Search for dissertations about: "soft-decision decoding"
Showing result 1 - 5 of 11 swedish dissertations containing the words soft-decision decoding.
-
1. Early-Decision Decoding of LDPC Codes
Abstract : Since their rediscovery in 1995, low-density parity-check (LDPC) codes have received wide-spread attention as practical capacity-approaching code candidates. It has been shown that the class of codes can perform arbitrarily close to the channel capacity, and LDPC codes are also used or suggested for a number of important current and future communication standards. READ MORE
-
2. Voronoi-Based Coding
Abstract : The performance of a digital communication system can generally be improved by increasing the number of variables being jointly coded. In this sense, it is desirable to have, e.g., higher-dimensional quantizers, longer channel codes, and more users in a multiple-access system. READ MORE
-
3. On hard-decision forward error correction with application to high-throughput fiber-optic communications
Abstract : The advent of the Internet not only changed the communication methods significantly, but also the life-style of the human beings. The number of Internet users has grown exponentially in the last decade, and the number of users exceeded 3.4 billion in 2016. READ MORE
-
4. Source-channel coding for wireless networks
Abstract : The aim of source coding is to represent information as accurately as possible using as few bits as possible and in order to do so redundancy from the source needs to be removed. The aim of channel coding is in some sense the contrary, namely to introduce redundancy that can be exploited to protect the information when being transmitted over a nonideal channel. READ MORE
-
5. Source-Channel Coding in Networks
Abstract : The aim of source coding is to represent information as accurately as possible using as few bits as possible and in order to do so redundancy from the source needs to be removed. The aim of channel coding is in some sense the contrary, namely to introduce redundancy that can be exploited to protect the information when being transmitted over a nonideal channel. READ MORE