                                      parity check matrix A is ( N-K) x N , such that HG=0.
                                                                           We denote the rows of a parity check matrix as
A. Low-Density-Parity Check-LDPC Codes:
          Low-density parity-check (LDPC) codes are a class
of linear block LDPC codes. The name comes from the
characteristic of their parity-check matrix which contains
only a few 1’s in comparison to the amount of 0’s. Their
main advantage is that they provide a performance which is                     The equation aiTc= 0 is said to be a linear parity-
very close to the capacity for a lot of different channels and        check constraint on the codeword c. We use the notation zm
linear time complex algorithms for decoding. LDPC codes               = amTc and call zm a parity check or, more simply, a check.
have performance exceeding, in some cases, that of turbo              For a code specified by a parity check matrix A, it is expedi-
codes, with iterative decoding algorithms which are easy to           ent for encoding purposes to determine the corresponding
implement (with the per-iteration complexity much lower               generator matrix G. A systematic generator matrix may be
than the per-iteration complexity of turbo decoders), and are         found as follows. Using Gaussian elimination with column
also parallelizable in hardware. There are other potential            pivoting as necessary (with binary arithmetic) determine an
advantages to LDPC codes as well. In a very natural way,
the decoder declares a decoding failure when it is unable to
correctly decode, whereas turbo decoders must perform extra                     If such a matrix A , does not exist, then A is rank
computations for a stopping criterion (and even then, the             deficient, r = rank(A) < M . In this case, form H by truncat-
stopping criterion depends upon a threshold that must be              ing the linearly dependent rows from Ap-1A . The correspond-
established, and the stopping criterion does not establish that       ing code has R = K / N > (N - M) / N , so it is a higher rate

© 2011 ACEEE                                                      1
DOI: 01.IJIT.01.01.37
ACEEE Int. J. on Information Technology, Vol. 01, No. 01, Mar 2011


code than the dimensions of A would suggest) Having found
H, from



                                                                                 We study the asymmetric distributed source cod-
    Then HG=0, so ApHG = AG = 0, so G is a generator                   ing scenario in which it is assumed the signal X1 is com-
matrix for A. While A may be sparse neither the systematic             pressed conventionally and sent at full rate RX1 e” H(X1),
generator G nor H is necessarily sparse. Fewer than half of            and is recovered perfectly at the decoder. We want to com-
the elements are nonzero. Since the A matrix is sparse, it can         press the X2 as close as possible to the Slepian-Wolf bound
be represented efficiently using lists of its nonzero locations.       of H(X2|X1). As we can see the chosen rates for RX1 and
In this notation, bits are typically indexed by n or n’ and the        RX2 satisfy the inequalities of above equations.
checks are typically indexed by m or m’. The set of bits that              The corresponding sensor communication is shown in
participate in check zm (i.e., the nonzero elements on the mth         figure 1.
row of A is denoted



                                                                       Fig.1. System for compression of X2 with the side information of X1 at
      Thus we can write the mth check as
                                                                                                   the Decoder

                                                                       B. Encoding and decoding with LDPC codes:
                                                                           A low-density parity-check (LDPC) code is determined
                                                                       by its parity-check matrix (H) or, equivalently by its bipartite
                                                                       graph. An ensemble of LDPC codes is described by the
         The set of bits that participate in Zm except for
                                                                       degree distribution polynomials ë(x), and ñ(x). The bipartite
bit n is denoted                                                       graph is used in the message-passing decoding algorithm.
                                                                                 Encoding- Given, H to encode, i.e., compress, an
                                                                       arbitrary binary input sequence, we multiply X with H and
          The notation INmI indicates the number of elements           find the corresponding syndrome. Z1 [length (n-k)]
in the set Nm.These sets should be considered ordered lists,           equivalently, in the bipartite graph, this can be viewed as
with the ith element of Nm being indicated by Nm (i). The set          binary addition of all the variable node values that are
of checks in which bit cn participates (i.e., the nonzero ele-         connected to the same check node.
ments of the nth column of A ) is denoted                                    Decoding algorithm- The decoder must estimate the
                                                                       n-length sequence X from its (n — k) long syndrome Z1
                                                                       and the corresponding n-length sequence Y
                                                                                 We use the following notation:
            II. EXISTING METHODOLOGY                                           • xi, yi £ {0, 1}, i = 1, 2, ..., n, are the current
                                                                               values of Xi and Yi. respectively, corresponding to
A. Distributed Source Coding Between Two Correlated                            the i th variable node vi:
Sources:                                                                     • Li£ {2, 3, ...},i< = 1,2, ..., n, is the degree of V i
    Consider a communication system of two statistically                     • ,qouti,m (qini,m )£ R, i= 1, 2, ..., n, m = 1, 2,....li.is
dependent signals, X1 and X2. The dependency between X1                      the log-likelihood ratio
and X2 can be fully described by the conditional probability                   (LLR) sent along the mth edge
mass function P[X1|X2]. A suitable source encoder that                        from (to) V i,
removes the redundant information bits, reduces both the                     • Sj £ {0, 1} j = 1, 2, ..., n — k, is the value of
length of the transmitting information and the power                         Z1,j corresponding to the
consumption. The correlation between signals X1 and X2                         Jth check node Cj, i.e., the j th syndrome
can be modelled as the input and output of a binary symmetric                component;
channel with the crossover probability of P[X1 ‘“ X2|X1] =                   • r j £ {2, 3, ...}, j = 1, 2, ..., n — k, is the degree
p. According to Slepian-Wolf theorem. The output of two                      of c j ;
correlated sources that do not communicate can be                            • toutjm (tinj,m )£ e R, j = 1, 2, ..., n-k, m = 1, 2, ...rj,
compressed with the same rate as if they were                                is the LLR sent along the mth edge from (to) c j .
communicating. This is true when the decoder has access to                     Step 1: Setting
the both compressed outputs. Such a system requires
distributed source coding. The Slepian-Wolf rate region can
be expressed as following:


© 2011 ACEEE                                                       2
DOI: 01.IJIT.01.01.37
ACEEE Int. J. on Information Technology, Vol. 01, No. 01, Mar 2011


