Convolutional code

In telecommunication, a convolutional code is a type of error-correcting code that generates parity symbols via the sliding application of a boolean polynomial function to a data stream. The sliding application represents the 'convolution' of the encoder over the data, which gives rise to the term 'convolutional coding'. The sliding nature of the convolutional codes facilitates trellis decoding using a time-invariant trellis. Time invariant trellis decoding allows convolutional codes to be maximum-likelihood soft-decision decoded with reasonable complexity.

The ability to perform economical maximum likelihood soft decision decoding is one of the major benefits of convolutional codes. This is in contrast to classic block codes, which are generally represented by a time-variant trellis and therefore are typically hard-decision decoded. Convolutional codes are often characterized by the base code rate and the depth (or memory) of the encoder . The base code rate is typically given as , where n is the raw input data rate and k is the data rate of output channel encoded stream. n is less than k because channel coding inserts redundancy in the input bits. The memory is often called the "constraint length" K, where the output is a function of the current input as well as the previous inputs. The depth may also be given as the number of memory elements v in the polynomial or the maximum possible number of states of the encoder (typically: ).

Convolutional codes are often described as continuous. However, it may also be said that convolutional codes have arbitrary block length, rather than being continuous, since most real-world convolutional encoding is performed on blocks of data. Convolutionally encoded block codes typically employ termination. The arbitrary block length of convolutional codes can also be contrasted to classic block codes, which generally have fixed block lengths that are determined by algebraic properties.

The code rate of a convolutional code is commonly modified via symbol puncturing. For example, a convolutional code with a 'mother' code rate may be punctured to a higher rate of, for example, simply by not transmitting a portion of code symbols. The performance of a punctured convolutional code generally scales well with the amount of parity transmitted. The ability to perform economical soft decision decoding on convolutional codes, as well as the block length and code rate flexibility of convolutional codes, makes them very popular for digital communications.

History

Convolutional codes were introduced in 1955 by Peter Elias. It was thought that convolutional codes could be decoded with arbitrary quality at the expense of computation and delay. In 1967, Andrew Viterbi determined that convolutional codes could be maximum-likelihood decoded with reasonable complexity using time invariant trellis based decoders — the Viterbi algorithm. Other trellis-based decoder algorithms were later developed, including the BCJR decoding algorithm.

Recursive systematic convolutional codes were invented by Claude Berrou around 1991. These codes proved especially useful for iterative processing including the processing of concatenated codes such as turbo codes.[1]

Using the "convolutional" terminology, a classic convolutional code might be considered a Finite impulse response (FIR) filter, while a recursive convolutional code might be considered an Infinite impulse response (IIR) filter.

Where convolutional codes are used

Stages of channel coding in GSM.[2] Block encoder and Parity check – error detection part. Convolutional encoder and Viterbi decoder – error correction part. Interleaving and Deinterleaving – code words separation increasing in time domain and to avoid bursty distortions.

Convolutional codes are used extensively to achieve reliable data transfer in numerous applications, such as digital video, radio, mobile communications (e.g., in GSM, GPRS, EDGE and 3G networks (until 3GPP Release 7)[3][4]) and satellite communications.[5] These codes are often implemented in concatenation with a hard-decision code, particularly Reed–Solomon. Prior to turbo codes such constructions were the most efficient, coming closest to the Shannon limit.

Convolutional encoding

To convolutionally encode data, start with k memory registers, each holding one input bit. Unless otherwise specified, all memory registers start with a value of 0. The encoder has n modulo-2 adders (a modulo 2 adder can be implemented with a single Boolean XOR gate, where the logic is: 0+0 = 0, 0+1 = 1, 1+0 = 1, 1+1 = 0), and n generator polynomials — one for each adder (see figure below). An input bit m1 is fed into the leftmost register. Using the generator polynomials and the existing values in the remaining registers, the encoder outputs n symbols. These symbols may be transmitted or punctured depending on the desired code rate. Now bit shift all register values to the right (m1 moves to m0, m0 moves to m−1) and wait for the next input bit. If there are no remaining input bits, the encoder continues shifting until all registers have returned to the zero state (flush bit termination).

