throbber

`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`INTERNATIONA
`
`PUBLICATION
`
`CONTENTS
`pages 1-96
`
`ANTENNAS
`Accurate modelling of anti-
`resonant dipole antennas
`using the method of moments
`D.H. Werner and
`R.J. Allard (USA)
`Dual-polarised uniplanar conical-
`beam antennasfor HIPERLAN
`E.M.Ibrahim, N.J. McEwan,
`R.A. Abd-Alhameed and
`PS. Excell (United Kingdom)
`
`CIRCUIT THEORY & DESIGN
`Analogue CMOS high-frequency
`continuous wavelet transform
`circuit
`E.W. Justh and F.J. Kub (USA)
`Apparent power transducer for
`three-phase three-wire system
`S. Kusui and M. Kogane
`(Japan)
`Efficient and fast iterative reweighted
`least-squares nonrecursivefilters
`Yue-Dar Jou, Chaur-Heh Hsieh
`and Chung-Ming Kuo( Taiwan)
`Input switch configuration
`suitableforrail-to-rail
`operation of switched
`opamp circuits
`M. Dessouky and
`A. Kaiser (France)
`Unified model of PWM switch
`including inductor in DCM
`Sung-Soo Hong (Korea)
`
`COMMUNICATIONS & SIGNAL
`PROCESSING
`Adaptive multiwavelet prefilter
`Yang Xinxing and
`Jiao Licheng (China)
`Decision feedback equalisation
`of coded I-O OPSKin mobile
`radio environments
`A. Adinoyi, S. Al-Semari
`and A, Zerguine (Saudi Arabia)
`Detection algorithm andinitial
`laboratory results using
`V-BLAST space-time
`communication architecture
`G.D. Golden, C.J. Foschini,
`R.A. Valenzuela and
`PW. Wolniansky (USA)
`
`page
`
`10
`
`11
`
`13
`
`14
`
`7th January 1999 Vol, 35 No.1
`
`
`
`
`
`Efficient complexity reduction
`techniquein trellis decoding
`algorithm
`Sooyoung Kim Shin
`and SooIn Lee (Korea)
`Extended complex RBF and
`its application to M-QAM
`in presence of co-channel
`interference
`Ki Yong Lee and
`Souhwan Jung (Korea)
`Fair queueing algorithm with
`rate independent delay for
`ATM networks
`S. Ho, S. Chan and
`K.T. Ko (Hong Kong)
`Integrated space-time equaliser
`for DS/CDMA receiver with
`unequalreduced lengths
`V.D. Pham andT.B. Vu
`(Australia)
`Investigation of sensor failure
`with respect to ambiguities
`in linear arrays
`Fs
`V. Lefkaditis and A. Manikas
`(United Kingdom)
`Learning algorithms for minimum
`cost, delay bounded multicast
`routing in dynamic environments
`J. Reeve, P. Mars and
`T. Hodgkinson (United Kingdom)
`Multiple target tracking using
`constrained MAPdata association
`Hong Jeong and
`Jeong-HoPark (Korea)
`Passbandflattening and
`broadening techniques for
`high spectralefficiency
`wavelength demultiplexers
`E.G. Churin and
`P. Bayvel (United Kingdom)
`Performance of COMA/PRMA
`protocol for Nakagami-m
`frequency selective fading
`channel
`R.P.F. Hoefel and
`C. de Almeida (Brazil)
`Thit/s switching scheme
`for ATM/WDM networks
`J. Nir, |. Elhanany
`and D. Sadot(/srae/
`
`20
`
`24
`
`27
`
`30
`
`«ia
`
`(continued on back cover)
`
`Apple 1003
`
`Apple 1003
`
`

`

`CONTENTS
`(continued from front cover)
`
`ELECTROMAGNETIC WAVES
`Electromagnetic penetration into
`2D multiple slotted rectangular
`cavity: TE-wave
`H.H. Park and H.J. Eom (Korea)
`
`IMAGE PROCESSING
`Encoding edge blocks by partial
`blocks of codevectors in vector
`quantisation
`Hui-Hsun Huang, Cheng-Wen Ko
`and Chien-Ping Wu( Taiwan)
`Techniquefor accurate correspondence
`estimation in object borders and
`occluded image regions
`E. Izquierdo M. (United Kingdom)
`
`page
`
`31
`
`32
`
`34
`
`
`
`
`
`
`
`
`35°.