Step 2: i=1,2…..n, p<=0.5 the LLR sent from the i th                      iterations is insufficient. This paper describes a more
variable node vi along the mth edge is                                    comprehensive design that accommodates both fading
                                                                          channels and the more difficult case of AWGN channels.
                                                                          This paper presents the LDPC decoding algorithm based on
                                                                          offset min-sum and layered decoding.
                                                                              Assume binary phase shift keying (BPSK) modulation (
        M=1,2,.....li,i=1,2,....n where initially qini,j=0
                                                                          1 is mapped to “1 and 0 is mapped to 1) over an additive
Step 3: The values qouti,m are assigned to the corresponding
                                                                          white Gaussian noise (AWGN) channel. The received values
tinj,ð (i,m,j) according to the connections in the bipartite              yn are Gaussian with mean xn = 1 and variance ä^(2). The
graph and are then used to do the processing at the check                 Iterative two-phase message-passing (TPMP) algorithm, also
nodes. From the “tanh rule” and the syndrome information,                 known as belief-propagation (BP) algorithm is computed in
the LLR sent from the jth check node cj along the mth                     two phases. One is a check node processing and the other is
edge is                                                                   variable node processing. In the check node processing, each
                                                                          row of the parity matrix is checked to verify that parity check
                                                                          constraints are satisfied. In the variable node processing the
                                                                          probability will be updated by summing up the other
                  j= 1, 2, ..., n-k, m = 1, 2, ...rj, The
                                                                          probabilities from the rest of the rows and the a prior
inclusion of the (1 — 2sj) factor accounts for the                        probabilities from the channel output. The message passing
syndrome information.                                                     algorithm can be simplified to the belief-propagation based
step 4: Now qini,m = toutj,ð (i,m,j) for all edges in the bipartite
                                                                          algorithm (also called Min-Sum algorithm). While greatly
graph, which can be used to start a new iteration and estimate
                                                                          reducing the decoding complexity in implementation, the
xi from
                                                                          Min-Sum degrades the coding performance. The improved
                                                                          BP based algorithm, Normalized-Min-Sum and Offset-Min-
                                                                          Sum eliminates this performance degradation. Following the
                                                                          same notation in [8], the check node processing can be
                                                                          expressed as:
                                                                                          R(i)mn = ä(i)mn max (ê (i)mn “ â, 0)
            III. PROPOSED METHODOLOGY
                                                                                      ê (i)mn =%R(i)mn % = min % Q (i”1)n’m %
  A. LDPC Layered Decoding Based on Offset MIN-SUM
                           Algorithm:                                                                n”N(m)n
          In practice, the LDPC decoder is typically set to
                                                                                     (i)
run for data convergence until a prescribed maximum num-                  Where Q       nm
                                                                                          is the message from variable node n to
ber of iterations (e.g. 20) depending on the code rate. How-              check node m,
ever, the actual number of decoding iterations varies from                         R(i)mn is the message from check node m to
frame to frame. In the case that channel data comes in con-               variable node n, and superscript i denotes the ith iteration.
stant time interval, a conventional decoder has to be config-             M(n) is the set of the neighbouring check nodes for
ured to accommodate the worst case scenario. As a result,                 variable node n, and N(m) is the set of the neighbouring
the decoder often remains idle since for most frames, the                 variable nodes for check node m, â is a positive constant
decoding process ends far earlier than the maximum num-                   and depends on the code parameters
ber of iterations. Thus it is not power efficient. In the decod-             The sign of check-node message R(i)mn is defined as
ers proposed is based on an on-the-fly computation para-
digm, optimized dataflow graphs are introduced to reduce                                ä(i)mn = (   Ï    sgn (Q(i”1)n’m ))
the logic and internal memory requirements of the LDPC                                                n_”N(m)n
                                                                             In the variable node processing,
decoder and at the same time the decoder’s parallelization is
tailored to average number of decoding iterations for the
                                                                                               Qn = L(0)n +   “ R(i)mn
target frame error rate for the operating SNR region. These
decoders buffer statistically for different parallelization based
                                                                                                    m”M(n)/m
on average number of decoding iterations while ensuring
                                                                               Where the log-likelihood ratio of bit n is L(0)n = yn. For
the performance similar to that of a fixed iteration decoder
                                                                          final Decoding
configured for maximum number of iterations. These de-
                                                                                             Pn = L(0)n + “    R(i)mn
coders are almost fully utilized and run at the maximum fre-
                                                                                                            m”M(n)
quency. The proposed paper improves the system. There have
                                                                          A hard decision is taken by setting xn = 0 if Pn(xn) e” 0, and
been researches on early termination of frame that cannot
                                                                          xn = 1 if Pn(xn) d” 0. If xHT = 0, the decoding process is
be decoded even if the maximum iterations are applied. In
                                                                          finished with ˆxn as the decoder output; otherwise, repeat
both of papers, early termination of the iterative process is
                                                                          processing of Equation. If the decoding process does not
determined by checking the messages during the decoding.
                                                                          end within predefined maximum number of iterations, itmax,
Between initial check error and number of decoding
                                                                      3
© 2011 ACEEE
DOI: 01.IJIT.01.01.37
ACEEE Int. J. on Information Technology, Vol. 01, No. 01, Mar 2011


