This document discusses error control coding using Bose-Chaudhuri-Hocquenghem (BCH) codes. It begins with an introduction to information and coding theory, describing how encoding and decoding are used to convey information reliably over noisy communication channels. It then provides details on BCH codes, including that they are a class of cyclic error-correcting codes constructed using finite fields that allow precise control over the number of errors corrected. The document presents the design and architecture of a specific (15,7) BCH code that can detect and correct up to two bit errors in a 15-bit codeword.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...IJERA Editor
In digital communication forward error correction methods have a great practical importance when channel is
noisy. Convolutional error correction code can correct both type of errors random and burst. Convolution
encoding has been used in digital communication systems including deep space communication and wireless
communication. The error correction capability of convolutional code depends on code rate and constraint
length. The low code rate and high constraint length has more error correction capabilities but that also
introduce large overhead. This paper introduces convolutional encoders for various constraint lengths. By
increasing the constraint length the error correction capability can be increased. The performance and error
correction also depends on the selection of generator polynomial. This paper also introduces a good generator
polynomial which has high performance and error correction capabilities.
Digital Watermarking through Embedding of Encrypted and Arithmetically Compre...IJNSA Journal
In this paper, we have encrypted a text to an array of data bits through arithmetic coding technique. For this, we have assigned a unique range for both, a number of characters and groups using those. Using unique range we may assign range only 10 characters. If we want to encrypt a large number of characters, then every character has to assign a range with their group range of hundred, thousand and so on. Long textual message which have to encrypt, is subdivided into a number of groups with few characters. Then the group of characters is encrypted into floating point numbers concurrently to their group range by using arithmetic coding, where they are automatically compressed. Depending on key, the data bits from text are placed to some suitable nonlinear pixel and bit positions about the image. In the proposed technique, the key length and the number of characters for any encryption process is both variable
An Efficient Fault Tolerance System Design for Cmos/Nanodevice Digital MemoriesIJERA Editor
Targeting on the future fault-prone hybrid CMOS/Nanodevice digital memories, this paper present two faulttolerance
design approaches the integrally address the tolerance for defect and transient faults. These two
approaches share several key features, including the use of a group of Bose-Chaudhuri- Hocquenghem (BCH)
codes for both defect tolerance and transient fault tolerance, and integration of BCH code selection and dynamic
logical-to-physical address mapping. Thus, a new model of BCH decoder is proposed to reduce the area and
simplify the computational scheduling of both syndrome and chien search blocks without parallelism leading to
high throughput.The goal of fault tolerant computing is improve the dependability of systems where
dependability can be defined as the ability of a system to deliver service at an acceptable level of confidence in
either presence or absence falult.ss The results of the simulation and implementation using Xilinx ISE software
and the LCD screen on the FPGA’s Board will be shown at last.
Hamming net based Low Complexity Successive Cancellation Polar DecoderRSIS International
This paper aims to implement hybrid based Polar
encoder using the knowledge of mutual information and channel
capacity. Further a Hamming weight successive cancellation
decoder is simulated with QPSK modulation technique in
presence of additive white gaussian noise. The experimentation
performed with the effect of channel polarization has shown that
for 256- bit data stream, 30% channels has zero bit and 49%
channels are with a one bit capacity. The decoding complexity is
reduced to almost half as compared to conventional successive
cancellation decoding algorithm. However, the required SNR of
7 dB is achieved at the targeted BER of 10 -4. The penalty paid is
in terms of training time required at the decoding end.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Modified Golomb Code For Integer RepresentationIJSRD
In this computer age, all the computer applications handle data in the form of text, numbers, symbols and combination of all of them. The primary objective of data compression is to reduce the size of data while data needs to be stored and transmitted in the digital devices. Hence, the data compression plays a vital role in the areas of data storage and data transmission. Golomb code, which is a variable-length integer code, has been used for text compression, image compression, video compression and audio compression. The drawback of Golomb code is that it requires more bits to represent large integers if the divisor is small. Alternatively, Golomb code needs more bits to represent small integers if the divisor is large. This paper proposes Modified Golomb Code based on Golomb Code, Extended Golomb Code to represent small as well as large integers compactly for the chosen divisor. In this work, as an application of Modified Golomb Code, Modified Golomb Code is used with Burrows-Wheeler transform for text compression. The performances of Golomb Code and Modified Golomb Code are evaluated on Calcary corpus dataset. The experimental results show that the proposed code provides better compression rate than Golomb code on an average. The performance of the proposed code is also compared with Extended Golomb Codes (EGC). The comparison results show that the proposed code achieves significant improvement for the binary files of Calgary corpus comparing to EGC.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...IJERA Editor
In digital communication forward error correction methods have a great practical importance when channel is
noisy. Convolutional error correction code can correct both type of errors random and burst. Convolution
encoding has been used in digital communication systems including deep space communication and wireless
communication. The error correction capability of convolutional code depends on code rate and constraint
length. The low code rate and high constraint length has more error correction capabilities but that also
introduce large overhead. This paper introduces convolutional encoders for various constraint lengths. By
increasing the constraint length the error correction capability can be increased. The performance and error
correction also depends on the selection of generator polynomial. This paper also introduces a good generator
polynomial which has high performance and error correction capabilities.
Digital Watermarking through Embedding of Encrypted and Arithmetically Compre...IJNSA Journal
In this paper, we have encrypted a text to an array of data bits through arithmetic coding technique. For this, we have assigned a unique range for both, a number of characters and groups using those. Using unique range we may assign range only 10 characters. If we want to encrypt a large number of characters, then every character has to assign a range with their group range of hundred, thousand and so on. Long textual message which have to encrypt, is subdivided into a number of groups with few characters. Then the group of characters is encrypted into floating point numbers concurrently to their group range by using arithmetic coding, where they are automatically compressed. Depending on key, the data bits from text are placed to some suitable nonlinear pixel and bit positions about the image. In the proposed technique, the key length and the number of characters for any encryption process is both variable
An Efficient Fault Tolerance System Design for Cmos/Nanodevice Digital MemoriesIJERA Editor
Targeting on the future fault-prone hybrid CMOS/Nanodevice digital memories, this paper present two faulttolerance
design approaches the integrally address the tolerance for defect and transient faults. These two
approaches share several key features, including the use of a group of Bose-Chaudhuri- Hocquenghem (BCH)
codes for both defect tolerance and transient fault tolerance, and integration of BCH code selection and dynamic
logical-to-physical address mapping. Thus, a new model of BCH decoder is proposed to reduce the area and
simplify the computational scheduling of both syndrome and chien search blocks without parallelism leading to
high throughput.The goal of fault tolerant computing is improve the dependability of systems where
dependability can be defined as the ability of a system to deliver service at an acceptable level of confidence in
either presence or absence falult.ss The results of the simulation and implementation using Xilinx ISE software
and the LCD screen on the FPGA’s Board will be shown at last.
Hamming net based Low Complexity Successive Cancellation Polar DecoderRSIS International
This paper aims to implement hybrid based Polar
encoder using the knowledge of mutual information and channel
capacity. Further a Hamming weight successive cancellation
decoder is simulated with QPSK modulation technique in
presence of additive white gaussian noise. The experimentation
performed with the effect of channel polarization has shown that
for 256- bit data stream, 30% channels has zero bit and 49%
channels are with a one bit capacity. The decoding complexity is
reduced to almost half as compared to conventional successive
cancellation decoding algorithm. However, the required SNR of
7 dB is achieved at the targeted BER of 10 -4. The penalty paid is
in terms of training time required at the decoding end.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Modified Golomb Code For Integer RepresentationIJSRD
In this computer age, all the computer applications handle data in the form of text, numbers, symbols and combination of all of them. The primary objective of data compression is to reduce the size of data while data needs to be stored and transmitted in the digital devices. Hence, the data compression plays a vital role in the areas of data storage and data transmission. Golomb code, which is a variable-length integer code, has been used for text compression, image compression, video compression and audio compression. The drawback of Golomb code is that it requires more bits to represent large integers if the divisor is small. Alternatively, Golomb code needs more bits to represent small integers if the divisor is large. This paper proposes Modified Golomb Code based on Golomb Code, Extended Golomb Code to represent small as well as large integers compactly for the chosen divisor. In this work, as an application of Modified Golomb Code, Modified Golomb Code is used with Burrows-Wheeler transform for text compression. The performances of Golomb Code and Modified Golomb Code are evaluated on Calcary corpus dataset. The experimental results show that the proposed code provides better compression rate than Golomb code on an average. The performance of the proposed code is also compared with Extended Golomb Codes (EGC). The comparison results show that the proposed code achieves significant improvement for the binary files of Calgary corpus comparing to EGC.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC Codesidescitation
Among various hard decision based Bit Flipping (BF)
algorithms for decoding Low-Density Parity-Check (LDPC)
codes such as Weighted Bit Flipping (WBF), Improved
Reliability Ratio Weighted Bit Flipping (IRRWBF) etc., the
Steepest Descent Bit Flipping Algorithm (SDBF) achieves
better error performance. In this paper, the performance of
the Steepest Descent Algorithm for both single steepest
descent and Multi steepest descent modes is analysed. Also
the performance of IEEE 802.16e standard is analysed using
Steepest Descent Bit Flipping (SDBF) decoding algorithm.
SDBF requires fewer check node and variable node operations
compared to Sum Product Algorithm (SPA) and Min Sum
Algorithm (MSA). The SDBF achieves a coding gain of 0.1 ~
0.2 dB compared to Single-SDBF without requiring complex
log and exponential operations.
The document discusses various techniques for image compression including:
- Run-length coding which encodes repeating pixel values and their lengths.
- Difference coding which encodes the differences between pixel values.
- Block truncation coding which divides images into blocks and assigns codewords.
- Predictive coding which predicts pixel values from neighbors and encodes differences.
Reversible compression allows exact reconstruction while lossy compression sacrifices some information for higher compression but images remain visually similar. Combining techniques can achieve even higher compression ratios.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
PERFORMANCE OF ITERATIVE LDPC-BASED SPACE-TIME TRELLIS CODED MIMO-OFDM SYSTEM...ijcseit
This paper presents the bit error rate (BER) performance of the low density parity check (LDPC) based
space-time trellis coded 2×2 multiple-input multiple-output orthogonal frequency-division multiplexing
(STTC-MIMO-OFDM) system on text message transmission. The system under investigation incorporates
1/2-rated LDPC encoding scheme under various digital modulations (BPSK, QPSK and QAM) over an
additative white gaussian noise (AWGN) and other fading (Raleigh and Rician) channels for two transmit
and two receive antennas. At the receiving section of the simulated system, Minimum Mean-Square-Error
(MMSE) channel equalization technique has been implemented to extract transmitted symbols without
enhancing noise power level. The effectiveness of the proposed system is analyzed in terms of BER with
signal-to-noise ratio (SNR). It is observable from the Matlab based simulation study that the proposed
system outperforms with BPSK as compared to other digital modulation schemes at relatively low SNRs
under AWGN, Rayleigh and Rician fading channels. The transmitted text message is found to have
retrieved effectively at the receiver under implementation of iterative sum-product LDPC decoding
algorithm. It has also been anticipated that the performance of the LDPC-based STTC-MIMO-OFDM
system degrades with the increase of noise power.
