
B. Honary- Lancaster University
B. Honary
- Lancaster University
About
312
Publications
17,958
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,666
Citations
Introduction
Skills and Expertise
Current institution
Publications
Publications (312)
A simple approach of using the multipath model for a power-line channel is proposed. A complex network is decomposed into several point-to-point components, and the transfer function for each individual component is computed. The product of these individual transfer functions gives the transfer function of the whole complex network. Accuracy of the...
This paper presents the design of space–time block codes (STBCs) over maximum rank distance (MRD) codes, energy-efficient STBCs, STBCs using interleaved-MRD codes, the use of Gaussian integers for STBCs modulation, and Gabidulin's decoding algorithm for decoding STBCs. The design fundamentals of STBCs using MRD codes are firstly put forward for dif...
Low-power medium access control (MAC) protocols used for communication of energy constraint wireless embedded devices do not cope well with situations where transmission channels are highly erroneous. Existing MAC protocols discard corrupted messages which lead to costly retransmissions. To improve transmission performance, it is possible to includ...
Impulsive noise is one of the major challenges for reliable transmission over power lines. Interleavers provide higher protection against the impulsive noise by dispersing information across the channel and spreading the burst of errors over multiple codewords. Multi-fold turbo (MFT) coding is a technique that improves the communication reliability...
This paper presents analysis of the channel characteristics of a Medium Voltage (MV) Electrical Distribution Networks (EDN) based on predefined reference scenarios provided by the Power Utilities. Simulation results which show the influences of various parameters such as the cable (type, length, and installation), number of end users, number of int...
GPT public key cryptosystem was proposed by Gabidulin, Paramonov and Tretjakov in 1991. This cryptosystem is based on rank error correcting codes. The main advantage of using rank codes in cryptography is that, it has smaller key size as compared to other code based public key cryptosystems. Several attacks against this system were published and so...
Smart Grid (SG) promises efficient, sustainable, green and reliable electrical delivery by combining the existing electrical distribution network assets with modern information and communications technologies (ICT) in order to transfer information and energy in both directions. Introduction of these intelligent devices will help the grid monitor, p...
The purpose of this paper is to introduce maturing visible light communication (VLC) technology as a candidate bearer technology for supporting seamless high speed broadband connectivity in smart city architecture. A smart city is one which uses its resources as smart and efficient as possible. In a smart city, the structures of the various urban s...
The work in this paper can be broadly divided into three distinct parts. In first part of this work, a deterministic channel model is developed using the art of computer game technology. The developed system can compute the impulse response of an indoor environment. First, both reflection and refraction phenomenon were considered followed by the fr...
We consider a communication network with random network coding which can be attacked by adversaries of two types. One of them can wiretap original packets outgoing from source to destination. The other can insert its own packets into information flow, which are wrong messages for the receiver. To provide secure communication, we use a scheme based...
In recent years visible light communication (VLC) has been matured as an emerging wireless optical technology. Main attraction of VLC is its dual functionality of providing illumination and data from the same light bulb. VLC has been considered for many application areas for its unique characteristics, where this work introduces VLC for novel indoo...
Embedded computer systems equipped with wireless communication transceivers are nowadays used in a vast number of application scenarios. Energy consumption is important in many of these scenarios, as systems are battery operated and long maintenance-free operation is required. To achieve this goal, embedded systems employ low-power communication tr...
These days smart phones have changed the concept of mobile platform. Due to rapid growth in affordability, increased sensory and computational power has opened the ways for some interesting applications like activity recognition, gaming, navigation/tracking, augmented reality etc. In all these applications orientation of mobile phone is very import...
The Guest Editors would like to thank all the authors for their contributions. And special thanks go to all reviewers for their great effort, timely responses, and constructive comments and suggestions. Thanks also go to Professor Sundaraja Sitharama Iyengar, the Editor-in-Chief of International Journal of Distributed Sensor Networks (IJDSN), and t...
In this work, the authors have developed a deterministic Ultra Wide Band (UWB) channel model for indoor environment using both ray-tracing technique and the art of computer game technology in 3D Game Studio (game development tool). In the developed model, the characteristics of indoor environment such as texture, transparency etc. can be taken into...
This paper presents multi-fold turbo codes for a 2-user binary adder channel employing distinct codes for each user. Results obtained through computer simulation show an improvement of 1.0 dB for both users at BER 10-5 over turbo convolutional codes for a noisy binary adder channel.
