• Title/Summary/Keyword: Error Detection Code

Search Result 189, Processing Time 0.021 seconds

AN UPPER BOUND ON THE NUMBER OF PARITY CHECKS FOR BURST ERROR DETECTION AND CORRECTION IN EUCLIDEAN CODES

  • Jain, Sapna;Lee, Ki-Suk
    • Journal of the Korean Mathematical Society
    • /
    • v.46 no.5
    • /
    • pp.967-977
    • /
    • 2009
  • There are three standard weight functions on a linear code viz. Hamming weight, Lee weight, and Euclidean weight. Euclidean weight function is useful in connection with the lattice constructions [2] where the minimum norm of vectors in the lattice is related to the minimum Euclidean weight of the code. In this paper, we obtain an upper bound over the number of parity check digits for Euclidean weight codes detecting and correcting burst errors.

Development of Error-Corrector Control Algorithm for Automatic Error Detection and Correction on Space Memory Modules (우주용 메모리의 자동 오류극복을 위한 오류 정정기 제어 알고리즘 개발)

  • Kwak, Seong-Woo;Yang, Jung-Min
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.60 no.5
    • /
    • pp.1036-1042
    • /
    • 2011
  • This paper presents an algorithm that conducts automatic memory scrubbing operated by dedicated hardwares. The proposed algorithm is designed so that it can scrub entire memory in a given scrub period, while minimally affecting the execution of flight softwares. The scrub controller is constructed in a form of state machines, which have two execution modes - normal mode and burst mode. The deadline event generator and period tick generator are designed in a separate way to support the behavior of the scrub controller. The proposed controller is implemented in VHDL code to validate its applicability. A simple version of the controller is also applied to mass memory modules used in STSAT-3.

Design and Implementation of e2eECC for Automotive On-Chip Bus Data Integrity (차량용 온칩 버스의 데이터 무결성을 위한 종단간 에러 정정 코드(e2eECC)의 설계 및 구현)

  • Eunbae Gil;Chan Park;Juho Kim;Joonho Chung;Joosock Lee;Seongsoo Lee
    • Journal of IKEEE
    • /
    • v.28 no.1
    • /
    • pp.116-122
    • /
    • 2024
  • AMBA AHB-Lite bus is widely used in on-chip bus protocol for low-power and cost-effective SoC. However, it lacks built-in error detection and correction for end-to-end data integrity. This can lead to data corruption and system instability, particularly in harsh environments like automotive applications. To mitigate this problem, this paper proposes the application of SEC-DED (Single Error Correction-Double Error Detection) to AMBA AHB-Lite bus. It aims not only to detect errors in real-time but also to correct them, thereby enhancing end-to-end data integrity. Simulation results demonstrate real-time error detection and correction when errors occur, which bolsters end-to-end data integrity of automotive on-chip bus.

A Morphology Technique-Based Boundary Detection in a Two-Dimensional QR Code (2차원 QR코드에서 모폴로지 기반의 경계선 검출 방법)

  • Park, Kwang Wook;Lee, Jong Yun
    • Journal of Digital Convergence
    • /
    • v.13 no.2
    • /
    • pp.159-175
    • /
    • 2015
  • The two-dimensional QR code has advantages such as directional nature, enough data storage capacity, ability of error correction, and ability of data restoration. There are two major issues like speed and correctiveness of recognition in the two-dimensional QR code. Therefore, this paper proposes a morphology-based algorithm of detecting the interest region of a barcode. Our research contents can be summarized as follows. First, the interest region of a barcode image was detected by close operations in morphology. Second, after that, the boundary of the barcode are detected by intersecting four cross line outside in a code. Three, the projected image is then rectified into a two-dimensional barcode in a square shape by the reverse-perspective transform. In result, it shows that our detection and recognition rates for the barcode image is also 97.20% and 94.80%, respectively and that outperforms than previous methods in various illumination and distorted image environments.

A Method for Efficient Malicious Code Detection based on the Conceptual Graphs (개념 그래프 기반의 효율적인 악성 코드 탐지 기법)

  • Kim Sung-Suk;Choi Jun-Ho;Bae Young-Geon;Kim Pan-Koo
    • The KIPS Transactions:PartC
    • /
    • v.13C no.1 s.104
    • /
    • pp.45-54
    • /
    • 2006
  • Nowadays, a lot of techniques have been applied for the detection of malicious behavior. However, the current techniques taken into practice are facing with the challenge of much variations of the original malicious behavior, and it is impossible to respond the new forms of behavior appropriately and timely. There are also some limitations can not be solved, such as the error affirmation (positive false) and mistaken obliquity (negative false). With the questions above, we suggest a new method here to improve the current situation. To detect the malicious code, we put forward dealing with the basic source code units through the conceptual graph. Basically, we use conceptual graph to define malicious behavior, and then we are able to compare the similarity relations of the malicious behavior by testing the formalized values which generated by the predefined graphs in the code. In this paper, we show how to make a conceptual graph and propose an efficient method for similarity measure to discern the malicious behavior. As a result of our experiment, we can get more efficient detection rate.