Identity-Based Blind Signature Scheme with Message Recovery IJECEIAES
This document summarizes an identity-based blind signature scheme with message recovery that was proposed in the International Journal of Electrical and Computer Engineering. The proposed scheme allows a user to obtain a signature on a message from a signer without revealing the message, providing anonymity. It uses bilinear pairings over elliptic curves and is designed for messages of fixed length. The scheme is intended for applications where anonymity and bandwidth constraints are important concerns. It is proven to be unforgeable based on the computational Diffie-Hellman assumption. The proposal is compared to other related identity-based blind signature schemes in terms of computational efficiency and communication costs.
IRJET- Image Captioning using Multimodal EmbeddingIRJET Journal
This document proposes a novel methodology to generate a single story or caption from multiple images that share similar context. It combines existing image captioning and natural language processing models. Specifically, it uses a Convolutional Neural Network to extract visual semantics from images and generate captions. It then represents the captions as vectors using Skip Thought vectors or TF-IDF values. These vectors are combined into a matrix and used to generate a new story/caption that shares the context of the input images. The results show that the Skip Thought vector approach achieves better performance based on RMSE and MAE error metrics. The model could potentially be applied to applications like medical diagnosis, crime investigations, and lecture note generation.
Analysis of LDPC Codes under Wi-Max IEEE 802.16eIJERD Editor
The LDPC codes have been shown to be by-far the best coding scheme capable for transmitting message over noisy channel. The main aim of this paper is to study the behaviour of LDPC codes on under IEEE 802.16e guidelines. The rate- ½ LDPC codes have been implemented on AWGN channel and the result shows that they can be used on such channels with low BER performance. The BER can be further minimized by increasing the block length.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
A new efficient way based on special stabilizer multiplier permutations to at...IJECEIAES
BCH codes represent an important class of cyclic error-correcting codes; their minimum distances are known only for some cases and remains an open NP-Hard problem in coding theory especially for large lengths. This paper presents an efficient scheme ZSSMP (Zimmermann Special Stabilizer Multiplier Permutation) to find the true value of the minimum distance for many large BCH codes. The proposed method consists in searching a codeword having the minimum weight by Zimmermann algorithm in the sub codes fixed by special stabilizer multiplier permutations. These few sub codes had very small dimensions compared to the dimension of the considered code itself and therefore the search of a codeword of global minimum weight is simplified in terms of run time complexity. ZSSMP is validated on all BCH codes of length 255 for which it gives the exact value of the minimum distance. For BCH codes of length 511, the proposed technique passes considerably the famous known powerful scheme of Canteaut and Chabaud used to attack the public-key cryptosystems based on codes. ZSSMP is very rapid and allows catching the smallest weight codewords in few seconds. By exploiting the efficiency and the quickness of ZSSMP, the true minimum distances and consequently the error correcting capability of all the set of 165 BCH codes of length up to 1023 are determined except the two cases of the BCH(511,148) and BCH(511,259) codes. The comparison of ZSSMP with other powerful methods proves its quality for attacking the hardness of minimum weight search problem at least for the codes studied in this paper.
IRJET- K-SVD: Dictionary Developing Algorithms for Sparse Representation ...IRJET Journal
This document discusses the K-SVD algorithm, which is a dictionary learning method for sparse representations of signals. It alternates between sparse coding to represent signals using the current dictionary, and dictionary updating to learn a new dictionary from the signal representations. The algorithm generalizes the K-means clustering process. The document provides details on the methodology of K-SVD, including its basic steps and application to synthetic and real image signals. It is concluded that K-SVD learns dictionaries that better represent given signal groups compared to alternative methods.
Dynamic time wrapping (dtw), vector quantization(vq), linear predictive codin...Tanjarul Islam Mishu
Dynamic Time Wrapping (DTW) is an algorithm for measuring similarity between two temporal sequences which may vary in time or speed. It allows sequences to be aligned non-linearly by warping the time axis, minimizing distance between them. DTW was originally used for automatic speech recognition but has since been applied to other time-series data mining tasks.
This document describes a proposed modular multiplication algorithm that divides the computation into two steps:
1) A multiplication step that uses Toom-Cook multiplication to split the inputs into five parts
2) A modular multiplication step that uses Barrett and Montgomery modular multiplication algorithms in parallel to compute the results of the five parts from the first step.
The algorithm is designed to minimize the number of single-precision multiplications and enable more than three-way parallel computation, improving efficiency over other modular multiplication methods.
Arithmetic coding is a lossless data compression technique that encodes data as a single real number between 0 and 1. It maps a string of symbols to a fractional number, with more probable symbols represented by larger fractional ranges. Encoding involves repeatedly dividing the interval based on symbol probabilities, and the final encoded number represents the entire string. Decoding reconstructs the string by comparing the number to symbol probability ranges. Arithmetic coding achieves compression closer to the entropy limit than Huffman coding by spreading coding inefficiencies across all symbols of the data.
Energy-Efficient LDPC Decoder using DVFS for binary sourcesIDES Editor
This paper deals with reduction of the transmission
power usage in the wireless sensor networks. A system with
FEC can provide an objective reliability using less power
than a system without FEC. We propose to study LDPC
codes to provide reliable communication while saving power
in the sensor networks. As shown later, LDPC codes are more
energy efficient than those that use BCH codes. Another
method to reduce the transmission cost is to compress the
correlated data among a number of sensor nodes before
transmission. A suitable source encoder that removes the
redundant information bits can save the transmission power.
Such a system requires distributed source coding. We propose
to apply LDPC codes for both distributed source coding and
source-channel coding to obtain a two-fold energy savings.
Source and channel coding with LDPC for two correlated nodes
under AWGN channel is implemented in this paper. In this
iterative decoding algorithm is used for decoding the data, and
it’s efficiency is compared with the new decoding algorithm
called layered decoding algorithm which based on offset min
sum algorithm. The usage of layered decoding algorithm and
Adaptive LDPC decoding for AWGN channel reduces the
decoding complexity and its number of iterations. So the power
will be saved, and it can be implemented in hardware.
Multilabel Classification by BCH Code and Random ForestsIDES Editor
This document summarizes a research paper that proposes a new method called MultiLabel Bose, Ray-Chaudhuri, Hocquenghem Random Forests (ML-BCHRF) for multilabel classification. The method first encodes the label sets using Bose, Ray-Chaudhuri, Hocquenghem (BCH) error correcting code. It then trains random forest classifiers on each binary classification problem created from the encoded labels. Finally, it decodes the classifier predictions using BCH to obtain the label sets. The method combines the advantages of BCH error correction and random forests ensemble learning for multilabel classification. An experiment on a yeast dataset shows the proposed method performs competitively against other
This document proposes an adaptive steganography technique for hiding secret data in digital images. The technique uses variable bit length embedding based on wavelet coefficients of the cover image. A logistic map is used to generate a secret key, which determines the RGB color planes and blocks used for data hiding. Wavelet coefficients are classified into ranges, and the number of bits hidden corresponds to the coefficient value range. Extraction involves selecting the same coefficients based on the key and calculating the hidden bits. The technique aims to improve security, capacity and imperceptibility compared to existing constant bit length methods. Evaluation shows the proposed method provides good security since variable bits are hidden randomly using the secret key.
The document discusses various techniques for image compression. It describes how image compression aims to reduce redundant data in images to decrease file size for storage and transmission. It discusses different types of redundancy like coding, inter-pixel, and psychovisual redundancy that compression algorithms target. Common compression techniques described include transform coding, predictive coding, Huffman coding, and Lempel-Ziv-Welch (LZW) coding. Key aspects like compression ratio, mean bit rate, objective and subjective quality metrics are also covered.
This document summarizes several source coding techniques: Arithmetic coding encodes a message into a single floating point number between 0 and 1. Lempel-Ziv coding builds a dictionary to encode repeated patterns. Run length encoding replaces repeated characters with a code indicating the character and number of repeats. Rate distortion theory calculates the minimum bit rate needed for a given source and distortion. The entropy rate measures how entropy grows with the length of a stochastic process. JPEG uses lossy compression including discrete cosine transform and quantization to discard high frequency data imperceptible to humans.
Efficient implementation of bit parallel finite eSAT Journals
Abstract Arithmetic in Finite/Galois field is a major aspect for many applications such as error correcting code and cryptography. Addition and multiplication are the two basic operations in the finite field GF (2m).The finite field multiplication is the most resource and time consuming operation. In this paper the complexity (space) analysis and efficient FPGA implementation of bit parallel Karatsuba Multiplier over GF (2m) is presented. This is especially interesting for high performance systems because of its carry free property. To reduce the complexity of Classical Multiplier, multiplier with less complexity over GF (2m) based on Karatsuba Multiplier is used. The LUT complexity is evaluated on FPGA by using Xilinx ISE 8.1i.Furthermore,the experimental results on FPGAs for bit parallel Karatsuba Multiplier and Classical Multiplier were shown and the comparison table is provided. To the best of our knowledge, the bit parallel karatsuba multiplier consumes least resources among the known FPGA implementation. Keywords: Classical Multiplier, Cryptograph, FPGA, Galois field, Karatsuba Multiplier
The document provides search results from 123video.nl for the search terms "123video.nl/video {mrjyn} dog". The results include several videos uploaded by the user Mrjyn to 123video.nl, including videos about a sleep walking barking dog, Anton LaVey, and Black Sabbath. Blog posts and other pages are also included that reference Mrjyn's videos on 123video.nl or contain the search terms.
Flow chart - PermenLH (Peraturan Menteri Lingkungan Hidup)Isya Ansyari
Dokumen tersebut membahas tentang peraturan baku mutu emisi gas buang alat berat yang sudah beroperasi di Indonesia. Pemilik alat berat wajib melaporkan alat mereka setiap tiga bulan dan mengikuti pengujian untuk memenuhi standar emisi gas yang ditetapkan. Menteri Lingkungan Hidup bertanggung jawab atas pengawasan pelaksanaan peraturan ini.
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC Codesidescitation
Among various hard decision based Bit Flipping (BF)
algorithms for decoding Low-Density Parity-Check (LDPC)
codes such as Weighted Bit Flipping (WBF), Improved
Reliability Ratio Weighted Bit Flipping (IRRWBF) etc., the
Steepest Descent Bit Flipping Algorithm (SDBF) achieves
better error performance. In this paper, the performance of
the Steepest Descent Algorithm for both single steepest
descent and Multi steepest descent modes is analysed. Also
the performance of IEEE 802.16e standard is analysed using
Steepest Descent Bit Flipping (SDBF) decoding algorithm.
SDBF requires fewer check node and variable node operations
compared to Sum Product Algorithm (SPA) and Min Sum
Algorithm (MSA). The SDBF achieves a coding gain of 0.1 ~
0.2 dB compared to Single-SDBF without requiring complex
log and exponential operations.
