25.01.2014 Views

IJCA Template - International Journal of Computer Applications - IJCA

IJCA Template - International Journal of Computer Applications - IJCA

IJCA Template - International Journal of Computer Applications - IJCA

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>International</strong> <strong>Journal</strong> <strong>of</strong> <strong>Computer</strong> <strong>Applications</strong> (0975 – 8887)<br />

Volume 7– No.7, October 2010<br />

J P(B<br />

i<br />

/ c<br />

j<br />

1) P(B<br />

0<br />

/ c<br />

j<br />

1)<br />

<br />

LLR<br />

j<br />

ln ln<br />

<br />

i1<br />

P(B<br />

i<br />

/ c<br />

j<br />

0) P(B<br />

0<br />

/ c<br />

j<br />

0)<br />

<br />

According to [9], (6) can be expressed as<br />

j 0 0 i i<br />

i1<br />

J<br />

LLR (1 2B )w (1 2B )w<br />

(7)<br />

where the value <strong>of</strong> ( 1 2B i<br />

) is equal to +1 or –1 and wi<br />

is a<br />

weighting term proportional to the reliability <strong>of</strong> the i th orthogonal<br />

parity check. It is easy to show that:<br />

4E<br />

(1 2B )w r<br />

and<br />

w<br />

s<br />

0 0 j<br />

N0<br />

ni<br />

<br />

1 tanh(L / 2)<br />

<br />

<br />

<br />

ik<br />

k1<br />

i<br />

ln ni<br />

<br />

1<br />

tanh(L<br />

ik<br />

/ 2) <br />

k1<br />

<br />

where ik represents the k th element <strong>of</strong> the i th parity equation and<br />

L<br />

4E<br />

s<br />

r . (10)<br />

ik<br />

ik<br />

N<br />

0<br />

Thus the s<strong>of</strong>t output can be split into two terms, namely into a<br />

normalized version <strong>of</strong> the s<strong>of</strong>t input r and an extrinsic<br />

information E representing the estimates made by the orthogonal<br />

j<br />

bits on the current bit c . Hence (7) becomes<br />

s<br />

j j j<br />

N0<br />

j<br />

4E<br />

LLR r E<br />

(11)<br />

We make the following notations:<br />

L<br />

4E<br />

s<br />

c<br />

, (12)<br />

N0<br />

which is called the reliability value <strong>of</strong> the channel.<br />

The algorithmic structure <strong>of</strong> the SISO threshold decoding can be<br />

summarized as follows:<br />

For each<br />

j 1,..,<br />

n<br />

Compute the terms<br />

B<br />

i<br />

and<br />

Calculate B and<br />

0<br />

W<br />

0<br />

Compute the extrinsic information<br />

The S<strong>of</strong>t-output is obtained by:<br />

w , i<br />

1,..,J<br />

<br />

i<br />

E<br />

j<br />

LLR<br />

j<br />

Lcrj E<br />

j<br />

2.4 Modifications for Rayleigh fading channel<br />

For our algorithm to be applicable in wireless environment, their<br />

performance on fading channels must be examined. In the channel<br />

model we use, each received bit r j can be expressed as:<br />

r a cˆ<br />

n<br />

(13)<br />

j j j j<br />

In this representation, ĉ<br />

j is a BPSK symbol associated to the<br />

transmitted bit c j , and n j is an AWGN. The Rayleigh variable a j is<br />

j<br />

(6)<br />

(8)<br />

(9)<br />

generated as<br />

a x y<br />

(14)<br />

2 2<br />

j j j<br />

where x j and y j are zero mean statistically independent Gaussian<br />

random variables each having a variance 2 . We consider the<br />

power normalized to one as<br />

2 2<br />

Ea <br />

<br />

2<br />

1<br />

j <br />

(15)<br />

which give a variance <strong>of</strong> 0.5 for Gaussien variables.<br />

On the Rayleigh fading channel, the availability <strong>of</strong> channel<br />

side information is the key issue in determining the necessary<br />

modification for the iterative threshold decoding algorithm. The<br />

threshold decoding algorithm has to be modified slightly by<br />

changing equation (12) which define the reliability value <strong>of</strong> the<br />

channel by<br />

4E<br />

L s<br />

c<br />

a<br />

(16)<br />

j<br />

N<br />

0<br />

3. ITERATIVE THRESHOLD DECODING<br />

3.1 Iterative Threshold Decoding <strong>of</strong> OSMLD<br />

codes<br />

Iterative decoding process (see Fig. 1) can be described as<br />

follows: In the first iteration, the decoder only uses the channel<br />

output as input, and generates extrinsic information for each<br />

symbol. In subsequent iterations, a combination <strong>of</strong> extrinsic<br />

information and channel output is used as input<br />

E (q)<br />

(q)<br />

The s<strong>of</strong>t input respectively the s<strong>of</strong>t output <strong>of</strong> the q th iteration is<br />

given by:<br />

R(q) R (q)E(q)<br />

(17)<br />

LLR(q) L R(q) E(q 1)<br />

(18)<br />

c<br />

E ( q 1)<br />

R (q) SISO-<br />

Threshold<br />

LLR ( q 1)<br />

Decoder<br />

R<br />

Fig. 1: The block diagram <strong>of</strong> the q th iteration.<br />

where R represent the received data, E(q) is the extrinsic<br />

information computed by the previous iteration. In our procedure<br />

we use a fixed value 1/J for the parameter (q)<br />

and this for all<br />

iterations. The value chosen for (q)<br />

reacts as an average <strong>of</strong> all J<br />

estimators which contribute in the computation <strong>of</strong> E j .<br />

3.2 Iterative Threshold Decoding <strong>of</strong> product<br />

codes<br />

The developed algorithm can also be applied to product codes and<br />

parallel concatenated codes based on block codes. Let us consider<br />

two linear block codes C 1 having parameters ( n<br />

1<br />

, k<br />

1<br />

, d<br />

1<br />

) and C 2<br />

having parameters ( n ,<br />

2<br />

k ,<br />

2<br />

d ) where<br />

2<br />

n ,<br />

i<br />

k and<br />

i<br />

d (i =1,2)<br />

i<br />

stand for codeword length, number <strong>of</strong> information bits and<br />

minimum Hamming distance respectively. It is assumed that the<br />

14

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!