SlideShare a Scribd company logo
1 of 5
Download to read offline
El habti El idrissi Anas et al Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 8( Version 1), August 2014, pp.82-86 
www.ijera.com 82|P a g e 
FPGA Implementation of A New Chien Search Block for Reed- Solomon Codes RS (255, 239) Used In Digital Video Broadcasting DVB-T El Habti El Idrissi Anas1, El Gouri Rachid1, 2, Hlou Laamari1 1Laboratory of Electrical Engineering and Energy System. Faculty of Sciences, University Ibn Tofail Kenitra, Morocco 2National School of Applied Sciences, University Ibn Tofail Kenitra, Morocco ABSTRACT The Reed-Solomon codes RS are widely used in communication systems, in particular forming part of the specification for the ETSI digital terrestrial television standard. In this paper a simple algorithm for error detection in the Chien Search block is proposed. This algorithm is based on a simple factorization of the error locator polynomial, which allows reducing the number of components required to implement the proposed algorithm on FPGA board. Consequently, it reduces the power consumption with a percentage which can reach 50 % compared to the basic RS decoder. First, we developed the design of Chien Search Block Second, we generated and simulated the hardware description language source code using Quartus software tools,finally we implemented the proposed algorithm of Chien search block for Reed-Solomon codesRS (255, 239) on FPGA board to show both the reduced hardware resources and low complexity compared to the basic algorithm. 
Keywords-Digital video broadcasting,Euclidean Algorithm, Error locator polynomial, FPGA implementation, Reed-Solomon codes. 
I. INTRODUCTION 
Communication technologies are widely used these days. Due to the growing percentage of people using these technologies, methods are needed to increase the transmission rate without reducing the quality [1]. One of these methods is the Reed- Solomon (RS) codes which are used to correct errors in many systems such as storage devices (CD, DVD, etc.).And digital video broadcasting (DVB), [2]. An RS code word is a packet of symbols which are commonly bytes (8-bit symbols), denotes as RS (n, k) where n is the number of the symbols in the encoded message and k is the number of the symbols in the original message as shown in Fig.1. Each RS code word can correct a maximum of t = (n-k/2) errors in a received packet [3]. The objective of this work is to prove that it’s possible to reduce a large number of components in the Chien Search Block using a new algorithm based on a factorization method which allowsconceiving another circuit of Chien Search block with an important number of minimized logic gates. 
Figure.1.RS code word structure [4] 
II. ERROR LOCATOR POLYNOMIAL 
The error locator polynomial E(x) is written to include only the terms that correspond to errors: E(x) = Y1푋푒1 + Y2푋푒2+ … + Yν푋푒휈(1) Where e1, … eν, identify the locations of the errors in the code word as the corresponding powers of x, while Y1,…Yν represent the error values at those locations [5]. The error locator polynomial, Ʌ (x), has a degree of ν ≤ t and can be represented as: Ʌ (x)= (1 + 푋푖푥)휈푖 (2) = X1(x+푋1−1) X2 (x +푋2−1) ….. (3) Where X1 = αe1, X2 = αe2 … then clearly the function value will be zero if x = α-e1, x = α-e2 … 
III. CHIEN SEARCH ALGORITHM 
This algorithm can detect the error position by calculating Ʌ (α-i) where 0 ≤ i ≤ n-1, such as Ʌ (x)is the error locator polynomial, calculatedwith the Euclidean algorithm. For the case of RS (n, k) we must calculate: Ʌ (α-(n-1)), Ʌ (α-(n-2))… Ʌ (α-1), Ʌ (α-0) If the expression reduces to 0 Ʌ (α-i) = 0, then that value of x is a root and identifies the error position else the position does not contain an error. 
RESEARCH ARTICLE OPEN ACCESS
El habti El idrissi Anas et al Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 8( Version 1), August 2014, pp.82-86 
www.ijera.com 83|P a g e 
3.1 Proposed algorithm The proposed algorithm is based on a simple factorization of the error locator polynomial such as (xn, where n ≥ 2) should not be depicted in this polynomial. Besides, with this method we can conceive another circuit of the Chien Search Block i.e. we can minimize a large number of the used logic gates, and therefore we will have a low power consumption compared to the basic circuit. If we take the case of RS (15, 11) the error locator polynomial is: Ʌ (x) = 14x2 + 14x + 1 (4) It’s a polynomial of degree 2 as type: Ʌ (x) = A2X2+A1X+ A0(5) We factorize the equation (4), we find: Ʌ (x) = X (A2X+A1) +A0(6) For equation (5) the basic circuit corresponding is represented in Fig.2. The simulation of the basic circuit (equation 5) using Quartus is represented in Fig.5. For the equation (6) the modified circuit using the factorization method is represented in Fig.3. The simulation of the modified circuit (equation 6) using Quartus II is represented in Fig.6. 
Figure.2. Basic circuitof Chien Search Block 
Figure.3. Modified circuit of Chien Search Block For the case of a polynomial of degree 3 we have: Ʌ (X) = A3X3+A2X2+A1X+A0 = X (A3X2+A2X+A1) + A0 = X (X (A3X + A2) + A1) + A0 Generally for: Ʌ (X) = AnXn +An-1 Xn-1 + … A1X + A0 = X (AnXn-1 + An-1Xn-2+ … + A1) + A0 = X (X (AnXn-2 + An-1Xn-3+ … + A2) + A1) + A0 = X (X (X (……..X (An X + An-1) + An-2) +…) +A2) + A1) + A0 Where the coefficients A1, A2… An-1, An differ from 0. The corresponding logic circuit is represented in Fig.4. 
Figure.4. Modified circuit of Chien Search Block for a polynomial of degree n 
Figure.5. Simulation of the basic circuit (equation 4) using Quartus Where a0, a1 and a2 represent respectively α0, α1, and α2 of Fig.2, en1, en2 anden3 represent respectively A, B and C, srt represents the error position.
El habti El idrissi Anas et al Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 8( Version 1), August 2014, pp.82-86 
www.ijera.com 84|P a g e 
Figure.6. Simulation of the modified circuit (equation 5) using Quartus 
Where EP represents the error position 3.2 Comparison of circuits According to the simulation we have adopted previously, the result we got is the same one in comparison with the modified circuit but with an important number of minimized logic gates. This minimization can save a percentage of power which can reach 50% compared to the basic circuit. The table 1 shows the number of the used logic gates by using both the basic circuit and the modified circuit for different error locator polynomials. Table 1. Number of minimized logic gates for different error locator polynomials 
Error locator polynomial 
Number of logic gates for the basic circuit 
Number of logic gates for the modified circuit 
Number of minimized logic gates 
Λ(X) =AX2+BX+ C 
11 
7 
4 
Λ(X) =AX3+BX2+CX+D 
15 
9 
6 
Λ(X) =AX4+BX3+CX2+DX+ E 
19 
11 
8 
. . . 
Λ(X)=AnXn+ …+A1X+A0 
3+4n 
3+2n 
2n 
IV. FPGA IMPLEMENTATION 