The document discusses various techniques for image compression including:
- Run-length coding which encodes repeating pixel values and their lengths.
- Difference coding which encodes the differences between pixel values.
- Block truncation coding which divides images into blocks and assigns codewords.
- Predictive coding which predicts pixel values from neighbors and encodes differences.
Reversible compression allows exact reconstruction while lossy compression sacrifices some information for higher compression but images remain visually similar. Combining techniques can achieve even higher compression ratios.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
PERFORMANCE OF ITERATIVE LDPC-BASED SPACE-TIME TRELLIS CODED MIMO-OFDM SYSTEM...ijcseit
This paper presents the bit error rate (BER) performance of the low density parity check (LDPC) based
space-time trellis coded 2×2 multiple-input multiple-output orthogonal frequency-division multiplexing
(STTC-MIMO-OFDM) system on text message transmission. The system under investigation incorporates
1/2-rated LDPC encoding scheme under various digital modulations (BPSK, QPSK and QAM) over an
additative white gaussian noise (AWGN) and other fading (Raleigh and Rician) channels for two transmit
and two receive antennas. At the receiving section of the simulated system, Minimum Mean-Square-Error
(MMSE) channel equalization technique has been implemented to extract transmitted symbols without
enhancing noise power level. The effectiveness of the proposed system is analyzed in terms of BER with
signal-to-noise ratio (SNR). It is observable from the Matlab based simulation study that the proposed
system outperforms with BPSK as compared to other digital modulation schemes at relatively low SNRs
under AWGN, Rayleigh and Rician fading channels. The transmitted text message is found to have
retrieved effectively at the receiver under implementation of iterative sum-product LDPC decoding
algorithm. It has also been anticipated that the performance of the LDPC-based STTC-MIMO-OFDM
system degrades with the increase of noise power.
Identity-Based Blind Signature Scheme with Message Recovery IJECEIAES
This document summarizes an identity-based blind signature scheme with message recovery that was proposed in the International Journal of Electrical and Computer Engineering. The proposed scheme allows a user to obtain a signature on a message from a signer without revealing the message, providing anonymity. It uses bilinear pairings over elliptic curves and is designed for messages of fixed length. The scheme is intended for applications where anonymity and bandwidth constraints are important concerns. It is proven to be unforgeable based on the computational Diffie-Hellman assumption. The proposal is compared to other related identity-based blind signature schemes in terms of computational efficiency and communication costs.
IRJET- Image Captioning using Multimodal EmbeddingIRJET Journal
This document proposes a novel methodology to generate a single story or caption from multiple images that share similar context. It combines existing image captioning and natural language processing models. Specifically, it uses a Convolutional Neural Network to extract visual semantics from images and generate captions. It then represents the captions as vectors using Skip Thought vectors or TF-IDF values. These vectors are combined into a matrix and used to generate a new story/caption that shares the context of the input images. The results show that the Skip Thought vector approach achieves better performance based on RMSE and MAE error metrics. The model could potentially be applied to applications like medical diagnosis, crime investigations, and lecture note generation.
Analysis of LDPC Codes under Wi-Max IEEE 802.16eIJERD Editor
The LDPC codes have been shown to be by-far the best coding scheme capable for transmitting message over noisy channel. The main aim of this paper is to study the behaviour of LDPC codes on under IEEE 802.16e guidelines. The rate- ½ LDPC codes have been implemented on AWGN channel and the result shows that they can be used on such channels with low BER performance. The BER can be further minimized by increasing the block length.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
A new efficient way based on special stabilizer multiplier permutations to at...IJECEIAES
BCH codes represent an important class of cyclic error-correcting codes; their minimum distances are known only for some cases and remains an open NP-Hard problem in coding theory especially for large lengths. This paper presents an efficient scheme ZSSMP (Zimmermann Special Stabilizer Multiplier Permutation) to find the true value of the minimum distance for many large BCH codes. The proposed method consists in searching a codeword having the minimum weight by Zimmermann algorithm in the sub codes fixed by special stabilizer multiplier permutations. These few sub codes had very small dimensions compared to the dimension of the considered code itself and therefore the search of a codeword of global minimum weight is simplified in terms of run time complexity. ZSSMP is validated on all BCH codes of length 255 for which it gives the exact value of the minimum distance. For BCH codes of length 511, the proposed technique passes considerably the famous known powerful scheme of Canteaut and Chabaud used to attack the public-key cryptosystems based on codes. ZSSMP is very rapid and allows catching the smallest weight codewords in few seconds. By exploiting the efficiency and the quickness of ZSSMP, the true minimum distances and consequently the error correcting capability of all the set of 165 BCH codes of length up to 1023 are determined except the two cases of the BCH(511,148) and BCH(511,259) codes. The comparison of ZSSMP with other powerful methods proves its quality for attacking the hardness of minimum weight search problem at least for the codes studied in this paper.
IRJET- K-SVD: Dictionary Developing Algorithms for Sparse Representation ...IRJET Journal
This document discusses the K-SVD algorithm, which is a dictionary learning method for sparse representations of signals. It alternates between sparse coding to represent signals using the current dictionary, and dictionary updating to learn a new dictionary from the signal representations. The algorithm generalizes the K-means clustering process. The document provides details on the methodology of K-SVD, including its basic steps and application to synthetic and real image signals. It is concluded that K-SVD learns dictionaries that better represent given signal groups compared to alternative methods.
Dynamic time wrapping (dtw), vector quantization(vq), linear predictive codin...Tanjarul Islam Mishu
Dynamic Time Wrapping (DTW) is an algorithm for measuring similarity between two temporal sequences which may vary in time or speed. It allows sequences to be aligned non-linearly by warping the time axis, minimizing distance between them. DTW was originally used for automatic speech recognition but has since been applied to other time-series data mining tasks.
This document describes a proposed modular multiplication algorithm that divides the computation into two steps:
1) A multiplication step that uses Toom-Cook multiplication to split the inputs into five parts
2) A modular multiplication step that uses Barrett and Montgomery modular multiplication algorithms in parallel to compute the results of the five parts from the first step.
The algorithm is designed to minimize the number of single-precision multiplications and enable more than three-way parallel computation, improving efficiency over other modular multiplication methods.
Arithmetic coding is a lossless data compression technique that encodes data as a single real number between 0 and 1. It maps a string of symbols to a fractional number, with more probable symbols represented by larger fractional ranges. Encoding involves repeatedly dividing the interval based on symbol probabilities, and the final encoded number represents the entire string. Decoding reconstructs the string by comparing the number to symbol probability ranges. Arithmetic coding achieves compression closer to the entropy limit than Huffman coding by spreading coding inefficiencies across all symbols of the data.
Energy-Efficient LDPC Decoder using DVFS for binary sourcesIDES Editor
This paper deals with reduction of the transmission
power usage in the wireless sensor networks. A system with
FEC can provide an objective reliability using less power
than a system without FEC. We propose to study LDPC
codes to provide reliable communication while saving power
in the sensor networks. As shown later, LDPC codes are more
energy efficient than those that use BCH codes. Another
method to reduce the transmission cost is to compress the
correlated data among a number of sensor nodes before
transmission. A suitable source encoder that removes the
redundant information bits can save the transmission power.
Such a system requires distributed source coding. We propose
to apply LDPC codes for both distributed source coding and
source-channel coding to obtain a two-fold energy savings.
Source and channel coding with LDPC for two correlated nodes
under AWGN channel is implemented in this paper. In this
iterative decoding algorithm is used for decoding the data, and
it’s efficiency is compared with the new decoding algorithm
called layered decoding algorithm which based on offset min
sum algorithm. The usage of layered decoding algorithm and
Adaptive LDPC decoding for AWGN channel reduces the
decoding complexity and its number of iterations. So the power
will be saved, and it can be implemented in hardware.
Multilabel Classification by BCH Code and Random ForestsIDES Editor
This document summarizes a research paper that proposes a new method called MultiLabel Bose, Ray-Chaudhuri, Hocquenghem Random Forests (ML-BCHRF) for multilabel classification. The method first encodes the label sets using Bose, Ray-Chaudhuri, Hocquenghem (BCH) error correcting code. It then trains random forest classifiers on each binary classification problem created from the encoded labels. Finally, it decodes the classifier predictions using BCH to obtain the label sets. The method combines the advantages of BCH error correction and random forests ensemble learning for multilabel classification. An experiment on a yeast dataset shows the proposed method performs competitively against other
This document proposes an adaptive steganography technique for hiding secret data in digital images. The technique uses variable bit length embedding based on wavelet coefficients of the cover image. A logistic map is used to generate a secret key, which determines the RGB color planes and blocks used for data hiding. Wavelet coefficients are classified into ranges, and the number of bits hidden corresponds to the coefficient value range. Extraction involves selecting the same coefficients based on the key and calculating the hidden bits. The technique aims to improve security, capacity and imperceptibility compared to existing constant bit length methods. Evaluation shows the proposed method provides good security since variable bits are hidden randomly using the secret key.
The document discusses various techniques for image compression. It describes how image compression aims to reduce redundant data in images to decrease file size for storage and transmission. It discusses different types of redundancy like coding, inter-pixel, and psychovisual redundancy that compression algorithms target. Common compression techniques described include transform coding, predictive coding, Huffman coding, and Lempel-Ziv-Welch (LZW) coding. Key aspects like compression ratio, mean bit rate, objective and subjective quality metrics are also covered.
This document summarizes several source coding techniques: Arithmetic coding encodes a message into a single floating point number between 0 and 1. Lempel-Ziv coding builds a dictionary to encode repeated patterns. Run length encoding replaces repeated characters with a code indicating the character and number of repeats. Rate distortion theory calculates the minimum bit rate needed for a given source and distortion. The entropy rate measures how entropy grows with the length of a stochastic process. JPEG uses lossy compression including discrete cosine transform and quantization to discard high frequency data imperceptible to humans.
Efficient implementation of bit parallel finite eSAT Journals
Abstract Arithmetic in Finite/Galois field is a major aspect for many applications such as error correcting code and cryptography. Addition and multiplication are the two basic operations in the finite field GF (2m).The finite field multiplication is the most resource and time consuming operation. In this paper the complexity (space) analysis and efficient FPGA implementation of bit parallel Karatsuba Multiplier over GF (2m) is presented. This is especially interesting for high performance systems because of its carry free property. To reduce the complexity of Classical Multiplier, multiplier with less complexity over GF (2m) based on Karatsuba Multiplier is used. The LUT complexity is evaluated on FPGA by using Xilinx ISE 8.1i.Furthermore,the experimental results on FPGAs for bit parallel Karatsuba Multiplier and Classical Multiplier were shown and the comparison table is provided. To the best of our knowledge, the bit parallel karatsuba multiplier consumes least resources among the known FPGA implementation. Keywords: Classical Multiplier, Cryptograph, FPGA, Galois field, Karatsuba Multiplier
The document provides search results from 123video.nl for the search terms "123video.nl/video {mrjyn} dog". The results include several videos uploaded by the user Mrjyn to 123video.nl, including videos about a sleep walking barking dog, Anton LaVey, and Black Sabbath. Blog posts and other pages are also included that reference Mrjyn's videos on 123video.nl or contain the search terms.
