The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, a novel visual secret sharing (VSS) scheme with using QR codes is investigated. The proposed visual secret sharing scheme based on QR codes(VSSQR) can visually reveal secret image by stacking k or more shares (shadow images) from all the n QR codes as well as scan the QR code by a QR code reader. Our VSSQR exploits the error correction mechanism in the QR code structure, to embed the...
This paper presents a method of increasing reliability of memory, so as not to make the data erroneous, and to make the data free from multiple cell upsets (MCUs). There are many methods to increase the reliability of memory, but in this paper a modification to decimal matrix code is proposed with reduced redundant bits. The error correction codes which are used to protect memories and to increase...
We propose a novel approach to modulation coding using the Generalized Belief Propagation (GBP) algorithm. The idea is to completely eliminate a constrained encoder and, instead, embed a constraint into an error correction codeword by deliberately flipping the bits that violate the constraint. The GBP algorithm is used to keep the number of flipped bits small in order not to overburden the decoder...
The encroachment of technology grading — smaller dimensions, higher consolidation densities, and lower berth operating voltages — has come to a level that reliability of memory is put into jeopardy. Hence a novel approach is proposed to overcome this multiple cell upsets using error correction coding techniques. Recently, matrix computer code (MCs) based on senses of hamming codes have been proposed...
In applications such as visual surveillance, huge amounts of data are continuously being recorded and efficient encoding forms an important task. The use of compressive sensing (CS) to encode in such scenarios (assuming stationary background) is actively being explored by researchers during the recent times. In the said scenario, working out new measurement and reconstruction pair for efficient encoding...
We report a semiquantitative readout technique using structured Quick Response (QR) codes partially patterned with colorimetric assay. This allows error-corrected readout at point-of-care (POC) the assay using mobile devices while transparently enabling remote tabulation of population-level statistics through analysis of web traffic.
Use of the error correcting codes (ECC) in a multiclass audio emotion recognition problem is proposed to improve the emotion recognition accuracy. We visualize the emotion recognition system as a noisy communication channel, thus motivating the use of ECC. We assume the emotion recognition process consists of an audio feature extractor followed by an artificial neural network (ANN) for emotion classification...
A variation on channel polarization coding is presented. In standard channel polarization coding the code length is an integral power of two. Our scheme allows modifying the code at the graph definition level to an arbitrary blocklength. Working at the graph definition level of the code enables the utilization of the newly produced codes for every decoding scheme that utilize the graph definition...
In deep nanometer scale, Network-on-Chip (NoC) links are more prone to multi-bit transient fault. Conventional ECC techniques brings heavy area, power, and timing overheads when correcting and detecting multiple transient faults. Therefore, a cost-effective ECC technique, named 2D fault coding method, is adopted to overcome the multi-bit transient fault issue of NoC links. Its key innovation is that...
This paper introduces a linear permutation module before the inner encoder of the iteratively decoded product coding structure, for the transmission of scalable bit streams over error-prone channels1. This can improve the error correction ability of the inner code when some source bits are known from the preceding outer code decoding stages. The product code consists of a protograph low-density parity-check...
Although bi-orthogonal coding requires half the bandwidth of the other Hadamard-type waveform codes, such coding schemes are attractive only when large bandwidth is available, the finite projective plane (FPP) based waveform coding schemes are proposed and evaluated through three performance metrics, which are with similar error performance and cross correlation with Hadamard-type waveform codes....
Error-Control Coding (ECC) now plays an important role in wireless transceivers because it helps to increase link reliability and lower required transmit power. One popular problem of ECC implementation is the trade-off between high coding-gain and decoder's complexity. In this paper, we propose a serial concatenated ECC solution which is a combination of truncated-iteration layered-decoding LDPC...
This amendment to IEEE Std 802.3-2015 adds Physical Layer (PHY) specifications and management parameters for 25 Gb/s operation over twinaxial copper cabling (25GBASE-CR and 25GBASE-CR-S), electrical backplanes (25GBASE-KR and 25GBASE-KR-S), and multimode fiber (25GBASE-SR). This amendment also specifies a 25 Gigabit Attachment Unit Interface (25GAUI) and optional Energy Efficient Ethernet (EEE).
We propose a novel vein extraction technique adapted to template protection and use it to apply a fuzzy commitment scheme. We construct dedicated error correcting codes that enable us to maintain a good accuracy after template protection. In a second application, we offer to overcome the alignment issues when comparing two vein templates by performing this step outside of the protection scheme. Different...
Quick Response (QR) codes, used to store machine readable information, have become very commonnowa days and have found many applications in different scenarios. One of such applications is electronic voting systems. Indeed, some electronic voting systems are starting to take advantage of these codes, e.g. to hold the ballots used to vote, or even as a proof of the voting process. Nevertheless, QR...
We propose the use of the popular error correcting codes (ECC) in a multi-class audio emotion recognition scenario to improve the emotion recognition accuracy in spoken speech. In this paper, we visualize the emotion recognition system as a noisy communication channel, thus motivating the use of ECC in the emotion recognition process. We assume the emotion recognition process consists of an audio...
To facilitate reliable data transmission over error prone networks, many error correction techniques have been developed to combat data corruption. The reliability requirement of different applications can vary. The multimedia streaming services can usually withstand a certain level of data loss, but they have a strict limitation on the latency tolerance. In this paper, a section-based protection...
In this paper, we propose a low latency fast Hadamard transform (FHT) based decoder for polar codes. We show that while this decoder can achieve the same performance as the popular successive cancellation (SC) decoder, it is superior to the SC decoder in terms of latency. The proposed FHT decoder can be applied directly to most short Polar codes, but requires a modest level of encoder modification...
In this paper, a new method for the construction of a quantum stabilizer code from circulant permutation matrices is discussed. First, we choose a finite-length vector randomly, and we can construct circulant permutation matrices from the vectors. Then, the parity-check matrix can be produce from the circulant permutation matrices. Hence, the generators of stabilizer code are determined according...
Spin transfer torque magnetic random access memory (STT-MRAM) is one of the most promising new non-volatile memory technologies. Recently, STT-MRAM has become popular as a DRAM alternative in main memories particularly for tablets and palmtop computers in part due to its non-volatile properties and potential for improved device scalability. However, STT-MRAM is well known for its asymmetric access...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.