Study of the operational SNR while constructing polar codes
نویسندگان
چکیده
منابع مشابه
Constructing Polar Codes Using Iterative Bit-Channel Upgrading
The definition of polar codes given by Arikan is explicit, but the construction complexity is an issue. This is due to the exponential growth in the size of the output alphabet of the bit-channels as the codeword length increases. Tal and Vardy recently presented a method for constructing polar codes which controls this growth. They approximated each bit-channel with a “better” channel and a “w...
متن کاملextensions of some polynomial inequalities to the polar derivative
توسیع تعدادی از نامساوی های چند جمله ای در مشتق قطبی
15 صفحه اولstudy of cohesive devices in the textbook of english for the students of apsychology by rastegarpour
this study investigates the cohesive devices used in the textbook of english for the students of psychology. the research questions and hypotheses in the present study are based on what frequency and distribution of grammatical and lexical cohesive devices are. then, to answer the questions all grammatical and lexical cohesive devices in reading comprehension passages from 6 units of 21units th...
Investigation on Ber Sensitivity to Design Snr of Bhattacharrya Bounds Based Construction of Polar Codes
Advanced coding has been widely used to accomplish the high-performance requirements of wireless communications. While adhering to the perspective on energy-spectral efficiency, channel coding is still promising. To deal with such challenge, research initiatives on the linear block error correcting codes have gained accelerating momentum. In this paper we introduce polar codes which have proven...
متن کاملAn efficient secure channel coding scheme based on polar codes
In this paper, we propose a new framework for joint encryption encoding scheme based on polar codes, namely efficient and secure joint secret key encryption channel coding scheme. The issue of using new coding structure, i.e. polar codes in Rao-Nam (RN) like schemes is addressed. Cryptanalysis methods show that the proposed scheme has an acceptable level of security with a relatively smaller ke...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Electrical and Computer Engineering (IJECE)
سال: 2020
ISSN: 2088-8708,2088-8708
DOI: 10.11591/ijece.v10i3.pp3200-3207