Implementation of Polar Codes in 5g
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 4
Abstract
A new proposed method for constructing codes that achieves the symmetric capacity, (the capacity of the channel with the same probabilities for the inputs), I (W) , of any Binary Discrete Memoryless Channel W (BDMC) and this is achieved by channel polarization. Channel polarization refers that out of N independent channels, a second set of N input channels {Wⁱ :1 ≤ i ≤ N} such that, as N becomes large, the fraction of indices i for which I(Wⁱ) is near 1 approaches I(W) and the fraction for which I(Wⁱ) is near 0 approaches 1-I(W). The polarized channels Wⁱ are well-conditioned for channel coding: one need only send data at rate 1 through those with capacity near 1 and at rate 0 through the remaining. Codes constructed on the basis of this idea are called polar codes.The block length while constructing the polar codes should be N= .Better performance is achievable by encoders and decoders with complexity O(log N) for each.
Authors and Affiliations
Dr. G. Indumathi, U. Lakshmi, S. Madhumithra
Design and modal analysis of bulkhead for a trainer aircraft
A new method of bulkhead model is done by CATIA V5. The method of creating a model helps to determine the internal forces, deflections, and stress distribution along the bulkhead using finite element software packages M...
Microstructure and Mechanical Property Changes During TIG Welding of 31000-H2 (IS-737) Aluminium Alloy
Welding, as one of the most effective joining methods for metals, has been extensively applied in engineering usage since a long time. The determination of microstructure and mechanical properties of welded structures i...
Modern Agriculture using Sensors
In this project came from the countries where economy is based on agriculture and the climatic conditions lead to lack of rains & scarcity of water. The farmers working in the farm lands are solely dependent on the rain...
Android Based LAN Monitoring System
The increasing demands and use of computers in universities and research labs generated the need to provide high speed interconnections between computer systems. This paper represents how a computer or multiple computer...
Video Forgery Detection Using DWT, Optical Flow and SIFT Methods
Digital video offer many attributes for tamper detection algorithms to take advantage of, specifically the color and brightness of individual pixels as well as the resolution and format. These properties provide scope f...