As wireless sensor networks (WSN) have gained popularity due to their broader applications areas, so does the need for effective security mechanisms. Encryption can be used to protect data communication, but severe resource constraints in WSN make necessary key distribution very difficult. This study addresses the problem of key establishment in WS...
The concept of Public key cryptosystems based on error correcting codes wasinvented by McEliece in 1978. In 1991 Gabidulin, Paramonov and Tretjakov proposed a newversion of the McEliece cryptosystem (GPT) based on maximum rank distance codes insteadof hamming distance codes. Respective structural attacks against dierent variants of theGPT cryptosys...
The embedded inertial sensors in today's Smart phones have added the facility to use them for localisation and tracking applications. The benefit of using them for localisation purpose is that no extra infrastructure is to be installed in contrast to other existing positioning technologies. Inertial navigation only provides the information relative...
These days, most of the smartphones come with integrated MEMS (Microelectromechanicalsystems) sensors like accelerometer, magnetometer, gyros etc. It has opened the ways to use them for location based applications. The big advantage of these sensor based navigation system is that they are environment independent in contrast to other existing positi...
The Internet Protocol version 6 is expected to be a strong enabler for the smart grid, promising seamless communication and network technology independence. However, IP has to be delivered to the last node in the field in order to become the lingua franca of the future smart grid. This article presents a novel approach in power line communication t...
Reliability and high quality of service for TErrestrial Trunked RAdio (TETRA) systems are ensured with number of modulation schemes mapped against application requirements. Phase modulation schemes have been extensively used in mobile systems. TETRA-I supports ?/4-differential quaternary phase-shift keying, whereas TETRA-enhanced data services supp...
In this paper, the construction of space time block (STBC) over maximum rank distance (MRD) codes is presented for different configuration of transmit antennas. Different fields are used to construct such codes. To conserve the rank of the code, Gaussian integers have been used for modulation for 3-transmit antenna scenario to evaluate their perfor...
The public key cryptosystem (PKC) based on rank error correcting codes (the GPT cryptosystem) was proposed in 1991. Use of rank codes in cryptographic applications is advantageous since it is practically impossible to utilize combinatoric decoding. This enabled using public keys of a smaller size. Several attacks against this system were published,...
A switchable-rate quasi-cyclic low-density parity-check (QC-LDPC) coding scheme has been proposed for integration within the legacy and next-generation high-frequency internet protocol (HF-IP) systems. The novelty in this work is based upon using a class of switchable-rate short-block-length (<;1500 bits) QC-LDPC codes for the HF fading channel mod...
The prospect of Smart Grid (SG) is becoming a reality in the recent years, covering different areas like smart metering, demand side management, or distributed generation. Communications play a central role in the SG architecture, because the power utilities need to collect important information to make optimal decisions for efficient power generat...
It is a challenging task to handle dense multipath environment in a wireless communication channel. Various techniques were suggested to handle this issue such as power control, antenna, time and frequency diversity etc. However, antenna diversity is considered to be the most practical way to handle multipath fading. In this paper, a deterministic...
Almost all modern cars can be controlled remotely using a personal communicator (keyfob). However, the degree of interaction between currently available personal communicators and cars is very limited. The communication link is unidirectional and the communication range is limited to a few dozen meters. However, there are many interesting applicati...
Phase Modulation schemes have been extensively used in mobile systems. TETRA -1 supports π/4-DQPSK, where as TEDS supports π/8-D8PSK along with QAM schemes in order to achieve higher data rate. In this paper the performance of phase modulation schemes over TETRA propagation models TU-5, TU-50 and HT-200 is presented. Implementation of higher order...
Microscopic aspects of traffic codes for heterogeneous traffic flow are considered to be optimal for the performance of vehicular ad-hoc network. Within the scope of this concept, fluid dynamic model was applied for density estimation of heterogeneous traffic conditions. The effect of jamming density on velocity and density dynamics having influenc...
The concept of Public-key cryptosystem was innovated by McEliece's cryptosystem. The public key cryptosystem based on rank codes was presented in 1991 by Gabidulin -Paramonov-Trejtakov (GPT). The use of rank codes in cryptographic applications is advantageous since it is practically impossible to utilize combinatoric decoding. This has enabled usin...
The public key cryptosystem based on rank error correcting codes (the GPT cryptosystem) was proposed in 1991. Use of rank codes in cryptographic applications is advantageous since it is practically impossible to utilize combinatoric decoding. This enabled using public keys of a smaller size. Several attacks against this system were published, inclu...
