SlideShare a Scribd company logo
1 of 11
Download to read offline
Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 
INTERNATIONAL JOURNAL OF ELECTRONICS AND 
17 – 19, July 2014, Mysore, Karnataka, India 
COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) 
ISSN 0976 – 6464(Print) 
ISSN 0976 – 6472(Online) 
Volume 5, Issue 8, August (2014), pp. 86-96 
© IAEME: http://www.iaeme.com/IJECET.asp 
Journal Impact Factor (2014): 7.2836 (Calculated by GISI) 
www.jifactor.com 
IJECET 
© I A E M E 
ERROR CONTROL CODING USING BOSE-CHAUDHURI-HOCQUENGHEM 
86 
(BCH) CODES 
Eshtaartha Basu1, Dhanush.P2, Kishor S3, Geethashree A4 
1, 2, 3Electronics and Communication Engineering, VVCE, P.B. No.206, Vijayanagar, Mysore, India, 
4Asst. Prof., Electronics and Communication Engineering, VVCE, P.B. No.206, Vijayanagar, 
Mysore, India 
ABSTRACT 
Information and coding theory has applications in telecommunication, where error detection 
and correction techniques enable reliable delivery of data over unreliable communication channels. 
Many communication channels are subject to noise. BCH technique is one of the most reliable error 
control techniques and the most important advantage of BCH technique is both detection and 
correction can be performed. The technique aims at detecting and correcting of two bit errors in a 
code-word of length 15 bits. A seven bit message was specifically chosen so that ASCII characters 
can be easily transmitted. 
Keywords: BCH, codeword, encoder, decoder, syndrome 
1. INTRODUCTION 
In telecommunication, a communication system is a collection of individual communication 
networks, transmission systems, relay stations, tributary stations, and data terminal equipment, 
usually capable of interconnection and interoperation to form an integrated whole. The components 
of a communication system serve a common purpose, are technically compatible, use common 
procedures, respond to controls, and operate in union. Telecommunication is a method of 
communication (e.g., for sports broadcasting, mass media, journalism, etc.). A communication 
subsystem is a functional unit or operational assembly that is smaller than the larger assembly under 
consideration.
Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 
17 – 19, July 2014, Mysore, Karnataka, India 
Fig. 1: Basic structure of communication system 
The basic structure of a communication system is shown in Fig.1. A basic communication 
system consists of an information source which generates the message. The generated message will 
be in binary form. The transmitter will usually consist of an encoder which converts the digital 
message into a form suitable for transmission. The encoded message is then fed into the 
communication channel. The message usually gets corrupted due to the induced noise. The decoder 
present in the receiver will detect and correct errors followed by decoding to retrieve the original 
message. 
The information can of course be anything representable in symbols. For our purposes, this 
information should be representable as a string of binary digits. The purpose of the communication 
system is to convey the information from one point to another with no degradation. 
The noisy channel adds noise to the information without our consent, corrupting the 
information to a degree related to the character and strength of the noise. The detailed behaviour of 
communication systems in the presence of noise is a lengthy study in itself. 
The most important concern mostly is the encoder and decoder blocks. These blocks 
implement the coding systems spoken by Shannon, adding some extra bits in the encoder, and 
removing them again in the decoder. The decoder detects errors, corrects errors, or a combination of 
both. A good design will have the information on the input and output identical. Not surprisingly, 
there are numerous coding systems. Each has a suitable area of service. 
87 
1.1 Information and Coding Theory 
A code is a rule for converting a piece of information (for example, a letter, word, phrase, or 
gesture) into another - usually shortened or covert - form or representation, not necessarily of the 
same type. In communication and information processing, encoding is the process by which 
information from a source is converted into symbols to be communicated. Decoding is the reverse 
process, converting these code symbols back into information understandable by a receiver. 
One reason for coding is to enable communication in places where ordinary plain language, 
spoken or written, is difficult or impossible. 
1.2 Galois Field 
In algebra, a finite field or Galois field is a field that contains a finite number of elements, 
called its size. 
Finite fields only exist for which the size is a prime power pk (where p is a prime number and 
k is a positive integer). For each prime power, there is a finite field with this size, and all fields of a 
given size are isomorphic. The characteristic of a field of size pk is p (this means that adding p copies 
of any element always results in zero). In a finite field of size q, the polynomial Tq − T is the product 
of q different linear factors, and, therefore, has all the elements of the field as roots. The 
multiplicative group of the non-zero elements of a finite field is a cyclic group, and thus, the non-zero 
elements can be expressed as the powers of a single (but generally not unique) element called a 
primitive element.
Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 
17 – 19, July 2014, Mysore, Karnataka, India 
Finite fields are important in number theory, algebraic geometry, Galois Theory, 
cryptography, and coding theory. The finite fields are classified by size; there is exactly one finite 
field to isomorphism of size pk for each prime p and positive integer k. Each finite field of size q is 
the splitting field of the polynomial xq - x, and thus the fixed field of the Frobenius endomorphism 
which takes x to xq. 
Finite fields appear in the following chain of class inclusions: Commutative rings  Integral 
domains  integrally closed domains  unique factorization domains  principal ideal domains  
Euclidean domains  fields finite fields. 
88 
2. BCH CODES 
The BCH codes form a class of cyclic error-correcting codes that are constructed using finite 
fields. BCH codes were invented in 1959 by French mathematician Alexis Hocquenghem, and 
independently in 1960 by Raj Bose and D. K. Ray-Chaudhuri. The acronym BCH comprises the 
initials of these inventors' names. 
One of the key features of BCH codes is that during code design, there is a precise control 
over the number of symbol errors correctable by the code. In particular, it is possible to design binary 
BCH codes that can correct multiple bit errors. Another advantage of BCH codes is the ease with 
which they can be decoded, namely, via an algebraic method known as syndrome decoding. This 
simplifies the design of the decoder for these codes, using small low-power electronic hardware. 
