The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, frame error rate (FER) performance of enhanced verification-based decoding algorithm (EVA) is investigated for packet-based low-density parity-check (LDPC) codes over binary symmetric channel (BSC). By taking the false verification into account, a recursive statistical model is proposed to analyze the FER performance based on the packet-level analysis. Simulation results demonstrate...
Advanced microcontroller bus architecture (AMBA) protocol family provides metric-driven verification of protocol compliance, enabling comprehensive testing of interface intellectual property (IP) blocks and system-on-chip (SoC) designs. The AMBA advanced extensible interface 4 (AXI4) update to AMBA AXI3 includes the following: support for burst lengths up to 256 beats, updated write response requirements,...
Due to rapid and continuous technology scaling, faults in semiconductor memories (and ICs in general) are becoming pervasive and weak rather than strong, a weak fault is a fault that escape the test program (because it does not cause an error/system failure). However, multiple weak faults may cause an error during the application. Components with weak faults which fail at board and system level are...
In order to improve the quality of H.264 video transmission in wireless networks, a data hiding based adaptive error recovery approach is proposed in this paper. With this approach, the important data for each macroblock (MB) of the H.264 intra-coded I frame are extracted adaptively at the encoder and embedded into the RTP header of the next frame. At the decoder, if the important data for a corrupted...
In the digital communication systems, due to the random interference from the outside, digital code may be distorted during the transmission, so the receiver can't judge correctly, it makes the communication systems' BER increases greatly and affects the quality of communication. The target of this thesis is to design the encoding and decoding of Hamming code by VHDL language to elaborate how hamming...
This paper describes a 32×32b 4-read 2-write ported register file in 65nm CMOS. A single-ended read cell using pass gate is proposed, which supports a static read access on the read bit line. This read scheme avoids switching power when successive “0” or “1” emerges on the read bit line. An inverter isolator is added in read port, which improves the read static noise margin (SNM) dramatically. The...
Wireless sensor networks (WSN) is becoming large-scale. It's meaningful to gather sensor data quickly and efficiently. In this paper, we present a new approach to collect sensor data by distributed rateless coding. Rateless codes, such as Luby Transform (LT) codes have been proved possessing a very good property that receivers can decode all k original packets from arbitrary k(1+ε) encoded packets...
This paper considers maximum a posteriori (MAP) decoding of the maximum transition run (MTR) codes, over two-head digital magnetic recording system. Decoding is based on Bayesian algorithm and computes a posteriori log-likelihood ratios (LLR) from codewords of the MTR code. In this paper we present simulation results for performance of the joint soft detection-decoding of a concatenation of MTR code...
A serial concatenated scheme for Overlapped Code Division Multiplexing (OvCDM) system is proposed, characterized in that one or more OvCDM codes are as component codes in serial concatenated OvCDM to make up such a concatenated code with higher spectrum efficiency. The serial concatenated OvCDM uses iterative decoding algorithm based on LOG-MAP Algorithm with soft input soft ouput (SISO). As the simulation...
In this work, we propose a novel algorithm to combat the clipping noise in Interleave-division multiple access (IDMA) which inherits a peak-to-average power ratio (PAPR) problem especially in large number of multiple accesses. Clipping transmission is efficiently applied to reduce the PAPR to cause the clipping noise which is a weak tradeoff [1][2] to its performance. The proposed algorithm consists...
Reversible data hiding can be classified into two major research branches, one is by use of the histogram of original image, named the H scheme, and the other is by manipulating pixel relations between adjacent pixels, called the difference expansion (DE) scheme. Both schemes have their own advantages and drawbacks, but the inherent characteristics of original image are seldom considered in existing...
Digital watermarking has been an effective means for copyright protection and digital rights management (DRM). One of the current trends for researches in this field would focus on reversible data hiding. Considering the ease of implementation and employing the inherent characteristics of original images, we propose our reversible data hiding algorithm with the rhombus relationships of original pixels...
In this paper, a modified a posteriori probability (APP) based algorithm for the decoding of low- density parity-check (LDPC) codes is proposed. The modified APP-based algorithm utilizes an additional processing in the bit nodes to improve the accuracy instead of the check nodes normalization performed in normalized APP-based algorithm. The modified APP- based algorithm yields desirable trade-off between...
in this paper, we theoretically derive the suitable normalized factor of normalized BP-based algorithm of LDPC decoding in 802.11n system. To be specific, we compute 1.15, 1.25, 1.3, 1.35 as the suitable normalized factors with regard to R=1/2, R=2/3, R=3/4, R=5/6 code in 802.11n system respectively. These factors can compensate for the performance loss in UMP BP-based algorithm. By analyzing the...
This paper describes a new relaying scheme to reduce overhead of LT coded networks. The most popular degree distribution of LT codes is robust soliton distribution (RSD) which has low decoding complexity and decoding failure probability. This paper proposes a relaying scheme that makes degree distribution of encoding symbol at the sink equal to RSD, under the assumption that the each source generates...
LDPC codes are very powerful error correction codes for Bit-interleaved coded modulation with iterative decoding (BICM-ID) scheme. In this paper, an improved extrinsic information feedback algorithm based on Gaussian approximation is investigated for LDPC coded BICM-ID system. This method can alleviate the correlation of extrinsic information during iterative processing and thus make the extrinsic...
An improved expanding window fountain code for unequal error protection is proposed in this paper. For expanding window fountain (EWF) codes, the increased performance of more important bits (MIB) is achieved at the cost of decreased performance of less important bits (LIB). On the basis of EWF codes, the proposed method uses the expanding window to cover all the input information symbols and alter...
The digital baseband part is the core of UHF RFID reader, its functions and features make direct impact on the reader's performance. So this paper presents the design and FPGA Verification of digital baseband system for UHF RFID reader based on ISO 18000–6b protocol. The digital baseband system consists of two parts: transmitter and receiver, which including frame header processing module, Manchester...
Finding good puncturing patterns for rate-compatible non-binary LDPC codes are considered over additive white Gaussian noise (AWGN) channels in this paper. We first study several popular puncturing schemes for binary LDPC codes and generalize them to non-binary LDPC codes, where the effects of short cycles in Tanner graph are rarely investigated. By carefully studying the impacts of short cycles when...
To solve the problem of the low speech signal quality on the FH channels with wideband rejective interference, the performance optimization of CVSD coding in the digital FH system was studied. A new CVSD demodulation arithmetic was designed based on the principle of traditional CVSD system. Then the rule for measuring the quality of speech signal was offered and presented the simulation method of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.