SlideShare una empresa de Scribd logo
1 de 15
Descargar para leer sin conexión
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014

A LOW COMPLEX MODIFIED GOLDEN
CODE IN A COOPERATIVE RELAYING
SYSTEM
K.Thilagam1 and K.Jayanthi 2
1

2

Research Scholar, Department of ECE, Pondicherry Engg. College, Puducherry, India
Associate Professor, Department of ECE, Pondicherry Engg. College, Puducherry,India

ABSTRACT
In recent years, cooperative communication is a hot topic of research and it is a powerful physical layer
technique to combat fading in wireless relaying scenario. Concerning with the physical layer issues, in this
paper it is focussed on with providing a better space time block coding (STBC) scheme and incorporating it
in the cooperative relaying nodes to upgrade the system performance. Recently, the golden codes have
proven to exhibit a superior performance in a wireless MIMO (Multiple Input Multiple Output) scenario
than any other code. However, a serious limitation associated with it is its increased decoding complexity.
This paper attempts to resolve this challenge through suitable modification of golden code such that a less
complex sphere decoder could be used without much compromising the error rates. The decoder complexity
is analyzed through simulation and it proves to exhibit less complexity compared to the conventional
(Maximum likelihood) ML decoder. The single relay cooperative STBC consisting of source, relay and
destination are considered. The cooperative protocol strategy considered in the relay node is Decode and
forward (DF) protocol. The proposed modified golden code with less complex sphere decoder is
implemented in the nodes of the cooperative relaying system to achieve better performance in the system.
The simulation results have validated the effectiveness of the proposed scheme by offering better BER
performance, minimum outage probability and increased spectral efficiency compared to the non
cooperative transmission method.

KEYWORDS
Cooperative communication, cooperative STBC, Bit error rate (BER), outage probability, spectral
efficiency, Golden code, low complex sphere decoder.

1. INTRODUCTION
In wireless communication, there is an ever growing demand for higher data rate, highly reliable
transmission schemes and increased spectral efficiency for high speed wireless connectivity. The
multiple input multiple output (MIMO) technique is a promising scheme for reliable
communication at higher data rate by offering spatial diversity and increase in capacity without
the additional power consumption or bandwidth expansion. Cooperative communication is an
interesting research topic in wireless communication because it achieves distributed spatial
diversity, wider coverage, low transmit power and reduced interference. Recently, a new
technique which exploits the advantages of aforementioned schemes through MIMO techniques
and cooperation (i.e., combining space time block coding and cooperative relaying) attracts a
widespread attention in the literature. The alamouti coded form constructed at the destination
node and each relay node performs either time-reversal or conjugation operation (i.e.) the
modified operations at the relay nodes which overcomes the influence of the frequency selective
fading channels has been discussed in [1]. A ML decoder for the DF-based differential
DOI : 10.5121/ijcnc.2014.6106

79
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014

cooperative system utilizing complex-valued unitary and non-unitary constellations and uncoded
transmissions. Also, deriving a (piecewise linear) PL decoder for complex-valued unitary, nonunitary constellations and closed-form expression of the approximate uncoded symbol error rate
(SER) has been discussed in [2]. In [3] discussed about the signal designs such as space time
codings / modulations to achieve full cooperative diversity and an overview of the efforts on
combating the time and frequency asynchronism of the cooperative communication network. The
joint source channel coding (JSCC) scheme for scalable video transmission over cooperative
MIMO which was capable of dynamically adapting to the varying MIMO channel has been
discussed in [4]. In [5] the authors discussed, about the application of adaptive modulation
concept to the performance of cooperative techniques and to improve the spectral efficiency of
the amplify and forward system. The measured bit error rate performance of a three node
cooperative communication system operating with a maximum ratio combining technique and
two cooperative coded schemes using hard and soft decision decoding has been discussed in [6].
The Distributed space time trellis codes (DSTTC) design criteria formulation with perfect and
imperfect decoding at the relay and the derivation of the upper bounds of pair wise error
probability (PEP) for different channel condition has been discussed in [7].
In [8], the authors has discussed the Double-differential (DD) modulation for amplify and forward
(AAF) cooperative communications system that works well with carrier offsets and further the
numerical power allocation improves the performance of the system. The Distributed source
coding, channel coding and modulation(DSCM) designed for ensuring the decoding convergence
of its constituent component codes , the variable length code(VLC) and two coded modulation
(CM) schemes for cooperative communications has been discussed in [9]. An efficient space time
coded cooperative relay communications scheme that employs linear precoding and a distributed
relay selection algorithm to maximize the signal to noise ratio at the receiver has been discussed
in [10].In [11], the space time block codes for a half-duplex multiple input multiple output
(MIMO) and non-orthogonal amplify and forward (NAF) cooperative diversity scheme with
multiple relays has been discussed. The achievable rates and fairness for several protocols using
rateless codes has been discussed in [12]. In [13], the authors discussed about the relay using AF
method and the source constructed with a distributed alamouti space time code and each terminal
transmitted with the row of alamouti code. The design of space time codes that are capable of
achieving the full diversity and by illustrating how cooperation among nodes with different
numbers of antennas can be accomplished and how the quality of interuser link can be affected
has been discussed in [14].
For a 2x2 MIMO system, golden code was discussed as a full rate and full diversity code with
Non-vanishing minimum determinant (NVD) in [15].In [16], the implementation of the golden
ratio encoder such that the exponential accuracy is robust against the threshold effects using
Directed acyclic graphs (DAG) model has been discussed. A new ML decoding algorithm for the
golden code which retains its fast decodable property on time varying channels and its
comparison with the overlaid alamouti code has been discussed in [17]. In [18] the authors
discussed, a method to develop the suboptimal decoders for the golden code with reduced
complexity and near –ML performance, as the ML- decoding of the golden code have higher
complexity. In [19], the design of low complex Maximum likelihood (ML) decoder for Space
Time Block Codes (STBC) and embedded orthogonal STBC with symmetric and asymmetric
coding conditions has been discussed. Multigroup maximum-likelihood (ML) decoding for
collocated and distributed space-time block codes (DSTBCs) and the orthogonal frequencydivision multiplexing (OFDM)-based Alamouti space-time coded scheme application in
synchronous wireless relay networks has been discussed in [20]. A suitable modification of
golden code with less complex sphere decoder was proposed to achieve the better BER
performance compared to the conventional space time block codes has been analysed and
discussed in [21].In this paper, the proposed modified golden codes with less complex sphere
decoder in [21] is implemented in the nodes of cooperative relaying system and its performance is
80
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014

analyzed. The simulation results shows that the proposed scheme under cooperative relaying
scenario offers better BER performance, minimum outage probability and maximum spectral
efficiency compared to the non-cooperative transmission scheme.
The remaining part of the paper is organized as follows: In section 2, the system model of the
proposed cooperative relaying scheme is elaborated. In section 3, the proposed modified golden
code is discussed analytically. Section 4, elaborates the decoder design for the proposed setup.
Simulation results are discussed in Section 5. Section 6, deals with the conclusion of the paper.

2. SYSTEM MODEL OF THE PROPOSED COOPERATIVE
RELAYING SCHEME
Consider a cooperative communication network consisting three nodes, the source(S) node,
relay(R) node and destination(D) node each has two antennas. Let ‘hs,r’ be the fading channel
matrix between the S and R, ‘hs,d’ be the fading channel matrix between S and D, and ‘hr,d’ be the
fading channel matrix between R and D. Since the assumption is two antennas, all the fading
channel matrices are 2 x 2 matrices whose entries are independent complex Gaussian random
variables with zero mean and unit variance. The terms

h

i, j
s ,r

,

h

i, j
r ,d

and

h

i, j
s ,d

for i, j = 1, 2 are the fading coefficients from the ith transmit antenna to the jth receive antenna for
the corresponding channels. Further, the assumptions made are cellular mobile environment, the
rayleigh fading for all channels and perfect channel state information is known at the receiver. It
is also assumed to have half duplex communication that is, all nodes can either transmit or receive
and two phase cooperative communications. Cooperative protocol strategies are classified by the
operation at R and here it is assumed to be DF protocol, where R decodes the received signal, reencodes, and transmits to D.

Figure 1. Cooperative Communication for single relay with the Implementation of Proposed low
complex modified golden codes in the nodes

Referring to the Figure.1, the system model of the proposed scheme has the source node, relay
node and the destination node each having two antennas. The cooperation strategy is modeled
with two orthogonal phases to avoid the interferences. In phase 1, source sends information to the
destination and the information is received by the relay at the same time. In phase 2, the relay
helps the source by forwarding or retransmitting the information to the destination. In phase 1, the
source broadcasts its information to both the destination and the relay. The received signals at the
destination and the relay are obtained as,
81
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014

y

s ,d

y

s ,r

=

P

h

s ,d

x+

n

s ,d

(1)

=

P

h

s ,r

x+

n

s ,r

(2)

In phase 2, the relay forwards a processed version of the source’s signal to the destination and this
is obtained as,

y

r ,d

= h r ,d q ( y ) + n r ,d

(3)

s ,r

the function q (.) depends on which processing is implemented at the relay node.
Where, ‘P’ is the total transmit power at the source, ‘x’ is the transmitted information symbol,
‘ns,d’, ‘ns,r’ and ‘nr,d’ are the additive noises, ‘hs,d’, ‘hs,r’ and ‘hr,d’ are the channel coefficient from
source to destination, source to relay and relay to destination respectively. They are modelled as
zero-mean, complex Gaussian random variables with variances

σ

2
s ,d

,

σ

2
s ,r

σ

and

2
r ,d

respectively. With the variance ‘No’ the noise terms ‘ns,d’, ‘ns,r’ and ‘nr,d’ are modeled as zeromean, complex Gaussian random variables.The mutual information in terms of channel fades for
decode and forward transmission is given by,

I

DF

=

{ (

1
m in lo g 1 + Γ
2

h

2
s ,r

) (

, lo g 1 + Γ

h

2
s ,d

+Γ

h

2
r ,d

)}

(4)

Considering rayleigh fading channel, the outage probability can be written as,
Pr  I


DF


2

< R  = Pr  h s , r <




2


2
− 1


 + Pr  h s , r >
Γ 




2R

2

2
− 1 
 
 Pr  h s , d +
Γ  
 

2R

h

2
r ,d

< 2

− 1


Γ 


2R

(5)
Averaging over the channel conditions, the outage probability for decode and forward is given by,

Pr I


DF

< R


1

σ

2
s ,r

2

2R

Γ

−1
(6)

2.1. Internal Structure of the Nodes
This section elaborates the internal structures of the source node, relay node and destination node
which are shown in Figure (a), Figure (b) and Figure (c).
Referring to the figure (a), the source node consists of two blocks namely QAM modulator block
and RGR_GC encoder block. The operation at the source node is, the input bit streams are given
as input to the QAM modulator and in the modulator bits are mapped according to the
constellation and further encoded with RGR_GC encoder. Then, the encoded signal is launched
over the two transmitting antennas.

