SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
Alin Sindhu A et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 1( Version 4), January 2014, pp.94-97

RESEARCH ARTICLE

www.ijera.com

OPEN ACCESS

Galois Field Based Very Fast and Compact Error Correcting
Technique
Alin Sindhu.A, Pratheep.G
ME Applied Electronics Loyola institute of technology and science Kanyakumari, india
Assistant Professor, Loyola Institute of Technology and Science Kanyakumari, India

Abstract
As the technology is improving the memory devices are becoming larger, so powerful error correction codes are
needed. Error correction codes are commonly used to protect memories from soft errors, which change the
logical value of memory cells without damaging the circuit. These codes can correct a large number of errors,
but generally require complex decoders. In order to avoid this decoding complexity, in this project it uses
Euclidean geometry LDPC codes with one step majority decoding technique. This method detects words having
error in the first iteration of the majority logic decoding process and reduces the decoding time by stopping the
decoding process when no errors are detected as well as reduces the memory access time. And the result
obtained through this technique also proves that it is an effective and compact error correcting technique.
Key Words-Error correction codes, Euclidean geometry low density parity check codes, memory, majority
logic decoding.

I.

INTRODUCTION

Low density parity check codes was first
introduced by Gallager in 1962 mainly for error
detection and correction purposes. It is also called as
finite geometry LDPC codes. They have minimum
distances and their tanner graphs are free of cycles of
length 4.These properties allow them to perform well
with iterative decoding using the sum-product
algorithm. Long finite-geometry codes decoded with
sum-product algorithm perform close to Shannon‟s
theoretical limit. This is the minimum signal to noise
ratio required to achieve essentially error free
communication.
This is the first class that includes with
algebraic, rather than random, construction of
increasing lengths with performance approaching the
Shannon limit. These decoding methods for finite
geometry LDPC codes range from low to high
decoding complexity and from reasonably good
performance to very good performance. They offer a
wide range of tradeoffs among decoding complexity,
decoding speed and error performance.
In this method it accelerates a serial one step
majority logic decoding technique in which it detects
the word having error in the first iteration and then
corrects the error word and finally performs the
decoding

www.ijera.com

Encoder

Memory

.

Detector
Decoder
Corrector

Fig 1.Detector and corrector in EG geometry

II.

ONE STEP MAJORITY LOGIC
DECODING

It is the fast and relatively compact error
correcting technique. There is a limited class of
ECCS one step majority logic decoding process. It
has the advantage of reducing the decoding time as
well as memory access time.
The below figure shows the serial one step
majority logic decoding technique.

94 | P a g e
Alin Sindhu A et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 1( Version 4), January 2014, pp.94-97

Fig 2.Serial one step majority logic decoder for
(15,7) EG hamming code
The two basic steps involved in calculating
the detected codeword are as follows:
1) Generate parity check sums by computing the
inner product of the received vector and the
appropriate rows of parity check matrix.
2) The check sums are fed into a majority gate. The
output of the majority gate corrects the bit by
inverting the value if the output of majority gate
is “1”.
The serial majority corrector takes cycles to
correct an erroneous codeword. If the fault rate is
low, the corrector block is used infrequently; since
the common case is error-free code words, the
latency of the corrector will not have a severe impact
on the average memory read latency.
The one step majority logic detector can be
used to correct all the n bits of the received codeword
of a cyclic code. To detect each code bit, the received
encoded vector is cyclic shifted and fed into the XOR
gates. The information bits are fed into the encoder to
encode the information vector. The fault secure
detector of the encoder verifies the validity of the
encoded vector. If the detector detects any error the
encoding operation must be redone to generate the
correct codeword. The codeword is then stored in the
memory. During memory access operation, the stored
codeword‟s will be accessed from the memory unit.
A corrector unit is designed to correct potential errors
in the retrieved codeword‟s.
MLD is based on a number of parity check
equations which are orthogonal to each other, so that
at each iteration each codeword bit participates in one
contributes to all equations. For this reasons the
majority result of these parity check equations decide
the correctness of the correct bit under decoding.
Generic schematic of a memory system is depicted
for the usage of an ML decoder.
www.ijera.com