`
`37
`
`
`
`
`
`
`page
`
`51
`
`Near room-temperature continuous-
`waveoperation of electrically
`pumped 1.5511m vertical cavity
`lasers with InGaAsP/InP bottom
`mirror
`S. Rapp, F. Salomonsson,
`J. Bentell (Sweden),
`|. Sagnes, H. Moussa,
`C. Mériadec,R. Raj (France),
`K. Streubel and
`M. Hammar(Sweden)
`Record high characteristic
`temperature (7, = 122K) of 1.55\1m
`strain-compensated AlGalnAs/
`AlGalnAs MQW lasers with
`AlAs/AllnAs multiquantum barrier
`N. Ohnoki, G. Okazaki,
`F. Koyama and K.Iga (Japan)
`Red light generation by sum frequency
`mixing of Er/Yb fibre amplifier
`output in OPM LiNbO,
`D.L. Hart, L. Goldberg
`and W.K. Burns (USA)
`
`INFORMATION THEORY
`Analysis of turbo codes with
`asymmetric modulation
`Young Min Choi and
`Pil Joong Lee (Korea)
`Improved group signature
`MICROWAVE GUIDES &
`schemebased on discrete
`COMPONENTS
`logarithm problem
`Lumped DC-50GHz amplifier
`Yuh-Min Tseng and
`Jinn-Ke Jan (Taiwan)
`using InP/InGaAs HBTs
`A. Huber, D. Huber,
`Low density parity check codes with
`C. Bergamaschi, T. Morf
`semi-random parity check matrix
`and H. Jackel (Switzerland)
`Li Ping, W.K. Leung (Hong Kong)
`RF tunable attenuator and modulator
`and Nam Phamdo (USA)
`using high Tc superconductingfilter
`Non-binary convolutional
`Lu Jian, Tan Chin Yaw, C.K. Ong
`codesforturbo coding
`and Chew Siou Teck (Singapore)
`GiBerrou cand M. Jézéquel (France)
`
`NEURAL NETWORKS
`» INTEGRATED OPTOELECTRONICS
`Compact building blocks for
`
`46GHz bandwidth monolithic
`artificial neural networks
`InP/InGaAs pin/SHBTphotoreceiver
`M. Meléndez-Rodriguez and
`D. Huber, M.Bitter, T. Morf,
`J. Silva-Martinez (Mexico)
`_C. Bergamaschi, H. Melchior
`and H. Jackel (Switzerland)
`
`55
`
`56
`
`57
`
`59
`
`61
`
`41
`
`f
`LASERS
`1.5m InGaAlAs-strained MQW ridge-
`waveguide laser diodes with hot-
`carrier injection suppression structure
`
`H. Fukano, Y. Noguchi
`~~and S, Kondo (Japan)
`9.5W CW output power from high
`+ de
`_ brightness 980nm InGaAs/AlGaAs
`laser arrays
`F.J. Wilson, J.J. Lewandowski,
`B.K. Nayar, D.J. Robbins,
`PJ. Williams, N. Carr and
`F.O. Robson(United Kingdom)
`Investigation of data transmission
`characteristics of polarisation-
`controlled 850nm GaAs-based
`VCSELs grown on (311)B substrates
`H. Uenohara,K. Tateno,
`T. Kagawa, Y. Ohiso,
`H. Tsuda, T. Kurokawa
`and C. Amano (Japan)
`Low current and highly reliable
`operation at 80°C of 650nm
`5mW LDs for DVD applications
`M. Ohya,H.Fujii,
`K. Doi and K. Endo (Japan)
`Modelocked distributed
`Braggreflector laser
`H. Fan, N.K. Dutta, U. Koren,
`C.H. Chen and A.B.Piccirilli (USA)
`
`OPTICAL COMMUNICATIONS
`40Gbit/s single channel dispersion
`managed pulse propagation in
`standard fibre over 509km
`S.B. Alleston, P. Harper,
`1.S. Penketh, |. Bennion and
`N.J. Doran (United Kingdom)
`All-optical 2R regeneration based
`on interferometric structure
`incorporating semiconductor
`optical amplifiers
`D. Wolfson, P.B. Hansen,
`A. Kioch and K.E. Stubkjaer
`(Denmark)
`Demonstration of time interweaved
`photonic four-channel WOM
`sampler for hybrid analogue-
`digital converter
`J.U. Kang and R.D. Esman (USA)
`Design of short dispersion decreasing
`fibre for enhanced compression of
`higher-order soliton pulses around
`1550nm
`M.D.Pelusi, Y. Matsui
`and A. Suzuki (Japan)
`Experimental measurement of
`group velocity dispersion in
`photonic crystal fibre
`M.J. Gander, R. McBride,
`J.D.C. Jones, D. Mogilevtsev,
`T.A. Birks, J.C. Knight and
`PSt.J. Russell (United Kingdom)
`
`(continued on inside back cover)
`
`

`

`ELECTRONICS
`LEACERS
`
`
`
`
`THE INSTITUTION OF ELECTRICAL ENGINEERS
`
`7 JANUARY 1999
`ELLEAK 35(1)
`
`VOLUME35
`1-96
`
`NUMBER1
`ISSN 0013-5194
`
`ELECTRONICS LETTERS (ISSN 0013-5194) is published every other week except for one issue in December(total of 25 issues). 1999 annual
`subscription price £630.00. Single copy £26.00. Available also in a concurrent microfiche edition at the same subscription rate as for the printed
`edition. Air mail service direct to subscribers an additional £62.00.
