+ a anhn. h 2
|
|
- Berenice McBride
- 6 years ago
- Views:
Transcription
1 NEW MAJORITY-LOGIC DECODABLE CODES By C. L. CHEN Summary.-A method of the construction of majority-logic decodable codes is presented. Many of the codes constructed are more efficient than any other comparable majority-logic decodable codes previously known. Introduction.-Majority-logic decodable codes are attractive for errorcontrol in data transmission because of their simplicity in implementation. Since Massey introduced the concept of orthogonal parity-check sums in 963 and Rudolph constructed the class of finite geometry codes in 964, a lot of effort has been expended on the construction of majority-logic decodable codes and their decoding schemes. Many important results have been obtained [ -6] In general the decoding of finite geometry codes is considered to be simpler than that of other types of codes. However, the efficiency of finite geometry codes is generally lower than the well-known Bose Chaudhuri-Hocquenghem codes. Thus the construction of efficient majoritylogic decodable codes is an important problem. Recently several authors have generalized the construction of finite geometry codes [6-9], The generalized codes are majority-logic decodable, In addition, many of these codes are more efficient than the original finite geometry codes. In this paper the construction method of linear codes proposed in [o] is used to construct new majority-logic decodable binary codes. Many of these codes constructed are more efficient than any other comparable majority-logic decodable codes previously found including the generalized finite geometry codes. For examples, the new code of length 8 with 69 information digits and a majority-logic decodable distance of 6 has five more information digits than the best majority-logic decodable codes previously found with the same code length and distance, and the new code of length 5 with 44 information digits and a majority-logic decodable distance of 6 has 9 more information digits than the best comparable majority-logic decodable codes previously known. Some of the codes constructed are shown in a table. It is also shown that a special class of the new codes are cyclic codes. Throughout this paper binary codes will be assumed. The readers are assumed to be familiar with linear codes and cyclic codes. Majority-Logic Decoding.-A binary (n,k) linear code of length n with k information digits is a k-dimensional subspace of an n-dimensional vector space over the binary field GF(). Let~= (a,a,,an) be a transmitted code word, E = (r,r,,rn) be a received vector. Define! = (e,e,,en) as the error vector. Then E = ~ +! Leth= (h,h,,hn) be a vector in the null space of the code space. Then the scalar product of~ and his a h a h + a h anhn This work was supported in part by NSF Grant GK-4879 and in part by the Joint services Electronics Program under contract DAAB-7-7-C-59. Dr. Chen is with the Coordinated Science Laboratory, University of Illinois.
2 since a is a code word. r h The scalar product of rand his (~ +!).!; e h () Thus a vector h of the null space of a code forms a parity-check sum that checks on the sum of the values of the error digits at those positions corresponding to the nonzero components of h. Let I be the set of integers corresponding to the nonzero components of h. Since each component of his either zero or one, the parity-check sum of () can be written ass = _E.h. = z.:: e. (la) Now suppose that sums can be formed by a set of J vectors in for a binary linear code the following J taking the scalar products of a received the null space. sl z.:: e. + z.:: e.. Sz z.:: e. + z.:: e. parity-check vector with SJ z.:: ei + z.:: e. J () where the integers in I,I,,IJ are all distinct. Notice that ei appears in every check sum for, and ei appears in at most one of the J check sums for ifi The set of the J check sums is said to be orthogonal on the sums' = Z.:: e. If the number of errors in the received vector is. less than or equal to J/, then the value of s' can be assumed to be if more than J/ of the sts are, and assumed to be O otherwise. Once the value of s' is obtained, s' can be considered a new parity check sum and added to the set of the existing parity check sums. If a set of J check sums orthogonal on a new sum, say S, can be formed from the enlarged set of parity-check sums, then the value of Scan be determined by the majoritylogic decision rule described above. Again, S becomes a new check sum and is added to the set of the existing check sums. If this procedure can be continued until a set of J check sums orthogonal on a single error digit is formed, then the value of the error digit can be determined. The code is said ~o be majority-logic decodable with majority decodable distance d = J+l if every error digit can be determined in this way. Note that d may not be the true minimum distance of the code. In the following sections (n,k,d) denotes a binary linear code of length n with k information digits and a majority-logic decodable distance of d. Construction of New Majority-logic Decodable Codes.-Let c be an (n,k,d ) majority-logic decodable code and c be an (n,k,d ) majoritylogic decodable code. The new code C is defined by C = [zjz = (x,x+y), xec, yecz} The length of code C is n, and the number of information digits is k +k In the following it is shown that code C can be majority logic decoded up to distanced= min(dz,d) Thus d = dz if dz= d. The generator matrix G of code C can be depicted as follows