www.ijera.com

In this method initially, the data words are
encoded and then stored in the memory the resulting
sums are then forwarded to the majority gate for
evaluating its correctness. If the number of 1‟s
received in is greater than the number of 0‟s, which
would mean that the current bit under decoding is
wrong and a signal to correct it would be triggered.
Otherwise, the bit under decoding would be correct
and no extra operations would be needed on it and it
increases decoder. However they require a large
decoding time that impacts memory performance.
In order to improve the decoder
performance, alternative designs may be used. One
possibility is to add a fault detector by calculating the
syndrome, so that only faulty code words are
decoded. Since most of the codeword will be error
free, no further correction will be needed therefore
performance will not be affected. Although the
implementation of an SFD reduces the average of the
decoding process.
A. Encoder

Fig 3.Encoded data from encoder (7-bits of
information)
In encoder the input bit of 7bits of
information is encoded .It produces encoded bits in
which it has information as well as parity check bits
.These parity bits are responsible for detecting the
presence of error and hence correct the erroneous
word.
The
outputproducedwillbeencodedbitsc1,c2,c3,c4,c5,c6,c
7,c8,c9,c10,c11,c12,c13,c14.In general the encoder
transfers the following input information to the
memory. Here the input is the 7-bits of information,
and then the encoded input is stored in the memory
devices of the electronic devices.
B .Detector & Corrector
The basic operation of the detector is to
generate the syndrome vector. This is obtained by a

95 | P a g e
Alin Sindhu A et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 1( Version 4), January 2014, pp.94-97
matrix multiplication on the received coded vector c
and the transpose of the parity check matrix H,
S=C*(H^T)

www.ijera.com

D. Flowchart for MLD

START

15-Bits of data
(encoded bits)

Calculate
syndrome
Fig.4.Fault secure detector for (15, 7, 5) EG-LDPC
codes
The encoded bits and one row of the parity
check matrix is multiplied to get the syndrome vector
.If the calculated syndrome consists of the presence
of ones, then an error is believed to have occurred.
All zeros indicate no error.
The vector matrix multiplication is
implemented with the help of XOR gates. The input
to these gates depends on the weight of parity check
matrix. If the weight is assumed to be p then p input
XOR gates are required. Else two (p-1) input gates is
required. As shown in the above diagram, each
syndrome bit is calculated using separate XOR gates.
Therefore there is no logic sharing in the detector
implementation and hence is a fault secure detector.
The final error detection signal is implemented by an
OR function of all the syndrome bits. The output of
this n-input OR gate is the error detector signal.
C. Decoder
In the decoder the corrected bits are
decoded. In general the decoder recovers the original
data which is send by the sender. The input of the
decoder is totally 15-bits of data in which it consists
of 7bits of information and 8 bits of encoded bits.
This recovery is based on Euclidean geometry which
means distance between 1‟s must be small.
According to this geometry it selects the information
bits and performs the XOR operation. Hence the
output will be the error free information bits.

www.ijera.com

Check if
syndrome is zero

Find error
location

7-bit data
(Recovery of
information bits)

STOP
Fig 5 flow chart for MLD
The 15-bits of data is given as output to
decoder. These 15 bits of data consists of 7bits of
information bits and 8 bits of parity bits. Then
calculate the syndrome bits and check whether the
syndrome bit is “1” or “0”.If the syndrome bit is “0”
then it is considered to be error free whereas if the
syndrome bit is “1” then it is considered to be error.

96 | P a g e
Alin Sindhu A et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 1( Version 4), January 2014, pp.94-97
III.




APPLICATIONS

Data storage devices
Wireless cellular network
Satellite broadcast

IV.

EXPERIMENTAL RESULTS

They are used in every device which
consists of memory .They are used in the following
applications:
encoders and decoders are required. Accounting for
all the above area overhead factors, all the codes
considered here achieve memory density of 20 to 100
GB/nm, for large enough memory (0.1 GB).