82
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014

Figure (a). Source node

Figure (b). Relay node

Referring to the figure (b), the relay node consists of two blocks (i.e) the decoder block and
forward block. The decoder block in turn has two blocks namely RGR_GC decoder and QAM
demodulator. The forward block in turn has two blocks namely QAM modulator and RGR_GC
encoder. The process involved is, the relay receives the overheard signals and it is given to the
decoder block. In decoder block, the signal is decoded and demodulated. Then the decoder output
is given as input to the forward block. The forward block re-encodes the input signal according to
QAM constellation and generates the Decode and Forward (DF) signals. Further, the DF signal is
launched over the two transmitting antennas.

Figure (c). Destination node

Referring to the figure (c), the destination node consists of two blocks namely signal combining
with RGR_GC decoding block and QAM demodulation block. The process involved is, the
signals are received and combined using maximum ratio combiner and decoded using RGR_GC
decoder. The decoder output is given as input to the QAM demodulator and finally the output bit
streams are obtained. The next section deals with the proposed reduced golden ratio-golden code
(RGR-GC) and its properties in detail.

83
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014

3. PROPOSED REDUCED GOLDEN RATIO –GOLDEN CODE (RGR-GC)
In this section, the proposed code and its properties satisfying golden codes are explained further.
The RGR-GC is a scaled version of golden code which is used to normalize the energy and in
turn, yields the performance improvement in the system. A reduced golden ratio-golden code
(RGR-GC) is obtained by choosing a minimum polynomial equation in such a way that, it obtains
the reduced golden ratio without losing golden codes key properties. The minimum polynomial
equation considered to obtain the reduced golden ratio is
X2-0.5x-0.5=0.
θ =

1+

2
2

, Where, ‘θ’ is the reduced golden ratio

Having defined the polynomial and RGR, the next attempt is to focus onto shaping up the process
to yield lossless property. A codeword from this algebra, before shaping is of the form,
 a + bθ

 i ( c + d σ (θ




a + bσ (θ ) 


c + dθ

))

(7)

where, the information symbols a,b,c,d €Z[i]. The proposed code with Cyclic division Algebra
(CDA) and its properties fulfilment are explained further.
Property 1: Cubic Shaping. This section adds cubic shaping to the codebook which provides the
information lossless property. For Z[i]-lattice, the codeword is generated by the matrix,
1

1





σ (θ ) 

(8)

θ

There will be some shaping loss as the matrix is not unitary. These problems can be fixed without
losing the other algebraic properties. This issue can be addressed by lattice A with a ‘M’generator
matrix is given by,
αθ
α 0
 1 θ
 α


 =

M =
 0 σ (α )   1 σ (θ )   σ (α ) σ (α ) σ (θ ) 


 


To make ‘M’ as unitary matrix, the selection is made in such a way that
The lattice Λ in the determinant form can be written as,
det( Λ ) =
=2

N

L/K

N

(9)

α ∈ΟL

2

L/K

(α )

(α ) d Q (

2

)

2

(10)

To have the lattice Z[i]2, important condition is that the det( Λ ) should be a square integer. To
find such an element, the factorization of 2 in OL is given by,
2 = (1 + i − iθ ) 2 (1 − i + iθ ) 2

(11)

84
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014

Choosing ( α = 1 + i − iθ ).It can be checked whether the obtained is right lattice using the
generator matrix M, where M † = 2 I 2 is obtained by direct computation. The unitary matrix is

1
M which yields the shaping property in the first layer and cubic shaping on the other layer.
2
Adding the shaping property, the codeword ‘X’ belonging to the RGR-GC has the form,

X =

α a + bθ )
α ( c + dθ )

1  (

2  iσ (α ) ( c + d σ (θ ) ) σ (α ) ( a + bσ (θ ) ) 



(12)

Where a, b, c, d are QAM symbols and it takes any value in Z[i]. In an infinite code C∞, a, b, c, d
can take any value in Z[i] that is the finite signal constellations are carved from infinite lattices.
Property 2: Minimum Determinant. The computation of the minimum determinant of an
infinite code is discussed next. Therefore,

X =

α 0

 0 σ (α


1
2

Where,

  ( a + bθ )

)   i ( c + d σ (θ


α σ (α

det( X ) =



) ) ( a + bσ (θ ) ) 


(13)

)=1+ i

1+ i
 ( a + bθ
2 
=

(c + dθ ) 

) ( a + bσ (θ ) ) − i ( c + d θ ) ( c + d σ (θ ) )


1  2
a + a b − b 2 − i (c 2 + c d − d
1+ i 

(

2

))

(14)




2

a 2 + ab − b 2 − i ( c 2 + cd − d 2 ) is 1.As it is required by the NVD property, the minimum
where,
determinant of infinite code is bounded away from zero. To be noted is factor ’i‘ensures that the
2

average transmitted energy is uniform from both antennas in both channel uses and i =1,
Thus,

δ

m in

(C ∞ ) =

m in
X ≠0

det

(X )

2

=

1
2

(15)

The next section explains a new low complexity decoder for the proposed code which is the major
task of the golden codes.

4. PROPOSED LOW COMPLEXITY SPHERE DECODER
In this section, a new low complexity decoder for the Reduced Golden Ratio- golden codes
(RGR-GC) is described. To reduce the decoding complexity, many methods have been analyzed.
In [19], the low complexity decoding for the space time block codes and the key properties for
reducing the decoding complexity was discussed in broad sense. One of the properties considered
in the proposed method is, the real and imaginary parts of the symbol are decoded separately.
Moreover, the channel matrix H=QR, was decomposed using QR decomposition method, where,
‘Q’ is a unitary matrix and ‘R’ is an upper triangular matrix. The ‘R’ matrix with zero entries and
the real elements in it potentially reduce the decoding complexity. In the proposed method, the
real and imaginary parts of the symbol are decoded separately using sphere decoder with tree
search algorithm, in a single symbol manner for Reduced Golden ratio Golden codes (RGR_GC).
The steps involved in the receiver side and algorithm used is explained further. At the receiver,
85
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014

the received vector of samples

y =  y 1 [1 ] , y 2


[2 ] ,

[3 ] ,

y3

y4

T
[ 4 ] with two antennas at two time


instances can be obtained as,
y=Hx+n

(16)

where, ‘x’ is an transmitted symbol vector, ‘n ‘ is the noise vector and ’H’ is the effective channel
matrix represented as, X = [ x 1, x 2 , x 3, x 4 ]T , n = [ n1 [1], .....n 2 [2] ]T
and
0
φ h 2 1 [1]
0
 h 1 1 [1 ]



h21[ 2 ]
0
φ h1 1 [ 2 ] 
0
H =
 h 1 2 [1 ] 0

φ h 2 2 [1]
0


0
φ h22 [ 2 ] 0
φ h1 2 [ 2 ] 


α
− β

0

0

β
α

0 
0 

β 

α 

0
0

α

0
0

− β

(17)

π

respectively. where, φ = e j 4 , α = c o s (θ ) , β = s i n (θ )
In the above equation, H=QR is an orthogonal-triangular decomposition of the effective channel
matrix where, Q is unitary and R is upper triangular. The Gram-Schmidt orthonormalization is
followed for the decomposition. Where this procedure is applied to the columns of H, then the
entry of R in row i and column j will be the inner product between the i th column of Q and j th
column of H. Therefore, ri,j=qi*hj. In direct computation of R, the elements r1,2 and r3,4 are real,
through the diagonal elements and the other elements are complex by nature. From the effective
channel matrix, the diagonal elements {r1,1.....r4,4 } and nondiagonal elements r1,2 and r3,4 by direct
computation is obtained as,
r1 1 =

r3 3 =

α 2γ

α

2

+ β 2γ

1

(γ

3

+ γ4)

γ 12



1
r44 = 

r3 3 γ 1γ 2 


,

2

+

β

r1 2 =

2

(γ

γ

5

1
2

r1 1

+ γ6)
2

,

2

(γ

1

− γ

2

r2 2 =

)

,
(γ

1

r3 4 =

r3 3

2

1
r1 1
+ γ

3

γ

γ 1γ 2

4

)

2

−

(γ

+ γ

5

γ

1

6

)

2
2

2

( γ 3 + γ 4 )( γ 5 + γ 6 ) (α 2 γ 2 2 ( γ 3 + γ 4 ) + β 2 γ 1 2 ( γ 5 + γ 6 ) )

and so on.Decomposing the ‘R’ and ‘X’ matrix, it is got as,
 r1 1 r1 2

0 r2 2
R = 
0 0

0 0

 x1R
 R
 x2
X =  R
 x3
R
 x4


r1 3 r1 4 

r2 3 r2 4 
,
r3 3 r3 4 

0 r4 4 

+ jx1I 

I
+ jx 2 
+ jx 3I 

I
+ jx 4 


The ‘R’ matrix entries r11, r12, r22, r33, r34, r44 are real and in terms of z=Q*y, the decoder chooses x
to minimize,
P(x) =

=

y − Hx

z − Rx

2

(18)

2

where, P(x) is the total cost metric.
= z − R1 x1 − R 2 x 2 − R 3 x 3 − R 4 x 4

2

The decoder proceeds as follows and the total cost of (18) can be written as,

P ( x ) = v − R1 x1

2

(19)
86
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014
= v R − R 1 x1R

2

+ v I − R 1 x1I

2

v = z − R 2 x 2 − R3 x3 − R 4 x4

The importance of going from equations (18) to (19) is the fact that R1 is real. Therefore, for
every candidate ( x1 , x 2 , x 3 , x 4 ) the fact that R1 is real and allows the receiver to decide on real
from
the
imaginary
symbol
(x )
separately
by
symbol
( x1R )
I
1

minimizing v1R − r1,1 x

R 2
1

The decoded symbol vector ‘x’ will be the minimum of the
.
overall cost metric P(x). The minimum of overall cost metric P(x) is obtained using the tree
search algorithm. A sphere decoder with four level tree, for the reduced golden ratio-golden codes
(RGR-GC) associated with different xi (i=1,..4) at each level has been discussed. It is proposed
with a four level tree that associates dR=x4R and dI= x4I in the first level, cR = x3R and cI =x3I in the
second level, bR = x2R and bI = x2I in the third level and aR = x1R and aI = x1I in the fourth level.
Rewriting the cost metric function as,
P ( X ) =

V
+

I

− A a
Z

I
3

I

2

− D c

+ v1I − r1,1 x

I 2
1

+
I

I

V
2

+

− A b
Z

I
4

I

2

+

− D d

V
I

2

R

+

− A a
Z

R
3

R

2

+

− D c

R

V
R

2

+

− A b
Z

R
4

R

2

− D d

R

2

(20)

The number of combinations of each symbol (x1) (x2) (x3) (x4) is denoted by q . The decoding
complexity of q , comes from the fact that the symbols (x1R) and (x1I) are separately decodable.
Therefore, it has the decoding complexity of O ( q 1.5). The next section deals with the tree search
algorithm.