Img.1. Rate 1/3 non-recursive, non-systematic convolutional encoder with constraint length 3

The figure below is a rate 13 (mn) encoder with constraint length (k) of 3. Generator polynomials are G1 = (1,1,1), G2 = (0,1,1), and G3 = (1,0,1). Therefore, output bits are calculated (modulo 2) as follows:

n1 = m1 + m0 + m−1
n2 = m0 + m−1
n3 = m1 + m−1.

Convolutional codes can be systematic and non-systematic:

  • systematic repeats the structure of the message before encoding
  • non-systematic changes the initial structure

Non-systematic convolutional codes are more popular due to better noise immunity. It relates to the free distance of the convolutional code.[6]

Recursive and non-recursive codes

The encoder on the picture above is a non-recursive encoder. Here's an example of a recursive one and as such it admits a feedback structure:

Img.2. Rate 1/2 8-state recursive systematic convolutional encoder. Used as constituent code in 3GPP 25.212 Turbo Code.

The example encoder is systematic because the input data is also used in the output symbols (Output 2). Codes with output symbols that do not include the input data are called non-systematic.

Recursive codes are typically systematic and, conversely, non-recursive codes are typically non-systematic. It isn't a strict requirement, but a common practice.

The example encoder in Img. 2. is an 8-state encoder because the 3 registers will create 8 possible encoder states (23). A corresponding decoder trellis will typically use 8 states as well.

Recursive systematic convolutional (RSC) codes have become more popular due to their use in Turbo Codes. Recursive systematic codes are also referred to as pseudo-systematic codes.

Other RSC codes and example applications include:

Img. 3. Two-state recursive systematic convolutional (RSC) code. Also called an 'accumulator.'

Useful for LDPC code implementation and as inner constituent code for serial concatenated convolutional codes (SCCC's).

Img. 4. Four-state recursive systematic convolutional (RSC) code.

Useful for SCCC's and multidimensional turbo codes.

Img. 5. Sixteen-state recursive systematic convolutional (RSC) code.

Useful as constituent code in low error rate turbo codes for applications such as satellite links. Also suitable as SCCC outer code.

Impulse response, transfer function, and constraint length

A convolutional encoder is called so because it performs a convolution of the input stream with the encoder's impulse responses:

where x is an input sequence, yj is a sequence from output j, hj is an impulse response for output j and denotes convolution.

A convolutional encoder is a discrete linear time-invariant system. Every output of an encoder can be described by its own transfer function, which is closely related to the generator polynomial. An impulse response is connected with a transfer function through Z-transform.

Transfer functions for the first (non-recursive) encoder are:

Transfer functions for the second (recursive) encoder are:

Define m by

where, for any rational function ,

.

Then m is the maximum of the polynomial degrees of the

, and the constraint length is defined as . For instance, in the first example the constraint length is 3, and in the second the constraint length is 4.

Trellis diagram

A convolutional encoder is a finite state machine. An encoder with n binary cells will have 2n states.

Imagine that the encoder (shown on Img.1, above) has '1' in the left memory cell (m0), and '0' in the right one (m−1). (m1 is not really a memory cell because it represents a current value). We will designate such a state as "10". According to an input bit the encoder at the next turn can convert either to the "01" state or the "11" state. One can see that not all transitions are possible for (e.g., a decoder can't convert from "10" state to "00" or even stay in "10" state).

All possible transitions can be shown as below:

Img.6. A trellis diagram for the encoder on Img.1. A path through the trellis is shown as a red line. The solid lines indicate transitions where a "0" is input and the dashed lines where a "1" is input.

An actual encoded sequence can be represented as a path on this graph. One valid path is shown in red as an example.

This diagram gives us an idea about decoding: if a received sequence doesn't fit this graph, then it was received with errors, and we must choose the nearest correct (fitting the graph) sequence. The real decoding algorithms exploit this idea.