Implementation of decoders for Reed-Solomon codes has been problematic due to very large amount of resources required We seek to implement a new Chien Search Block on FPGA based on the proposed algorithm to judge the savings in hardware resources [6,7]. In this paper a parameterized hardware model of the Chien Search Block was developed using the Hardware Description Language (VHDL) and synthesized using Xilinx Synthesis Tool. The block diagram of the proposed algorithm as implemented is shown in Fig.7. 
Figure.7. Block diagram of Chien Search block The proposed Chien Search Block consists of a global ‘Clk’ and the error detection process is initiated by an ‘Input’, the ‘Error position’ can be obtained immediately after entering input. 4.1 The new Chien Search block for RS (15, 11) codes This algorithm can detect the error position by calculating Ʌ (α-i) where 0 ≤ i ≤ n-1, such as Ʌ (x) is the error locator polynomial, calculated by the Euclidean algorithm. To try the first position in the code word, corresponding to ej = 14, we need to substitute α-14 into the locator polynomial: Ʌ (x) = 14x2 + 14x + 1 Ʌ (α-14) = 14(α-14)2 + 14(α-14) + 1 = 3 And the non-zero result shows that the first position does not contain an error. For subsequent position, the power of α to be substituted will advance by one for the x term and by two for the x2 term, so we can calculate the calculations as shown in table 2. The two sum values of zero in table 2 identify the error positions correctly as the 6th and 13th symbols, corresponding to the x9 and x2 terms, respectively, of the code word polynomial. Table 2. Terms in the Chien Search block x x2 term x term unity Sum α-14 α13 α12 1 3 α-13 α0 α13 1 13 α-12 α2 α14 1 12
El habti El idrissi Anas et al Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 8( Version 1), August 2014, pp.82-86 
www.ijera.com 85|P a g e 
α-11 α4 α0 1 3 α-10 α6 α1 1 15 α-9 α8 α2 1 0 α-8 α10 α3 1 14 α-7 α12 α4 1 13 α-6 α14 α5 1 14 α-5 α1 α6 1 15 α-4 α3 α7 1 2 α-3 α5 α8 1 2 α-2 α7 α9 1 0 α-1 α9 α10 1 12 α-0 α11 α11 1 1 
4.2 Test procedure for RS (15, 11) 
The proposed algorithm was implemented on a Xilinx Spartan 3E-500 FG 320 FPGA (xc3s500e- 5fg320). A comprehensive testing environment was developed to test the implemented algorithm. The test setup is shown in Fig.8. 
(a) Value of Chien Search Block for RS (15, 11) 
(b) Value of Chien Search Block for RS (15, 11) Figure.8. Values of Chien search block forRS (15, 11) codes In Fig.8 (a) the value is different from zero, so this position does not contain an error. In Fig.8 (b) the value is equal to zero, so this position contains an error. 
4.3 The code specified for DVB-T 
The DVB-T standard specifies a (255, 239, t=8) Reed-Solomon code, shortened to form (204, 188, t=8) code, so that the 188 bytes of the input packet will be extended with parity bytes to produce a coded block length of 204 symbols [8]. For this code, the Galois field has 256 elements (m=8) and the polynomial representation of a field element is: a7x7+a6x6+a5x5+a4x4+a3x3+a2x2+a1x1+a0. (7) Corresponding to the binary numbers 00000000 to 11111111. Alternatively, we can use the decimal equivalents 0 to 255. The specification also mentions the field generator polynomial, given as: P(x) = x8 + x4 + x3 + x2 +1. (8) For the case of RS (255, 239) used in DVB-T standard, the decoder can detect 16 errors and correct 8 errors. 4.4 Test procedure for RS (255, 239) The proposed algorithm was implemented on a Xilinx Spartan 3E-500 FG 320 FPGA (xc3s500e- 5fg320). A comprehensive testing environment was developed to test the implemented algorithm. The test setup is shown in Fig.9. 
(a) Value of Chien search block for RS (255, 239) 
(b) Value of Chien search block for RS (255, 239) Figure.9. Values of Chien search block for RS (255, 239) codes The non-zero resultin Fig.9 (a) shows that this position does not contain an error, In Fig.9 (b) the value is equal to zero, so this position contains an error.
El habti El idrissi Anas et al Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 8( Version 1), August 2014, pp.82-86 
www.ijera.com 86|P a g e 
4.5 Comparison of algorithms According to the tables2 and 3,whichshow the FPGAdevice utilization summaryfor RS (15, 11) and RS (255, 239) by using the two algorithms, we can conclude that: The proposed algorithm presents a low complexity and a very good performance compared to the basic algorithm. Table 3. FPGA device utilization summary for RS (15, 11) 
Recources 
Proposed Algorithm 
Basic Algorithm 
Device 
Xilinx Spartan 3E (xc3s500e- 5fg320) 
RS (n, k) 
RS (15, 11) 
Number of occupied Slices 19 25 
Number used as Flip Flops 30 34 
Number of 4 input LUTs 12 17 
Number used as logic 12 17 
Table 4. FPGA device utilization summary for RS (255, 239) 
Recources 
proposed algorithm 
basic algorithm 
Device 
Xilinx Spartan 3E (xc3s500e- 5fg320) 
RS (n, k) 
RS (255, 239) 
Number of occupied Slices 271 1080 
Number used as Flip Flops 35 141 
Number of 4 input LUTs 504 1992 
Number used as logic 504 1992 
V. CONCLUSION 
A simplified algorithm of Chien Search Block for Reed-Solomon codes has been presented in this paper. This algorithm is based on a simple factorization of the error locator polynomial in order to reduce the number of minimized logic gates. Thisminimization reduces the power consumption with a percentage which can reach 50% compared to the basic algorithm. The proposed algorithm has been implemented on a Xilinx Spartan 3E-500 FG 320 FPGA (xc3s500e-5fg320).The results show that the proposed algorithm requires reduced hardware resources compared to the basic algorithm. 
VI. ACKNOWLEDGEMENTS 
This work was supported by the Laboratory of Electrical Engineering and Energy System, Faculty of Science, University Ibn Tofail Kenitra, the National Society of Radio and Television (SNRT), Rabat and the National School of Applied Sciences, University Ibn Tofail Kenitra, Morocco. 
REFERENCES 
[1] P. Shrivastava, UP. Singh, Error Detection and Correction Using Reed-Solomon Codes, International Journal of Advanced Research in Computer Science and Software Engineering, 3(8), 2013, 965–969. 
[2] A. Alotaibi, Implementation of (255, 223) Reed Solomon Code Encoder /Decoder, California state university, 2012. 
[3] A. Al Azad, MI. Shahed, A Compact and Fast FPGA Based Implementation of Encoding and Decoding Algorithm Using Reed Solomon Codes,International Journal of Future Computer and Communication, 3(1), 2014, 31–35. 
[4] R. Huynh, G. Ning and Y. Huazhung, A Low Power Error detection in the syndrome calculator Block for Reed-Solomon codes RS: (208,188), J. Tsinghua Science and Technologie, 14(4), 2009, 474-477. 
[5] V. Tilavat, Y. Shukla, Simplification of procedure for decoding Reed-Solomon codes using various algorithms: An introductory Survey, International Journal of Engineering Development and Research, 2(1), 2014, 279-283. 
[6] D. Chaudhari, M. Bhujade, P. Dhumal, VHDL Design and FPGA implementation of Reed-Solomon encoder and decoder for RS (7, 3),International Journal of Science, Engineering and Technology Research, 3(3),2014,563-566. 
[7] VJ. Babrekar, SV. Sakhare, Review of FPGA Implementation of Reed-Solomon Encoder- Decoder, International Journal of Computer Applications, 87(8), 2014, 16–19. 
[8] BBC Research and Develompment, Reed- Solomon error correction, British Broadcasting Corporation, 2002.