The concept of Public- key cryptosystem was innovated by McEliece's cryptosystem. The public key cryptosystem based on rank codes was presented in 1991 by Gabidulin -Paramonov-Trejtakov(GPT). The use of rank codes in cryptographic applications is advantageous since it is practically impossible to utilize combinatoric decoding. This has enabled usin...
One of the most challenging tasks in modeling a wireless channel is to handle time-varying multipath fading. There are various techniques to tackle this issue such as power control, antenna diversity etc. However, antenna diversity is more practical and effective technique to tackle dense multipath environment observed in Ultra Wide Band (UWB). In...
The performance of partial unit memory-based turbo codes (PUM-TC) with standard convolutional-based turbo codes (RSC-TC) are analysed and compared. Resulting extrinsic information transfer charts indicate that the proposed PUM-based codes have higher mutual information during iterative decoding than the equivalent RSC-TC for the same SNR, i.e. the...
In order to apply UWB technology to a communication system, channel measurement and analysis of UWB signals in the 3.1~10.6 GHz frequency-band become necessary. This paper presents the propagation measurement results for the devices based on the Direct Sequence Ultra Wideband (DS-UWB) technology, which includes the open-space channel, emulated cond...
The public key cryptosystem based on rank error correcting codes (the GPT cryptosystem) was proposed in 1991. Use of rank codes in cryptographic applications is advantageous since it is practically impossible to utilize combinatoric decoding. This enabled using public keys of a smaller size. Several attacks against this system were published, inclu...
This paper presents a study of an HF-IP (High Frequency — Internet Protocol) propagation scenario based on a 3-node (N 1 -Lancaster, UK, N 2 -Portsmouth, UK and N 3 -Ulm, Germany) virtual HF-IP Sky wave network operating on a Token Ring (TR) network according to the STANAG 5066/draft edition 2 (S5066Ed2) standard. The 3-nodes are placed in 3 differ...
This paper provides analysis of high performance forward error control (FEC) coding scheme suitable for next generation HF-IP systems, which can be used as an optional scheme according to the requirements of the application. Present HF-IP systems comply with NATO STANAG 4539 Physical layer standards which use convolutional encoding for forward erro...
This paper investigates multiple emitting/multiple receiving points diversity technique for multi-wire transmission over frequency selective multi-wire channels. To be resilient to the inter-symbol interference (ISI) present in the frequency selective fading, diversity technique must be used in conjunction with wide band multi-carrier modulation (M...
One of the main challenges for future wireless systems is to enhance the effective data throughput by exploiting the allocated bandwidth as much as possible. Among several approaches at different layers, one of the most important is constituted by the so-called link adaptation (LA) techniques. They are characterized by the adaptation of a set of tr...
Structured LDPC codes enable low-complexity decoding as well as efficient implementation of encoder reducing the complexity down to the order of the number of parity-check bits. Construction of structured LDPC codes is based on combinatorial approaches such as balanced-incomplete block-design (BIBD) and finite fields to design quasi-cyclic LDPC (QC...
In this presentation, Ultra Wideband (UWB) systems operating in 3.1–4.5GHz band are shown to have interesting properties within dense multipath channels and metallic structures. First the IEEE standard UWB channel model is presented and discussed, then our combined deterministic-statistical channel modeling method is shown to have more applicabilit...
Health and usage monitoring of structures and active systems has received a wealth of attention in recent years. Microsystems are seen as a core technology for the realisation of these monitors as they offer the potential for multi-sensor integration with active electronics, wireless connectivity and in the future a self-powering capability. This a...
The Configurable radio with Advanced Software Technology (CAST) project is funded under the European Commission Fifth Framework IST programme. The Project started in April 2000 and it is to run for 33 months, with continuous contributions from its seven consortium members over this period. The CAST project investigates future software radio techniq...
OccuTek is an applied research project, partially funded by the Technology Strategy Board, to investigate and validate the use of mobile phones for the verification of the number of passengers within a vehicle as a means of promoting ride sharing through occupancy related discounts to Road Usage Charging (RUC).
This paper investigates wire integrity testing using intermodulation product processing. In many practical scenarios, especially in wireless systems, intermodulation products are considered inimical to effective communications. However, this paper demonstrates that the location of faults on electrical wires can be discovered by detecting and proces...
