Preview

Extended Golay Code Analysis

Powerful Essays
Open Document
Open Document
1920 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Extended Golay Code Analysis
The generated codeword shown in this example has a weight of 12 that is a multiple of four and greater than eight. Thus, the generated codeword is valid.

III. PEROSED BINARYAND EXTENDED GOLAY CODE ARCHITECTURE
In (23, 12, 7) Golay code, the message is constructed of 12 bits, then additional 11 bits are appended to it. After appending check bits, which are obtained from CRC generation process to the 12 bits message, total bits will become 23 and it is named codeword. The 23 bits obtained at the receiver side is able to be converted into a 12 bits message even if there is distortion in the message.The proposed architecture for the binary and extended Golay code is constructed of three sections: 1) data unit or data path, 2) control unit, and
…show more content…
Reviriego, S. Liu, L. Xiao, and J. A. Maestro, "An efficient single and double-adjacent error correcting parallel decoder for the (24, 12) extended Golay code," IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 24, no. 4, pp. 1603-1606, 2016.
[2] F. J. MacWilliams and N. J. A. Sloane, The theory of error-correcting codes. Elsevier, 1977.
[3] R. W. Hamming, "Error detecting and error correcting codes," Bell Labs Technical Journal, vol. 29, no. 2, pp. 147-160, 1950.
[4] C. E. Shannon, "A mathematical theory of communication," Bell System Technical Journal, vol. 27, no. 1, pp. 379-423, July 1948.
[5] M.J.E.Golay, "Notes on digital coding," Proc.IRE, vol. 37, p. 657, jun. 1949.
[6] S. Sarangi and S. Banerjee, "Efficient hardware implementation of encoder and decoder for Golay code," IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 23, no. 9, pp. 1965-1968,
…show more content…
Rezai and P. Keshavarzi, "High-performance scalable architecture for modular multiplication using a new digit-serial computation," Microelectronics Journal, vol. 55, pp. 169-178, 2016.
[15] A. Rezai and P. Keshavarzi, "High-throughput modular multiplication and exponentiation algorithms using multibit-scan–multibit-shift technique," IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 23, no. 9, pp. 1710-1719, 2015.
[16] S. Lin and D. Costello, "Error control coding, 2nd edEnglewood Cliffs," ed: Prentice-Hall, 2010.
[17] S. Gowri and K. Ribana, "High-speed encoder and decoder of the binary Golay code," Journal of Chemical and Pharmaceutical Sciences ISSN, vol. 974, p. 2115, 2017.
[18] F. McWilliams and N. Sloane, "The theory of error correcting codes, North-Holland," ed: Amsterdam, 1977.
[19] W. W. Peterson and E. J. Weldon, Error-correcting codes. MIT press, 1972.
[20] T. K. Moon, "Error correction coding," Mathematical Methods and Algorithms. Jhon Wiley and Son, 2005.
[21] U. Rangare and R. Thakur, "A review on design and simulation of extended Golay decoder," International Journal of Engineering Science, vol. 2058, 2016.
[22] G. Campobello, G. Patane, and M. Russo, "Parallel CRC realization," IEEE Transactions on Computers, vol. 52, no. 10, pp. 1312-1319,

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1310 Unit 1 Exercise 1

    • 5033 Words
    • 21 Pages

    Objective: To enable the receiver of a message transmitted through noisy channel to check whether the message has been corrupted. The aim of an error detection technique is to enable the receiver of a message transmitted through noisy channel to determine whether the message has been corrupted. To do this, the transmitter constructs a value called a checksum that is the function of message and appends it’s to message. The receiver can then use the same function to calculate the checksum of the received message and compare it with the appended checksum to see if the message was correctly received.…

    • 5033 Words
    • 21 Pages
    Powerful Essays
  • Satisfactory Essays

    Cited: Solomon, M., & Kim, D. (2013). Fundamentals of Communications and Networking. Burlington: Jones & Bartlett Learning.…

    • 304 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    it 345 study guide final

    • 1027 Words
    • 5 Pages

    inter character gap serves as a break between the characters of a discrete encoded bar code… The width of the gaps should not be more than 4x dimensions…

    • 1027 Words
    • 5 Pages
    Good Essays
  • Better Essays

    References: Linear Symbol Technologies. (2008) LS2208 Barcode Scanner. (LS2208) [Computer Software]. Retrieved September 30, 2008, from: http://www.thebarcodewarehouse.co.uk/symbol-technologies.…