stop and output an error message flag and proceed to the                The results showed how LDPC codes can be used in
decoding of the next data frame. Mansour, introduces the                providing reliable data transmission and developing
concept of turbo decoding message passing (also called as               aggregation techniques for correlated data in wireless sensor
layered decoding) for their AA-LDPC codes using BCJR                    networks.. It was shown that while some FEC coding
which is able to reduce the number of iterations without                                             V.
                                                                        schemes can improve the energy efficiency of a
performance degradation when compared to the standard                   communication link, it proves that FEC using LDPC codes
message passing algorithm. Contrast to two phase message                can reduce the transmission power. The simulation results
passing algorithm, where all check-nodes are updated si-                showed that using LDPC codes for FEC is significantly more
multaneously in each iteration, layered decoding view the H             efficient than using BCH codes.
matrix as a concatenation of j = dv sub-codes, The H matrix
is divided into different block-rows and block                                                 CONCLUSION
columns. After the check-node processing of one layer, the
                                                                           The ‘Source and channel coding’ and ‘distributed Source
updated messages are immediately used to calculate the vari-
                                                                        coding‘ of two correlated nodes are done. The performances
able node message, whose results are then applied to next
                                                                        of Both are compared. And Source and channel coding with
layer of sub-code. Each iteration in the layered decoding
                                                                        LDPC for two correlated nodes under AWGN channel is
algorithm is composed of j sub-iterations. The processing of
                                                                        implemented in this paper. In this iterative decoding
one block row is called a sub-iteration and each iteration is
                                                                        algorithm is used for decoding the data, and it’s efficiency is
composed of j = dv sub-iterations.
                                                                        compared with the new decoding algorithm called layered
    Mathematically, the layered decoding algorithm can be
                                                                        decoding algorithm which based on offset min sum
described as in
                                                                        algorithm. From this we can conclude that by using layered
 Algorithm:
                                                                        decoding algorithm the decoding complexity is much
        step1: R(0)l,n = 0, “ l” [1, dv],
                                                                        reduced and its performance is improved when compared
                                  n “ [1, dc]
                                                                        with iterative decoding algorithm.
        step2: Pn = L(0)n , “ n “ [1, dc]
        step3: for each i = 1, 2, · · · , itmax
                                                                                                REFERENCE
                                              do
        step4: for each l = 1, 2, · · · , dv do                         [1] A. D. Liveris, Z. Xiong, and C. N. Georghiades, “Compression
        step5: for each n = 1, 2, · · · , dc do                         of binary sources with side information at the decoder using LDPC
              Q(i)l,n=PnR(i”1)l,n                                       codes,” IEEE Comm. Letters, vol. 6, pp. 440–442, Oct. 2002.
              R(i)l,n = f [Q(i )] “n_ “ [1, dc]                         [2] T. J. Richardson and R. L. Urbanke, “The capacity of low-
             Pn=Q(i)l,n + _R(i)l,n.                                     density paritycheck codes under message passing alorithm,”
                                                                        IEEE Trans. Inform,Theory, vol. 47, pp. 599–618, Feb. 2001.
                         IV. RESULT                                     [3] S. S. Pradhan and K. Ramchandran, “Distributed source
                                                                        coding usingsyndromes (DISCUS): design and construction,”
A. Source Coding for LDPC with Two correlated nodes by                  Proc. IEEE Data Compression Conference, pp. 158–167, March
using SUM Product and Layered Decoding Algorithm                        1999.
                                                                        [4] S. S. Pradhan and K. Ramchandran, “Distributed source
                                                                        coding: symmetric rates and applications to sensor networks,”
                                                                        Proc. IEEE Data Compression Conference, pp. 363–372, March
                                                                        2001.
                                                                        [5] Weihuang Wang, Gwan Choi and Kiran K. Gunnam “Low-
                                                                        Power VLSI Design of LDPC Decoder Using DVFS for AWGN
                                                                        Channels” 22nd International Conference on VLSI Design. 2009
                                                                        [ 6 ] h t t p : / / b o o k s . g o o g l e . c o m /
                                                                        books?id=9JVsRYL0ZkUC&pg=PA2
                                                                        06&dq=bit+flipping+algorithm++%2Bldpc&ei=net7S92_N5D8lA
                                                                        N5D8lATzl8izCA&cd=6#v=onepage&q=bit%20flippi
                                                                        ng%20algorithm%20%2Bldpc&f=false
                                                                        [ 7 ] h t t p : / / b o o k s . g o o g l e . c o m /
                                                                        books?id=9EJQk0mPlYC&pg=PA651&dq=offset+minsu
                                                                         m+decoding+algorithm%2Bldpc&ei=GvWXS__dM5DMlQSU06
  Fig.4. The performance of LDPC decoder by using sum product and       dM5DMlQSU06zxCQ&cd=1#v=one page&q=&f=false
                     layered decoding algorithms                        [8]http://books.google.com/
                                                                        books?id=z8nmMkUFqdwC&pg=PA
                                                                        534&dq=offset+minsum+decoding+algorithm%2Bldpc&ei=GvW
                                                                        XS__dM5DMlQSU06zxCQ&cd=2#v=onepage&q=&f=false




© 2011 ACEEE                                                        4
DOI: 01.IJIT.01.01.37
Ad

Recommended

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Hossein Taghavi : Codes on Graphs
Hossein Taghavi : Codes on Graphs
knowdiff
 
LDPC Encoding and Hamming Encoding
LDPC Encoding and Hamming Encoding
Bhagwat Singh Rathore
 
02 ldpc bit flipping_decoding_dark knight
02 ldpc bit flipping_decoding_dark knight
Devanshi Piprottar
 
Channel coding
Channel coding
Ola Mashaqi @ an-najah national university
 
Turbo codes
Turbo codes
RAVINDRA GAIKWAD
 
Turbo Codes
Turbo Codes
vasanth_mtech
 
A new Algorithm to construct LDPC codes with large stopping sets
A new Algorithm to construct LDPC codes with large stopping sets
Nestor Barraza
 
My review on low density parity check codes
My review on low density parity check codes
pulugurtha venkatesh
 
Coding Scheme
Coding Scheme
Deepak Sharma
 
Convolution codes and turbo codes
Convolution codes and turbo codes
Manish Srivastava
 
Performance analysis and implementation for nonbinary quasi cyclic ldpc decod...
Performance analysis and implementation for nonbinary quasi cyclic ldpc decod...
ijwmn
 
Quasi Cyclic LDPC codes - Algebraic Construction
Quasi Cyclic LDPC codes - Algebraic Construction
Eapen Vpp
 
LDPC Codes
LDPC Codes
Sahar Foroughi
 
LDPC Encoding
LDPC Encoding
Bhagwat Singh Rathore
 
Thesis_Presentation
Thesis_Presentation
Panagiotis Chatzi nikolaou
 
Convolutional codes
Convolutional codes
Abdullaziz Tagawy
 
79 83
79 83
Ijarcsee Journal
 
Presentation 1
Presentation 1
RONITKUMAR77
 
Convolutional Codes And Their Decoding
Convolutional Codes And Their Decoding
Kakali Saharia
 
Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...
researchinventy
 
Source coding
Source coding
MOHIT KUMAR
 
Error Control coding
Error Control coding
Dr Naim R Kidwai
 
LDPC - Low Density Parity Check Matrix
LDPC - Low Density Parity Check Matrix
Kavi
 
C04922125
C04922125
IOSR-JEN
 
Coding
Coding
Dayal Sati
 
Convolutional Error Control Coding
Convolutional Error Control Coding
Mohammed Abuibaid
 
I Tlecture 13a
I Tlecture 13a
Adithya Rao
 
Design of an Ameliorated Methodology for the Abstraction of Usable Components...
Design of an Ameliorated Methodology for the Abstraction of Usable Components...
IDES Editor
 
Range Extended Second Order Digital Phase Locked Loop
Range Extended Second Order Digital Phase Locked Loop
IDES Editor
 

More Related Content

What's hot (20)

My review on low density parity check codes
My review on low density parity check codes
pulugurtha venkatesh
 