Flow chart - PermenLH (Peraturan Menteri Lingkungan Hidup)Isya Ansyari
Dokumen tersebut membahas tentang peraturan baku mutu emisi gas buang alat berat yang sudah beroperasi di Indonesia. Pemilik alat berat wajib melaporkan alat mereka setiap tiga bulan dan mengikuti pengujian untuk memenuhi standar emisi gas yang ditetapkan. Menteri Lingkungan Hidup bertanggung jawab atas pengawasan pelaksanaan peraturan ini.
Отделение медицинской профилактики нового векаrorbic
Цели и задачи данного проекта: организация центра медицинской профилактики на базе МУЗ «Клинцовская центральная городская больница» путём реорганизации существующего отделения медпрофилактики и разработка единого комплексного профилактического осмотра
Moving to the cloud provides several benefits for Helix Linear Technologies' ERP system. It transitions the company from an on-premise system requiring specialized expertise to maintain, to a less complex, cloud-based system integrated with Salesforce. This reduces complexity, administration needs, and customization/integration challenges. Specifically, Helix is moving to Kenandy, a native Force.com application, to gain the standard customization and integration of the Salesforce platform. The cloud-based system will also improve processes like capacity planning, mobile shop floor management, labor costing, and quality assurance.
3º SICT-Sul Minicurso Técnicas para segurança computacionalLucas Mellos Carlos
O documento discute técnicas de segurança computacional e apresenta exemplos de ataques cibernéticos comuns, como keyloggers, phishing e ataques de dicionário. Inclui definições de hackers, crackers e os pilares da segurança da informação.
Este documento parabeniza o aniversário do pai. Os filhos expressam seu amor e gratidão pelo exemplo de vida, bondade e ensinamentos do pai. Eles desejam saúde, felicidade e sucesso para o pai, e que ele realize todos os seus sonhos. Os netos e bisnetos também comemoram o aniversário, agradecendo a experiência e exemplos recebidos do avô.
Este documento describe un estudio sobre la implementación de las TIC (tecnologías de la información y comunicación) para mejorar la comprensión de las matemáticas en estudiantes de nivel medio superior en Veracruz, México. El estudio evaluó el uso de software educativo y nuevas tecnologías con 60 estudiantes de tres grupos. Los resultados mostraron que la comprensión matemática de los estudiantes mejoró con el uso de las TIC. Se concluye que para una verdadera integración de las TIC se requiere acceso a recursos te
Este documento describe el uso del material base Diez para la enseñanza de las operaciones con números naturales. El material consiste en cubos, barras y placas de 10 unidades cada una que permiten representar y manipular cantidades. Se explican 10 actividades como juego libre, equivalencias, representación numérica, sumas, restas, multiplicación, división y problemas. El objetivo es que los estudiantes adquieran de forma concreta los conceptos y mecanismos del sistema decimal a través de la manipulación del material.
La Unión Europea ha acordado un embargo petrolero contra Rusia en respuesta a la invasión de Ucrania. El embargo prohibirá las importaciones marítimas de petróleo ruso a la UE y pondrá fin a las entregas a través de oleoductos dentro de seis meses. Esta medida forma parte de un sexto paquete de sanciones de la UE destinadas a aumentar la presión económica sobre Moscú y privar al Kremlin de fondos para financiar su guerra.
Este poema describe el deseo sexual entre dos personas. La voz poética pide caricias y toques mágicos de los dedos en su cuerpo tembloroso y sus grandes pechos. Pide más con cada toque y gime de placer. Pide ser penetrada y poseída completamente con calor ardiente para alcanzar el éxtasis y liberarse de la agonía.
C:\documents and settings\user\desktop\mao en el corazon\presentaciones\SócratesViejomedina
Sócrates propuso un "triple filtro" para evaluar la información sobre los amigos antes de repetirla o creerla: 1) Verdad - ¿es la información ciertamente verdadera?; 2) Bondad - ¿es la información de naturaleza positiva o buena?; 3) Utilidad - ¿es la información útil de alguna manera? El hombre no pudo pasar ninguno de los filtros sobre lo que había oído acerca del amigo de Sócrates, por lo que Sócrates concluyó que no valía la pena repetirla o cre
Relative influences of stress paths with different initial soil states on stressIAEME Publication
This document summarizes a study that partially replaced cement and sand in concrete with wood ash and quarry dust to examine the strength properties. Wood ash and quarry dust are industrial byproducts that can potentially be used as supplementary cementitious materials. The study developed concrete mixes with varying replacement levels of wood ash for cement and quarry dust for sand. The compressive strength of the concrete mixtures was then tested at different curing periods. The results showed that compressive strength decreased with higher levels of wood ash but increased with longer curing times. An optimal replacement level of 45% sand with quarry dust was also identified. The aim was to utilize industrial waste materials to reduce the cost and environmental impact of concrete production.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise boosts blood flow, releases endorphins, and promotes changes in the brain which help regulate emotions and stress levels.
BCH Decoder Implemented On CMOS/Nano Device Digital Memories for Fault Tolera...inventy
This document presents two fault-tolerance system design approaches for CMOS/nano device digital memories using Bose-Chaudhuri-Hocquenghem (BCH) codes. The first approach partitions memory into segments that each store one BCH codeword to correct defects within that segment. The second approach uses a three-level hierarchy to map coded data blocks across multiple segments when defects exceed a single segment's correction capability. Both aim to achieve high storage capacity while adapting to variations in defect statistics. The document also describes implementing a BCH decoder on a Spartan 3E FPGA, demonstrating the proposed approaches through successful synthesis and simulation.
Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...IJERA Editor
The quality of a digital transmission is mainly dependent on the amount of errors introduced into the transmission channel. The codes BCH (Bose-Chaudhuri-Hocquenghem) are widely used in communication systems and storage systems. In this paper a Performance study of BCH error correcting codes is proposed. This paper presents a comparative study of performance between the Bose-Chaudhuri-Hocquenghem codes BCH (15, 7, 2) and BCH (255, 231, 3) using the bit error rate term (BER). The channel and the modulation type are respectively AWGN and PSK where the order of modulation is equal to 2. First, we generated and simulated the error correcting codes BCH (15, 7, 2) and BCH (255, 231, 3) using Math lab simulator. Second, we compare the two codes using the bit error rate term (BER), finally we conclude the coding gain for a BER = 10-4.
A NOVEL APPROACH FOR LOWER POWER DESIGN IN TURBO CODING SYSTEMVLSICS Design
Low Power is an extremely important issue for future mobile communication systems; The focus of this paper is to implementat turbo codes for low power solutions. The effect on performance due to variation in parameters like frame length, number of iterations, type of encoding scheme and type of the interleave in the presence of additive white Gaussian noise is studied with the floating point model. In order to obtain the effect of quantization and word length variation, a fixed point model of the application is also developed.. The application performance measure, namely bit-error rate (BER) is used as a design constraint while optimizing for power and area coverage. Low power Optimization is Performed on Implementation levels by the use of Voltage scaling. With those Techniques we can reduced the power 98.5%and Area(LUT) is 57% and speed grade is Increased .This type of Power maneger is proposed and implemented based on the timing details of the turbo decoder in the VHDL model.
Performances Concatenated LDPC based STBC-OFDM System and MRC Receivers IJECEIAES
This document presents a study on the performance of a low density parity check (LDPC) coded orthogonal frequency division multiplexing (OFDM) system using space time block coding (STBC) under various digital modulations and channel conditions. The system incorporates a 3/4 rate convolutional encoder and a LDPC encoder. At the receiver, maximum ratio combining is implemented for channel equalization. Simulation results show that the LDPC coded OFDM system outperforms an uncoded system, and provides lower bit error rates under binary phase shift keying modulation in an additive white Gaussian noise channel.
Improving The Performance of Viterbi Decoder using Window System IJECEIAES
An efficient Viterbi decoder is introduced in this paper; it is called Viterbi decoder with window system. The simulation results, over Gaussian channels, are performed from rate 1/2, 1/3 and 2/3 joined to TCM encoder with memory in order of 2, 3. These results show that the proposed scheme outperforms the classical Viterbi by a gain of 1 dB. On the other hand, we propose a function called RSCPOLY2TRELLIS, for recursive systematic convolutional (RSC) encoder which creates the trellis structure of a recursive systematic convolutional encoder from the matrix “H”. Moreover, we present a comparison between the decoding algorithms of the TCM encoder like Viterbi soft and hard, and the variants of the MAP decoder known as BCJR or forward-backward algorithm which is very performant in decoding TCM, but depends on the size of the code, the memory, and the CPU requirements of the application.
On the realization of non linear pseudo-noise generator for various signal pr...Alexander Decker
This document discusses non-linear pseudo-noise generators and their applications in signal processing and communications. It proposes a non-linear method for generating spreading codes that have good auto-correlation properties, low power spectral density, and are complex signals. The document reviews linear pseudo-noise codes generated by shift registers and their properties. It then discusses using multiple shift registers combined non-linearly to generate codes with improved properties for applications like spread spectrum communications and interference rejection.
Fault Tolerant Parallel Filters Based On Bch CodesIJERA Editor
Digital filters are used in signal processing and communication systems. In some cases, the reliability of those
systems is critical, and fault tolerant filter implementations are needed. Over the years, many techniques that
exploit the filters’ structure and properties to achieve fault tolerance have been proposed. As technology scales,
it enables more complex systems that incorporate many filters. In those complex systems, it is common that
some of the filters operate in parallel, for example, by applying the same filter to different input signals.
Recently, a simple technique that exploits the presence of parallel filters to achieve multiple fault tolerance has
been presented. In this brief, that idea is generalized to show that parallel filters can be protected using Bose–
Chaudhuri–Hocquenghem codes (BCH) in which each filter is the equivalent of a bit in a traditional ECC. This
new scheme allows more efficient protection when the number of parallel filters is large.
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...ijitjournal
Error Correcting Codes are required to have a reliable communication through a medium that has an
unacceptable bit error rate and low signal to noise ratio. In IEEE 802.15.6 2.4GHz Wireless Body Area
Network (WBAN), data gets corrupted during the transmission and reception due to noises and
interferences. Ultra low power operation is crucial to prolong the life of implantable devices. Hence simple
block codes like BCH (63, 51, 2) can be employed in the transceiver design of 802.15.6 Narrowband PHY.