BCH codes are used in applications such as satellite communication, compact disc players, 
DVDs, disk drives, solid-state drives and two-dimensional bar codes. 
2.1 Description of BCH Cyclic Codes 
BCH codes are a generalization of Hamming codes, and they can be designed to be able to 
correct any error pattern of size t or less [1, 2, 4]. In this sense the generalization of the Hamming 
codes extends the design of codes for t = 1 (Hamming codes) to codes for any desired higher value of 
t (BCH codes). The design method is based on taking an LCM of appropriate minimal polynomials. 
For any positive integer m  3 and t  2m−1, there exists a binary BCH code CBCH(n, k) with the 
following properties: 
Code length : n = 2m − 1 
Number of parity bits : n − k  mt 
Minimum Hamming distance : dmin  2t + 1 
Error-correction capability : t errors 
These codes are able to correct any error pattern of size t or less, in a code vector of length 
‘n’, n = 2m − 1. The generator polynomial of a BCH code is described in terms of its roots, taken 
from the Galois field GF(2m). If  is a primitive element in GF(2m), the generator polynomial g(X) of 
a BCH code for correcting t errors in a code vector of length n = 2m − 1 is the minimum-degree 
polynomial over GF(2) that has , 2, . . . , 2t as its roots given by Eq. (1). 
g(i) = 0, i = 1, 2, . . . , 2t (1) 
It also true that g(X) has i and conjugate as its roots. On the other hand, if i(X) is the 
minimal polynomial of i then the LCM of 1(X), 2(X), . . . ,2t(X) is the generator polynomial 
g(X) given by Eq. (2). 
g(X) = LCM{ 1(X), 2(X), . . . , 2t(X)} (2)
Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 
17 – 19, July 2014, Mysore, Karnataka, India 
However, and due to repetition of conjugate roots, it can be shown that the generator 
polynomial g(X) can be formed with only the odd index minimal polynomials given by Eq. (3). 
g(X) = LCM{ 1(X), 3(X), . . . , 2t−1(X)} (3) 
Since the degree of each minimal polynomial is m or less, the degree of g(X) is at most mt. 
As BCH codes are cyclic codes, this means that the value of n − k can be at most mt. The 
Hamming codes are a particular class of BCH codes, for which the generator polynomial is g(X) = 
1(X). A BCH code for t = 1 is then a Hamming code. Since  is a primitive element of GF(2m), then 
1(X) is a polynomial of degree m. [1][2] 
89 
3. DESIGN AND ARCHITECTURE 
BCH codes are a generalization of Hamming codes, and they can be designed to be able to 
correct any error pattern of size ‘t’ or less. 
3.1 Design specifications 
In our system design of (15, 7) BCH code, 
m=4 
Code word length= 15, 
Information length = 7, 
Parity bits length = 8, 
Block length = n = 2m –1 = 24 –1 = 15, 
Number of parity bits = (n – k)  mt; n–k = 15–7 = 8; mt = 4*2 = 8, 
Therefore (n – k) = mt 
Minimum distance = dmin  2t +1; dmin 4+1=5 
These codes are able to correct any error pattern of size 2 or less, in a code vector of length ‘n’, n 
= 2m − 1. The generator polynomial of a BCH code is described in terms of its roots, taken from the 
Galois field GF (2m). 
3.2 Overview of design 
Fig.2 represents an overview of our design. The message is represented by 7 bits. 
Specifically, the 7 bits are chosen, so that ASCII characters can be easily represented. The seven bit 
message is fed into the BCH Encoder. The Encoder converts the seven bit message into a codeword 
of length fifteen bits. The first seven bits are the message bits and the last eight bits are the redundant 
bits. 
The fifteen bit codeword is transmitted through the channel. The Error Introduction Module 
will randomly flip any two or one bit which can be treated as virtual noise. Now, the codeword with 
one or two bit error is fed into the BCH Decoder module. 
Fig. 2: Overview of our design
Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 
17 – 19, July 2014, Mysore, Karnataka, India 
The Decoder module will calculate syndrome for the received codeword and then determine 
the position of error bits using the same. Here error is corrected by flipping the error bits. Finally, 
error free original message is retrieved back as the output of decoder. 
90 
3.3 Encoder Design 
The 7 bit information is represented by {u0, u1, u2, u3, u4, u5, u6}, then polynomial notation 
can be used to show the information such as equation. Here, the bit position ‘n’ from 0 to 7 
corresponds to the power of x such as Xn. The polynomial notation of information is given by 
Eq. (4). 
U(X) = u0 + u1.x1 + u2.x2+ u3.x3+ u4.x4+ u5.x5+ u6.x6 (4) 
The 8-bit parity bits {r0, r1, r2, r3, r4, r5, r6, r7} can be represented by Eq. (5) 
R(X) = r0 + r1.x1 + r2.x2+ r3.x3+ r4.x4+ r5.x5+ r6.x6+ r7.x7 (5) 
r0, r1, …, r7 bits are 8 bits parity bits. These parity coefficients are 0 to 7th power of x. and 
Information coefficients are 8 to 14th power of x. Then 15 bits Encoded information can be 
represented by Eq. (6). 
SB(X) = r0 + r1.x1 + r2.x2+ r3.x3+ r4.x4+ r5.x5+ r6.x6 + r7.x7+ u0.x8 + u1.x9 + u2.x10+ u3.x11 
+ u4.x12+ u5.x13+ u6.x14 (6) 
In BCH code, R(x) is remainder of U(x)*x8 divided by G(x). U(X).x8 is given by Eq. (7) 
U(X).x8 = u0.x8 + u1.x9 + u2.x10+ u3.x11+ u4.x12+u5.x13+ u6.x14 (7) 
G(x) = 1+x4+x6+x7+x8 (8) 
Here, G(x) is called as the generator polynomial given by Eq. (8). 
U(x)*x8 means the coefficients u0……….u6 are shift to higher bit by 8 bits. The order of G(x) 
is 8. The remainder R(x) will be order of 7 or less. Here, calculation uses Galois field rule. 
The remainder calculation is done using x8= 1+x4+x6+x7 iteratively and polynomial with 
order more than 8 can be reduced to less than 7 given by Eq. (9). The result of polynomial is the 
remainder polynomial. 
x8 = 1+x4+x6+x7 (9) 
However, during this computation, addition and/or subtraction between coefficients shall be 
replaced by ex-or computation because of Galois field. 
Fig. 3 shows the encoder circuit example. SIN input port receives information bits from u6, 
u5……down to u0. During this input sequence, the switch is connected to A terminal in order to pass 
those u6……..u0 signal to the output SB port and to the shift registers. Since the U(x)*x8 mod G(x) 
is calculated, Eq. (10) is used to reduce the power of the polynomial of Eq. (7). Therefore, 
x8 = 1+x4+x6+x7 (10) 
The above equation means that if the coefficients of x8 = 1, coefficients of 0, 4, 6, 7th will be 
exored with ‘1’. Consequently, after inputting all u6………to u0 to the registers, remainder will be
Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 
17 – 19, July 2014, Mysore, Karnataka, India 
calculated. Then after, the switch is connected to B terminal, remainder r7…….. r0 will be shifted out 
to SB terminal. The detail operation is shown in Fig. 4. 
Fig. 3: Circuit of encoder 
In Fig. 5, a case of register values are shown as example. 
The one corresponds to information bits = {0, 0, 0, 0, 0, 0, 1}. 
Fig. 4: Timing diagram of encoder operation 
Consider Fig. 4. The Information bits = {0, 0, 0, 0, 0, 0, 1}, u0 =1 and the value of r7, r0, 
91 
r4and r6 is equal to one from Eq. (11). 
x8= 1+x4+x6+x7 (11) 
i.e., r7=r6=r4=r0=1. 
 