REFERENCES
[1]

[2]

[3]

[4]
[5]

Fig. 6 Stimulated waveform
[6]
Fault secure detectors detects fault in the
encoded bits .If fault is detected the encoding
operation is redone. So the core operation of the FSD
is to find the syndrome vector .So first the generator
matrix is generated and its transpose is found. Then
the syndrome vector is found. Then the syndrome
vector is found by multiplying the coded bit with the
transpose of parity check matrix. Now if all the bits
of syndrome vector are „0‟ then there is no fault the
parity check matrix. Now if all the bits of the
syndrome vector are „0‟ then there is no fault.

V.

CONCLUSION

A fully fault-tolerant memory system is
presented that is capable of tolerating errors not only
in the memory bits but also in the supporting logic
including the ECC encoder and corrector Euclidean
Geometry codes are used. These codes are part of a
new subset of ECCs that have FSDs. Using these
FSDs a fault-tolerant encoder and corrector is
designed, where the fault-secure detector monitors
their operation. A unified approach to tolerate
permanent defects and transient faults is explained.
This unified approach reduces the area overhead.
Without this technique to tolerate errors in the ECC
logic, reliable (and consequently lithographic scale)

www.ijera.com

www.ijera.com

[7]

[8]

[9]

[10]

De Hon. J “Deterministic addressing of nano
scale devices assembled at sublithographic
pitches” vol.4 no6 IEEE trans. nano
technology,2005.
Kim.j and Kish.L “Error rate in currentcontrolled logic processors with shot noise”
vol.4 no.1 IEEE trans, 2004.
Kou.Y and Lin.S “Low density parity check
codes based on finite geometries” vol.47
no.7 IEEE trans,2001.
Lin.S and Costello.D.J “Error control
coding” vol.40 no.2 IEEE trans,2004.
Liu.S,Reviriego.P and Maestro.J “Efficient
majority logic fault detection with
difference-set
codes
for
memory
applications” vol.20 no.1 IEEE trans ,2012.
Naeimi.H “A greedy algorithm for tolerating
defective cross points in nano PLA design”
vol.21 no1 IEEE trans,2005
Sun.F and Zhang Jun.T “Defect and
transient fault-tolerant system design for
hybrid
CMOS/nano
technology
”
vol.6,no.3,IEEE trans 2007.
Tang.H, Xu.J, Lin.S and Abdel-Ghaffar.K
“Codes
on
finite
geometries”
vol.51,no.2,IEEE trans 2005.
Vasic.B and Pedagani.K “Run length limited
low density check codes based on deliberate
error insertion” p.453,IEEE trans 2004.
Varnica.N and Kavcic.A “Optimized LDPC
codes for partial response channels”
p.197,IEEE trans 2002.

AUTHORS PROFILE
Alin Sindhu.A
Pursuing M.E(Master of Engineering) in Applied
Electronics From Loyola Institute of Technology and
Science. Received her B.E in Electronics and
Communication Engineering from CSI Institute of
technology, Anna University. Her areas of interest
include VLSI design.

97 | P a g e

Contenu connexe

En vedette

Error detection enhanced decoding of difference set codes for memory applicat...
Error detection enhanced decoding of difference set codes for memory applicat...Error detection enhanced decoding of difference set codes for memory applicat...
Error detection enhanced decoding of difference set codes for memory applicat...Sherin Deena Sam
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correctionMaria Akther
 
Errror Detection and Correction
Errror Detection and CorrectionErrror Detection and Correction
Errror Detection and CorrectionMahesh Kumar Attri
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correctionSiddique Ibrahim
 
Apresentação - 1º SEEJA
Apresentação - 1º SEEJAApresentação - 1º SEEJA
Apresentação - 1º SEEJAAndréa Thees
 
Copa do Mundo
Copa do MundoCopa do Mundo
Copa do Mundoapgoretti
 
2015 July Franchising World Magazine
2015 July Franchising World Magazine2015 July Franchising World Magazine
2015 July Franchising World MagazineMoni Singh
 
