SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET ISO 9001:2008 Certified Journal Page 404
Review paper on Reed Solomon (204,188) Decoder for Digital Video
Broadcasting – Terrestrial application
Snehal Jawanjal1, Shrikant Bhoyar2, Pooja Hatwar3, Rahul Sathawane4
1 Asst. Prof., Department of ETX, RGCER, Nagpur, Maharashtra, India
2 Asst. Prof., Department of ETX, RGCER, Nagpur, Maharashtra, India
3 M. Tech. Scholar, Department of ETX, RGCER, Nagpur, Maharashtra, India
4 Asst. Prof., Department of IT, RGCER, Nagpur, Maharashtra, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Reed-Solomon (RS) codes are commonly used
in the digital communication field due to their strong
capabilities to eliminate both random errors and burst
errors. In this paper, the encoding and decoding systems of a
(204, 188) Reed-Solomon code is being studied and
observed. Reed-Solomon codes are used to perform Forward
Error Correction. FEC encoders introduce redundancy in
data before it is transmitted. The redundant data (check
symbols) are transmitted along with the original data
through the channel. A Reed-Solomon decoder at the
receiver is used to recover any corrupted data This type of
error correction is widely used in data communications
applications such as hard disk and media storage (CD)
systems, Digital Video Broadcast (DVB) and Optical Carriers
(e.g. OC-192).
Key Words: Reed Solomon (RS), random errors, burst
errors, FEC, redundant data, Reed-Solomon decoder, DVB
1. INTRODUCTION
The concept of communication system is the sum of all the
systems and devices that are involved in information
transmission. Communication system can be generally
divided into two classes based on the different types of
signals that are transmitted. One is digital communication
system and the other is analog communication system.
Enjoying the benefit that it is amenable to both error
control and encryption, digital communication system is
more often used nowadays. In communication systems,
information is transmitted through physical media which
are channels. Since channels cannot avoid the interference
from the outside world, the transmitted information will
be distorted which ultimately results in errors in the
received information. Therefore, error control is employed
to help optimize the accuracy and reliability of the
transmission and advance the distortion resistance
capability of the channel. Error control is a method that
can detect and correct errors. Generally, there are two
patterns of error control: the first one is that once errors
are detected, the decoder automatically corrects these
errors based on certain rules; another method is that once
errors occur, instead of correcting the errors, the receiving
end sends a feedback signal to the transmitting end telling
it that errors occurred and requests that message to be
sent again.
1.2 Reed Solomon codes
Finite field or Galois field is an algebraic theory raised by
French mathematics genius Évariste Galois. Galois fields
are very important in coding theory. The Reed-Solomon
codes studied in this paper are based on finite fields. If the
number of elements on a field F is finite, this field is called
a finite field, or a Galois field. The number of elements is
called the order of the field. Galois field F = {0 1, 2, …, -1} is
a finite field with modulus p and order p and it can be
represented as GF (p). Number p is a prime number. A
polynomial over a field is a polynomial of which the
coefficients are the elements of a Galois field GF(p). The
polynomial over GF(p) is represented as
p(x) = + x+ + …. + ;
in which ϵ F, i = 0, 1, 2,…,p.
A Reed Solomon code is a block code, meaning that the
message to be transmitted is divided up into separate
blocks of data. Each block then has parity protection
information added to it to form a self-contained code
word. It is also a systematic code, which means that the
encoding process does not alter the message symbols and
the protection symbols are added as a separate part of the
block.
Also, a Reed Solomon code is a linear code(adding two
code words produces another code word) and is
cyclic(cyclically shifting the symbols of a code word
produces another code word). It belongs to the family of
Bose-Chaudhari-Hocquenghem(BCH) codes, but is
distinguished by having multi-bit symbols. Thus a Reed
Solomon code can be described as an (n,k) code, where n
is the block length in symbols and k is the number of
information symbols in the message.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET ISO 9001:2008 Certified Journal Page 405
2. THE RS ENCODER
The encoding procedures of RS codes are similar as the
encoding of general cyclic codes. Let the message bits M be
M = ( , ).
The information polynomial m(x) is
m(x) = + + .
The code word C is
C =( , , ).
The code word polynomial c(x) of the RS code is
c(x) = + +……. .
The generator matrix g(x) of the RS code is
g(x) = (x-α) (x- )…(x- ).
The encoding steps are
(1) Multiply the information polynomial m(x) by ;
(2) Divide m(x) by g(x) to obtain the remainder r(x),