Since this operation happens in cycle 7 (last cycle of switch A period), the values are just 
shift out at the cycles from 8 to 15 as shown in Fig. 5. 
 
Fig. 5: Encoder operation when information bits are {0, 0, 0, 0, 0, 0, 1}
Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 
17 – 19, July 2014, Mysore, Karnataka, India 
92 
3.4 Error introduction module 
This module will be integrated to encoder. Its main objective is to flip any two or one bit in 
each code word, which is of length fifteen bits. 
Fig. 6 shows example for code word input to error introduction module and output code word 
with error. 
Fig. 6: Error introduction module 
3.5 Decoder Design 
This section gives a brief idea about decoder design. 
3.5.1 Syndrome calculation 
The generator polynomial given by Eq. (12) is used in BCH(15,7) encoding. 
 
G(x) = 1+x4+x6+x7+x8 (12) 
SB(X) = u0.x8 + u1.x9 + u2.x10+ u3.x11+ u4.x12+u5.x13+ u6.x14 + r0 + r1.x1 + r2.x2+ r3.x3+r4.x4+ r5.x5+ 
r6.x6+ r7.x7 (13) 
SB(x) given by Eq. (13) can be divided by G(x) and if remainder is 0, it can be judge that no 
error exists in a code. Actually, BCH(15,7) can correct 2 bit errors in 15 bits codes. The generator 
polynomial G(x) is given by Eq. (14). 
G1(x) = 1+x+x4 
G2(x) = 1+x+x2+x3+x4 
G(x) = G1(x).G2(x) 
G(x) = (1+x+x4).(1+x+x2+x3+x4) 
G(x) = 1+x4+x6+x7+x8 (14) 
Then, SB(x) can be divided by either G1(x) or G2(x). If no error in a code, both remainder of 
G1(x) and G2(x) are both 0s. 
SB(x) is transmitted. Then R(x) is received. If no error happened during transmission, R(x) 
can be divided by both G1(x) and G2(x). Here we define Syndrome S1(x) = remainder of R(x) divided 
by G1(x), S2(x) = remainder of R(x) divided by G2(x). Since both G1(x) and G2(x) is 4th order 
polynomial, syndromes are power of 3 or less polynomials given by Eq. (15) and Eq. (16). 
S1(x) = s10 + s11·x1 + s12·x2+ s13·x3 (15) 
S2(x) = s20 + s21·x1 + s22·x2+ s23·x3 (16)
Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 
17 – 19, July 2014, Mysore, Karnataka, India 
According to the coefficients (S10, S11, S12, S13) and 
93 
 
S20, S21, S22, S23), error status can be 
obtained. Since those coefficients are only 8 bits, then totally only 256 cases exists. Fig. 7 shows the 
relation between 8 coefficient bits and error status. 
The first cell (in Fig. 7) corresponds to syndrome = 0. This cell indicates no errors in code. 
BLUE cells are corresponds to 1 bit error. Totally 15 cells are blue cells. The number in the blue cell 
indicated the position of the error. Since the error is bit error, error can be recovered by flip the value 
at the error position. The RED cell corresponds to 2 bit error. There are 15*14/2=105 cells. Each cell 
indicates two error position values. Other 135 empty cells are more than 3 bit errors. The error 
cannot be recovered. 
In decoding, the two key functions are syndrome computation and Table access. 
Fig. 7: Relation between 8 syndrome bits and error status 
Fig. 8 can be used as Error position Indicator. 
Fig. 8: Error position indicator 
In Fig. 9, two linear feedback shift register circuits are shown in order to compute two 
syndrome S1(x) and S2(x). In the figure, flip flops of linear feedback shift register is named t10-13, and 
final computation results will appear in registers s10-13. Fig. 10 shows the operational timing diagram 
of the circuit. In first 11 cycles, the switch is connected to a port, and then feedback operation 
happens. Since first 11 cycles corresponds to 14th to 4th order of the xn and the power is larger than 
order of syndromes, feedback operation is required. In last 4 cycles, the switch is connected to B port 
and simple exor operation and shift operation are performed. 
START signal is asserted to indicate the beginning and t10-13 flip flop outputs are forced to ‘0’ 
by AND gates for initializing. As you can see from Fig. 10, at the cycle of 14, syndrome values 
appear in s10-13 flip flops. By accessing the Fig. 7 using the 8 syndrome bits and error status can be 
found.
Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 
17 – 19, July 2014, Mysore, Karnataka, India 
Fig. 9: Syndrome computation circuit example 
Fig. 10: Timing diagram of Syndrome computation 
In Fig. 11, syndrome are computed from input YELLOW cell of 
(1,0,0,0,0,0,0,1,1,1,0,1,0,0,0). In this case, the input does not include errors. Then the computed 
syndromes in RED cells are all 0s. 
94 
 
After de-assertion of RESET signal, ENCODER generates START and SBWE signals. Every 
15 cycle is one BCH(15, 7) packet data. DECODER received SBWE signal and perform error 
correction to generate RBEC signal which includes both information and parity. TOTBITS signal is 
total received bits and ERRBITS is the number of error bits received. [3]
Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 
17 – 19, July 2014, Mysore, Karnataka, India 
Fig. 11: Syndrome computation example (no error case) 
 
95 
4. DESIGN VERIFICATION 
This section provides a brief idea as to how the theoretical design was tested before practical 
implementation. 
4.1 C Modelling 
The entire design was first tested using C language. A C model was developed to mimic the 
operations of encoder, error introduction module and decoder. All the three modules were executed 
together to verify their performance and synchronization. 
4.2 C modelling results 
The input message is seven bits wide. The encoder takes in the message and produces 15 bit 
code-word. The user has to input the error bit locations. Error will be introduced in the code-word 
correspondingly. At the decoder, Syndrome-1 and Syndrome-2 will be calculated to detect the 
position of error. The errors will then be suitably corrected by flipping the error bit locations. 
In Fig. 12, input message has seven bits. It will be encoded to obtain codeword of fifteen bits. 
Fig. 12: Output of C Model 
Using error introduction module fifth and ninth bits are flipped. The codeword word with 
error is fed to decoder, which will calculate the syndromes according to error infused. Based on the 
syndrome values error positions will be identified and rectified.
Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 
17 – 19, July 2014, Mysore, Karnataka, India 
96 
5. CONCLUSION 
A string of ASCII characters were successfully transmitted and received over the noisy 
channel. One or two bits of the code-word were randomly flipped during its transmission over the 
channel. The performance of the error control system was appreciable in detection and correction of 
maximum two bits errors in each codeword of length 15. C model was developed to mimic the 
operations of encoder, error introduction module and decoder to verify their performance and 
synchronization. 
REFERENCES 
[1] S. Lin, and D.J. Costello Jr. - “Error Control Coding”, Prentice-Hall, New Jersey, 1983. 
[2] Claude E. Shannon and Warren Weaver, “The Mathematical Theory of Communication”, 
Chicago: University of Illinois Press, 1963. 
[3] LSI Design Contest 2010, Okinawa - http://www.lsi-contest.com/index_e.html 
[4] Vera Pless, “Introduction to the Theory of Error Correcting Codes”, 2nd ed., New York: 
John Wiley  Sons, 1989.

