The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We present in this paper a method of increasing both the storage capacity of Hopfield neural networks and their capability of error correction. The presented method uses the general principles of generating error-correcting codes in information theory combined with a gradient - an heuristic algorithm. Using this method, there are registered improvements in the growth of network storage capacity (number...
Low Density Parity Check (LDPC) coding is a classical method for the detection and correction of errors. Its problem is the relatively complex operations which must be performed at encoding, and especially at decoding, to detect and correct errors caused by communication channels. We present a solution for the errors correction using regular LDPC and Hopfield network-based associative memories. Our...
Formation and evolution of back-arc basins is related to the interplay between subduction and convergence velocities during the formation of an orogenic chain. Sedimentary basins lacking fault systems that are genetically associated can be locally observed in the hinterland of the main orogenic belt in the usual location of a back-arc basin. These are interesting features potentially driven by a number...
This paper take in discussion an important area of security: Elliptic Curves Cryptosystems (ECC) are the next frontier in the use of security mechanisms by providing good security margins with lower computational cost. ECC's domain is an important field emerged in information security. The elliptic curves (EC) are used for conceiving efficient factorization algorithms and for proving the primality...
This paper presents a solution of design and implementation of a hardware error correction and detection system using associative memories. This type of memory allows search of a stored binary value, having as an input data a partial (or modified) amount of this value. This property can be used in communication, for detection and correction of errors. In our experiments the encoder just associate...
Our paper presents a solution for designing and implementation of a hardware error correction and detection circuit using associative memories. Associative memories allow the searching of a binary stored value, having as an input data a partial (or modified) amount of this value. This associative memories' property can be used in communication for detecting and correcting the errors encountered in...
In this paper we present an evolvable hardware structure based on a Boolean functions network implemented with the basic multiplexer circuit and configured by a hardware genetic algorithm. Even if evolvable hardware is a large research area (beginning in 1996) the main problem which remains is integration in one single chip of the entire system which consists in reconfigurable circuit and the evolvable...
Forward error correction (FEC) and automatic request (ARQ) are common techniques used to treat transmission errors when data are transmitted over noisy channels. In practical applications where feedback is possible, ARQ technique are often more preferable than FEC schemes because error detection requires much simpler decoding equipment and achieves a higher reliability than does error correction....
In this paper we present a solution for designing a Reed-Muller decoder using associative memories based on Hopfield networks. The decoding with classical methods requests high computation resources and needs longer response times. Our solution implies the usage of associative memories in the decoding process, this method being more efficient than the classical ones.
The artificial immune algorithms are implemented by the human immune system. They inspired a technique that has the ability to find optimal solutions in a nonlinear search space. This kind of technique increases the computing speed and converges faster than the genetic algorithms. In this paper is presented an application of artificial immune algorithms in order to optimize the transfer function of...
Our paper presents the prototyping of a BCH (Bose, Chaudhuri, and Hocquenghem) encoder and decoder using a Field Programmable Gate Array (FPGA) reconfigurable chip. These types of codes are used in communications networks to detect and correct errors. Typically, the algorithms that implement these codes are sequentially type. Our solution is a combination of a parallel and a sequential implementation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.