Advanced Search
Volume 28 Issue 9
Sep.  2010
Turn off MathJax
Article Contents
Zhang Shun, Gao Tie-Gang. Encryption Based on DNA Coding, Codon Grouping and Substitution[J]. Journal of Electronics & Information Technology, 2015, 37(1): 150-157. doi: 10.11999/JEIT140091
Citation: Gong Feng-kui, Li Bing-bing, Ge Jian-hua, Liu Peng. Iterative Control of Bit-Interleaved Coded Modulation with Iterative Decoding[J]. Journal of Electronics & Information Technology, 2006, 28(9): 1659-1662.

Iterative Control of Bit-Interleaved Coded Modulation with Iterative Decoding

  • Received Date: 2004-12-16
  • Rev Recd Date: 2005-06-21
  • Publish Date: 2006-09-19
  • A simple and efficient iterative control algorithm is proposed. An iterative degree vector about SNR is firstly derived by analysis of extrinsic information transfer chart, iterative control is then implemented by selecting the relevant value according to estimated SNR. Simple in realization and high in performance, this method can be utilized in performance analysis.
  • Caire G, Taricco G, Biglieri E. Bit-interleaved coded modulation[J].IEEE Trans. on Information Theory.1998, 44(5):927-946[2]Li X D.[J].Ritcey J A. Bit-interleaved coded modulation with iterative decoding. IEEE Proc of ICC99, Hongkong:IEEE.1999,:-[3]Li X D, Ritcey J A. Bit-interleaved coded modulation withiterative decoding and 8PSK signaling[J].IEEE Trans. On Communications.2002, 50(8):1250-1257[4]Chindapol A, Ritcey J A. Design, analysis, and performance evaluation for BICM-ID with square QAM constellations in Rayleigh fading channels[J].IEEE J. on Selected Areas in Communications.2001, 19(5):944-957[5]Huang Yuheng. Bit-interleaved coded modulation with iterative decoding for wireless communications, University of Washington, 2004.[6]Brink S T. Convergence of iterative decoding[J].Electronics Letters.1999, 35(10):806-808[7]Brink S T. Convergence behavior of iteratively decoded parallel concatenated codes[J].IEEE Trans. on Communications.2001, 49(10):1727-1737[8]Pauluzzi D R, Beaulieu N C. A comparison of SNR estimation techniques for the AWGN channel[J].IEEE Trans. on Communications.2000, 48(10):1681-1691
  • Cited by

    Periodical cited type(12)

    1. 赵凤. 基于混沌置乱与DNA计算的彩色图像加密算法. 德州学院学报. 2020(04): 21-26+34 .
    2. 李红梅,徐凌. 基于斜帐篷映射的混沌加密置乱算法研究. 长春师范大学学报. 2019(06): 67-71 .
    3. 吕冬梅,李国东,王丽娟. 基于变参混沌的异位异或图像加密算法. 包装工程. 2019(17): 227-234 .
    4. 陈子豪,苗博,殷旭东. 基于多混沌系统和DNA编码的数字图像分块加密算法. 常熟理工学院学报. 2019(05): 47-52 .
    5. 侯震. 猪繁殖和呼吸障碍综合征病毒GP5蛋白的原核表达. 畜禽业. 2018(10): 6+8 .
    6. 邹红霞,齐斌,王宇,李冀兴. 基于联盟链和DNA编码的局域网加密技术. 信息网络安全. 2018(12): 31-37 .
    7. 朱淑芹,李俊青. 参数扰动下的混沌的图像加密方案. 计算机科学. 2017(S1): 356-360+384 .
    8. 王丽燕,柳扬. 基于污染二维混沌动力系统的加密算法. 大连理工大学学报. 2016(06): 650-656 .
    9. 周小安,李耀清. 基于DNA乱序编码和混沌映射的图像加密算法. 智能计算机与应用. 2016(05): 11-16 .
    10. 禹思敏,吕金虎,李澄清. 混沌密码及其在多媒体保密通信中应用的进展. 电子与信息学报. 2016(03): 735-752 . 本站查看
    11. 鄢懿,张灿,郭振永,高绍帅,陈德元. 基于混沌密钥控制的联合信源信道与安全算术码编译码算法. 电子与信息学报. 2016(10): 2553-2559 . 本站查看
    12. 彭珊,龙敏. 结合DNA编码和混沌的图像选择区域加密. 应用科学学报. 2015(06): 655-662 .

    Other cited types(10)

  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (2085) PDF downloads(720) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return