4.1. Tree Search Algorithm
The figure 2, represents the tree diagram of the proposed sphere decoder. As discussed before, the
initial level of tree corresponds to bottom or the starting point of the tree called root node. Each
node acts as parent node and the emerging node from the parent node is child node. The final
stage of the tree structure is called leaf node. The total cost of a leaf node x decomposes into the
sum of four branch metrics denoted by ∑ Pi . Where, Pi represents the branch metric for a branch
at the (4-i) th stage of the tree. A sphere decoding algorithm for four level tree structures is
briefed. The first few steps involves the initialization (i.e) QR decomposition of effective channel
matrix, computation of ‘z’ and the sphere radius P to infinity. It requires only two sorting
operations and incorporates two common optimizations: updating the radius and pruning. The
elements k, l, m,n €П are the permuted channel matrix elements. In the first level of the decoder,
the branch metric of the P4 is updated and in turn decides the x4R and x4I. In the second level of
the decoder, the branch metric of P3 is updated and x3R, x3I are estimated. The intermediate values
V2,V1 are eliminated thereby reducing the interference. In the third level and the fourth level the
branch metric P2 and P1 is updated with lowest value and estimates the x2R, x2I and x1R, x1I
respectively. The overall cost for the current symbol vector is updated. If the current cost P is less
than the previous smallest cost P then the radius and best candidate vector are updated, otherwise
the process is terminated. This procedure is repeated cyclically to decode the symbols.
∧

87
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014

Figure 2. Tree representation of Proposed Sphere decoder

5. SIMULATION ANALYSIS
The simulation analysis for the proposed method is performed with the following parameters and
it is tested in MATLAB 7.10 software. This section discusses the simulation analysis of the
proposed scheme using the parameters mentioned in Table 1. The complexity analysis of the
proposed scheme is tested initially and further the performance analysis of the proposed scheme
in cooperative relaying scenario is analyzed.
Table 1. Simulation parameters

PARAMETERS

VALUES / TYPES

Number of bits

2x104

Number of Transmit antennas

2

Number of Receive antennas

2

Modulation schemes

4-QAM,QPSK

Code rate

1,1/2

Decoder Type

ML, RGR-GC sphere

Coding Types

Alamouti , Golden, silver, RGR-GC
88
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014

Number of Transmitter

1

Number of receiver

1

Number of relay

1

Power allocation

Ps=Pr=(1/2)P=0.5

Relay location

Dsr=Dsd=(1/2)Dsd=0.5

Path loss exponent

2,3

Doppler frequency

0.01

Channel Type

Rayleigh fading

0

10

GC(Sphere)
RGR-GC(Sphere)
RGR-GC(ML)

-1

BER

10

-2

10

-3

10

-4

10

0

5

10

15

Eb/No(dB)

Figure 3. Performance comparison of Proposed (RGR-GC) sphere decoder with the ML decoder

From figure 3, the performance graphs were plotted for golden codes with proposed low
complexity sphere decoder and proposed RGR-GC with conventional ML decoder. It is observed
that the proposed RGR-GC with ML decoder achieves better BER performance compared to the
other methods. In general ML decoder has better BER performance with less complexity for
higher order modulations. So, it is claimed that the proposed RGR-GC sphere decoder achieves
near ML performance with less computational complexity.

89
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014
3

10

ML Decoder
Sphere Decoder

N m e o o e tio s
u b r f p ra n

2

10

1

10

0

10

2

4

6

8

10
12
Eb/No(dB)

14

16

18

20

Figure 4. Complexity analysis for the proposed low complex sphere decoder and conventional ML decoder

The complexity analysis graphs were plotted for the proposed low complex sphere decoder and
conventional ML decoder. From figure. 4, it is inferred from the graph that , for a fixed Eb/No of
3 dB the number of operations performed by the proposed low complex sphere decoder and
conventional ML decoder is 10 (approx)and 100 (approx). The proposed scheme has less
computational complexity compared to the conventional scheme.
0

10

-1

10

-2

BR
E

10

-3

10

-4

10

-5

(RGR-GC) Non-Cooperative Txn
(RGR-GC) Cooperative Txn

10

-6

10

0

2

4

6

8
Eb / No (dB)

10

12

14

16

Figure. 5 BER performance analysis of the proposed RGR-GC inCooperative relaying scenario

From figure. 5, the BER performance analysis graph for the proposed RGR-GC in cooperative
relaying transmission and non-cooperative transmission were plotted. It is inferred that, for a
fixed BER of 10-3 the cooperative transmission method requires 13.5dB (approx) and noncooperative transmission scheme requires 14.5 dB (approx). The BER performance of the
proposed RGR_GC in cooperative transmission has better performance compared to the
RGR_GC in Non-cooperative transmission.

90
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014
0

10

(RGR-GC)Non cooperative Txn
(RGR-GC)Cooperative Txn

O ta epo a ility
u g r bb

-1

10

-2

10

-3

10

1

1.5

2
2.5
3
Spectral efficiency(bps/Hz)

3.5

4

Figure 6. Outage Probability Versus Spectral Efficiency of (RGR-GC) in Cooperative relaying scenario

From figure 6, the performance graphs for RGR_GC in cooperative relaying method were plotted
between outage probability and spectral efficiency. It is inferred that for a fixed spectral
efficiency of 2bps/Hz the proposed (RGR_GC) in cooperative transmission method has the
outage probability of 0.005 (approx) and in non-cooperative transmission method has the outage
probability of 0.01 (approx). Then, for fixed outage probability of 10-2 , the spectral efficiency for
cooperative transmission method and non-cooperative transmission is 2 bps/Hz and 1.5 bps/Hz
respectively. The proposed RGR_GC in cooperative transmission has minimum outage
probability and increased spectral efficiency compared to the RGR_GC in Non-cooperative
transmission method. According to the system capacity condition, as the spectral efficiency
increases the outage probability also gets increased.
0

10

-1

10

Outage probability

-2

10

-3

10

-4

10

-5

(RGR-GC) Non-Cooperative Txn
(RGR-GC) Cooperative Txn

10

-6

10

0

2

4

6

8
Eb / No (dB)

10

12

14

16

Figure 7. Outage Probability Versus Eb / No of (RGR-GC) in Cooperative relaying scenario

The BER performance analysis graph for the proposed RGR-GC in cooperative relaying
transmission and non-cooperative transmission were plotted. From figure 7, it is inferred that, for
a fixed Eb/No of 15dB the (RGR_GC) in cooperative transmission method has the outage
probability of 1x10-3 (approx) and in non-cooperative transmission method has the outage
91
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014

probability of 1.42x10-4 (approx). The proposed RGR_GC in cooperative transmission has
minimum outage probability compared to the RGR_GC in Non-cooperative transmission method.

6. CONCLUSION
In this paper, a modified golden code with the low complexity sphere decoder which uses tree
search algorithm implemented in the nodes of the cooperative relaying system is proposed. The
proposed decoder complexity is analyzed through simulation and it proves to exhibit less
complexity compared to the conventional ML decoder. The single relay cooperative
communication with DF protocol is considered. Simulation analysis is done and the simulation
results shows that the proposed scheme achieves better BER performance, minimum outage
probability and increased spectral efficiency, which is the need of the hour for the cooperative
relaying scenario of wireless communication.

REFERENCES
[1] Z. Li, X.-G. Xia, and M. H. Lee, “A simple orthogonal space-time coding scheme for synchronous
cooperative systems for frequency selective fading channels,” IEEE Trans. Commun., vol. 58,
no. 8, pp.2219-2224, Aug. 2010.
[2] Manav R. Bhatnagar , “Decode-and-Forward-Based Differential Modulation for Cooperative
Communication System With Unitary and Nonunitary Constellations” , IEEE Transactions On
Vehicular Technology, Vol. 61, No. 1, January 2012.
[3] Wang and Xia, “Asynchronous cooperative communication systems: A survey on signal
designs”, Science China Information Sciences, August 2011.
[4] Hongjiang Xiao, Qionghai Dai, Xiangyang Ji, and Wenwu Zhu, “A Novel JSCC Framework With
Diversity-Multiplexing-Coding Gain Tradeoff for Scalable Video Transmission Over Cooperative
MIMO, IEEE Transactions On Circuits And Systems For Video Technology, Vol. 20, No. 7, July
2010.
[5] Ehsan Yazdian,Mohammad Reza Pakravan, Adaptive Modulation Technique for Amplify and
Forward Cooperative Diversity and Fairness Analysis, IEEE International Conference on
Telecommunications, ICT June 2008.
[6] Michael Knox, Elza Erkip, Kshitij Kumar Singh, “Cooperative coding implementation at the physical
layer”, IEEE International Conference Acoustics Speech and Signal Processing (ICASSP), March
2010.
[7] Jinhong Yuan and Zhuo chen, “Distributed space time trellis codes for a cooperative system”, IEEE
Trans. on Wireless Communications, vol. 8, No. 11, October 2009.
[8] Manav R.Bhatnagar,and Are Hjorunges, “Amplify based double differential modulation for
Cooperative communications”, Proceedings in IEEE
International
conference
on
COMmunication Systems And NETworks, COMSNETS'09
[9] Soon Xin Ng, Kai Zhu and Lajos Hanzo, “Distributed source coding, channel coding and modulation
for cooperative communications”, VTC2010-FALL Ottawa, Sep 2010.
[10] Roderick Jaehoon and Huaping liu, “Transmission pattern selection for relay communication with
Distributed space time codes”, IEEE
International Conference on Communication Systems,
ICCS November 2008.
[11] Sheng Yang and Jean-Claude Belfiore, Optimal Space-Time codes for the MIMO amplify and
forward cooperative channel, IEEE Trans. Inform. Theory, vol. 53, no. 2, February 2007.
[12] R. Nikjah and N. C. Beaulieu, “Achievable rates and fairness in rateless coded decode- and-forward
half- duplex and full-duplex opportunistic relaying,” in Proc. IEEE ICC, May 2008.
[13] R. U. Nabar, H. Bolcskei, and F. W. Kneubuhler, “Fading relay channels:performance limits and
space- time signal design,“ IEEE J. Sel. Areas Commun., vol. 22, no. 6, pp. 1099-1109, Aug.2004.
[14] Andrej Stefanov and Elza Erkip, “Cooperative space-time coding for wireless networks”, IEEE Trans.
on Communications, vol. 53, No. 11, November 2005.
[15] J.C. Belfiore, G. Rekaya, and E. Viterbo, “The Golden Code: A 2×2 full rate Space-Time Code with
Non Vanishing Determinants,” IEEE Trans. on Inf. Theory, vol. 51, no 4, April 2005.
92
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014
[16] Ingrid Daubechies, C. Sinan Güntürk and Yang Wang, “The Golden Ratio Encoder”, IEEE
Transactions on Information Theory,Vol. 56, No. 10, October 2010.
[17] M . O. Sinnokrot and J. R. Barry, “Fast Maximum- Likelihood Decoding of the Golden
Code,” IEEE Trans.Wireless Commun., vol. 9, no. 1, pp. 26–31, Jan. 2010.
[18] G. R.B. Othman, L. Luzzi and J.-C. Belfiore, “Algebraic Reduction for the Golden Code,” in
Proc. IEEE ICC 2009, Dresden, Germany, Jun.2009, pp. 1–5.
[19] Mohanned O. Sinnokrot, “Space-Time Block Codes with Low Maximum-Likelihood decoding
Complexity”, Ph.D.Thesis, Georgia Institute of Technology, December 2009.
[20] G.S. Rajan and B.S.Rajan, “Multi-group ML Decodable Collocated and Distributed Space Time
Block Codes,” IEEE Trans. on Inf. Theory, vol.56, no.7, pp. 3221-3247, July 2010.
[21] K.Thilagam and K.Jayanthi, “Modified Golden Codes for Improved Error Rates through Low
Complex Sphere
Decoder” accepted by WiMoA 2013, will be
published
in Springer
Proceedings, May 2013.
Authors
K.Jayanthi received B.E degree from University of Madras in 1997 and M.Tech degree in
Electronics and Communication Engineering and Ph.D from Pondicherry University in
1999 and 2007 respectively. She has 13years of experience in teaching / research. She is
currently serving as Associate Professor in Department of Electronics and Communication
Engineering, Pondicherry Engineering College, Puducherry. To her credit, she has around
15 journal papers and presented 18 papers in International conferences. Her other areas of
interest includes satellite communication, Wireless multimedia networks, Spread spectrum communication,
Image processing, etc. She has authored a book on Qos Provisioning in Cellular Mobile Networks.

