SlideShare a Scribd company logo
1 of 8
Download to read offline
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 6, Issue 6 (Jul. - Aug. 2013), PP 11-18
www.iosrjournals.org
www.iosrjournals.org 11 | Page
Comparison of Turbo Codes and Low Density Parity Check
Codes
Ahmad Hasan Khan1
, Dr K C Roy2
,
1
Electronics and Communication Engg. Suresh Gyan Vihar University, Jaipur
2
Professor SBCET Jaipur
Abstract-The most powerful channel coding schemes, namely, those based on turbo codes and LPDC (Low
density parity check) codes have in common principle of iterative decoding. Shannon’s predictions for optimal
codes would imply random like codes, intuitively implying that the decoding operation on these codes would be
prohibitively complex. A brief comparison of Turbo codes and LDPC codes will be given in this section, both in
term of performance and complexity. In order to give a fair comparison of the codes, we use codes of the same
input word length when comparing. The rate of both codes is R = 1/2. However, the Berrou’s coding scheme
could be constructed by combining two or more simple codes. These codes could then be decoded separately,
whilst exchanging probabilistic, or uncertainty, information about the quality of the decoding of each bit to each
other. This implied that complex codes had now become practical. This discovery triggered a series of new,
focused research programmes, and prominent researchers devoted their time to this new area.. Leading on from
the work from Turbo codes, MacKay at the University of Cambridge revisited some 35 year old work originally
undertaken by Gallagher [5], who had constructed a class of codes dubbed Low Density Parity Check (LDPC)
codes. Building on the increased understanding on iterative decoding and probability propagation on graphs
that led on from the work on Turbo codes, MacKay could now show that Low Density Parity Check (LDPC)
codes could be decoded in a similar manner to Turbo codes, and may actually be able to beat the Turbo codes
[6]. As a review, this paper will consider both these classes of codes, and compare the performance and the
complexity of these codes. A description of both classes of codes will be given.
I. Turbo Codes
There are different ways of constructing Turbo codes, but the commonality is that they use two or more
codes in the encoding process. The constituent encoders are typically recursive, systematic convolution (RSC)
codes [3]. Figure 1 shows a general set-up of the encoder. The number of bits in the code word varies with the
rate of the code. For an overall code rate of R = 1/2, it is normal to use two R = 1/2 RSC codes, where every
systematic bit is transmitted, but for the coded bits a puncturing matrix is used where only every second code bit
from each of the constituent codes is included in the transmitted symbol. The permutation matrix Π permutes
the systematic bits, so that the two constituent codes are excited by the same set of information bits, albeit in a
different order. The permutation matrix is a critical design factor for designing good codes. The code word
consists of Ci
1
as the systematic bit (di) and Ci
2
and Ci
3
which are vectors of encoded bits from the two
convolution codes. These vectors can contain one or more bits and di is the information bit, Π is the permutation
matrix.
Figure 1: Block Diagram of Turbo Encoder
Comparison Of Turbo Codes And Low Density Parity Check Codes
www.iosrjournals.org 12 | Page
1.1. The BCJR algorithm
The BCJR algorithm [1] is used for optimal decoding of the constituent codes of the turbo codes. This
algorithm is similar to the message passing algorithm used in the context of LDPC codes. The BCJR algorithm
is a symbol based decoder, and delivers probabilities of the correctness of the symbol decoding together with
each decoded bit. In a convolution code, we must separate between state transitions caused by an information bit
having value 1 and those caused by an information bit having value 0. We denote the states linked together by a
state transition that occurs between time (i – 1) and time i Si−1
a1
and Si
b1
if this transition is caused by a 1 as the
information bit. Correspondingly, the notation is Si−1
a0
and Si
b0
if the transition is caused by a 0 as the information
bit. We denote the vector of received channel symbols y, where y is perturbed by AWGN. We denote the
information bit at time i di. The log likelihood ratio for a state transition associated with di = 1 and di = 0 is then
given by
λi= log
P(Si−1
a1
,Si
b1
,y)
P(Si−1
a0 ,Si
b0,y)
(1)
In the case of many possible state transitions, the expression gets more complicated:
λi= log
P(Si−1
a
,Si
b
,y)
Si−1
a ,Si|di =1
b
P(Si−1
a ,Si
b ,y)
Si−1
a ,Si
b |di =0
(2)
The vector y may be split into three parts:
y = yp
i=1
p=1 +yi + yk
N
k=i+1 (3)
si
b
And yi depend only on the state si−1
a
and the bit di , whereas yk
N
k=i+1 depend only on si
b
and the bits dk k
ϵ{i+1, N}. The probability of the state transition si−1
a
si
b
is then given by the expression in (4).
P (si−1,
a
si
b
y,) = P (si−1,
a
si
b
, y 𝐩
i=1
p=1 + yi+ yk
N
k=i+1 (4)
= P (si−1,
a
, yp)(yiii=1
p=1 + yk
N
k=i+1 , Si
b
| Si−1
a
)
= P (si−1,
a
, yp)(yi,i−1
p=1 Si
b
|Si−1
a
)( yk
N
k=i+1 |Si
b
)
Eqn. 4 may then be written as
P (si−1,
a
si
b
y) =α si−1,
a
γ si−1,
a
si
b
β Si
b
(5)
With the following definitions:
γ si−1,
a
si
b
≜ P (yi, si−1
a
|si
b
,)
= P (yi|si−1
a
, si
b
,) P (si−1
a
, si
b
,) (6)
α si−1,
a
≜ P (si−1,
a
, yp)i−1
p=1 (7)
β Si
b
≜ ( yk
N
k=i+1 |Si
b
(8)
Furthermore, we may express
α si−1,
a
= α si−2,
a
si−2,
a γ si−2,
a
si−1
b
(9)
And
β Si
b
= β si+1,
a
si−1,
a γ si,
a
si+1
b
(10)
We substitute Eqn. (5) into Eqn. (2) and obtain Eqn. (11).
λi= log
α si−1,
a
γ si−1,
a
si
b
β Si
b
Si−1
a ,Si|di =1
b
α si−1,
a γ si−1,
a si
b β Si
b
Si−1
a ,Si
b |di =0
(11)
As shown in Eqn. (6), we have:
γ si−1,
a
si
b
= P (si−1
b
|si
a
,) P (yi|si
b
, si−1
a
,) (12)
Through knowledge of the nature of AWGN, Eqn. (12) may be written as:
γ si−1,
a
si
b
= P (si−1
b
|si
a
) e
−
( y
i
j
(2c
i
j
−1)2)
2σ2n
j=1 (13)
We compute the logarithm of Eqn. (13) and obtain Eqn. (14).
Comparison Of Turbo Codes And Low Density Parity Check Codes
www.iosrjournals.org 13 | Page
log γ si−1,
a
si
b
=P(log(si−1
b
|si
a
)) +
(yi
j
−ai
j
)2
2σ2
n
j=1 -log(√(2 σ2
) (14)
P (si−1
b
|si
a
) is equal for all permissible states Sb if we assume an equal probability of 1’s and 0’s in the
information sequence. This part may therefore be omitted in the decoding process. The metric of a symbol n is
then given by Eqn. (43)(15).
Mi
ab
=
(yi
j
)2+(ai
j
)2+2yi
j
ai
j
2σ2
n
j=1 - (15)
1.2. The Log-BCJR algorithm
The Log-BCJR algorithm is a simplification of the BCJR algorithm in terms of the needed
computations. We start with the following definitions:
f (·)≜ log α (·)
r (·) ≜ log β (·)
g (·) ≜log γ (·)
f (si
b
) = log ( α si−1,
a
si−1,
a γ si−1,
a
si
b
(16)
log (α si−1,
a
= f(α si−1,
a
)⇒ α si−1,
a
)
= ef si−1,
a
(17)
This gives:
f (si,
a
) = log( ef r(si−1,
a
+g(si−1,
a
si−1,
a si
b
)) (18)
Correspondingly for β :
r (si−1)
b
= log( e
r(si,
b
+g(si−1,
a
si,
b si
b
)) (19)
Eqn. (20) shows the expression for log γ (si−1
a
, si
b
).
γ si−1,
a
si
b
= log (P (yi| (si
b
si−1
a
,) + log (P(si
b
|si−1
a
) ) (20)
γ Now becomes:
γi = log(( e f(si,−1
a
+r(si
b
)+g(si−1,
a
si−1,,
a si
b |di=1 si
b
))
- log (( e f(si,−1
a
+r(si
b
)+g(si−1,
a
si−1,,
a si
b |di=0 si
b
))
(21)
This implies a summation of a series of exponentials. This may be simplified (4):
Log (ex
+ e y
) = max(x, y) + log (1 + e |x-y|
) (22)
We denote this calculation L(x, y).
Log exiI
i=1 = log ( exi
+log exiI
i=2
= log ( exi
+log exiI−1
i=1
= L (xi, log exiI−1
i=1 )
= L (xi, log(eI−1
+ exiI−2
i=1 )
= L ( xi ,L(xI-1,log( exiI−2
i=1 )) (23)
This becomes a recursion which we may write as Eqn. (24).
log exiI
i=1 =L(xI,L(xI-1,L(…L(x1,x1)….))) (24)
In most cases, this may be further simplified as shown in Eqn. (25).
Log exiI
i=1 ≈ max⁡(xi) (25)
Through the use of this simplification, the computation of f(·) and r(·) becomes a forward and backward Viterbi
algorithm respectively
.
1.3. Decoding of Turbo Codes
The decoding algorithms described in the preceding sections are algorithms for decoding the
constituent RSC codes of turbo codes. In order to get the ’turbo structure’ the decoding algorithms of each of the
constituent codes have to be combined in a similar manner to the message passing algorithm described
previously. Figure 2 illustrates a multiple iteration decoder. Here, there is a feedback loop, where the first
decoder is fed new information from the last decoder of the previous iteration. The information that is passed on
to the next decoder is generally denoted γ e. This is the extrinsic part of γ that was generated in the given
decoding. The subtractions shown in the figure ensure that only new information is used in subsequent decoding
stages. This message passing implies that the a posteriori probability from one decoder is used as a priori
information in the subsequent decoder.
Comparison Of Turbo Codes And Low Density Parity Check Codes
www.iosrjournals.org 14 | Page
Figure (2) Block Diagram of Turbo Decoder, several iteration
II. Low Density Parity Check Codes
The structure of the code is given by a parity check matrix H, illustrated below. Different codes have
different parity check matrices’.
H =
1 1 1 0 1 1 1 1 1 1
1 1 0 1 1 0 0 1 0 1
0 1 0 0 1 1 1 0 1 0
0 0 1 1 0 0 1 1 0 1
1 0 1 1 0 1 0 0 1 1
(26)
The code word x is constructed so that Eqn. (27) is true.
Hx = 0 (mod 2) (27)
A generator matrix G is used for constructing the code. The generator matrix may be found from the
parity check matrix H.
2.1. Construction of G
First we note that
HX= XT
HT
(28)
The code word x may be split into one information part i and one parity check part c. The code word
may then be written as
XT
= [i ] [c] (29)
Correspondingly, the parity check matrix may be split into two matrices:
H = [A |B] (30)
From Eqn. (28), we note that vector i is multiplied with