More Related Content

What's hot (20)

linear codes and cyclic codes
linear codes and cyclic codeslinear codes and cyclic codes
linear codes and cyclic codes
 
Error control coding bch, reed-solomon etc..
Error control coding   bch, reed-solomon etc..Error control coding   bch, reed-solomon etc..
Error control coding bch, reed-solomon etc..
 
Thesis_Presentation
Thesis_PresentationThesis_Presentation
Thesis_Presentation
 
UNIT-3 : CHANNEL CODING
UNIT-3 : CHANNEL CODINGUNIT-3 : CHANNEL CODING
UNIT-3 : CHANNEL CODING
 
Turbo Codes
Turbo CodesTurbo Codes
Turbo Codes
 
Linear block code
Linear block codeLinear block code
Linear block code
 
Digital Communication: Channel Coding
Digital Communication: Channel CodingDigital Communication: Channel Coding
Digital Communication: Channel Coding
 
Linear block coding
Linear block codingLinear block coding
Linear block coding
 
Reed Solomon encoder and decoder \ ريد سلمون
Reed Solomon encoder and decoder \ ريد سلمونReed Solomon encoder and decoder \ ريد سلمون
Reed Solomon encoder and decoder \ ريد سلمون
 
Pc ie tl_layer (3)
Pc ie tl_layer (3)Pc ie tl_layer (3)
Pc ie tl_layer (3)
 
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
 
Reed solomon code
Reed solomon codeReed solomon code
Reed solomon code
 
Reed solomon codes
Reed solomon codesReed solomon codes
Reed solomon codes
 
8086 microprocessor lab manual
8086 microprocessor lab manual8086 microprocessor lab manual
8086 microprocessor lab manual
 
Coding
CodingCoding
Coding
 
Chapter 03 cyclic codes
Chapter 03   cyclic codesChapter 03   cyclic codes
Chapter 03 cyclic codes
 
Convolutional Codes And Their Decoding
Convolutional Codes And Their DecodingConvolutional Codes And Their Decoding
Convolutional Codes And Their Decoding
 
Amba axi 29 3_2015
Amba axi 29 3_2015Amba axi 29 3_2015
Amba axi 29 3_2015
 
Instruction sets of 8086
Instruction sets of 8086Instruction sets of 8086
Instruction sets of 8086
 
LDPC
LDPCLDPC
LDPC
 

Viewers also liked

Reed Solomon Code
Reed Solomon CodeReed Solomon Code
Reed Solomon Codeadi234
 
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...Madhumita Tamhane
 
Data encryption standard (des)
Data encryption standard  (des)Data encryption standard  (des)
Data encryption standard (des)Mecheko Sha
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)Haris Ahmed
 
Data encryption, Description, DES
Data encryption, Description, DESData encryption, Description, DES
Data encryption, Description, DESHuawei Technologies
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.pptUday Meena
 

Viewers also liked (11)

Fano algorithm
Fano algorithmFano algorithm
Fano algorithm
 
Reed Solomon Code
Reed Solomon CodeReed Solomon Code
Reed Solomon Code
 
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
 
Data encryption standard (des)
Data encryption standard  (des)Data encryption standard  (des)
Data encryption standard (des)
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
Data encryption, Description, DES
Data encryption, Description, DESData encryption, Description, DES
Data encryption, Description, DES
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Reed Solomon
Reed SolomonReed Solomon
Reed Solomon
 

Similar to Error control coding using bose chaudhuri hocquenghem bch codes

An Efficient Fault Tolerance System Design for Cmos/Nanodevice Digital Memories
An Efficient Fault Tolerance System Design for Cmos/Nanodevice Digital MemoriesAn Efficient Fault Tolerance System Design for Cmos/Nanodevice Digital Memories
An Efficient Fault Tolerance System Design for Cmos/Nanodevice Digital MemoriesIJERA Editor
 
BCH Decoder Implemented On CMOS/Nano Device Digital Memories for Fault Tolera...
BCH Decoder Implemented On CMOS/Nano Device Digital Memories for Fault Tolera...BCH Decoder Implemented On CMOS/Nano Device Digital Memories for Fault Tolera...
BCH Decoder Implemented On CMOS/Nano Device Digital Memories for Fault Tolera...inventy
 
Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...
Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...
Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...IJERA Editor
 
ELH – 3.1: ADVANCED DIGITAL COMMUNICATION UNIT – II Coding techniques
ELH – 3.1: ADVANCED DIGITAL COMMUNICATION UNIT – II Coding techniquesELH – 3.1: ADVANCED DIGITAL COMMUNICATION UNIT – II Coding techniques
ELH – 3.1: ADVANCED DIGITAL COMMUNICATION UNIT – II Coding techniquesKuvempu University
 
A NOVEL APPROACH FOR LOWER POWER DESIGN IN TURBO CODING SYSTEM
A NOVEL APPROACH FOR LOWER POWER DESIGN IN TURBO CODING SYSTEMA NOVEL APPROACH FOR LOWER POWER DESIGN IN TURBO CODING SYSTEM
A NOVEL APPROACH FOR LOWER POWER DESIGN IN TURBO CODING SYSTEMVLSICS Design
 
Performances Concatenated LDPC based STBC-OFDM System and MRC Receivers
Performances Concatenated LDPC based STBC-OFDM System and MRC Receivers  Performances Concatenated LDPC based STBC-OFDM System and MRC Receivers
Performances Concatenated LDPC based STBC-OFDM System and MRC Receivers IJECEIAES
 
Improving The Performance of Viterbi Decoder using Window System
Improving The Performance of Viterbi Decoder using Window System Improving The Performance of Viterbi Decoder using Window System
Improving The Performance of Viterbi Decoder using Window System IJECEIAES
 