In this paper, implementation of BCH (63, 51, t = 2) Encoder and Decoder using VHDL is discussed. The
incoming 51 bits are encoded into 63 bit code word using (63, 51) BCH encoder. It can detect and correct
up to 2 random errors. The design of an encoder is implemented using Linear Feed Back Shift Register
(LFSR) for polynomial division and the decoder design is based on syndrome calculator, inversion-less
Berlekamp-Massey algorithm (BMA) and Chien search algorithm. Synthesis and simulation were carried
out using Xilinx ISE 14.2 and ModelSim 10.1c. The codes are implemented over Virtex 4 FPGA device and
tested on DN8000K10PCIE Logic Emulation Board. To the best of our knowledge, it is the first time an
implementation of (63, 51) BCH encoder and decoder carried out.
The Reliability in Decoding of Turbo Codes for Wireless CommunicationsIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Speech recognition using vector quantization through modified k means lbg alg...Alexander Decker
This document discusses speech recognition using vector quantization and proposes a modified K-meansLBG algorithm. It begins by introducing vector quantization techniques which are commonly used in speech recognition. It then describes the Linde-Buzo-Gray (LBG) algorithm and classical K-means algorithm for vector quantization before proposing a modified K-meansLBG algorithm. The paper claims this modified algorithm provides superior performance compared to the classical approaches. It evaluates the performance of the proposed algorithm through experimental work.
Fpga implementation of (15,7) bch encoder and decoder for text messageeSAT Journals
Abstract In a communication channel, noise and interferences are the two main sources of errors occur during the transmission of the message. Thus, to get the error free communication error control codes are used. This paper discusses, FPGA implementation of (15, 7) BCH Encoder and Decoder for text message using Verilog Hardware Description Language. Initially each character in a text message is converted into binary data of 7 bits. These 7 bits are encoded into 15 bit codeword using (15, 7) BCH encoder. If any 2 bit error in any position of 15 bit codeword, is detected and corrected. This corrected data is converted back into an ASCII character. The decoder is implemented using the Peterson algorithm and Chine’s search algorithm. Simulation was carried out by using Xilinx 12.1 ISE simulator, and verified results for an arbitrarily chosen message data. Synthesis was successfully done by using the RTL compiler, power and area is estimated for 180nm Technology. Finally both encoder and decoder design is implemented on Spartan 3E FPGA. Index Terms: BCH Encoder, BCH Decoder, FPGA, Verilog, Cadence RTL compiler
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Design and implementation of log domain decoder IJECEIAES
Low-Density-Parity-Check (LDPC) code has become famous in communications systems for error correction, as an advantage of the robust performance in correcting errors and the ability to meet all the requirements of the 5G system. However, the mot challenge faced researchers is the hardware implementation, because of higher complexity and long run-time. In this paper, an efficient and optimum design for log domain decoder has been implemented using Xilinx system generator with FPGA device Kintex7 (XC7K325T-2FFG900C). Results confirm that the proposed decoder gives a Bit Error Rate (BER) very closed to theory calculations which illustrate that this decoder is suitable for next generation demand which needs a high data rate with very low BER.
An efficient reconfigurable code rate cooperative low-density parity check co...IJECEIAES
In recent days, extensive digital communication process has been performed. Due to this phenomenon, a proper maintenance of authentication, communication without any overhead such as signal attenuation code rate fluctuations during digital communication process can be minimized and optimized by adopting parallel encoder and decoder operations. To overcome the above-mentioned drawbacks by using proposed reconfigurable code rate cooperative (RCRC) and low-density parity check (LDPC) method. The proposed RCRC-LDPC is capable to operate over gigabits/sec data and it effectively performs linear encoding, dual diagonal form, widens the range of code rate and optimal degree distribution of LDPC mother code. The proposed method optimize the transmission rate and it is capable to operate on 0.98 code rate. It is the highest upper bounded code rate as compared to the existing methods. The proposed method optimizes the transmission rate and is capable to operate on a 0.98 code rate. It is the highest upper bounded code rate as compared to the existing methods. the proposed method's implementation has been carried out using MATLAB and as per the simulation result, the proposed method is capable of reaching a throughput efficiency greater than 8.2 (1.9) gigabits per second with a clock frequency of 160 MHz.
This document discusses non-binary trellis coded modulation (TCM) schemes aided by pulse amplitude modulation (PAM), quadrature amplitude modulation (QAM), and phase-shift keying (PSK) modulation for transmission over additive white Gaussian noise channels. It proposes a new non-binary decoding algorithm called Yaletharatalhussein decoding and evaluates its performance. The main points are:
1) Yaletharatalhussein decoding is a new non-binary decoding method for non-binary convolutional codes based on trellis diagrams, with lower complexity than Viterbi decoding.
2) Simulation results show the non-binary TCM aided PAM scheme with Yaletharatalhussein decoding outper
Performance Study of RS (255, 239) and RS (255.233) Used Respectively in DVB-...IJERA Editor
The error correction codes have a wide range of applications in digital communication (satellite, wireless) and digital data storage. This paper presents a comparative study of performance between RS (255, 239) and RS (255.233) used respectively in the Digital Video Broadcasting – Terrestrial (DVB-T) and National Aeronautics and Space Administration (NASA). The performances were evaluated by applying modulation scheme in additive white Gaussian noise (AWGN) channel. Performances of modulation with RS codes are evaluated in bit error rate (BER) and signal energy -to- noise power density ratio (Eb / No). The analysis is studied with the help of MATLAB simulator to analyze a communication link with AWGN Channel, and different modulations.
This document summarizes a research paper that proposes using genetic algorithms and differential evolution to optimize the interleaver design for turbo codes. Turbo codes achieve performance close to the theoretical limit by using parallel concatenation of recursive systematic convolutional codes. The interleaver permutes the input bits, which affects turbo code performance. This research aims to use evolutionary algorithms to find higher performing turbo code interleavers compared to conventional designs. It compares the proposed approaches to the traditional genetic algorithm method and finds that differential evolution performs well for optimizing turbo code interleaver design.
Fpga implementation of linear ldpc encodereSAT Journals
Abstract In this paper, a FPGA implementation of linear time LDPC encoder is presented. This encoder implementation can handle large size of input message. Linear Time encoder hardware architecture reduces the Complexity and area of encoder than generator matrix based encoder techniques. This encoder is simulated on different platform which includes Matlab & High level languages for 1/2 rate & up to 4096 code length. FPGA implementation of the encoder is done on Xilinx Spartan 3E Starter Kit. The result shows the speed & area comparison for different FPGA platform. Keywords— LDPC codes, dual-diagonal, Linear encoding, Generator matrix complexity, FPGA Implementation
Belief Propagation Decoder for LDPC Codes Based on VLSI Implementationinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Similar to Error control coding using bose chaudhuri hocquenghem bch codes (20)
Submission Deadline: 30th September 2022
Acceptance Notification: Within Three Days’ time period
Online Publication: Within 24 Hrs. time Period
Expected Date of Dispatch of Printed Journal: 5th October 2022
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
White layer thickness (WLT) formed and surface roughness in wire electric discharge turning (WEDT) of tungsten carbide composite has been made to model through response surface methodology (RSM). A Taguchi’s standard Design of experiments involving five input variables with three levels has been employed to establish a mathematical model between input parameters and responses. Percentage of cobalt content, spindle speed, Pulse on-time, wire feed and pulse off-time were changed during the experimental tests based on the Taguchi’s orthogonal array L27 (3^13). Analysis of variance (ANOVA) revealed that the mathematical models obtained can adequately describe performance within the parameters of the factors considered. There was a good agreement between the experimental and predicted values in this study.
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
The study explores the reasons for a transgender to become entrepreneurs. In this study transgender entrepreneur was taken as independent variable and reasons to become as dependent variable. Data were collected through a structured questionnaire containing a five point Likert Scale. The study examined the data of 30 transgender entrepreneurs in Salem Municipal Corporation of Tamil Nadu State, India. Simple Random sampling technique was used. Garrett Ranking Technique (Percentile Position, Mean Scores) was used as the analysis for the present study to identify the top 13 stimulus factors for establishment of trans entrepreneurial venture. Economic advancement of a nation is governed upon the upshot of a resolute entrepreneurial doings. The conception of entrepreneurship has stretched and materialized to the socially deflated uncharted sections of transgender community. Presently transgenders have smashed their stereotypes and are making recent headlines of achievements in various fields of our Indian society. The trans-community is gradually being observed in a new light and has been trying to achieve prospective growth in entrepreneurship. The findings of the research revealed that the optimistic changes are taking place to change affirmative societal outlook of the transgender for entrepreneurial ventureship. It also laid emphasis on other transgenders to renovate their traditional living. The paper also highlights that legislators, supervisory body should endorse an impartial canons and reforms in Tamil Nadu Transgender Welfare Board Association.
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
Since ages gender difference is always a debatable theme whether caused by nature, evolution or environment. The birth of a transgender is dreadful not only for the child but also for their parents. The pain of living in the wrong physique and treated as second class victimized citizen is outrageous and fully harboured with vicious baseless negative scruples. For so long, social exclusion had perpetuated inequality and deprivation experiencing ingrained malign stigma and besieged victims of crime or violence across their life spans. They are pushed into the murky way of life with a source of eternal disgust, bereft sexual potency and perennial fear. Although they are highly visible but very little is known about them. The common public needs to comprehend the ravaged arrogance on these insensitive souls and assist in integrating them into the mainstream by offering equal opportunity, treat with humanity and respect their dignity. Entrepreneurship in the current age is endorsing the gender fairness movement. Unstable careers and economic inadequacy had inclined one of the gender variant people called Transgender to become entrepreneurs. These tiny budding entrepreneurs resulted in economic transition by means of employment, free from the clutches of stereotype jobs, raised standard of living and handful of financial empowerment. Besides all these inhibitions, they were able to witness a platform for skill set development that ignited them to enter into entrepreneurial domain. This paper epitomizes skill sets involved in trans-entrepreneurs of Thoothukudi Municipal Corporation of Tamil Nadu State and is a groundbreaking determination to sightsee various skills incorporated and the impact on entrepreneurship.
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
The banking and financial services industries are experiencing increased technology penetration. Among them, the banking industry has made technological advancements to better serve the general populace. The economy focused on transforming the banking sector's system into a cashless, paperless, and faceless one. The researcher wants to evaluate the user's intention for utilising a mobile banking application. The study also examines the variables affecting the user's behaviour intention when selecting specific applications for financial transactions. The researcher employed a well-structured questionnaire and a descriptive study methodology to gather the respondents' primary data utilising the snowball sampling technique. The study includes variables like performance expectations, effort expectations, social impact, enabling circumstances, and perceived risk. Each of the aforementioned variables has a major impact on how users utilise mobile banking applications. The outcome will assist the service provider in comprehending the user's history with mobile banking applications.
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
Technology upgradation in banking sector took the economy to view that payment mode towards online transactions using mobile applications. This system enabled connectivity between banks, Merchant and user in a convenient mode. there are various applications used for online transactions such as Google pay, Paytm, freecharge, mobikiwi, oxygen, phonepe and so on and it also includes mobile banking applications. The study aimed at evaluating the predilection of the user in adopting digital transaction. The study is descriptive in nature. The researcher used random sample techniques to collect the data. The findings reveal that mobile applications differ with the quality of service rendered by Gpay and Phonepe. The researcher suggest the Phonepe application should focus on implementing the application should be user friendly interface and Gpay on motivating the users to feel the importance of request for money and modes of payments in the application.