More Related Content

What's hot

Ee693 sept2014midsem
Ee693 sept2014midsemEe693 sept2014midsem
Ee693 sept2014midsemGopi Saiteja
 
Linear Cryptanalysis Lecture 線形解読法
Linear Cryptanalysis Lecture 線形解読法Linear Cryptanalysis Lecture 線形解読法
Linear Cryptanalysis Lecture 線形解読法Kai Katsumata
 
Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and...
Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and...Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and...
Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and...IJNSA Journal
 
Bayesian Inference and Uncertainty Quantification for Inverse Problems
Bayesian Inference and Uncertainty Quantification for Inverse ProblemsBayesian Inference and Uncertainty Quantification for Inverse Problems
Bayesian Inference and Uncertainty Quantification for Inverse ProblemsMatt Moores
 
CppConcurrencyInAction - Chapter07
CppConcurrencyInAction - Chapter07CppConcurrencyInAction - Chapter07
CppConcurrencyInAction - Chapter07DooSeon Choi
 
Ijmsr 2016-05
Ijmsr 2016-05Ijmsr 2016-05
Ijmsr 2016-05ijmsr
 
Near Optimal Receive Antenna Selection Scheme for MIMO System under Spatially...
Near Optimal Receive Antenna Selection Scheme for MIMO System under Spatially...Near Optimal Receive Antenna Selection Scheme for MIMO System under Spatially...
Near Optimal Receive Antenna Selection Scheme for MIMO System under Spatially...IJECEIAES
 
R package 'bayesImageS': a case study in Bayesian computation using Rcpp and ...
R package 'bayesImageS': a case study in Bayesian computation using Rcpp and ...R package 'bayesImageS': a case study in Bayesian computation using Rcpp and ...
R package 'bayesImageS': a case study in Bayesian computation using Rcpp and ...Matt Moores
 
05211201 A D V A N C E D D A T A S T R U C T U R E S A N D A L G O R I...
05211201  A D V A N C E D  D A T A  S T R U C T U R E S   A N D   A L G O R I...05211201  A D V A N C E D  D A T A  S T R U C T U R E S   A N D   A L G O R I...
05211201 A D V A N C E D D A T A S T R U C T U R E S A N D A L G O R I...guestd436758
 

What's hot (20)

ARIC Team Seminar
ARIC Team SeminarARIC Team Seminar
ARIC Team Seminar
 
Ee693 sept2014midsem
Ee693 sept2014midsemEe693 sept2014midsem
Ee693 sept2014midsem
 
Linear Cryptanalysis Lecture 線形解読法
Linear Cryptanalysis Lecture 線形解読法Linear Cryptanalysis Lecture 線形解読法
Linear Cryptanalysis Lecture 線形解読法
 
Computer Science Assignment Help
Computer Science Assignment HelpComputer Science Assignment Help
Computer Science Assignment Help
 
Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and...
Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and...Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and...
Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and...
 
Bayesian Inference and Uncertainty Quantification for Inverse Problems
Bayesian Inference and Uncertainty Quantification for Inverse ProblemsBayesian Inference and Uncertainty Quantification for Inverse Problems
Bayesian Inference and Uncertainty Quantification for Inverse Problems
 
CppConcurrencyInAction - Chapter07
CppConcurrencyInAction - Chapter07CppConcurrencyInAction - Chapter07
CppConcurrencyInAction - Chapter07
 
7th Semeste Electronics and Communication Engineering (June-2016) Question Pa...
7th Semeste Electronics and Communication Engineering (June-2016) Question Pa...7th Semeste Electronics and Communication Engineering (June-2016) Question Pa...
7th Semeste Electronics and Communication Engineering (June-2016) Question Pa...
 