i.e.
r(x) = m(x) modg(x);
(3) Derive code word polynomial c(x) through m(x) and
r(x), i.e.
c(x) = m(x) +r(x).
Through the above three steps, the code word of a RS code
is generated as
C = ( , , )
= ( ,…… , ,…… ).
The first k symbols are information symbols and the last
r=n-k symbols are parity check symbols. This algorithm is
called the time-domain algorithm of RS code and the code
obtained is called systematic code.
3. THE RS DECODER
The code word c(x) obtained after encoding will be
interfered when transmitted in the channel. Let the noise
be e(x), i.e. error pattern. It will be added onto c(x) and the
sum will be transmitted to the receiver. Let the polynomial
of the received vector be r(x), then r(x) = c(x) + e(x). The
expressions of c(x), e(x), and r(x) are given below
c (x) = + x + +……. .
e (x) = + x + +……. .
r (x) = + x + +……. .
The basic decoding theory of a RS code is to derive the
error pattern e(x) based on the received vector r(x), and
then obtain code word c(x) according to equation r(x) =
c(x) + e(x).
Decoding methods can be divided into two categories. One
is time domain decoding and the other is frequency
domain decoding. Time domain decoding is to locate the
errors based on the received vector and it does not need
transform calculation. Frequency domain decoding is to
obtain the error location by perform Fourier transform.
Since it is easier to apply, this dissertation employs time
domain decoding.
The steps of time domain decoding are described as
below:
1) Find out the syndrome s(x) and the key equation using
the received signal r(x).
2) Determine error location polynomial σ(x) and the
error-value evaluator polynomial ω(x) based on the
syndrome s(x).
3) Determine the error location number using Chien
search.
4) Evaluate error-value polynomial according to σ(x)
and .
5) Obtain the information sequence based on r(x) and .
3.1 Syndrome calculator
The first step in decoding the received symbol is to
determine the data syndrome. Here the input received
symbols are divided by the generator polynomial. The
result should be zero. The parity is placed in the codeword
to ensure that code is exactly divisible by the generator
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET ISO 9001:2008 Certified Journal Page 406
polynomial. If there is a remainder, then there are errors.
The remainder is called the syndrome. The syndromes can
then be calculated by substituting the 2t roots of the
generator polynomial g(x) into R(x). The syndrome
polynomial is generally represented as,
s(x) = + x + +……+
= (
Where, α is the primitive element.
If si = 0, the transmission is error-f ; f s≠0, s occurred in the
transmission, and the error pattern needs to be
determined to perform error correction
3.2 Error-Locator Polynomial
The next step, after the computing the syndrome
polynomial is to calculate the error values and their
respective locations. This stage involves the solving of the
2t syndrome polynomials, formed in the previous stage.
These polynomials have ‗v‘ unknowns, where v is the
number of unknown errors prior to decoding. If the
unknown locations are
( i1,i2,……iv, ) the error polynomial can be expressed as,
E(x) = + + …. +
Where Yl is the magnitude of the lth error at location il. If
Xl is the field element associated with the error location il,
then the syndrome coefficients are given by,
=
Where, j=1,2,….,2t. And Yl is the error value and Xl is the
error location of the lth error symbol. The expansion of
(4.8) gives the following set of 2t equations in the v
unknown error locations X1, X2, ....... Xv and ‗v‘ unknown
error magnitudes Y1 ,Y2 ,......Yv.
(x) = + + …. +
(x) = + + …. +
.
.
.
(x) = + + …. +
The above set of equations must have at least one solution
because of the way the syndromes are defined. This
solution is unique. Thus the decoder‘s task is to find the
unknowns given the syndromes. This is equivalent to the
problem in solving a system of non-linear equations.
Clearly, the direct solution of the system of nonlinear
equations is too difficult for large values of v. Instead,
intermediate variables can be computed using the
syndrome coefficients Sj from which the error locations,
X1, X2 ,......., Xv , can be determined. The error-locator
polynomial is introduced as
= + +…. + + 1
The polynomial is defined with roots at the error locations
−1 i.e Xl-1 for l=1,2,…v. The error location numbers l, X
indicate errors at locations il for l=1, 2, …v This can be
written as,
(x) = (1 - x ) (1 - x )…. (1 - x )
Where, Xl =αil
3.3 Chien Search
The roots obtained will now point to the error locations in
the received message. RS decoding generally employs the
Chien search scheme to implement the same. A number ‘n‘
is said to be a root of a polynomial, if the result of
substitution of its value in the polynomial evaluates to
zero. Chien Search is a brute force approach for guessing
the roots, and adopts direct substitution of elements in the
Galois field, until a specific i from i=0, 1,.., (n-1) is found