Coding Scheme
Coding Scheme
Deepak Sharma
 
Convolution codes and turbo codes
Convolution codes and turbo codes
Manish Srivastava
 
Performance analysis and implementation for nonbinary quasi cyclic ldpc decod...
Performance analysis and implementation for nonbinary quasi cyclic ldpc decod...
ijwmn
 
Quasi Cyclic LDPC codes - Algebraic Construction
Quasi Cyclic LDPC codes - Algebraic Construction
Eapen Vpp
 
LDPC Codes
LDPC Codes
Sahar Foroughi
 
LDPC Encoding
LDPC Encoding
Bhagwat Singh Rathore
 
Thesis_Presentation
Thesis_Presentation
Panagiotis Chatzi nikolaou
 
Convolutional codes
Convolutional codes
Abdullaziz Tagawy
 
79 83
79 83
Ijarcsee Journal
 
Presentation 1
Presentation 1
RONITKUMAR77
 
Convolutional Codes And Their Decoding
Convolutional Codes And Their Decoding
Kakali Saharia
 
Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...
researchinventy
 
Source coding
Source coding
MOHIT KUMAR
 
Error Control coding
Error Control coding
Dr Naim R Kidwai
 
LDPC - Low Density Parity Check Matrix
LDPC - Low Density Parity Check Matrix
Kavi
 
C04922125
C04922125
IOSR-JEN
 
Coding
Coding
Dayal Sati
 
Convolutional Error Control Coding
Convolutional Error Control Coding
Mohammed Abuibaid
 
I Tlecture 13a
I Tlecture 13a
Adithya Rao
 
My review on low density parity check codes
My review on low density parity check codes
pulugurtha venkatesh
 
Convolution codes and turbo codes
Convolution codes and turbo codes
Manish Srivastava
 
Performance analysis and implementation for nonbinary quasi cyclic ldpc decod...
Performance analysis and implementation for nonbinary quasi cyclic ldpc decod...
ijwmn
 
Quasi Cyclic LDPC codes - Algebraic Construction
Quasi Cyclic LDPC codes - Algebraic Construction
Eapen Vpp
 
Convolutional Codes And Their Decoding
Convolutional Codes And Their Decoding
Kakali Saharia
 
Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...
researchinventy
 
LDPC - Low Density Parity Check Matrix
LDPC - Low Density Parity Check Matrix
Kavi
 
Convolutional Error Control Coding
Convolutional Error Control Coding
Mohammed Abuibaid
 

Viewers also liked (9)

Design of an Ameliorated Methodology for the Abstraction of Usable Components...
Design of an Ameliorated Methodology for the Abstraction of Usable Components...
IDES Editor
 
Range Extended Second Order Digital Phase Locked Loop
Range Extended Second Order Digital Phase Locked Loop
IDES Editor
 
Semi-automatic Discovery of Mappings Between Heterogeneous Data Warehouse Dim...
Semi-automatic Discovery of Mappings Between Heterogeneous Data Warehouse Dim...
IDES Editor
 
Cancellation of Zigbee interference in OFDM based WLAN for multipath channel
Cancellation of Zigbee interference in OFDM based WLAN for multipath channel
IDES Editor
 
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...
IDES Editor
 
A High Speed Pipelined Dynamic Circuit Implementation Using Modified TSPC Log...
A High Speed Pipelined Dynamic Circuit Implementation Using Modified TSPC Log...
IDES Editor
 
A New Active Snubber Circuit for PFC Converter
A New Active Snubber Circuit for PFC Converter
IDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
IDES Editor
 
Power System State Estimation - A Review
Power System State Estimation - A Review
IDES Editor
 
Design of an Ameliorated Methodology for the Abstraction of Usable Components...
Design of an Ameliorated Methodology for the Abstraction of Usable Components...
IDES Editor
 
Range Extended Second Order Digital Phase Locked Loop
Range Extended Second Order Digital Phase Locked Loop
IDES Editor
 
Semi-automatic Discovery of Mappings Between Heterogeneous Data Warehouse Dim...
Semi-automatic Discovery of Mappings Between Heterogeneous Data Warehouse Dim...
IDES Editor
 
Cancellation of Zigbee interference in OFDM based WLAN for multipath channel
Cancellation of Zigbee interference in OFDM based WLAN for multipath channel
IDES Editor
 
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...
IDES Editor
 
A High Speed Pipelined Dynamic Circuit Implementation Using Modified TSPC Log...
A High Speed Pipelined Dynamic Circuit Implementation Using Modified TSPC Log...
IDES Editor
 
A New Active Snubber Circuit for PFC Converter
A New Active Snubber Circuit for PFC Converter
IDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
IDES Editor
 
Power System State Estimation - A Review
Power System State Estimation - A Review
IDES Editor
 
Ad

Similar to Energy-Efficient LDPC Decoder using DVFS for binary sources (20)

Jb2415831591
Jb2415831591
IJERA Editor
 
Fpga implementation of linear ldpc encoder
Fpga implementation of linear ldpc encoder
eSAT Journals
 
Fpga implementation of linear ldpc encoder
Fpga implementation of linear ldpc encoder
eSAT Publishing House
 
REDUCED COMPLEXITY QUASI-CYCLIC LDPC ENCODER FOR IEEE 802.11N
REDUCED COMPLEXITY QUASI-CYCLIC LDPC ENCODER FOR IEEE 802.11N
VLSICS Design
 
Sandberg v deetzen_trcomm_2010
Sandberg v deetzen_trcomm_2010
Nitesh Chilakala
 
Ab4102211213
Ab4102211213
IJERA Editor
 
Analysis of LDPC Codes under Wi-Max IEEE 802.16e
Analysis of LDPC Codes under Wi-Max IEEE 802.16e
IJERD Editor
 
Low complexity design of non binary ldpc decoder using extended min-sum algor...
Low complexity design of non binary ldpc decoder using extended min-sum algor...
eSAT Journals
 
PERFORMANCE ESTIMATION OF LDPC CODE SUING SUM PRODUCT ALGORITHM AND BIT FLIPP...
PERFORMANCE ESTIMATION OF LDPC CODE SUING SUM PRODUCT ALGORITHM AND BIT FLIPP...
Journal For Research
 
LDPC_CODES.ppt
LDPC_CODES.ppt
hsomashekar987
 
Comparison of Turbo Codes and Low Density Parity Check Codes
Comparison of Turbo Codes and Low Density Parity Check Codes
IOSR Journals
 