Matrix A, whereas vector c is multiplied with matrix B.
On the basis of Eqn. 29 and30, Eqn.27 may be written as
A i + B c = 0 (31)
If the matrix B is non-singular, Eqn. 31 may be inverted
and the check bits c may be found from Eqn. (32)
c = B -1
A i (33)
In practice, it may be necessary to swap over some of the columns in H in order for B to become non-
singular. The product B-1
A makes out the generator matrix G. This matrix is calculated only once, and is used
for all encoding. The parity check matrix is used for constructing a graph structure in the decoder.
2.2. Graph structure
The decoding of LDPC codes may be efficiently performed through the use of a graph structure. In this
work, Tanner graphs will be used for the decoding [8]. The graph is constructed from the parity check matrix H.
Each row in the matrix is represented by a check node, whereas each 1 in the row is represented by an
edge into a bit node. Each column is represented by a bit node, and each 1 in the column corresponds to an edge
into a check node. This is illustrated in Figures 3 and 2. In this manner, a graph is constructed which contains a
total of N bit nodes and M check nodes. The number of edges is decided by the number of 1’s in the parity
check matrix. All edges are connected to a check node and to a bit node. The number of edges connected to a
node denotes the degree of the node.
Comparison Of Turbo Codes And Low Density Parity Check Codes
www.iosrjournals.org 15 | Page
Figure 3: Check Node
2.3. Decoding
In this context, the decoder is a soft-decision input decoder, implying that it operates on the channel
symbols, denoted by
r = 2x − 1 + n (34)
Where n is the AWGN noise vector added in the channel and x is the code word.
2.4. The parity of a vector
Finding the probability of the parity of a vector is a central concept in the decoding of LDPC codes.
Each parity check may be regarded a vector of even parity [2]. First, we define the Likelihood Ratio (LR) as the
ratio between the two probabilities P(x = 1) and P(x = 0):
LR =
P(X=1)
P(X=0)
(35)
The symbol γ is used for the Log Likelihood Ratio,
γ = log
P (x = 1)
P(x = 0)
(36)
If x is a vector of bits, the LLR of a bit i in that vector is
given by γ i.
γi= log
P (xi = 1)
P(xi = 0)
(37)
The notation φ((x) is used for the vector parity. The LLR of the parity of the vector x is then given by:
λφ(x)= log
P (ϕ(xi ) = 1)
P((ϕ(xi) = 0)
(38)
In order to compute λφ(x) Eqn. 39 is used:
tanh(−
λ ϕ(x)
2
) = tanhn
i=1 −
λi
2
(39)
Eqn. 13[39] is solved with respect to λϕ :
λϕ (x) =- 2 tanh-1(
= tanhn
i=1 −
λi
2
(40)
The a posteriori LLR of a bit n is given by:
λn= log
P(xn =1| r)
P(xn =0| r)
(41)
The vector r may be split into two parts rn which refers to the systematic part of the code word, and
{ri≠n}, which refers to the parity bits of the code word. Eqn. 41 may then be expressed as
λn = log
P xn =1 rn , ri ≠1 )
P(xn =0| rn {ri ≠1 })
(42)
Bayes rue is given by:
P (a/b) =
P(b,a)
P(b)
(43)
We use this rule in order to re-express the numerator of Eqn. 42:
P(xn = 1| rn, {ri ≠ 1 )=
f(rn,xn =1, ri≠1 )
f(rn,, ri≠1 )
(44)
Furthermore, using the equality P (a, b) = P (a |b)P(b):
Comparison Of Turbo Codes And Low Density Parity Check Codes
www.iosrjournals.org 16 | Page
P xn = 1| rn, {ri ≠ 1 =
f rn, xn = 1|, ri ≠ 1 f(xn = 1, ri ≠ 1 )
f rn. | , ri ≠ 1 f ri ≠ 1
(45)
Given xn, rn is statistically independent of { ri ≠ 1}:
P xn = 1|rn, ri ≠ 1 =
f rn.|xn =1) f(xn =1, ri≠1 )
f rn.,| ri≠1
(46)
Following the same line of reasoning, the denominator of Eqn. 16 is expanded. Eqn. 42 then becomes:
λn= log
f rn. xn=1 P(xn=1,|{ri ≠1 })
f rn. xn=0 P(xn=0,|{ri ≠1 }
= log
f rn. xn=1
f rn. xn=0
+ log
P(xn =1,|{ri ≠1 })
P(xn =0,| ri ≠1 )
(47)
In an AWGN channel the conditional probability
f(rn |x n) is given by
f(rn| xn) =
1
√2πσ
e−
rn −2xn +1
2σ (48)
Substituting Eqn. 22 into Eqn. 21 we get Eqn. 49.
λn =
2
σ2
rn + log
P(xn=1,|{ri ≠1 })
P(xn=0,| ri ≠1 )
(49)
The first element of the right hand side of the equal sign is denoted the intrinsic part, whereas the
second element is denoted the extrinsic part. Note that if it is known that the parity of a vector x is 0 (even
parity), the probability that a bit xn is 1, given the received values of the rest of the vector ri ≠ n, is the same as
the probability that the rest of the vector { ri ≠ n} has odd parity.
λn =
2
σ2
rn + log
P(ϕ xi=1for i=1….j,|{ri ≠n })
P(ϕ xi=0for i=0….j,| ri ≠1n )
(50)
If the graph is free of cycles, the vectors x1, x2..xj are
Independent, given { ri ≠ 1n }, and if the elements within the vector are independent, Eqn. 50 may be
written as Eqn. 51.
λn =
2
σ2
rn + log
P(ϕ xi=1{ri ≠n })
j
i=1
P(ϕ xi=0|{ri ≠n })
j
i=1
=
2
σ2
rn + log
P(ϕ xi=1{ri ≠n }
P(ϕ xi=0|{ri ≠n })
j
i=1
2
σ2
rn + λ
j
i=1 ϕ(xi) (51)
In the graph λ i, l is the message (contribution) from bit node i to check node l:
λ i, l = log
P(ϕ xi=1{ri ≠n }
P(ϕ xi=0|{ri ≠n })
(52)
We substitute Eqn. 14 into Eqn. 25
λn
=
2
σ2
rn − 2 tanh−1
(
j
i=1 tanh(−k
l=2
λ i,l
2
)) (53)
Eqn. 54 is the expression of the LLR of bit n. The first Part is the intrinsic information, whereas the
second part is the extrinsic information from the j vectors that contain bit n.
Messages into bit node n each bit node has a particular LLR associated with itself. The LLR is
computed from the contributions from all connected check nodes, which constitute the extrinsic information,
and the received values rn, which constitute the intrinsic information. When a check node k receives a message
from a bit node i, it subtracts the value it passed on to bit node i in the previous iteration, i.e. λi,l= λi-u m,i. This is
done in order to reduce the correlations with previous iterations.
Comparison Of Turbo Codes And Low Density Parity Check Codes
www.iosrjournals.org 17 | Page
Figure 4: Messages into bit node n
III. Comparison Of Turbo Codes And Low Density Parity Check Codes
A brief comparison of Turbo codes and LDPC codes will be given in this section, both in term of
performance and complexity. In order to give a fair comparison of the codes, we use codes of the same input
word length when comparing. The rate of both codes is R = 1/2. Figures 5 and 6 show the performance of Turbo
codes and the LDPC codes with information length 1784 and 3568 respectively. The Turbo codes defined in 6
were used for obtaining the performance curves. For both code lengths the LDPC codes are better until a certain
S/N is reached, respectively Eb/N0 = 1.15 and 1.1 dB. This characteristic ’error floor’ or ’knee’ was also typical
of Turbo codes in earlier years, but this has become less of a problem lately due to the definition of good
permutation matrices. In order to compare the complexity of the codes, the number of multiplications, additions
and complex operations like log, tan h, e and tanh-1
were counted in both codes. Figure 8 shows the number of
operation per iteration for the LDPC and Turbo codes of length I = 1784 and 3568. The number of iterations
used may vary in the case of the LDPC codes, as the decoding quality may easily be checked, i.e. that if a valid
code word is decoded, the decoding may be stopped. Hence, there will be less and less iteration performed the
higher the S/N. Hence, in order to characterize the m complexity, a representative number was chosen in order
to give a fair comparison with Turbo codes: With the above parameters the bit error rate for the LDPC code was
0.0038 and 0.00054 for the I = 1784 and I = 3568 codes respectively, whereas for the Turbo code the bit error
rate was 0.0043 and 0.00062 respectively, i.e. the error rates were sufficiently similar for a fair comparison to be
given in Figure 5 and Figure 6.
Figure 5: Turbo code and LDPC codes: I = 1784.
Figure 6: Turbo code and LDPC codes: I = 3568
Comparison Of Turbo Codes And Low Density Parity Check Codes
www.iosrjournals.org 18 | Page
Figure 7: Complexity: The figure shows Additions, Multiplications. and Complex operations.) per iteration for
LDPC and Turbo codes for I = 1784 and I = 3568.
IV. Conclusion
The results in the previous section show that LDPC codes have a significantly lower complexity than
Turbo codes at the code lengths, performance and S/N that were considered here. Figure 7: Complexity: The
figure shows Additions (Add.), Multiplications (Mult.) and Complex operations (Komp.) per iteration for LDPC
and Turbo codes for I = 1784 and I = 3568. Turbo codes have a fixed number of iterations in the decoder. This
implies that the time spent in the decoding and the bit rate out of the decoder, are constant entities. In contrast,
the LDPC decoder stops when a legal code word is found, implying that there is potential for significantly
reducing the amount of work to be done relative to Turbo codes. This also implies that the bit rate out of the
decoder will vary, and a buffer system must be designed in order to make the bit rate constant. The LDPC
decoder will become faster the higher the S/N. An advantage with LDPC codes is that the decoders may be
implemented in parallel. This has significant advantages when considering long codes.
References
[1] L. R. Bahl, J. Cocke, F. Jelinek, and J. Raviv, Optimal decoding of linear codes for minimizing symbol error rate, IEEE
Transactions on Information Theory, vol. 20, IEEE, 1974, pp. 284–287.
[2] John R. Barry, Low-density parity-check codes, Tech. report, Georgia Institute of Technology, 2001.
[3] C. Berrou, A. Glavieux, and P. Thitimajshima, Near shannon limit error-correcting coding and decoding: Turbo-codes, Proceedings
ICC (Geneva), IEEE, May 1993, pp. 1064–1070.
[4] Kjetil Fagervik, Iterative decoding of concatenated codes, Ph.D. thesis, University of Surrey (UNIS), UK, August 1998.
[5] R. G. Gallager, Low density parity check codes, Research monograph series, no. 21, MIT Press, Cambridge, MA, 1963.
[6] David J.C. MacKay and Radford M. Neal, Near Shannon limit performance of low density parity check codes, Electronics Letters
32 (1996), no. 18, 1645– 1646, Reprinted in Electronics Letters, 33 (1997), no. 6, 457-458.