such that σ (αi) = 0 . In such a case αi is said to be the root
and the location of the error is evaluated as σ(x). Then the
number of zeros of the error locator polynomial σ(x) is
computed and is compared with the degree of the
polynomial. If a match is found the error vector is updated
and σ (x) is evaluated in all symbol positions of the
codeword. A mismatch indicates the presence of more
errors than can be corrected.
Paragraph comes content here. Paragraph comes content
here. Paragraph comes content here. Paragraph comes
content here. Paragraph comes content here. Paragraph
comes content here. Paragraph comes content here.
Paragraph comes content here. Paragraph comes content
here. Paragraph comes content here. Paragraph comes
content here. Paragraph comes content here.
4. Digital Video Broadcasting
Digital television (DTV) broadcasting is in the process of
migrating from analog to digital systems, with regions
around the world at different stages of adoption. Various
delivery systems are available for digital TV, but the main
ones are satellite, cable, terrestrial, and mobile. Each has a
variety of standards and derivatives that are either mature
or emerging. These standards aim to ensure
interoperability between different vendor’s equipment,
including the set-top boxes, cell phones, and other means
for DTV reception. The DVB-T system is the terrestrial
transmission system of the DVB standards. For error
protection, a concatenated forward error correction (FEC)
scheme is used. The randomized packets are encoded by
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET ISO 9001:2008 Certified Journal Page 407
the Reed-Solomon (R-S) Encoder using a (n, k) code;
where n is the block size and k is the number of
information symbols. In this case, n is 204 symbols and k is
188 symbols, and a symbol represents 8 bits. This means
that 16 check symbols are appended to the information
bytes. This code allows up to 8 symbols of data to be
corrupted and still be corrected, that is a total of 64 bits.
5.EXPECTED OUTCOME
In this paper an introduction to the theory of error
controls coding and fundamentals of finite field will be
presented. Then, the (204, 188) Reed Solomon encoder /
decoder systems is to be designed, simulated and verified
to detect the errors. We may observe the following
characteristics:
 Code length: n = 204.
 Information symbols: k = 188.
 Parity check symbols: r = n – k =16.
 Minimum distance: dmin = n – k + 1 = 17.
 Error correcting capability: t = 8
REFERENCES
[1] P.Sunitha ;G.V.Ujwala “ Implementation of Reed
Solomon Encoding Algorithm” International Research
Journal of Engineering and Technology (IRJET) e-ISSN:
2395-0056 Volume: 02 Issue: 06, Sep-2015 p-ISSN: 2395-
0072
[2] Aqib Al Azad and Md Imam Shahed, ―A Compact and
Fast FPGA Based Implementation of Encoding and
Decoding Algorithm Using Reed Solomon Codes‖,
International Journal of Future Computer and
Communication, vol.2, no. 6, pp.- 31-35, February 2014.
[3] Xiaojun Wu; Xianghui Shen; Zhibin Zeng “An improved
RS Encoding Algorithm” Consumer Electronics
Communications and Networks (CECNet), 2012 2nd
International Conference on Digital Object Identifier,
Page(s): 1648 – 1652.
[4]Yung-Kuei Lu; Ming-Der Shieh “Efficient Architecture
for Reed-Solomon Decoder” VLSI Design, Automation, and
Test (VLSI-DAT), 2012 International Symposium on Digital
Object Identifier, Page(s): 1 – 4.
[5]Al Azad, Minhazul. Huq, Iqbalur. Rahman Rokon
“Efficient Hardware Implementation of Reed Solomon
Encoder and Decoder in FPGA using Verilog” International
Conference on Advancements in Electronics and Power
Engineering (ICAEPE'2011) Bangkok Dec. 2011
[6] Hsie-Chia Chang, Chih-Yu Cheng, Shu-Hui Tsai, and
Chen-Yi Lee , “A (204,188) Reed-Solomon Decoder using
Decomposed Euclidean Algorithm”, Roc. 43rd IEEE
Midwest Symp. on Circmts and Systems, Lansing MI, Aug
8-2011, 200862.
[7] Richard Huynh, GE Ning & YANG Huazhong, “A Low
Power Error Detection in the Syndrome Calculator Block
for Reed-Solomon Codes: RS(204,188)”, TSINGHUA
SCIENCE AND TECHNOLOGY ISSNll1007-
0214ll09/19llpp474-477 Volume 14, Number 4, August
2009.
[8]Zhigang Ren; Dongping Yao “An Improved High-speed
RS Encoding Algorithm” Microwave, Antenna, Propagation
and EMC Technologies for Wireless Communications,
2009 3rd IEEE International Symposium on Digital Object
Identifier, Page(s): 521 – 523.
[9] Anne Franssens, “Analysis of Reed Solomon error
correcting codes on reconfigurable hardware”, Thesis
from University of Twente, Enschede, The Netherlands,
September 9, 2008.
[10] Priti Shankar, “Decoding Reed–Solomon Codes Using
Euclid’s Algorithm”, General article in Resonance, April
2007.
[11] “Digital Video Broadcasting (DVB); Framing
Structure, Channel Coding and Modulation for Digital
Terrestrial Television”, ETSI EN300 421, V1.5.1, Jun. 2004.
[12] Kim Hamilton,“Polynomial Codes over Certain Finite
Fields” by Irving Reed and Gustave Solomon, presented in
March 2003.
[13] C.K.P. Clarke, “Reed Solomon error correction”, R&D
White paper, July 2002.