Reduced Energy Min-Max Decoding Algorithm for Ldpc Code with Adder Correction...
Reduced Energy Min-Max Decoding Algorithm for Ldpc Code with Adder Correction...
ijceronline
 
115 118
115 118
Editor IJARCET
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Iisrt jona priyaa(1 5)
Iisrt jona priyaa(1 5)
IISRT
 
Reduced Complexity Maximum Likelihood Decoding Algorithm for LDPC Code Correc...
Reduced Complexity Maximum Likelihood Decoding Algorithm for LDPC Code Correc...
Associate Professor in VSB Coimbatore
 
FPGA Hardware Design of Different LDPC Applications: Survey
FPGA Hardware Design of Different LDPC Applications: Survey
BRNSSPublicationHubI
 
Proposal
Proposal
Shaikh M Karim
 
Design and implementation of log domain decoder
Design and implementation of log domain decoder
IJECEIAES
 
Bj32392395
Bj32392395
IJERA Editor
 
Fpga implementation of linear ldpc encoder
Fpga implementation of linear ldpc encoder
eSAT Journals
 
Fpga implementation of linear ldpc encoder
Fpga implementation of linear ldpc encoder
eSAT Publishing House
 
REDUCED COMPLEXITY QUASI-CYCLIC LDPC ENCODER FOR IEEE 802.11N
REDUCED COMPLEXITY QUASI-CYCLIC LDPC ENCODER FOR IEEE 802.11N
VLSICS Design
 
Sandberg v deetzen_trcomm_2010
Sandberg v deetzen_trcomm_2010
Nitesh Chilakala
 
Analysis of LDPC Codes under Wi-Max IEEE 802.16e
Analysis of LDPC Codes under Wi-Max IEEE 802.16e
IJERD Editor
 
Low complexity design of non binary ldpc decoder using extended min-sum algor...
Low complexity design of non binary ldpc decoder using extended min-sum algor...
eSAT Journals
 
PERFORMANCE ESTIMATION OF LDPC CODE SUING SUM PRODUCT ALGORITHM AND BIT FLIPP...
PERFORMANCE ESTIMATION OF LDPC CODE SUING SUM PRODUCT ALGORITHM AND BIT FLIPP...
Journal For Research
 
Comparison of Turbo Codes and Low Density Parity Check Codes
Comparison of Turbo Codes and Low Density Parity Check Codes
IOSR Journals
 
Reduced Energy Min-Max Decoding Algorithm for Ldpc Code with Adder Correction...
Reduced Energy Min-Max Decoding Algorithm for Ldpc Code with Adder Correction...
ijceronline
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Iisrt jona priyaa(1 5)
Iisrt jona priyaa(1 5)
IISRT
 
Reduced Complexity Maximum Likelihood Decoding Algorithm for LDPC Code Correc...
Reduced Complexity Maximum Likelihood Decoding Algorithm for LDPC Code Correc...
Associate Professor in VSB Coimbatore
 
FPGA Hardware Design of Different LDPC Applications: Survey
FPGA Hardware Design of Different LDPC Applications: Survey
BRNSSPublicationHubI
 
Design and implementation of log domain decoder
Design and implementation of log domain decoder
IJECEIAES
 
Ad

More from IDES Editor (20)

Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
IDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
IDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
IDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
IDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
IDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
IDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’s
IDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance Analysis
IDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
IDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
IDES Editor
 
Mental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive Model
IDES Editor
 
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
IDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
IDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
IDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
IDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
IDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
IDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’s
IDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance Analysis
IDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
IDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
IDES Editor
 
Mental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive Model
IDES Editor
 
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
IDES Editor
 

Recently uploaded (20)

" How to survive with 1 billion vectors and not sell a kidney: our low-cost c...
" How to survive with 1 billion vectors and not sell a kidney: our low-cost c...
Fwdays
 
Salesforce Summer '25 Release Frenchgathering.pptx.pdf
Salesforce Summer '25 Release Frenchgathering.pptx.pdf
yosra Saidani
 
Techniques for Automatic Device Identification and Network Assignment.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Priyanka Aash
 
You are not excused! How to avoid security blind spots on the way to production
You are not excused! How to avoid security blind spots on the way to production
Michele Leroux Bustamante
 
AI Agents and FME: A How-to Guide on Generating Synthetic Metadata
AI Agents and FME: A How-to Guide on Generating Synthetic Metadata
Safe Software
 
Mastering AI Workflows with FME by Mark Döring
Mastering AI Workflows with FME by Mark Döring
Safe Software
 
“MPU+: A Transformative Solution for Next-Gen AI at the Edge,” a Presentation...
“MPU+: A Transformative Solution for Next-Gen AI at the Edge,” a Presentation...
Edge AI and Vision Alliance
 
10 Key Challenges for AI within the EU Data Protection Framework.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Priyanka Aash
 
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Nilesh Gule
 
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Safe Software
 
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Priyanka Aash
 
Cyber Defense Matrix Workshop - RSA Conference
Cyber Defense Matrix Workshop - RSA Conference
Priyanka Aash
 
"Scaling in space and time with Temporal", Andriy Lupa.pdf
"Scaling in space and time with Temporal", Andriy Lupa.pdf
Fwdays
 
Quantum AI: Where Impossible Becomes Probable
Quantum AI: Where Impossible Becomes Probable
Saikat Basu
 
"How to survive Black Friday: preparing e-commerce for a peak season", Yurii ...
"How to survive Black Friday: preparing e-commerce for a peak season", Yurii ...
Fwdays
 
PyCon SG 25 - Firecracker Made Easy with Python.pdf
PyCon SG 25 - Firecracker Made Easy with Python.pdf
Muhammad Yuga Nugraha
 
Securing AI - There Is No Try, Only Do!.pdf
Securing AI - There Is No Try, Only Do!.pdf
Priyanka Aash
 
Security Tips for Enterprise Azure Solutions
Security Tips for Enterprise Azure Solutions
Michele Leroux Bustamante
 
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
pcprocore
 
WebdriverIO & JavaScript: The Perfect Duo for Web Automation
WebdriverIO & JavaScript: The Perfect Duo for Web Automation
digitaljignect
 
" How to survive with 1 billion vectors and not sell a kidney: our low-cost c...
" How to survive with 1 billion vectors and not sell a kidney: our low-cost c...
Fwdays
 
Salesforce Summer '25 Release Frenchgathering.pptx.pdf
Salesforce Summer '25 Release Frenchgathering.pptx.pdf
yosra Saidani
 