    • 4521 Words
    • 19 Pages
    Better Essays
  • Powerful Essays

    Pt1420 Unit 1 Assignment 2

    • 1305 Words
    • 6 Pages

    Das, D., Gregersen, E., Hosch, L., Lotha, G., Sampaolo, M., Sinha, S. (2014). C++. In Encyclopedia Britannica.…

    • 1305 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    The general idea behind Space–Time Block Codes construction is based on finding coding matrices X that can satisfy the following condition,…

    • 674 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    2: Redundant via Hamming code; an error-correcting code is calculated across corresponding bits on each data disk, and the bits of the code are stored in the corresponding bit positions on multiple parity disks. 3: Bit-interleaved parity; similar to level 2 but instead of an error-correcting code, a simple parity bit is computed for the set of individual bits in the same position on all of the data disks. 4: Block-interleaved parity; a bit-by-bit parity strip is calculated across corresponding strips on each data disk, and the parity bits are stored in the corresponding strip on the parity disk. 5: Block-interleaved distributed parity; similar to level 4 but distributes the parity strips across all disks. 6: Block interleaved dual distributed parity; two different parity calculations are carried out and stored in separate blocks on different…

    • 1721 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Output and 3n 2n 1n

    • 1607 Words
    • 25 Pages

    9. Find a truth table for the 74148 encoder. You can use the one in your textbook or download a datasheet from a manufacturer. Use the datasheet to fill in the Output columns in the table below. Depending on the source of your datasheet, you may need to cross reference…

    • 1607 Words
    • 25 Pages
    Satisfactory Essays
  • Powerful Essays

    Hansen, R., Harris, A., Phenix, A., Thornton, D. (2003). STATIC 99 Coding Rules – Revised 2003. Retrieved June 18, 2009 from http://ww2.ps-sp.gc.ca/publications/corrections/pdf/Static-99-coding-Rules_e.pdf…

    • 2465 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Jack Ryan

    • 838 Words
    • 4 Pages

    The workplace is littered with ethical dilemmas no matter where you work. For Pacific Trust the primary ethical issues that need attention are Jack Ryan’s negligent behavior toward his work with the Palisades Produce contract. His negligence caused him to be faced with lying to his superior or taking responsibility for his mistakes. The necessity for a course of action to help Jack comes partly from the underlying issue of Stephen Wood’s misconduct within the Middle-market Group.…

    • 838 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    How much faster is 4G compared against 3G? The speed of 3G networks depends on how they are implemented. By 2010 Verizon (a CDMA network) had reached the limits of its 3G network speed in the United States. 4G networks allowed Verizon the ability to offer transmission speeds up to four times faster than its current 3G network. AT&T’s 3G network, however, is based on GSM. The GSM design left AT&T room to upgrade its current 3G speeds. “…it is anticipated that when AT&T upgrade[s] their 3G networks, their speeds will become comparable to 4G from…Verizon. (Diffen, 2011)”…

    • 2450 Words
    • 10 Pages
    Powerful Essays
  • Best Essays

    Proposal of Social Media

    • 2279 Words
    • 10 Pages

    References: Bulmer, D., & DiMauro, V. (2009). Executive Summary from the Society for New Communications…

    • 2279 Words
    • 10 Pages
    Best Essays
  • Good Essays

    Dpcm

    • 1453 Words
    • 6 Pages

    Principle of Differential Pulse Code Modulation (DPCM) Characteristics of DPCM quantization errors Predictive coding gain Adaptive intra-interframe DPCM Conditional Replenishment…

    • 1453 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    References: [33]. C. Staelin. lmbench --- an extensible micro-benchmark suite. HPL-2004-213. Dec. 2004, http://www.hpl.hp. com/techreports/2004/HPL-2004-213.pdf. [34]. Sun Microsystems, “Sun’s 64-bit Gemini Chip,” Sun-flash, 66(4), Aug. 2003.…

    • 12626 Words
    • 51 Pages
    Powerful Essays
  • Powerful Essays

    Image Compression

    • 3038 Words
    • 13 Pages

    service providers will have to support a variety of formats to meet the needs of…

    • 3038 Words
    • 13 Pages
    Powerful Essays