More Related Content

What's hot

Convolutional Codes And Their Decoding
Convolutional Codes And Their DecodingConvolutional Codes And Their Decoding
Convolutional Codes And Their DecodingKakali Saharia
 
Error-Correcting codes: Application of convolutional codes to Video Streaming
Error-Correcting codes: Application of convolutional codes to Video StreamingError-Correcting codes: Application of convolutional codes to Video Streaming
Error-Correcting codes: Application of convolutional codes to Video StreamingFacultad de Informática UCM
 
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...Madhumita Tamhane
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
Blockchain Technology - Week 6 - Role of Cryptography in Blockchain
Blockchain Technology - Week 6 - Role of Cryptography in BlockchainBlockchain Technology - Week 6 - Role of Cryptography in Blockchain
Blockchain Technology - Week 6 - Role of Cryptography in BlockchainFerdin Joe John Joseph PhD
 
Digital Communication: Channel Coding
Digital Communication: Channel CodingDigital Communication: Channel Coding
Digital Communication: Channel CodingDr. Sanjay M. Gulhane
 
An Efficient Interpolation-Based Chase BCH Decoder
An Efficient Interpolation-Based Chase BCH DecoderAn Efficient Interpolation-Based Chase BCH Decoder
An Efficient Interpolation-Based Chase BCH Decoderijsrd.com
 
Defense Senior College on Error Coding presentation 4/22/2010
Defense Senior College on Error Coding presentation 4/22/2010Defense Senior College on Error Coding presentation 4/22/2010
Defense Senior College on Error Coding presentation 4/22/2010Felicia Fort, MBA
 
Cs8792 cns - Public key cryptosystem (Unit III)
Cs8792   cns - Public key cryptosystem (Unit III)Cs8792   cns - Public key cryptosystem (Unit III)
Cs8792 cns - Public key cryptosystem (Unit III)ArthyR3
 
Linear Block Codes
Linear Block CodesLinear Block Codes
Linear Block CodesNilaNila16
 
Linear block coding
Linear block codingLinear block coding
Linear block codingjknm
 
Tele4653 l11
Tele4653 l11Tele4653 l11
Tele4653 l11Vin Voro
 

What's hot (20)

Convolutional Codes And Their Decoding
Convolutional Codes And Their DecodingConvolutional Codes And Their Decoding
Convolutional Codes And Their Decoding
 
linear codes and cyclic codes
linear codes and cyclic codeslinear codes and cyclic codes
linear codes and cyclic codes
 
Error-Correcting codes: Application of convolutional codes to Video Streaming
Error-Correcting codes: Application of convolutional codes to Video StreamingError-Correcting codes: Application of convolutional codes to Video Streaming
Error-Correcting codes: Application of convolutional codes to Video Streaming
 
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
 
Basics of coding theory
Basics of coding theoryBasics of coding theory
Basics of coding theory
 
I Tlecture 13a
I Tlecture 13aI Tlecture 13a
I Tlecture 13a
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
Blockchain Technology - Week 6 - Role of Cryptography in Blockchain
Blockchain Technology - Week 6 - Role of Cryptography in BlockchainBlockchain Technology - Week 6 - Role of Cryptography in Blockchain
Blockchain Technology - Week 6 - Role of Cryptography in Blockchain
 
Digital Communication: Channel Coding
Digital Communication: Channel CodingDigital Communication: Channel Coding
Digital Communication: Channel Coding
 
Hamming codes
Hamming codesHamming codes
Hamming codes
 
BCH Codes
BCH CodesBCH Codes
BCH Codes
 
An Efficient Interpolation-Based Chase BCH Decoder
An Efficient Interpolation-Based Chase BCH DecoderAn Efficient Interpolation-Based Chase BCH Decoder
An Efficient Interpolation-Based Chase BCH Decoder
 
Defense Senior College on Error Coding presentation 4/22/2010
Defense Senior College on Error Coding presentation 4/22/2010Defense Senior College on Error Coding presentation 4/22/2010
Defense Senior College on Error Coding presentation 4/22/2010
 
Cs8792 cns - Public key cryptosystem (Unit III)
Cs8792   cns - Public key cryptosystem (Unit III)Cs8792   cns - Public key cryptosystem (Unit III)
Cs8792 cns - Public key cryptosystem (Unit III)
 
error control coding
error control coding error control coding
error control coding
 
Linear Block Codes
Linear Block CodesLinear Block Codes
Linear Block Codes
 
Multimedia Communication Lec02: Info Theory and Entropy
Multimedia Communication Lec02: Info Theory and EntropyMultimedia Communication Lec02: Info Theory and Entropy
Multimedia Communication Lec02: Info Theory and Entropy
 
Channel coding
Channel coding  Channel coding
Channel coding
 
Linear block coding
Linear block codingLinear block coding
Linear block coding
 
Tele4653 l11
Tele4653 l11Tele4653 l11
Tele4653 l11
 

Similar to Review paper on Reed Solomon (204,188) Decoder for Digital Video Broadcasting – Terrestrial application

Encoder for (7,3) cyclic code using matlab
Encoder for (7,3) cyclic code using matlabEncoder for (7,3) cyclic code using matlab
Encoder for (7,3) cyclic code using matlabSneheshDutta
 
Reed_Solomon_Implementation
Reed_Solomon_ImplementationReed_Solomon_Implementation
Reed_Solomon_Implementationramya c b
 
basicsofcodingtheory-160202182933-converted.pptx
basicsofcodingtheory-160202182933-converted.pptxbasicsofcodingtheory-160202182933-converted.pptx
basicsofcodingtheory-160202182933-converted.pptxupendrabhatt13
 