3 G where G and G are the generator matrices of c and c, respectively. A row vector in G is either a vector of G repeated once or a vector of G. Let H and H be the parity check matrices of c and C respectively. Then the parity check matrix Hof code C is H = Let R = (r,r,,rn,r,,rn) = R+R be a received vector corresponding to the input code word Z = (x,x+y), where R = (r rn), R = (r rn), and xec, yec The error vector E = (e eln e e n) = R-Z can be expressed as E = (E,E ), where E = (e en), E = (e,,e n) Thus R = x+e and R = x+y+e For a vector in H there is a vector ii\ H which is the vector in H repeated once. Thus for a parity check sum S = ifrei in code c, there is a parity check sum S' = ~ (e.+e.) in codec. Therefore, if a set of J = d-l orthogonal check sums on Scan be formed in c, a set of J orthogonal check sums on s' can be formed inc. Following the majoritylogic decoding procedure for code C, the values of (e i+e i), i=l,,,n can be determined provided that the number of errors is less than_.r equal to J/. Since H is a submatrix of H, a set of J orthogonal check sums can be formed in each decoding step for code C. Suppose that the following set of J orthogonal check sums is formed. sl ~ e + S ~ e + ~ e ~ e S3l ~ e + ~ e ier li J Since (ei+ei) has been determined for i orthogonal check sums can be formed. s' ~ e + ~ e. 8 I ~ e + ~ e. sl + L (e+e.) 8 I L e. + L e. ier. S, =.L eli + ~ e. Ji ei ie 3,,n, the following J + The set of J + check sums in (3) and (4) are orthogonal on i~i e i. The value of L e. is determined according to the usual majority-8gic decision rulg. Following the decoding procedure for code C, a set of (3) (4)
4 J + orthogonal check sums can always be formed. Thus, the values of eli i =,,n can be determined provided that the number of errors is less than or equal to min((j /),(J+/)). Once e i is determined, e i can be determined from the check sum e i+ei for i =,,,n. Therefore-, code C is majority-logic decodable up to distanced= min(d,d ). Some new majority-logic decodable codes of length 8 and 5 constructed are shown in the Table. For those codes that have ID)re information digits than comparable codes previously discovered the difference is shown in the last column. For example, (8,3,3) code has ID)re information digits than the (8,9,3) Reed-Muller code. TABLE. Some new majo~ity-logic decodable codes. Remarks C n k d C k d C n k d 64,4,6 7,3 8,3,3 64,37, 3, 8,5, +c 64,45,8,6 8,67,6 +3c 64,45,8 4,6 8,69, ,57,4 45,8 8,,8 +3c 56,45,64 9,8 5,54,8 +Sc 56,94,3 45,64 5,4,64 C 56,9,6 95,3 5,86,3 + 56,9,6 93,3 5,84,3 +loc 56,3,8 9,6 5,44,6 +9c 56,47,4 3,8 5,47,8 C Cyclic Codes.-If c and C codes are cyclic codes, and c is a subcode of c, then code C constructed in the last section is also a cyclic code. A cyclic code is specified by the roots of its generator polynomia Let Q,Ql,,Qls be the set of roots of the generator polynomial g (x) of code c, and Ql,Q,,QIJ, be the set of roots of the generator polynomial g (x) of code C, where J,~s, and QI~=. That is, g (x)=(x-a)(x"') (X-Ct's), and g(x)=(x-a )(x-' ) (x-a,). Then the parity check matrix of code C is Qll ~ H QI s QI s n QI s The columns of H can be permuted to become the following matrix:
5 H' Q' s n Q' s 3 Q' s Now consider the null space c' of H'. Let (a,a,a,,a n-l) be a vector of C'. Then and i =,,.,s i =,,.,f, Thus ',',,O's are roots of the polynomial a(x) = a +a x+a x +.. +a n_ x n-l corresponding to the vector (a,a,..,a n-l), and ',',...,O'i, are roots of a x+a 3 x +.. +a n_ x n-l = a'(x)x, where a'(x) is the formal derivative of a(x). In oth~r words, ',',,.,O';, are repeated roots of a(x). Therefore, a polynomi~l in the null space of H' is a multiple of the polynomial g(x)=(x-a) (x-a) (x-a;,) (x-a;,+) (x-as). The null space of H' is a cyclic code of length n whose generator polynomial is g(x). This code is equivalent to the original code C. Most of the codes shown in the Table can be put into cyclic form. If codes C and C are punctured with digits, they become cyclic codes with distance one less than the original distance. If C is a subcode of c, then C is a cyclic code. For example, let C be the (55,3,7) cyclic code and C be the (55,9,5) cyclic code. Then C is a (5,44,4) cyclic code. Those codes in the Table that can be put into cyclic form are marked with c in the last column. Conclusions.-Using the construction method in [o] we have constructed new majority-logic decodable codes. Many of these codes constructed are more efficient than the best comparable codes previously discovered. In addition, many of the new codes constructed are cyclic codes. The results reported in this paper should encourage one to search further for more efficient majority-logic decodable codes. There may exist majority-logic decodable codes with efficiency competitive with BCH codes. References [] J. L. Massey, Threshold Decoding, MIT Press, Mass., 963. [] L. D. Rudolph, "Geometric Configuration and Majority-Logic Decodable Codes," MEE Thesis, University of Oklahoma, Norman, Oklahoma, 964.