`
`All subscription inquiries and orders should be sent to IEE Publication Sales, PO Box 96, Stevenage SG1 2SD, United Kingdom.
`Contributions should be in accordance with the Guide to Authors, which is usually to be found on the inside back coverorthe last page of each issue,
`and should be addressedasindicatedin the Guide.
`
`All other correspondence,including advertisements, should be sent to the IEE Publishing Department.
`The advantages of rapid publication given by Electronics Letters are nullified if subscribers are subject to excessive delays in the receipt of the
`journal. The Executive Editor would be grateful to learn of anydifficulties subscribers may experience.
`Electronics Letters Online
`
`
`
`Electronics Letters is available online through the IEE Online Journals service on the IEE’s World-Wide Webserver. Articles are stored in PDF format
`and may be viewed and printed using the Adobe® Acrobat® Reader. Features include: browsable table of contents pages for each journalissue,
`cross-journal searching of bibliographic records (inc. authors, titles, abstracts), and the ability to print articles locally. The issues are added in
`advance of print publication. For furtherinformation, please look at http://ioj.iee.org.uk/ or contact the Marketing Departmentat Stevenage.
`Copyright and copying
`This publication is copyright under the Berne Convention and the Universal Copyright Convention. All rights reserved. Apart from any copying under
`the UK Copyright, Designs and Patents Act 1988, Part 1, Section 38, whereby a single copy of an article may be supplied, under certain conditions,
`for the purposesof research orprivate study, byalibrary of a class prescribed by The Copyright (Librarians and Archivists) (Copying of Copyright
`Material) Regulations 1989: SI 1989/1212, no part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by
`any meanswithoutthe prior permission of the copyright owners. Permission is, however, not required to copy abstracts ofindividual contributions on
`condition that a full reference to the source is shown.
`
`Single copies may be madefor the purposeof research or private study.
`Authorisation to photocopyitems for internal or personal use, or for the internal or personal use of specific clients, is granted by theInstitution of
`Electrical Engineers forlibraries and other users registered with the Copyright Clearance Center Transactional Reporting Service, provided that the
`base fee of $10.00 per copyis paid directly to the Copyright Clearance Center, Inc., 21 Congress Street, Salem, MA 01970, USA. 00135194/97
`$10.00. This authorisation does not extend to other kinds of copying, such as copying for general distribution, for advertising or promotional
`purposes, for creating new collective worksorfor resale.
`Multiple copying of the contentof this publication without permissionis alwaysillegal.
`The IEE is not as a body responsiblefor the opinions expressed by individual authors in Electronics Letters.
`
`Secretary of the IEE:
`J. C. Williams, OBE, PhD, FEng, FIEE
`
`© 1999: The Institution of Electrical
`Engineers
`
`Editorialstaff:
`Gill Wheeler (Managing Editor)
`Joanne Davies
`Rachel Smyly
`
`Typeset in England by
`
`Pindarplc
`Ryedale Building
`First Floor
`60 Piccadilly
`York YO1 SWU
`
`Printed in UK by
`A. McLay & Co. Limited
`Longwood Drive
`Forest Farm
`Cardiff CF4 7ZB
`
`
`
`The IEE is a memberof the Association of Learned & Professional Society Publishers.