Improved Differential Detection Scheme of Space-Time Trellis Coded MDPSK For MIMO (MIMO에서 시공간 부호화된 MDPSK의 성능을 향상시키기 위한 차동 검파 시스템)

  • Kim, Chong-Il;Lee, Ho-Jin;Yoo, Hang-Youal;Kim, Jin-Yong;Kim, Seung-Youal
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.10
    • /
    • pp.1869-1876
    • /
    • 2006
  • Recently, STC techniques have been considered to be candidate to support multimedia services in the next generation mobile radio communications and have been developed the many communications systems in order to achieve the high data rates. In this paper, we Nose the Trellis-Coded Differential Space Time Modulation system with multiple symbol detection. The Trellis-code performs the set partition with unitary group codes. The Viterbi decoder containing new branch metrics is introduced in order to improve the bit error rate (BER) in the differential detection of the unitary differential space time modulation. Also, we describe the Viterbi algorithm in order to use this branch metrics. Our study shows that such a Viterbi decoder improves BER performance without sacrificing bandwidth and power efficiency.

A Study on Performance Enhancement for Iris Recognition by Eyelash Detection (속눈썹 추출 방법을 이용한 홍채 인식 성능 향상 연구)

  • Kang Byung Joon;Park Kang Ryoung
    • The KIPS Transactions:PartB
    • /
    • v.12B no.3 s.99
    • /
    • pp.233-238
    • /
    • 2005
  • With iris recognition algorithm, unique iris code can be generated and user can be identified by using iris pattern. However, if unnecessary information such as eyelash is included in iris region, the error for iris recognition is increased, consequently. In detail, if iris region is used to generate ins code not excluding eyelash and the position of eyelash is moved, the iris codes are also changed and the error rate is increased. To overcome such problem, we propose the method of detecting eyelash by using mask and excluding the detected eyelash region in case of generating iris code. Experimental results show that EER(Equal Error Rate) for iris recognition using the proposed algorithm is lessened as much as $0.18\%$ compared to that not using it.

Design of Intelligent Servocontroller for Proportional Flow Control Solenoid Valve with Large Capacity (지능형 대용량 비례유량제어밸브 서보컨트롤러 설계)

  • Jung, G.H.
    • Transactions of The Korea Fluid Power Systems Society
    • /
    • v.8 no.3
    • /
    • pp.1-7
    • /
    • 2011
  • As the technologies of electronic device have advanced these days, most of mechanical systems are designed with electronic control unit to take advantage of control parameter adaption to operating conditions and firmware flexibilities as well. On-board diagnosis, which detects the system malfunction and identifies potential source of error with its own diagnostic criteria, and fail-safe that can switch the mode of operation in view of recognized error characteristics enables easy maintenance and troubleshooting as well as system protection. This paper dealt with the development of diagnosis and fail-safe function for proportional flow control valve. All type of errors related to valve control system components are investigated and assigned to a specific hexadecimal codes. Cumulative error detection algorithm is applied in order for the sensitivity and reliability to be appropriate. Embedded simulator which runs simultaneously with system program provides the virtual error simulation environment for expeditious development of error detection algorithm. The diagnosis function was verified both with solenoid valve and embedded simulator test and it will enhance the valve control system monitoring function.

Augmented QSBC(Quantum Short-Block Code)-QURC(Quantum Unity-Rate Code)(II) with Pauli X,Y,Z error detection (파울리 X,Y,Z 오류검출 기능을 갖는 증강된 QSBC(Quantum Short-Block Code)-QURC(Quantum Unity-Rate Code)(II))

  • Dong-Young Park;Sang-Min Suh;Baek-Ki Kim
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.3
    • /
    • pp.495-508
    • /
    • 2023
  • This paper proposes a method to find out the type and location information of Pauli X, Y, Z errors generated in quantum channels using only the quantum information processing part of the multiple-rate quantum turbo short-block code without external help from the classical information processing part. In order to obtain the location information of the Pauli X,Y error, n-auxiliary qubits and n-CNOT gates were inserted into the C[n,k,2] QSBC-QURC encoder. As a result, the maximum coding rate is limited to about 1/2 as the trade-off characteristics. The location information of the Pauli Z error for C[n,k,2] QSBC-QURC was obtained through the Clifford-based stabilizer measurement. The proposed method inherits all other characteristics of C[n,k,2] QSBC-QURC except for the coding rate.

Detection of Colluded Multimedia Fingerprint using LDPC and BIBD (LDPC와 BIBD를 이용한 공모된 멀티미디어 핑거프린트의 검출)

  • Rhee Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.5 s.311
    • /
    • pp.68-75
    • /
    • 2006
  • Multimedia fingerprinting protects multimedia content from illegal redistribution by uniquely marking every copy of the content distributed to each user. Differ from a symmetric/asymmetric scheme, fingerprinting schemes, only regular user can know the inserted fingerprint data and the scheme guarantee an anonymous before recontributed data. In this paper, we present a scheme which is the algorithm using LDPC(Low Density Parity Check) for detection of colluded multimedia fingerprint and correcting errors. This proposed scheme is consists of the LDPC block, Hopfield Network and the algorithm of anti-collusion code generation. Anti-collusion code based on BIBD(Balanced Incomplete Block Design) was made 100% collusion code detection rate about the linear collusion attack(average, AND and OR) and LD% block for the error bits correction confirmed that can correct error until AWGN 0dB.