Techniques for Automatic Device Identification and Network Assignment.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Priyanka Aash
 
You are not excused! How to avoid security blind spots on the way to production
You are not excused! How to avoid security blind spots on the way to production
Michele Leroux Bustamante
 
AI Agents and FME: A How-to Guide on Generating Synthetic Metadata
AI Agents and FME: A How-to Guide on Generating Synthetic Metadata
Safe Software
 
Mastering AI Workflows with FME by Mark Döring
Mastering AI Workflows with FME by Mark Döring
Safe Software
 
“MPU+: A Transformative Solution for Next-Gen AI at the Edge,” a Presentation...
“MPU+: A Transformative Solution for Next-Gen AI at the Edge,” a Presentation...
Edge AI and Vision Alliance
 
10 Key Challenges for AI within the EU Data Protection Framework.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Priyanka Aash
 
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Nilesh Gule
 
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Safe Software
 
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Priyanka Aash
 
Cyber Defense Matrix Workshop - RSA Conference
Cyber Defense Matrix Workshop - RSA Conference
Priyanka Aash
 
"Scaling in space and time with Temporal", Andriy Lupa.pdf
"Scaling in space and time with Temporal", Andriy Lupa.pdf
Fwdays
 
Quantum AI: Where Impossible Becomes Probable
Quantum AI: Where Impossible Becomes Probable
Saikat Basu
 
"How to survive Black Friday: preparing e-commerce for a peak season", Yurii ...
"How to survive Black Friday: preparing e-commerce for a peak season", Yurii ...
Fwdays
 
PyCon SG 25 - Firecracker Made Easy with Python.pdf
PyCon SG 25 - Firecracker Made Easy with Python.pdf
Muhammad Yuga Nugraha
 
Securing AI - There Is No Try, Only Do!.pdf
Securing AI - There Is No Try, Only Do!.pdf
Priyanka Aash
 
Security Tips for Enterprise Azure Solutions
Security Tips for Enterprise Azure Solutions
Michele Leroux Bustamante
 
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
pcprocore
 
WebdriverIO & JavaScript: The Perfect Duo for Web Automation
WebdriverIO & JavaScript: The Perfect Duo for Web Automation
digitaljignect
 