6 [3] E. J. Weldon, Jr., ''Euclidean Geometry Cyclic Codes," Proc. of Symeosium of Combinatorial Mathematics at the University of North Carolina, Chapel Hill, 967. [4] E. J. Weldon, Jr., "Some Results on Majority-Logic Decoding," Chapter 8, Error Correcting Codes, edited by Mann, John Wiley and Sons, N.Y., 968. [ 5] E. J. Weldon, Jr., "New Generalizations of the Reed-Muller Codes - Part II," IEEE Trans., IT-4, 99-6, 968. [6] T. Kasami, s. Lin and w. w. Peterson, "New Generalizations of the Reed-Muller Codes - Part I," IEEE Trans., IT-4, 89-99, 968. [ 7] D. K. Chow, "A Geometric Approach to Coding Theory with Application to Information Retrieval," Report R-368, CSL, Univ. of Illinois, Urbana, 967. [8] J. M, Goethals and P, Delsarte, "On a Class of Majority-Logic Decodable Cyclic Codes," IEEE Trans., IT-4, 8-89, 968. [9] K.J.C. Smith, ''Majority Decodable Codes Derived from Finite Geometries," Memo No. 56, Dept. of Statist. Inst., Univ. of North Carolina, Chapel Hill, 967. [] P. Delsarte, J.M. Goethals andf. J. Macwilliams, "On Generalized Reed-Muller Codes and Their Relatives," Information and Control, Vo 6, No. 5, 43-44, 97. [ ] T. Kasami and S. Lin, "On Majority-Logic Decoding for Duals of Primitive Polynomial Codes," IEEE Trans., IT-7, 33-33, 97. [] w. w. Peterson and E. J. Weldon, Jr., Error-Correcting Codes, Edition II, MIT Press, Mass., 97. [ 3] R. L. Townsend and E. J. Weldon, Jr., "Self-Orthogonal Quasi-Cyclic Codes," IEEE Trans., IT-3, 83-95, 967. [4] C. L. Chen, "Note on Majority-Logic Decoding of Finite Geometry Codes," IEEE Trans., IT-8, , 97. [5] L. D. Rudolph and w. E. Robbins, "One-Step Weighted-Majority Decoding, IEEE Trans., IT-8, , 97. [6] L. D. Rudolph and C.R.P. Hartmann, ''Decoding by Sequential Code Reduction," Report to be published, Syracuse University, 97. [7] P. Delsarte, "A Geometric Approach to a Class of Cyclic Codes," Journal of Combinatorial Theory, 6, , 969. [8] s. Lin and E. J. Weldon, "Multifold Euclidean Geometry Codes," Report to be published, University of Hawaii, 97. [ 9] C.R.P. Hartmann and L. D. Rudolph, "Generalized Finite-Geometry Codes," Proc. of the Tenth Allerton Conference on Circuit and Systems Theory, Univ. of Illinois, 97. [] N.J.A. Sloane and D, S. Whitehead, "New Family of Single-Error Correcting Codes," IEEE Trans., IT-6, No. 6, pp , November 97.
- 1 - Association Schemes. Orthogonal Arrays and Codes from Non-degenerate Quadrics and Hermitian Varieties in Finite Projective Geometries.
- 1 - Association Schemes. Orthogonal Arrays and Codes from Non-degenerate Quadrics and Hermitian Varieties in Finite Projective Geometries. I.M. aiakravarti Department of Statistics University of North
More informationUnlabeled equivalence for matroids representable over finite fields
Unlabeled equivalence for matroids representable over finite fields November 16, 2012 S. R. Kingan Department of Mathematics Brooklyn College, City University of New York 2900 Bedford Avenue Brooklyn,
More informationFault Tolerant Parallel Filters Based On Bch Codes
RESEARCH ARTICLE OPEN ACCESS Fault Tolerant Parallel Filters Based On Bch Codes K.Mohana Krishna 1, Mrs.A.Maria Jossy 2 1 Student, M-TECH(VLSI Design) SRM UniversityChennai, India 2 Assistant Professor
More informationComparative Performance Analysis of Block and Convolution Codes
Comparative Performance Analysis of Block and Convolution Codes Manika Pandey M.Tech scholar, ECE DIT University Dehradun Vimal Kant Pandey Assistant Professor/ECE DIT University Dehradun ABSTRACT Error
More informationThe Extended Quadratic Residue Code is the only (48; 24; 12) Self-Dual Doubly-Even Code
Brock University Department of Computer Science The Extended Quadratic Residue Code is the only (48; 24; 12) Self-Dual Doubly-Even Code Sheridan K. Houghten, C.W.H. Lam, L.H. Thiel, and J.A. Parker Technical
More informationFormally Self-Dual Codes Related to Type II Codes
Formally Self-Dual Codes Related to Type II Codes Koichi Betsumiya Graduate School of Mathematics Nagoya University Nagoya 464 8602, Japan and Masaaki Harada Department of Mathematical Sciences Yamagata
More informationDepartment of Statistics Chapel Hill, N. C.
UNIV ltsity OF NORTH CAROLINA Department of Statistics Chapel Hill, N. C. Mathematical Sciences Directorate Air Force Office of Scientific Research Washington 25, D. C. AFOSR Report TN - 591241 ON SOME
More informationForward Error Correction Codes
Appendix 6 Wireless Access Networks: Fixed Wireless Access and WLL Networks Ð Design and Operation. Martin P. Clark Copyright & 000 John Wiley & Sons Ltd Print ISBN 0-471-4998-1 Online ISBN 0-470-84151-6
More informationAN EFFICIENT DESIGN OF VLSI ARCHITECTURE FOR FAULT DETECTION USING ORTHOGONAL LATIN SQUARES (OLS) CODES
AN EFFICIENT DESIGN OF VLSI ARCHITECTURE FOR FAULT DETECTION USING ORTHOGONAL LATIN SQUARES (OLS) CODES S. SRINIVAS KUMAR *, R.BASAVARAJU ** * PG Scholar, Electronics and Communication Engineering, CRIT
More informationCyclic and Quasi-Cyclic LDPC Codes: New Developments
1 Cyclic and Quasi-Cyclic LDPC Codes: New Developments Qin Huang, Qiuju Diao, Shu Lin and Khaled Abdel-Ghaffar Email: {qinhuang,qdiao, shulin, ghaffar}@ucdavisedu Department of Electrical and Computer
More informationCapability CHIN-LONG CHEN. generalized Hamming code over GF(16) can accommodate. only 60 data bits. The generalized Hamming code cannot detect