`
`The Institution of Electrical Engineers
`Savoy Place
`London WC2R OBL
`United Kingdom
`
`Telephone
`
`Facsimile
`
`WWW
`
`+44 (0)1 71 240 1871
`
`+44 (0)1 71 240 7735
`
`http://www.iee.org.uk
`
`+44 (0) 1438 313311
`825578 IEESTV G
`
`Publishing Department:
`|IEE
`Michael Faraday House
`Six Hills Way
`Stevenage SG1 2AY
`United Kingdom
`Telephone
`Telex
`Facsimile:
`+44 (0) 1438 742792
`Sales
`+44 (0) 1438 742849
`Editorial
`+44 (0) 1438 318361
`Advertising
`+44 (0) 1438 742840
`Marketing
`E-mail:
`
`HONORARYEDITORS
`Sir Eric Ash, CBE, FEng, FRS
`Prof. Peter Clarricoats, CBE, FEng, FRS
`Prof. Chris Toumazou
`
`

`

`
`
`the proposed
`
`Security analysis: Some possible attacks against
`schemeare presented below.
`Attack I; Although the group authority has the knowledge of(r,.
`s, k,), the group signature cannot be forged without the secret key
`x, of U.. It is impossible to obtain x, from y, without being able to
`solve the discrete logarithm problem. Moreover, because the gen-
`erator o, = g’*' mod p,k,€ Z, anda e Z,, both o, and g have
`the same order g. Therefore, forging (R, S) is as difficult as break-
`ing ElGamal’s scheme [3]. Since the group authority cannot forge
`the group signature, forgery by an adversary is even more diffi-
`cult. Thus, the impersonation attack can not be successful.
`Attack 2: The signer U, can be identified if we can obtain v, from
`the signature {R, S, h(n), A, B,C, D, E}. Since the receiver does
`not knowthe (r,. s,, k,) of the group authority, he cannot check the
`equation D’. yy» E = D* mod p. Obtaining (v, 5, &,) from given
`(4, B, C, D, FE} depends on the discrete logarithm.
`Attack 3: The group authority may publish the information (r;, s;.
`y) for the message m's signature to enable a verifier to check the
`identity of U,, This does not damage the anonymity of Us previ-
`ous group signatures because the information (r,, s,, ¥,)
`is only
`provided for the specific group signature {R, S, h(i), A, B,C, Dy
`FE}. Fordifferent messages, U, will have chosen different random
`integers a and / to generate group signatures. If an adversary
`wants to obtain a, 6 and (r,, s,) from given {A, B, C.D, E} this is
`as difficult as solving the discrete logarithm.
`
`Discussion: The improved scheme preserves the main merits inher-
`ent in most of the Lee-Chang scheme. In the case of a later dis-
`pute, the group authority may publish the information (1; 57. 1)
`to enable a verifier to check the identity of the signer, although
`this does not damage the anonymity of the other previous signa-
`tures of the signer. Meanwhile.
`the group authority need not
`renew any key of the signer. The reason is that the information
`(ry, 8p. ¥,) is only provided for the specific group signature {| R, S,
`iim), A, B. ©. D, E}. Compared to the original scheme,
`the
`improved scheme requires some additional cost
`in terms of com-
`putational time and the size of the group signature. For generating
`a group signature. the signer U, may precompute several different
`‘a, A, B,C, D. FE} using (r,. s,) to reduce the real-trme computa-
`tional time.
`
`Conclusions: We have proposed an improved group signature
`scheme based on the discrete logarithm. In our improvement, a
`group signature can be opened to reveal the identity of the signer.
`the anonymity of the other previous signatures signed by this
`group member are not damaged. Meanwhile, the group authority
`also need not renewthe keys of the signer. We have demonstrated
`somepossible attacks against the proposed scheme. Underthe dif-
`ficulty of computing the discrete logarithm problem, we have
`shownthat the improved schemeis secure against these attacks.
`
`© IEE 1999
`Electronics Letters Online No: 1999007]
`
`28 October 1998
`
`Low density parity check codes with semi-
`random parity check matrix
`
`Li Ping, W.K. Leung and Nam Phamdo
`
`A semi-random approach to lowdensity parity check code design
`is shown to achieve essentially the same performance as an
`existing method, but with considerably reduced complexity.
`
`Introduction; Recently, there has been revived interest in the low
`density parity check (LDPC) codes originally introduced in 1962
`by Gallager [1]. It has been shown that such codes can achieve
`very good performances (within 1.5dB oftheoretical limits) with
`modest decoding complexity[2].
`An LDPCcode is defined from a randomly generated parity
`check matrix H [2]. For the purpose of encoding,it is necessaryto
`transfer H into H,,,, the equivalent systematic form of H, which
`can be accomplished by Gaussian elimination. For a rate R = k/n
`(kK = information length, n = coded length), the size of H is (nk) x
`n. When nvis large, Gaussian elimination can be costly in terms of
`both memoryand the operations involved. Besides, a considerable
`amount of memoryis required to store H,,,
`in the encoder, which
`is not necessarily sparse even though H is usually designed so.