Free distance and error distribution

Theoretical bit-error rate curves of encoded QPSK (recursive and non-recursive, soft decision), additive white Gaussian noise channel. Curves are small distinguished due to approximately the same free distances and weights.

The free distance[7] (d) is the minimal Hamming distance between different encoded sequences. The correcting capability (t) of a convolutional code is the number of errors that can be corrected by the code. It can be calculated as

Since a convolutional code doesn't use blocks, processing instead a continuous bitstream, the value of t applies to a quantity of errors located relatively near to each other. That is, multiple groups of t errors can usually be fixed when they are relatively far apart.

Free distance can be interpreted as the minimal length of an erroneous "burst" at the output of a convolutional decoder. The fact that errors appear as "bursts" should be accounted for when designing a concatenated code with an inner convolutional code. The popular solution for this problem is to interleave data before convolutional encoding, so that the outer block (usually Reed–Solomon) code can correct most of the errors.

Decoding convolutional codes

Bit error ratio curves for convolutional codes with different options of digital modulations (QPSK, 8-PSK, 16-QAM, 64-QAM) and LLR Algorithms.[8][9] (Exact[10] and Approximate[11]) over additive white Gaussian noise channel.

Several algorithms exist for decoding convolutional codes. For relatively small values of k, the Viterbi algorithm is universally used as it provides maximum likelihood performance and is highly parallelizable. Viterbi decoders are thus easy to implement in VLSI hardware and in software on CPUs with SIMD instruction sets.

Longer constraint length codes are more practically decoded with any of several sequential decoding algorithms, of which the Fano algorithm is the best known. Unlike Viterbi decoding, sequential decoding is not maximum likelihood but its complexity increases only slightly with constraint length, allowing the use of strong, long-constraint-length codes. Such codes were used in the Pioneer program of the early 1970s to Jupiter and Saturn, but gave way to shorter, Viterbi-decoded codes, usually concatenated with large Reed–Solomon error correction codes that steepen the overall bit-error-rate curve and produce extremely low residual undetected error rates.

Both Viterbi and sequential decoding algorithms return hard decisions: the bits that form the most likely codeword. An approximate confidence measure can be added to each bit by use of the Soft output Viterbi algorithm. Maximum a posteriori (MAP) soft decisions for each bit can be obtained by use of the BCJR algorithm.

Shift-register for the (7, [171, 133]) convolutional code polynomial. Branches: , . All of the math operations should be done by modulo 2.
Theoretical bit-error rate curves of encoded QPSK (soft decision), additive white Gaussian noise channel. Longer constraint lengths produce more powerful codes, but the complexity of the Viterbi algorithm increases exponentially with constraint lengths, limiting these more powerful codes to deep space missions where the extra performance is easily worth the increased decoder complexity.

In fact, predefined convolutional codes structures obtained during scientific researches are used in the industry. This relates to the possibility to select catastrophic convolutional codes (causes larger number of errors).

An especially popular Viterbi-decoded convolutional code, used at least since the Voyager program, has a constraint length K of 7 and a rate r of 1/2.[12]

Mars Pathfinder, Mars Exploration Rover and the Cassini probe to Saturn use a K of 15 and a rate of 1/6; this code performs about 2 dB better than the simpler code at a cost of 256× in decoding complexity (compared to Voyager mission codes).

The convolutional code with a constraint length of 2 and a rate of 1/2 is used in GSM as an error correction technique.[13]

Punctured convolutional codes

Convolutional codes with 1/2 and 3/4 code rates (and constraint length 7, Soft decision, 4-QAM / QPSK / OQPSK).[14]

Convolutional code with any code rate can be designed based on polynomial selection;[15] however, in practice, a puncturing procedure is often used to achieve the required code rate. Puncturing is a technique used to make a m/n rate code from a "basic" low-rate (e.g., 1/n) code. It is achieved by deleting of some bits in the encoder output. Bits are deleted according to a puncturing matrix. The following puncturing matrices are the most frequently used:

Code rate Puncturing matrix Free distance (for NASA standard K=7 convolutional code)
1/2
(No perf.)
1
1
10
2/3
1 0
1 1
6
3/4
1 0 1
1 1 0
5
5/6
1 0 1 0 1
1 1 0 1 0
4
7/8
1 0 0 0 1 0 1
1 1 1 1 0 1 0
3

For example, if we want to make a code with rate 2/3 using the appropriate matrix from the above table, we should take a basic encoder output and transmit every first bit from the first branch and every bit from the second one. The specific order of transmission is defined by the respective communication standard.