Registo atividade em aula net
Registo atividade em aula netRegisto atividade em aula net
Registo atividade em aula netJoão Lima
 
Registo actividade net
Registo actividade netRegisto actividade net
Registo actividade netJoão Lima
 
Apresentação do GT19 – Educação Matemática
Apresentação do GT19 – Educação MatemáticaApresentação do GT19 – Educação Matemática
Apresentação do GT19 – Educação MatemáticaAndréa Thees
 
Michael Martin Certificate IT.PDF
Michael Martin Certificate IT.PDFMichael Martin Certificate IT.PDF
Michael Martin Certificate IT.PDFMichael Martin
 
Omid Pezeshkfar Resume 2016
Omid Pezeshkfar Resume 2016Omid Pezeshkfar Resume 2016
Omid Pezeshkfar Resume 2016Omid Pez
 

En vedette (20)

L41047379
L41047379L41047379
L41047379
 
Practica 4 excel
Practica 4 excelPractica 4 excel
Practica 4 excel
 
Error detection enhanced decoding of difference set codes for memory applicat...
Error detection enhanced decoding of difference set codes for memory applicat...Error detection enhanced decoding of difference set codes for memory applicat...
Error detection enhanced decoding of difference set codes for memory applicat...
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
Errror Detection and Correction
Errror Detection and CorrectionErrror Detection and Correction
Errror Detection and Correction
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
Apresentação - 1º SEEJA
Apresentação - 1º SEEJAApresentação - 1º SEEJA
Apresentação - 1º SEEJA
 
PA
PAPA
PA
 
Rhind Papyrus
Rhind PapyrusRhind Papyrus
Rhind Papyrus
 
Copa do Mundo
Copa do MundoCopa do Mundo
Copa do Mundo
 
2015 July Franchising World Magazine
2015 July Franchising World Magazine2015 July Franchising World Magazine
2015 July Franchising World Magazine
 
Presentacion comunidades virtuales
Presentacion comunidades virtualesPresentacion comunidades virtuales
Presentacion comunidades virtuales
 
Registo atividade em aula net
Registo atividade em aula netRegisto atividade em aula net
Registo atividade em aula net
 
Registo actividade net
Registo actividade netRegisto actividade net
Registo actividade net
 
Apresentação do GT19 – Educação Matemática
Apresentação do GT19 – Educação MatemáticaApresentação do GT19 – Educação Matemática
Apresentação do GT19 – Educação Matemática
 
A_Rolihin_portfolio_2015
A_Rolihin_portfolio_2015A_Rolihin_portfolio_2015
A_Rolihin_portfolio_2015
 
6 - Goline
6 - Goline6 - Goline
6 - Goline
 
Michael Martin Certificate IT.PDF
Michael Martin Certificate IT.PDFMichael Martin Certificate IT.PDF
Michael Martin Certificate IT.PDF
 
Presentation
PresentationPresentation
Presentation
 
Omid Pezeshkfar Resume 2016
Omid Pezeshkfar Resume 2016Omid Pezeshkfar Resume 2016
Omid Pezeshkfar Resume 2016
 

Similaire à O41049497

AN EFFICIENT VITERBI DECODER
AN EFFICIENT VITERBI DECODERAN EFFICIENT VITERBI DECODER
AN EFFICIENT VITERBI DECODERIJCSEA Journal
 
FAULT SECURE ENCODER AND DECODER WITH CLOCK GATING
FAULT SECURE ENCODER AND DECODER WITH CLOCK GATINGFAULT SECURE ENCODER AND DECODER WITH CLOCK GATING
FAULT SECURE ENCODER AND DECODER WITH CLOCK GATINGVLSICS Design
 
Design and implementation of single bit error correction linear block code sy...
Design and implementation of single bit error correction linear block code sy...Design and implementation of single bit error correction linear block code sy...
Design and implementation of single bit error correction linear block code sy...TELKOMNIKA JOURNAL
 