Ijmsr 2016-05
Ijmsr 2016-05Ijmsr 2016-05
Ijmsr 2016-05
 
Gate-Cs 2009
Gate-Cs 2009Gate-Cs 2009
Gate-Cs 2009
 
Dsp
DspDsp
Dsp
 
PECCS 2014
PECCS 2014PECCS 2014
PECCS 2014
 
Near Optimal Receive Antenna Selection Scheme for MIMO System under Spatially...
Near Optimal Receive Antenna Selection Scheme for MIMO System under Spatially...Near Optimal Receive Antenna Selection Scheme for MIMO System under Spatially...
Near Optimal Receive Antenna Selection Scheme for MIMO System under Spatially...
 
R package 'bayesImageS': a case study in Bayesian computation using Rcpp and ...
R package 'bayesImageS': a case study in Bayesian computation using Rcpp and ...R package 'bayesImageS': a case study in Bayesian computation using Rcpp and ...
R package 'bayesImageS': a case study in Bayesian computation using Rcpp and ...
 
05211201 A D V A N C E D D A T A S T R U C T U R E S A N D A L G O R I...
05211201  A D V A N C E D  D A T A  S T R U C T U R E S   A N D   A L G O R I...05211201  A D V A N C E D  D A T A  S T R U C T U R E S   A N D   A L G O R I...
05211201 A D V A N C E D D A T A S T R U C T U R E S A N D A L G O R I...
 
8th Semester, Computer Science and Information Science (2012-June/) Question ...
8th Semester, Computer Science and Information Science (2012-June/) Question ...8th Semester, Computer Science and Information Science (2012-June/) Question ...
8th Semester, Computer Science and Information Science (2012-June/) Question ...
 
Software Construction Assignment Help
Software Construction Assignment HelpSoftware Construction Assignment Help
Software Construction Assignment Help
 
8th Semester (June; July-2015) Computer Science and Information Science Engin...
8th Semester (June; July-2015) Computer Science and Information Science Engin...8th Semester (June; July-2015) Computer Science and Information Science Engin...
8th Semester (June; July-2015) Computer Science and Information Science Engin...
 
6th Semester Electronic and Communication Engineering (2013-June) Question Pa...
6th Semester Electronic and Communication Engineering (2013-June) Question Pa...6th Semester Electronic and Communication Engineering (2013-June) Question Pa...
6th Semester Electronic and Communication Engineering (2013-June) Question Pa...
 
Gate-Cs 1996
Gate-Cs 1996Gate-Cs 1996
Gate-Cs 1996
 

Viewers also liked

Hardware implementation of the serpent block cipher using fpga technology
Hardware implementation of the serpent block cipher using fpga technologyHardware implementation of the serpent block cipher using fpga technology
Hardware implementation of the serpent block cipher using fpga technologyIAEME Publication
 
DVB-T2 graduation project book 2011
DVB-T2 graduation project book 2011DVB-T2 graduation project book 2011
DVB-T2 graduation project book 2011Zont Hunt
 
digital audio broadcasting
digital audio broadcastingdigital audio broadcasting
digital audio broadcastingRam B
 
Future of Supply Chain Management in Various food Production.
Future of Supply Chain Management in Various food Production.Future of Supply Chain Management in Various food Production.
Future of Supply Chain Management in Various food Production.IJERA Editor
 
Reduction of PAPR and Efficient detection ordering scheme for MIMO Transmissi...
Reduction of PAPR and Efficient detection ordering scheme for MIMO Transmissi...Reduction of PAPR and Efficient detection ordering scheme for MIMO Transmissi...
Reduction of PAPR and Efficient detection ordering scheme for MIMO Transmissi...IJERA Editor
 
MMSE and ZF Analysis of Macrodiversity MIMO Systems and Wimax Networks over F...
MMSE and ZF Analysis of Macrodiversity MIMO Systems and Wimax Networks over F...MMSE and ZF Analysis of Macrodiversity MIMO Systems and Wimax Networks over F...
MMSE and ZF Analysis of Macrodiversity MIMO Systems and Wimax Networks over F...IJERA Editor
 
QoS Constrained H.264/SVC video streaming over Multicast Ad Hoc Networks
QoS Constrained H.264/SVC video streaming over Multicast Ad Hoc NetworksQoS Constrained H.264/SVC video streaming over Multicast Ad Hoc Networks
QoS Constrained H.264/SVC video streaming over Multicast Ad Hoc NetworksIJERA Editor
 

Viewers also liked (20)

Hardware implementation of the serpent block cipher using fpga technology
Hardware implementation of the serpent block cipher using fpga technologyHardware implementation of the serpent block cipher using fpga technology
Hardware implementation of the serpent block cipher using fpga technology
 
DVB-T2 graduation project book 2011
DVB-T2 graduation project book 2011DVB-T2 graduation project book 2011
DVB-T2 graduation project book 2011
 
digital audio broadcasting
digital audio broadcastingdigital audio broadcasting
digital audio broadcasting
 
Future of Supply Chain Management in Various food Production.
Future of Supply Chain Management in Various food Production.Future of Supply Chain Management in Various food Production.
Future of Supply Chain Management in Various food Production.
 
A046050106
A046050106A046050106
A046050106
 
B43040610
B43040610B43040610
B43040610
 
Al04602259263
Al04602259263Al04602259263
Al04602259263
 
J44094650
J44094650J44094650
J44094650
 
F044043741
F044043741F044043741
F044043741
 
F046023747
F046023747F046023747
F046023747
 
Reduction of PAPR and Efficient detection ordering scheme for MIMO Transmissi...
Reduction of PAPR and Efficient detection ordering scheme for MIMO Transmissi...Reduction of PAPR and Efficient detection ordering scheme for MIMO Transmissi...
Reduction of PAPR and Efficient detection ordering scheme for MIMO Transmissi...
 
