Results 161 to 170 of about 3,425,848 (222)
Some of the next articles are maybe not open access.

Decoding Erasures for Nonsystematic RS Codes

2019 IEEE Region 10 Symposium (TENSYMP), 2019
In the past, RS codes were initially encoded in nonsystematic forms to account for general RS codes that transform all components in a codeword. To avoid information leakage, RS code can also be encoded in nonsystematic forms like the general RS code-based cryptography.
Tao Wu, Ruomei Wang
openaire   +1 more source

Scale-RS: An Efficient Scaling Scheme for RS-Coded Storage Clusters

IEEE Transactions on Parallel and Distributed Systems, 2015
It is indispensable to scale erasure-coded storage clusters to meet requirements of increased storage capacity and I/O performance. In this study, we propose an efficient scaling scheme for Reed-Solomon-coded storage clusters called Scale-RS, which has three salient features.
Jianzhong Huang   +4 more
openaire   +1 more source

Impact of Reed Solomon forward error correction code in enhancing performance of free space optical communication link

Optical Engineering + Applications, 2020
The technological development in the field of optical communication has nearly addressed the concern for availability of bandwidth at higher data rates to meet the user requirement.
Suresh Kumar, Payal Payal
semanticscholar   +1 more source

Iterative coding and decoding algorithm of RS digital fountain code

2008 11th IEEE Singapore International Conference on Communication Systems, 2008
Combining forward error correcting and automatic repeat request is a commonly used method in digital communication system. But in broadcast communication system, this method will compromise the communication efficiency and cause longer transmission delay due to the need of retransmitting data. This problem, however, can be effectively solved by the use
null Weijia Lei   +3 more
openaire   +1 more source

An Anti-Collusion Fingerprinting based on CFF Code and RS Code

2020 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2020
Data security is becoming more and more important in data exchange. Once the data is leaked, it will pose a great threat to the privacy and property security of users. Copyright authentication and data provenance have become an important requirement of the information security defense mechanism.
Yuxin Sun, Yingzhou Zhang, Linlin Zhu
openaire   +1 more source

A decoding algorithm for DEC RS codes

Proceedings of IEEE. IEEE Region 10 Conference. TENCON 99. 'Multimedia Technology for Asia-Pacific Information Infrastructure' (Cat. No.99CH37030), 2003
A step-by-step decoding algorithm is proposed for double-error-correcting (DEC) Reed-Solomon (RS) codes of length n=2/sup m/-1. Since the decoding algorithm can directly find the error value at the highest-order position in a received vector without determining the error location polynomial, the decoding procedure is very simple and regular, and ...
null Erl-Huei Lu   +2 more
openaire   +1 more source

Deep Metric and Hash-Code Learning for Content-Based Retrieval of Remote Sensing Images

IEEE International Geoscience and Remote Sensing Symposium, 2018
The growing volume of Remote Sensing (RS) image archives demands for feature learning techniques and hashing functions which can: (1) accurately represent the semantics in the RS images; and (2) have quasi real-time performance during retrieval.
Subhankar Roy   +3 more
semanticscholar   +1 more source

RS and Binary BCH Codes

2019
This chapter begins presenting the original approach to Reed–Solomon (RS) codes exhibiting the generator matrix of the code. This is followed by an equivalent method that selects codewords “screening” words by the parity-check matrix. The familiar ideas of addition and multiplication of complex numbers are utilized to construct Galois fields using ...
openaire   +1 more source

Serially Concatenated RS Codes with ST Turbo Codes Over Ring

2009
In this paper, we investigate serially concatenated Reed-Solomon codes (RS) with the space-time turbo codes over ring ZM. The encoded QPSK signals are transmitted through the quasi-static and fast-fading multiple-input-multiple-output (MIMO) channel. In the receiver, we use the iterative soft input soft output (SOVA) algorithm.
P. Remlein, R. Orzechowski
openaire   +1 more source

Implementation Architectures and Applications of RS Codes

1999
Some basic concepts of the RS codes and various encoding and decoding algorithms are discussed in Chapter 6. In this chapter, certain implementation architectures for RS codes are examined and compared. Also to further demonstrate the power of RS codes certain important applications of are introduced in this chapter.
Irving S. Reed, Xuemin Chen
openaire   +1 more source

Home - About - Disclaimer - Privacy