K.Thilagam received her B.Tech and M.Tech degrees in Electronics and Communication
Engineering from Pondicherry Engineering College in 2004 and 2007 respectively. She has
5 years of experience in teaching / research. She is currently pursuing Ph.D in the area of
Wireless Communication in Department of ECE from Pondicherry Engineering College,
Puducherry. Her research activities are focussed on Cooperative Communication in Cellular
Networks, mainly on Modulation and coding techniques.

93

Más contenido relacionado

La actualidad más candente

Cooperative Communication for Multi-Hop Routing in ZigBee Network
Cooperative Communication for Multi-Hop Routing in ZigBee NetworkCooperative Communication for Multi-Hop Routing in ZigBee Network
Cooperative Communication for Multi-Hop Routing in ZigBee NetworkIJERA Editor
 
Determining the Optimum Number of Paths for Realization of Multi-path Routing...
Determining the Optimum Number of Paths for Realization of Multi-path Routing...Determining the Optimum Number of Paths for Realization of Multi-path Routing...
Determining the Optimum Number of Paths for Realization of Multi-path Routing...TELKOMNIKA JOURNAL
 
Iaetsd game theory and auctions for cooperation in
Iaetsd game theory and auctions for cooperation inIaetsd game theory and auctions for cooperation in
Iaetsd game theory and auctions for cooperation inIaetsd Iaetsd
 
Towards Seamless TCP Congestion Avoidance in Multiprotocol Environments
Towards Seamless TCP Congestion Avoidance in Multiprotocol EnvironmentsTowards Seamless TCP Congestion Avoidance in Multiprotocol Environments
Towards Seamless TCP Congestion Avoidance in Multiprotocol EnvironmentsIDES Editor
 
Deep_Learning_Empowered_Semi-Blind_Joint_Detection_in_Cooperative_NOMA.pdf
Deep_Learning_Empowered_Semi-Blind_Joint_Detection_in_Cooperative_NOMA.pdfDeep_Learning_Empowered_Semi-Blind_Joint_Detection_in_Cooperative_NOMA.pdf
Deep_Learning_Empowered_Semi-Blind_Joint_Detection_in_Cooperative_NOMA.pdfShailendraSinghJadon1
 
Utilise Multipath Propagation to Improve the performance of BCH and RS Codes
Utilise Multipath Propagation to Improve the performance of BCH and RS CodesUtilise Multipath Propagation to Improve the performance of BCH and RS Codes
Utilise Multipath Propagation to Improve the performance of BCH and RS CodesALYAA AL-BARRAK
 
A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...
A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...
A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...IDES Editor
 
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...csandit
 
Capsulization of Existing Space Time Techniques
Capsulization of Existing Space Time TechniquesCapsulization of Existing Space Time Techniques
Capsulization of Existing Space Time TechniquesIJEEE
 
Packet Loss Rate Differentiation in slotted Optical Packet Switching OCDM/WDM
Packet Loss Rate Differentiation in slotted Optical Packet Switching OCDM/WDMPacket Loss Rate Differentiation in slotted Optical Packet Switching OCDM/WDM
Packet Loss Rate Differentiation in slotted Optical Packet Switching OCDM/WDMTELKOMNIKA JOURNAL
 
Study of the operational SNR while constructing polar codes
Study of the operational SNR while constructing polar codes Study of the operational SNR while constructing polar codes
Study of the operational SNR while constructing polar codes IJECEIAES
 
Achieving Optimum Value of k in a K-fold Multicast Network with Buffer using ...
Achieving Optimum Value of k in a K-fold Multicast Network with Buffer using ...Achieving Optimum Value of k in a K-fold Multicast Network with Buffer using ...
Achieving Optimum Value of k in a K-fold Multicast Network with Buffer using ...cscpconf
 
PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...
PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...
PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...ijistjournal
 

La actualidad más candente (19)

B0440711
B0440711B0440711
B0440711
 
Cooperative Communication for Multi-Hop Routing in ZigBee Network
Cooperative Communication for Multi-Hop Routing in ZigBee NetworkCooperative Communication for Multi-Hop Routing in ZigBee Network
Cooperative Communication for Multi-Hop Routing in ZigBee Network
 
Determining the Optimum Number of Paths for Realization of Multi-path Routing...
Determining the Optimum Number of Paths for Realization of Multi-path Routing...Determining the Optimum Number of Paths for Realization of Multi-path Routing...
Determining the Optimum Number of Paths for Realization of Multi-path Routing...
 
Iaetsd game theory and auctions for cooperation in
Iaetsd game theory and auctions for cooperation inIaetsd game theory and auctions for cooperation in
Iaetsd game theory and auctions for cooperation in
 
Towards Seamless TCP Congestion Avoidance in Multiprotocol Environments
Towards Seamless TCP Congestion Avoidance in Multiprotocol EnvironmentsTowards Seamless TCP Congestion Avoidance in Multiprotocol Environments
Towards Seamless TCP Congestion Avoidance in Multiprotocol Environments
 
5 G Numerology
5 G Numerology5 G Numerology
5 G Numerology
 
Bz25454457
Bz25454457Bz25454457
Bz25454457
 
Deep_Learning_Empowered_Semi-Blind_Joint_Detection_in_Cooperative_NOMA.pdf
Deep_Learning_Empowered_Semi-Blind_Joint_Detection_in_Cooperative_NOMA.pdfDeep_Learning_Empowered_Semi-Blind_Joint_Detection_in_Cooperative_NOMA.pdf
Deep_Learning_Empowered_Semi-Blind_Joint_Detection_in_Cooperative_NOMA.pdf
 
Utilise Multipath Propagation to Improve the performance of BCH and RS Codes
Utilise Multipath Propagation to Improve the performance of BCH and RS CodesUtilise Multipath Propagation to Improve the performance of BCH and RS Codes
Utilise Multipath Propagation to Improve the performance of BCH and RS Codes
 
A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...
A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...
A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...
 
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
 
Capsulization of Existing Space Time Techniques
Capsulization of Existing Space Time TechniquesCapsulization of Existing Space Time Techniques
Capsulization of Existing Space Time Techniques
 
2 prayla
2 prayla2 prayla
2 prayla
 
Packet Loss Rate Differentiation in slotted Optical Packet Switching OCDM/WDM
Packet Loss Rate Differentiation in slotted Optical Packet Switching OCDM/WDMPacket Loss Rate Differentiation in slotted Optical Packet Switching OCDM/WDM
Packet Loss Rate Differentiation in slotted Optical Packet Switching OCDM/WDM
 
Study of the operational SNR while constructing polar codes
Study of the operational SNR while constructing polar codes Study of the operational SNR while constructing polar codes
Study of the operational SNR while constructing polar codes
 
Dr35672675
Dr35672675Dr35672675
Dr35672675
 
MC-cdma
MC-cdmaMC-cdma
MC-cdma
 
Achieving Optimum Value of k in a K-fold Multicast Network with Buffer using ...
Achieving Optimum Value of k in a K-fold Multicast Network with Buffer using ...Achieving Optimum Value of k in a K-fold Multicast Network with Buffer using ...
Achieving Optimum Value of k in a K-fold Multicast Network with Buffer using ...
 
PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...
PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...
PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...
 

Destacado

A new method for controlling and maintaining
A new method for controlling and maintainingA new method for controlling and maintaining
A new method for controlling and maintainingIJCNCJournal
 
Internet service provider mobile
Internet service provider mobileInternet service provider mobile
Internet service provider mobileIJCNCJournal
 
A comparative analysis of number portability routing schemes
A comparative analysis of number portability routing schemesA comparative analysis of number portability routing schemes
A comparative analysis of number portability routing schemesIJCNCJournal
 
Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...IJCNCJournal
 
IMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATION
IMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATIONIMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATION
IMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATIONIJCNCJournal
 
Real time audio translation module between iax and rsw
Real time audio translation module between iax and rswReal time audio translation module between iax and rsw
Real time audio translation module between iax and rswIJCNCJournal
 
On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...IJCNCJournal
 
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESIJCNCJournal
 
On modeling controller switch interaction in openflow based sdns
On modeling controller switch interaction in openflow based sdnsOn modeling controller switch interaction in openflow based sdns
On modeling controller switch interaction in openflow based sdnsIJCNCJournal
 
A bandwidth allocation model provisioning framework with autonomic characteri...
A bandwidth allocation model provisioning framework with autonomic characteri...A bandwidth allocation model provisioning framework with autonomic characteri...
A bandwidth allocation model provisioning framework with autonomic characteri...IJCNCJournal
 
Design, implementation and evaluation of icmp based available network bandwid...
Design, implementation and evaluation of icmp based available network bandwid...Design, implementation and evaluation of icmp based available network bandwid...
Design, implementation and evaluation of icmp based available network bandwid...IJCNCJournal
 
Link aware nice application level multicast protocol
Link aware nice application level multicast protocolLink aware nice application level multicast protocol
Link aware nice application level multicast protocolIJCNCJournal
 
Pwm technique to overcome the effect of
Pwm technique to overcome the effect ofPwm technique to overcome the effect of
Pwm technique to overcome the effect ofIJCNCJournal
 
PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...
PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...
PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...IJCNCJournal
 
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftIJCNCJournal
 
Security analysis of generalized confidentialmodulation for quantum communica...
Security analysis of generalized confidentialmodulation for quantum communica...Security analysis of generalized confidentialmodulation for quantum communica...
Security analysis of generalized confidentialmodulation for quantum communica...IJCNCJournal
 
Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)IJCNCJournal
 
Cloud computing challenges and solutions
Cloud computing challenges and solutionsCloud computing challenges and solutions
Cloud computing challenges and solutionsIJCNCJournal
 
Correlation based feature selection (cfs) technique to predict student perfro...
Correlation based feature selection (cfs) technique to predict student perfro...Correlation based feature selection (cfs) technique to predict student perfro...
Correlation based feature selection (cfs) technique to predict student perfro...IJCNCJournal
 

Destacado (19)

A new method for controlling and maintaining
A new method for controlling and maintainingA new method for controlling and maintaining
A new method for controlling and maintaining
 
Internet service provider mobile
Internet service provider mobileInternet service provider mobile
Internet service provider mobile
 
A comparative analysis of number portability routing schemes
A comparative analysis of number portability routing schemesA comparative analysis of number portability routing schemes
A comparative analysis of number portability routing schemes
 
Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...
 
IMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATION
IMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATIONIMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATION
IMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATION
 
Real time audio translation module between iax and rsw
Real time audio translation module between iax and rswReal time audio translation module between iax and rsw
Real time audio translation module between iax and rsw
 
On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...
 
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
 
On modeling controller switch interaction in openflow based sdns
On modeling controller switch interaction in openflow based sdnsOn modeling controller switch interaction in openflow based sdns
On modeling controller switch interaction in openflow based sdns
 
A bandwidth allocation model provisioning framework with autonomic characteri...
A bandwidth allocation model provisioning framework with autonomic characteri...A bandwidth allocation model provisioning framework with autonomic characteri...
A bandwidth allocation model provisioning framework with autonomic characteri...
 
Design, implementation and evaluation of icmp based available network bandwid...
Design, implementation and evaluation of icmp based available network bandwid...Design, implementation and evaluation of icmp based available network bandwid...
Design, implementation and evaluation of icmp based available network bandwid...
 
Link aware nice application level multicast protocol
Link aware nice application level multicast protocolLink aware nice application level multicast protocol
Link aware nice application level multicast protocol
 
Pwm technique to overcome the effect of
Pwm technique to overcome the effect ofPwm technique to overcome the effect of
Pwm technique to overcome the effect of
 
PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...
PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...
PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...
 
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theft
 
Security analysis of generalized confidentialmodulation for quantum communica...
Security analysis of generalized confidentialmodulation for quantum communica...Security analysis of generalized confidentialmodulation for quantum communica...
Security analysis of generalized confidentialmodulation for quantum communica...
 
Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)
 
Cloud computing challenges and solutions
Cloud computing challenges and solutionsCloud computing challenges and solutions
Cloud computing challenges and solutions
 
Correlation based feature selection (cfs) technique to predict student perfro...
Correlation based feature selection (cfs) technique to predict student perfro...Correlation based feature selection (cfs) technique to predict student perfro...
Correlation based feature selection (cfs) technique to predict student perfro...
 

Similar a A low complex modified golden

MIMO System Performance Evaluation for High Data Rate Wireless Networks usin...
MIMO System Performance Evaluation for High Data Rate  Wireless Networks usin...MIMO System Performance Evaluation for High Data Rate  Wireless Networks usin...
MIMO System Performance Evaluation for High Data Rate Wireless Networks usin...IJMER
 
Hybrid ldpc and stbc algorithms to improve ber reduction in ofdm
Hybrid ldpc and stbc algorithms to improve ber reduction in ofdmHybrid ldpc and stbc algorithms to improve ber reduction in ofdm
Hybrid ldpc and stbc algorithms to improve ber reduction in ofdmIAEME Publication
 
Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377Editor IJARCET
 
Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377Editor IJARCET
 
BLOCK CODES,STBCs & STTCs.pptx
BLOCK CODES,STBCs & STTCs.pptxBLOCK CODES,STBCs & STTCs.pptx
BLOCK CODES,STBCs & STTCs.pptxFAIZAN SHAFI
 
11.design and implementation of distributed space frequency to achieve cooper...
11.design and implementation of distributed space frequency to achieve cooper...11.design and implementation of distributed space frequency to achieve cooper...
11.design and implementation of distributed space frequency to achieve cooper...Alexander Decker
 
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...ijcnes
 
Ijetae 0913 79
Ijetae 0913 79Ijetae 0913 79
Ijetae 0913 79Usman Ali
 
PERFORMANCE ANALYSIS OF BARKER CODE BASED ON THEIR CORRELATION PROPERTY IN MU...
PERFORMANCE ANALYSIS OF BARKER CODE BASED ON THEIR CORRELATION PROPERTY IN MU...PERFORMANCE ANALYSIS OF BARKER CODE BASED ON THEIR CORRELATION PROPERTY IN MU...
PERFORMANCE ANALYSIS OF BARKER CODE BASED ON THEIR CORRELATION PROPERTY IN MU...ijistjournal
 
PERFORMANCE ANALYSIS OF BARKER CODE BASED ON THEIR CORRELATION PROPERTY IN MU...
PERFORMANCE ANALYSIS OF BARKER CODE BASED ON THEIR CORRELATION PROPERTY IN MU...PERFORMANCE ANALYSIS OF BARKER CODE BASED ON THEIR CORRELATION PROPERTY IN MU...
PERFORMANCE ANALYSIS OF BARKER CODE BASED ON THEIR CORRELATION PROPERTY IN MU...ijistjournal
 
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...Cemal Ardil
 
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...IJCSEIT Journal
 
An efficient transcoding algorithm for G.723.1 and G.729A ...
An efficient transcoding algorithm for G.723.1 and G.729A ...An efficient transcoding algorithm for G.723.1 and G.729A ...
An efficient transcoding algorithm for G.723.1 and G.729A ...Videoguy
 
A New Bit Split and Interleaved Channel Coding for MIMO Decoder
A New Bit Split and Interleaved Channel Coding for MIMO DecoderA New Bit Split and Interleaved Channel Coding for MIMO Decoder
A New Bit Split and Interleaved Channel Coding for MIMO DecoderIJARBEST JOURNAL
 
Hardware Architecture of Complex K-best MIMO Decoder
Hardware Architecture of Complex K-best MIMO DecoderHardware Architecture of Complex K-best MIMO Decoder
Hardware Architecture of Complex K-best MIMO DecoderCSCJournals
 
A New Hybrid Diversity Combining Scheme for Mobile Radio Communication System...
A New Hybrid Diversity Combining Scheme for Mobile Radio Communication System...A New Hybrid Diversity Combining Scheme for Mobile Radio Communication System...
A New Hybrid Diversity Combining Scheme for Mobile Radio Communication System...AIRCC Publishing Corporation
 
A NEW HYBRID DIVERSITY COMBINING SCHEME FOR MOBILE RADIO COMMUNICATION SYSTEM...
A NEW HYBRID DIVERSITY COMBINING SCHEME FOR MOBILE RADIO COMMUNICATION SYSTEM...A NEW HYBRID DIVERSITY COMBINING SCHEME FOR MOBILE RADIO COMMUNICATION SYSTEM...
A NEW HYBRID DIVERSITY COMBINING SCHEME FOR MOBILE RADIO COMMUNICATION SYSTEM...ijcsit
 

Similar a A low complex modified golden (20)

MIMO System Performance Evaluation for High Data Rate Wireless Networks usin...
MIMO System Performance Evaluation for High Data Rate  Wireless Networks usin...MIMO System Performance Evaluation for High Data Rate  Wireless Networks usin...
MIMO System Performance Evaluation for High Data Rate Wireless Networks usin...
 
Hybrid ldpc and stbc algorithms to improve ber reduction in ofdm
Hybrid ldpc and stbc algorithms to improve ber reduction in ofdmHybrid ldpc and stbc algorithms to improve ber reduction in ofdm
Hybrid ldpc and stbc algorithms to improve ber reduction in ofdm
 
Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377
 
Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377
 
BLOCK CODES,STBCs & STTCs.pptx
BLOCK CODES,STBCs & STTCs.pptxBLOCK CODES,STBCs & STTCs.pptx
BLOCK CODES,STBCs & STTCs.pptx
 
11.design and implementation of distributed space frequency to achieve cooper...
11.design and implementation of distributed space frequency to achieve cooper...11.design and implementation of distributed space frequency to achieve cooper...
11.design and implementation of distributed space frequency to achieve cooper...
 
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...
 
Ijetae 0913 79
Ijetae 0913 79Ijetae 0913 79
Ijetae 0913 79
 
PERFORMANCE ANALYSIS OF BARKER CODE BASED ON THEIR CORRELATION PROPERTY IN MU...
PERFORMANCE ANALYSIS OF BARKER CODE BASED ON THEIR CORRELATION PROPERTY IN MU...PERFORMANCE ANALYSIS OF BARKER CODE BASED ON THEIR CORRELATION PROPERTY IN MU...
PERFORMANCE ANALYSIS OF BARKER CODE BASED ON THEIR CORRELATION PROPERTY IN MU...
 
PERFORMANCE ANALYSIS OF BARKER CODE BASED ON THEIR CORRELATION PROPERTY IN MU...
PERFORMANCE ANALYSIS OF BARKER CODE BASED ON THEIR CORRELATION PROPERTY IN MU...PERFORMANCE ANALYSIS OF BARKER CODE BASED ON THEIR CORRELATION PROPERTY IN MU...
PERFORMANCE ANALYSIS OF BARKER CODE BASED ON THEIR CORRELATION PROPERTY IN MU...
 
paper1
paper1paper1
paper1
 
E213152
E213152E213152
E213152
 
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...
 
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
 
Co35503507
Co35503507Co35503507
Co35503507
 
An efficient transcoding algorithm for G.723.1 and G.729A ...
An efficient transcoding algorithm for G.723.1 and G.729A ...An efficient transcoding algorithm for G.723.1 and G.729A ...
An efficient transcoding algorithm for G.723.1 and G.729A ...
 
A New Bit Split and Interleaved Channel Coding for MIMO Decoder
A New Bit Split and Interleaved Channel Coding for MIMO DecoderA New Bit Split and Interleaved Channel Coding for MIMO Decoder
A New Bit Split and Interleaved Channel Coding for MIMO Decoder
 
Hardware Architecture of Complex K-best MIMO Decoder
Hardware Architecture of Complex K-best MIMO DecoderHardware Architecture of Complex K-best MIMO Decoder
Hardware Architecture of Complex K-best MIMO Decoder
 
A New Hybrid Diversity Combining Scheme for Mobile Radio Communication System...
A New Hybrid Diversity Combining Scheme for Mobile Radio Communication System...A New Hybrid Diversity Combining Scheme for Mobile Radio Communication System...
A New Hybrid Diversity Combining Scheme for Mobile Radio Communication System...
 
A NEW HYBRID DIVERSITY COMBINING SCHEME FOR MOBILE RADIO COMMUNICATION SYSTEM...
A NEW HYBRID DIVERSITY COMBINING SCHEME FOR MOBILE RADIO COMMUNICATION SYSTEM...A NEW HYBRID DIVERSITY COMBINING SCHEME FOR MOBILE RADIO COMMUNICATION SYSTEM...
A NEW HYBRID DIVERSITY COMBINING SCHEME FOR MOBILE RADIO COMMUNICATION SYSTEM...
 