Performance Study of RS (255, 239) and RS (255.233) Used Respectively in DVB-...
Performance Study of RS (255, 239) and RS (255.233) Used Respectively in DVB-...Performance Study of RS (255, 239) and RS (255.233) Used Respectively in DVB-...
Performance Study of RS (255, 239) and RS (255.233) Used Respectively in DVB-...IJERA Editor
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Channel Coding .pptx
Channel Coding .pptxChannel Coding .pptx
Channel Coding .pptxMortadha96
 
Reed Solomon Coding For Error Detection and Correction
Reed Solomon Coding For Error Detection and CorrectionReed Solomon Coding For Error Detection and Correction
Reed Solomon Coding For Error Detection and Correctioninventionjournals
 
Belief Propagation Decoder for LDPC Codes Based on VLSI Implementation
Belief Propagation Decoder for LDPC Codes Based on VLSI ImplementationBelief Propagation Decoder for LDPC Codes Based on VLSI Implementation
Belief Propagation Decoder for LDPC Codes Based on VLSI Implementationinventionjournals
 
13-DataLink_02.ppt
13-DataLink_02.ppt13-DataLink_02.ppt
13-DataLink_02.pptWinterSnow16
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...ijceronline
 
Fault Tolerant Parallel Filters Based On Bch Codes
Fault Tolerant Parallel Filters Based On Bch CodesFault Tolerant Parallel Filters Based On Bch Codes
Fault Tolerant Parallel Filters Based On Bch CodesIJERA Editor
 
Design of arq and hybrid arq protocols for wireless channels using bch codes
Design of arq and hybrid arq protocols for wireless channels using bch codesDesign of arq and hybrid arq protocols for wireless channels using bch codes
Design of arq and hybrid arq protocols for wireless channels using bch codesIAEME Publication
 
Survey on Error Control Coding Techniques
Survey on Error Control Coding TechniquesSurvey on Error Control Coding Techniques
Survey on Error Control Coding TechniquesIJTET Journal
 
A novel technique for speech encryption based on k-means clustering and quant...
A novel technique for speech encryption based on k-means clustering and quant...A novel technique for speech encryption based on k-means clustering and quant...
A novel technique for speech encryption based on k-means clustering and quant...journalBEEI
 
FPGA Implementation of A New Chien Search Block for Reed-Solomon Codes RS (25...
FPGA Implementation of A New Chien Search Block for Reed-Solomon Codes RS (25...FPGA Implementation of A New Chien Search Block for Reed-Solomon Codes RS (25...
FPGA Implementation of A New Chien Search Block for Reed-Solomon Codes RS (25...IJERA Editor
 

Similar to Review paper on Reed Solomon (204,188) Decoder for Digital Video Broadcasting – Terrestrial application (20)

Encoder for (7,3) cyclic code using matlab
Encoder for (7,3) cyclic code using matlabEncoder for (7,3) cyclic code using matlab
Encoder for (7,3) cyclic code using matlab
 
Reed_Solomon_Implementation
Reed_Solomon_ImplementationReed_Solomon_Implementation
Reed_Solomon_Implementation
 
basicsofcodingtheory-160202182933-converted.pptx
basicsofcodingtheory-160202182933-converted.pptxbasicsofcodingtheory-160202182933-converted.pptx
basicsofcodingtheory-160202182933-converted.pptx
 
Performance Study of RS (255, 239) and RS (255.233) Used Respectively in DVB-...
Performance Study of RS (255, 239) and RS (255.233) Used Respectively in DVB-...Performance Study of RS (255, 239) and RS (255.233) Used Respectively in DVB-...
Performance Study of RS (255, 239) and RS (255.233) Used Respectively in DVB-...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Channel Coding .pptx
Channel Coding .pptxChannel Coding .pptx
Channel Coding .pptx
 
Reed Solomon Coding For Error Detection and Correction
Reed Solomon Coding For Error Detection and CorrectionReed Solomon Coding For Error Detection and Correction
Reed Solomon Coding For Error Detection and Correction
 
Belief Propagation Decoder for LDPC Codes Based on VLSI Implementation
Belief Propagation Decoder for LDPC Codes Based on VLSI ImplementationBelief Propagation Decoder for LDPC Codes Based on VLSI Implementation
Belief Propagation Decoder for LDPC Codes Based on VLSI Implementation
 
13-DataLink_02.ppt
13-DataLink_02.ppt13-DataLink_02.ppt
13-DataLink_02.ppt
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 
Data links
Data links Data links
Data links
 
rs_1.pptx
rs_1.pptxrs_1.pptx
rs_1.pptx
 
Fault Tolerant Parallel Filters Based On Bch Codes
Fault Tolerant Parallel Filters Based On Bch CodesFault Tolerant Parallel Filters Based On Bch Codes
Fault Tolerant Parallel Filters Based On Bch Codes
 
