Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2014

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 1051 - 1080 of 1175

Full-Text Articles in Computer Engineering

Measuring And Modelling The Thermal Performance Of The Tamar Suspension Bridge Using A Wireless Sensor Network, Nicholas De Battista, James M. W. Brownjohn, Hwee-Pink Tan, Ki Young Koo Jan 2014

Measuring And Modelling The Thermal Performance Of The Tamar Suspension Bridge Using A Wireless Sensor Network, Nicholas De Battista, James M. W. Brownjohn, Hwee-Pink Tan, Ki Young Koo

Research Collection School Of Computing and Information Systems

A study on the thermal performance of the Tamar Suspension Bridge deck in Plymouth, UK, is presented in this paper. Ambient air, suspension cable, deck and truss temperatures were acquired using a wired sensor system. Deck extension data were acquired using a two-hop wireless sensor network. Empirical models relating the deck extension to various combinations of temperatures were derived and compared. The most accurate model, which used all the four temperature variables, predicted the deck extension with an accuracy of 99.4%. Time delays ranging from 10 to 66 min were identified between the daily cycles of the air temperature and …


Service And Communication Management In Cooperative Vehicular Networks, Olivia Brickley Jan 2014

Service And Communication Management In Cooperative Vehicular Networks, Olivia Brickley

Theses

The concept of Intelligent Transportation Systems (ITS) presents new R&D challenges for the transportation and ICT sectors and is currently receiving considerable interest from the research community. The primary objective of ITS is the creation of advanced road traffic systems for improved traffic safety, efficiency, and travelling comfort. Basic vehicle and roadside infrastructure collaboration allows for an increase in efficiency and safety and acts as the foundation for an extensive service set to achieve these ITS goals. Applications such as journey planning, automatic tolling and emergency warnings, among others, are envisaged in a system which can potentially reform modern transportation. …


An Efficient Similarity Digests Database Lookup -- A Logarithmic Divide And Conquer Approach, Frank Breitinger, Christian Rathgeb, Harald Baier Jan 2014

An Efficient Similarity Digests Database Lookup -- A Logarithmic Divide And Conquer Approach, Frank Breitinger, Christian Rathgeb, Harald Baier

Electrical & Computer Engineering and Computer Science Faculty Publications

Investigating seized devices within digital forensics represents a challenging task due to the increasing amount of data. Common procedures utilize automated file identification, which reduces the amount of data an investigator has to examine manually. In the past years the research field of approximate matching arises to detect similar data. However, if n denotes the number of similarity digests in a database, then the lookup for a single similarity digest is of complexity of O(n). This paper presents a concept to extend existing approximate matching algorithms, which reduces the lookup complexity from O(n) to O(log(n)). Our proposed approach is based …


Quantifying Relevance Of Mobile Digital Evidence As They Relate To Case Types: A Survey And A Guide For Best Practices, Shahzad Saleem, Ibrahim Baggili, Oliver Popov Jan 2014

Quantifying Relevance Of Mobile Digital Evidence As They Relate To Case Types: A Survey And A Guide For Best Practices, Shahzad Saleem, Ibrahim Baggili, Oliver Popov

Electrical & Computer Engineering and Computer Science Faculty Publications

In this work, a survey was conducted to help quantify the relevance of nineteen types of evidence (such as SMS) to seven types of digital investigations associated with mobile devices (MD) (such as child pornography). 97 % of the respondents agreed that every type of digital evidence has a different level of relevance to further or solve a particular investigation. From 55 serious participants, a data set of 5,772 responses regarding the relevance of nineteen types of digital evidence for all the seven types of digital investigations was obtained. The results showed that (i) SMS belongs to the most relevant …


Finding Evidence Of Wordlists Being Deployed Against Ssh Honeypots – Implications And Impacts, Priya Rabadia, Craig Valli Jan 2014

Finding Evidence Of Wordlists Being Deployed Against Ssh Honeypots – Implications And Impacts, Priya Rabadia, Craig Valli

Australian Digital Forensics Conference

This paper is an investigation focusing on activities detected by three SSH honeypots that utilise Kippo honeypot software. The honeypots were located on the same /24 IPv4 network and configured as identically as possible. The honeypots used the same base software and hardware configurations. The data from the honeypots were collected during the period 17th July 2012 and 26th November 2013, a total of 497 active day periods. The analysis in this paper focuses on the techniques used to attempt to gain access to these systems by attacking entities. Although all three honeypots are have the same configuration settings and …