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
The prototype of a voice-based ATM for visually impaired using Arduino is to help people who are blind. This uses RFID cards which contain users fingerprint encrypted on it and interacts with the users through voice commands. ATM operates when sensor detects the presence of one person in the cabin. After scanning the RFID card, it will ask to select the mode like –normal or blind. User can select the respective mode through voice input, if blind mode is selected the balance check or cash withdraw can be done through voice input. Normal mode procedure is same as the existing ATM.
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
There is increasing acceptability of emotional intelligence as a major factor in personality assessment and effective human resource management. Emotional intelligence as the ability to build capacity, empathize, co-operate, motivate and develop others cannot be divorced from both effective performance and human resource management systems. The human person is crucial in defining organizational leadership and fortunes in terms of challenges and opportunities and walking across both multinational and bilateral relationships. The growing complexity of the business world requires a great deal of self-confidence, integrity, communication, conflict and diversity management to keep the global enterprise within the paths of productivity and sustainability. Using the exploratory research design and 255 participants the result of this original study indicates strong positive correlation between emotional intelligence and effective human resource management. The paper offers suggestions on further studies between emotional intelligence and human capital development and recommends for conflict management as an integral part of effective human resource management.
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
Our life journey, in general, is closely defined by the way we understand the meaning of why we coexist and deal with its challenges. As we develop the "inspiration economy", we could say that nearly all of the challenges we have faced are opportunities that help us to discover the rest of our journey. In this note paper, we explore how being faced with the opportunity of being a close carer for an aging parent with dementia brought intangible discoveries that changed our insight of the meaning of the rest of our life journey.
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
The main objective of this study is to analyze the impact of aspects of Organizational Culture on the Effectiveness of the Performance Management System (PMS) in the Health Care Organization at Thanjavur. Organizational Culture and PMS play a crucial role in present-day organizations in achieving their objectives. PMS needs employees’ cooperation to achieve its intended objectives. Employees' cooperation depends upon the organization’s culture. The present study uses exploratory research to examine the relationship between the Organization's culture and the Effectiveness of the Performance Management System. The study uses a Structured Questionnaire to collect the primary data. For this study, Thirty-six non-clinical employees were selected from twelve randomly selected Health Care organizations at Thanjavur. Thirty-two fully completed questionnaires were received.
Living in 21st century in itself reminds all of us the necessity of police and its administration. As more and more we are entering into the modern society and culture, the more we require the services of the so called ‘Khaki Worthy’ men i.e., the police personnel. Whether we talk of Indian police or the other nation’s police, they all have the same recognition as they have in India. But as already mentioned, their services and requirements are different after the like 26th November, 2008 incidents, where they without saving their own lives has sacrificed themselves without any hitch and without caring about their respective family members and wards. In other words, they are like our heroes and mentors who can guide us from the darkness of fear, militancy, corruption and other dark sides of life and so on. Now the question arises, if Gandhi would have been alive today, what would have been his reaction/opinion to the police and its functioning? Would he have some thing different in his mind now what he had been in his mind before the partition or would he be going to start some Satyagraha in the form of some improvement in the functioning of the police administration? Really these questions or rather night mares can come to any one’s mind, when there is too much confusion is prevailing in our minds, when there is too much corruption in the society and when the polices working is also in the questioning because of one or the other case throughout the India. It is matter of great concern that we have to thing over our administration and our practical approach because the police personals are also like us, they are part and parcel of our society and among one of us, so why we all are pin pointing towards them.
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
The goal of this study was to see how talent management affected employee retention in the selected IT organizations in Chennai. The fundamental issue was the difficulty to attract, hire, and retain talented personnel who perform well and the gap between supply and demand of talent acquisition and retaining them within the firms. The study's main goals were to determine the impact of talent management on employee retention in IT companies in Chennai, investigate talent management strategies that IT companies could use to improve talent acquisition, performance management, career planning and formulate retention strategies that the IT firms could use. The respondents were given a structured close-ended questionnaire with the 5 Point Likert Scale as part of the study's quantitative research design. The target population consisted of 289 IT professionals. The questionnaires were distributed and collected by the researcher directly. The Statistical Package for Social Sciences (SPSS) was used to collect and analyse the questionnaire responses. Hypotheses that were formulated for the various areas of the study were tested using a variety of statistical tests. The key findings of the study suggested that talent management had an impact on employee retention. The studies also found that there is a clear link between the implementation of talent management and retention measures. Management should provide enough training and development for employees, clarify job responsibilities, provide adequate remuneration packages, and recognise employees for exceptional performance.
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
Globally, Millions of dollars were spent by the organizations for employing skilled Information Technology (IT) professionals. It is costly to replace unskilled employees with IT professionals possessing technical skills and competencies that aid in interconnecting the business processes. The organization’s employment tactics were forced to alter by globalization along with technological innovations as they consistently diminish to remain lean, outsource to concentrate on core competencies along with restructuring/reallocate personnel to gather efficiency. As other jobs, organizations or professions have become reasonably more appropriate in a shifting employment landscape, the above alterations trigger both involuntary as well as voluntary turnover. The employee view on jobs is also afflicted by the COVID-19 pandemic along with the employee-driven labour market. So, having effective strategies is necessary to tackle the withdrawal rate of employees. By associating Emotional Intelligence (EI) along with Talent Management (TM) in the IT industry, the rise in attrition rate was analyzed in this study. Only 303 respondents were collected out of 350 participants to whom questionnaires were distributed. From the employees of IT organizations located in Bangalore (India), the data were congregated. A simple random sampling methodology was employed to congregate data as of the respondents. Generating the hypothesis along with testing is eventuated. The effect of EI and TM along with regression analysis between TM and EI was analyzed. The outcomes indicated that employee and Organizational Performance (OP) were elevated by effective EI along with TM.
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
By implementing talent management strategy, organizations would have the option to retain their skilled professionals while additionally working on their overall performance. It is the course of appropriately utilizing the ideal individuals, setting them up for future top positions, exploring and dealing with their performance, and holding them back from leaving the organization. It is employee performance that determines the success of every organization. The firm quickly obtains an upper hand over its rivals in the event that its employees having particular skills that cannot be duplicated by the competitors. Thus, firms are centred on creating successful talent management practices and processes to deal with the unique human resources. Firms are additionally endeavouring to keep their top/key staff since on the off chance that they leave; the whole store of information leaves the firm's hands. The study's objective was to determine the impact of talent management on organizational performance among the selected IT organizations in Chennai. The study recommends that talent management limitedly affects performance. On the off chance that this talent is appropriately management and implemented properly, organizations might benefit as much as possible from their maintained assets to support development and productivity, both monetarily and non-monetarily.
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
Banking regulations act of India, 1949 defines banking as “acceptance of deposits for the purpose of lending or investment from the public, repayment on demand or otherwise and withdrawable through cheques, drafts order or otherwise”, the major participants of the Indian financial system are commercial banks, the financial institution encompassing term lending institutions. Investments institutions, specialized financial institution and the state level development banks, non banking financial companies (NBFC) and other market intermediaries such has the stock brokers and money lenders are among the oldest of the certain variants of NBFC and the oldest market participants. The asset quality of banks is one of the most important indicators of their financial health. The Indian banking sector has been facing severe problems of increasing Non- Performing Assets (NPAs). The NPAs growth directly and indirectly affects the quality of assets and profitability of banks. It also shows the efficiency of banks credit risk management and the recovery effectiveness. NPA do not generate any income, whereas, the bank is required to make provisions for such as assets that why is a double edge weapon. This paper outlines the concept of quality of bank loans of different types like Housing, Agriculture and MSME loans in state Haryana of selected public and private sector banks. This study is highlighting problems associated with the role of commercial bank in financing Small and Medium Scale Enterprises (SME). The overall objective of the research was to assess the effect of the financing provisions existing for the setting up and operations of MSMEs in the country and to generate recommendations for more robust financing mechanisms for successful operation of the MSMEs, in turn understanding the impact of MSME loans on financial institutions due to NPA. There are many research conducted on the topic of Non- Performing Assets (NPA) Management, concerning particular bank, comparative study of public and private banks etc. In this paper the researcher is considering the aggregate data of selected public sector and private sector banks and attempts to compare the NPA of Housing, Agriculture and MSME loans in state Haryana of public and private sector banks. The tools used in the study are average and Anova test and variance. The findings reveal that NPA is common problem for both public and private sector banks and is associated with all types of loans either that is housing loans, agriculture loans and loans to SMES. NPAs of both public and private sector banks show the increasing trend. In 2010-11 GNPA of public and private sector were at same level it was 2% but after 2010-11 it increased in many fold and at present there is GNPA in some more than 15%. It shows the dark area of Indian banking sector.
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
An experiment conducted in this study found that BaSO4 changed Nylon 6's mechanical properties. By changing the weight ratios, BaSO4 was used to make Nylon 6. This Researcher looked into how hard Nylon-6/BaSO4 composites are and how well they wear. Experiments were done based on Taguchi design L9. Nylon-6/BaSO4 composites can be tested for their hardness number using a Rockwell hardness testing apparatus. On Nylon/BaSO4, the wear behavior was measured by a wear monitor, pinon-disc friction by varying reinforcement, sliding speed, and sliding distance, and the microstructure of the crack surfaces was observed by SEM. This study provides significant contributions to ultimate strength by increasing BaSO4 content up to 16% in the composites, and sliding speed contributes 72.45% to the wear rate
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
The majority of the population in India lives in villages. The village is the back bone of the country. Village or rural industries play an important role in the national economy, particularly in the rural development. Developing the rural economy is one of the key indicators towards a country’s success. Whether it be the need to look after the welfare of the farmers or invest in rural infrastructure, Governments have to ensure that rural development isn’t compromised. The economic development of our country largely depends on the progress of rural areas and the standard of living of rural masses. Village or rural industries play an important role in the national economy, particularly in the rural development. Rural entrepreneurship is based on stimulating local entrepreneurial talent and the subsequent growth of indigenous enterprises. It recognizes opportunity in the rural areas and accelerates a unique blend of resources either inside or outside of agriculture. Rural entrepreneurship brings an economic value to the rural sector by creating new methods of production, new markets, new products and generate employment opportunities thereby ensuring continuous rural development. Social Entrepreneurship has the direct and primary objective of serving the society along with the earning profits. So, social entrepreneurship is different from the economic entrepreneurship as its basic objective is not to earn profits but for providing innovative solutions to meet the society needs which are not taken care by majority of the entrepreneurs as they are in the business for profit making as a sole objective. So, the Social Entrepreneurs have the huge growth potential particularly in the developing countries like India where we have huge societal disparities in terms of the financial positions of the population. Still 22 percent of the Indian population is below the poverty line and also there is disparity among the rural & urban population in terms of families living under BPL. 25.7 percent of the rural population & 13.7 percent of the urban population is under BPL which clearly shows the disparity of the poor people in the rural and urban areas. The need to develop social entrepreneurship in agriculture is dictated by a large number of social problems. Such problems include low living standards, unemployment, and social tension. The reasons that led to the emergence of the practice of social entrepreneurship are the above factors. The research problem lays upon disclosing the importance of role of social entrepreneurship in rural development of India. The paper the tendencies of social entrepreneurship in India, to present successful examples of such business for providing recommendations how to improve situation in rural areas in terms of social entrepreneurship development. Indian government has made some steps towards development of social enterprises, social entrepreneurship, and social in- novation, but a lot remains to be improved.