More Related Content

What's hot

Dw2645274531
Dw2645274531Dw2645274531
Dw2645274531IJMER
 
Design of Digital Adder Using Reversible Logic
Design of Digital Adder Using Reversible LogicDesign of Digital Adder Using Reversible Logic
Design of Digital Adder Using Reversible LogicIJERA Editor
 
15-bit NOVEL Hamming Codec using HSPICE 22nm CMOS Technology based on GDI Tec...
15-bit NOVEL Hamming Codec using HSPICE 22nm CMOS Technology based on GDI Tec...15-bit NOVEL Hamming Codec using HSPICE 22nm CMOS Technology based on GDI Tec...
15-bit NOVEL Hamming Codec using HSPICE 22nm CMOS Technology based on GDI Tec...theijes
 
Design and Implementation of Encoder for (15, k) Binary BCH Code Using VHDL a...
Design and Implementation of Encoder for (15, k) Binary BCH Code Using VHDL a...Design and Implementation of Encoder for (15, k) Binary BCH Code Using VHDL a...
Design and Implementation of Encoder for (15, k) Binary BCH Code Using VHDL a...IOSR Journals
 
FPGA based BCH Decoder
FPGA based BCH DecoderFPGA based BCH Decoder
FPGA based BCH Decoderijsrd.com
 
Implementation of Low-Complexity Redundant Multiplier Architecture for Finite...
Implementation of Low-Complexity Redundant Multiplier Architecture for Finite...Implementation of Low-Complexity Redundant Multiplier Architecture for Finite...
Implementation of Low-Complexity Redundant Multiplier Architecture for Finite...ijcisjournal
 
Reed_Solomon_Implementation
Reed_Solomon_ImplementationReed_Solomon_Implementation
Reed_Solomon_Implementationramya c b
 
Error control coding using bose chaudhuri hocquenghem bch codes
Error control coding using bose chaudhuri hocquenghem bch codesError control coding using bose chaudhuri hocquenghem bch codes
Error control coding using bose chaudhuri hocquenghem bch codesIAEME Publication
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Elliptic curve Cryptography and Diffie- Hellman Key exchange
Elliptic curve Cryptography and Diffie- Hellman Key exchangeElliptic curve Cryptography and Diffie- Hellman Key exchange
Elliptic curve Cryptography and Diffie- Hellman Key exchangeIOSRJM
 