A046060105
A046060105A046060105
A046060105
 
MMSE and ZF Analysis of Macrodiversity MIMO Systems and Wimax Networks over F...
MMSE and ZF Analysis of Macrodiversity MIMO Systems and Wimax Networks over F...MMSE and ZF Analysis of Macrodiversity MIMO Systems and Wimax Networks over F...
MMSE and ZF Analysis of Macrodiversity MIMO Systems and Wimax Networks over F...
 
Ay044316318
Ay044316318Ay044316318
Ay044316318
 
QoS Constrained H.264/SVC video streaming over Multicast Ad Hoc Networks
QoS Constrained H.264/SVC video streaming over Multicast Ad Hoc NetworksQoS Constrained H.264/SVC video streaming over Multicast Ad Hoc Networks
QoS Constrained H.264/SVC video streaming over Multicast Ad Hoc Networks
 
Ah044225229
Ah044225229Ah044225229
Ah044225229
 
Df4301619624
Df4301619624Df4301619624
Df4301619624
 
Bv4301417422
Bv4301417422Bv4301417422
Bv4301417422
 
T0440899104
T0440899104T0440899104
T0440899104
 
Eo4301852855
Eo4301852855Eo4301852855
Eo4301852855
 

Similar to FPGA Implementation of A New Chien Search Block for Reed-Solomon Codes RS (255, 239) Used In Digital Video Broadcasting DVB-T

Fault Detection Technique for Compact AES Design
Fault Detection Technique for Compact AES DesignFault Detection Technique for Compact AES Design
Fault Detection Technique for Compact AES DesignIOSR Journals
 
ADAPTIVE FUZZY KERNEL CLUSTERING ALGORITHM
ADAPTIVE FUZZY KERNEL CLUSTERING ALGORITHMADAPTIVE FUZZY KERNEL CLUSTERING ALGORITHM
ADAPTIVE FUZZY KERNEL CLUSTERING ALGORITHMWireilla
 
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDLA Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDLidescitation
 
Domain Examination of Chaos Logistics Function As A Key Generator in Cryptogr...
Domain Examination of Chaos Logistics Function As A Key Generator in Cryptogr...Domain Examination of Chaos Logistics Function As A Key Generator in Cryptogr...
Domain Examination of Chaos Logistics Function As A Key Generator in Cryptogr...IJECEIAES
 
Aes encryption engine for many core processor arrays for enhanced security
Aes encryption engine for many core processor arrays for enhanced securityAes encryption engine for many core processor arrays for enhanced security
Aes encryption engine for many core processor arrays for enhanced securityIAEME Publication
 
Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...
Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...
Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...Marisa Paryasto
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
COUPLED FPGA/ASIC IMPLEMENTATION OF ELLIPTIC CURVE CRYPTO-PROCESSOR
COUPLED FPGA/ASIC IMPLEMENTATION OF ELLIPTIC CURVE CRYPTO-PROCESSORCOUPLED FPGA/ASIC IMPLEMENTATION OF ELLIPTIC CURVE CRYPTO-PROCESSOR
COUPLED FPGA/ASIC IMPLEMENTATION OF ELLIPTIC CURVE CRYPTO-PROCESSORIJNSA Journal
 
An Algorithm For Vector Quantizer Design
An Algorithm For Vector Quantizer DesignAn Algorithm For Vector Quantizer Design
An Algorithm For Vector Quantizer DesignAngie Miller
 
High Speed Memory Efficient Multiplier-less 1-D 9/7 Wavelet Filters Based NED...
High Speed Memory Efficient Multiplier-less 1-D 9/7 Wavelet Filters Based NED...High Speed Memory Efficient Multiplier-less 1-D 9/7 Wavelet Filters Based NED...
High Speed Memory Efficient Multiplier-less 1-D 9/7 Wavelet Filters Based NED...IJERA Editor
 
Review paper on Reed Solomon (204,188) Decoder for Digital Video Broadcasting...
Review paper on Reed Solomon (204,188) Decoder for Digital Video Broadcasting...Review paper on Reed Solomon (204,188) Decoder for Digital Video Broadcasting...
Review paper on Reed Solomon (204,188) Decoder for Digital Video Broadcasting...IRJET Journal
 
Design of an Adaptive Hearing Aid Algorithm using Booth-Wallace Tree Multiplier
Design of an Adaptive Hearing Aid Algorithm using Booth-Wallace Tree MultiplierDesign of an Adaptive Hearing Aid Algorithm using Booth-Wallace Tree Multiplier
Design of an Adaptive Hearing Aid Algorithm using Booth-Wallace Tree MultiplierWaqas Tariq
 
PERFORMANCE EVALUATION OF ADAPTIVE ARRAY ANTENNAS IN COGNITIVE RELAY NETWORK
PERFORMANCE EVALUATION OF ADAPTIVE ARRAY ANTENNAS IN COGNITIVE RELAY NETWORKPERFORMANCE EVALUATION OF ADAPTIVE ARRAY ANTENNAS IN COGNITIVE RELAY NETWORK
PERFORMANCE EVALUATION OF ADAPTIVE ARRAY ANTENNAS IN COGNITIVE RELAY NETWORKcsijjournal
 

Similar to FPGA Implementation of A New Chien Search Block for Reed-Solomon Codes RS (255, 239) Used In Digital Video Broadcasting DVB-T (20)

Fault Detection Technique for Compact AES Design
Fault Detection Technique for Compact AES DesignFault Detection Technique for Compact AES Design
Fault Detection Technique for Compact AES Design
 
A HIGH THROUGHPUT AES DESIGN
A HIGH THROUGHPUT AES DESIGNA HIGH THROUGHPUT AES DESIGN
A HIGH THROUGHPUT AES DESIGN
 
ADAPTIVE FUZZY KERNEL CLUSTERING ALGORITHM
ADAPTIVE FUZZY KERNEL CLUSTERING ALGORITHMADAPTIVE FUZZY KERNEL CLUSTERING ALGORITHM
ADAPTIVE FUZZY KERNEL CLUSTERING ALGORITHM
 
11
1111
11
 
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDLA Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
 
Domain Examination of Chaos Logistics Function As A Key Generator in Cryptogr...
Domain Examination of Chaos Logistics Function As A Key Generator in Cryptogr...Domain Examination of Chaos Logistics Function As A Key Generator in Cryptogr...
Domain Examination of Chaos Logistics Function As A Key Generator in Cryptogr...
 