On the realization of non linear pseudo-noise generator for various signal pr...
On the realization of non linear pseudo-noise generator for various signal pr...On the realization of non linear pseudo-noise generator for various signal pr...
On the realization of non linear pseudo-noise generator for various signal pr...Alexander Decker
 
Fault Tolerant Parallel Filters Based On Bch Codes
Fault Tolerant Parallel Filters Based On Bch CodesFault Tolerant Parallel Filters Based On Bch Codes
Fault Tolerant Parallel Filters Based On Bch CodesIJERA Editor
 
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...ijitjournal
 
The Reliability in Decoding of Turbo Codes for Wireless Communications
The Reliability in Decoding of Turbo Codes for Wireless CommunicationsThe Reliability in Decoding of Turbo Codes for Wireless Communications
The Reliability in Decoding of Turbo Codes for Wireless CommunicationsIJMER
 
Speech recognition using vector quantization through modified k means lbg alg...
Speech recognition using vector quantization through modified k means lbg alg...Speech recognition using vector quantization through modified k means lbg alg...
Speech recognition using vector quantization through modified k means lbg alg...Alexander Decker
 
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...IJERA Editor
 
Fpga implementation of (15,7) bch encoder and decoder
Fpga implementation of (15,7) bch encoder and decoderFpga implementation of (15,7) bch encoder and decoder
Fpga implementation of (15,7) bch encoder and decodereSAT Publishing House
 
Design and implementation of log domain decoder
Design and implementation of log domain decoder Design and implementation of log domain decoder
Design and implementation of log domain decoder IJECEIAES
 
An efficient reconfigurable code rate cooperative low-density parity check co...
An efficient reconfigurable code rate cooperative low-density parity check co...An efficient reconfigurable code rate cooperative low-density parity check co...
An efficient reconfigurable code rate cooperative low-density parity check co...IJECEIAES
 
Hamming net based Low Complexity Successive Cancellation Polar Decoder
Hamming net based Low Complexity Successive Cancellation Polar DecoderHamming net based Low Complexity Successive Cancellation Polar Decoder
Hamming net based Low Complexity Successive Cancellation Polar DecoderRSIS International
 
Performance Study of RS (255, 239) and RS (255.233) Used Respectively in DVB-...
Performance Study of RS (255, 239) and RS (255.233) Used Respectively in DVB-...Performance Study of RS (255, 239) and RS (255.233) Used Respectively in DVB-...
Performance Study of RS (255, 239) and RS (255.233) Used Respectively in DVB-...IJERA Editor
 

Similar to Error control coding using bose chaudhuri hocquenghem bch codes (20)

An Efficient Fault Tolerance System Design for Cmos/Nanodevice Digital Memories
An Efficient Fault Tolerance System Design for Cmos/Nanodevice Digital MemoriesAn Efficient Fault Tolerance System Design for Cmos/Nanodevice Digital Memories
An Efficient Fault Tolerance System Design for Cmos/Nanodevice Digital Memories
 
BCH Decoder Implemented On CMOS/Nano Device Digital Memories for Fault Tolera...
BCH Decoder Implemented On CMOS/Nano Device Digital Memories for Fault Tolera...BCH Decoder Implemented On CMOS/Nano Device Digital Memories for Fault Tolera...
BCH Decoder Implemented On CMOS/Nano Device Digital Memories for Fault Tolera...
 
Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...
Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...
Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...
 
ELH – 3.1: ADVANCED DIGITAL COMMUNICATION UNIT – II Coding techniques
ELH – 3.1: ADVANCED DIGITAL COMMUNICATION UNIT – II Coding techniquesELH – 3.1: ADVANCED DIGITAL COMMUNICATION UNIT – II Coding techniques
ELH – 3.1: ADVANCED DIGITAL COMMUNICATION UNIT – II Coding techniques
 
A NOVEL APPROACH FOR LOWER POWER DESIGN IN TURBO CODING SYSTEM
A NOVEL APPROACH FOR LOWER POWER DESIGN IN TURBO CODING SYSTEMA NOVEL APPROACH FOR LOWER POWER DESIGN IN TURBO CODING SYSTEM
A NOVEL APPROACH FOR LOWER POWER DESIGN IN TURBO CODING SYSTEM
 
Performances Concatenated LDPC based STBC-OFDM System and MRC Receivers
Performances Concatenated LDPC based STBC-OFDM System and MRC Receivers  Performances Concatenated LDPC based STBC-OFDM System and MRC Receivers
Performances Concatenated LDPC based STBC-OFDM System and MRC Receivers
 
Improving The Performance of Viterbi Decoder using Window System
Improving The Performance of Viterbi Decoder using Window System Improving The Performance of Viterbi Decoder using Window System
Improving The Performance of Viterbi Decoder using Window System
 
On the realization of non linear pseudo-noise generator for various signal pr...
On the realization of non linear pseudo-noise generator for various signal pr...On the realization of non linear pseudo-noise generator for various signal pr...
On the realization of non linear pseudo-noise generator for various signal pr...
 
Fault Tolerant Parallel Filters Based On Bch Codes
Fault Tolerant Parallel Filters Based On Bch CodesFault Tolerant Parallel Filters Based On Bch Codes
Fault Tolerant Parallel Filters Based On Bch Codes
 
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...
 
The Reliability in Decoding of Turbo Codes for Wireless Communications
The Reliability in Decoding of Turbo Codes for Wireless CommunicationsThe Reliability in Decoding of Turbo Codes for Wireless Communications
The Reliability in Decoding of Turbo Codes for Wireless Communications
 
Speech recognition using vector quantization through modified k means lbg alg...
Speech recognition using vector quantization through modified k means lbg alg...Speech recognition using vector quantization through modified k means lbg alg...
Speech recognition using vector quantization through modified k means lbg alg...
 
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...
 
Fpga implementation of (15,7) bch encoder and decoder
Fpga implementation of (15,7) bch encoder and decoderFpga implementation of (15,7) bch encoder and decoder
Fpga implementation of (15,7) bch encoder and decoder
 
Design and implementation of log domain decoder
Design and implementation of log domain decoder Design and implementation of log domain decoder
Design and implementation of log domain decoder
 
An efficient reconfigurable code rate cooperative low-density parity check co...
An efficient reconfigurable code rate cooperative low-density parity check co...An efficient reconfigurable code rate cooperative low-density parity check co...
An efficient reconfigurable code rate cooperative low-density parity check co...
 
