In this paper, we introduce h(x) fibonacci p-numbers polynomials and a new fibonacci Q(p,h)(x) matrix for h(x) fibonacci p-numbers polynomials where p(> 0) is integer and h(x)(> 0) is a polynomial with real coef...
详细信息
In this paper, we introduce h(x) fibonacci p-numbers polynomials and a new fibonacci Q(p,h)(x) matrix for h(x) fibonacci p-numbers polynomials where p(> 0) is integer and h(x)(> 0) is a polynomial with real coefficients. Thereby, we discuss various properties of Q(p,h)(x) matrix and the coding theory followed from the Q(p,h)(x) matrix. We establish the relations among the code matrix elements for p(> 0) is integer and h(x)(> 0). We also show that the relations, among the code matrix elements for h(x) = m(> 0), coincide with the relations among the code matrix elements for coding theory on the m-extension of the fibonacci p-numbers. The relations among the code matrix elements for h(x) = 1, coincide with the generalized relations among the code matrix elements for fibonacci coding theory. In general, correct ability of this method, which is independent of h(x), increases as p increases but h(x) being a polynomial, improves the cryptography protection.
A new class of matrices is introduced for use in error control coding. This extends previous results on the class of fibonacci error correcting codes. For a given integer p, a (p + 1) x (p + 1) binary matrix M-p is gi...
详细信息
A new class of matrices is introduced for use in error control coding. This extends previous results on the class of fibonacci error correcting codes. For a given integer p, a (p + 1) x (p + 1) binary matrix M-p is given whose nonzero entries are located either on the superdiagonal or the last row of the matrix. The matrices M-p(n) and M-p(-n), the nth power of M-p and its inverse, are employed as the encoding and decoding matrices, respectively. It is shown that for sufficiently large n, independent of the message matrix M, relations exist among the elements of the encoded matrix E = M x M-p(n). These relations play a key role in the error detection and correction.
Propagation delay across long on-chip buses is significant when adjacent wires are transitioning in opposite direction (i.e., crosstalk transitions) as compared to transitioning in the same direction. By exploiting Fi...
详细信息
Propagation delay across long on-chip buses is significant when adjacent wires are transitioning in opposite direction (i.e., crosstalk transitions) as compared to transitioning in the same direction. By exploiting fibonacci number system, we propose a family of fibonacci coding techniques for crosstalk avoidance, relate them to some of the existing crosstalk avoidance techniques, and show how the encoding logic of one technique can be modified to generate codewords of the other technique.
fibonacci coding is based on fibonacci numbers and was defined by Apostolico and Fraenkel (1987) [1]. fibonacci numbers are generated by the recurrence relation F(i) = F(i-1) + F(i-2) for all i >= 2 with initial te...
详细信息
fibonacci coding is based on fibonacci numbers and was defined by Apostolico and Fraenkel (1987) [1]. fibonacci numbers are generated by the recurrence relation F(i) = F(i-1) + F(i-2) for all i >= 2 with initial terms F(0) = 1, F(1) = 1. Variations on the fibonacci coding are used in source coding as well as in cryptography. In this paper, we have extended the table given by Thomas In We have found that there is no Gopala-Hemachandra code for a particular positive integer n and for a particular value of a a is an element of Z. We conclude that for n = 1, 2.3, 4, Gopala-Hemachandra code exists for a = -2, -3 ..... -20. Also, for 1 <= n <= 100, there is at most m consecutive not available (N/A) Gopala-Hemachandra code in GH(-(4+m)) column where 1 <= in <= 16. And, for 1 <= n <= 100, as in increases the availability of Gopala-Hemachandra code decreases in GH-(4+m) column where 1 <= m <= 16. C) 2010 Elsevier Inc. All rights reserved.
A new notion, called generalized k-sequence, which is a sequence satisfying a second order linear recurrence with coefficients depending on two independent parameters, is introduced. The set of such sequences contains...
详细信息
A new notion, called generalized k-sequence, which is a sequence satisfying a second order linear recurrence with coefficients depending on two independent parameters, is introduced. The set of such sequences contains almost all previously known extensions of the fibonacci and Lucas sequences. Properties of the generalized k-sequence are derived, and a new coding-decoding method arising from such sequences is developed.
In this paper, we consider the series of Tribonacci numbers. Thereby, we introduce a new coding theory called Tribonacci coding theory based on Tribonacci numbers and show that in the simplest case, the correct abilit...
详细信息
In this paper, we consider the series of Tribonacci numbers. Thereby, we introduce a new coding theory called Tribonacci coding theory based on Tribonacci numbers and show that in the simplest case, the correct ability of this method is 99.80% whereas the correct ability of the fibonacci coding/decoding method is 93.33%.
Reliability of modern multicore and many-core chips is tightly coupled with the reliability of their on-chip networks. Communication channels in current Network-on-Chips (NoCs) are extremely susceptible to crosstalk f...
详细信息
ISBN:
(纸本)9781538622544
Reliability of modern multicore and many-core chips is tightly coupled with the reliability of their on-chip networks. Communication channels in current Network-on-Chips (NoCs) are extremely susceptible to crosstalk faults. In this work, we propose a set of rules for generating classes of crosstalk free coding systems to protect communication channels in NoCs against crosstalk faults. Codewords generated through these rules are free of '101' and '010' bit patterns, which are the main sources of crosstalk faults in NoC communication channels. The proposed rules determine: (1) the weights of different bit positions in a coding system to reach crosstalk free codings, and (2) how the coding might be utilized in an NoC to prevent crosstalk generating bit patterns in NoC channels. Using the proposed set of rules, designers can obtain coding systems which are crosstalk free for any widths of communication channels. Compared to conventional Forbidden Pattern Free (FPF) systems, the proposed methodology is able to provide unique representation to any input values at the lower bound of the codeword lengths. Analyses show that the proposed rules, along with the proposed encoding/decoding mechanisms, are effective in preventing forbidden pattern coding systems for network-on-chips of any arbitrary channel width.
暂无评论