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...eSAT Journals
 
Error control coding techniques
Error control coding techniquesError control coding techniques
Error control coding techniquesDhanashriNandre
 
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting TechniqueLossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting TechniqueIRJET Journal
 
Survey on Error Control Coding Techniques
Survey on Error Control Coding TechniquesSurvey on Error Control Coding Techniques
Survey on Error Control Coding TechniquesIJTET Journal
 
IRJET- FPGA Implementation of Orthogonal Codes for Efficient Digital Communic...
IRJET- FPGA Implementation of Orthogonal Codes for Efficient Digital Communic...IRJET- FPGA Implementation of Orthogonal Codes for Efficient Digital Communic...
IRJET- FPGA Implementation of Orthogonal Codes for Efficient Digital Communic...IRJET Journal
 
Paper id 312201514
Paper id 312201514Paper id 312201514
Paper id 312201514IJRAT
 
Implementation of error correcting methods to the asynchronous Delay Insensit...
Implementation of error correcting methods to the asynchronous Delay Insensit...Implementation of error correcting methods to the asynchronous Delay Insensit...
Implementation of error correcting methods to the asynchronous Delay Insensit...IOSR Journals
 
Single-Bit Parity Detection and Correction using Hamming Code 7-Bit Model
Single-Bit Parity Detection and Correction using Hamming Code 7-Bit ModelSingle-Bit Parity Detection and Correction using Hamming Code 7-Bit Model
Single-Bit Parity Detection and Correction using Hamming Code 7-Bit ModelUniversitas Pembangunan Panca Budi
 
Hard Decision Viterbi Decoder: Implementation on FPGA and Comparison of Resou...
Hard Decision Viterbi Decoder: Implementation on FPGA and Comparison of Resou...Hard Decision Viterbi Decoder: Implementation on FPGA and Comparison of Resou...
Hard Decision Viterbi Decoder: Implementation on FPGA and Comparison of Resou...IJERA Editor
 
FPGA Based Decimal Matrix Code for Passive RFID Tag
FPGA Based Decimal Matrix Code for Passive RFID TagFPGA Based Decimal Matrix Code for Passive RFID Tag
FPGA Based Decimal Matrix Code for Passive RFID TagIJERA Editor
 

Similaire à O41049497 (20)

Dn4301681689
Dn4301681689Dn4301681689
Dn4301681689
 
Fy3510451050
Fy3510451050Fy3510451050
Fy3510451050
 
10
1010
10
 
J0445255
J0445255J0445255
J0445255
 
AN EFFICIENT VITERBI DECODER
AN EFFICIENT VITERBI DECODERAN EFFICIENT VITERBI DECODER
AN EFFICIENT VITERBI DECODER
 
FAULT SECURE ENCODER AND DECODER WITH CLOCK GATING
FAULT SECURE ENCODER AND DECODER WITH CLOCK GATINGFAULT SECURE ENCODER AND DECODER WITH CLOCK GATING
FAULT SECURE ENCODER AND DECODER WITH CLOCK GATING
 
Innovative Improvement of Data Storage Using Error Correction Codes
Innovative Improvement of Data Storage Using Error Correction CodesInnovative Improvement of Data Storage Using Error Correction Codes
Innovative Improvement of Data Storage Using Error Correction Codes
 
Design and implementation of single bit error correction linear block code sy...
Design and implementation of single bit error correction linear block code sy...Design and implementation of single bit error correction linear block code sy...
Design and implementation of single bit error correction linear block code sy...
 
K034066071
K034066071K034066071
K034066071
 
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
 
Error control coding techniques
Error control coding techniquesError control coding techniques
Error control coding techniques
 
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting TechniqueLossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
 
Survey on Error Control Coding Techniques
Survey on Error Control Coding TechniquesSurvey on Error Control Coding Techniques
Survey on Error Control Coding Techniques
 
IRJET- FPGA Implementation of Orthogonal Codes for Efficient Digital Communic...
IRJET- FPGA Implementation of Orthogonal Codes for Efficient Digital Communic...IRJET- FPGA Implementation of Orthogonal Codes for Efficient Digital Communic...
IRJET- FPGA Implementation of Orthogonal Codes for Efficient Digital Communic...
 