Cloudpowercap: Integrating Power Budget And Resource Management Across A Virtualized Server Cluster, Yong Fu, Anne Holler, Chenyang Lu Jan 2014

Cloudpowercap: Integrating Power Budget And Resource Management Across A Virtualized Server Cluster, Yong Fu, Anne Holler, Chenyang Lu

All Computer Science and Engineering Research

In many datacenters, server racks are highly underutilized. Rack slots are left empty to keep the sum of the server nameplate maximum power below the power provisioned to the rack. And the servers that are placed in the rack cannot make full use of available rack power. The root cause of this rack underutilization is that the server nameplate power is often much higher than can be reached in practice. To address rack underutilization, server vendors are shipping support for per-host power caps, which provide a server-enforced limit on the amount of power that the server can draw. Using this …


Performance Modeling Of Virtualized Custom Logic Computations, Michael J. Hall, Roger D. Chamberlain Jan 2014

Performance Modeling Of Virtualized Custom Logic Computations, Michael J. Hall, Roger D. Chamberlain

All Computer Science and Engineering Research

Virtualization of custom logic computations (i.e., by sharing a fixed function across distinct data streams) provides a means of reusing hardware resources, particularly when resources are limited. This is common practice in traditional processors where more than one user can share processor resources. In this paper, we virtualize a custom logic block using C-slow techniques to support fine-grain context-switching. We then develop and present an analytic model for several performance measures (throughput, latency, input queue occupancy) for both fine-grained and coarse-grained context switching (to a secondary memory). Next, we calibrate the analytic performance model with empirical measurements. We then validate …


Inferring Memory Map Instructions, Paul T. Scheid, Ari J. Spilo, Ron K. Cytron Jan 2014

Inferring Memory Map Instructions, Paul T. Scheid, Ari J. Spilo, Ron K. Cytron

All Computer Science and Engineering Research

We describe the problem of inferring a set of memory map instructions from a reference trace, with the goal of minimizing the number of such instructions as well as the number of unreferenced but mapped storage locations. We prove the related decision problem NP-complete. We then present and compare the results of two heuristic approaches on some actual traces.


Development And Human Performance Evaluation Of Control Modes Of An Exo-Skeletal Assistive Robotic Arm (Esara), Umer Khalid Jan 2014

Development And Human Performance Evaluation Of Control Modes Of An Exo-Skeletal Assistive Robotic Arm (Esara), Umer Khalid

Wayne State University Dissertations

This research was conducted to assist with functional tasks for a targeted group of individuals with spinal cord injury (SCI); with C5 to C7 level of injury relating to upper extremity movement. The specific population was selected as the existing technology was either too expensive, too bulky or was unable to address their needs in regards to upper extremity mobility. In addition, no platforms allowed multimodal control options for customization or provided a methodology for this crucial evaluation. The motivation of this research was to provide a methodology for selecting the appropriate control of an assistive device based on the …


Communication Protocol Design Considerations For Highway Vehicle Platoons And Enhanced Networked Robustness By Stochastic Dithers, Lijian Xu Jan 2014

Communication Protocol Design Considerations For Highway Vehicle Platoons And Enhanced Networked Robustness By Stochastic Dithers, Lijian Xu

Wayne State University Dissertations

Highway platooning of vehicles has been identified as a promising framework in

developing intelligent transportation systems. By autonomous or semi-autonomous

vehicle control and inter-vehicle coordination, an appropriately managed platoon can

potentially offer enhanced safety, improved highway utility, increased fuel economy,

and reduced emission. This thesis is focused on quantitative characterization of impact

of communication information structures and contents on platoon safety. By

comparing different information structures which combine front sensors, rear sensors,

and wireless communication channels, and different information contents such

as distances, speeds, and drivers' actions, we reveal a number of intrinsic relationships

between vehicle coordination and communications in …


A New Approach Of Nonblind Watermarking Methods Based On Dwt And Svd Via Lu Decomposition, Onur Jane, Ersi̇n Elbaşi Jan 2014

A New Approach Of Nonblind Watermarking Methods Based On Dwt And Svd Via Lu Decomposition, Onur Jane, Ersi̇n Elbaşi