40120140505011
4012014050501140120140505011
40120140505011
 
Design of arq and hybrid arq protocols for wireless channels using bch codes
Design of arq and hybrid arq protocols for wireless channels using bch codesDesign of arq and hybrid arq protocols for wireless channels using bch codes
Design of arq and hybrid arq protocols for wireless channels using bch codes
 
Survey on Error Control Coding Techniques
Survey on Error Control Coding TechniquesSurvey on Error Control Coding Techniques
Survey on Error Control Coding Techniques
 
lect5.ppt
lect5.pptlect5.ppt
lect5.ppt
 
A novel technique for speech encryption based on k-means clustering and quant...
A novel technique for speech encryption based on k-means clustering and quant...A novel technique for speech encryption based on k-means clustering and quant...
A novel technique for speech encryption based on k-means clustering and quant...
 
FPGA Implementation of A New Chien Search Block for Reed-Solomon Codes RS (25...
FPGA Implementation of A New Chien Search Block for Reed-Solomon Codes RS (25...FPGA Implementation of A New Chien Search Block for Reed-Solomon Codes RS (25...
FPGA Implementation of A New Chien Search Block for Reed-Solomon Codes RS (25...
 
B0210714
B0210714B0210714
B0210714
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 

Recently uploaded (20)

Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 

Review paper on Reed Solomon (204,188) Decoder for Digital Video Broadcasting – Terrestrial application