IEEE TRANSACTIONS ON COMPUTERS, VOL. c-32, NO. 7, JULY 1983 Error-Correcting Codes with Byte Error-Detection Capability CHIN-LONG CHEN 615 Abstract-Single error-correcting and double error-detecting codes
More informationDesign Single and Multiple Errors Correction Block Codes
Design Single and Multiple Errors Correction Block Codes Zahraa Raad Mayoof Hajiyat Faculty of Engineering Technology & Built Environment, Department of Electrical and Electronic Engineering, B.Eng (Hons)
More informationPerformance study and synthesis of new Error Correcting Codes RS, BCH and LDPC Using the Bit Error Rate (BER) and Field-Programmable Gate Array (FPGA)
IJCSNS International Journal of Computer Science and Network Security, VOL.16 No.5, May 2016 21 Performance study and synthesis of new Error Correcting Codes RS, BCH and LDPC Using the Bit Error Rate (BER)
More informationHDL IMPLEMENTATION OF SRAM BASED ERROR CORRECTION AND DETECTION USING ORTHOGONAL LATIN SQUARE CODES
HDL IMPLEMENTATION OF SRAM BASED ERROR CORRECTION AND DETECTION USING ORTHOGONAL LATIN SQUARE CODES (1) Nallaparaju Sneha, PG Scholar in VLSI Design, (2) Dr. K. Babulu, Professor, ECE Department, (1)(2)
More informationIntroduction to Mathematical Programming IE406. Lecture 20. Dr. Ted Ralphs
Introduction to Mathematical Programming IE406 Lecture 20 Dr. Ted Ralphs IE406 Lecture 20 1 Reading for This Lecture Bertsimas Sections 10.1, 11.4 IE406 Lecture 20 2 Integer Linear Programming An integer
More informationLinear Block Codes. Allen B. MacKenzie Notes for February 4, 9, & 11, Some Definitions
Linear Block Codes Allen B. MacKenzie Notes for February 4, 9, & 11, 2015 This handout covers our in-class study of Chapter 3 of your textbook. We ll introduce some notation and then discuss the generator
More informationPierre A. Humblet* Abstract
Revised March 1980 ESL-P-8 0 0 GENERALIZATION OF HUFFMAN CODING TO MINIMIZE THE PROBABILITY OF BUFFER OVERFLOW BY Pierre A. Humblet* Abstract An algorithm is given to find a prefix condition code that
More informationArithmetic in a Finite Field
MATHEMATICS OF COMPUTATION, VOLUME 35, NUMBER 152 OCTOBER 198, PAGES 1353-1359 Arithmetic in a Finite Field By Michael Willett * Abstract. An algorithm for realizing finite field arithmetic is presented.
More informationA geometric non-existence proof of an extremal additive code
A geometric non-existence proof of an extremal additive code Jürgen Bierbrauer Department of Mathematical Sciences Michigan Technological University Stefano Marcugini and Fernanda Pambianco Dipartimento
More informationSMALL DISTANCE CODES FOR HEADER ERROR DETECTION IN ATM NETWORKS
SMALL DISTANCE CODES FOR HEADER ERROR DETECTION IN ATM NETWORKS Tony Antonio Universitas Pancasila, Jakarta Jl. Srengseng Sawah Jagakarsa, Jakarta 12640 tony.antonio@yahoo.com Abstrak On transmission links
More informationOn the Spherical code (4, ρ, 9) 1
1 On the Spherical code (4, ρ, 9) 1 D. V. Zinoviev dzinov@iitp.ru V. A. Zinoviev zinov@iitp.ru A.A. Kharkevich Institute for Problems of Information Transmission, Moscow, Russia Abstract. A well known
More informationON THE CONSTRUCTION OF ORTHOGONAL ARRAYS
Hacettepe Journal of Mathematics and Statistics Volume 31 (2002), 45 51 ON THE CONSTRUCTION OF ORTHOGONAL ARRAYS Hülya Bayrak and Aslıhan Alhan Received 04. 10. 2001 Abstract In this study, the geometric
More informationFPGA IMPLEMENTATION OF A NEW BCH DECODER USED IN DIGITAL VIDEO BROADCASTING - SATELLITE - SECOND GENERATION (DVB-S2)
FPGA IMPLEMENTATION OF A NEW BCH DECODER USED IN DIGITAL VIDEO BROADCASTING - SATELLITE - SECOND GENERATION (DVB-S2) 1* EL HABTI EL IDRISSI ANAS, 1, 2 EL GOURI RACHID, 3 AHMED LICHIOUI, 1 HLOU LAAMARI
More informationTHE DESIGN OF STRUCTURED REGULAR LDPC CODES WITH LARGE GIRTH. Haotian Zhang and José M. F. Moura
THE DESIGN OF STRUCTURED REGULAR LDPC CODES WITH LARGE GIRTH Haotian Zhang and José M. F. Moura Department of Electrical and Computer Engineering Carnegie Mellon University, Pittsburgh, PA 523 {haotian,
More informationError Correcting Codes
Error Correcting Codes 2. The Hamming Codes Priti Shankar Priti Shankar is with the Department of Computer Science and Automation at the Indian Institute of Science, Bangalore. Her interests are in Theoretical
More informationGraph Adjacency Matrix Automata Joshua Abbott, Phyllis Z. Chinn, Tyler Evans, Allen J. Stewart Humboldt State University, Arcata, California
Graph Adjacency Matrix Automata Joshua Abbott, Phyllis Z. Chinn, Tyler Evans, Allen J. Stewart Humboldt State University, Arcata, California Abstract We define a graph adjacency matrix automaton (GAMA)
More informationA Connection between Network Coding and. Convolutional Codes
A Connection between Network Coding and 1 Convolutional Codes Christina Fragouli, Emina Soljanin christina.fragouli@epfl.ch, emina@lucent.com Abstract The min-cut, max-flow theorem states that a source
More informationError Detecting and Correcting Code Using Orthogonal Latin Square Using Verilog HDL
Error Detecting and Correcting Code Using Orthogonal Latin Square Using Verilog HDL Ch.Srujana M.Tech [EDT] srujanaxc@gmail.com SR Engineering College, Warangal. M.Sampath Reddy Assoc. Professor, Department
More informationA New Non-Iterative Decoding Algorithm for the Erasure Channel : Comparisons with Enhanced Iterative Methods
SUBMITTED TO ISIT 2005 ON 31 JANUARY 2005 1 arxiv:cs/0503006v1 [cs.it] 2 Mar 2005 A New Non-Iterative Decoding Algorithm for the Erasure Channel : Comparisons with Enhanced Iterative Methods J. Cai, C.