Quasi Cyclic LDPC codes - Algebraic Construction
Quasi Cyclic LDPC codes - Algebraic Construction Quasi Cyclic LDPC codes - Algebraic Construction
Quasi Cyclic LDPC codes - Algebraic Construction Eapen Vpp
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Evolution of Structure of Some Binary Group-Based N-Bit Compartor, N-To-2N De...
Evolution of Structure of Some Binary Group-Based N-Bit Compartor, N-To-2N De...Evolution of Structure of Some Binary Group-Based N-Bit Compartor, N-To-2N De...
Evolution of Structure of Some Binary Group-Based N-Bit Compartor, N-To-2N De...VLSICS Design
 

What's hot (18)

Dw2645274531
Dw2645274531Dw2645274531
Dw2645274531
 
Design of Digital Adder Using Reversible Logic
Design of Digital Adder Using Reversible LogicDesign of Digital Adder Using Reversible Logic
Design of Digital Adder Using Reversible Logic
 
It3416071612
It3416071612It3416071612
It3416071612
 
15-bit NOVEL Hamming Codec using HSPICE 22nm CMOS Technology based on GDI Tec...
15-bit NOVEL Hamming Codec using HSPICE 22nm CMOS Technology based on GDI Tec...15-bit NOVEL Hamming Codec using HSPICE 22nm CMOS Technology based on GDI Tec...
15-bit NOVEL Hamming Codec using HSPICE 22nm CMOS Technology based on GDI Tec...
 
Design and Implementation of Encoder for (15, k) Binary BCH Code Using VHDL a...
Design and Implementation of Encoder for (15, k) Binary BCH Code Using VHDL a...Design and Implementation of Encoder for (15, k) Binary BCH Code Using VHDL a...
Design and Implementation of Encoder for (15, k) Binary BCH Code Using VHDL a...
 
FPGA based BCH Decoder
FPGA based BCH DecoderFPGA based BCH Decoder
FPGA based BCH Decoder
 
Implementation of Low-Complexity Redundant Multiplier Architecture for Finite...
Implementation of Low-Complexity Redundant Multiplier Architecture for Finite...Implementation of Low-Complexity Redundant Multiplier Architecture for Finite...
Implementation of Low-Complexity Redundant Multiplier Architecture for Finite...
 
Reed_Solomon_Implementation
Reed_Solomon_ImplementationReed_Solomon_Implementation
Reed_Solomon_Implementation
 
Error control coding using bose chaudhuri hocquenghem bch codes
Error control coding using bose chaudhuri hocquenghem bch codesError control coding using bose chaudhuri hocquenghem bch codes
Error control coding using bose chaudhuri hocquenghem bch codes
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
BCH Codes
BCH CodesBCH Codes
BCH Codes
 
Multimedia Communication Lec02: Info Theory and Entropy
Multimedia Communication Lec02: Info Theory and EntropyMultimedia Communication Lec02: Info Theory and Entropy
Multimedia Communication Lec02: Info Theory and Entropy
 
Elliptic curve Cryptography and Diffie- Hellman Key exchange
Elliptic curve Cryptography and Diffie- Hellman Key exchangeElliptic curve Cryptography and Diffie- Hellman Key exchange
Elliptic curve Cryptography and Diffie- Hellman Key exchange
 
Quasi Cyclic LDPC codes - Algebraic Construction
Quasi Cyclic LDPC codes - Algebraic Construction Quasi Cyclic LDPC codes - Algebraic Construction
Quasi Cyclic LDPC codes - Algebraic Construction
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
LDPC Encoding and Hamming Encoding
LDPC Encoding and Hamming EncodingLDPC Encoding and Hamming Encoding
LDPC Encoding and Hamming Encoding
 
Evolution of Structure of Some Binary Group-Based N-Bit Compartor, N-To-2N De...
Evolution of Structure of Some Binary Group-Based N-Bit Compartor, N-To-2N De...Evolution of Structure of Some Binary Group-Based N-Bit Compartor, N-To-2N De...
Evolution of Structure of Some Binary Group-Based N-Bit Compartor, N-To-2N De...
 
Channel coding
Channel coding  Channel coding
Channel coding
 

Viewers also liked

Minimization of Surface Roughness in CNC Turning Using Taguchi Method
Minimization of Surface Roughness in CNC Turning Using Taguchi MethodMinimization of Surface Roughness in CNC Turning Using Taguchi Method
Minimization of Surface Roughness in CNC Turning Using Taguchi MethodIOSR Journals
 
Synthesis and Characterization of Cellulose Nanofibers From Coconut Coir Fibers
Synthesis and Characterization of Cellulose Nanofibers From Coconut Coir FibersSynthesis and Characterization of Cellulose Nanofibers From Coconut Coir Fibers
Synthesis and Characterization of Cellulose Nanofibers From Coconut Coir FibersIOSR Journals
 
Unsupervised Clustering Classify theCancer Data withtheHelp of FCM Algorithm
Unsupervised Clustering Classify theCancer Data withtheHelp of FCM AlgorithmUnsupervised Clustering Classify theCancer Data withtheHelp of FCM Algorithm
Unsupervised Clustering Classify theCancer Data withtheHelp of FCM AlgorithmIOSR Journals
 
A New Theory of the Structure of Matter
A New Theory of the Structure of MatterA New Theory of the Structure of Matter
A New Theory of the Structure of MatterIOSR Journals
 
Impact on integration of Lean Manufacturing and Six Sigma in various applicat...
Impact on integration of Lean Manufacturing and Six Sigma in various applicat...Impact on integration of Lean Manufacturing and Six Sigma in various applicat...
Impact on integration of Lean Manufacturing and Six Sigma in various applicat...IOSR Journals
 
Torsional evaluation of Tapered Composite Cone using Finite Element Analysis
Torsional evaluation of Tapered Composite Cone using Finite Element AnalysisTorsional evaluation of Tapered Composite Cone using Finite Element Analysis
Torsional evaluation of Tapered Composite Cone using Finite Element AnalysisIOSR Journals
 
Practices and Cultural Consumption among Tunisians School Youth
Practices and Cultural Consumption among Tunisians School YouthPractices and Cultural Consumption among Tunisians School Youth
Practices and Cultural Consumption among Tunisians School YouthIOSR Journals
 
Durability of Bricks Cast With Industrial Sludge
Durability of Bricks Cast With Industrial SludgeDurability of Bricks Cast With Industrial Sludge
Durability of Bricks Cast With Industrial SludgeIOSR Journals
 
The Wireless Remote Control Car Based On Arm9
The Wireless Remote Control Car Based On Arm9The Wireless Remote Control Car Based On Arm9
The Wireless Remote Control Car Based On Arm9IOSR Journals
 
Ensemble Empirical Mode Decomposition: An adaptive method for noise reduction
Ensemble Empirical Mode Decomposition: An adaptive method for noise reductionEnsemble Empirical Mode Decomposition: An adaptive method for noise reduction
Ensemble Empirical Mode Decomposition: An adaptive method for noise reductionIOSR Journals
 
Design Technique of Bandpass FIR filter using Various Window Function
Design Technique of Bandpass FIR filter using Various Window FunctionDesign Technique of Bandpass FIR filter using Various Window Function
Design Technique of Bandpass FIR filter using Various Window FunctionIOSR Journals
 
An Empirical Study on relationship among Quality of work life and its factors
An Empirical Study on relationship among Quality of work life and its factorsAn Empirical Study on relationship among Quality of work life and its factors
An Empirical Study on relationship among Quality of work life and its factorsIOSR Journals
 
A Novel Mechanism for Low Bit-Rate Compression
A Novel Mechanism for Low Bit-Rate CompressionA Novel Mechanism for Low Bit-Rate Compression
A Novel Mechanism for Low Bit-Rate CompressionIOSR Journals
 
Design of Conformal Helical Antenna with Selective Bands
Design of Conformal Helical Antenna with Selective BandsDesign of Conformal Helical Antenna with Selective Bands
Design of Conformal Helical Antenna with Selective BandsIOSR Journals
 