40120130405019
4012013040501940120130405019
40120130405019
 
Hamming net based Low Complexity Successive Cancellation Polar Decoder
Hamming net based Low Complexity Successive Cancellation Polar DecoderHamming net based Low Complexity Successive Cancellation Polar Decoder
Hamming net based Low Complexity Successive Cancellation Polar Decoder
 
Performance Study of RS (255, 239) and RS (255.233) Used Respectively in DVB-...
Performance Study of RS (255, 239) and RS (255.233) Used Respectively in DVB-...Performance Study of RS (255, 239) and RS (255.233) Used Respectively in DVB-...
Performance Study of RS (255, 239) and RS (255.233) Used Respectively in DVB-...
 
79 83
79 8379 83
79 83
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 

Recently uploaded (20)

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 

Error control coding using bose chaudhuri hocquenghem bch codes

  • 1. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 INTERNATIONAL JOURNAL OF ELECTRONICS AND 17 – 19, July 2014, Mysore, Karnataka, India COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) ISSN 0976 – 6464(Print) ISSN 0976 – 6472(Online) Volume 5, Issue 8, August (2014), pp. 86-96 © IAEME: http://www.iaeme.com/IJECET.asp Journal Impact Factor (2014): 7.2836 (Calculated by GISI) www.jifactor.com IJECET © I A E M E ERROR CONTROL CODING USING BOSE-CHAUDHURI-HOCQUENGHEM 86 (BCH) CODES Eshtaartha Basu1, Dhanush.P2, Kishor S3, Geethashree A4 1, 2, 3Electronics and Communication Engineering, VVCE, P.B. No.206, Vijayanagar, Mysore, India, 4Asst. Prof., Electronics and Communication Engineering, VVCE, P.B. No.206, Vijayanagar, Mysore, India ABSTRACT Information and coding theory has applications in telecommunication, where error detection and correction techniques enable reliable delivery of data over unreliable communication channels. Many communication channels are subject to noise. BCH technique is one of the most reliable error control techniques and the most important advantage of BCH technique is both detection and correction can be performed. The technique aims at detecting and correcting of two bit errors in a code-word of length 15 bits. A seven bit message was specifically chosen so that ASCII characters can be easily transmitted. Keywords: BCH, codeword, encoder, decoder, syndrome 1. INTRODUCTION In telecommunication, a communication system is a collection of individual communication networks, transmission systems, relay stations, tributary stations, and data terminal equipment, usually capable of interconnection and interoperation to form an integrated whole. The components of a communication system serve a common purpose, are technically compatible, use common procedures, respond to controls, and operate in union. Telecommunication is a method of communication (e.g., for sports broadcasting, mass media, journalism, etc.). A communication subsystem is a functional unit or operational assembly that is smaller than the larger assembly under consideration.
  • 2. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 17 – 19, July 2014, Mysore, Karnataka, India Fig. 1: Basic structure of communication system The basic structure of a communication system is shown in Fig.1. A basic communication system consists of an information source which generates the message. The generated message will be in binary form. The transmitter will usually consist of an encoder which converts the digital message into a form suitable for transmission. The encoded message is then fed into the communication channel. The message usually gets corrupted due to the induced noise. The decoder present in the receiver will detect and correct errors followed by decoding to retrieve the original message. The information can of course be anything representable in symbols. For our purposes, this information should be representable as a string of binary digits. The purpose of the communication system is to convey the information from one point to another with no degradation. The noisy channel adds noise to the information without our consent, corrupting the information to a degree related to the character and strength of the noise. The detailed behaviour of communication systems in the presence of noise is a lengthy study in itself. The most important concern mostly is the encoder and decoder blocks. These blocks implement the coding systems spoken by Shannon, adding some extra bits in the encoder, and removing them again in the decoder. The decoder detects errors, corrects errors, or a combination of both. A good design will have the information on the input and output identical. Not surprisingly, there are numerous coding systems. Each has a suitable area of service. 87 1.1 Information and Coding Theory A code is a rule for converting a piece of information (for example, a letter, word, phrase, or gesture) into another - usually shortened or covert - form or representation, not necessarily of the same type. In communication and information processing, encoding is the process by which information from a source is converted into symbols to be communicated. Decoding is the reverse process, converting these code symbols back into information understandable by a receiver. One reason for coding is to enable communication in places where ordinary plain language, spoken or written, is difficult or impossible. 1.2 Galois Field In algebra, a finite field or Galois field is a field that contains a finite number of elements, called its size. Finite fields only exist for which the size is a prime power pk (where p is a prime number and k is a positive integer). For each prime power, there is a finite field with this size, and all fields of a given size are isomorphic. The characteristic of a field of size pk is p (this means that adding p copies of any element always results in zero). In a finite field of size q, the polynomial Tq − T is the product of q different linear factors, and, therefore, has all the elements of the field as roots. The multiplicative group of the non-zero elements of a finite field is a cyclic group, and thus, the non-zero elements can be expressed as the powers of a single (but generally not unique) element called a primitive element.