Aes encryption engine for many core processor arrays for enhanced security
Aes encryption engine for many core processor arrays for enhanced securityAes encryption engine for many core processor arrays for enhanced security
Aes encryption engine for many core processor arrays for enhanced security
 
Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...
Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...
Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Plan economico
Plan economicoPlan economico
Plan economico
 
Plan economico
Plan economicoPlan economico
Plan economico
 
Plan economico del 2017
Plan economico del 2017Plan economico del 2017
Plan economico del 2017
 
COUPLED FPGA/ASIC IMPLEMENTATION OF ELLIPTIC CURVE CRYPTO-PROCESSOR
COUPLED FPGA/ASIC IMPLEMENTATION OF ELLIPTIC CURVE CRYPTO-PROCESSORCOUPLED FPGA/ASIC IMPLEMENTATION OF ELLIPTIC CURVE CRYPTO-PROCESSOR
COUPLED FPGA/ASIC IMPLEMENTATION OF ELLIPTIC CURVE CRYPTO-PROCESSOR
 
Ijetr042170
Ijetr042170Ijetr042170
Ijetr042170
 
An Algorithm For Vector Quantizer Design
An Algorithm For Vector Quantizer DesignAn Algorithm For Vector Quantizer Design
An Algorithm For Vector Quantizer Design
 
High Speed Memory Efficient Multiplier-less 1-D 9/7 Wavelet Filters Based NED...
High Speed Memory Efficient Multiplier-less 1-D 9/7 Wavelet Filters Based NED...High Speed Memory Efficient Multiplier-less 1-D 9/7 Wavelet Filters Based NED...
High Speed Memory Efficient Multiplier-less 1-D 9/7 Wavelet Filters Based NED...
 
40120130406008
4012013040600840120130406008
40120130406008
 
Review paper on Reed Solomon (204,188) Decoder for Digital Video Broadcasting...
Review paper on Reed Solomon (204,188) Decoder for Digital Video Broadcasting...Review paper on Reed Solomon (204,188) Decoder for Digital Video Broadcasting...
Review paper on Reed Solomon (204,188) Decoder for Digital Video Broadcasting...
 
Design of an Adaptive Hearing Aid Algorithm using Booth-Wallace Tree Multiplier
Design of an Adaptive Hearing Aid Algorithm using Booth-Wallace Tree MultiplierDesign of an Adaptive Hearing Aid Algorithm using Booth-Wallace Tree Multiplier
Design of an Adaptive Hearing Aid Algorithm using Booth-Wallace Tree Multiplier
 
PERFORMANCE EVALUATION OF ADAPTIVE ARRAY ANTENNAS IN COGNITIVE RELAY NETWORK
PERFORMANCE EVALUATION OF ADAPTIVE ARRAY ANTENNAS IN COGNITIVE RELAY NETWORKPERFORMANCE EVALUATION OF ADAPTIVE ARRAY ANTENNAS IN COGNITIVE RELAY NETWORK
PERFORMANCE EVALUATION OF ADAPTIVE ARRAY ANTENNAS IN COGNITIVE RELAY NETWORK
 

Recently uploaded

(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 

Recently uploaded (20)

(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 

FPGA Implementation of A New Chien Search Block for Reed-Solomon Codes RS (255, 239) Used In Digital Video Broadcasting DVB-T