The Effect of Relationship Quality on Customer Advocacy: The Mediating Role o...
The Effect of Relationship Quality on Customer Advocacy: The Mediating Role o...The Effect of Relationship Quality on Customer Advocacy: The Mediating Role o...
The Effect of Relationship Quality on Customer Advocacy: The Mediating Role o...IOSR Journals
 
Energy saving in cooperative transmission using opportunistic protocol in MANET
Energy saving in cooperative transmission using opportunistic protocol in MANETEnergy saving in cooperative transmission using opportunistic protocol in MANET
Energy saving in cooperative transmission using opportunistic protocol in MANETIOSR Journals
 
Spectroscopic study on Thiourea and Thiosemicarbazide in Non-aqueous media
Spectroscopic study on Thiourea and Thiosemicarbazide in Non-aqueous mediaSpectroscopic study on Thiourea and Thiosemicarbazide in Non-aqueous media
Spectroscopic study on Thiourea and Thiosemicarbazide in Non-aqueous mediaIOSR Journals
 
Comparison of PMD Compensation in WDM Systems
Comparison of PMD Compensation in WDM SystemsComparison of PMD Compensation in WDM Systems
Comparison of PMD Compensation in WDM SystemsIOSR Journals
 
Vessels Extraction from Retinal Images
Vessels Extraction from Retinal ImagesVessels Extraction from Retinal Images
Vessels Extraction from Retinal ImagesIOSR Journals
 

Viewers also liked (20)

Minimization of Surface Roughness in CNC Turning Using Taguchi Method
Minimization of Surface Roughness in CNC Turning Using Taguchi MethodMinimization of Surface Roughness in CNC Turning Using Taguchi Method
Minimization of Surface Roughness in CNC Turning Using Taguchi Method
 
Synthesis and Characterization of Cellulose Nanofibers From Coconut Coir Fibers
Synthesis and Characterization of Cellulose Nanofibers From Coconut Coir FibersSynthesis and Characterization of Cellulose Nanofibers From Coconut Coir Fibers
Synthesis and Characterization of Cellulose Nanofibers From Coconut Coir Fibers
 
Unsupervised Clustering Classify theCancer Data withtheHelp of FCM Algorithm
Unsupervised Clustering Classify theCancer Data withtheHelp of FCM AlgorithmUnsupervised Clustering Classify theCancer Data withtheHelp of FCM Algorithm
Unsupervised Clustering Classify theCancer Data withtheHelp of FCM Algorithm
 
A New Theory of the Structure of Matter
A New Theory of the Structure of MatterA New Theory of the Structure of Matter
A New Theory of the Structure of Matter
 
Impact on integration of Lean Manufacturing and Six Sigma in various applicat...
Impact on integration of Lean Manufacturing and Six Sigma in various applicat...Impact on integration of Lean Manufacturing and Six Sigma in various applicat...
Impact on integration of Lean Manufacturing and Six Sigma in various applicat...
 
Torsional evaluation of Tapered Composite Cone using Finite Element Analysis
Torsional evaluation of Tapered Composite Cone using Finite Element AnalysisTorsional evaluation of Tapered Composite Cone using Finite Element Analysis
Torsional evaluation of Tapered Composite Cone using Finite Element Analysis
 
Practices and Cultural Consumption among Tunisians School Youth
Practices and Cultural Consumption among Tunisians School YouthPractices and Cultural Consumption among Tunisians School Youth
Practices and Cultural Consumption among Tunisians School Youth
 
Durability of Bricks Cast With Industrial Sludge
Durability of Bricks Cast With Industrial SludgeDurability of Bricks Cast With Industrial Sludge
Durability of Bricks Cast With Industrial Sludge
 
The Wireless Remote Control Car Based On Arm9
The Wireless Remote Control Car Based On Arm9The Wireless Remote Control Car Based On Arm9
The Wireless Remote Control Car Based On Arm9
 
C0561419
C0561419C0561419
C0561419
 
Ensemble Empirical Mode Decomposition: An adaptive method for noise reduction
Ensemble Empirical Mode Decomposition: An adaptive method for noise reductionEnsemble Empirical Mode Decomposition: An adaptive method for noise reduction
Ensemble Empirical Mode Decomposition: An adaptive method for noise reduction
 
Design Technique of Bandpass FIR filter using Various Window Function
Design Technique of Bandpass FIR filter using Various Window FunctionDesign Technique of Bandpass FIR filter using Various Window Function
Design Technique of Bandpass FIR filter using Various Window Function
 
An Empirical Study on relationship among Quality of work life and its factors
An Empirical Study on relationship among Quality of work life and its factorsAn Empirical Study on relationship among Quality of work life and its factors
An Empirical Study on relationship among Quality of work life and its factors
 
A Novel Mechanism for Low Bit-Rate Compression
A Novel Mechanism for Low Bit-Rate CompressionA Novel Mechanism for Low Bit-Rate Compression
A Novel Mechanism for Low Bit-Rate Compression
 
Design of Conformal Helical Antenna with Selective Bands
Design of Conformal Helical Antenna with Selective BandsDesign of Conformal Helical Antenna with Selective Bands
Design of Conformal Helical Antenna with Selective Bands
 
The Effect of Relationship Quality on Customer Advocacy: The Mediating Role o...
The Effect of Relationship Quality on Customer Advocacy: The Mediating Role o...The Effect of Relationship Quality on Customer Advocacy: The Mediating Role o...
The Effect of Relationship Quality on Customer Advocacy: The Mediating Role o...
 
Energy saving in cooperative transmission using opportunistic protocol in MANET
Energy saving in cooperative transmission using opportunistic protocol in MANETEnergy saving in cooperative transmission using opportunistic protocol in MANET
Energy saving in cooperative transmission using opportunistic protocol in MANET
 
Spectroscopic study on Thiourea and Thiosemicarbazide in Non-aqueous media
Spectroscopic study on Thiourea and Thiosemicarbazide in Non-aqueous mediaSpectroscopic study on Thiourea and Thiosemicarbazide in Non-aqueous media
Spectroscopic study on Thiourea and Thiosemicarbazide in Non-aqueous media
 
Comparison of PMD Compensation in WDM Systems
Comparison of PMD Compensation in WDM SystemsComparison of PMD Compensation in WDM Systems
Comparison of PMD Compensation in WDM Systems
 
Vessels Extraction from Retinal Images
Vessels Extraction from Retinal ImagesVessels Extraction from Retinal Images
Vessels Extraction from Retinal Images
 

Similar to Comparison of Turbo Codes and Low Density Parity Check Codes

129966862758614726[1]
129966862758614726[1]129966862758614726[1]
129966862758614726[1]威華 王
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
A High Throughput CFA AES S-Box with Error Correction Capability
A High Throughput CFA AES S-Box with Error Correction CapabilityA High Throughput CFA AES S-Box with Error Correction Capability
A High Throughput CFA AES S-Box with Error Correction CapabilityIOSR Journals
 
Performance evaluation of nested costas codes
Performance evaluation of nested costas codesPerformance evaluation of nested costas codes
Performance evaluation of nested costas codesAnithaBhavani1
 
Convolutional Codes And Their Decoding
Convolutional Codes And Their DecodingConvolutional Codes And Their Decoding
Convolutional Codes And Their DecodingKakali Saharia
 
The performance of turbo codes for wireless communication systems
The performance of turbo codes for wireless communication systemsThe performance of turbo codes for wireless communication systems
The performance of turbo codes for wireless communication systemschakravarthy Gopi
 
Digital Communication Exam Help
Digital Communication Exam HelpDigital Communication Exam Help
Digital Communication Exam HelpLive Exam Helper
 
Hamming net based Low Complexity Successive Cancellation Polar Decoder
Hamming net based Low Complexity Successive Cancellation Polar DecoderHamming net based Low Complexity Successive Cancellation Polar Decoder
Hamming net based Low Complexity Successive Cancellation Polar DecoderRSIS International
 
EFFICIENT MULTIPLIERS FOR 1-OUT-OF-3 BINARY SIGNED-DIGIT NUMBER SYSTEM
EFFICIENT MULTIPLIERS FOR 1-OUT-OF-3 BINARY SIGNED-DIGIT NUMBER SYSTEMEFFICIENT MULTIPLIERS FOR 1-OUT-OF-3 BINARY SIGNED-DIGIT NUMBER SYSTEM
EFFICIENT MULTIPLIERS FOR 1-OUT-OF-3 BINARY SIGNED-DIGIT NUMBER SYSTEMelelijjournal
 