More information4. Simplicial Complexes and Simplicial Homology
MATH41071/MATH61071 Algebraic topology Autumn Semester 2017 2018 4. Simplicial Complexes and Simplicial Homology Geometric simplicial complexes 4.1 Definition. A finite subset { v 0, v 1,..., v r } R n
More informationLOW-density parity-check (LDPC) codes are widely
1460 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 53, NO 4, APRIL 2007 Tree-Based Construction of LDPC Codes Having Good Pseudocodeword Weights Christine A Kelley, Member, IEEE, Deepak Sridhara, Member,
More informationThe Encoding Complexity of Network Coding
The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network
More informationAlgebraic Topology: A brief introduction
Algebraic Topology: A brief introduction Harish Chintakunta This chapter is intended to serve as a brief, and far from comprehensive, introduction to Algebraic Topology to help the reading flow of this
More informationPRIME FACTOR CYCLOTOMIC FOURIER TRANSFORMS WITH REDUCED COMPLEXITY OVER FINITE FIELDS
PRIME FACTOR CYCLOTOMIC FOURIER TRANSFORMS WITH REDUCED COMPLEXITY OVER FINITE FIELDS Xuebin Wu, Zhiyuan Yan, Ning Chen, and Meghanad Wagh Department of ECE, Lehigh University, Bethlehem, PA 18015 PMC-Sierra
More informationA Method for Construction of Orthogonal Arrays 1
Eighth International Workshop on Optimal Codes and Related Topics July 10-14, 2017, Sofia, Bulgaria pp. 49-54 A Method for Construction of Orthogonal Arrays 1 Iliya Bouyukliev iliyab@math.bas.bg Institute
More informationApplication of Two-dimensional Periodic Cellular Automata in Image Processing
International Journal of Computer, Mathematical Sciences and Applications Serials Publications Vol. 5, No. 1-2, January-June 2011, pp. 49 55 ISSN: 0973-6786 Application of Two-dimensional Periodic Cellular
More informationOrthogonal Latin Square Configuration for
52 [5] P. J. Klass, "Multiplex system to be tested on B-," Aviat. Week Space Technol., pp. 37-4, Mar. 5, 973. [6] K. L. Peterson and R. S. Babin, "Integrated reliability and safety analysis of the DC-
More informationFAULT TOLERANT SYSTEMS
FAULT TOLERANT SYSTEMS http://www.ecs.umass.edu/ece/koren/faulttolerantsystems Part 6 Coding I Chapter 3 Information Redundancy Part.6.1 Information Redundancy - Coding A data word with d bits is encoded
More informationSome Contributions to Incidence Geometry and the Polynomial Method
Some Contributions to Incidence Geometry and the Polynomial Method Anurag Bishnoi Department of Mathematics Ghent University https://anuragbishnoi.wordpress.com/ Promoter: Prof. Dr. Bart De Bruyn Outline
More informationMaths for Signals and Systems Linear Algebra in Engineering. Some problems by Gilbert Strang
Maths for Signals and Systems Linear Algebra in Engineering Some problems by Gilbert Strang Problems. Consider u, v, w to be non-zero vectors in R 7. These vectors span a vector space. What are the possible
More informationLINEAR CODES WITH NON-UNIFORM ERROR CORRECTION CAPABILITY
LINEAR CODES WITH NON-UNIFORM ERROR CORRECTION CAPABILITY By Margaret Ann Bernard The University of the West Indies and Bhu Dev Sharma Xavier University of Louisiana, New Orleans ABSTRACT This paper introduces
More informationMDS (maximum-distance separable) codes over large
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 55, NO 4, APRIL 2009 1721 Cyclic Lowest Density MDS Array Codes Yuval Cassuto, Member, IEEE, and Jehoshua Bruck, Fellow, IEEE Abstract Three new families of
More information6. Concluding Remarks
[8] K. J. Supowit, The relative neighborhood graph with an application to minimum spanning trees, Tech. Rept., Department of Computer Science, University of Illinois, Urbana-Champaign, August 1980, also
More informationExtended and generalized weight enumerators
Extended and generalized weight enumerators Relinde Jurrius Ruud Pellikaan Eindhoven University of Technology, The Netherlands International Workshop on Coding and Cryptography, 2009 1/23 Outline Previous
More information1-GENERATOR QUASI-CYCLIC CODES
Jrl Syst Sci & Complexity (2007) 20: 554 561 1-GENERATOR QUASI-CYCLIC CODES Junying PEI Xuejun ZHANG Received: 16 June 2005 Abstract This paper discusses the enumeration of 1-generator quasi-cyclic codes
More informationEach copy of any part of a JSTOR transmission must contain the same copyright notice that appears on the screen or printed page of such transmission.