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET ISO 9001:2008 Certified Journal Page 404 Review paper on Reed Solomon (204,188) Decoder for Digital Video Broadcasting – Terrestrial application Snehal Jawanjal1, Shrikant Bhoyar2, Pooja Hatwar3, Rahul Sathawane4 1 Asst. Prof., Department of ETX, RGCER, Nagpur, Maharashtra, India 2 Asst. Prof., Department of ETX, RGCER, Nagpur, Maharashtra, India 3 M. Tech. Scholar, Department of ETX, RGCER, Nagpur, Maharashtra, India 4 Asst. Prof., Department of IT, RGCER, Nagpur, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Reed-Solomon (RS) codes are commonly used in the digital communication field due to their strong capabilities to eliminate both random errors and burst errors. In this paper, the encoding and decoding systems of a (204, 188) Reed-Solomon code is being studied and observed. Reed-Solomon codes are used to perform Forward Error Correction. FEC encoders introduce redundancy in data before it is transmitted. The redundant data (check symbols) are transmitted along with the original data through the channel. A Reed-Solomon decoder at the receiver is used to recover any corrupted data This type of error correction is widely used in data communications applications such as hard disk and media storage (CD) systems, Digital Video Broadcast (DVB) and Optical Carriers (e.g. OC-192). Key Words: Reed Solomon (RS), random errors, burst errors, FEC, redundant data, Reed-Solomon decoder, DVB 1. INTRODUCTION The concept of communication system is the sum of all the systems and devices that are involved in information transmission. Communication system can be generally divided into two classes based on the different types of signals that are transmitted. One is digital communication system and the other is analog communication system. Enjoying the benefit that it is amenable to both error control and encryption, digital communication system is more often used nowadays. In communication systems, information is transmitted through physical media which are channels. Since channels cannot avoid the interference from the outside world, the transmitted information will be distorted which ultimately results in errors in the received information. Therefore, error control is employed to help optimize the accuracy and reliability of the transmission and advance the distortion resistance capability of the channel. Error control is a method that can detect and correct errors. Generally, there are two patterns of error control: the first one is that once errors are detected, the decoder automatically corrects these errors based on certain rules; another method is that once errors occur, instead of correcting the errors, the receiving end sends a feedback signal to the transmitting end telling it that errors occurred and requests that message to be sent again. 1.2 Reed Solomon codes Finite field or Galois field is an algebraic theory raised by French mathematics genius Évariste Galois. Galois fields are very important in coding theory. The Reed-Solomon codes studied in this paper are based on finite fields. If the number of elements on a field F is finite, this field is called a finite field, or a Galois field. The number of elements is called the order of the field. Galois field F = {0 1, 2, …, -1} is a finite field with modulus p and order p and it can be represented as GF (p). Number p is a prime number. A polynomial over a field is a polynomial of which the coefficients are the elements of a Galois field GF(p). The polynomial over GF(p) is represented as p(x) = + x+ + …. + ; in which ϵ F, i = 0, 1, 2,…,p. A Reed Solomon code is a block code, meaning that the message to be transmitted is divided up into separate blocks of data. Each block then has parity protection information added to it to form a self-contained code word. It is also a systematic code, which means that the encoding process does not alter the message symbols and the protection symbols are added as a separate part of the block. Also, a Reed Solomon code is a linear code(adding two code words produces another code word) and is cyclic(cyclically shifting the symbols of a code word produces another code word). It belongs to the family of Bose-Chaudhari-Hocquenghem(BCH) codes, but is distinguished by having multi-bit symbols. Thus a Reed Solomon code can be described as an (n,k) code, where n is the block length in symbols and k is the number of information symbols in the message.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET ISO 9001:2008 Certified Journal Page 405 2. THE RS ENCODER The encoding procedures of RS codes are similar as the encoding of general cyclic codes. Let the message bits M be M = ( , ). The information polynomial m(x) is m(x) = + + . The code word C is C =( , , ). The code word polynomial c(x) of the RS code is c(x) = + +……. . The generator matrix g(x) of the RS code is g(x) = (x-α) (x- )…(x- ). The encoding steps are (1) Multiply the information polynomial m(x) by ; (2) Divide m(x) by g(x) to obtain the remainder r(x), i.e. r(x) = m(x) modg(x); (3) Derive code word polynomial c(x) through m(x) and r(x), i.e. c(x) = m(x) +r(x). Through the above three steps, the code word of a RS code is generated as C = ( , , ) = ( ,…… , ,…… ). The first k symbols are information symbols and the last r=n-k symbols are parity check symbols. This algorithm is called the time-domain algorithm of RS code and the code obtained is called systematic code. 3. THE RS DECODER The code word c(x) obtained after encoding will be interfered when transmitted in the channel. Let the noise be e(x), i.e. error pattern. It will be added onto c(x) and the sum will be transmitted to the receiver. Let the polynomial of the received vector be r(x), then r(x) = c(x) + e(x). The expressions of c(x), e(x), and r(x) are given below c (x) = + x + +……. . e (x) = + x + +……. . r (x) = + x + +……. . The basic decoding theory of a RS code is to derive the error pattern e(x) based on the received vector r(x), and then obtain code word c(x) according to equation r(x) = c(x) + e(x). Decoding methods can be divided into two categories. One is time domain decoding and the other is frequency domain decoding. Time domain decoding is to locate the errors based on the received vector and it does not need transform calculation. Frequency domain decoding is to obtain the error location by perform Fourier transform. Since it is easier to apply, this dissertation employs time domain decoding. The steps of time domain decoding are described as below: 1) Find out the syndrome s(x) and the key equation using the received signal r(x). 2) Determine error location polynomial σ(x) and the error-value evaluator polynomial ω(x) based on the syndrome s(x). 3) Determine the error location number using Chien search. 4) Evaluate error-value polynomial according to σ(x) and . 5) Obtain the information sequence based on r(x) and . 3.1 Syndrome calculator The first step in decoding the received symbol is to determine the data syndrome. Here the input received symbols are divided by the generator polynomial. The result should be zero. The parity is placed in the codeword to ensure that code is exactly divisible by the generator