EE352 - Final Project Report
EE352 - Final Project ReportEE352 - Final Project Report
EE352 - Final Project ReportRob Garrone
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Performance bounds for unequally punctured
Performance bounds for unequally puncturedPerformance bounds for unequally punctured
Performance bounds for unequally puncturedeSAT Publishing House
 
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...IJCSEA Journal
 

Similar to Comparison of Turbo Codes and Low Density Parity Check Codes (20)

129966862758614726[1]
129966862758614726[1]129966862758614726[1]
129966862758614726[1]
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
A HIGH THROUGHPUT AES DESIGN
A HIGH THROUGHPUT AES DESIGNA HIGH THROUGHPUT AES DESIGN
A HIGH THROUGHPUT AES DESIGN
 
A High Throughput CFA AES S-Box with Error Correction Capability
A High Throughput CFA AES S-Box with Error Correction CapabilityA High Throughput CFA AES S-Box with Error Correction Capability
A High Throughput CFA AES S-Box with Error Correction Capability
 
Performance evaluation of nested costas codes
Performance evaluation of nested costas codesPerformance evaluation of nested costas codes
Performance evaluation of nested costas codes
 
Lb35189919904
Lb35189919904Lb35189919904
Lb35189919904
 
Er24902905
Er24902905Er24902905
Er24902905
 
Convolutional Codes And Their Decoding
Convolutional Codes And Their DecodingConvolutional Codes And Their Decoding
Convolutional Codes And Their Decoding
 
Presentation
PresentationPresentation
Presentation
 
The performance of turbo codes for wireless communication systems
The performance of turbo codes for wireless communication systemsThe performance of turbo codes for wireless communication systems
The performance of turbo codes for wireless communication systems
 
Turbo Code
Turbo Code Turbo Code
Turbo Code
 
Digital Communication Exam Help
Digital Communication Exam HelpDigital Communication Exam Help
Digital Communication Exam Help
 
Hamming net based Low Complexity Successive Cancellation Polar Decoder
Hamming net based Low Complexity Successive Cancellation Polar DecoderHamming net based Low Complexity Successive Cancellation Polar Decoder
Hamming net based Low Complexity Successive Cancellation Polar Decoder
 
EFFICIENT MULTIPLIERS FOR 1-OUT-OF-3 BINARY SIGNED-DIGIT NUMBER SYSTEM
EFFICIENT MULTIPLIERS FOR 1-OUT-OF-3 BINARY SIGNED-DIGIT NUMBER SYSTEMEFFICIENT MULTIPLIERS FOR 1-OUT-OF-3 BINARY SIGNED-DIGIT NUMBER SYSTEM
EFFICIENT MULTIPLIERS FOR 1-OUT-OF-3 BINARY SIGNED-DIGIT NUMBER SYSTEM
 
EE352 - Final Project Report
EE352 - Final Project ReportEE352 - Final Project Report
EE352 - Final Project Report
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Performance bounds for unequally punctured
Performance bounds for unequally puncturedPerformance bounds for unequally punctured
Performance bounds for unequally punctured
 
G029037043
G029037043G029037043
G029037043
 
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
 
LDPC_CODES.ppt
LDPC_CODES.pptLDPC_CODES.ppt
LDPC_CODES.ppt
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersMairaAshraf6
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"mphochane1998
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesRAJNEESHKUMAR341697
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxchumtiyababu
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEselvakumar948
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 

Recently uploaded (20)

Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 

Comparison of Turbo Codes and Low Density Parity Check Codes

  • 1. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 6, Issue 6 (Jul. - Aug. 2013), PP 11-18 www.iosrjournals.org www.iosrjournals.org 11 | Page Comparison of Turbo Codes and Low Density Parity Check Codes Ahmad Hasan Khan1 , Dr K C Roy2 , 1 Electronics and Communication Engg. Suresh Gyan Vihar University, Jaipur 2 Professor SBCET Jaipur Abstract-The most powerful channel coding schemes, namely, those based on turbo codes and LPDC (Low density parity check) codes have in common principle of iterative decoding. Shannon’s predictions for optimal codes would imply random like codes, intuitively implying that the decoding operation on these codes would be prohibitively complex. A brief comparison of Turbo codes and LDPC codes will be given in this section, both in term of performance and complexity. In order to give a fair comparison of the codes, we use codes of the same input word length when comparing. The rate of both codes is R = 1/2. However, the Berrou’s coding scheme could be constructed by combining two or more simple codes. These codes could then be decoded separately, whilst exchanging probabilistic, or uncertainty, information about the quality of the decoding of each bit to each other. This implied that complex codes had now become practical. This discovery triggered a series of new, focused research programmes, and prominent researchers devoted their time to this new area.. Leading on from the work from Turbo codes, MacKay at the University of Cambridge revisited some 35 year old work originally undertaken by Gallagher [5], who had constructed a class of codes dubbed Low Density Parity Check (LDPC) codes. Building on the increased understanding on iterative decoding and probability propagation on graphs that led on from the work on Turbo codes, MacKay could now show that Low Density Parity Check (LDPC) codes could be decoded in a similar manner to Turbo codes, and may actually be able to beat the Turbo codes [6]. As a review, this paper will consider both these classes of codes, and compare the performance and the complexity of these codes. A description of both classes of codes will be given. I. Turbo Codes There are different ways of constructing Turbo codes, but the commonality is that they use two or more codes in the encoding process. The constituent encoders are typically recursive, systematic convolution (RSC) codes [3]. Figure 1 shows a general set-up of the encoder. The number of bits in the code word varies with the rate of the code. For an overall code rate of R = 1/2, it is normal to use two R = 1/2 RSC codes, where every systematic bit is transmitted, but for the coded bits a puncturing matrix is used where only every second code bit from each of the constituent codes is included in the transmitted symbol. The permutation matrix Π permutes the systematic bits, so that the two constituent codes are excited by the same set of information bits, albeit in a different order. The permutation matrix is a critical design factor for designing good codes. The code word consists of Ci 1 as the systematic bit (di) and Ci 2 and Ci 3 which are vectors of encoded bits from the two convolution codes. These vectors can contain one or more bits and di is the information bit, Π is the permutation matrix. Figure 1: Block Diagram of Turbo Encoder
  • 2. Comparison Of Turbo Codes And Low Density Parity Check Codes www.iosrjournals.org 12 | Page 1.1. The BCJR algorithm The BCJR algorithm [1] is used for optimal decoding of the constituent codes of the turbo codes. This algorithm is similar to the message passing algorithm used in the context of LDPC codes. The BCJR algorithm is a symbol based decoder, and delivers probabilities of the correctness of the symbol decoding together with each decoded bit. In a convolution code, we must separate between state transitions caused by an information bit having value 1 and those caused by an information bit having value 0. We denote the states linked together by a state transition that occurs between time (i – 1) and time i Si−1 a1 and Si b1 if this transition is caused by a 1 as the information bit. Correspondingly, the notation is Si−1 a0 and Si b0 if the transition is caused by a 0 as the information bit. We denote the vector of received channel symbols y, where y is perturbed by AWGN. We denote the information bit at time i di. The log likelihood ratio for a state transition associated with di = 1 and di = 0 is then given by λi= log P(Si−1 a1 ,Si b1 ,y) P(Si−1 a0 ,Si b0,y) (1) In the case of many possible state transitions, the expression gets more complicated: λi= log P(Si−1 a ,Si b ,y) Si−1 a ,Si|di =1 b P(Si−1 a ,Si b ,y) Si−1 a ,Si b |di =0 (2) The vector y may be split into three parts: y = yp i=1 p=1 +yi + yk N k=i+1 (3) si b And yi depend only on the state si−1 a and the bit di , whereas yk N k=i+1 depend only on si b and the bits dk k ϵ{i+1, N}. The probability of the state transition si−1 a si b is then given by the expression in (4). P (si−1, a si b y,) = P (si−1, a si b , y 𝐩 i=1 p=1 + yi+ yk N k=i+1 (4) = P (si−1, a , yp)(yiii=1 p=1 + yk N k=i+1 , Si b | Si−1 a ) = P (si−1, a , yp)(yi,i−1 p=1 Si b |Si−1 a )( yk N k=i+1 |Si b ) Eqn. 4 may then be written as P (si−1, a si b y) =α si−1, a γ si−1, a si b β Si b (5) With the following definitions: γ si−1, a si b ≜ P (yi, si−1 a |si b ,) = P (yi|si−1 a , si b ,) P (si−1 a , si b ,) (6) α si−1, a ≜ P (si−1, a , yp)i−1 p=1 (7) β Si b ≜ ( yk N k=i+1 |Si b (8) Furthermore, we may express α si−1, a = α si−2, a si−2, a γ si−2, a si−1 b (9) And β Si b = β si+1, a si−1, a γ si, a si+1 b (10) We substitute Eqn. (5) into Eqn. (2) and obtain Eqn. (11). λi= log α si−1, a γ si−1, a si b β Si b Si−1 a ,Si|di =1 b α si−1, a γ si−1, a si b β Si b Si−1 a ,Si b |di =0 (11) As shown in Eqn. (6), we have: γ si−1, a si b = P (si−1 b |si a ,) P (yi|si b , si−1 a ,) (12) Through knowledge of the nature of AWGN, Eqn. (12) may be written as: γ si−1, a si b = P (si−1 b |si a ) e − ( y i j (2c i j −1)2) 2σ2n j=1 (13) We compute the logarithm of Eqn. (13) and obtain Eqn. (14).
  • 3. Comparison Of Turbo Codes And Low Density Parity Check Codes www.iosrjournals.org 13 | Page log γ si−1, a si b =P(log(si−1 b |si a )) + (yi j −ai j )2 2σ2 n j=1 -log(√(2 σ2 ) (14) P (si−1 b |si a ) is equal for all permissible states Sb if we assume an equal probability of 1’s and 0’s in the information sequence. This part may therefore be omitted in the decoding process. The metric of a symbol n is then given by Eqn. (43)(15). Mi ab = (yi j )2+(ai j )2+2yi j ai j 2σ2 n j=1 - (15) 1.2. The Log-BCJR algorithm The Log-BCJR algorithm is a simplification of the BCJR algorithm in terms of the needed computations. We start with the following definitions: f (·)≜ log α (·) r (·) ≜ log β (·) g (·) ≜log γ (·) f (si b ) = log ( α si−1, a si−1, a γ si−1, a si b (16) log (α si−1, a = f(α si−1, a )⇒ α si−1, a ) = ef si−1, a (17) This gives: f (si, a ) = log( ef r(si−1, a +g(si−1, a si−1, a si b )) (18) Correspondingly for β : r (si−1) b = log( e r(si, b +g(si−1, a si, b si b )) (19) Eqn. (20) shows the expression for log γ (si−1 a , si b ). γ si−1, a si b = log (P (yi| (si b si−1 a ,) + log (P(si b |si−1 a ) ) (20) γ Now becomes: γi = log(( e f(si,−1 a +r(si b )+g(si−1, a si−1,, a si b |di=1 si b )) - log (( e f(si,−1 a +r(si b )+g(si−1, a si−1,, a si b |di=0 si b )) (21) This implies a summation of a series of exponentials. This may be simplified (4): Log (ex + e y ) = max(x, y) + log (1 + e |x-y| ) (22) We denote this calculation L(x, y). Log exiI i=1 = log ( exi +log exiI i=2 = log ( exi +log exiI−1 i=1 = L (xi, log exiI−1 i=1 ) = L (xi, log(eI−1 + exiI−2 i=1 ) = L ( xi ,L(xI-1,log( exiI−2 i=1 )) (23) This becomes a recursion which we may write as Eqn. (24). log exiI i=1 =L(xI,L(xI-1,L(…L(x1,x1)….))) (24) In most cases, this may be further simplified as shown in Eqn. (25). Log exiI i=1 ≈ max⁡(xi) (25) Through the use of this simplification, the computation of f(·) and r(·) becomes a forward and backward Viterbi algorithm respectively . 1.3. Decoding of Turbo Codes The decoding algorithms described in the preceding sections are algorithms for decoding the constituent RSC codes of turbo codes. In order to get the ’turbo structure’ the decoding algorithms of each of the constituent codes have to be combined in a similar manner to the message passing algorithm described previously. Figure 2 illustrates a multiple iteration decoder. Here, there is a feedback loop, where the first decoder is fed new information from the last decoder of the previous iteration. The information that is passed on to the next decoder is generally denoted γ e. This is the extrinsic part of γ that was generated in the given decoding. The subtractions shown in the figure ensure that only new information is used in subsequent decoding stages. This message passing implies that the a posteriori probability from one decoder is used as a priori information in the subsequent decoder.