  • 3. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 17 – 19, July 2014, Mysore, Karnataka, India Finite fields are important in number theory, algebraic geometry, Galois Theory, cryptography, and coding theory. The finite fields are classified by size; there is exactly one finite field to isomorphism of size pk for each prime p and positive integer k. Each finite field of size q is the splitting field of the polynomial xq - x, and thus the fixed field of the Frobenius endomorphism which takes x to xq. Finite fields appear in the following chain of class inclusions: Commutative rings Integral domains integrally closed domains unique factorization domains principal ideal domains Euclidean domains fields finite fields. 88 2. BCH CODES The BCH codes form a class of cyclic error-correcting codes that are constructed using finite fields. BCH codes were invented in 1959 by French mathematician Alexis Hocquenghem, and independently in 1960 by Raj Bose and D. K. Ray-Chaudhuri. The acronym BCH comprises the initials of these inventors' names. One of the key features of BCH codes is that during code design, there is a precise control over the number of symbol errors correctable by the code. In particular, it is possible to design binary BCH codes that can correct multiple bit errors. Another advantage of BCH codes is the ease with which they can be decoded, namely, via an algebraic method known as syndrome decoding. This simplifies the design of the decoder for these codes, using small low-power electronic hardware. BCH codes are used in applications such as satellite communication, compact disc players, DVDs, disk drives, solid-state drives and two-dimensional bar codes. 2.1 Description of BCH Cyclic Codes BCH codes are a generalization of Hamming codes, and they can be designed to be able to correct any error pattern of size t or less [1, 2, 4]. In this sense the generalization of the Hamming codes extends the design of codes for t = 1 (Hamming codes) to codes for any desired higher value of t (BCH codes). The design method is based on taking an LCM of appropriate minimal polynomials. For any positive integer m 3 and t 2m−1, there exists a binary BCH code CBCH(n, k) with the following properties: Code length : n = 2m − 1 Number of parity bits : n − k mt Minimum Hamming distance : dmin 2t + 1 Error-correction capability : t errors These codes are able to correct any error pattern of size t or less, in a code vector of length ‘n’, n = 2m − 1. The generator polynomial of a BCH code is described in terms of its roots, taken from the Galois field GF(2m). If is a primitive element in GF(2m), the generator polynomial g(X) of a BCH code for correcting t errors in a code vector of length n = 2m − 1 is the minimum-degree polynomial over GF(2) that has , 2, . . . , 2t as its roots given by Eq. (1). g(i) = 0, i = 1, 2, . . . , 2t (1) It also true that g(X) has i and conjugate as its roots. On the other hand, if i(X) is the minimal polynomial of i then the LCM of 1(X), 2(X), . . . ,2t(X) is the generator polynomial g(X) given by Eq. (2). g(X) = LCM{ 1(X), 2(X), . . . , 2t(X)} (2)
  • 4. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 17 – 19, July 2014, Mysore, Karnataka, India However, and due to repetition of conjugate roots, it can be shown that the generator polynomial g(X) can be formed with only the odd index minimal polynomials given by Eq. (3). g(X) = LCM{ 1(X), 3(X), . . . , 2t−1(X)} (3) Since the degree of each minimal polynomial is m or less, the degree of g(X) is at most mt. As BCH codes are cyclic codes, this means that the value of n − k can be at most mt. The Hamming codes are a particular class of BCH codes, for which the generator polynomial is g(X) = 1(X). A BCH code for t = 1 is then a Hamming code. Since is a primitive element of GF(2m), then 1(X) is a polynomial of degree m. [1][2] 89 3. DESIGN AND ARCHITECTURE BCH codes are a generalization of Hamming codes, and they can be designed to be able to correct any error pattern of size ‘t’ or less. 3.1 Design specifications In our system design of (15, 7) BCH code, m=4 Code word length= 15, Information length = 7, Parity bits length = 8, Block length = n = 2m –1 = 24 –1 = 15, Number of parity bits = (n – k) mt; n–k = 15–7 = 8; mt = 4*2 = 8, Therefore (n – k) = mt Minimum distance = dmin 2t +1; dmin 4+1=5 These codes are able to correct any error pattern of size 2 or less, in a code vector of length ‘n’, n = 2m − 1. The generator polynomial of a BCH code is described in terms of its roots, taken from the Galois field GF (2m). 3.2 Overview of design Fig.2 represents an overview of our design. The message is represented by 7 bits. Specifically, the 7 bits are chosen, so that ASCII characters can be easily represented. The seven bit message is fed into the BCH Encoder. The Encoder converts the seven bit message into a codeword of length fifteen bits. The first seven bits are the message bits and the last eight bits are the redundant bits. The fifteen bit codeword is transmitted through the channel. The Error Introduction Module will randomly flip any two or one bit which can be treated as virtual noise. Now, the codeword with one or two bit error is fed into the BCH Decoder module. Fig. 2: Overview of our design
  • 5. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 17 – 19, July 2014, Mysore, Karnataka, India The Decoder module will calculate syndrome for the received codeword and then determine the position of error bits using the same. Here error is corrected by flipping the error bits. Finally, error free original message is retrieved back as the output of decoder. 90 3.3 Encoder Design The 7 bit information is represented by {u0, u1, u2, u3, u4, u5, u6}, then polynomial notation can be used to show the information such as equation. Here, the bit position ‘n’ from 0 to 7 corresponds to the power of x such as Xn. The polynomial notation of information is given by Eq. (4). U(X) = u0 + u1.x1 + u2.x2+ u3.x3+ u4.x4+ u5.x5+ u6.x6 (4) The 8-bit parity bits {r0, r1, r2, r3, r4, r5, r6, r7} can be represented by Eq. (5) R(X) = r0 + r1.x1 + r2.x2+ r3.x3+ r4.x4+ r5.x5+ r6.x6+ r7.x7 (5) r0, r1, …, r7 bits are 8 bits parity bits. These parity coefficients are 0 to 7th power of x. and Information coefficients are 8 to 14th power of x. Then 15 bits Encoded information can be represented by Eq. (6). SB(X) = r0 + r1.x1 + r2.x2+ r3.x3+ r4.x4+ r5.x5+ r6.x6 + r7.x7+ u0.x8 + u1.x9 + u2.x10+ u3.x11 + u4.x12+ u5.x13+ u6.x14 (6) In BCH code, R(x) is remainder of U(x)*x8 divided by G(x). U(X).x8 is given by Eq. (7) U(X).x8 = u0.x8 + u1.x9 + u2.x10+ u3.x11+ u4.x12+u5.x13+ u6.x14 (7) G(x) = 1+x4+x6+x7+x8 (8) Here, G(x) is called as the generator polynomial given by Eq. (8). U(x)*x8 means the coefficients u0……….u6 are shift to higher bit by 8 bits. The order of G(x) is 8. The remainder R(x) will be order of 7 or less. Here, calculation uses Galois field rule. The remainder calculation is done using x8= 1+x4+x6+x7 iteratively and polynomial with order more than 8 can be reduced to less than 7 given by Eq. (9). The result of polynomial is the remainder polynomial. x8 = 1+x4+x6+x7 (9) However, during this computation, addition and/or subtraction between coefficients shall be replaced by ex-or computation because of Galois field. Fig. 3 shows the encoder circuit example. SIN input port receives information bits from u6, u5……down to u0. During this input sequence, the switch is connected to A terminal in order to pass those u6……..u0 signal to the output SB port and to the shift registers. Since the U(x)*x8 mod G(x) is calculated, Eq. (10) is used to reduce the power of the polynomial of Eq. (7). Therefore, x8 = 1+x4+x6+x7 (10) The above equation means that if the coefficients of x8 = 1, coefficients of 0, 4, 6, 7th will be exored with ‘1’. Consequently, after inputting all u6………to u0 to the registers, remainder will be
  • 6. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 17 – 19, July 2014, Mysore, Karnataka, India calculated. Then after, the switch is connected to B terminal, remainder r7…….. r0 will be shifted out to SB terminal. The detail operation is shown in Fig. 4. Fig. 3: Circuit of encoder In Fig. 5, a case of register values are shown as example. The one corresponds to information bits = {0, 0, 0, 0, 0, 0, 1}. Fig. 4: Timing diagram of encoder operation Consider Fig. 4. The Information bits = {0, 0, 0, 0, 0, 0, 1}, u0 =1 and the value of r7, r0, 91 r4and r6 is equal to one from Eq. (11). x8= 1+x4+x6+x7 (11) i.e., r7=r6=r4=r0=1. Since this operation happens in cycle 7 (last cycle of switch A period), the values are just shift out at the cycles from 8 to 15 as shown in Fig. 5. Fig. 5: Encoder operation when information bits are {0, 0, 0, 0, 0, 0, 1}
