Implementation of Polar Codes in 5g
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 4
Abstract
A new proposed method for constructing codes that achieves the symmetric capacity, (the capacity of the channel with the same probabilities for the inputs), I (W) , of any Binary Discrete Memoryless Channel W (BDMC) and this is achieved by channel polarization. Channel polarization refers that out of N independent channels, a second set of N input channels {Wⁱ :1 ≤ i ≤ N} such that, as N becomes large, the fraction of indices i for which I(Wⁱ) is near 1 approaches I(W) and the fraction for which I(Wⁱ) is near 0 approaches 1-I(W). The polarized channels Wⁱ are well-conditioned for channel coding: one need only send data at rate 1 through those with capacity near 1 and at rate 0 through the remaining. Codes constructed on the basis of this idea are called polar codes.The block length while constructing the polar codes should be N= .Better performance is achievable by encoders and decoders with complexity O(log N) for each.
Authors and Affiliations
Dr. G. Indumathi, U. Lakshmi, S. Madhumithra
Experimental Study of RHA Concrete
This paper summarizes the research work on the properties of Rice Husk Ash (RHA) when used as partial replacement for Ordinary Portland Cement (OPC) in concrete. OPC was replaced with RHA by weight at 0%, 5%, 7.5%, 10%...
Real Time Industrial Monitoring & Automatic Controlling using HTTP Protocol
Automation is the current need of industries. There are number of technologies that are growing to achieve the good automation in the plant. One of the recently popular technologies is the automation using sensors and a...
Analysis on Security Evaluation of Pattern Classifiers under Attack
Analysis on security evaluation of pattern classifiers under attack describes pattern classification systems that are security evaluation problems because of different attacks. Pattern Classification commonly used in ad...
Sensitivity Analysis of High Speed Sense Amplifier
In this paper we have examined the sensitivity Of Current Mirror Sense amplifier at different values of Vdd and W/L ratio.We have verified the results of sensitivity at 180 nano meter technology. In this Paper we will s...
Sound Signature in Graphical Password
Mostly user select password that is predictable. This happens with both graphical and text based passwords. Users tend to choose memorable password, unfortunately it means that the passwords tend to follow predictable p...