Convex Programming with Set-Inclusive Constraints and Applications to Inexact Linear Programming Author(s): A. L. Soyster Source: Operations Research, Vol. 21, No. 5 (Sep. - Oct., 1973), pp. 1154-1157
More informationCapacity-Approaching Low-Density Parity- Check Codes: Recent Developments and Applications
Capacity-Approaching Low-Density Parity- Check Codes: Recent Developments and Applications Shu Lin Department of Electrical and Computer Engineering University of California, Davis Davis, CA 95616, U.S.A.
More informationMATH3016: OPTIMIZATION
MATH3016: OPTIMIZATION Lecturer: Dr Huifu Xu School of Mathematics University of Southampton Highfield SO17 1BJ Southampton Email: h.xu@soton.ac.uk 1 Introduction What is optimization? Optimization is
More informationApplMath Lucie Kárná; Štěpán Klapka Message doubling and error detection in the binary symmetrical channel.
ApplMath 2015 Lucie Kárná; Štěpán Klapka Message doubling and error detection in the binary symmetrical channel In: Jan Brandts and Sergej Korotov and Michal Křížek and Karel Segeth and Jakub Šístek and
More informationREGULAR GRAPHS OF GIVEN GIRTH. Contents
REGULAR GRAPHS OF GIVEN GIRTH BROOKE ULLERY Contents 1. Introduction This paper gives an introduction to the area of graph theory dealing with properties of regular graphs of given girth. A large portion
More informationConstrained Types and their Expressiveness
Constrained Types and their Expressiveness JENS PALSBERG Massachusetts Institute of Technology and SCOTT SMITH Johns Hopkins University A constrained type consists of both a standard type and a constraint
More informationImplementation and Analysis of an Error Detection and Correction System on FPGA
Implementation and Analysis of an Error Detection and Correction System on FPGA Constantin Anton, Laurenţiu Mihai Ionescu, Ion Tutănescu, Alin Mazăre, Gheorghe Şerban University of Piteşti, Romania Abstract
More informationFPGA Implementation of Binary Quasi Cyclic LDPC Code with Rate 2/5
FPGA Implementation of Binary Quasi Cyclic LDPC Code with Rate 2/5 Arulmozhi M. 1, Nandini G. Iyer 2, Anitha M. 3 Assistant Professor, Department of EEE, Rajalakshmi Engineering College, Chennai, India
More informationError Correction Using Extended Orthogonal Latin Square Codes
International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 9, Number 1 (2016), pp. 55-62 International Research Publication House http://www.irphouse.com Error Correction
More informationOn the Performance Evaluation of Quasi-Cyclic LDPC Codes with Arbitrary Puncturing
On the Performance Evaluation of Quasi-Cyclic LDPC Codes with Arbitrary Puncturing Ying Xu, and Yueun Wei Department of Wireless Research Huawei Technologies Co., Ltd, Shanghai, 6, China Email: {eaglexu,
More informationA Particular Type of Non-associative Algebras and Graph Theory
A Particular Type of Non-associative Algebras and Graph Theory JUAN NÚÑEZ, MARITHANIA SILVERO & M. TRINIDAD VILLAR University of Seville Department of Geometry and Topology Aptdo. 1160. 41080-Seville SPAIN
More informationON SOME METHODS OF CONSTRUCTION OF BLOCK DESIGNS
ON SOME METHODS OF CONSTRUCTION OF BLOCK DESIGNS NURNABI MEHERUL ALAM M.Sc. (Agricultural Statistics), Roll No. I.A.S.R.I, Library Avenue, New Delhi- Chairperson: Dr. P.K. Batra Abstract: Block designs
More informationCHAPTER 7. Copyright Cengage Learning. All rights reserved.
CHAPTER 7 FUNCTIONS Copyright Cengage Learning. All rights reserved. SECTION 7.1 Functions Defined on General Sets Copyright Cengage Learning. All rights reserved. Functions Defined on General Sets We
More informationH. W. Kuhn. Bryn Mawr College
VARIANTS OF THE HUNGARIAN METHOD FOR ASSIGNMENT PROBLEMS' H. W. Kuhn Bryn Mawr College The author presents a geometrical modelwhich illuminates variants of the Hungarian method for the solution of the
More informationChip Design for Turbo Encoder Module for In-Vehicle System
Chip Design for Turbo Encoder Module for In-Vehicle System Majeed Nader Email: majeed@wayneedu Yunrui Li Email: yunruili@wayneedu John Liu Email: johnliu@wayneedu Abstract This paper studies design and
More informationInternational Journal of Multidisciplinary Research and Modern Education (IJMRME) Impact Factor: 6.725, ISSN (Online):
COMPUTER REPRESENTATION OF GRAPHS USING BINARY LOGIC CODES IN DISCRETE MATHEMATICS S. Geetha* & Dr. S. Jayakumar** * Assistant Professor, Department of Mathematics, Bon Secours College for Women, Villar