Punctured convolutional codes are widely used in the satellite communications, for example, in Intelsat systems and Digital Video Broadcasting.

Punctured convolutional codes are also called "perforated".

Turbo codes: replacing convolutional codes

A turbo code with component codes 13, 15.[16] Turbo codes get their name because the decoder uses feedback, like a turbo engine. Permutation means the same as the interleaving. C1 and C2 are recursive convolutional codes. Recursive and non-recursive convolutional codes are not so much different in BER performance, however, recursive type of is implemented in Turbo convolutional codes due to better interleaving properties.[17]

Simple Viterbi-decoded convolutional codes are now giving way to turbo codes, a new class of iterated short convolutional codes that closely approach the theoretical limits imposed by Shannon's theorem with much less decoding complexity than the Viterbi algorithm on the long convolutional codes that would be required for the same performance. Concatenation with an outer algebraic code (e.g., Reed–Solomon) addresses the issue of error floors inherent to turbo code designs.

See also

References

  • Public Domain This article incorporates public domain material from Federal Standard 1037C. General Services Administration. Archived from the original on 2022-01-22.
  1. ^ Benedetto, Sergio, and Guido Montorsi. "Role of recursive convolutional codes in turbo codes." Electronics Letters 31.11 (1995): 858-859.
  2. ^ Eberspächer J. et al. GSM-architecture, protocols and services. John Wiley & Sons, 2008. p.97
  3. ^ 3rd Generation Partnership Project (September 2012). "3GGP TS45.001: Technical Specification Group GSM/EDGE Radio Access Network; Physical layer on the radio path; General description". Retrieved 2013-07-20.
  4. ^ Halonen, Timo, Javier Romero, and Juan Melero, eds. GSM, GPRS and EDGE performance: evolution towards 3G/UMTS. John Wiley & Sons, 2004. p. 430
  5. ^ Butman, S. A., L. J. Deutsch, and R. L. Miller. "Performance of concatenated codes for deep space missions." The Telecommunications and Data Acquisition Progress Report 42-63, March–April 1981 (1981): 33-39.
  6. ^ Moon, Todd K. "Error correction coding." Mathematical Methods and Algorithms. Jhon Wiley and Son (2005). p. 508
  7. ^ Moon, Todd K. "Error correction coding." Mathematical Methods and Algorithms. Jhon Wiley and Son (2005).- p.508
  8. ^ LLR vs. Hard Decision Demodulation (MathWorks)
  9. ^ Estimate BER for Hard and Soft Decision Viterbi Decoding (MathWorks)
  10. ^ Digital modulation: Exact LLR Algorithm (MathWorks)
  11. ^ Digital modulation: Approximate LLR Algorithm (MathWorks)
  12. ^ Butman, S. A., L. J. Deutsch, and R. L. Miller. "Performance of concatenated codes for deep space missions." The Telecommunications and Data Acquisition Progress Report 42-63, March–April 1981 (1981): 33-39.
  13. ^ Global system for mobile communications (GSM)
  14. ^ Punctured Convolutional Coding (MathWorks)
  15. ^ "Convert convolutional code polynomials to trellis description – MATLAB poly2trellis".
  16. ^ Turbo code
  17. ^ Benedetto, Sergio, and Guido Montorsi. "Role of recursive convolutional codes in turbo codes." Electronics Letters 31.11 (1995): 858-859.