  • 1. El habti El idrissi Anas et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 8( Version 1), August 2014, pp.82-86 www.ijera.com 82|P a g e FPGA Implementation of A New Chien Search Block for Reed- Solomon Codes RS (255, 239) Used In Digital Video Broadcasting DVB-T El Habti El Idrissi Anas1, El Gouri Rachid1, 2, Hlou Laamari1 1Laboratory of Electrical Engineering and Energy System. Faculty of Sciences, University Ibn Tofail Kenitra, Morocco 2National School of Applied Sciences, University Ibn Tofail Kenitra, Morocco ABSTRACT The Reed-Solomon codes RS are widely used in communication systems, in particular forming part of the specification for the ETSI digital terrestrial television standard. In this paper a simple algorithm for error detection in the Chien Search block is proposed. This algorithm is based on a simple factorization of the error locator polynomial, which allows reducing the number of components required to implement the proposed algorithm on FPGA board. Consequently, it reduces the power consumption with a percentage which can reach 50 % compared to the basic RS decoder. First, we developed the design of Chien Search Block Second, we generated and simulated the hardware description language source code using Quartus software tools,finally we implemented the proposed algorithm of Chien search block for Reed-Solomon codesRS (255, 239) on FPGA board to show both the reduced hardware resources and low complexity compared to the basic algorithm. Keywords-Digital video broadcasting,Euclidean Algorithm, Error locator polynomial, FPGA implementation, Reed-Solomon codes. I. INTRODUCTION Communication technologies are widely used these days. Due to the growing percentage of people using these technologies, methods are needed to increase the transmission rate without reducing the quality [1]. One of these methods is the Reed- Solomon (RS) codes which are used to correct errors in many systems such as storage devices (CD, DVD, etc.).And digital video broadcasting (DVB), [2]. An RS code word is a packet of symbols which are commonly bytes (8-bit symbols), denotes as RS (n, k) where n is the number of the symbols in the encoded message and k is the number of the symbols in the original message as shown in Fig.1. Each RS code word can correct a maximum of t = (n-k/2) errors in a received packet [3]. The objective of this work is to prove that it’s possible to reduce a large number of components in the Chien Search Block using a new algorithm based on a factorization method which allowsconceiving another circuit of Chien Search block with an important number of minimized logic gates. Figure.1.RS code word structure [4] II. ERROR LOCATOR POLYNOMIAL The error locator polynomial E(x) is written to include only the terms that correspond to errors: E(x) = Y1푋푒1 + Y2푋푒2+ … + Yν푋푒휈(1) Where e1, … eν, identify the locations of the errors in the code word as the corresponding powers of x, while Y1,…Yν represent the error values at those locations [5]. The error locator polynomial, Ʌ (x), has a degree of ν ≤ t and can be represented as: Ʌ (x)= (1 + 푋푖푥)휈푖 (2) = X1(x+푋1−1) X2 (x +푋2−1) ….. (3) Where X1 = αe1, X2 = αe2 … then clearly the function value will be zero if x = α-e1, x = α-e2 … III. CHIEN SEARCH ALGORITHM This algorithm can detect the error position by calculating Ʌ (α-i) where 0 ≤ i ≤ n-1, such as Ʌ (x)is the error locator polynomial, calculatedwith the Euclidean algorithm. For the case of RS (n, k) we must calculate: Ʌ (α-(n-1)), Ʌ (α-(n-2))… Ʌ (α-1), Ʌ (α-0) If the expression reduces to 0 Ʌ (α-i) = 0, then that value of x is a root and identifies the error position else the position does not contain an error. RESEARCH ARTICLE OPEN ACCESS
  • 2. El habti El idrissi Anas et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 8( Version 1), August 2014, pp.82-86 www.ijera.com 83|P a g e 3.1 Proposed algorithm The proposed algorithm is based on a simple factorization of the error locator polynomial such as (xn, where n ≥ 2) should not be depicted in this polynomial. Besides, with this method we can conceive another circuit of the Chien Search Block i.e. we can minimize a large number of the used logic gates, and therefore we will have a low power consumption compared to the basic circuit. If we take the case of RS (15, 11) the error locator polynomial is: Ʌ (x) = 14x2 + 14x + 1 (4) It’s a polynomial of degree 2 as type: Ʌ (x) = A2X2+A1X+ A0(5) We factorize the equation (4), we find: Ʌ (x) = X (A2X+A1) +A0(6) For equation (5) the basic circuit corresponding is represented in Fig.2. The simulation of the basic circuit (equation 5) using Quartus is represented in Fig.5. For the equation (6) the modified circuit using the factorization method is represented in Fig.3. The simulation of the modified circuit (equation 6) using Quartus II is represented in Fig.6. Figure.2. Basic circuitof Chien Search Block Figure.3. Modified circuit of Chien Search Block For the case of a polynomial of degree 3 we have: Ʌ (X) = A3X3+A2X2+A1X+A0 = X (A3X2+A2X+A1) + A0 = X (X (A3X + A2) + A1) + A0 Generally for: Ʌ (X) = AnXn +An-1 Xn-1 + … A1X + A0 = X (AnXn-1 + An-1Xn-2+ … + A1) + A0 = X (X (AnXn-2 + An-1Xn-3+ … + A2) + A1) + A0 = X (X (X (……..X (An X + An-1) + An-2) +…) +A2) + A1) + A0 Where the coefficients A1, A2… An-1, An differ from 0. The corresponding logic circuit is represented in Fig.4. Figure.4. Modified circuit of Chien Search Block for a polynomial of degree n Figure.5. Simulation of the basic circuit (equation 4) using Quartus Where a0, a1 and a2 represent respectively α0, α1, and α2 of Fig.2, en1, en2 anden3 represent respectively A, B and C, srt represents the error position.
  • 3. El habti El idrissi Anas et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 8( Version 1), August 2014, pp.82-86 www.ijera.com 84|P a g e Figure.6. Simulation of the modified circuit (equation 5) using Quartus Where EP represents the error position 3.2 Comparison of circuits According to the simulation we have adopted previously, the result we got is the same one in comparison with the modified circuit but with an important number of minimized logic gates. This minimization can save a percentage of power which can reach 50% compared to the basic circuit. The table 1 shows the number of the used logic gates by using both the basic circuit and the modified circuit for different error locator polynomials. Table 1. Number of minimized logic gates for different error locator polynomials Error locator polynomial Number of logic gates for the basic circuit Number of logic gates for the modified circuit Number of minimized logic gates Λ(X) =AX2+BX+ C 11 7 4 Λ(X) =AX3+BX2+CX+D 15 9 6 Λ(X) =AX4+BX3+CX2+DX+ E 19 11 8 . . . Λ(X)=AnXn+ …+A1X+A0 3+4n 3+2n 2n IV. FPGA IMPLEMENTATION Implementation of decoders for Reed-Solomon codes has been problematic due to very large amount of resources required We seek to implement a new Chien Search Block on FPGA based on the proposed algorithm to judge the savings in hardware resources [6,7]. In this paper a parameterized hardware model of the Chien Search Block was developed using the Hardware Description Language (VHDL) and synthesized using Xilinx Synthesis Tool. The block diagram of the proposed algorithm as implemented is shown in Fig.7. Figure.7. Block diagram of Chien Search block The proposed Chien Search Block consists of a global ‘Clk’ and the error detection process is initiated by an ‘Input’, the ‘Error position’ can be obtained immediately after entering input. 