Energy-Efficient LDPC Decoder using DVFS for binary sources

  • 1. ACEEE Int. J. on Information Technology, Vol. 01, No. 01, Mar 2011 Energy-Efficient LDPC Decoder using DVFS for binary sources S.karthikeyan1, S.Jayashri2 1 Sathyabama university/Dept of Electronics and communication Engineering, Chennai, India Email: [email protected] 2 Adhiparasakthi Engineering college/Principal, Melmaruvathur,TN,India Email: [email protected] Abstract- This paper deals with reduction of the transmission a codeword has been found). Also, LDPC codes of almost power usage in the wireless sensor networks. A system with any rate and block length can be created simply by specifying FEC can provide an objective reliability using less power the shape of the parity check matrix, while the rate of turbo than a system without FEC. We propose to study LDPC codes is governed largely by a puncturing schedule, so codes to provide reliable communication while saving power flexibility in rate is obtained only through considerable in the sensor networks. As shown later, LDPC codes are more design effort. Also, since the validity of a codeword is energy efficient than those that use BCH codes. Another method to reduce the transmission cost is to compress the validated if its parity checks, even if errors occur, they are correlated data among a number of sensor nodes before almost always detected errors (especially for long codes). transmission. A suitable source encoder that removes the As an additional boon on the commercial side, LDPC codes redundant information bits can save the transmission power. are not patent protected. On the negative side, LDPC codes Such a system requires distributed source coding. We propose have a significantly higher encode complexity than turbo to apply LDPC codes for both distributed source coding and codes, being generically quadratic in the code dimension, source-channel coding to obtain a two-fold energy savings. although this can be reduced to some extent. Also, decoding Source and channel coding with LDPC for two correlated nodes may require many more iterations than turbo decoding, which under AWGN channel is implemented in this paper. In this has implications for latency. iterative decoding algorithm is used for decoding the data, and it’s efficiency is compared with the new decoding algorithm B. Constructing LDPC Codes: called layered decoding algorithm which based on offset min sum algorithm. The usage of layered decoding algorithm and Several different algorithms exists to construct suitable Adaptive LDPC decoding for AWGN channel reduces the LDPC codes. Only binary LDPC codes are considered here. decoding complexity and its number of iterations. So the power We use N to denote the length of the code and K to denote will be saved, and it can be implemented in hardware. its dimension and M = N-K. Since the parity check matrices we consider are generally not in systemic form, we usually Index Terms- LDPC codes, Distributed Source coding, Source use the symbol A to represent parity check matrices, reserving Channel coding, iterative decoding algorithm, layered decoding the symbol H for parity check matrices in systematic form. algorithm. Following the general vector m is a K x 1 vector; a codeword is a N x 1 vector. The generator matrix G is N x K and the I. INTRODUCTION parity check matrix A is ( N-K) x N , such that HG=0. We denote the rows of a parity check matrix as A. Low-Density-Parity Check-LDPC Codes: Low-density parity-check (LDPC) codes are a class of linear block LDPC codes. The name comes from the characteristic of their parity-check matrix which contains only a few 1’s in comparison to the amount of 0’s. Their main advantage is that they provide a performance which is The equation aiTc= 0 is said to be a linear parity- very close to the capacity for a lot of different channels and check constraint on the codeword c. We use the notation zm linear time complex algorithms for decoding. LDPC codes = amTc and call zm a parity check or, more simply, a check. have performance exceeding, in some cases, that of turbo For a code specified by a parity check matrix A, it is expedi- codes, with iterative decoding algorithms which are easy to ent for encoding purposes to determine the corresponding implement (with the per-iteration complexity much lower generator matrix G. A systematic generator matrix may be than the per-iteration complexity of turbo decoders), and are found as follows. Using Gaussian elimination with column also parallelizable in hardware. There are other potential pivoting as necessary (with binary arithmetic) determine an advantages to LDPC codes as well. In a very natural way, the decoder declares a decoding failure when it is unable to correctly decode, whereas turbo decoders must perform extra If such a matrix A , does not exist, then A is rank computations for a stopping criterion (and even then, the deficient, r = rank(A) < M . In this case, form H by truncat- stopping criterion depends upon a threshold that must be ing the linearly dependent rows from Ap-1A . The correspond- established, and the stopping criterion does not establish that ing code has R = K / N > (N - M) / N , so it is a higher rate © 2011 ACEEE 1 DOI: 01.IJIT.01.01.37
  • 2. ACEEE Int. J. on Information Technology, Vol. 01, No. 01, Mar 2011 code than the dimensions of A would suggest) Having found H, from We study the asymmetric distributed source cod- Then HG=0, so ApHG = AG = 0, so G is a generator ing scenario in which it is assumed the signal X1 is com- matrix for A. While A may be sparse neither the systematic pressed conventionally and sent at full rate RX1 e” H(X1), generator G nor H is necessarily sparse. Fewer than half of and is recovered perfectly at the decoder. We want to com- the elements are nonzero. Since the A matrix is sparse, it can press the X2 as close as possible to the Slepian-Wolf bound be represented efficiently using lists of its nonzero locations. of H(X2|X1). As we can see the chosen rates for RX1 and In this notation, bits are typically indexed by n or n’ and the RX2 satisfy the inequalities of above equations. checks are typically indexed by m or m’. The set of bits that The corresponding sensor communication is shown in participate in check zm (i.e., the nonzero elements on the mth figure 1. row of A is denoted Fig.1. System for compression of X2 with the side information of X1 at Thus we can write the mth check as the Decoder B. Encoding and decoding with LDPC codes: A low-density parity-check (LDPC) code is determined by its parity-check matrix (H) or, equivalently by its bipartite graph. An ensemble of LDPC codes is described by the The set of bits that participate in Zm except for degree distribution polynomials ë(x), and ñ(x). The bipartite bit n is denoted graph is used in the message-passing decoding algorithm. Encoding- Given, H to encode, i.e., compress, an arbitrary binary input sequence, we multiply X with H and The notation INmI indicates the number of elements find the corresponding syndrome. Z1 [length (n-k)] in the set Nm.These sets should be considered ordered lists, equivalently, in the bipartite graph, this can be viewed as with the ith element of Nm being indicated by Nm (i). The set binary addition of all the variable node values that are of checks in which bit cn participates (i.e., the nonzero ele- connected to the same check node. ments of the nth column of A ) is denoted Decoding algorithm- The decoder must estimate the n-length sequence X from its (n — k) long syndrome Z1 and the corresponding n-length sequence Y We use the following notation: II. EXISTING METHODOLOGY • xi, yi £ {0, 1}, i = 1, 2, ..., n, are the current values of Xi and Yi. respectively, corresponding to A. Distributed Source Coding Between Two Correlated the i th variable node vi: Sources: • Li£ {2, 3, ...},i< = 1,2, ..., n, is the degree of V i Consider a communication system of two statistically • ,qouti,m (qini,m )£ R, i= 1, 2, ..., n, m = 1, 2,....li.is dependent signals, X1 and X2. The dependency between X1 the log-likelihood ratio and X2 can be fully described by the conditional probability (LLR) sent along the mth edge mass function P[X1|X2]. A suitable source encoder that from (to) V i, removes the redundant information bits, reduces both the • Sj £ {0, 1} j = 1, 2, ..., n — k, is the value of length of the transmitting information and the power Z1,j corresponding to the consumption. The correlation between signals X1 and X2 Jth check node Cj, i.e., the j th syndrome can be modelled as the input and output of a binary symmetric component; channel with the crossover probability of P[X1 ‘“ X2|X1] = • r j £ {2, 3, ...}, j = 1, 2, ..., n — k, is the degree p. According to Slepian-Wolf theorem. The output of two of c j ; correlated sources that do not communicate can be • toutjm (tinj,m )£ e R, j = 1, 2, ..., n-k, m = 1, 2, ...rj, compressed with the same rate as if they were is the LLR sent along the mth edge from (to) c j . communicating. This is true when the decoder has access to Step 1: Setting the both compressed outputs. Such a system requires distributed source coding. The Slepian-Wolf rate region can be expressed as following: © 2011 ACEEE 2 DOI: 01.IJIT.01.01.37