Turkish Journal of Electrical Engineering and Computer Sciences

Multimedia security has been the focal point of considerable research activity in the last decade, mainly because of its wide application area. Watermarking, in particular, is identified as a major technology to achieve copyright protection and multimedia security. Therefore, recent studies in the literature include some evident approaches for embedding data into a multimedia element. Because of its useful frequency component separation, the discrete wavelet transform (DWT) is commonly used in watermarking schemes. Moreover, singular value decomposition (SVD) and lower-and-upper (LU) decomposition have little effect on the perception of the watermark. Therefore, in this study, a combination of DWT and …


A Novel Hybrid Recurrent Wavelet Neural Network Control Of Permanent Magnet Synchronous Motor Drive For Electric Scooter, Chih Hong Lin Jan 2014

A Novel Hybrid Recurrent Wavelet Neural Network Control Of Permanent Magnet Synchronous Motor Drive For Electric Scooter, Chih Hong Lin

Turkish Journal of Electrical Engineering and Computer Sciences

Due to the electric scooter with nonlinear uncertainties, e.g., nonlinear friction force of the transmission belt, the linear controller was made to disable speed tracking control. In order to overcome this problem, a novel hybrid recurrent wavelet neural network (NHRWNN) control system is proposed to control for a permanent-magnet synchronous motor-driven electric scooter in this study. The NHRWNN control system consists of a supervised control, a recurrent wavelet neural network (RWNN), and a compensated control with adaptive law. According to the Lyapunov stability theorem and the gradient descent method, the on-line parameter training methodology of the RWNN can be derived …


Numerical Investigation Of Impact Of Relative Humidity On Droplet Accumulation And Film Cooling, Luz Irene Bugarin Jan 2014

Numerical Investigation Of Impact Of Relative Humidity On Droplet Accumulation And Film Cooling, Luz Irene Bugarin

Open Access Theses & Dissertations

During the summer, high inlet temperatures affect the power output of gas turbine systems. Evaporative coolers have gained popularity as an inlet cooling method for these systems. Wet compression has been one of the common evaporative cooling methods implemented to increase power output of gas turbine systems due to its simple installation and low cost. This process involves injection of water droplets into the continuous phase of compressor to reduce the temperature of the flow entering the compressor and in turn increase the power output of the whole gas turbine system. This study focused on a single stage rotor-stator compressor …


Semiactive Virtual Control Method For Robots With Regenerative Energy-Storing Joints, Hanz Richter, Daniel J. Simon, Antonie J. Van Den Bogert Jan 2014

Semiactive Virtual Control Method For Robots With Regenerative Energy-Storing Joints, Hanz Richter, Daniel J. Simon, Antonie J. Van Den Bogert

Mechanical Engineering Faculty Publications

A framework for modeling and control is introduced for robotic manipulators with a number of energetically self-contained semiactive joints. The control approach consists of three steps. First, a virtual control design is conducted by any suitable means, assuming a fully-actuated system. Then, virtual control inputs are matched by a parameter modulation law. Finally, the storage dynamics are shaped using design parameters. Storage dynamics coincide with the system's internal dynamics under exact virtual control matching. An internal energy balance equation and associated self-powered operation condition are given for the semiactive joints. This condition is a structural characteristic of the system and …


Building A Database Of Political Speech Does Culture Matter In Charisma Annotations?, Andrew Hines, Ailbhe Cullen, Naomi Harte Jan 2014

Building A Database Of Political Speech Does Culture Matter In Charisma Annotations?, Andrew Hines, Ailbhe Cullen, Naomi Harte

Conference papers

For both individual politicians and political parties the in- ternet has become a vital tool for self-promotion and the distribution of ideas. The rise of streaming has enabled po- litical debates and speeches to reach global audiences. In this paper, we explore the nature of charisma in political speech, with a view to automatic detection. To this end, we have collected a new database of political speech from YouTube and other on-line resources. Annotation is per- formed both by native listeners, and Amazon Mechanical Turk (AMT) workers. Detailed analysis shows that both la- bel sets are equally reliable. The results …


Robustness And Prediction Accuracy Of Machine Learning For Objective Visual Quality Assessment, Andrew Hines, Paul Kendrick, Adriaan Barri, Manish Narwaria, Judith A. Redi Jan 2014

Robustness And Prediction Accuracy Of Machine Learning For Objective Visual Quality Assessment, Andrew Hines, Paul Kendrick, Adriaan Barri, Manish Narwaria, Judith A. Redi