Paper id 312201514
Paper id 312201514Paper id 312201514
Paper id 312201514
 
Implementation of error correcting methods to the asynchronous Delay Insensit...
Implementation of error correcting methods to the asynchronous Delay Insensit...Implementation of error correcting methods to the asynchronous Delay Insensit...
Implementation of error correcting methods to the asynchronous Delay Insensit...
 
Single-Bit Parity Detection and Correction using Hamming Code 7-Bit Model
Single-Bit Parity Detection and Correction using Hamming Code 7-Bit ModelSingle-Bit Parity Detection and Correction using Hamming Code 7-Bit Model
Single-Bit Parity Detection and Correction using Hamming Code 7-Bit Model
 
Hard Decision Viterbi Decoder: Implementation on FPGA and Comparison of Resou...
Hard Decision Viterbi Decoder: Implementation on FPGA and Comparison of Resou...Hard Decision Viterbi Decoder: Implementation on FPGA and Comparison of Resou...
Hard Decision Viterbi Decoder: Implementation on FPGA and Comparison of Resou...
 
40120140505011
4012014050501140120140505011
40120140505011
 
FPGA Based Decimal Matrix Code for Passive RFID Tag
FPGA Based Decimal Matrix Code for Passive RFID TagFPGA Based Decimal Matrix Code for Passive RFID Tag
FPGA Based Decimal Matrix Code for Passive RFID Tag
 

Dernier

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 

Dernier (20)