  • 7. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 17 – 19, July 2014, Mysore, Karnataka, India 92 3.4 Error introduction module This module will be integrated to encoder. Its main objective is to flip any two or one bit in each code word, which is of length fifteen bits. Fig. 6 shows example for code word input to error introduction module and output code word with error. Fig. 6: Error introduction module 3.5 Decoder Design This section gives a brief idea about decoder design. 3.5.1 Syndrome calculation The generator polynomial given by Eq. (12) is used in BCH(15,7) encoding. G(x) = 1+x4+x6+x7+x8 (12) SB(X) = u0.x8 + u1.x9 + u2.x10+ u3.x11+ u4.x12+u5.x13+ u6.x14 + r0 + r1.x1 + r2.x2+ r3.x3+r4.x4+ r5.x5+ r6.x6+ r7.x7 (13) SB(x) given by Eq. (13) can be divided by G(x) and if remainder is 0, it can be judge that no error exists in a code. Actually, BCH(15,7) can correct 2 bit errors in 15 bits codes. The generator polynomial G(x) is given by Eq. (14). G1(x) = 1+x+x4 G2(x) = 1+x+x2+x3+x4 G(x) = G1(x).G2(x) G(x) = (1+x+x4).(1+x+x2+x3+x4) G(x) = 1+x4+x6+x7+x8 (14) Then, SB(x) can be divided by either G1(x) or G2(x). If no error in a code, both remainder of G1(x) and G2(x) are both 0s. SB(x) is transmitted. Then R(x) is received. If no error happened during transmission, R(x) can be divided by both G1(x) and G2(x). Here we define Syndrome S1(x) = remainder of R(x) divided by G1(x), S2(x) = remainder of R(x) divided by G2(x). Since both G1(x) and G2(x) is 4th order polynomial, syndromes are power of 3 or less polynomials given by Eq. (15) and Eq. (16). S1(x) = s10 + s11·x1 + s12·x2+ s13·x3 (15) S2(x) = s20 + s21·x1 + s22·x2+ s23·x3 (16)
  • 8. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 17 – 19, July 2014, Mysore, Karnataka, India According to the coefficients (S10, S11, S12, S13) and 93 S20, S21, S22, S23), error status can be obtained. Since those coefficients are only 8 bits, then totally only 256 cases exists. Fig. 7 shows the relation between 8 coefficient bits and error status. The first cell (in Fig. 7) corresponds to syndrome = 0. This cell indicates no errors in code. BLUE cells are corresponds to 1 bit error. Totally 15 cells are blue cells. The number in the blue cell indicated the position of the error. Since the error is bit error, error can be recovered by flip the value at the error position. The RED cell corresponds to 2 bit error. There are 15*14/2=105 cells. Each cell indicates two error position values. Other 135 empty cells are more than 3 bit errors. The error cannot be recovered. In decoding, the two key functions are syndrome computation and Table access. Fig. 7: Relation between 8 syndrome bits and error status Fig. 8 can be used as Error position Indicator. Fig. 8: Error position indicator In Fig. 9, two linear feedback shift register circuits are shown in order to compute two syndrome S1(x) and S2(x). In the figure, flip flops of linear feedback shift register is named t10-13, and final computation results will appear in registers s10-13. Fig. 10 shows the operational timing diagram of the circuit. In first 11 cycles, the switch is connected to a port, and then feedback operation happens. Since first 11 cycles corresponds to 14th to 4th order of the xn and the power is larger than order of syndromes, feedback operation is required. In last 4 cycles, the switch is connected to B port and simple exor operation and shift operation are performed. START signal is asserted to indicate the beginning and t10-13 flip flop outputs are forced to ‘0’ by AND gates for initializing. As you can see from Fig. 10, at the cycle of 14, syndrome values appear in s10-13 flip flops. By accessing the Fig. 7 using the 8 syndrome bits and error status can be found.
  • 9. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 17 – 19, July 2014, Mysore, Karnataka, India Fig. 9: Syndrome computation circuit example Fig. 10: Timing diagram of Syndrome computation In Fig. 11, syndrome are computed from input YELLOW cell of (1,0,0,0,0,0,0,1,1,1,0,1,0,0,0). In this case, the input does not include errors. Then the computed syndromes in RED cells are all 0s. 94 After de-assertion of RESET signal, ENCODER generates START and SBWE signals. Every 15 cycle is one BCH(15, 7) packet data. DECODER received SBWE signal and perform error correction to generate RBEC signal which includes both information and parity. TOTBITS signal is total received bits and ERRBITS is the number of error bits received. [3]
  • 10. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 17 – 19, July 2014, Mysore, Karnataka, India Fig. 11: Syndrome computation example (no error case) 95 4. DESIGN VERIFICATION This section provides a brief idea as to how the theoretical design was tested before practical implementation. 4.1 C Modelling The entire design was first tested using C language. A C model was developed to mimic the operations of encoder, error introduction module and decoder. All the three modules were executed together to verify their performance and synchronization. 4.2 C modelling results The input message is seven bits wide. The encoder takes in the message and produces 15 bit code-word. The user has to input the error bit locations. Error will be introduced in the code-word correspondingly. At the decoder, Syndrome-1 and Syndrome-2 will be calculated to detect the position of error. The errors will then be suitably corrected by flipping the error bit locations. In Fig. 12, input message has seven bits. It will be encoded to obtain codeword of fifteen bits. Fig. 12: Output of C Model Using error introduction module fifth and ninth bits are flipped. The codeword word with error is fed to decoder, which will calculate the syndromes according to error infused. Based on the syndrome values error positions will be identified and rectified.
  • 11. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 17 – 19, July 2014, Mysore, Karnataka, India 96 5. CONCLUSION A string of ASCII characters were successfully transmitted and received over the noisy channel. One or two bits of the code-word were randomly flipped during its transmission over the channel. The performance of the error control system was appreciable in detection and correction of maximum two bits errors in each codeword of length 15. C model was developed to mimic the operations of encoder, error introduction module and decoder to verify their performance and synchronization. REFERENCES [1] S. Lin, and D.J. Costello Jr. - “Error Control Coding”, Prentice-Hall, New Jersey, 1983. [2] Claude E. Shannon and Warren Weaver, “The Mathematical Theory of Communication”, Chicago: University of Illinois Press, 1963. [3] LSI Design Contest 2010, Okinawa - http://www.lsi-contest.com/index_e.html [4] Vera Pless, “Introduction to the Theory of Error Correcting Codes”, 2nd ed., New York: John Wiley Sons, 1989.