Conference papers

Machine Learning (ML) is a powerful tool to support the development of objective visual quality assessment metrics, serving as a substitute model for the perceptual mechanisms acting in visual quality appreciation. Nevertheless, the reliability of ML-based techniques within objective quality assessment metrics is often questioned. In this study, the robustness of ML in supporting objective quality assessment is investigated, specifically when the feature set adopted for prediction is suboptimal. A Principal Component Regression based algorithm and a Feed Forward Neural Network are compared when pooling the Structural Similarity Index (SSIM) features perturbed with noise. The neural network adapts better with …


Perceived Audio Quality For Streaming Stereo Music, Andrew Hines, Eoin Gillen, Naomi Harte, Damien Kelly, Jan Skoglund, Anil Kokaram Jan 2014

Perceived Audio Quality For Streaming Stereo Music, Andrew Hines, Eoin Gillen, Naomi Harte, Damien Kelly, Jan Skoglund, Anil Kokaram

Conference papers

Users of audio-visual streaming services expect an ever increasing quality of experience. Channel bandwidth remains a bottleneck commonly addressed with lossy compression schemes for both the video and audio streams. Anecdotal evidence suggests a strongly perceived link between bit rate and quality. This paper presents three audio quality listening experiments using the ITU MUSHRA methodology to assess a number of audio codecs typically used by streaming services. They were assessed for a range of bit rates using three presentation modes: consumer and studio qual- ity headphones and loudspeakers. Our results indicate that with consumer quality headphones, listeners were not differentiating …


Clarification Dialogues For Perception-Based Errors In Situated Human-Computer Dialogues, Niels Schütte, John D. Kelleher, Brian Mac Namee Jan 2014

Clarification Dialogues For Perception-Based Errors In Situated Human-Computer Dialogues, Niels Schütte, John D. Kelleher, Brian Mac Namee

Conference papers

We present an experiment about situated human-computer interaction. Participants interacted with a simulated robot system to complete a series of tasks in a situated environment. Errors were introduced into the robot's perception to produce misunderstandings. We recorded the interactions and attempt to identify strategies the participants used to solve the arising problems.


Streaming Computations With Precise Control, Peng Li, Kunal Agrawal, Jeremy Buhler, Roger Chamberlain Jan 2014

Streaming Computations With Precise Control, Peng Li, Kunal Agrawal, Jeremy Buhler, Roger Chamberlain

All Computer Science and Engineering Research

No abstract provided.


A Brief Overview Of The Nebula Future Internet Architecture, Tom Anderson, Ken Birman, Robert Broberg, Matthew Caesar, Douglas Comer, Chase Cotton, Michael J. Freedman, Andreas Haeberlen, Zachary G. Ives, Arvind Krishnamurthy, William Lehr, Boon Thau Loo, David Mazieres, Antonio Nicolosi, Jonathan M. Smith, Ion Stoica, Robbert Van Renesse, Michael Walfish, Hakim Weatherspoon, Christopher S. Yoo Jan 2014

A Brief Overview Of The Nebula Future Internet Architecture, Tom Anderson, Ken Birman, Robert Broberg, Matthew Caesar, Douglas Comer, Chase Cotton, Michael J. Freedman, Andreas Haeberlen, Zachary G. Ives, Arvind Krishnamurthy, William Lehr, Boon Thau Loo, David Mazieres, Antonio Nicolosi, Jonathan M. Smith, Ion Stoica, Robbert Van Renesse, Michael Walfish, Hakim Weatherspoon, Christopher S. Yoo

All Faculty Scholarship

NEBULA is a proposal for a Future Internet Architecture. It is based on the assumptions that: (1) cloud computing will comprise an increasing fraction of the application workload offered to an Internet, and (2) that access to cloud computing resources will demand new architectural features from a network. Features that we have identified include dependability, security, flexibility and extensibility, the entirety of which constitute resilience.