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET ISO 9001:2008 Certified Journal Page 406 polynomial. If there is a remainder, then there are errors. The remainder is called the syndrome. The syndromes can then be calculated by substituting the 2t roots of the generator polynomial g(x) into R(x). The syndrome polynomial is generally represented as, s(x) = + x + +……+ = ( Where, α is the primitive element. If si = 0, the transmission is error-f ; f s≠0, s occurred in the transmission, and the error pattern needs to be determined to perform error correction 3.2 Error-Locator Polynomial The next step, after the computing the syndrome polynomial is to calculate the error values and their respective locations. This stage involves the solving of the 2t syndrome polynomials, formed in the previous stage. These polynomials have ‗v‘ unknowns, where v is the number of unknown errors prior to decoding. If the unknown locations are ( i1,i2,……iv, ) the error polynomial can be expressed as, E(x) = + + …. + Where Yl is the magnitude of the lth error at location il. If Xl is the field element associated with the error location il, then the syndrome coefficients are given by, = Where, j=1,2,….,2t. And Yl is the error value and Xl is the error location of the lth error symbol. The expansion of (4.8) gives the following set of 2t equations in the v unknown error locations X1, X2, ....... Xv and ‗v‘ unknown error magnitudes Y1 ,Y2 ,......Yv. (x) = + + …. + (x) = + + …. + . . . (x) = + + …. + The above set of equations must have at least one solution because of the way the syndromes are defined. This solution is unique. Thus the decoder‘s task is to find the unknowns given the syndromes. This is equivalent to the problem in solving a system of non-linear equations. Clearly, the direct solution of the system of nonlinear equations is too difficult for large values of v. Instead, intermediate variables can be computed using the syndrome coefficients Sj from which the error locations, X1, X2 ,......., Xv , can be determined. The error-locator polynomial is introduced as = + +…. + + 1 The polynomial is defined with roots at the error locations −1 i.e Xl-1 for l=1,2,…v. The error location numbers l, X indicate errors at locations il for l=1, 2, …v This can be written as, (x) = (1 - x ) (1 - x )…. (1 - x ) Where, Xl =αil 3.3 Chien Search The roots obtained will now point to the error locations in the received message. RS decoding generally employs the Chien search scheme to implement the same. A number ‘n‘ is said to be a root of a polynomial, if the result of substitution of its value in the polynomial evaluates to zero. Chien Search is a brute force approach for guessing the roots, and adopts direct substitution of elements in the Galois field, until a specific i from i=0, 1,.., (n-1) is found such that σ (αi) = 0 . In such a case αi is said to be the root and the location of the error is evaluated as σ(x). Then the number of zeros of the error locator polynomial σ(x) is computed and is compared with the degree of the polynomial. If a match is found the error vector is updated and σ (x) is evaluated in all symbol positions of the codeword. A mismatch indicates the presence of more errors than can be corrected. Paragraph comes content here. Paragraph comes content here. Paragraph comes content here. Paragraph comes content here. Paragraph comes content here. Paragraph comes content here. Paragraph comes content here. Paragraph comes content here. Paragraph comes content here. Paragraph comes content here. Paragraph comes content here. Paragraph comes content here. 4. Digital Video Broadcasting Digital television (DTV) broadcasting is in the process of migrating from analog to digital systems, with regions around the world at different stages of adoption. Various delivery systems are available for digital TV, but the main ones are satellite, cable, terrestrial, and mobile. Each has a variety of standards and derivatives that are either mature or emerging. These standards aim to ensure interoperability between different vendor’s equipment, including the set-top boxes, cell phones, and other means for DTV reception. The DVB-T system is the terrestrial transmission system of the DVB standards. For error protection, a concatenated forward error correction (FEC) scheme is used. The randomized packets are encoded by
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET ISO 9001:2008 Certified Journal Page 407 the Reed-Solomon (R-S) Encoder using a (n, k) code; where n is the block size and k is the number of information symbols. In this case, n is 204 symbols and k is 188 symbols, and a symbol represents 8 bits. This means that 16 check symbols are appended to the information bytes. This code allows up to 8 symbols of data to be corrupted and still be corrected, that is a total of 64 bits. 5.EXPECTED OUTCOME In this paper an introduction to the theory of error controls coding and fundamentals of finite field will be presented. Then, the (204, 188) Reed Solomon encoder / decoder systems is to be designed, simulated and verified to detect the errors. We may observe the following characteristics:  Code length: n = 204.  Information symbols: k = 188.  Parity check symbols: r = n – k =16.  Minimum distance: dmin = n – k + 1 = 17.  Error correcting capability: t = 8 REFERENCES [1] P.Sunitha ;G.V.Ujwala “ Implementation of Reed Solomon Encoding Algorithm” International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 02 Issue: 06, Sep-2015 p-ISSN: 2395- 0072 [2] Aqib Al Azad and Md Imam Shahed, ―A Compact and Fast FPGA Based Implementation of Encoding and Decoding Algorithm Using Reed Solomon Codes‖, International Journal of Future Computer and Communication, vol.2, no. 6, pp.- 31-35, February 2014. [3] Xiaojun Wu; Xianghui Shen; Zhibin Zeng “An improved RS Encoding Algorithm” Consumer Electronics Communications and Networks (CECNet), 2012 2nd International Conference on Digital Object Identifier, Page(s): 1648 – 1652. [4]Yung-Kuei Lu; Ming-Der Shieh “Efficient Architecture for Reed-Solomon Decoder” VLSI Design, Automation, and Test (VLSI-DAT), 2012 International Symposium on Digital Object Identifier, Page(s): 1 – 4. [5]Al Azad, Minhazul. Huq, Iqbalur. Rahman Rokon “Efficient Hardware Implementation of Reed Solomon Encoder and Decoder in FPGA using Verilog” International Conference on Advancements in Electronics and Power Engineering (ICAEPE'2011) Bangkok Dec. 2011 [6] Hsie-Chia Chang, Chih-Yu Cheng, Shu-Hui Tsai, and Chen-Yi Lee , “A (204,188) Reed-Solomon Decoder using Decomposed Euclidean Algorithm”, Roc. 43rd IEEE Midwest Symp. on Circmts and Systems, Lansing MI, Aug 8-2011, 200862. [7] Richard Huynh, GE Ning & YANG Huazhong, “A Low Power Error Detection in the Syndrome Calculator Block for Reed-Solomon Codes: RS(204,188)”, TSINGHUA SCIENCE AND TECHNOLOGY ISSNll1007- 0214ll09/19llpp474-477 Volume 14, Number 4, August 2009. [8]Zhigang Ren; Dongping Yao “An Improved High-speed RS Encoding Algorithm” Microwave, Antenna, Propagation and EMC Technologies for Wireless Communications, 2009 3rd IEEE International Symposium on Digital Object Identifier, Page(s): 521 – 523. [9] Anne Franssens, “Analysis of Reed Solomon error correcting codes on reconfigurable hardware”, Thesis from University of Twente, Enschede, The Netherlands, September 9, 2008. [10] Priti Shankar, “Decoding Reed–Solomon Codes Using Euclid’s Algorithm”, General article in Resonance, April 2007. [11] “Digital Video Broadcasting (DVB); Framing Structure, Channel Coding and Modulation for Digital Terrestrial Television”, ETSI EN300 421, V1.5.1, Jun. 2004. [12] Kim Hamilton,“Polynomial Codes over Certain Finite Fields” by Irving Reed and Gustave Solomon, presented in March 2003. [13] C.K.P. Clarke, “Reed Solomon error correction”, R&D White paper, July 2002.