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 

O41049497

  • 1. Alin Sindhu A et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 1( Version 4), January 2014, pp.94-97 RESEARCH ARTICLE www.ijera.com OPEN ACCESS Galois Field Based Very Fast and Compact Error Correcting Technique Alin Sindhu.A, Pratheep.G ME Applied Electronics Loyola institute of technology and science Kanyakumari, india Assistant Professor, Loyola Institute of Technology and Science Kanyakumari, India Abstract As the technology is improving the memory devices are becoming larger, so powerful error correction codes are needed. Error correction codes are commonly used to protect memories from soft errors, which change the logical value of memory cells without damaging the circuit. These codes can correct a large number of errors, but generally require complex decoders. In order to avoid this decoding complexity, in this project it uses Euclidean geometry LDPC codes with one step majority decoding technique. This method detects words having error in the first iteration of the majority logic decoding process and reduces the decoding time by stopping the decoding process when no errors are detected as well as reduces the memory access time. And the result obtained through this technique also proves that it is an effective and compact error correcting technique. Key Words-Error correction codes, Euclidean geometry low density parity check codes, memory, majority logic decoding. I. INTRODUCTION Low density parity check codes was first introduced by Gallager in 1962 mainly for error detection and correction purposes. It is also called as finite geometry LDPC codes. They have minimum distances and their tanner graphs are free of cycles of length 4.These properties allow them to perform well with iterative decoding using the sum-product algorithm. Long finite-geometry codes decoded with sum-product algorithm perform close to Shannon‟s theoretical limit. This is the minimum signal to noise ratio required to achieve essentially error free communication. This is the first class that includes with algebraic, rather than random, construction of increasing lengths with performance approaching the Shannon limit. These decoding methods for finite geometry LDPC codes range from low to high decoding complexity and from reasonably good performance to very good performance. They offer a wide range of tradeoffs among decoding complexity, decoding speed and error performance. In this method it accelerates a serial one step majority logic decoding technique in which it detects the word having error in the first iteration and then corrects the error word and finally performs the decoding www.ijera.com Encoder Memory . Detector Decoder Corrector Fig 1.Detector and corrector in EG geometry II. ONE STEP MAJORITY LOGIC DECODING It is the fast and relatively compact error correcting technique. There is a limited class of ECCS one step majority logic decoding process. It has the advantage of reducing the decoding time as well as memory access time. The below figure shows the serial one step majority logic decoding technique. 94 | P a g e
  • 2. Alin Sindhu A et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 1( Version 4), January 2014, pp.94-97 Fig 2.Serial one step majority logic decoder for (15,7) EG hamming code The two basic steps involved in calculating the detected codeword are as follows: 1) Generate parity check sums by computing the inner product of the received vector and the appropriate rows of parity check matrix. 2) The check sums are fed into a majority gate. The output of the majority gate corrects the bit by inverting the value if the output of majority gate is “1”. The serial majority corrector takes cycles to correct an erroneous codeword. If the fault rate is low, the corrector block is used infrequently; since the common case is error-free code words, the latency of the corrector will not have a severe impact on the average memory read latency. The one step majority logic detector can be used to correct all the n bits of the received codeword of a cyclic code. To detect each code bit, the received encoded vector is cyclic shifted and fed into the XOR gates. The information bits are fed into the encoder to encode the information vector. The fault secure detector of the encoder verifies the validity of the encoded vector. If the detector detects any error the encoding operation must be redone to generate the correct codeword. The codeword is then stored in the memory. During memory access operation, the stored codeword‟s will be accessed from the memory unit. A corrector unit is designed to correct potential errors in the retrieved codeword‟s. MLD is based on a number of parity check equations which are orthogonal to each other, so that at each iteration each codeword bit participates in one contributes to all equations. For this reasons the majority result of these parity check equations decide the correctness of the correct bit under decoding. Generic schematic of a memory system is depicted for the usage of an ML decoder. www.ijera.com www.ijera.com In this method initially, the data words are encoded and then stored in the memory the resulting sums are then forwarded to the majority gate for evaluating its correctness. If the number of 1‟s received in is greater than the number of 0‟s, which would mean that the current bit under decoding is wrong and a signal to correct it would be triggered. Otherwise, the bit under decoding would be correct and no extra operations would be needed on it and it increases decoder. However they require a large decoding time that impacts memory performance. In order to improve the decoder performance, alternative designs may be used. One possibility is to add a fault detector by calculating the syndrome, so that only faulty code words are decoded. Since most of the codeword will be error free, no further correction will be needed therefore performance will not be affected. Although the implementation of an SFD reduces the average of the decoding process. A. Encoder Fig 3.Encoded data from encoder (7-bits of information) In encoder the input bit of 7bits of information is encoded .It produces encoded bits in which it has information as well as parity check bits .These parity bits are responsible for detecting the presence of error and hence correct the erroneous word. The outputproducedwillbeencodedbitsc1,c2,c3,c4,c5,c6,c 7,c8,c9,c10,c11,c12,c13,c14.In general the encoder transfers the following input information to the memory. Here the input is the 7-bits of information, and then the encoded input is stored in the memory devices of the electronic devices. B .Detector & Corrector The basic operation of the detector is to generate the syndrome vector. This is obtained by a 95 | P a g e