NEBULA provides resilient networking services using ultrareliable routers, an extensible control plane and use of multiple paths upon which arbitrary policies may be enforced. We report on a prototype system, Zodiac, that incorporates these latter …


Review Of Development Stages In The Conceptual Design Of An Electro Hydrostatic Actuator For Robotics, Velibor Karanović, Mitar Jocanović, Vukica Jovanović Jan 2014

Review Of Development Stages In The Conceptual Design Of An Electro Hydrostatic Actuator For Robotics, Velibor Karanović, Mitar Jocanović, Vukica Jovanović

Engineering Technology Faculty Publications

The design of modern robotic devices faces numerous requirements and limitations which are related to optimization and robustness. Consequently, these stringent requirements have caused improvements in many engineering areas and lead to development of new optimization methods which better handle new complex products designed for application in industrial robots. One of the newly developed methods used in industrial robotics is the concept of a self-contained power device, an Electro-Hydrostatic Actuator (EHA). EHA devices were designed with a central idea, to avoid the possible drawbacks which were present in other types of actuators that are currently used in robotic systems. This …


Implementing Mechatronics Design Methodology In Mechanical Engineering Technology Senior Design Projects At The Old Dominion University, Vukica M. Jovanovic, Jennifer G. Michaeli, Otilia Popescu, Moustafa R. Moustafa, Mileta Tomovic, Alok K. Verma, Cheng Y. Lin Jan 2014

Implementing Mechatronics Design Methodology In Mechanical Engineering Technology Senior Design Projects At The Old Dominion University, Vukica M. Jovanovic, Jennifer G. Michaeli, Otilia Popescu, Moustafa R. Moustafa, Mileta Tomovic, Alok K. Verma, Cheng Y. Lin

Engineering Technology Faculty Publications

In recent years, the nature of engineering design has changed due to advances in embedded system design and computer technologies. It is rare to engineer a purely mechanical design that does not incorporate electrical and electronic components. Mechanical engineers and mechanical engineering technologists must possess a multi-disciplinary knowledge with the understanding of both mechanical and electrical systems. For this purpose, undergraduate programs in engineering technology have added mechatronics courses to their curriculum. Mechatronics is a design process that is multi-disciplinary in nature and integrates principles of many engineering disciplines including, but not limited to, mechanical engineering, electrical engineering, and controls …


Effective Resource And Workload Management In Data Centers, Lei Lu Jan 2014

Effective Resource And Workload Management In Data Centers, Lei Lu

Dissertations, Theses, and Masters Projects

The increasing demand for storage, computation, and business continuity has driven the growth of data centers. Managing data centers efficiently is a difficult task because of the wide variety of datacenter applications, their ever-changing intensities, and the fact that application performance targets may differ widely. Server virtualization has been a game-changing technology for IT, providing the possibility to support multiple virtual machines (VMs) simultaneously. This dissertation focuses on how virtualization technologies can be utilized to develop new tools for maintaining high resource utilization, for achieving high application performance, and for reducing the cost of data center management.;For multi-tiered applications, bursty …


A Proof-Theoretic Semantic Analysis Of Dynamic Epistemic Logic, Sabine Frittella, Giuseppe Greco, Alexander Kurz, Alessandra Palmigiano, Vlasta Sikimić Jan 2014

A Proof-Theoretic Semantic Analysis Of Dynamic Epistemic Logic, Sabine Frittella, Giuseppe Greco, Alexander Kurz, Alessandra Palmigiano, Vlasta Sikimić

Engineering Faculty Articles and Research

The present paper provides an analysis of the existing proof systems for dynamic epistemic logic from the viewpoint of proof-theoretic semantics. Dynamic epistemic logic is one of the best known members of a family of logical systems which have been successfully applied to diverse scientific disciplines, but the proof theoretic treatment of which presents many difficulties. After an illustration of the proof-theoretic semantic principles most relevant to the treatment of logical connectives, we turn to illustrating the main features of display calculi, a proof-theoretic paradigm which has been successfully employed to give a proof-theoretic semantic account of modal and substructural …


Use Of Pattern Classification Algorithms To Interpret Passive And Active Data Streams From A Walking-Speed Robotic Sensor Platform, Eric Allen Dieckman Jan 2014

Use Of Pattern Classification Algorithms To Interpret Passive And Active Data Streams From A Walking-Speed Robotic Sensor Platform, Eric Allen Dieckman

Dissertations, Theses, and Masters Projects

In order to perform useful tasks for us, robots must have the ability to notice, recognize, and respond to objects and events in their environment. This requires the acquisition and synthesis of information from a variety of sensors. Here we investigate the performance of a number of sensor modalities in an unstructured outdoor environment, including the Microsoft Kinect, thermal infrared camera, and coffee can radar. Special attention is given to acoustic echolocation measurements of approaching vehicles, where an acoustic parametric array propagates an audible signal to the oncoming target and the Kinect microphone array records the reflected backscattered signal. Although …


