Design of Convolutional Codes for varying Constraint Lengths
Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2013, Vol 4, Issue 1
Abstract
Convolutional codes play a vital role in wireless communication with the increase in usage of low-latency applications operating at high data rates. As the current technologies demand high data rates, the design of convolutional codes is necessary for varying lengths. They can be designed as recursive or nonrecursive codes hence they represent a state machine. Non-recursive codes prove a better choice for single input based serially communicated applications. This paper concentrates on the design and verification of these codes using XilinxISE 10.1i Tool.
Authors and Affiliations
S. VikramaNarasimhaReddy1 , Charan Kumar . K 2 , Neelima Koppala3
Role of Feature Reduction in Intrusion Detection Systems for Wireless Attacks
A lthough of the widespread use of the WLANs, it is still vulnerable for the availability security issues. This research presents a proposal Wireless Network Intrusion Detection System (WNIDS) which is use misuse and ano...
A Survey on an Efficient Technique of Encryption Scheme and its Extension in Cloud Based PHR System
Scalable and secure sharing of personal health record in cloud computing is an emerging trend in Health field for exchange and the use of personal Health information. This sensitive data is shared and stored by the third...
Reduction in routing overhead in MANET using 2-ACK scheme and Novel routing Algorithm
Mobile Ad hoc Network (MANET) is a collection of mobile nodes equipped with both a wireless transmitter and a receiver that communicate with each other via bi-directional wireless links either directly or indirectl...
Estimating Corroded Area of Metallic Surfaces Using Edge Detection & Hole Filling
This paper focuses on developing a system to estimate the area of corroded metallic surface using edge detection techniques. For this purpose, an algorithm is presented along with an edge detection technique based on mor...
An Overview on Privacy Preserving Data Mining Methodologies
Abstract— Recent interest in the collection and monitoring of data using data mining technology for the purpose of security and business-related applications has raised serious concerns about privacy issues. For...