The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Hamming codes are the first nontrivial family of error-correcting codes that can correct one error in a block of binary symbols. In this paper we extend the notion of error-correction to error-reduction and present several decoding methods with the goal of improving the error-reducing capabilities of Hamming codes. First, the error-reducing properties of Hamming codes with standard decoding are demonstrated...
This paper presents three new ensembles of low density generator matrix (LDGM) codes, all of which are systematic codes. We prove that, under the maximum likelihood (ML) decoding, these codes can achieve the capacity of binary-input output-symmetric (BIOS) memoryless channels in terms of bit-error rate (BER). The proof technique is different from that for totally random block code ensembles. The recently...
The rising complexity of embedded digital applications and the growing importance of time-to-market require powerful modeling methods and tools to automate the design and implementation process. Electronic design automation (EDA) tools provide the required assistance to every design team, increasing its efficiency and helping meet the hard time to market constraints. Encoders and decoders are an essential...
Subthreshold ultra-low-power passive RFID tag's baseband processor core design with custom logic cells is presented in this paper, based on EPC C1G2 protocol. To deal with the critical timing and wide-range-PVT variation problems of the processor at very low power supply, and for the consideration of limited availability of RF power, power-aware scheme is applied to the key modules, including PIE...
Decoding of Raptor codes consists of decoding of both the LT part and the precode part of the codes. When LT decoding is performed, a scenario may arise where the message passing-based decoding process is unable to provide non-zero log-likelihood ratio (LLR) updates to a fraction of input symbols even if it is mathematically possible to do so. The problem is even more critical for codes with short...
In this paper, a new method for the construction of a quantum stabilizer code from circulant permutation matrices is discussed. First, we choose a finite-length vector randomly, and we can construct circulant permutation matrices from the vectors. Then, the parity-check matrix can be produce from the circulant permutation matrices. Hence, the generators of stabilizer code are determined according...
Although polar codes can achieve the channel capacity in discrete memoryless channel, the practical performance of such codes, especially for the short ones, is still a subject of much needed improvement. The aim of this paper is to investigate increasing the Hamming distances of polar codes while maintaining their linearity property. We propose two methods; in the first, the code-rate remains unchanged,...
This paper proposes an area-efficient partial-sum generator (PSG) architecture for polar decoder implementation. High-throughput PSG designs mainly consist of an encoding matrix generator and a partial-sum update circuit. The matrix generator conventionally is built by cascading a series of D flip-flops and XOR gates. By decomposing the target matrix into the Kronecker product of smaller matrices,...
Distributed storage systems need to guarantee reliable access to stored data. Resilience to node failures can be increased by using erasure encoding. A variety of erasure codes are discussed in literature and implemented in practice. This multiplicity of codes puts a heavy burden on existing systems. In scenarios such as multi-cloud file delivery or migration of data to a new erasure code, the ability...
Semi-supervised learning is a topic of practical importance because of the difficulty of obtaining numerous labeled data. In this paper, we apply an extension of adversarial autoencoder to semi-supervised learning tasks. In attempt to separate style and content, we divide the latent representation of the autoencoder into two parts. We regularize the autoencoder by imposing a prior distribution on...
In this paper we study blind recovery methods for identifying the parameters of a convolutional code from an intercepted bitstream. It is assumed that the interceptor has no prior knowledge about the encoder and the recorded bitstream is noisy. The goal is to obtain the following parameters of convolutional code (i) number of inputs (ii) number of outputs (iii) constraint length of the convolutional...
Complex programmable logic device (CPLD) can be reconfigured to perform any desired application, the main theme of this paper was to reconfigure the CPLD which performs addition operation after detecting the given sequence for the choice of implementing security for the particular operation just like password protection. It mainly focused on designing an adder which performs its addition operation...
The design of a true Bernoulli Random Number Generator (RNG) source with a true probability p = 0.5 is a challenging problem. In this work, we present a novel design of a True RNG (TRNG) that achieves a true E(p(n)) = 0.5. The architecture is based on the perturbation of a Sigma-Delta modulator using random telegraph noise (RTN).
Fast decoder of BCH code (31, 16, 7) which based on matrix algorithm of syndromes computation and parallel data processing was developed. Functional blocks of developed device based on block-based design were described. Device testing with coding and decoding modes and 50 MHz frequency was conducted.
Forward Error Correction is a technique which is used to correct the modified data when transmitted over a noisy channel. Forward Error correcting codes detect and correct errors with decoders. In this paper Error Recovery Algorithm is proposed which combines the Bezier curves over Galois Field GF (p⁁m) and the Low Density Parity Check Codes to generate non-binary codeword. The proposed decoder is...
This paper presents a hardware implementation of a reversible watermarking system that can insert invisible, semi-fragile watermark information into digital image in real time. A content dependent binary watermark is generated based on Discrete Cosine Transform (DCT) coefficients of a set of blocks (8×8) that are selected pseudo randomly on the basis of the key supplied. The binary watermark is then...
Cryptography is a technique by which the stored and transferred data in a particular form can be comprehended and processed by only those, who it is intended for. In the modern era, cryptography is most often associated with the deception of the plaintext into a cipher text using a process called Encryption then back to the original plaintext using a process called Decryption. Strong cryptography...
Communication systems need for regeneration of consistent information by controlling errors in a noisy environment. This is accomplished by incorporating suitable forward error correcting coding techniques into the system. In this context, Turbo Code (TC) is regarded as one of the high-performance forward error correcting codes whose BER performances tends to the “Shannon limit”. An advanced form...
Recent development and popularity of Flash Memory requires efficient error correction technique on its eco system like gaming and mobile platforms. In this paper, we have addressed an efficient method to decode and correct errors using the parallel computing technique offered by Graphical Processing Unit (GPU). This decoder employs the inversion-less Berleykamp-Massey algorithm (iBMA), and Chein search...
Identity-based Public Key Cryptography ID-PKC allows to manage authentication of pubic key efficiently. Identification and signature scheme allow managing public key without digital authentication. This paper proposed McEliece cryptosystem based identification and the signature scheme using chained BCH codes and permuted decoding based on the norm of syndrome. The proposed signature scheme allows...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.