Website Accessibility In Australia And The National Transition Strategy: Outcomes And Findings, Vivienne Conway Jan 2014

Website Accessibility In Australia And The National Transition Strategy: Outcomes And Findings, Vivienne Conway

Theses: Doctorates and Masters

In the most recent statistics, published by the Australian Bureau of Statistics in 2012, it was reported that slightly under one in five people stated they had a disability. A further twenty-one percent of the population (4.7 million people) reported that they had a long-term health condition that did not restrict their everyday activities. This total group of people who suffer either a disability or a long-term health condition numbers 8.9 million people, or over thirty-nine percent of the Australian population. Of the people reporting a disability, 3.7 million or eighty-eight percent of that group experienced limitations in the activities …


Increasing Key Space At Little Extra Cost In Rfid Authentications, Gökhan Dalkiliç, Mehmet Hi̇lal Özcanhan, Hafi̇ze Şen Çakir Jan 2014

Increasing Key Space At Little Extra Cost In Rfid Authentications, Gökhan Dalkiliç, Mehmet Hi̇lal Özcanhan, Hafi̇ze Şen Çakir

Turkish Journal of Electrical Engineering and Computer Sciences

Traditional authentication and key establishment protocols utilize nonce parameters as a means for message freshness, recent aliveness, and key derivation. Improving identity verification, increasing key space, or making secret updates more complex through nonces are not goals. Generating random numbers as nonces and not making the most out of them can be considered as a loss in resource stricken radio frequency identification (RFID) tags. By increasing the shared secrets slightly, a new functionality for the nonces is introduced, which makes the authentication and key establishment protocols of RFID systems more secure, in general. The proposed method contributes to the security …


Analysis Of A Rule-Based Curriculum Plan Optimization System With Spearman Rank Correlation, Di̇dem Abi̇di̇n, Hafi̇ze Şen Çakir Jan 2014

Analysis Of A Rule-Based Curriculum Plan Optimization System With Spearman Rank Correlation, Di̇dem Abi̇di̇n, Hafi̇ze Şen Çakir

Turkish Journal of Electrical Engineering and Computer Sciences

In corporations, accurate planning should be applied to manage the in-service training task within an optimum time period and without hindering the working tempo of the employees. For this reason, it is better to consider the curriculum planning task as a timetabling problem. However, when the timetables are prepared manually, it may turn out to be a complicated and time-consuming problem. In this study, it is aimed to evaluate the results of software introduced previously, which seeks to find a solution to the curriculum planning problem of in-service training programs in corporations using a rule-based genetic algorithm (GA). The input …


Effects Of A Current Transformer's Magnetizing Current On The Driving Voltage In Self-Oscillating Converters, Güngör Bal, Seli̇m Öncü Jan 2014

Effects Of A Current Transformer's Magnetizing Current On The Driving Voltage In Self-Oscillating Converters, Güngör Bal, Seli̇m Öncü

Turkish Journal of Electrical Engineering and Computer Sciences

Magnetizing inductance is one of the parameters that affect the phase and amplitude error of the output current of current transformers (CTs). In this study, the linear circuit model of a CT is developed to be used for driving purposes in power electronics applications. A simulation of the CT and its linear model is achieved. In the model circuit, the effect of the magnetizing inductance on the driving voltage can be examined. The equivalent circuit simulation results and the linear model simulation results along with the calculated results show agreement with each other. These results are compared with experimental results.


A Low-Memory Intensive Decoding Architecture For Double-Binary Convolutional Turbo Code, Ming Zhan, Liang Zhou, Jun Wu Jan 2014

A Low-Memory Intensive Decoding Architecture For Double-Binary Convolutional Turbo Code, Ming Zhan, Liang Zhou, Jun Wu

Turkish Journal of Electrical Engineering and Computer Sciences

Memory accesses take a large part of the power consumption in the iterative decoding of double-binary convolutional turbo code (DB-CTC). To deal with this, a low-memory intensive decoding architecture is proposed for DB-CTC in this paper. The new scheme is based on an improved maximum a posteriori probability algorithm, where instead of storing all of the state metrics, only a part of these state metrics is stored in the state metrics cache (SMC), and the memory size of the SMC is thus reduced by 25%. Owing to a compare-select--recalculate processing (CSRP) module in the proposed decoding architecture, the unstored state …