  • 3. Alin Sindhu A et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 1( Version 4), January 2014, pp.94-97 matrix multiplication on the received coded vector c and the transpose of the parity check matrix H, S=C*(H^T) www.ijera.com D. Flowchart for MLD START 15-Bits of data (encoded bits) Calculate syndrome Fig.4.Fault secure detector for (15, 7, 5) EG-LDPC codes The encoded bits and one row of the parity check matrix is multiplied to get the syndrome vector .If the calculated syndrome consists of the presence of ones, then an error is believed to have occurred. All zeros indicate no error. The vector matrix multiplication is implemented with the help of XOR gates. The input to these gates depends on the weight of parity check matrix. If the weight is assumed to be p then p input XOR gates are required. Else two (p-1) input gates is required. As shown in the above diagram, each syndrome bit is calculated using separate XOR gates. Therefore there is no logic sharing in the detector implementation and hence is a fault secure detector. The final error detection signal is implemented by an OR function of all the syndrome bits. The output of this n-input OR gate is the error detector signal. C. Decoder In the decoder the corrected bits are decoded. In general the decoder recovers the original data which is send by the sender. The input of the decoder is totally 15-bits of data in which it consists of 7bits of information and 8 bits of encoded bits. This recovery is based on Euclidean geometry which means distance between 1‟s must be small. According to this geometry it selects the information bits and performs the XOR operation. Hence the output will be the error free information bits. www.ijera.com Check if syndrome is zero Find error location 7-bit data (Recovery of information bits) STOP Fig 5 flow chart for MLD The 15-bits of data is given as output to decoder. These 15 bits of data consists of 7bits of information bits and 8 bits of parity bits. Then calculate the syndrome bits and check whether the syndrome bit is “1” or “0”.If the syndrome bit is “0” then it is considered to be error free whereas if the syndrome bit is “1” then it is considered to be error. 96 | P a g e
  • 4. Alin Sindhu A et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 1( Version 4), January 2014, pp.94-97 III.    APPLICATIONS Data storage devices Wireless cellular network Satellite broadcast IV. EXPERIMENTAL RESULTS They are used in every device which consists of memory .They are used in the following applications: encoders and decoders are required. Accounting for all the above area overhead factors, all the codes considered here achieve memory density of 20 to 100 GB/nm, for large enough memory (0.1 GB). REFERENCES [1] [2] [3] [4] [5] Fig. 6 Stimulated waveform [6] Fault secure detectors detects fault in the encoded bits .If fault is detected the encoding operation is redone. So the core operation of the FSD is to find the syndrome vector .So first the generator matrix is generated and its transpose is found. Then the syndrome vector is found. Then the syndrome vector is found by multiplying the coded bit with the transpose of parity check matrix. Now if all the bits of syndrome vector are „0‟ then there is no fault the parity check matrix. Now if all the bits of the syndrome vector are „0‟ then there is no fault. V. CONCLUSION A fully fault-tolerant memory system is presented that is capable of tolerating errors not only in the memory bits but also in the supporting logic including the ECC encoder and corrector Euclidean Geometry codes are used. These codes are part of a new subset of ECCs that have FSDs. Using these FSDs a fault-tolerant encoder and corrector is designed, where the fault-secure detector monitors their operation. A unified approach to tolerate permanent defects and transient faults is explained. This unified approach reduces the area overhead. Without this technique to tolerate errors in the ECC logic, reliable (and consequently lithographic scale) www.ijera.com www.ijera.com [7] [8] [9] [10] De Hon. J “Deterministic addressing of nano scale devices assembled at sublithographic pitches” vol.4 no6 IEEE trans. nano technology,2005. Kim.j and Kish.L “Error rate in currentcontrolled logic processors with shot noise” vol.4 no.1 IEEE trans, 2004. Kou.Y and Lin.S “Low density parity check codes based on finite geometries” vol.47 no.7 IEEE trans,2001. Lin.S and Costello.D.J “Error control coding” vol.40 no.2 IEEE trans,2004. Liu.S,Reviriego.P and Maestro.J “Efficient majority logic fault detection with difference-set codes for memory applications” vol.20 no.1 IEEE trans ,2012. Naeimi.H “A greedy algorithm for tolerating defective cross points in nano PLA design” vol.21 no1 IEEE trans,2005 Sun.F and Zhang Jun.T “Defect and transient fault-tolerant system design for hybrid CMOS/nano technology ” vol.6,no.3,IEEE trans 2007. Tang.H, Xu.J, Lin.S and Abdel-Ghaffar.K “Codes on finite geometries” vol.51,no.2,IEEE trans 2005. Vasic.B and Pedagani.K “Run length limited low density check codes based on deliberate error insertion” p.453,IEEE trans 2004. Varnica.N and Kavcic.A “Optimized LDPC codes for partial response channels” p.197,IEEE trans 2002. AUTHORS PROFILE Alin Sindhu.A Pursuing M.E(Master of Engineering) in Applied Electronics From Loyola Institute of Technology and Science. Received her B.E in Electronics and Communication Engineering from CSI Institute of technology, Anna University. Her areas of interest include VLSI design. 97 | P a g e