We propose a construction of general concatenatedcode that uses low-density parity check codes as component codes. This construction itself can also be considered as low-density parity-check code and decoded using Be...
详细信息
ISBN:
(纸本)9781479940509
We propose a construction of general concatenatedcode that uses low-density parity check codes as component codes. This construction itself can also be considered as low-density parity-check code and decoded using Belief Propagation algorithm. Performances of several decoders are compared;it's shown that this code can be efficiently decoded by proposed soft decoding algorithm or combining BP and proposed algorithm.
A code construction based on generalized concatenated codes is proposed for protection against device and block failures in storage systems. Low-complexity encoding and repair algorithms for the proposed codes are pre...
详细信息
ISBN:
(纸本)9781509043149
A code construction based on generalized concatenated codes is proposed for protection against device and block failures in storage systems. Low-complexity encoding and repair algorithms for the proposed codes are presented. This construction improves upon recently proposed STAIR codes in terms of performance and achievable code parameters.
In this paper, MobiX technology provides security for online services using mobile devices with a wide range of customers including governments, military, business enterprises, and scientific organization, and individ...
详细信息
ISBN:
(纸本)9781509058440
In this paper, MobiX technology provides security for online services using mobile devices with a wide range of customers including governments, military, business enterprises, and scientific organization, and individuals have been proposed. MobiX is a software security solution technology to enhance the networked mobile device trustworthiness, application integrity, preventing users from malware attacks. MobiX provides two authentication layers and two additional security layers in addition to the conventional username-password for mobile devices in a unique system design. MobiX is fully implemented by software;therefore, it can be quickly deployed into different legacy mobile devices. More importantly, the novel device authenticity is based on the one-way a keyless cryptographic hash function and on the generalized concatenated code Physically Unclonable Function (GCCPUF) to effectively protect the users from different attack vectors such as insiders, spoofing attack, or identity theft attacks. On the other hand, the app authenticity prevents malware and app-tempering cybersecurity attacks via an efficient and secure remote attestation protocol. The comprehensive protection architecture of MobiX would enable M-commerce with superior security capabilities compared with the existing solutions.
An upper bound on frame error rate (FER) for generalizedconcatenated convolutional codes (GCCC's) with iterative decoding is presented. The GCCC is a generalized concatenated code which consists of an inner binar...
详细信息
An upper bound on frame error rate (FER) for generalizedconcatenated convolutional codes (GCCC's) with iterative decoding is presented. The GCCC is a generalized concatenated code which consists of an inner binary convolutional code and outer Reed-Solomon codes. The FER bound is derived from the average weight enumerator of the inner code. We fan optimize the configuration of the outer code since the FER bound can be easily computed. Some optimum outer code profiles will be shown. The results show that combination of GCCC and iterative decoding attains fairly small frame error probability (P-B similar or equal to 10(-13), E-b/N-o = 6 dB) With relatively simple component code (16-state convolutional code and Reed-Solomon code of length 32).
暂无评论