A new scheme for designing error detecting and correctingcodes around cellular automata (CA) is reported in this correspondence. A simple and efficient scheme for generating SEC-DED codes is presented which can also ...
详细信息
A new scheme for designing error detecting and correctingcodes around cellular automata (CA) is reported in this correspondence. A simple and efficient scheme for generating SEC-DED codes is presented which can also be extended for generating codes with higher distances. A CA-based hardware scheme for very fast decoding (and correcting) of the codewords is also reported.
Solving the error correcting code is an important goal with regard to communication theory. To reveal the error correcting code characteristics, several researchers have applied a statistical-mechanical approach to th...
详细信息
Solving the error correcting code is an important goal with regard to communication theory. To reveal the error correcting code characteristics, several researchers have applied a statistical-mechanical approach to this problem. In our research, we have treated the error correcting code as a Bayes inference framework. Carrying out the inference in practice, we have applied the NMF (naive mean field) approximation to the MPM (maximizer of the posterior marginals) inference, which is a kind of Bayes inference. In the field of artificial neural networks, this approximation is used to reduce computational cost through the substitution of stochastic binary units with the deterministic continuous value units. However, few reports have quantitatively described the performance of this approximation. Therefore, we have analyzed the approximation performance from a theoretical viewpoint, and have compared our results with the computer simulation.
Design of Cellular Automata (CA) based byte error correcting code analogous to extended Reed-Solomon code has been proposed in [1], [2]. This code has same restrictions on error correction as that of extended R-S code...
详细信息
Design of Cellular Automata (CA) based byte error correcting code analogous to extended Reed-Solomon code has been proposed in [1], [2]. This code has same restrictions on error correction as that of extended R-S code. In this paper a new design scheme has been reported for parallel implementation of CA based SbEC/DbED and DbEC/DbED code that is analogous to the conventional R-S code. Both the encoder and decoder of this code can be efficiently implemented with an array of CA (CAA) with high throughput. The design is ideally suited for high speed memory systems built with byte organized RAM chips. Extension of the scheme to detect/correct larger number of byte errors has also been reported. Throughput of the decoder to handle t byte errors (t less than or equal to 4) can be found to be substantially better than that of conventional R-S decoder. The proposed decoder provides a simple, modular and cost effective design that ideally suits for VLSI implementation.
The memristor-based resistive random access memory (ReRAM) has been emerged because of its beneficial properties such as non-volatility, high density, and process scalability. However, ReRAM also suffers from process ...
详细信息
ISBN:
(纸本)9781538679609
The memristor-based resistive random access memory (ReRAM) has been emerged because of its beneficial properties such as non-volatility, high density, and process scalability. However, ReRAM also suffers from process variation caused by down scaling of device size and operating voltage level. In this paper, we propose a new reliable ReRAM architecture with heterogeneous ECC-based subblock architecture focusing on reducing implementation overhead. Experimental results show that the proposed approach reduces the number of parity bits by 18.80 %, area by 20.43 %, respectively, and increases the code rate by 3.90 % compared to those of conventional homogeneous ECC scheme.
Biometric template protection is one of the most important issues in biometric authentication system. It is vital because once the biometric template is being attacked, the intruder could introduce him/her into the sy...
详细信息
ISBN:
(纸本)9781509037650
Biometric template protection is one of the most important issues in biometric authentication system. It is vital because once the biometric template is being attacked, the intruder could introduce him/her into the system without following the proper enrolment procedures. Previous related biometric template works have some limitations in terms of lower accuracy level and high correlations between templates. These two problems may lead to false accept attacks and cross-matching attacks on these templates. To mitigate these problems, this research aims to increase the accuracy level by reducing errors in biometric template and to reduce correlation between biometric templates by generating uncorrelated feature vectors to reduce error in biometric template in order to increase accuracy level and generate uncorrelated feature vectors. To reduce errors and to generate uncorrelated feature vectors, error correcting code (ECC) based on combination of LDPC and RS and Holistic-based Feature Extraction based on LDA, PCA and ICA are designed respectively. The proof of concept is tested on Iris biometric templates using X number of samples from the Y benchmark image repository. The results showed that the proposed template protection technique is able to increase accuracy level by A% and reduce correlation between biometric templates to B%. Thus, this technique is a viable and practical template protection technique without degrading the iris recognition performance.