Further reading

Publications

  • Francis, Michael. "Viterbi Decoder Block Decoding-Trellis Termination and Tail Biting." Xilinx XAPP551 v2. 0, DD (2005): 1-21.
  • Chen, Qingchun, Wai Ho Mow, and Pingzhi Fan. "Some new results on recursive convolutional codes and their applications." Information Theory Workshop, 2006. ITW'06 Chengdu. IEEE. IEEE, 2006.
  • Fiebig, U-C., and Patrick Robertson. "Soft-decision and erasure decoding in fast frequency-hopping systems with convolutional, turbo, and Reed-Solomon codes." IEEE Transactions on Communications 47.11 (1999): 1646-1654.
  • Bhaskar, Vidhyacharan, and Laurie L. Joiner. "Performance of punctured convolutional codes in asynchronous CDMA communications under perfect phase-tracking conditions." Computers & Electrical Engineering 30.8 (2004): 573-592.
  • Modestino, J., and Shou Mui. "Convolutional code performance in the Rician fading channel." IEEE Transactions on Communications 24.6 (1976): 592-606.
  • Chen, Yuh-Long, and Che-Ho Wei. "Performance evaluation of convolutional codes with MPSK on Rician fading channels." IEE Proceedings F-Communications, Radar and Signal Processing. Vol. 134. No. 2. IET, 1987.

Read other articles:

Batanta UtaraKecamatanNegara IndonesiaProvinsiPapua Barat DayaKabupatenRaja AmpatPemerintahan • CamatRoselo Infaindan[1]Populasi (2021)[1] • Total1.599 jiwaKode Kemendagri92.05.20 Kode BPS9108036 Luas... km²Desa/kelurahan4 kampung Letak Pulau Batanta Batanta Utara adalah salah satu distrik di Kabupaten Raja Ampat, Provinsi Papua Barat Daya, Indonesia. Distrik ini terletak di Pulau Batanta. Pembagian administratif Distrik Batanta Utara terbagi...

 

 

الدوري الهولندي الدرجة الأولى تفاصيل الموسم 1968–1969 البلد هولندا  البطل Schiedamse Voetbal Vereniging مباريات ملعوبة 306   أهداف مسجلة 800   1967–1968 1969–1970 تعديل مصدري - تعديل   الدوري الهولندي الدرجة الأولى 1968–1969 هو الموسم الثالث عشر من الدوري الهولندي الدرجة الأولى منذ إنشائه في �...

 

 

Templat:Nama klan Minang Zulfi Syarif KotoLahir29 Oktober 1950 (umur 73) Bukittinggi, Sumatera BaratKebangsaan IndonesiaAlmamater- Institut Teknologi Bandung- Untag, SurabayaPekerjaanBirokratDikenal atas- Deputi Kemenpera- Ketua Dewan Pengawas Perum Perumnas- Ketua LPP3I Zulfi Syarif Koto (lahir 29 Oktober 1950) adalah seorang ahli perumahan dan birokrat Indonesia. Ia pernah menjabat sebagai Deputi Kemenpera Bidang Perumahan Formal, Ketua Dewan Pengawas Perum Perumnas, Ketua LPP3I (Lemba...

American body piercer (born 1941) Jim WardBornJune 28, 1941 (1941-06-28) (age 82)Western Oklahoma, U.S.OccupationBody piercer James Mark Ward (born June 28, 1941) is an American body piercer. In a 2004 documentary, entitled The Social History of Piercing, MTV called him the granddaddy of the modern body piercing movement.[1] Early years Ward was born in 1941 in Western Oklahoma and moved to Colorado when he was eleven.[2] In 1967, in New York he joined the New York M...

 

 

BaoPoster filmSutradaraDomee ShiProduserBecky Neiman-CobbDitulis olehDomee ShiPenata musikToby ChuSinematograferPatrick LinIan MegibbenPenyuntingKatherine RinggoldPerusahaanproduksi Walt Disney Pictures Pixar Animation Studios DistributorWalt Disney StudiosMotion PicturesTanggal rilis 21 April 2018 (2018-04-21) (Tribeca Film Festival) 15 Juni 2018 (2018-06-15) (bersama Incredibles 2) Durasi8 menitNegaraKanadaAmerika Serikat Bao adalah film pendek animasi komputer tahun...