A uniformly distributed hopping pattern suitable for M-levelled M-ary frequency shift keying (MMFSK) and multi-tone MMFSK (M<sup>3</sup>FSK) modulation schemes is proposed. Compared to randomly generated and some purposely designed codes, uniformly distributed codes show better BER performance in a powerline communication (PLC) environment. These c...
This paper discusses the key requirements of beyond 3G systems. We propose orthogonal frequency division multiplexing with rate compatible adaptive turbo codes (PUM component codes - channel coding) for e.g., video transmission. We performed simulations using fixed packet size L = 5000 bits. We have also described uplink (OFDM with precoding) and d...
This paper presents new methods for constructing efficiently encodable quasi-cyclic LDPC codes based on special balanced incomplete block designs (BIBD's). Codes constructed perform well over both the AWGN and binary erasure channels with iterative decoding.
Wireless Sensor Networks impose a requirement of low power usage, implying minimal processing power on PHY/MAC layer transmissions. However the underlying channel between nodes can sometimes be hostile and incur interference from heavy traffic. In this situation a customized, simple, robust and adaptive forward error correction scheme is essential....
This paper presents new methods for efficiently constructing encodable quasi-cyclic low-density parity-check (LDPC) codes based on special balanced incomplete block designs (BIBDs). Codes constructed perform well over both the additive white Gaussian noise (AWGN) and binary erasure channels with iterative decoding.
The presence and availability of several independent wired and wireless networks within a communication environment has led to the channel adaptive multiple I/O (CAMIO) protocol being developed as an appropriate and novel technique for data transmission. The proposed system utilises an intelligent multiplexing technique that enables the transmissio...
Due to the highly dispersive nature of the power line channel, there has been a strong trend towards the use of orthogonal frequency division multiplexing (OFDM) modulation for wideband power line communications (PLC). However, OFDM modulation has the drawbacks of high peak-to-average power ratio and increased sensitivity to carrier synchronisation...
Near-optimum sequence detection in channels with intersymbol interference (ISI) is based on the Viterbi algorithm. However, its complexity increases exponentially with the number of taps within the span of the ISI and with the number of symbol levels. We present a low-complexity sequence detection scheme, based on the Viterbi detection algorithm, w...
The offset BP-based algorithm is a reduced-complexity derivative of the belief-propagation algorithm for decoding of low-density parity- check codes. It uses a constant offset term to simplify decoding, but at the cost of performance. A method to obtain a 'variable' offset parameter is presented here, to improve the performance of the algorithm.
We present a turbo coding scheme whose constituent codes are designed using convolutional encoders with time-varying coefficients. These encoders are finite state sequence machines that operate over the Galois field GF(q). The scheme includes an encryption polynomial whose coefficients are changed periodically by means of a user key. The trellis co...
Both constant and variable forward error correcting (FEC) coding is provided by the DVB-S2 system. Variable FEC can be used to provide different levels of error protection according to applications, & may be combined with the use of return channels, to achieve adaptive coding. The novel idea explained in this paper, introduces an algebraic method f...
In this paper, a new technique is presented combining wideband channel modelling techniques with the latest computer graphic functionality, which enables interactive channel simulation and dynamic coverage estimation for system design and development. This technique is currently developed with focus on baseband Ultra Wideband (UWB) systems operatin...
While in wired access networks meeting packet error requirements requested by the applications are simplified by the stability of the channel conditions, in the case of wireless networks, this is not the case. Especially for real-time applications using User Datagram Protocols (UDP) for fast, unordered and unacknowledged delivery of packets, reliab...
Both constant and variable Forward Error Correcting (FEC) coding is provided by the DVB-S2 system[ 11]. Variable FEC can be used to provide different levels of error protection according to applications, & may be combined with the use of return channels, to achieve Adaptive Coding. The novel idea explained in this paper, introduces an algebric meth...
Location awareness is an important capability for a series of wirelessly-enhanced business and consumer mobile applications. Low-cost devices/software that can be incorporated into a broad range of business and consumer appliances can be used for location determination and tracking. In this paper, we demonstrate a radio beacon-based approach that s...
Since their introduction by C. Berrou, A. Glavieux and P. Thitimajshima [“Near Shannon limit error correcting coding and decoding: Turbo-codes. I”, in: Proc. IEEE Int. Conf. Commun., Geneva, Switzerland, 1740-1745 (1993)], turbo codes have generated considerable interest within the coding community as they offer near-Shannon limit performance. As y...