Más de IJCNCJournal

DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...IJCNCJournal
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...IJCNCJournal
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemIJCNCJournal
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSIJCNCJournal
 
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdfFebruary_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
 

Más de IJCNCJournal (20)

DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & Communications
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDS
 
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdfFebruary_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
 

Último

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Último (20)

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

A low complex modified golden

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014 A LOW COMPLEX MODIFIED GOLDEN CODE IN A COOPERATIVE RELAYING SYSTEM K.Thilagam1 and K.Jayanthi 2 1 2 Research Scholar, Department of ECE, Pondicherry Engg. College, Puducherry, India Associate Professor, Department of ECE, Pondicherry Engg. College, Puducherry,India ABSTRACT In recent years, cooperative communication is a hot topic of research and it is a powerful physical layer technique to combat fading in wireless relaying scenario. Concerning with the physical layer issues, in this paper it is focussed on with providing a better space time block coding (STBC) scheme and incorporating it in the cooperative relaying nodes to upgrade the system performance. Recently, the golden codes have proven to exhibit a superior performance in a wireless MIMO (Multiple Input Multiple Output) scenario than any other code. However, a serious limitation associated with it is its increased decoding complexity. This paper attempts to resolve this challenge through suitable modification of golden code such that a less complex sphere decoder could be used without much compromising the error rates. The decoder complexity is analyzed through simulation and it proves to exhibit less complexity compared to the conventional (Maximum likelihood) ML decoder. The single relay cooperative STBC consisting of source, relay and destination are considered. The cooperative protocol strategy considered in the relay node is Decode and forward (DF) protocol. The proposed modified golden code with less complex sphere decoder is implemented in the nodes of the cooperative relaying system to achieve better performance in the system. The simulation results have validated the effectiveness of the proposed scheme by offering better BER performance, minimum outage probability and increased spectral efficiency compared to the non cooperative transmission method. KEYWORDS Cooperative communication, cooperative STBC, Bit error rate (BER), outage probability, spectral efficiency, Golden code, low complex sphere decoder. 1. INTRODUCTION In wireless communication, there is an ever growing demand for higher data rate, highly reliable transmission schemes and increased spectral efficiency for high speed wireless connectivity. The multiple input multiple output (MIMO) technique is a promising scheme for reliable communication at higher data rate by offering spatial diversity and increase in capacity without the additional power consumption or bandwidth expansion. Cooperative communication is an interesting research topic in wireless communication because it achieves distributed spatial diversity, wider coverage, low transmit power and reduced interference. Recently, a new technique which exploits the advantages of aforementioned schemes through MIMO techniques and cooperation (i.e., combining space time block coding and cooperative relaying) attracts a widespread attention in the literature. The alamouti coded form constructed at the destination node and each relay node performs either time-reversal or conjugation operation (i.e.) the modified operations at the relay nodes which overcomes the influence of the frequency selective fading channels has been discussed in [1]. A ML decoder for the DF-based differential DOI : 10.5121/ijcnc.2014.6106 79
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014 cooperative system utilizing complex-valued unitary and non-unitary constellations and uncoded transmissions. Also, deriving a (piecewise linear) PL decoder for complex-valued unitary, nonunitary constellations and closed-form expression of the approximate uncoded symbol error rate (SER) has been discussed in [2]. In [3] discussed about the signal designs such as space time codings / modulations to achieve full cooperative diversity and an overview of the efforts on combating the time and frequency asynchronism of the cooperative communication network. The joint source channel coding (JSCC) scheme for scalable video transmission over cooperative MIMO which was capable of dynamically adapting to the varying MIMO channel has been discussed in [4]. In [5] the authors discussed, about the application of adaptive modulation concept to the performance of cooperative techniques and to improve the spectral efficiency of the amplify and forward system. The measured bit error rate performance of a three node cooperative communication system operating with a maximum ratio combining technique and two cooperative coded schemes using hard and soft decision decoding has been discussed in [6]. The Distributed space time trellis codes (DSTTC) design criteria formulation with perfect and imperfect decoding at the relay and the derivation of the upper bounds of pair wise error probability (PEP) for different channel condition has been discussed in [7]. In [8], the authors has discussed the Double-differential (DD) modulation for amplify and forward (AAF) cooperative communications system that works well with carrier offsets and further the numerical power allocation improves the performance of the system. The Distributed source coding, channel coding and modulation(DSCM) designed for ensuring the decoding convergence of its constituent component codes , the variable length code(VLC) and two coded modulation (CM) schemes for cooperative communications has been discussed in [9]. An efficient space time coded cooperative relay communications scheme that employs linear precoding and a distributed relay selection algorithm to maximize the signal to noise ratio at the receiver has been discussed in [10].In [11], the space time block codes for a half-duplex multiple input multiple output (MIMO) and non-orthogonal amplify and forward (NAF) cooperative diversity scheme with multiple relays has been discussed. The achievable rates and fairness for several protocols using rateless codes has been discussed in [12]. In [13], the authors discussed about the relay using AF method and the source constructed with a distributed alamouti space time code and each terminal transmitted with the row of alamouti code. The design of space time codes that are capable of achieving the full diversity and by illustrating how cooperation among nodes with different numbers of antennas can be accomplished and how the quality of interuser link can be affected has been discussed in [14]. For a 2x2 MIMO system, golden code was discussed as a full rate and full diversity code with Non-vanishing minimum determinant (NVD) in [15].In [16], the implementation of the golden ratio encoder such that the exponential accuracy is robust against the threshold effects using Directed acyclic graphs (DAG) model has been discussed. A new ML decoding algorithm for the golden code which retains its fast decodable property on time varying channels and its comparison with the overlaid alamouti code has been discussed in [17]. In [18] the authors discussed, a method to develop the suboptimal decoders for the golden code with reduced complexity and near –ML performance, as the ML- decoding of the golden code have higher complexity. In [19], the design of low complex Maximum likelihood (ML) decoder for Space Time Block Codes (STBC) and embedded orthogonal STBC with symmetric and asymmetric coding conditions has been discussed. Multigroup maximum-likelihood (ML) decoding for collocated and distributed space-time block codes (DSTBCs) and the orthogonal frequencydivision multiplexing (OFDM)-based Alamouti space-time coded scheme application in synchronous wireless relay networks has been discussed in [20]. A suitable modification of golden code with less complex sphere decoder was proposed to achieve the better BER performance compared to the conventional space time block codes has been analysed and discussed in [21].In this paper, the proposed modified golden codes with less complex sphere decoder in [21] is implemented in the nodes of cooperative relaying system and its performance is 80
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014 analyzed. The simulation results shows that the proposed scheme under cooperative relaying scenario offers better BER performance, minimum outage probability and maximum spectral efficiency compared to the non-cooperative transmission scheme. The remaining part of the paper is organized as follows: In section 2, the system model of the proposed cooperative relaying scheme is elaborated. In section 3, the proposed modified golden code is discussed analytically. Section 4, elaborates the decoder design for the proposed setup. Simulation results are discussed in Section 5. Section 6, deals with the conclusion of the paper. 2. SYSTEM MODEL OF THE PROPOSED COOPERATIVE RELAYING SCHEME Consider a cooperative communication network consisting three nodes, the source(S) node, relay(R) node and destination(D) node each has two antennas. Let ‘hs,r’ be the fading channel matrix between the S and R, ‘hs,d’ be the fading channel matrix between S and D, and ‘hr,d’ be the fading channel matrix between R and D. Since the assumption is two antennas, all the fading channel matrices are 2 x 2 matrices whose entries are independent complex Gaussian random variables with zero mean and unit variance. The terms h i, j s ,r , h i, j r ,d and h i, j s ,d for i, j = 1, 2 are the fading coefficients from the ith transmit antenna to the jth receive antenna for the corresponding channels. Further, the assumptions made are cellular mobile environment, the rayleigh fading for all channels and perfect channel state information is known at the receiver. It is also assumed to have half duplex communication that is, all nodes can either transmit or receive and two phase cooperative communications. Cooperative protocol strategies are classified by the operation at R and here it is assumed to be DF protocol, where R decodes the received signal, reencodes, and transmits to D. Figure 1. Cooperative Communication for single relay with the Implementation of Proposed low complex modified golden codes in the nodes Referring to the Figure.1, the system model of the proposed scheme has the source node, relay node and the destination node each having two antennas. The cooperation strategy is modeled with two orthogonal phases to avoid the interferences. In phase 1, source sends information to the destination and the information is received by the relay at the same time. In phase 2, the relay helps the source by forwarding or retransmitting the information to the destination. In phase 1, the source broadcasts its information to both the destination and the relay. The received signals at the destination and the relay are obtained as, 81