 

 

New Zealand political candidatesin the MMP era 1996   party lists   by electorate 1999   party lists   by electorate 2002   party lists   by electorate 2005   party lists   by electorate 2008   party lists   by electorate 2011   party lists   by electorate 2014   party lists   by electorate 2017   party lists   by electorate 2020   party lists   by electorate 2023   party lists   by electorate...

Jean LaurentJuan Laurent, dari La Ilustración Nacional (1887)Lahir(1816-07-23)23 Juli 1816GarchizyMeninggal24 November 1886(1886-11-24) (umur 70)MadridTempat pemakamanCementerio de la AlmudenaNama lainJuan Laurent MinierPekerjaanFotografer Madrid, Plaza de toros (1874) Torre Nueva Zaragoza, (skt. 1875). Menara ini dihancurkan pada 1892–1893. Bangunan ini adalah menara jam, dibangun dari batu bata dengan gaya Mudéjar pada awal abad keenam belas Jean Laurent atau, dalam bahasa Sp...

 

 

Pakistan Army Officer This biography of a living person needs additional citations for verification. Please help by adding reliable sources. Contentious material about living persons that is unsourced or poorly sourced must be removed immediately from the article and its talk page, especially if potentially libelous.Find sources: Ali Kuli Khan Khattak – news · newspapers · books · scholar · JSTOR (September 2012) (Learn how and when to remove this mess...

 

 

Mémoire retrouvée (Recovered Memory), une sculpture de Nicola Hicks sur le thème de la mémoire retrouvée[1]. Un faux souvenir est un phénomène psychologique qui se produit lorsqu'une personne se remémore un événement qui n'a pas eu lieu. Histoire du concept Les observations ou les hypothèses sur l'existence de faux souvenirs remontent aux débuts de la psychanalyse et de la psychologie clinique ; on les retrouve dans les écrits de Sigmund Freud et Pierre Janet. Dans les anné...

Men's freestyle 63 kgat the Games of the XXVII OlympiadVenueSydney Convention and Exhibition CentreDate28–30 September 2000Competitors19 from 19 nationsMedalists Murad Umakhanov  Russia Serafim Barzakov  Bulgaria Jang Jae-sung  South Korea← 19962004 → Wrestling at the2000 Summer OlympicsQualificationFreestyleGreco-Roman54 kg54 kg58 kg58 kg63 kg63 kg69 kg69 kg76 kg76 kg85 kg85 kg97 kg97 kg130 kg130 kgvte Main article: Wrestling at the 2000 Summe...

 

 

Daily newspaper in Des Moines, Iowa, United States This article's lead section may be too short to adequately summarize the key points. Please consider expanding the lead to provide an accessible overview of all important aspects of the article. (November 2020) The Des Moines RegisterFront page of the May 3, 2011 editionTypeDaily newspaperFormatBroadsheetOwner(s)GannettEditorCarol Hunter (November 2016–present)Founded1849 (as The Iowa Star)Headquarters400 Locust Street, Suite 500Des Moines,...

 

 

Women's super-Gat the XXII Olympic Winter GamesAlpine skiingVenueRosa Khutor Alpine ResortKrasnaya Polyana, RussiaDate15 February 2014Competitors50 from 25 nationsWinning time1:25.52Medalists Anna Fenninger  Austria Maria Höfl-Riesch  Germany Nicole Hosp  Austria← 20102018 → Alpine skiing at the2014 Winter OlympicsQualification CombinedmenwomenDownhillmenwomenGiant slalommenwomenSlalommenwomenSuper-Gmenwomenvte Women's super-GLocationRosa Khuto...

Indeks SET (1975–2012) Indeks SET (Thai: ดัชนีราคาหุ้นตลาดหลักทรัพย์แห่งประเทศไทยcode: th is deprecated , bahasa Inggris: SET Index) merupakan salah satu indeks pasar saham untuk semua saham umum Thailand. Indeks ini mencakup pergerakan harga seluruh saham biasa dan saham preferen yang tercatat di Bursa Saham Thailand (SET). Hari Dasar untuk perhitungan Indeks SET adalah tanggal 30 April 1975. Pada tanggal t...