With the growing deployment of PLC, EMC emissions are attracting great interest. In this paper, experimental study of the impact of emissions from indoor PLC systems on HF bands is carried out. Results from the measured radiated and conducted emissions are analysed in the frequency bands of 1–30MHz. These results show that the radiated field streng...
The HF propagation channel involves several interrelated phenomena that results in a highly variable medium, which poses a challenge in designing and implementing effective high speed digital communications systems for HF band. The reliability of HF communication is affected by time-varying propagation conditions of HF channel that demands a requir...
Through the use of F-metrics, a McEliece type public-key cryptosystem based around generalised Reed Solomon codes is constructed and implemented. Using such metrics increases the complexity of the system making it harder to attack allowing for smaller key-sizes. Attacks on such a system are also investigated
Recently, a symbol detection scheme based on the Viterbi algorithm was proposed for binary Two Dimensional Optical Storage (TwoDOS) in the presence of Additive White Gaussian noise (AWGN). In this paper, we extend the symbol detection scheme to allow for multilevel modulation. We demonstrate the proof of concept in a typical non-linear high density...
A novel technique that allows efficient trellis decoding for M-choose-T synchronous collaborative coding multiple access (CCMA) codes is investigated. The results show that a sufficient performance improvement is achieved without the need for additional information regarding the active users. The application of the proposed technique to asynchronou...
This paper presents two new methods for constructing quasi-cyclic LDPC codes using certain special classes of balanced incomplete
block designs constructed based on finite fields. The codes constructed perform well with iterative decoding over both AWGN
and binary erasure channels.
Two classes of well-structured binary low-density parity check codes (LDPC) are described. The first class is based on a branch of combinatorial mathematics, known as the balanced incomplete block design (BIBD). Construction of three types of codes derived from BIBD designs is illustrated in addition to a family of LDPC codes constructed by decompo...
DVB-S2 is the recently defined successor to the current DVB-S standard and DVB-DSNG standard (EN 301210); enabling new services via significantly higher data rates through the application of BCH concatenated with LDPC
In order to achieve capacity approaching performance, the use of partial unit memory (PUM) component codes with good distance properties in turbo codes and woven turbo codes have been suggested. PUM codes are no more complex, but perhaps less well known than traditionally used convolutional component codes. Turbo codes and woven turbo codes based o...
Since the early days of information and coding theory researchers and designers of error-control systems have striven to obtain performance close to the fundamental Shannon limit with feasible implementation complexity. This goal is now very close to being achieved. The invention of turbo coding in 1993, and the later rediscovery of Gallager low-de...
Measurements of emissions are carried out over a low voltage (LV) indoor power line system in the frequency range of 1 MHz - 30 MHz. In the measurement setups, efforts are made to comply with the setup specified in the existing standards. The results obtained are compared to the current regulations/proposed limits. It is shown that the measured emi...
Every user that joins a wireless access network to connect to the Internet expects to receive a secure and reliable service. The process of discovering other nodes on the same link as well as the recovery of routing information is known as Neighbour Discovery Protocol (NDP) [1] and until recently little attempt was made to protect it from misuse an...
Location awareness is an important capability for a series of wirelessly-enhanced business and consumer mobile applications. Low-cost devices that can be incorporated into a broad range of business and consumer appliances can be used for location determination and tracking. In this paper, we demonstrate a radio beacon-based approach that suggests h...
Location awareness is an important capability for a series of wirelessly-enhanced business and consumer mobile applications. Low-cost devices that can be incorporated into a broad range of business and consumer appliances can be used for location determination and tracking. In this paper, we demonstrate a radio beacon-based approach that suggests h...
The encoding, decoding and performance analysis of concatenated partial unit memory (PUM) code structures for capacity approaching performance are investigated. PUM codes are known for their excellent distance properties and lower decoding complexity compared to equivalent multi-memory convolutional codes. Two capacity approaching concatenated stru...
A symbol detection scheme based on the Viterbi algorithm that simultaneously processes subsets of 2-D data in the presence of Gaussian noise was recently proposed for binary 2-D optical storage (TwoDOS). In the case of multilevel TwoDOS, a straightforward full-fledged maximum likelihood symbol detector, or even the previous Viterbi-based algorithm,...
We describe a symbol detection scheme for multilevel two dimensional optical storage (TwoDOS), where the channel is characterized by non-linear inter symbol interference and the dominant source of noise is media noise, both of which are characterized accurately by a non-linear channel model. Signal waveforms from the channel model are described as...
