Results 31 to 40 of about 37,717 (290)

Evaluating the EVENODD Code: Principles, Applications, and Future Prospects in Data Storage Systems [PDF]

open access: yesITM Web of Conferences
In modern data storage and transmission, ensuring data integrity and reliability is critical due to potential losses or corruption caused by channel instability and system errors. Check codes have been developed to address these issues, allowing recovery
Deng Jinxiang
doaj   +1 more source

Automatic Recognition and Replacement of Cyclic Redundancy Checks for Program Optimization

open access: yesIEEE Access
Cyclic redundancy check (CRC) is a fundamental error-detection mechanism widely used in digital networks and storage systems to ensure data integrity. CRC can be implemented in various ways.
Mariam Arutunian   +4 more
doaj   +1 more source

Fix It, Don't Bin It! - CRC Error Correction in Bluetooth Low Energy [PDF]

open access: yes, 2015
In this paper, we introduce error correction to the Bluetooth Low Energy (BLE) standard by utilising data redundancy provided by the Cyclic Redundancy Check (CRC) code used to detect erroneous packets.
Fafoutis, Xenofon   +2 more
core   +2 more sources

Cyclic Low-Density MDS Array Codes [PDF]

open access: yes, 2006
We construct two infinite families of low density MDS array codes which are also cyclic. One of these families includes the first such sub-family with redundancy parameter r > 2.
Jehoshua Bruck   +3 more
core   +2 more sources

Convolutional-Code-Specific CRC Code Design

open access: yes, 2015
Cyclic redundancy check (CRC) codes check if a codeword is correctly received. This paper presents an algorithm to design CRC codes that are optimized for the code-specific error behavior of a specified feedforward convolutional code.
Daneshrad, Babak   +2 more
core   +1 more source

Performance evaluation of hybrid ARQ schemes of 3GPP LTE OFDMA system [PDF]

open access: yes, 2007
Expectations and requirements for future wireless communication systems continue to grow and evolve. Thus, recently, the Third Generation Partnership Project (3GPP) has considered the Long Term Evolution (LTE) of 3G - also known as Super 3G - to ensure ...
Armour, SMD, Beh, KC, Doufexi, A
core   +2 more sources

Disordered but rhythmic—the role of intrinsic protein disorder in eukaryotic circadian timing

open access: yesFEBS Letters, EarlyView.
Unstructured domains known as intrinsically disordered regions (IDRs) are present in nearly every part of the eukaryotic core circadian oscillator. IDRs enable many diverse inter‐ and intramolecular interactions that support clock function. IDR conformations are highly tunable by post‐translational modifications and environmental conditions, which ...
Emery T. Usher, Jacqueline F. Pelham
wiley   +1 more source

Performance evaluation of INDECT security architecture

open access: yesIteckne, 2018
This paper evaluates the performance of the key elements of the security architecture developed by the INDECT project. In particular it first evaluates three different concurrent error detection mechanism (parity check, Berger code, and cyclic redundancy
Petr Machník   +3 more
doaj   +1 more source

CRC-aided Multiple Traceback Decoding Algorithm of Spinal Code [PDF]

open access: yesJisuanji gongcheng, 2017
In order to improve the decoding efficiency of Spinal code,the beam search and Cyclic Redundancy Check(CRC)decoding are considered as a whole for joint decoding,a CRC-aided multiple traceback decoding algorithm is proposed.The correct decoding route is ...
QU Xiaoxu,YANG Liming,MIAO Quanqiang
doaj   +1 more source

Home - About - Disclaimer - Privacy