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014 y s ,d y s ,r = P h s ,d x+ n s ,d (1) = P h s ,r x+ n s ,r (2) In phase 2, the relay forwards a processed version of the source’s signal to the destination and this is obtained as, y r ,d = h r ,d q ( y ) + n r ,d (3) s ,r the function q (.) depends on which processing is implemented at the relay node. Where, ‘P’ is the total transmit power at the source, ‘x’ is the transmitted information symbol, ‘ns,d’, ‘ns,r’ and ‘nr,d’ are the additive noises, ‘hs,d’, ‘hs,r’ and ‘hr,d’ are the channel coefficient from source to destination, source to relay and relay to destination respectively. They are modelled as zero-mean, complex Gaussian random variables with variances σ 2 s ,d , σ 2 s ,r σ and 2 r ,d respectively. With the variance ‘No’ the noise terms ‘ns,d’, ‘ns,r’ and ‘nr,d’ are modeled as zeromean, complex Gaussian random variables.The mutual information in terms of channel fades for decode and forward transmission is given by, I DF = { ( 1 m in lo g 1 + Γ 2 h 2 s ,r ) ( , lo g 1 + Γ h 2 s ,d +Γ h 2 r ,d )} (4) Considering rayleigh fading channel, the outage probability can be written as, Pr  I  DF  2  < R  = Pr  h s , r <    2  2 − 1    + Pr  h s , r > Γ     2R 2 2 − 1     Pr  h s , d + Γ     2R h 2 r ,d < 2 − 1   Γ   2R (5) Averaging over the channel conditions, the outage probability for decode and forward is given by, Pr I  DF < R  1 σ 2 s ,r 2 2R Γ −1 (6) 2.1. Internal Structure of the Nodes This section elaborates the internal structures of the source node, relay node and destination node which are shown in Figure (a), Figure (b) and Figure (c). Referring to the figure (a), the source node consists of two blocks namely QAM modulator block and RGR_GC encoder block. The operation at the source node is, the input bit streams are given as input to the QAM modulator and in the modulator bits are mapped according to the constellation and further encoded with RGR_GC encoder. Then, the encoded signal is launched over the two transmitting antennas. 82
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014 Figure (a). Source node Figure (b). Relay node Referring to the figure (b), the relay node consists of two blocks (i.e) the decoder block and forward block. The decoder block in turn has two blocks namely RGR_GC decoder and QAM demodulator. The forward block in turn has two blocks namely QAM modulator and RGR_GC encoder. The process involved is, the relay receives the overheard signals and it is given to the decoder block. In decoder block, the signal is decoded and demodulated. Then the decoder output is given as input to the forward block. The forward block re-encodes the input signal according to QAM constellation and generates the Decode and Forward (DF) signals. Further, the DF signal is launched over the two transmitting antennas. Figure (c). Destination node Referring to the figure (c), the destination node consists of two blocks namely signal combining with RGR_GC decoding block and QAM demodulation block. The process involved is, the signals are received and combined using maximum ratio combiner and decoded using RGR_GC decoder. The decoder output is given as input to the QAM demodulator and finally the output bit streams are obtained. The next section deals with the proposed reduced golden ratio-golden code (RGR-GC) and its properties in detail. 83
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014 3. PROPOSED REDUCED GOLDEN RATIO –GOLDEN CODE (RGR-GC) In this section, the proposed code and its properties satisfying golden codes are explained further. The RGR-GC is a scaled version of golden code which is used to normalize the energy and in turn, yields the performance improvement in the system. A reduced golden ratio-golden code (RGR-GC) is obtained by choosing a minimum polynomial equation in such a way that, it obtains the reduced golden ratio without losing golden codes key properties. The minimum polynomial equation considered to obtain the reduced golden ratio is X2-0.5x-0.5=0. θ = 1+ 2 2 , Where, ‘θ’ is the reduced golden ratio Having defined the polynomial and RGR, the next attempt is to focus onto shaping up the process to yield lossless property. A codeword from this algebra, before shaping is of the form,  a + bθ   i ( c + d σ (θ    a + bσ (θ )   c + dθ )) (7) where, the information symbols a,b,c,d €Z[i]. The proposed code with Cyclic division Algebra (CDA) and its properties fulfilment are explained further. Property 1: Cubic Shaping. This section adds cubic shaping to the codebook which provides the information lossless property. For Z[i]-lattice, the codeword is generated by the matrix, 1  1     σ (θ )  (8) θ There will be some shaping loss as the matrix is not unitary. These problems can be fixed without losing the other algebraic properties. This issue can be addressed by lattice A with a ‘M’generator matrix is given by, αθ α 0  1 θ  α    =  M =  0 σ (α )   1 σ (θ )   σ (α ) σ (α ) σ (θ )       To make ‘M’ as unitary matrix, the selection is made in such a way that The lattice Λ in the determinant form can be written as, det( Λ ) = =2 N L/K N (9) α ∈ΟL 2 L/K (α ) (α ) d Q ( 2 ) 2 (10) To have the lattice Z[i]2, important condition is that the det( Λ ) should be a square integer. To find such an element, the factorization of 2 in OL is given by, 2 = (1 + i − iθ ) 2 (1 − i + iθ ) 2 (11) 84
  • 7. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014 Choosing ( α = 1 + i − iθ ).It can be checked whether the obtained is right lattice using the generator matrix M, where M † = 2 I 2 is obtained by direct computation. The unitary matrix is 1 M which yields the shaping property in the first layer and cubic shaping on the other layer. 2 Adding the shaping property, the codeword ‘X’ belonging to the RGR-GC has the form, X = α a + bθ ) α ( c + dθ )  1  (  2  iσ (α ) ( c + d σ (θ ) ) σ (α ) ( a + bσ (θ ) )    (12) Where a, b, c, d are QAM symbols and it takes any value in Z[i]. In an infinite code C∞, a, b, c, d can take any value in Z[i] that is the finite signal constellations are carved from infinite lattices. Property 2: Minimum Determinant. The computation of the minimum determinant of an infinite code is discussed next. Therefore, X = α 0   0 σ (α  1 2 Where,   ( a + bθ )  )   i ( c + d σ (θ  α σ (α det( X ) =  ) ) ( a + bσ (θ ) )   (13) )=1+ i 1+ i  ( a + bθ 2  = (c + dθ )  ) ( a + bσ (θ ) ) − i ( c + d θ ) ( c + d σ (θ ) )  1  2 a + a b − b 2 − i (c 2 + c d − d 1+ i  ( 2 )) (14)   2 a 2 + ab − b 2 − i ( c 2 + cd − d 2 ) is 1.As it is required by the NVD property, the minimum where, determinant of infinite code is bounded away from zero. To be noted is factor ’i‘ensures that the 2 average transmitted energy is uniform from both antennas in both channel uses and i =1, Thus, δ m in (C ∞ ) = m in X ≠0 det (X ) 2 = 1 2 (15) The next section explains a new low complexity decoder for the proposed code which is the major task of the golden codes. 4. PROPOSED LOW COMPLEXITY SPHERE DECODER In this section, a new low complexity decoder for the Reduced Golden Ratio- golden codes (RGR-GC) is described. To reduce the decoding complexity, many methods have been analyzed. In [19], the low complexity decoding for the space time block codes and the key properties for reducing the decoding complexity was discussed in broad sense. One of the properties considered in the proposed method is, the real and imaginary parts of the symbol are decoded separately. Moreover, the channel matrix H=QR, was decomposed using QR decomposition method, where, ‘Q’ is a unitary matrix and ‘R’ is an upper triangular matrix. The ‘R’ matrix with zero entries and the real elements in it potentially reduce the decoding complexity. In the proposed method, the real and imaginary parts of the symbol are decoded separately using sphere decoder with tree search algorithm, in a single symbol manner for Reduced Golden ratio Golden codes (RGR_GC). The steps involved in the receiver side and algorithm used is explained further. At the receiver, 85
  • 8. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014 the received vector of samples y =  y 1 [1 ] , y 2  [2 ] , [3 ] , y3 y4 T [ 4 ] with two antennas at two time  instances can be obtained as, y=Hx+n (16) where, ‘x’ is an transmitted symbol vector, ‘n ‘ is the noise vector and ’H’ is the effective channel matrix represented as, X = [ x 1, x 2 , x 3, x 4 ]T , n = [ n1 [1], .....n 2 [2] ]T and 0 φ h 2 1 [1] 0  h 1 1 [1 ]    h21[ 2 ] 0 φ h1 1 [ 2 ]  0 H =  h 1 2 [1 ] 0  φ h 2 2 [1] 0   0 φ h22 [ 2 ] 0 φ h1 2 [ 2 ]   α − β  0  0 β α 0  0   β   α  0 0 α 0 0 − β (17) π respectively. where, φ = e j 4 , α = c o s (θ ) , β = s i n (θ ) In the above equation, H=QR is an orthogonal-triangular decomposition of the effective channel matrix where, Q is unitary and R is upper triangular. The Gram-Schmidt orthonormalization is followed for the decomposition. Where this procedure is applied to the columns of H, then the entry of R in row i and column j will be the inner product between the i th column of Q and j th column of H. Therefore, ri,j=qi*hj. In direct computation of R, the elements r1,2 and r3,4 are real, through the diagonal elements and the other elements are complex by nature. From the effective channel matrix, the diagonal elements {r1,1.....r4,4 } and nondiagonal elements r1,2 and r3,4 by direct computation is obtained as, r1 1 = r3 3 = α 2γ α 2 + β 2γ 1 (γ 3 + γ4) γ 12   1 r44 =   r3 3 γ 1γ 2   , 2 + β r1 2 = 2 (γ γ 5 1 2 r1 1 + γ6) 2 , 2 (γ 1 − γ 2 r2 2 = ) , (γ 1 r3 4 = r3 3 2 1 r1 1 + γ 3 γ γ 1γ 2 4 ) 2 − (γ + γ 5 γ 1 6 ) 2 2 2 ( γ 3 + γ 4 )( γ 5 + γ 6 ) (α 2 γ 2 2 ( γ 3 + γ 4 ) + β 2 γ 1 2 ( γ 5 + γ 6 ) ) and so on.Decomposing the ‘R’ and ‘X’ matrix, it is got as,  r1 1 r1 2  0 r2 2 R =  0 0  0 0  x1R  R  x2 X =  R  x3 R  x4  r1 3 r1 4   r2 3 r2 4  , r3 3 r3 4   0 r4 4  + jx1I   I + jx 2  + jx 3I   I + jx 4   The ‘R’ matrix entries r11, r12, r22, r33, r34, r44 are real and in terms of z=Q*y, the decoder chooses x to minimize, P(x) = = y − Hx z − Rx 2 (18) 2 where, P(x) is the total cost metric. = z − R1 x1 − R 2 x 2 − R 3 x 3 − R 4 x 4 2 The decoder proceeds as follows and the total cost of (18) can be written as, P ( x ) = v − R1 x1 2 (19) 86
  • 9. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014 = v R − R 1 x1R 2 + v I − R 1 x1I 2 v = z − R 2 x 2 − R3 x3 − R 4 x4 The importance of going from equations (18) to (19) is the fact that R1 is real. Therefore, for every candidate ( x1 , x 2 , x 3 , x 4 ) the fact that R1 is real and allows the receiver to decide on real from the imaginary symbol (x ) separately by symbol ( x1R ) I 1 minimizing v1R − r1,1 x R 2 1 The decoded symbol vector ‘x’ will be the minimum of the . overall cost metric P(x). The minimum of overall cost metric P(x) is obtained using the tree search algorithm. A sphere decoder with four level tree, for the reduced golden ratio-golden codes (RGR-GC) associated with different xi (i=1,..4) at each level has been discussed. It is proposed with a four level tree that associates dR=x4R and dI= x4I in the first level, cR = x3R and cI =x3I in the second level, bR = x2R and bI = x2I in the third level and aR = x1R and aI = x1I in the fourth level. Rewriting the cost metric function as, P ( X ) = V + I − A a Z I 3 I 2 − D c + v1I − r1,1 x I 2 1 + I I V 2 + − A b Z I 4 I 2 + − D d V I 2 R + − A a Z R 3 R 2 + − D c R V R 2 + − A b Z R 4 R 2 − D d R 2 (20) The number of combinations of each symbol (x1) (x2) (x3) (x4) is denoted by q . The decoding complexity of q , comes from the fact that the symbols (x1R) and (x1I) are separately decodable. Therefore, it has the decoding complexity of O ( q 1.5). The next section deals with the tree search algorithm. 4.1. Tree Search Algorithm The figure 2, represents the tree diagram of the proposed sphere decoder. As discussed before, the initial level of tree corresponds to bottom or the starting point of the tree called root node. Each node acts as parent node and the emerging node from the parent node is child node. The final stage of the tree structure is called leaf node. The total cost of a leaf node x decomposes into the sum of four branch metrics denoted by ∑ Pi . Where, Pi represents the branch metric for a branch at the (4-i) th stage of the tree. A sphere decoding algorithm for four level tree structures is briefed. The first few steps involves the initialization (i.e) QR decomposition of effective channel matrix, computation of ‘z’ and the sphere radius P to infinity. It requires only two sorting operations and incorporates two common optimizations: updating the radius and pruning. The elements k, l, m,n €П are the permuted channel matrix elements. In the first level of the decoder, the branch metric of the P4 is updated and in turn decides the x4R and x4I. In the second level of the decoder, the branch metric of P3 is updated and x3R, x3I are estimated. The intermediate values V2,V1 are eliminated thereby reducing the interference. In the third level and the fourth level the branch metric P2 and P1 is updated with lowest value and estimates the x2R, x2I and x1R, x1I respectively. The overall cost for the current symbol vector is updated. If the current cost P is less than the previous smallest cost P then the radius and best candidate vector are updated, otherwise the process is terminated. This procedure is repeated cyclically to decode the symbols. ∧ 87