In this paper, we propose an efficient space-frequency coded orthogonal frequency-division multiplexing (OFDM) system for high-speed data transmission over frequency selective multi-wire power line channels. By transmitting the same data symbol over two uncoupled pair of wires and over two different carriers, with a frequency separation between car...
Two-fold turbo codes have been recently introduced as the least complex member of the multifold turbo code family, and they
have been shown to outperform their conventional symmetric and asymmetric cousins in the waterfall region. This article introduces
a simple method that allows two-fold turbo codes to offer bi-level unequal error protection. Al...
A practical multifunctional system comprising a turbo decoder, low complexity turbo equalizer and turbo synchronizer is developed to compensate for frequency-selective channels with fading. The combined synchronizer, equalizer and decoder are based on a turbo scheme where soft extrinsic information is exchanged between these processes and between i...
Next generation mobile networks and services are gaining market momentum every day. Service providers are seeking new ways to generate revenue and this is usually achieved by designing new downloadable applications that take advantage of the advanced handset technology and the higher per user bandwidth. It is therefore an ongoing challenge to prote...
The aim of this paper is to describe in detail the iterative decoding algorithm used during the implementation of concatenated partial unit memory (PUM) code structures, such as turbo and woven turbo constructions based on PUM codes. Previous published research by the authors have shown that such concatenated PUM code structures have better distanc...
A new and challenging concept for optical storage is being developed, in which the information written on the disc has a two-dimensional characteristic, with the aim of realizing an increase of a factor of two in data density and a factor of ten in data rate over the current 3rd generation of optical storage (Blu-Ray Disc, BD). Experimental channel...
This correspondence presents a method for constructing structured regular low-density parity-check (LDPC) codes based on a special type of combinatoric designs, known as balance incomplete block designs. Codes constructed by this method have girths at least 6 and they perform well with iterative decoding. Furthermore, several classes of these codes...
We are experiencing exponential growth rates in communication systems and increasing mobility awareness in society. When doctor and patient are physically separated new information and communication technologies provide and support healthcare [1]. These technologies offer high speed secure medical data transmission, reliability, quality of service...
The recently published letter by Li and Hu (see ibid., vol.39, no.8, p.670-1, 2003) contains a number of incorrect statements and omissions. These are set out.
A two-dimensional optical storage (TwoDOS) format with binary modulation is being developed in which channel bits are arranged on a two-dimensional hexagonal lattice [ Coene W. M. J. , in Optical Data Storage, Vol. 88 of OSA Trends in Optics and Photonics Series (Optical Society of America, Washington, D.C., 2003), pp. 90–92]. The aim is to increas...
The proposed paper presents a novel multimedia multiplexing protocol that enables the transmission of multimedia data over several wireless networks at the same time. The multiplexer system has been designed to be adaptive, maximizing the performance. Traffic control and congestion reactive techniques, based on channel parameter estimations, are pr...
"Patchwork" is a proven method of digital signature casting in images. This paper introduces a new method that improves the security of existing robust watermark encoding schemes. The proposed method provides protection to JPEG compression up to a ratio of 1:5 whereas most existing methods are robust up to a ratio of 1:4. Images are shown and simul...
Based on the theory of multiple-sample detection o f signal vectors, we propose a n optimum space-diversity receiver specifically designed for power-line c hannels dominated by asynchronous impulsive noise. By simultaneously transmitting the same symbol over two wires and performing two-branch maximal-ratio combining (MRC) at t he receiver, the pro...
We present a new family of so-called reducible rank codes which are a generalization of rank product codes . This family includes maximal rank distance (MRD) codes for lengths n>N in the field F<sub>N</sub>. We give methods for encoding and decoding reducible rank codes. A public key cryptosystem based on these codes and on the idea of a column scr...
A multifunctional system comprising a turbo decoder, low complexity turbo equalizer and data-aided frame synchronizer is developed
to compensate for frequency-selective channels with fading. The turbo codes are based on Partial Unit Memory Codes, which
may be constructed with higher free distance than equivalent recursive systematic convolutional c...
Partial unit memory (PUM) codes are reputed for their excellent distance properties and lower decoding complexity compared to equivalent convolutional codes. Woven turbo codes (WTCs) are constructed, which outperform turbo codes, using component PUM codes. Simulation results confirm that WTCs based on PUM codes outperform those based on equivalent...