The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Scaling supply voltage to near-threshold is a very effective approach in reducing the energy consumption of computer systems. However, executing below the safe operation margin of supply voltage introduces high number of persistent failures, especially in memory structures. Thus, it is essential to provide reliability schemes to tolerate these persistent failures in the memory structures. In this...
In this paper, we propose a novel rateless code with unequal error protection (UEP) property based on recently proposed analog fountain codes (AFCs). AFCs have been originally designed and optimized to approach the capacity of a Gaussian channel in a wide range of signal to noise ratios (SNRs). In this paper, we are particularly interested in the UEP property of AFC codes, providing different levels...
This paper describes the comprehensive analysis on the performance of NAND flash/storage-class memory (SCM) hybrid solid-state drive (SSD) during write/erase (W/E) cycling for various applications. Since bit-error rate (BER) increases by cycling, increasingly stronger ECC should be applied, which results in longer ECC calculation time. Both program/erase latencies of the NAND flash memory and ECC...
This paper advocates a system-aided DRAM scaling strategy, where the rationale is to embrace, instead of striving to tackle, the difficulty of storage node aspect ratio (A/R) scaling. In current practice, scaling down of DRAM cell size must be strictly accompanied with proportional scaling up of storage node A/R, in order to maintain the storage node capacitance and hence error-free memory operation...
A new class of forward error correcting codes is introduced. The main idea of the code construction is to utilize special arithmetic properties of input words and codewords considered as whole numbers in the process of encoding and decoding. The numbers are represented in the two-base numeration system with the main radix 2 and the auxiliary radix 3.
To facilitate the distribution of video contents, MPEG-DASH (Dynamic Streaming over HTTP) standard is developed to provide standardized manifest format, content format and streaming protocol for adaptive streaming, thereby increasing interoperability of Internet TV services. Although DASH contents are delivered by HTTP without supporting data multicast, some studies shows the possibility of delivering...
We propose the use of constant weight codes to jointly solve the problems of brightness control, data transmission and error correction coding for flicker free Visible Light Communication (VLC) link consisting of white LEDs. This work is unique in that a coding scheme is proposed to address the three problems collectively in single block coding scheme. In addition, recursive as well as iterative algorithms...
This work describes an unequal error protection using a rateless code namely Luby transform codes (LT codes), with block duplication, over Additive White Gaussian Noise (AWGN) channel. Ring type constellation is used as modulation technique to encode the different levels of data independently. In noisy channels, the index replacing concept cannot be used because all the bits are corrupted by noise;...
Crowd workers are often unreliable and anonymous. Hence there is a need to ensure reliable work delivery while preserving some level of privacy to the requester's data. For this purpose, we use a combination of random perturbation to mask the sensitive data and error-correcting codes for quality assurance. We also consider the possibility of collusion attacks by malicious crowd workers. We develop...
Error correcting codes are useful tools not only for increasing channel reliability in telecommunications systems, but also for the asymmetric encryption cryptographic schemes. Their operation consists basically in encoding messages into codewords for transmission; once received, these messages are decoded and the original message is recovered after the removal of all bit errors introduced either...
A class of codes obtained by combining Fire codes, which are burst correcting codes, with BCH codes, which are random error correcting codes, is proposed. The proposed codes are subcodes of both Fire codes and BCH codes. Lower bounds on the burst error-correcting capabilities of the proposed codes are derived. The codes can be used over a compound channel that causes burst errors or random errors.
There are several practical scenarios where the behavior of a communications channel can be somehow predictable. For instance, in nanometric technologies the increase of integration density makes memory devices more sensitive to radiation effects that can cause multiple bit upsets (MBUs) in adjacent cells. In this paper we use random error correcting codes to deal with such particular channels. We...
A new construction for constant weight codes is presented. The codes are constructed from k-dimensional subspaces of the vector space Fqn. These subspaces form a constant dimension code in the Grassmannian space Gq(n, k). Some of the constructed codes are optimal constant weight codes with parameters not known before. An efficient algorithm for error-correction is given for the constructed codes....
A multi-user coding scheme is proposed for a noisy multiple-access adder channel. Given Ta-user δa-decodable k-ary code A and Td-subset δd-decodable difference set D with its two component sets D+ and D− a priori, larger error-correcting multi-user code C is obtained. Introducing difference set D makes the total rate of generated code C higher than that of conventional code.
Bose-Chaudhuri-Hocquenghem (BCH) coding based on chip communication network is proposed to achieve optimal Energy-Perfomabilty trade-off. The proposed encoding and decoding scheme is applied to Butterfly-fat-tree (BFT) architecture. The proposed design improves Perform-ability range in comparison with conventional schemes while saving energy by 5%. BCH achieves high perform-ability (0.9) at high noise...
With the immense intensification of data storage, communication and hence sources of noise and interference, challenges for reliable storage and communication of data have been even more vital. A number of EDAC schemes are in use having their own merits and demerits and choice of any particular technique is basically a tradeoff between area, cost, performance, power and error correction capability...
The Physically Unclonable Function (PUF) has been presented to defend physical attacks for RFID authentication. The silicon PUF employs difference of gate and wire delays on silicon chip to protect hardware copies of RFID. Because of the process variation in IC manufacturing, each silicon chip has different delays for gates and wires and, thus, the PUF-based encryption on each chip has different output...
We study low-delay error correction codes for streaming-recovery over a class of packet-erasure channels. In our setup, the encoder observes one source frame every M time slots, but is required to transmit a channel packet in each time slot. The decoder is required to reconstruct each source frame within a playback delay of T source frames. The collection of M transmitted channel packets between successive...
The wavelet-based video coders are excellent in providing the fine granular scalability (FGS), i.e. progressive bitstream, which can be used to multicast the video transmission to different users requiring different bit-rate, resolution and frame rate, from single coded bitstream. However, transmission of these bitstreams over erroneous channel is a challenging task. In this paper, application layer...
Based on new characteristics of H. 264/AVC, video compression coding standard, a robust video watermarking algorithm for H. 264 that combined with the error correction coding technology was put forward in the paper. In order to improve the robustness to the attack, the error correction code was applied first on the watermark information, then the Lagrangian optimization coding control model was introduced...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.