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
Distribution system is a critical link between the electric power distributor and the consumers. Most of the distribution networks commonly used by the electric utility is the radial distribution network. However in this type of network, it has technical issues such as enormous power losses which affect the quality of the supply. Nowadays, the introduction of Distributed Generation (DG) units in the system help improve and support the voltage profile of the network as well as the performance of the system components through power loss mitigation. In this study network reconfiguration was done using two meta-heuristic algorithms Particle Swarm Optimization and Gravitational Search Algorithm (PSO-GSA) to enhance power quality and voltage profile in the system when simultaneously applied with the DG units. Backward/Forward Sweep Method was used in the load flow analysis and simulated using the MATLAB program. Five cases were considered in the Reconfiguration based on the contribution of DG units. The proposed method was tested using IEEE 33 bus system. Based on the results, there was a voltage profile improvement in the system from 0.9038 p.u. to 0.9594 p.u.. The integration of DG in the network also reduced power losses from 210.98 kW to 69.3963 kW. Simulated results are drawn to show the performance of each case.
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
Manufacturing industries have witnessed an outburst in productivity. For productivity improvement manufacturing industries are taking various initiatives by using lean tools and techniques. However, in different manufacturing industries, frugal approach is applied in product design and services as a tool for improvement. Frugal approach contributed to prove less is more and seems indirectly contributing to improve productivity. Hence, there is need to understand status of frugal approach application in manufacturing industries. All manufacturing industries are trying hard and putting continuous efforts for competitive existence. For productivity improvements, manufacturing industries are coming up with different effective and efficient solutions in manufacturing processes and operations. To overcome current challenges, manufacturing industries have started using frugal approach in product design and services. For this study, methodology adopted with both primary and secondary sources of data. For primary source interview and observation technique is used and for secondary source review has done based on available literatures in website, printed magazines, manual etc. An attempt has made for understanding application of frugal approach with the study of manufacturing industry project. Manufacturing industry selected for this project study is Mahindra and Mahindra Ltd. This paper will help researcher to find the connections between the two concepts productivity improvement and frugal approach. This paper will help to understand significance of frugal approach for productivity improvement in manufacturing industry. This will also help to understand current scenario of frugal approach in manufacturing industry. In manufacturing industries various process are involved to deliver the final product. In the process of converting input in to output through manufacturing process productivity plays very critical role. Hence this study will help to evolve status of frugal approach in productivity improvement programme. The notion of frugal can be viewed as an approach towards productivity improvement in manufacturing industries.
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
In this paper, we investigated a queuing model of fuzzy environment-based a multiple channel queuing model (M/M/C) ( /FCFS) and study its performance under realistic conditions. It applies a nonagonal fuzzy number to analyse the relevant performance of a multiple channel queuing model (M/M/C) ( /FCFS). Based on the sub interval average ranking method for nonagonal fuzzy number, we convert fuzzy number to crisp one. Numerical results reveal that the efficiency of this method. Intuitively, the fuzzy environment adapts well to a multiple channel queuing models (M/M/C) ( /FCFS) are very well.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...alexjohnson7307
Predictive maintenance is a proactive approach that anticipates equipment failures before they happen. At the forefront of this innovative strategy is Artificial Intelligence (AI), which brings unprecedented precision and efficiency. AI in predictive maintenance is transforming industries by reducing downtime, minimizing costs, and enhancing productivity.
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3Data Hops
Free A4 downloadable and printable Cyber Security, Social Engineering Safety and security Training Posters . Promote security awareness in the home or workplace. Lock them Out From training providers datahops.com
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
2. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014
17 – 19, July 2014, Mysore, Karnataka, India
Fig. 1: Basic structure of communication system
The basic structure of a communication system is shown in Fig.1. A basic communication
system consists of an information source which generates the message. The generated message will
be in binary form. The transmitter will usually consist of an encoder which converts the digital
message into a form suitable for transmission. The encoded message is then fed into the
communication channel. The message usually gets corrupted due to the induced noise. The decoder
present in the receiver will detect and correct errors followed by decoding to retrieve the original
message.
The information can of course be anything representable in symbols. For our purposes, this
information should be representable as a string of binary digits. The purpose of the communication
system is to convey the information from one point to another with no degradation.
The noisy channel adds noise to the information without our consent, corrupting the
information to a degree related to the character and strength of the noise. The detailed behaviour of
communication systems in the presence of noise is a lengthy study in itself.
The most important concern mostly is the encoder and decoder blocks. These blocks
implement the coding systems spoken by Shannon, adding some extra bits in the encoder, and
removing them again in the decoder. The decoder detects errors, corrects errors, or a combination of
both. A good design will have the information on the input and output identical. Not surprisingly,
there are numerous coding systems. Each has a suitable area of service.
87
1.1 Information and Coding Theory
A code is a rule for converting a piece of information (for example, a letter, word, phrase, or
gesture) into another - usually shortened or covert - form or representation, not necessarily of the
same type. In communication and information processing, encoding is the process by which
information from a source is converted into symbols to be communicated. Decoding is the reverse
process, converting these code symbols back into information understandable by a receiver.
One reason for coding is to enable communication in places where ordinary plain language,
spoken or written, is difficult or impossible.
1.2 Galois Field
In algebra, a finite field or Galois field is a field that contains a finite number of elements,
called its size.
Finite fields only exist for which the size is a prime power pk (where p is a prime number and
k is a positive integer). For each prime power, there is a finite field with this size, and all fields of a
given size are isomorphic. The characteristic of a field of size pk is p (this means that adding p copies
of any element always results in zero). In a finite field of size q, the polynomial Tq − T is the product
of q different linear factors, and, therefore, has all the elements of the field as roots. The
multiplicative group of the non-zero elements of a finite field is a cyclic group, and thus, the non-zero
elements can be expressed as the powers of a single (but generally not unique) element called a
primitive element.
3. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014
17 – 19, July 2014, Mysore, Karnataka, India
Finite fields are important in number theory, algebraic geometry, Galois Theory,
cryptography, and coding theory. The finite fields are classified by size; there is exactly one finite
field to isomorphism of size pk for each prime p and positive integer k. Each finite field of size q is
the splitting field of the polynomial xq - x, and thus the fixed field of the Frobenius endomorphism
which takes x to xq.
Finite fields appear in the following chain of class inclusions: Commutative rings Integral
domains integrally closed domains unique factorization domains principal ideal domains
Euclidean domains fields finite fields.
88
2. BCH CODES
The BCH codes form a class of cyclic error-correcting codes that are constructed using finite
fields. BCH codes were invented in 1959 by French mathematician Alexis Hocquenghem, and
independently in 1960 by Raj Bose and D. K. Ray-Chaudhuri. The acronym BCH comprises the
initials of these inventors' names.
One of the key features of BCH codes is that during code design, there is a precise control
over the number of symbol errors correctable by the code. In particular, it is possible to design binary
BCH codes that can correct multiple bit errors. Another advantage of BCH codes is the ease with
which they can be decoded, namely, via an algebraic method known as syndrome decoding. This
simplifies the design of the decoder for these codes, using small low-power electronic hardware.
BCH codes are used in applications such as satellite communication, compact disc players,
DVDs, disk drives, solid-state drives and two-dimensional bar codes.
2.1 Description of BCH Cyclic Codes
BCH codes are a generalization of Hamming codes, and they can be designed to be able to
correct any error pattern of size t or less [1, 2, 4]. In this sense the generalization of the Hamming
codes extends the design of codes for t = 1 (Hamming codes) to codes for any desired higher value of
t (BCH codes). The design method is based on taking an LCM of appropriate minimal polynomials.
For any positive integer m 3 and t 2m−1, there exists a binary BCH code CBCH(n, k) with the
following properties:
Code length : n = 2m − 1
Number of parity bits : n − k mt
Minimum Hamming distance : dmin 2t + 1
Error-correction capability : t errors
These codes are able to correct any error pattern of size t or less, in a code vector of length
‘n’, n = 2m − 1. The generator polynomial of a BCH code is described in terms of its roots, taken
from the Galois field GF(2m). If is a primitive element in GF(2m), the generator polynomial g(X) of
a BCH code for correcting t errors in a code vector of length n = 2m − 1 is the minimum-degree
polynomial over GF(2) that has , 2, . . . , 2t as its roots given by Eq. (1).
g(i) = 0, i = 1, 2, . . . , 2t (1)
It also true that g(X) has i and conjugate as its roots. On the other hand, if i(X) is the
minimal polynomial of i then the LCM of 1(X), 2(X), . . . ,2t(X) is the generator polynomial
g(X) given by Eq. (2).
g(X) = LCM{ 1(X), 2(X), . . . , 2t(X)} (2)
4. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014
17 – 19, July 2014, Mysore, Karnataka, India
However, and due to repetition of conjugate roots, it can be shown that the generator
polynomial g(X) can be formed with only the odd index minimal polynomials given by Eq. (3).
g(X) = LCM{ 1(X), 3(X), . . . , 2t−1(X)} (3)
Since the degree of each minimal polynomial is m or less, the degree of g(X) is at most mt.
As BCH codes are cyclic codes, this means that the value of n − k can be at most mt. The
Hamming codes are a particular class of BCH codes, for which the generator polynomial is g(X) =
1(X). A BCH code for t = 1 is then a Hamming code. Since is a primitive element of GF(2m), then
1(X) is a polynomial of degree m. [1][2]
89
3. DESIGN AND ARCHITECTURE
BCH codes are a generalization of Hamming codes, and they can be designed to be able to
correct any error pattern of size ‘t’ or less.
3.1 Design specifications
In our system design of (15, 7) BCH code,
m=4
Code word length= 15,
Information length = 7,
Parity bits length = 8,
Block length = n = 2m –1 = 24 –1 = 15,
Number of parity bits = (n – k) mt; n–k = 15–7 = 8; mt = 4*2 = 8,
Therefore (n – k) = mt
Minimum distance = dmin 2t +1; dmin 4+1=5
These codes are able to correct any error pattern of size 2 or less, in a code vector of length ‘n’, n
= 2m − 1. The generator polynomial of a BCH code is described in terms of its roots, taken from the
Galois field GF (2m).
3.2 Overview of design
Fig.2 represents an overview of our design. The message is represented by 7 bits.
Specifically, the 7 bits are chosen, so that ASCII characters can be easily represented. The seven bit
message is fed into the BCH Encoder. The Encoder converts the seven bit message into a codeword
of length fifteen bits. The first seven bits are the message bits and the last eight bits are the redundant
bits.
