Results 61 to 70 of about 21,651 (133)

Reed solomon inner-convolutional outer concatenated code with error-erasure decoding for narrowband and broadband power line communications [PDF]

open access: yesSongklanakarin Journal of Science and Technology (SJST), 2017
A novel concatenated coding system for both narrowband and broadband power line communications (NB-PLC and BB-PLC) is proposed. The order of the inner and the outer codes switches from the G3-PLC standard and the interleaver is eliminated.
Usana Tuntoolavest   +2 more
doaj   +1 more source

Evaluation of Environmental DNA as a Surveillance Tool for Invasive House Mice (Mus musculus)

open access: yesEnvironmental DNA, Volume 7, Issue 1, January–February 2025.
Biosecurity tools for detecting invasive species need to be layered for the highest probability of detection. Further, tools need to be validated and tested in different environments to understand the limitations of use. Here, we test an eDNA assay for the detection of Mus musculus, which is a worldwide invasive species.
Antoinette J. Piaggio   +13 more
wiley   +1 more source

Reed-Solomon Hybrid Codes for Optical Communications

open access: yesJournal of Engineering and Sustainable Development, 2013
The astonishing performance of concatenated codes attracted many researchers and this has resulted in an explosive amount of literature since their introduction few years ago.
Awatif Ali Jafaar
doaj  

Dimensions of the hull of generalized Reed-Solomon codes

open access: yesAIMS Mathematics
Let GRS$ _k(\boldsymbol{\alpha}, \boldsymbol{\upsilon}) $ be a $ k $-dimensional generalized Reed-Solomon (GRS) code over $ \mathbb{F}_q $ associated with $ \boldsymbol{\alpha} = (\alpha_1, \ldots, \alpha_n) $ and $ \boldsymbol{\upsilon} = (\upsilon_1,
Jing Huang, Jingge Liu , Dong Yu
doaj   +1 more source

A Novel Method of Data Protection Through DNA Chromosome Databases

open access: yesApplied Computational Intelligence and Soft Computing, Volume 2025, Issue 1, 2025.
With the advancement of the digital age, data have become insecure, which requires techniques to secure data. Deoxyribonucleic acid (DNA) has become an increasingly secure technology for storing next‐generation digital data. DNA provides superior capabilities due to its high and efficient storage capacity and long lifespan.
Sadoon Hussein   +2 more
wiley   +1 more source

VLSI Implementation of High‐Speed and Area‐Efficient Multiplierless Address Generation Architecture for Deinterleaver in WiMAX Applications

open access: yesJournal of Electrical and Computer Engineering, Volume 2025, Issue 1, 2025.
This paper presents a VLSI implementation of a high‐speed, area‐efficient, multiplierless address generation architecture for the WiMAX deinterleaver, conforming to the IEEE 802.16e standard. The primary motivation of this work is to reduce hardware complexity and delay by eliminating multipliers, which are traditionally used in address generation. The
Vivek Karthick Perumal   +4 more
wiley   +1 more source

Distributed GRS‐coded differential spatial modulation for half‐duplex cooperative network based on relay optimization and joint decoding

open access: yesIET Communications, Volume 18, Issue 20, Page 1795-1812, December 2024.
The article proposes the novel distributed generalized Reed‐Solomon coded differential spatial modulation (DGRSC‐DSM) scheme, where two selection algorithms are developed at the relay to optimize the final code with a better weight enumeration. Based on the specific structure of the GRS codes and the selection mode, the novel Smart‐joint decoding ...
Chen Chen, Fengfan Yang
wiley   +1 more source

Multirate Filter Bank Representations of RS and BCH Codes

open access: yesEURASIP Journal on Wireless Communications and Networking, 2009
This paper addresses the use of multirate filter banks in the context of error-correction coding. An in-depth study of these filter banks is presented, motivated by earlier results and applications based on the filter bank representation of Reed-Solomon (
Marc Moonen, Geert Van Meerbergen
doaj   +1 more source

A comparison of VLSI architectures for time and transform domain decoding of Reed-Solomon codes [PDF]

open access: yes
It is well known that the Euclidean algorithm or its equivalent, continued fractions, can be used to find the error locator polynomial needed to decode a Reed-Solomon (RS) code.
Deutsch, L. J.   +4 more
core   +1 more source

VLSI Implementation of Block Error Correction Coding Techniques [PDF]

open access: yes, 2011
Communication Engineering has become the most vital field of Engineering in today’s life. The world is dreaded to think beyond any communication gadgets.
Gupta, Abhishek, Kumar, Rajeev
core  

Home - About - Disclaimer - Privacy