More informationWORD LEVEL FINITE FIELD MULTIPLIERS USING NORMAL BASIS
WORD LEVEL FINITE FIELD MULTIPLIERS USING NORMAL BASIS 1 B.SARGUNAM, 2 Dr.R.DHANASEKARAN 1 Assistant Professor, Department of ECE, Avinashilingam University, Coimbatore 2 Professor & Director-Research,
More informationTAGUCHI TECHNIQUES FOR 2 k FRACTIONAL FACTORIAL EXPERIMENTS
Hacettepe Journal of Mathematics and Statistics Volume 4 (200), 8 9 TAGUCHI TECHNIQUES FOR 2 k FRACTIONAL FACTORIAL EXPERIMENTS Nazan Danacıoğlu and F.Zehra Muluk Received 0: 0: 200 : Accepted 14: 06:
More informationSparse Hypercube 3-Spanners
Sparse Hypercube 3-Spanners W. Duckworth and M. Zito Department of Mathematics and Statistics, University of Melbourne, Parkville, Victoria 3052, Australia Department of Computer Science, University of
More informationAlgebraic Graph Theory- Adjacency Matrix and Spectrum
Algebraic Graph Theory- Adjacency Matrix and Spectrum Michael Levet December 24, 2013 Introduction This tutorial will introduce the adjacency matrix, as well as spectral graph theory. For those familiar
More informationCS321: Computer Networks Error Detection and Correction
CS321: Computer Networks Error Detection and Correction Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in Error Detection and Correction Objective: System must
More informationEfficient Majority Logic Fault Detector/Corrector Using Euclidean Geometry Low Density Parity Check (EG-LDPC) Codes
Efficient Majority Logic Fault Detector/Corrector Using Euclidean Geometry Low Density Parity Check (EG-LDPC) Codes 1 U.Rahila Begum, 2 V. Padmajothi 1 PG Student, 2 Assistant Professor 1 Department Of
More informationThe absence of efficient dual pairs of spanning trees in planar graphs
The absence of efficient dual pairs of spanning trees in planar graphs T.R.Riley and W.P.Thurston Mathematics Department, 310 Malott Hall, Cornell University, Ithaca, NY 14853-4201, USA tim.riley@math.cornell.edu,
More informationConvex Optimization - Chapter 1-2. Xiangru Lian August 28, 2015
Convex Optimization - Chapter 1-2 Xiangru Lian August 28, 2015 1 Mathematical optimization minimize f 0 (x) s.t. f j (x) 0, j=1,,m, (1) x S x. (x 1,,x n ). optimization variable. f 0. R n R. objective
More informationWhat Types of ECC Should Be Used on Flash Memory?
What Types of ECC Should Be Used on Flash Memory? Application by Scott Chen 1. Abstract NOR Flash normally does not need ECC (Error-Correcting Code). On the other hand, NAND requires ECC to ensure data
More informationAchieving Reliable Digital Data Communication through Mathematical Algebraic Coding Techniques
International Journal of Pure and Applied Mathematical Sciences. ISSN 0972-9828 Volume 9, Number 2 (2016), pp. 183-190 Research India Publications http://www.ripublication.com Achieving Reliable Digital
More informationGraph Folding of Link Graph and Knot Graph
Graph Folding of Link Graph and Knot Graph Redman Al-Shamiri Assistant Professor of Algebra and Topological geometry Department of Mathematics, Ibb University AUTHORIZED BY AL-NASSER UNIVERSITY'S RESEARCH
More information4. Error correction and link control. Contents
//2 4. Error correction and link control Contents a. Types of errors b. Error detection and correction c. Flow control d. Error control //2 a. Types of errors Data can be corrupted during transmission.
More informationSingle error correction, double error detection and double adjacent error correction with no mis-correction code
This article has been accepted and published on J-STAGE in advance of copyediting. Content is final as presented. IEICE Electronics Express, Vol.* No.*,*-* Single error correction, double error detection
More informationstabilizers for GF(5)-representable matroids.
AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 49 (2011), Pages 203 207 Stabilizers for GF(5)-representable matroids S. R. Kingan Department of Mathematics Brooklyn College, City University of New York Brooklyn,
More informationDM545 Linear and Integer Programming. Lecture 2. The Simplex Method. Marco Chiarandini
DM545 Linear and Integer Programming Lecture 2 The Marco Chiarandini Department of Mathematics & Computer Science University of Southern Denmark Outline 1. 2. 3. 4. Standard Form Basic Feasible Solutions
More informationMinimum-Cost Spanning Tree. as a. Path-Finding Problem. Laboratory for Computer Science MIT. Cambridge MA July 8, 1994.