`In this Letter, we report a modified approach to LDPC code
`design. We adopt a semi-randomtechnique, i.e. only part of H is
`generated randomly, and the remaining part is deterministic. The
`new method can achieve essentially the same performance as the
`standard LDPC encoding method withsignificantly reduced com-
`plexity.
`
`Proposed approach: For simplicity we will only consider binary
`codes. Decompose the codeword ¢ as ¢ = [p, d]', where p and d
`contain the parity and information bits, respectively. Accordingly,
`we decompose 7 into H = [H’, H“]. Then
`
`a?a) (P) =0
`
`d
`
`(1)
`
`In the proposed method, H’is constructed in some deterministic
`form. Empirically, we found the following a good choice (recall
`that He must be a square matrix [3]):
`]
`
`0
`
`He = a
`0
`11
`
`(2)
`
`Weadoptthe following rules to create H¢. Let ¢ be a preset integer
`constrained by (/) ¢ divides n-k and(ii) n-& divides kr. Partition H#
`(which has »-k rows) into ¢ equal sub-blocks as
`
`H? =
`
`Hal
`:
`Ho’
`
`(3)
`
`Yuh-Min Tseng and Jinn-Ke Jan (/nstitute of Applied Mathematics,
`National Chung Hsing University, Taichung, Tatwan 402, Republic of
`China)
`
`Jinn-Ke Jan: corresponding author
`E-mail: jkjan@amath.nchu.edu.tw
`
`¢ = 1, 2 -- -t, we randomlycreate exactly
`In each sub-block H*,
`one element | per columnand kt/(n-k) 1s per row. The partition in
`eqn. 3 is to best increase the recurrence distance of each bit in the
`encoding chain (see below) and, intuitively, reduces the correlation
`during the decoding process. The resultant H’ has a column
`weight of ¢ and a row weight of k1/(m-&) (the weight of a vectoris
`the number of Is amongits elements).
`References
`Based on eqns. | and 2,p= {p,} can easily be calculated from a
`
`given d =
`{d,} as
`signatures’,
`Proc,
`
`1 CHAUM.D,—and HEYST, F:: ‘Group
`
`}
`7
`Pr >it),
`aid p= Piast S_ Aid,
`(med 2)
`EUROCRYPT9I, 1992, pp. 257-265
`(4)
`2) CHEN.L., and PEDERSEN, T.P.: ‘New group signature schemes’, Proc.
`EUROCRYPT 94, 1995, pp. 171-181
`ELGAMAL.T.:
`‘A public key crypto system and a signature scheme
`based on discrete logarithms’, JEEE Trans.
`Inf. Theory, 1985, 31,
`(4). pp. 469-472
`LEE. Wes. and CHANG. ¢.c:: “Efficient group signature scheme based
`on the discrete logarithm’. JEE Proc. Comput. Digit. Tech., 1998,
`145. (1), pp. 15-18
`5 NYBERG. K.. and RUEPPEL. R.A “Message recovery for signature
`schemes based on the discrete logarithm problem’. Designs, Codes
`and Cryptography, 1996, 7. pp. 61-81
`
`3
`
`4
`
`the above
`Compared with the standard LDPC code design [2],
`method has several advantages. First, the encoding process in eqn.
`4 is much simpler than a full Gaussian elimination. Secondly. a
`random H® can be singular, which causes additional programming
`complexity in realising a specified rate. On the other hand, H’ in
`egn. 2 is always non-singular so the new method canrealise any
`given rate directly and precisely. Thirdly,
`it requires verylittle
`memoryto store H# in the encoder if H* is sparse (this can be
`ensured using small 1).
`
`38
`
`ELECTRONICS LETTERS
`
`7thJanuary 1999 Vol.35 No.1
`
`

`

`
`
`
`
`decoders passing the result of their work to each other, at each
`iteralive step.
`
`x
`systematic
`part
`
`data
`
`
`interleaving |
`1 redundancy
`
`|||
`
`
`
`go
`(955/1
`1 Two-dimension turbo code with generators 15, 13
`
`0.6
`
`1.0
`
`1.4
`E,/No.dB
`
`1.8
`
`2.2
`
`oir
`
`| Performances of LDPC codes generated by semi-random pariti
`Fig.