4.1 The new Chien Search block for RS (15, 11) codes This algorithm can detect the error position by calculating Ʌ (α-i) where 0 ≤ i ≤ n-1, such as Ʌ (x) is the error locator polynomial, calculated by the Euclidean algorithm. To try the first position in the code word, corresponding to ej = 14, we need to substitute α-14 into the locator polynomial: Ʌ (x) = 14x2 + 14x + 1 Ʌ (α-14) = 14(α-14)2 + 14(α-14) + 1 = 3 And the non-zero result shows that the first position does not contain an error. For subsequent position, the power of α to be substituted will advance by one for the x term and by two for the x2 term, so we can calculate the calculations as shown in table 2. The two sum values of zero in table 2 identify the error positions correctly as the 6th and 13th symbols, corresponding to the x9 and x2 terms, respectively, of the code word polynomial. Table 2. Terms in the Chien Search block x x2 term x term unity Sum α-14 α13 α12 1 3 α-13 α0 α13 1 13 α-12 α2 α14 1 12
  • 4. El habti El idrissi Anas et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 8( Version 1), August 2014, pp.82-86 www.ijera.com 85|P a g e α-11 α4 α0 1 3 α-10 α6 α1 1 15 α-9 α8 α2 1 0 α-8 α10 α3 1 14 α-7 α12 α4 1 13 α-6 α14 α5 1 14 α-5 α1 α6 1 15 α-4 α3 α7 1 2 α-3 α5 α8 1 2 α-2 α7 α9 1 0 α-1 α9 α10 1 12 α-0 α11 α11 1 1 4.2 Test procedure for RS (15, 11) The proposed algorithm was implemented on a Xilinx Spartan 3E-500 FG 320 FPGA (xc3s500e- 5fg320). A comprehensive testing environment was developed to test the implemented algorithm. The test setup is shown in Fig.8. (a) Value of Chien Search Block for RS (15, 11) (b) Value of Chien Search Block for RS (15, 11) Figure.8. Values of Chien search block forRS (15, 11) codes In Fig.8 (a) the value is different from zero, so this position does not contain an error. In Fig.8 (b) the value is equal to zero, so this position contains an error. 4.3 The code specified for DVB-T The DVB-T standard specifies a (255, 239, t=8) Reed-Solomon code, shortened to form (204, 188, t=8) code, so that the 188 bytes of the input packet will be extended with parity bytes to produce a coded block length of 204 symbols [8]. For this code, the Galois field has 256 elements (m=8) and the polynomial representation of a field element is: a7x7+a6x6+a5x5+a4x4+a3x3+a2x2+a1x1+a0. (7) Corresponding to the binary numbers 00000000 to 11111111. Alternatively, we can use the decimal equivalents 0 to 255. The specification also mentions the field generator polynomial, given as: P(x) = x8 + x4 + x3 + x2 +1. (8) For the case of RS (255, 239) used in DVB-T standard, the decoder can detect 16 errors and correct 8 errors. 4.4 Test procedure for RS (255, 239) The proposed algorithm was implemented on a Xilinx Spartan 3E-500 FG 320 FPGA (xc3s500e- 5fg320). A comprehensive testing environment was developed to test the implemented algorithm. The test setup is shown in Fig.9. (a) Value of Chien search block for RS (255, 239) (b) Value of Chien search block for RS (255, 239) Figure.9. Values of Chien search block for RS (255, 239) codes The non-zero resultin Fig.9 (a) shows that this position does not contain an error, In Fig.9 (b) the value is equal to zero, so this position contains an error.
  • 5. El habti El idrissi Anas et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 8( Version 1), August 2014, pp.82-86 www.ijera.com 86|P a g e 4.5 Comparison of algorithms According to the tables2 and 3,whichshow the FPGAdevice utilization summaryfor RS (15, 11) and RS (255, 239) by using the two algorithms, we can conclude that: The proposed algorithm presents a low complexity and a very good performance compared to the basic algorithm. Table 3. FPGA device utilization summary for RS (15, 11) Recources Proposed Algorithm Basic Algorithm Device Xilinx Spartan 3E (xc3s500e- 5fg320) RS (n, k) RS (15, 11) Number of occupied Slices 19 25 Number used as Flip Flops 30 34 Number of 4 input LUTs 12 17 Number used as logic 12 17 Table 4. FPGA device utilization summary for RS (255, 239) Recources proposed algorithm basic algorithm Device Xilinx Spartan 3E (xc3s500e- 5fg320) RS (n, k) RS (255, 239) Number of occupied Slices 271 1080 Number used as Flip Flops 35 141 Number of 4 input LUTs 504 1992 Number used as logic 504 1992 V. CONCLUSION A simplified algorithm of Chien Search Block for Reed-Solomon codes has been presented in this paper. This algorithm is based on a simple factorization of the error locator polynomial in order to reduce the number of minimized logic gates. Thisminimization reduces the power consumption with a percentage which can reach 50% compared to the basic algorithm. The proposed algorithm has been implemented on a Xilinx Spartan 3E-500 FG 320 FPGA (xc3s500e-5fg320).The results show that the proposed algorithm requires reduced hardware resources compared to the basic algorithm. VI. ACKNOWLEDGEMENTS This work was supported by the Laboratory of Electrical Engineering and Energy System, Faculty of Science, University Ibn Tofail Kenitra, the National Society of Radio and Television (SNRT), Rabat and the National School of Applied Sciences, University Ibn Tofail Kenitra, Morocco. REFERENCES [1] P. Shrivastava, UP. Singh, Error Detection and Correction Using Reed-Solomon Codes, International Journal of Advanced Research in Computer Science and Software Engineering, 3(8), 2013, 965–969. [2] A. Alotaibi, Implementation of (255, 223) Reed Solomon Code Encoder /Decoder, California state university, 2012. [3] A. Al Azad, MI. Shahed, A Compact and Fast FPGA Based Implementation of Encoding and Decoding Algorithm Using Reed Solomon Codes,International Journal of Future Computer and Communication, 3(1), 2014, 31–35. [4] R. Huynh, G. Ning and Y. Huazhung, A Low Power Error detection in the syndrome calculator Block for Reed-Solomon codes RS: (208,188), J. Tsinghua Science and Technologie, 14(4), 2009, 474-477. [5] V. Tilavat, Y. Shukla, Simplification of procedure for decoding Reed-Solomon codes using various algorithms: An introductory Survey, International Journal of Engineering Development and Research, 2(1), 2014, 279-283. [6] D. Chaudhari, M. Bhujade, P. Dhumal, VHDL Design and FPGA implementation of Reed-Solomon encoder and decoder for RS (7, 3),International Journal of Science, Engineering and Technology Research, 3(3),2014,563-566. [7] VJ. Babrekar, SV. Sakhare, Review of FPGA Implementation of Reed-Solomon Encoder- Decoder, International Journal of Computer Applications, 87(8), 2014, 16–19. [8] BBC Research and Develompment, Reed- Solomon error correction, British Broadcasting Corporation, 2002.