 

 

Wollongong adalah kota terbesar ketiga di negara bagian New South Wales, Australia, setelah Sydney dan Newcastle. Wollongong terletak 80 kilometer sebelah selatan Sydney di sebuah area yang dikenal dengan nama Illawara. Wollongong mempunyai luas sebesar 684 km² dan populasi yang berjumlah 274.072 jiwa (2004). Menggunakan kereta dari Sydney, Wollongong dapat dicapai dalam waktu 90 sampai 120 menit. Menggunakan kendaraan pribadi (mobil), dari Sydney ke Wollongong kira-kira memakan waktu 7...

 

 

Landratshaus Lehe Das Landratshaus Lehe in Bremerhaven-Lehe, Ortsteil Klushof, Lange Straße 123, entstand 1830. Das Gebäude steht seit 1978 unter Bremer Denkmalschutz.[1] Geschichte Der Flecken Lehe gehörte bis 1866 zum Königreich Hannover. 1831 wurde aus dem Gericht Lehe und dem Amt Stotel-Vieland (mit Geestendorf) das Amt Lehe; Teil in der 1823 gebildeten Landdrostei Stade (wie ein Regierungspräsidium). In der Epoche und im Stil des Klassizismus entstand deshalb 1830 das zweige...

Text in Sumerian epic mythology Fragment of a tablet with Enmerkar and the Lord of Aratta, c. 1900–1600 BC. Enmerkar and the Lord of Aratta is a legendary Sumerian account, preserved in early post-Sumerian copies, composed in the Neo-Sumerian period (ca. 21st century BC). It is one of a series of accounts describing the conflicts between Enmerkar, king of Unug-Kulaba, and the unnamed king of Aratta.[citation needed] Because it gives a Sumerian account of the confusion of tongu...

 

 

Type of music from Finland This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: Humppa – news · newspapers · books · scholar · JSTOR (February 2009) (Learn how and when to remove this message) Finnish Humppa-Band Eläkeläiset on stage Humppa is a type of music from Finland. It is related to jazz and very fast fo...

 

 

Politics of the Faroe Islands Constitution Constitution Act of Succession Freedom of Speech and the Press Taxation The Crown Monarch King Frederik X Privy Council Purveyors to the Royal Court The unity of the Realm  Kingdom of Denmark  Faroe Islands  Denmark  Greenland ExecutiveRegeringen The Government of Denmark High Commissioner (list) Lene Moyell Johansen Landsstýri The Government of the Faroe Islands Premier Aksel V. Johannesen Deputy Premier Høgni Hoydal Johannesen...

Nigerian politician Adamu Mu'azuGovernor of Bauchi StateIn office29 May 1999 – 29 May 2007Preceded byAbdul MsheliaSucceeded byMalam Isa Yuguda Personal detailsBorn (1955-06-11) 11 June 1955 (age 69)Bauchi State, NigeriaPolitical partyPDP Ahmad Adamu Mu'azu CON (born 11 June 1955) is a Nigerian politician who served as Governor of Bauchi State[1] from 1999 to 2007. Biography Alhaji Ahmadu Adamu Mu'azu (born 11 June 1955) was governor of Bauchi State in Nigeria from 29 M...

 

 

Pour les articles homonymes, voir Cassius. Avidius Cassius Usurpateur romain Règne avril 175 - juillet 175 (~3 mois) Syrie / Égypte Empereur Marc Aurèle Biographie Nom de naissance Caius Avidius Cassius Naissance c.130 - Cyrrhus (Syrie) Décès juillet 175 (~45 ans) - Égypte Père Caius Avidius Heliodorus Mère Julia Cassia Descendance Heliodorus Maecianus Alexandria modifier  Avidius Cassius (Caius Avidius Cassius) (v./aut. 130 - juillet 175) est un sénateur, consul et général r...