  • 4. Comparison Of Turbo Codes And Low Density Parity Check Codes www.iosrjournals.org 14 | Page Figure (2) Block Diagram of Turbo Decoder, several iteration II. Low Density Parity Check Codes The structure of the code is given by a parity check matrix H, illustrated below. Different codes have different parity check matrices’. H = 1 1 1 0 1 1 1 1 1 1 1 1 0 1 1 0 0 1 0 1 0 1 0 0 1 1 1 0 1 0 0 0 1 1 0 0 1 1 0 1 1 0 1 1 0 1 0 0 1 1 (26) The code word x is constructed so that Eqn. (27) is true. Hx = 0 (mod 2) (27) A generator matrix G is used for constructing the code. The generator matrix may be found from the parity check matrix H. 2.1. Construction of G First we note that HX= XT HT (28) The code word x may be split into one information part i and one parity check part c. The code word may then be written as XT = [i ] [c] (29) Correspondingly, the parity check matrix may be split into two matrices: H = [A |B] (30) From Eqn. (28), we note that vector i is multiplied with Matrix A, whereas vector c is multiplied with matrix B. On the basis of Eqn. 29 and30, Eqn.27 may be written as A i + B c = 0 (31) If the matrix B is non-singular, Eqn. 31 may be inverted and the check bits c may be found from Eqn. (32) c = B -1 A i (33) In practice, it may be necessary to swap over some of the columns in H in order for B to become non- singular. The product B-1 A makes out the generator matrix G. This matrix is calculated only once, and is used for all encoding. The parity check matrix is used for constructing a graph structure in the decoder. 2.2. Graph structure The decoding of LDPC codes may be efficiently performed through the use of a graph structure. In this work, Tanner graphs will be used for the decoding [8]. The graph is constructed from the parity check matrix H. Each row in the matrix is represented by a check node, whereas each 1 in the row is represented by an edge into a bit node. Each column is represented by a bit node, and each 1 in the column corresponds to an edge into a check node. This is illustrated in Figures 3 and 2. In this manner, a graph is constructed which contains a total of N bit nodes and M check nodes. The number of edges is decided by the number of 1’s in the parity check matrix. All edges are connected to a check node and to a bit node. The number of edges connected to a node denotes the degree of the node.
  • 5. Comparison Of Turbo Codes And Low Density Parity Check Codes www.iosrjournals.org 15 | Page Figure 3: Check Node 2.3. Decoding In this context, the decoder is a soft-decision input decoder, implying that it operates on the channel symbols, denoted by r = 2x − 1 + n (34) Where n is the AWGN noise vector added in the channel and x is the code word. 2.4. The parity of a vector Finding the probability of the parity of a vector is a central concept in the decoding of LDPC codes. Each parity check may be regarded a vector of even parity [2]. First, we define the Likelihood Ratio (LR) as the ratio between the two probabilities P(x = 1) and P(x = 0): LR = P(X=1) P(X=0) (35) The symbol γ is used for the Log Likelihood Ratio, γ = log P (x = 1) P(x = 0) (36) If x is a vector of bits, the LLR of a bit i in that vector is given by γ i. γi= log P (xi = 1) P(xi = 0) (37) The notation φ((x) is used for the vector parity. The LLR of the parity of the vector x is then given by: λφ(x)= log P (ϕ(xi ) = 1) P((ϕ(xi) = 0) (38) In order to compute λφ(x) Eqn. 39 is used: tanh(− λ ϕ(x) 2 ) = tanhn i=1 − λi 2 (39) Eqn. 13[39] is solved with respect to λϕ : λϕ (x) =- 2 tanh-1( = tanhn i=1 − λi 2 (40) The a posteriori LLR of a bit n is given by: λn= log P(xn =1| r) P(xn =0| r) (41) The vector r may be split into two parts rn which refers to the systematic part of the code word, and {ri≠n}, which refers to the parity bits of the code word. Eqn. 41 may then be expressed as λn = log P xn =1 rn , ri ≠1 ) P(xn =0| rn {ri ≠1 }) (42) Bayes rue is given by: P (a/b) = P(b,a) P(b) (43) We use this rule in order to re-express the numerator of Eqn. 42: P(xn = 1| rn, {ri ≠ 1 )= f(rn,xn =1, ri≠1 ) f(rn,, ri≠1 ) (44) Furthermore, using the equality P (a, b) = P (a |b)P(b):
  • 6. Comparison Of Turbo Codes And Low Density Parity Check Codes www.iosrjournals.org 16 | Page P xn = 1| rn, {ri ≠ 1 = f rn, xn = 1|, ri ≠ 1 f(xn = 1, ri ≠ 1 ) f rn. | , ri ≠ 1 f ri ≠ 1 (45) Given xn, rn is statistically independent of { ri ≠ 1}: P xn = 1|rn, ri ≠ 1 = f rn.|xn =1) f(xn =1, ri≠1 ) f rn.,| ri≠1 (46) Following the same line of reasoning, the denominator of Eqn. 16 is expanded. Eqn. 42 then becomes: λn= log f rn. xn=1 P(xn=1,|{ri ≠1 }) f rn. xn=0 P(xn=0,|{ri ≠1 } = log f rn. xn=1 f rn. xn=0 + log P(xn =1,|{ri ≠1 }) P(xn =0,| ri ≠1 ) (47) In an AWGN channel the conditional probability f(rn |x n) is given by f(rn| xn) = 1 √2πσ e− rn −2xn +1 2σ (48) Substituting Eqn. 22 into Eqn. 21 we get Eqn. 49. λn = 2 σ2 rn + log P(xn=1,|{ri ≠1 }) P(xn=0,| ri ≠1 ) (49) The first element of the right hand side of the equal sign is denoted the intrinsic part, whereas the second element is denoted the extrinsic part. Note that if it is known that the parity of a vector x is 0 (even parity), the probability that a bit xn is 1, given the received values of the rest of the vector ri ≠ n, is the same as the probability that the rest of the vector { ri ≠ n} has odd parity. λn = 2 σ2 rn + log P(ϕ xi=1for i=1….j,|{ri ≠n }) P(ϕ xi=0for i=0….j,| ri ≠1n ) (50) If the graph is free of cycles, the vectors x1, x2..xj are Independent, given { ri ≠ 1n }, and if the elements within the vector are independent, Eqn. 50 may be written as Eqn. 51. λn = 2 σ2 rn + log P(ϕ xi=1{ri ≠n }) j i=1 P(ϕ xi=0|{ri ≠n }) j i=1 = 2 σ2 rn + log P(ϕ xi=1{ri ≠n } P(ϕ xi=0|{ri ≠n }) j i=1 2 σ2 rn + λ j i=1 ϕ(xi) (51) In the graph λ i, l is the message (contribution) from bit node i to check node l: λ i, l = log P(ϕ xi=1{ri ≠n } P(ϕ xi=0|{ri ≠n }) (52) We substitute Eqn. 14 into Eqn. 25 λn = 2 σ2 rn − 2 tanh−1 ( j i=1 tanh(−k l=2 λ i,l 2 )) (53) Eqn. 54 is the expression of the LLR of bit n. The first Part is the intrinsic information, whereas the second part is the extrinsic information from the j vectors that contain bit n. Messages into bit node n each bit node has a particular LLR associated with itself. The LLR is computed from the contributions from all connected check nodes, which constitute the extrinsic information, and the received values rn, which constitute the intrinsic information. When a check node k receives a message from a bit node i, it subtracts the value it passed on to bit node i in the previous iteration, i.e. λi,l= λi-u m,i. This is done in order to reduce the correlations with previous iterations.
  • 7. Comparison Of Turbo Codes And Low Density Parity Check Codes www.iosrjournals.org 17 | Page Figure 4: Messages into bit node n III. Comparison Of Turbo Codes And Low Density Parity Check Codes A brief comparison of Turbo codes and LDPC codes will be given in this section, both in term of performance and complexity. In order to give a fair comparison of the codes, we use codes of the same input word length when comparing. The rate of both codes is R = 1/2. Figures 5 and 6 show the performance of Turbo codes and the LDPC codes with information length 1784 and 3568 respectively. The Turbo codes defined in 6 were used for obtaining the performance curves. For both code lengths the LDPC codes are better until a certain S/N is reached, respectively Eb/N0 = 1.15 and 1.1 dB. This characteristic ’error floor’ or ’knee’ was also typical of Turbo codes in earlier years, but this has become less of a problem lately due to the definition of good permutation matrices. In order to compare the complexity of the codes, the number of multiplications, additions and complex operations like log, tan h, e and tanh-1 were counted in both codes. Figure 8 shows the number of operation per iteration for the LDPC and Turbo codes of length I = 1784 and 3568. The number of iterations used may vary in the case of the LDPC codes, as the decoding quality may easily be checked, i.e. that if a valid code word is decoded, the decoding may be stopped. Hence, there will be less and less iteration performed the higher the S/N. Hence, in order to characterize the m complexity, a representative number was chosen in order to give a fair comparison with Turbo codes: With the above parameters the bit error rate for the LDPC code was 0.0038 and 0.00054 for the I = 1784 and I = 3568 codes respectively, whereas for the Turbo code the bit error rate was 0.0043 and 0.00062 respectively, i.e. the error rates were sufficiently similar for a fair comparison to be given in Figure 5 and Figure 6. Figure 5: Turbo code and LDPC codes: I = 1784. Figure 6: Turbo code and LDPC codes: I = 3568
  • 8. Comparison Of Turbo Codes And Low Density Parity Check Codes www.iosrjournals.org 18 | Page Figure 7: Complexity: The figure shows Additions, Multiplications. and Complex operations.) per iteration for LDPC and Turbo codes for I = 1784 and I = 3568. IV. Conclusion The results in the previous section show that LDPC codes have a significantly lower complexity than Turbo codes at the code lengths, performance and S/N that were considered here. Figure 7: Complexity: The figure shows Additions (Add.), Multiplications (Mult.) and Complex operations (Komp.) per iteration for LDPC and Turbo codes for I = 1784 and I = 3568. Turbo codes have a fixed number of iterations in the decoder. This implies that the time spent in the decoding and the bit rate out of the decoder, are constant entities. In contrast, the LDPC decoder stops when a legal code word is found, implying that there is potential for significantly reducing the amount of work to be done relative to Turbo codes. This also implies that the bit rate out of the decoder will vary, and a buffer system must be designed in order to make the bit rate constant. The LDPC decoder will become faster the higher the S/N. An advantage with LDPC codes is that the decoders may be implemented in parallel. This has significant advantages when considering long codes. References [1] L. R. Bahl, J. Cocke, F. Jelinek, and J. Raviv, Optimal decoding of linear codes for minimizing symbol error rate, IEEE Transactions on Information Theory, vol. 20, IEEE, 1974, pp. 284–287. [2] John R. Barry, Low-density parity-check codes, Tech. report, Georgia Institute of Technology, 2001. [3] C. Berrou, A. Glavieux, and P. Thitimajshima, Near shannon limit error-correcting coding and decoding: Turbo-codes, Proceedings ICC (Geneva), IEEE, May 1993, pp. 1064–1070. [4] Kjetil Fagervik, Iterative decoding of concatenated codes, Ph.D. thesis, University of Surrey (UNIS), UK, August 1998. [5] R. G. Gallager, Low density parity check codes, Research monograph series, no. 21, MIT Press, Cambridge, MA, 1963. [6] David J.C. MacKay and Radford M. Neal, Near Shannon limit performance of low density parity check codes, Electronics Letters 32 (1996), no. 18, 1645– 1646, Reprinted in Electronics Letters, 33 (1997), no. 6, 457-458.