The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a hybrid multimode Bose Chaudhuri Hocquenghem (BCH) encoder for reducing the input length of Syndrome calculation (SC) based on re-encoding approach. In previous re-encoding approaches, a conventional BCH encoder with long generator polynomials is used as a remainder operator to reduce the input length of SC. However, the input length is still large since long polynomial is used...
Minutiae points are the most commonly used as well as accurate feature extraction method of fingerprint recognition system. Using biometrics for person identification is a growing field in many areas, which requires storage of database called template. Biometric system is vulnerable to attack. To reduce this drawback, cryptosystem is combined with biometric. Most common cryptosystem for fingerprint...
Error correcting code (ECC) is an essential method in protection of NAND Flash memories. Complexity of it is increasing rapidly with the increment of error correction capability. Traditionally, the software implementation of ECC which has less cost and high flexibility is nearly ignored due to its inefficiency. This situation can be changed by design of faster software-based ECC scheme. We have found...
This paper deal with the simulation and application of DVB channel coding on multimedia DSP development board uses Nexperia processor. The application provides the protection against errors during the transmission of real digital video by the transmission channel model in baseband. Applied codes present FECs protection (forward error correction codes - RS code, convolutional code, interleaving) and...
This paper proposes a novel approach for efficiently evaluating regular path queries over provenance graphs of workflows that may include recursion. The approach assumes that an execution g of a workflow G is labeled with query-agnostic reachability labels using an existing technique. At query time, given g, G and a regular path query R, the approach decomposes R into a set of subqueries R1, …, Rk...
The creation of Ultra-Wideband (UWB) radio platform has allowed the development of high bit-rate Wireless USB. Reed-Solomon (RS) code is employed in order to improve decoding at the receiver offering good reliability performance in the mobile environment. This paper presents shorten RS (23, 17) code solutions for Wireless USB system encoding/decoding needs. The result is tested from simulation in...
The most of the modern hand held communicating devices rely on forward error correction techniques for their proper functioning. Convolutional coding and Viterbi decoding is one of the forward error correction technique used in most of the communication applications. This paper investigates the impact of code rates on the performance of hard decision Viterbi decoder. In this paper different rates...
Utilization of error-correction coding scheme in contemporary communication system enhances sufficient redundancy which in turn increases the immunity to deal with the channel impairments. Proper adjustment of interleaver size and iteration leads to considerable improvement in BER performance of Turbo code under AWGN channel condition. In this paper, an optimized Asymmetric Turbo code has been proposed...
BCH code for correcting distributive errors has been widely used in Nand Flashes with data-based mobile systems around the world, and its decoding process is often followed by Chien search, which calculates the roots of a polynomial in finite fields by substitution and testing. Usually, BCH decoding can be accelerated by parallel syndrome computation and Chien search. In the past years the parallel...
We show how Gabidulin codes can be list decoded by using an iterative parametrization approach. For a given received word, our decoding algorithm processes its entries one by one, constructing four polynomials at each step. This then yields a parametrization of interpolating solutions for the data so far. From the final result a list of all codewords that are closest to the received word with respect...
Reed-Solomon codes are widely used to provide reliable communication, as they are well known for their high data correction rates. However, techniques that best optimize hardware area as well as signal propagation delays are needed in today's applications. In this work, two techniques are investigated and implemented using a hardware description language, synthesized to a XUPV5-LX110t development...
In this paper, we present a new basis of polynomial over finite fields of characteristic two and then apply it to the encoding/decoding of Reed-Solomon erasure codes. The proposed polynomial basis allows that h-point polynomial evaluation can be computed in O(hlog2(h)) finite field operations with small leading constant. As compared with the canonical polynomial basis, the proposed basis improves...
This paper designed and accomplished a codec system of the cyclic code. The encoding system was based on the principle of dividing circuit and the decoding system was based on the principle of Meggitt decoder. There are three main steps in the error correction system which designed for the cyclic code. First, the three binary information codes can be encoded into a group of seven binary codes by using...
In this paper, a view point of classification of linear codes based on algebraic structure and Local Cyclic Codes is presented. Linear codes are divided into two types (structural and non-structural); almost all these codes are used widely in practice. Local Cyclic Codes are described in relation with other linear codes. These codes are constructed on decompositions of polynomial ring according to...
In this study, the performance of tracking and data relay satellite (TDRS) communication system multiple access (MA) service is analyzed. Firstly, in order to eliminate multiple access interference, a multiuser detector based on minimum mean square error (MMSE) and artificial fish swarm algorithm (AFSA) is explored. The result of MMSE and its modified formations are used as the initial values of artificial...
Future Free Space Optical (FSO) communication systems have the potential of communicating data at very high rates with very high levels of integrity over distances of up to a few kilometers (for terrestrial links). This technology has also been a candidate for setting up very high speed (∲3 Gbps) and highly reliable (BER ∲10−9) communication links between satellites in geo-synchronous orbits and ground...
Biometric cryptosystems have been applied to secure secret keys for encryption and digital signatures by means of biometric traits, e.g., Fingerprint, face, etc., where the fuzzy vault (FV) mechanism has been extensively employed. Recently, the authors proposed a FV system based on the offline signature images, so that digitized documents can be secured with the embedded handwritten signatures. However,...
Cryptography is the backbone for the security systems. The main challenge in use of the Cryptosystems is maintaining the confidentiality of the cryptographic key. A Cryptosystem which encrypts the data using biometric features improves the security of the data and overcomes the problems of key management and key confidentiality. Fuzzy Vault Scheme proposed by Juels and Sudan [1] binds the secret key...
The triple-error-correcting binary Golay code has been used in DNA and communication systems. Recently, an algebraic decoding of the Golay code has been proposed by an unusual general error locator polynomials (GELP). This paper utilizes the interpolation method to obtain a new unusual GELP. Simulation results show that the Golay decoder using the presented unusual GELP significantly reduces the area...
Secret sharing is a technique that can distribute partial secret information (also called 'shares') to a specific group member. These individual shares are of no use on their own, but they can reconstruct the original secret information when the members collect all of the shares. In this paper, we proposed a novel, polynomial-based, secret sharing scheme using the absolute moment block truncation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.