Minimum-Cost Spanning Tree as a Path-Finding Problem Bruce M. Maggs Serge A. Plotkin Laboratory for Computer Science MIT Cambridge MA 02139 July 8, 1994 Abstract In this paper we show that minimum-cost
More informationChapter 9 Graph Algorithms
Introduction graph theory useful in practice represent many real-life problems can be if not careful with data structures Chapter 9 Graph s 2 Definitions Definitions an undirected graph is a finite set
More informationCalculation of extended gcd by normalization
SCIREA Journal of Mathematics http://www.scirea.org/journal/mathematics August 2, 2018 Volume 3, Issue 3, June 2018 Calculation of extended gcd by normalization WOLF Marc, WOLF François, LE COZ Corentin
More informationLinear Convolutional Codes for Compound Channels*
INFORMATION AND CONTROL 19, 387-400 (1971) Linear Convolutional Codes for Compound Channels* SUDHAKAR M. REDDY Department of Electrical Engineering, University of Iowa, Iowa City, Iowa 52240 A class of
More informationEfficient Markov Chain Monte Carlo Algorithms For MIMO and ISI channels
Efficient Markov Chain Monte Carlo Algorithms For MIMO and ISI channels Rong-Hui Peng Department of Electrical and Computer Engineering University of Utah /7/6 Summary of PhD work Efficient MCMC algorithms
More informationarxiv: v1 [math.co] 15 Dec 2009
ANOTHER PROOF OF THE FACT THAT POLYHEDRAL CONES ARE FINITELY GENERATED arxiv:092.2927v [math.co] 5 Dec 2009 VOLKER KAIBEL Abstract. In this note, we work out a simple inductive proof showing that every
More informationNOTICE WARNING CONCERNING COPYRIGHT RESTRICTIONS: The copyright law of the United States (title 17, U.S. Code) governs the making of photocopies or
NOTICE WARNING CONCERNING COPYRIGHT RESTRICTIONS: The copyright law of the United States (title 17, U.S. Code) governs the making of photocopies or other reproductions of copyrighted material. Any copying
More informationA DH-parameter based condition for 3R orthogonal manipulators to have 4 distinct inverse kinematic solutions
Wenger P., Chablat D. et Baili M., A DH-parameter based condition for R orthogonal manipulators to have 4 distinct inverse kinematic solutions, Journal of Mechanical Design, Volume 17, pp. 150-155, Janvier
More information392D: Coding for the AWGN Channel Wednesday, March 21, 2007 Stanford, Winter 2007 Handout #26. Final exam solutions
92D: Coding for the AWGN Channel Wednesday, March 2, 27 Stanford, Winter 27 Handout #26 Problem F. (8 points) (Lexicodes) Final exam solutions In this problem, we will see that a simple greedy algorithm
More informationTable of Contents. Preface... vii Abstract... vii Kurzfassung... x Acknowledgements... xiii. I The Preliminaries 1
Preface............................................ vii Abstract............................................ vii Kurzfassung.......................................... x Acknowledgements......................................
More informationKevin Buckley
Kevin Buckley - 69 ECE877 Information Theory & Coding for Digital Communications Villanova University ECE Department Prof. Kevin M. Buckley Lecture Set 3 Convolutional Codes x c (a) (b) (,) (,) (,) (,)
More informationPerformance Analysis of Gray Code based Structured Regular Column-Weight Two LDPC Codes
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 11, Issue 4, Ver. III (Jul.-Aug.2016), PP 06-10 www.iosrjournals.org Performance Analysis
More informationChapter 4 Concepts from Geometry
Chapter 4 Concepts from Geometry An Introduction to Optimization Spring, 2014 Wei-Ta Chu 1 Line Segments The line segment between two points and in R n is the set of points on the straight line joining
More informationThe Matrix-Tree Theorem and Its Applications to Complete and Complete Bipartite Graphs
The Matrix-Tree Theorem and Its Applications to Complete and Complete Bipartite Graphs Frankie Smith Nebraska Wesleyan University fsmith@nebrwesleyan.edu May 11, 2015 Abstract We will look at how to represent
More informationThe Linear Cutwidth of Complete Bipartite and Tripartite Graphs
The Linear Cutwidth of Complete Bipartite and Tripartite Graphs Stephanie Bowles August 0, 00 Abstract This paper looks at complete bipartite graphs, K m,n, and complete tripartite graphs, K r,s,t. The
More informationDesign of Convolutional Codes for varying Constraint Lengths
Design of Convolutional Codes for varying Constraint Lengths S VikramaNarasimhaReddy 1, Charan Kumar K 2, Neelima Koppala 3 1,2 MTech(VLSI) Student, 3 Assistant Professor, ECE Department, SreeVidyanikethan
More informationBinary trees having a given number of nodes with 0, 1, and 2 children.
Binary trees having a given number of nodes with 0, 1, and 2 children. Günter Rote 13. August 1997 Zusammenfassung We give three combinatorial proofs for the number of binary trees having a given number
More informationAntimagic Labelings of Weighted and Oriented Graphs
Antimagic Labelings of Weighted and Oriented Graphs Zhanar Berikkyzy, Axel Brandt, Sogol Jahanbekam, Victor Larsen, Danny Rorabaugh October 7, 014 Abstract A graph G is k weighted list antimagic if for
More informationChapter 9 Graph Algorithms
Chapter 9 Graph Algorithms 2 Introduction graph theory useful in practice represent many real-life problems can be if not careful with data structures 3 Definitions an undirected graph G = (V, E) is a
More informationCheck-hybrid GLDPC Codes Without Small Trapping Sets
Check-hybrid GLDPC Codes Without Small Trapping Sets Vida Ravanmehr Department of Electrical and Computer Engineering University of Arizona Tucson, AZ, 8572 Email: vravanmehr@ece.arizona.edu David Declercq
More informationError-Correcting Codes
Error-Correcting Codes Michael Mo 10770518 6 February 2016 Abstract An introduction to error-correcting codes will be given by discussing a class of error-correcting codes, called linear block codes. The
More informationFull Fault Dictionary Storage Based on Labeled Tree Encoding
Full Fault Dictionary Storage Based on Labeled Tree Encoding Vamsi Boppana, Ismed Hartanto and W. Kent Fuchs Coordinated Science Laboratory University of Illinois at UrbanaChampaign Urbana, IL 6181 Abstract
More informationQuasi-Orthogonal Sequences for Code-Division Multiple-Access Systems
982 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 46, NO. 3, MAY 2000 Quasi-Orthogonal Sequences for Code-Division Multiple-Access Systems Kyeongcheol Yang, Member, IEEE, Young-Ky Kim, and P. Vijay Kumar,
More informationWINDING AND UNWINDING AND ESSENTIAL INTERSECTIONS IN H 3
WINDING AND UNWINDING AND ESSENTIAL INTERSECTIONS IN H 3 JANE GILMAN AND LINDA KEEN Abstract. Let G = A, B be a non-elementary two generator subgroup of Isom(H 2 ). If G is discrete and free and geometrically
More information