The fifteen bit codeword is transmitted through the channel. The Error Introduction Module
will randomly flip any two or one bit which can be treated as virtual noise. Now, the codeword with
one or two bit error is fed into the BCH Decoder module.
Fig. 2: Overview of our design
5. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014
17 – 19, July 2014, Mysore, Karnataka, India
The Decoder module will calculate syndrome for the received codeword and then determine
the position of error bits using the same. Here error is corrected by flipping the error bits. Finally,
error free original message is retrieved back as the output of decoder.
90
3.3 Encoder Design
The 7 bit information is represented by {u0, u1, u2, u3, u4, u5, u6}, then polynomial notation
can be used to show the information such as equation. Here, the bit position ‘n’ from 0 to 7
corresponds to the power of x such as Xn. The polynomial notation of information is given by
Eq. (4).
U(X) = u0 + u1.x1 + u2.x2+ u3.x3+ u4.x4+ u5.x5+ u6.x6 (4)
The 8-bit parity bits {r0, r1, r2, r3, r4, r5, r6, r7} can be represented by Eq. (5)
R(X) = r0 + r1.x1 + r2.x2+ r3.x3+ r4.x4+ r5.x5+ r6.x6+ r7.x7 (5)
r0, r1, …, r7 bits are 8 bits parity bits. These parity coefficients are 0 to 7th power of x. and
Information coefficients are 8 to 14th power of x. Then 15 bits Encoded information can be
represented by Eq. (6).
SB(X) = r0 + r1.x1 + r2.x2+ r3.x3+ r4.x4+ r5.x5+ r6.x6 + r7.x7+ u0.x8 + u1.x9 + u2.x10+ u3.x11
+ u4.x12+ u5.x13+ u6.x14 (6)
In BCH code, R(x) is remainder of U(x)*x8 divided by G(x). U(X).x8 is given by Eq. (7)
U(X).x8 = u0.x8 + u1.x9 + u2.x10+ u3.x11+ u4.x12+u5.x13+ u6.x14 (7)
G(x) = 1+x4+x6+x7+x8 (8)
Here, G(x) is called as the generator polynomial given by Eq. (8).
U(x)*x8 means the coefficients u0……….u6 are shift to higher bit by 8 bits. The order of G(x)
is 8. The remainder R(x) will be order of 7 or less. Here, calculation uses Galois field rule.
The remainder calculation is done using x8= 1+x4+x6+x7 iteratively and polynomial with
order more than 8 can be reduced to less than 7 given by Eq. (9). The result of polynomial is the
remainder polynomial.
x8 = 1+x4+x6+x7 (9)
However, during this computation, addition and/or subtraction between coefficients shall be
replaced by ex-or computation because of Galois field.
Fig. 3 shows the encoder circuit example. SIN input port receives information bits from u6,
u5……down to u0. During this input sequence, the switch is connected to A terminal in order to pass
those u6……..u0 signal to the output SB port and to the shift registers. Since the U(x)*x8 mod G(x)
is calculated, Eq. (10) is used to reduce the power of the polynomial of Eq. (7). Therefore,
x8 = 1+x4+x6+x7 (10)
The above equation means that if the coefficients of x8 = 1, coefficients of 0, 4, 6, 7th will be
exored with ‘1’. Consequently, after inputting all u6………to u0 to the registers, remainder will be
6. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014
17 – 19, July 2014, Mysore, Karnataka, India
calculated. Then after, the switch is connected to B terminal, remainder r7…….. r0 will be shifted out
to SB terminal. The detail operation is shown in Fig. 4.
Fig. 3: Circuit of encoder
In Fig. 5, a case of register values are shown as example.
The one corresponds to information bits = {0, 0, 0, 0, 0, 0, 1}.
Fig. 4: Timing diagram of encoder operation
Consider Fig. 4. The Information bits = {0, 0, 0, 0, 0, 0, 1}, u0 =1 and the value of r7, r0,
91
r4and r6 is equal to one from Eq. (11).
x8= 1+x4+x6+x7 (11)
i.e., r7=r6=r4=r0=1.
Since this operation happens in cycle 7 (last cycle of switch A period), the values are just
shift out at the cycles from 8 to 15 as shown in Fig. 5.
Fig. 5: Encoder operation when information bits are {0, 0, 0, 0, 0, 0, 1}
7. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014
17 – 19, July 2014, Mysore, Karnataka, India
92
3.4 Error introduction module
This module will be integrated to encoder. Its main objective is to flip any two or one bit in
each code word, which is of length fifteen bits.
Fig. 6 shows example for code word input to error introduction module and output code word
with error.
Fig. 6: Error introduction module
3.5 Decoder Design
This section gives a brief idea about decoder design.
3.5.1 Syndrome calculation
The generator polynomial given by Eq. (12) is used in BCH(15,7) encoding.
G(x) = 1+x4+x6+x7+x8 (12)
SB(X) = u0.x8 + u1.x9 + u2.x10+ u3.x11+ u4.x12+u5.x13+ u6.x14 + r0 + r1.x1 + r2.x2+ r3.x3+r4.x4+ r5.x5+
r6.x6+ r7.x7 (13)
SB(x) given by Eq. (13) can be divided by G(x) and if remainder is 0, it can be judge that no
error exists in a code. Actually, BCH(15,7) can correct 2 bit errors in 15 bits codes. The generator
polynomial G(x) is given by Eq. (14).
G1(x) = 1+x+x4
G2(x) = 1+x+x2+x3+x4
G(x) = G1(x).G2(x)
G(x) = (1+x+x4).(1+x+x2+x3+x4)
G(x) = 1+x4+x6+x7+x8 (14)
Then, SB(x) can be divided by either G1(x) or G2(x). If no error in a code, both remainder of
G1(x) and G2(x) are both 0s.
SB(x) is transmitted. Then R(x) is received. If no error happened during transmission, R(x)
can be divided by both G1(x) and G2(x). Here we define Syndrome S1(x) = remainder of R(x) divided
by G1(x), S2(x) = remainder of R(x) divided by G2(x). Since both G1(x) and G2(x) is 4th order
polynomial, syndromes are power of 3 or less polynomials given by Eq. (15) and Eq. (16).
S1(x) = s10 + s11·x1 + s12·x2+ s13·x3 (15)
S2(x) = s20 + s21·x1 + s22·x2+ s23·x3 (16)
8. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014
17 – 19, July 2014, Mysore, Karnataka, India
According to the coefficients (S10, S11, S12, S13) and
93
S20, S21, S22, S23), error status can be
obtained. Since those coefficients are only 8 bits, then totally only 256 cases exists. Fig. 7 shows the
relation between 8 coefficient bits and error status.
The first cell (in Fig. 7) corresponds to syndrome = 0. This cell indicates no errors in code.
BLUE cells are corresponds to 1 bit error. Totally 15 cells are blue cells. The number in the blue cell
indicated the position of the error. Since the error is bit error, error can be recovered by flip the value
at the error position. The RED cell corresponds to 2 bit error. There are 15*14/2=105 cells. Each cell
indicates two error position values. Other 135 empty cells are more than 3 bit errors. The error
cannot be recovered.
In decoding, the two key functions are syndrome computation and Table access.
Fig. 7: Relation between 8 syndrome bits and error status
Fig. 8 can be used as Error position Indicator.
Fig. 8: Error position indicator
In Fig. 9, two linear feedback shift register circuits are shown in order to compute two
syndrome S1(x) and S2(x). In the figure, flip flops of linear feedback shift register is named t10-13, and
final computation results will appear in registers s10-13. Fig. 10 shows the operational timing diagram
of the circuit. In first 11 cycles, the switch is connected to a port, and then feedback operation
happens. Since first 11 cycles corresponds to 14th to 4th order of the xn and the power is larger than
order of syndromes, feedback operation is required. In last 4 cycles, the switch is connected to B port
and simple exor operation and shift operation are performed.
START signal is asserted to indicate the beginning and t10-13 flip flop outputs are forced to ‘0’
by AND gates for initializing. As you can see from Fig. 10, at the cycle of 14, syndrome values
appear in s10-13 flip flops. By accessing the Fig. 7 using the 8 syndrome bits and error status can be
found.
9. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014
17 – 19, July 2014, Mysore, Karnataka, India
Fig. 9: Syndrome computation circuit example
Fig. 10: Timing diagram of Syndrome computation
In Fig. 11, syndrome are computed from input YELLOW cell of
(1,0,0,0,0,0,0,1,1,1,0,1,0,0,0). In this case, the input does not include errors. Then the computed
syndromes in RED cells are all 0s.
94
After de-assertion of RESET signal, ENCODER generates START and SBWE signals. Every
15 cycle is one BCH(15, 7) packet data. DECODER received SBWE signal and perform error
correction to generate RBEC signal which includes both information and parity. TOTBITS signal is
total received bits and ERRBITS is the number of error bits received. [3]
10. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014
17 – 19, July 2014, Mysore, Karnataka, India
Fig. 11: Syndrome computation example (no error case)
95
4. DESIGN VERIFICATION
This section provides a brief idea as to how the theoretical design was tested before practical
implementation.
4.1 C Modelling
The entire design was first tested using C language. A C model was developed to mimic the
operations of encoder, error introduction module and decoder. All the three modules were executed
together to verify their performance and synchronization.
4.2 C modelling results
The input message is seven bits wide. The encoder takes in the message and produces 15 bit
code-word. The user has to input the error bit locations. Error will be introduced in the code-word
correspondingly. At the decoder, Syndrome-1 and Syndrome-2 will be calculated to detect the
position of error. The errors will then be suitably corrected by flipping the error bit locations.
In Fig. 12, input message has seven bits. It will be encoded to obtain codeword of fifteen bits.
Fig. 12: Output of C Model
Using error introduction module fifth and ninth bits are flipped. The codeword word with
error is fed to decoder, which will calculate the syndromes according to error infused. Based on the
syndrome values error positions will be identified and rectified.
11. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014
17 – 19, July 2014, Mysore, Karnataka, India
96
5. CONCLUSION
A string of ASCII characters were successfully transmitted and received over the noisy
channel. One or two bits of the code-word were randomly flipped during its transmission over the
channel. The performance of the error control system was appreciable in detection and correction of
maximum two bits errors in each codeword of length 15. C model was developed to mimic the
operations of encoder, error introduction module and decoder to verify their performance and
synchronization.
REFERENCES
[1] S. Lin, and D.J. Costello Jr. - “Error Control Coding”, Prentice-Hall, New Jersey, 1983.
[2] Claude E. Shannon and Warren Weaver, “The Mathematical Theory of Communication”,
Chicago: University of Illinois Press, 1963.
[3] LSI Design Contest 2010, Okinawa - http://www.lsi-contest.com/index_e.html
[4] Vera Pless, “Introduction to the Theory of Error Correcting Codes”, 2nd ed., New York:
John Wiley Sons, 1989.