  • 10. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014 Figure 2. Tree representation of Proposed Sphere decoder 5. SIMULATION ANALYSIS The simulation analysis for the proposed method is performed with the following parameters and it is tested in MATLAB 7.10 software. This section discusses the simulation analysis of the proposed scheme using the parameters mentioned in Table 1. The complexity analysis of the proposed scheme is tested initially and further the performance analysis of the proposed scheme in cooperative relaying scenario is analyzed. Table 1. Simulation parameters PARAMETERS VALUES / TYPES Number of bits 2x104 Number of Transmit antennas 2 Number of Receive antennas 2 Modulation schemes 4-QAM,QPSK Code rate 1,1/2 Decoder Type ML, RGR-GC sphere Coding Types Alamouti , Golden, silver, RGR-GC 88
  • 11. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014 Number of Transmitter 1 Number of receiver 1 Number of relay 1 Power allocation Ps=Pr=(1/2)P=0.5 Relay location Dsr=Dsd=(1/2)Dsd=0.5 Path loss exponent 2,3 Doppler frequency 0.01 Channel Type Rayleigh fading 0 10 GC(Sphere) RGR-GC(Sphere) RGR-GC(ML) -1 BER 10 -2 10 -3 10 -4 10 0 5 10 15 Eb/No(dB) Figure 3. Performance comparison of Proposed (RGR-GC) sphere decoder with the ML decoder From figure 3, the performance graphs were plotted for golden codes with proposed low complexity sphere decoder and proposed RGR-GC with conventional ML decoder. It is observed that the proposed RGR-GC with ML decoder achieves better BER performance compared to the other methods. In general ML decoder has better BER performance with less complexity for higher order modulations. So, it is claimed that the proposed RGR-GC sphere decoder achieves near ML performance with less computational complexity. 89
  • 12. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014 3 10 ML Decoder Sphere Decoder N m e o o e tio s u b r f p ra n 2 10 1 10 0 10 2 4 6 8 10 12 Eb/No(dB) 14 16 18 20 Figure 4. Complexity analysis for the proposed low complex sphere decoder and conventional ML decoder The complexity analysis graphs were plotted for the proposed low complex sphere decoder and conventional ML decoder. From figure. 4, it is inferred from the graph that , for a fixed Eb/No of 3 dB the number of operations performed by the proposed low complex sphere decoder and conventional ML decoder is 10 (approx)and 100 (approx). The proposed scheme has less computational complexity compared to the conventional scheme. 0 10 -1 10 -2 BR E 10 -3 10 -4 10 -5 (RGR-GC) Non-Cooperative Txn (RGR-GC) Cooperative Txn 10 -6 10 0 2 4 6 8 Eb / No (dB) 10 12 14 16 Figure. 5 BER performance analysis of the proposed RGR-GC inCooperative relaying scenario From figure. 5, the BER performance analysis graph for the proposed RGR-GC in cooperative relaying transmission and non-cooperative transmission were plotted. It is inferred that, for a fixed BER of 10-3 the cooperative transmission method requires 13.5dB (approx) and noncooperative transmission scheme requires 14.5 dB (approx). The BER performance of the proposed RGR_GC in cooperative transmission has better performance compared to the RGR_GC in Non-cooperative transmission. 90
  • 13. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014 0 10 (RGR-GC)Non cooperative Txn (RGR-GC)Cooperative Txn O ta epo a ility u g r bb -1 10 -2 10 -3 10 1 1.5 2 2.5 3 Spectral efficiency(bps/Hz) 3.5 4 Figure 6. Outage Probability Versus Spectral Efficiency of (RGR-GC) in Cooperative relaying scenario From figure 6, the performance graphs for RGR_GC in cooperative relaying method were plotted between outage probability and spectral efficiency. It is inferred that for a fixed spectral efficiency of 2bps/Hz the proposed (RGR_GC) in cooperative transmission method has the outage probability of 0.005 (approx) and in non-cooperative transmission method has the outage probability of 0.01 (approx). Then, for fixed outage probability of 10-2 , the spectral efficiency for cooperative transmission method and non-cooperative transmission is 2 bps/Hz and 1.5 bps/Hz respectively. The proposed RGR_GC in cooperative transmission has minimum outage probability and increased spectral efficiency compared to the RGR_GC in Non-cooperative transmission method. According to the system capacity condition, as the spectral efficiency increases the outage probability also gets increased. 0 10 -1 10 Outage probability -2 10 -3 10 -4 10 -5 (RGR-GC) Non-Cooperative Txn (RGR-GC) Cooperative Txn 10 -6 10 0 2 4 6 8 Eb / No (dB) 10 12 14 16 Figure 7. Outage Probability Versus Eb / No of (RGR-GC) in Cooperative relaying scenario The BER performance analysis graph for the proposed RGR-GC in cooperative relaying transmission and non-cooperative transmission were plotted. From figure 7, it is inferred that, for a fixed Eb/No of 15dB the (RGR_GC) in cooperative transmission method has the outage probability of 1x10-3 (approx) and in non-cooperative transmission method has the outage 91
  • 14. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014 probability of 1.42x10-4 (approx). The proposed RGR_GC in cooperative transmission has minimum outage probability compared to the RGR_GC in Non-cooperative transmission method. 6. CONCLUSION In this paper, a modified golden code with the low complexity sphere decoder which uses tree search algorithm implemented in the nodes of the cooperative relaying system is proposed. The proposed decoder complexity is analyzed through simulation and it proves to exhibit less complexity compared to the conventional ML decoder. The single relay cooperative communication with DF protocol is considered. Simulation analysis is done and the simulation results shows that the proposed scheme achieves better BER performance, minimum outage probability and increased spectral efficiency, which is the need of the hour for the cooperative relaying scenario of wireless communication. REFERENCES [1] Z. Li, X.-G. Xia, and M. H. Lee, “A simple orthogonal space-time coding scheme for synchronous cooperative systems for frequency selective fading channels,” IEEE Trans. Commun., vol. 58, no. 8, pp.2219-2224, Aug. 2010. [2] Manav R. Bhatnagar , “Decode-and-Forward-Based Differential Modulation for Cooperative Communication System With Unitary and Nonunitary Constellations” , IEEE Transactions On Vehicular Technology, Vol. 61, No. 1, January 2012. [3] Wang and Xia, “Asynchronous cooperative communication systems: A survey on signal designs”, Science China Information Sciences, August 2011. [4] Hongjiang Xiao, Qionghai Dai, Xiangyang Ji, and Wenwu Zhu, “A Novel JSCC Framework With Diversity-Multiplexing-Coding Gain Tradeoff for Scalable Video Transmission Over Cooperative MIMO, IEEE Transactions On Circuits And Systems For Video Technology, Vol. 20, No. 7, July 2010. [5] Ehsan Yazdian,Mohammad Reza Pakravan, Adaptive Modulation Technique for Amplify and Forward Cooperative Diversity and Fairness Analysis, IEEE International Conference on Telecommunications, ICT June 2008. [6] Michael Knox, Elza Erkip, Kshitij Kumar Singh, “Cooperative coding implementation at the physical layer”, IEEE International Conference Acoustics Speech and Signal Processing (ICASSP), March 2010. [7] Jinhong Yuan and Zhuo chen, “Distributed space time trellis codes for a cooperative system”, IEEE Trans. on Wireless Communications, vol. 8, No. 11, October 2009. [8] Manav R.Bhatnagar,and Are Hjorunges, “Amplify based double differential modulation for Cooperative communications”, Proceedings in IEEE International conference on COMmunication Systems And NETworks, COMSNETS'09 [9] Soon Xin Ng, Kai Zhu and Lajos Hanzo, “Distributed source coding, channel coding and modulation for cooperative communications”, VTC2010-FALL Ottawa, Sep 2010. [10] Roderick Jaehoon and Huaping liu, “Transmission pattern selection for relay communication with Distributed space time codes”, IEEE International Conference on Communication Systems, ICCS November 2008. [11] Sheng Yang and Jean-Claude Belfiore, Optimal Space-Time codes for the MIMO amplify and forward cooperative channel, IEEE Trans. Inform. Theory, vol. 53, no. 2, February 2007. [12] R. Nikjah and N. C. Beaulieu, “Achievable rates and fairness in rateless coded decode- and-forward half- duplex and full-duplex opportunistic relaying,” in Proc. IEEE ICC, May 2008. [13] R. U. Nabar, H. Bolcskei, and F. W. Kneubuhler, “Fading relay channels:performance limits and space- time signal design,“ IEEE J. Sel. Areas Commun., vol. 22, no. 6, pp. 1099-1109, Aug.2004. [14] Andrej Stefanov and Elza Erkip, “Cooperative space-time coding for wireless networks”, IEEE Trans. on Communications, vol. 53, No. 11, November 2005. [15] J.C. Belfiore, G. Rekaya, and E. Viterbo, “The Golden Code: A 2×2 full rate Space-Time Code with Non Vanishing Determinants,” IEEE Trans. on Inf. Theory, vol. 51, no 4, April 2005. 92
  • 15. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014 [16] Ingrid Daubechies, C. Sinan Güntürk and Yang Wang, “The Golden Ratio Encoder”, IEEE Transactions on Information Theory,Vol. 56, No. 10, October 2010. [17] M . O. Sinnokrot and J. R. Barry, “Fast Maximum- Likelihood Decoding of the Golden Code,” IEEE Trans.Wireless Commun., vol. 9, no. 1, pp. 26–31, Jan. 2010. [18] G. R.B. Othman, L. Luzzi and J.-C. Belfiore, “Algebraic Reduction for the Golden Code,” in Proc. IEEE ICC 2009, Dresden, Germany, Jun.2009, pp. 1–5. [19] Mohanned O. Sinnokrot, “Space-Time Block Codes with Low Maximum-Likelihood decoding Complexity”, Ph.D.Thesis, Georgia Institute of Technology, December 2009. [20] G.S. Rajan and B.S.Rajan, “Multi-group ML Decodable Collocated and Distributed Space Time Block Codes,” IEEE Trans. on Inf. Theory, vol.56, no.7, pp. 3221-3247, July 2010. [21] K.Thilagam and K.Jayanthi, “Modified Golden Codes for Improved Error Rates through Low Complex Sphere Decoder” accepted by WiMoA 2013, will be published in Springer Proceedings, May 2013. Authors K.Jayanthi received B.E degree from University of Madras in 1997 and M.Tech degree in Electronics and Communication Engineering and Ph.D from Pondicherry University in 1999 and 2007 respectively. She has 13years of experience in teaching / research. She is currently serving as Associate Professor in Department of Electronics and Communication Engineering, Pondicherry Engineering College, Puducherry. To her credit, she has around 15 journal papers and presented 18 papers in International conferences. Her other areas of interest includes satellite communication, Wireless multimedia networks, Spread spectrum communication, Image processing, etc. She has authored a book on Qos Provisioning in Cellular Mobile Networks. K.Thilagam received her B.Tech and M.Tech degrees in Electronics and Communication Engineering from Pondicherry Engineering College in 2004 and 2007 respectively. She has 5 years of experience in teaching / research. She is currently pursuing Ph.D in the area of Wireless Communication in Department of ECE from Pondicherry Engineering College, Puducherry. Her research activities are focussed on Cooperative Communication in Cellular Networks, mainly on Modulation and coding techniques. 93