  • 3. ACEEE Int. J. on Information Technology, Vol. 01, No. 01, Mar 2011 Step 2: i=1,2…..n, p<=0.5 the LLR sent from the i th iterations is insufficient. This paper describes a more variable node vi along the mth edge is comprehensive design that accommodates both fading channels and the more difficult case of AWGN channels. This paper presents the LDPC decoding algorithm based on offset min-sum and layered decoding. Assume binary phase shift keying (BPSK) modulation ( M=1,2,.....li,i=1,2,....n where initially qini,j=0 1 is mapped to “1 and 0 is mapped to 1) over an additive Step 3: The values qouti,m are assigned to the corresponding white Gaussian noise (AWGN) channel. The received values tinj,ð (i,m,j) according to the connections in the bipartite yn are Gaussian with mean xn = 1 and variance ä^(2). The graph and are then used to do the processing at the check Iterative two-phase message-passing (TPMP) algorithm, also nodes. From the “tanh rule” and the syndrome information, known as belief-propagation (BP) algorithm is computed in the LLR sent from the jth check node cj along the mth two phases. One is a check node processing and the other is edge is variable node processing. In the check node processing, each row of the parity matrix is checked to verify that parity check constraints are satisfied. In the variable node processing the probability will be updated by summing up the other j= 1, 2, ..., n-k, m = 1, 2, ...rj, The probabilities from the rest of the rows and the a prior inclusion of the (1 — 2sj) factor accounts for the probabilities from the channel output. The message passing syndrome information. algorithm can be simplified to the belief-propagation based step 4: Now qini,m = toutj,ð (i,m,j) for all edges in the bipartite algorithm (also called Min-Sum algorithm). While greatly graph, which can be used to start a new iteration and estimate reducing the decoding complexity in implementation, the xi from Min-Sum degrades the coding performance. The improved BP based algorithm, Normalized-Min-Sum and Offset-Min- Sum eliminates this performance degradation. Following the same notation in [8], the check node processing can be expressed as: R(i)mn = ä(i)mn max (ê (i)mn “ â, 0) III. PROPOSED METHODOLOGY ê (i)mn =%R(i)mn % = min % Q (i”1)n’m % A. LDPC Layered Decoding Based on Offset MIN-SUM Algorithm: n”N(m)n In practice, the LDPC decoder is typically set to (i) run for data convergence until a prescribed maximum num- Where Q nm is the message from variable node n to ber of iterations (e.g. 20) depending on the code rate. How- check node m, ever, the actual number of decoding iterations varies from R(i)mn is the message from check node m to frame to frame. In the case that channel data comes in con- variable node n, and superscript i denotes the ith iteration. stant time interval, a conventional decoder has to be config- M(n) is the set of the neighbouring check nodes for ured to accommodate the worst case scenario. As a result, variable node n, and N(m) is the set of the neighbouring the decoder often remains idle since for most frames, the variable nodes for check node m, â is a positive constant decoding process ends far earlier than the maximum num- and depends on the code parameters ber of iterations. Thus it is not power efficient. In the decod- The sign of check-node message R(i)mn is defined as ers proposed is based on an on-the-fly computation para- digm, optimized dataflow graphs are introduced to reduce ä(i)mn = ( Ï sgn (Q(i”1)n’m )) the logic and internal memory requirements of the LDPC n_”N(m)n In the variable node processing, decoder and at the same time the decoder’s parallelization is tailored to average number of decoding iterations for the Qn = L(0)n + “ R(i)mn target frame error rate for the operating SNR region. These decoders buffer statistically for different parallelization based m”M(n)/m on average number of decoding iterations while ensuring Where the log-likelihood ratio of bit n is L(0)n = yn. For the performance similar to that of a fixed iteration decoder final Decoding configured for maximum number of iterations. These de- Pn = L(0)n + “ R(i)mn coders are almost fully utilized and run at the maximum fre- m”M(n) quency. The proposed paper improves the system. There have A hard decision is taken by setting xn = 0 if Pn(xn) e” 0, and been researches on early termination of frame that cannot xn = 1 if Pn(xn) d” 0. If xHT = 0, the decoding process is be decoded even if the maximum iterations are applied. In finished with ˆxn as the decoder output; otherwise, repeat both of papers, early termination of the iterative process is processing of Equation. If the decoding process does not determined by checking the messages during the decoding. end within predefined maximum number of iterations, itmax, Between initial check error and number of decoding 3 © 2011 ACEEE DOI: 01.IJIT.01.01.37
  • 4. ACEEE Int. J. on Information Technology, Vol. 01, No. 01, Mar 2011 stop and output an error message flag and proceed to the The results showed how LDPC codes can be used in decoding of the next data frame. Mansour, introduces the providing reliable data transmission and developing concept of turbo decoding message passing (also called as aggregation techniques for correlated data in wireless sensor layered decoding) for their AA-LDPC codes using BCJR networks.. It was shown that while some FEC coding which is able to reduce the number of iterations without V. schemes can improve the energy efficiency of a performance degradation when compared to the standard communication link, it proves that FEC using LDPC codes message passing algorithm. Contrast to two phase message can reduce the transmission power. The simulation results passing algorithm, where all check-nodes are updated si- showed that using LDPC codes for FEC is significantly more multaneously in each iteration, layered decoding view the H efficient than using BCH codes. matrix as a concatenation of j = dv sub-codes, The H matrix is divided into different block-rows and block CONCLUSION columns. After the check-node processing of one layer, the The ‘Source and channel coding’ and ‘distributed Source updated messages are immediately used to calculate the vari- coding‘ of two correlated nodes are done. The performances able node message, whose results are then applied to next of Both are compared. And Source and channel coding with layer of sub-code. Each iteration in the layered decoding LDPC for two correlated nodes under AWGN channel is algorithm is composed of j sub-iterations. The processing of implemented in this paper. In this iterative decoding one block row is called a sub-iteration and each iteration is algorithm is used for decoding the data, and it’s efficiency is composed of j = dv sub-iterations. compared with the new decoding algorithm called layered Mathematically, the layered decoding algorithm can be decoding algorithm which based on offset min sum described as in algorithm. From this we can conclude that by using layered Algorithm: decoding algorithm the decoding complexity is much step1: R(0)l,n = 0, “ l” [1, dv], reduced and its performance is improved when compared n “ [1, dc] with iterative decoding algorithm. step2: Pn = L(0)n , “ n “ [1, dc] step3: for each i = 1, 2, · · · , itmax REFERENCE do step4: for each l = 1, 2, · · · , dv do [1] A. D. Liveris, Z. Xiong, and C. N. Georghiades, “Compression step5: for each n = 1, 2, · · · , dc do of binary sources with side information at the decoder using LDPC Q(i)l,n=PnR(i”1)l,n codes,” IEEE Comm. Letters, vol. 6, pp. 440–442, Oct. 2002. R(i)l,n = f [Q(i )] “n_ “ [1, dc] [2] T. J. Richardson and R. L. Urbanke, “The capacity of low- Pn=Q(i)l,n + _R(i)l,n. density paritycheck codes under message passing alorithm,” IEEE Trans. Inform,Theory, vol. 47, pp. 599–618, Feb. 2001. IV. RESULT [3] S. S. Pradhan and K. Ramchandran, “Distributed source coding usingsyndromes (DISCUS): design and construction,” A. Source Coding for LDPC with Two correlated nodes by Proc. IEEE Data Compression Conference, pp. 158–167, March using SUM Product and Layered Decoding Algorithm 1999. [4] S. S. Pradhan and K. Ramchandran, “Distributed source coding: symmetric rates and applications to sensor networks,” Proc. IEEE Data Compression Conference, pp. 363–372, March 2001. [5] Weihuang Wang, Gwan Choi and Kiran K. Gunnam “Low- Power VLSI Design of LDPC Decoder Using DVFS for AWGN Channels” 22nd International Conference on VLSI Design. 2009 [ 6 ] h t t p : / / b o o k s . g o o g l e . c o m / books?id=9JVsRYL0ZkUC&pg=PA2 06&dq=bit+flipping+algorithm++%2Bldpc&ei=net7S92_N5D8lA N5D8lATzl8izCA&cd=6#v=onepage&q=bit%20flippi ng%20algorithm%20%2Bldpc&f=false [ 7 ] h t t p : / / b o o k s . g o o g l e . c o m / books?id=9EJQk0mPlYC&pg=PA651&dq=offset+minsu m+decoding+algorithm%2Bldpc&ei=GvWXS__dM5DMlQSU06 Fig.4. The performance of LDPC decoder by using sum product and dM5DMlQSU06zxCQ&cd=1#v=one page&q=&f=false layered decoding algorithms [8]http://books.google.com/ books?id=z8nmMkUFqdwC&pg=PA 534&dq=offset+minsum+decoding+algorithm%2Bldpc&ei=GvW XS__dM5DMlQSU06zxCQ&cd=2#v=onepage&q=&f=false © 2011 ACEEE 4 DOI: 01.IJIT.01.01.37