We study a variety of spin systems with randomness in order to investigate the performance of the quantum error correcting codes. We show that the duality formalism is useful to search the locations of the critical po...
详细信息
We study a variety of spin systems with randomness in order to investigate the performance of the quantum error correcting codes. We show that the duality formalism is useful to search the locations of the critical points for the random spin systems, which gives Lis the clue to the exact values of the accuracy thresholds for the topological error correcting codes. (c) 2005 Elsevier B.V. All rights reserved.
A simulation framework based on a physical-layer based abstraction to predict physical layer performances and to compare different forward errorcorrecting (FEC) codes is presented. This framework is used to jointly d...
详细信息
ISBN:
(纸本)9781510630772
A simulation framework based on a physical-layer based abstraction to predict physical layer performances and to compare different forward errorcorrecting (FEC) codes is presented. This framework is used to jointly design interleaving and FEC schemes for free space optical link. A sub-class of regular Low-Density Parity-Check codes is shown to be an interesting alternative to current space communication standard for optical links that require low error floor and high decoder throughput. End-to-end simulations show the feasibility of error free link from a LEO satellite to a high complexity ground station at 25Gbits/s and from a LEO satellite to low complexity optical ground station at 10 Gbits/s. The proposed protection scheme is composed of FG LDPC code and a bit interleaver to span the burst of errors.
Digital watermarking is an effective and popular technique to discourage illegal copying and distribution of copyrighted digital content. In this paper, an idea for enhancing the robustness of extracted watermarks is ...
详细信息
ISBN:
(纸本)9781424408009
Digital watermarking is an effective and popular technique to discourage illegal copying and distribution of copyrighted digital content. In this paper, an idea for enhancing the robustness of extracted watermarks is proposed. The digital watermarking of multimedia is viewed as a communications problem in which the watermark must be transmitted and received through a channel. The channel includes distortions resulting from attacks. Watermark can be treated as a transmitted signal, while the destruction of attackers is regarded as a noise distortion in channel. error correcting code used in watermarking will have the feature that corrects errors of the extracted watermark automatically. The Golay code is used to detect and correct the errors of the extracted watermarks. The experimental results have demonstrated that the developed technique can survive subject to the JPEG lossy compression (up to 13.6% compression rate). As a consequence, the developed scheme has satisfied the basic requirements of watermarking such as robustness, capacity, and imperceptible.
We study a variety of spin systems with randomness in order to investigate the performance of the quantum error correcting codes. We show that the duality formalism is useful to search the locations of the critical po...
详细信息
We study a variety of spin systems with randomness in order to investigate the performance of the quantum error correcting codes. We show that the duality formalism is useful to search the locations of the critical points for the random spin systems, which gives Lis the clue to the exact values of the accuracy thresholds for the topological error correcting codes. (c) 2005 Elsevier B.V. All rights reserved.
In this paper we discuss a method for reducing the error propagation based on a combination of the error correcting code and the runlength limited code. When the runlength limited code and the error correcting code ar...
详细信息
In this paper we discuss a method for reducing the error propagation based on a combination of the error correcting code and the runlength limited code. When the runlength limited code and the error correcting code are used together, the runlength limited encoding is usually applied after the data have been encoded by the encoder of the error correcting code. However, error propagation generated in the data transmission channel can be substantially mitigated during the decoding of the runlength limited code if the runlength encoding is implemented first with subsequent implementation of the error correcting code. The method proposed in this paper consists of a periodic insertion of check symbols in the data sequence encoded first by the runlength limited code and then by the error correcting code. We also proposed a new runlength limited code suitable for the proposed combined method and evaluated its performance. (C) 2001 Scripta Technica.
暂无评论