`check matrixes with k = 30000
`
`@ R= 13
`BR-
`AR-2? Lahot
`
`Fig.
`
`| contains the simulated performances of
`Simulation study; Fig.
`the proposed encoding method for various rates (1/3, 1/2. 2/3)
`using f = 4. The decoding algorithmfollows that in [2]. The results
`are essenually the same as those obtained using fully random H.
`
`It has been shown that a semi-random approach to
`Conclusion:
`LDPC code design can achieve essentially the same performance
`as the existing method with considerably reduced complexity.
`
`© IEE 1999
`Electronics Letters Online No; 19990065
`
`23 November 1998
`
`Li Ping and W.K. Leung (Department of Electronic Engineering, City
`University of Hong Kong, Hong Kong)
`E-mail: eeliping@cityu.edu.hk
`Nam Phamdo (Department of Electrical and Computer Engineering,
`State University of New York at Stony Brook, Stony Brook, N¥ 11794-
`2350, USA)
`
`References
`
`IT
`
`GALLAGER, R.G.: “Lowdensity parity check codes’, JRE Trans. Inf.
`Theory, 1962, 1T-8, pp. 21 28
`2) Mack AY, DJC.. and NEAL, R.M.: “Near Shannonlimit performance of
`low density parity check codes’, Electron. Lett., 1997, 33, (6), pp.
`457 458
`PROAKIS. 1G.: “Digital communications’ (McGraw-Hill, 1995)
`PETERSON, W.W., and WELDON. E.., Jr: “Error-correcting codes’ (MIT
`Press, Cambridge, Massachusetts. 1972) 2nd edn.
`
`3)
`4
`
`Binary codes versus quaternary codes: Fig. 2a represents a block of
`size A encoded bythe code of Fig.
`|. This block is seen as a two-
`dimensional vA x V& block and for simplicity we consider that the
`interleaver is a regular one:
`the sequence is encoded first by C,,
`following the horizontal or linewise dimension, and secondly by
`C., following the vertical or columnwise dimension. The dashes on
`beth dimensions symbolise the path error packets at the output of
`the two decoders, at a particular step of the iterative process.
`These packets do not contain only erroneous decisions but they
`indicate where a wrong path has been chosen either by the
`decoder of C, or by the decoder of C,. This corresponds to a cer-
`tain path error density per dimension, which is the same in both
`dimensions if the component codes are identical.
`
`
`
`vki2
`
`Fig. 2 Path error packets in turbo decoding
`a Binary codes
`b Quaternary codes
`
`82]
`
`
`systematic part
`
`>
`
`|
`
`Non-binary convolutional codes for turbo
`coding
`
`C. Berrou and M., Jézéquel
`
`The authors consider the use of non-binary convolutional codes in
`turbo coding.
`It
`is
`shown that quaternary codes can be
`advantageous.
`both
`from performance
`and
`complexity
`standpoints, but that higher-order codes may not bring further
`improvement.
`
`Introduction: Turbo codes are error correcting codes withat least
`two dimensions (i.e. each datum is encoded at least
`twice). The
`decoding of turbo codes is based on aniterative procedure using
`the concept of extrinsic information. Fig.
`1 gives an example of a
`two-dimensional turbo code built from aparallel concatenation of
`two identical recursive systematic convolutional (RSC) codes with
`generators
`15.
`13 (octal notation). The global
`(non-iterative)
`decoding of such a code is too complex to be envisaged because of
`the very large numberofstates induced by the interleaver. Aniter-
`ative procedure is therefore used,
`the two codes being decoded
`alternately in
`their own dimensions and the two associated
`
`Fig. 3 S-state quaternary recursive systematic convolutional
`code with generators 15, 13
`
`( RSC)
`
`redundancy
`
`The performance of turbo decoding is strongly dependent on
`the path error density per dimension. Obviously, the more numer-
`ous and the longer the horizontal and vertical dashes in the square
`box are, the harder the convergence to the correct codeword is.
`Nowfor each component code, replace the binary code of Fig.
`|
`by the quaternary code of Fig. 3. The data are thus encoded and
`interleaved in couples. The size of the block is 4/2 couples and the
`square box nowhas the dimensions Vk/2 x Vk/2 (Fig. 25). When a
`decoder selects a path in the decodingtrellis, the same amount of
`information is used in the cases of both binary and quaternary
`codes, therefore with half the number oftransitions in the case of
`a quaternary code, giving path error packets which are half the
`
`ELECTRONICS LETTERS
`
`7th January 1999 Vol.35 No.
`
`17
`
`39
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket