SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 09 | Sep-2013, Available @ http://www.ijret.org 209
FPGA IMPLEMENTATION OF (15,7) BCH ENCODER AND DECODER
FOR TEXT MESSAGE
Rohith S1
, Pavithra S2
1
Assistant Professor, 2
PG Scholar, ECE, Nagarjuna college of engineering & Technology, Karnataka, India,
rohithvjp2006@gmail.com, paviec01@gmail.com
Abstract
In a communication channel, noise and interferences are the two main sources of errors occur during the transmission of the message.
Thus, to get the error free communication error control codes are used. This paper discusses, FPGA implementation of (15, 7) BCH
Encoder and Decoder for text message using Verilog Hardware Description Language. Initially each character in a text message is
converted into binary data of 7 bits. These 7 bits are encoded into 15 bit codeword using (15, 7) BCH encoder. If any 2 bit error in
any position of 15 bit codeword, is detected and corrected. This corrected data is converted back into an ASCII character. The
decoder is implemented using the Peterson algorithm and Chine’s search algorithm. Simulation was carried out by using Xilinx 12.1
ISE simulator, and verified results for an arbitrarily chosen message data. Synthesis was successfully done by using the RTL compiler,
power and area is estimated for 180nm Technology. Finally both encoder and decoder design is implemented on Spartan 3E FPGA.
Index Terms: BCH Encoder, BCH Decoder, FPGA, Verilog, Cadence RTL compiler.
-----------------------------------------------------------------------***-----------------------------------------------------------------------
1. INTRODUCTION
Rapid growth in internet and mobile technology, exchange of
information is common practice. Information may be text,
audio, video etc form. Transmission of information through a
physical medium or wireless medium, possibility that data get
corrupted this leads to an error in a random only selected
locations of a symbol or the entire symbol. To have a reliable
communication through a communication channel that has an
acceptable Bit Error Rate (BER) and High Signal to Noise
Ratio (SNR) error correcting codes are used. These codes are
introduced in order to detect and correct a specified number of
errors which may occur during transmission of message over a
communication channel [1]-[4].
There are different types of Error correction codes are used in
present digital communication system based on the type of
channel noise. Few of them are Hamming code [3], Low
Density Parity Check code (LDPC) [4], Bose-Chaudhuri
Hocquenghem code (BCH) [5], Reed Solomon code [6], and
Turbo code [7]. These codes are different from each other in
their complexity and implementation. BCH codes are widely
used in the areas like, mobile communication, digital
communications, satellite communications, optical and
magnetic storage systems, and computer networks etc.
In this work (15, 7) BCH encoder and decoder is implemented
on Sparten3E FPGA. For designing the BCH codes, two
coding techniques are used. They are Systematic codes and
Non systematic codes. In case of systematic codes original
message d(x) is as it is in the encoded word c(x). Where as in
case of non-systematic code encoded word c(x) is obtained by
multiplying message d(x) with generator polynomial G(x).
Hence message data will not be same in the encoded code
word. At the transmitter side using encoder circuit binary
digits are encoded by appending some extra bits with message
bits also known as parity bits. The parity bits and message bits
together called as „Codeword. At the Receiver end codeword
will be received and error detection and correction process is
applied. This process is known as decoding. If error presents
in received data within a correction limits, the error will be
corrected and original message is retrieved. This improves the
quality of transmitted message to great extent and hence
reduction in error rate.
The rest of this paper is organized as follows. Related work is
discussed in section 2. (15, 7) BCH Encoder and Decoder are
discussed section 3. In section 4 Simulation and synthesis
results are discussed. Finally conclusion remarks are given in
section 5.
2. RELATED WORK
Cyclic decoding procedures for error corrections in BCH code
was discussed in [8]. They implemented binary BCH codes
for 5 bit error correction with a length of 127 bits using
Peterson decoding procedure. Author shown that burst error
correcting codes are less speed and more complex in hardware
compared to BCH codes Application of BCH codes in
authentication of binary document images is discussed in [9].
They used (7, 4) BCH encoder for encoding of a character and
embedded in a binary document image, each 4 bit in a
character is encoded to a 7 bit. They used BCH codes to
correct one bit error in any position of 7 bit data.
Implementation of (7, 4) BCH encoder to correct single error
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 09 | Sep-2013, Available @ http://www.ijret.org 210
in any position of 7 bits is discussed in [10]. The circuit design
and simulation was carried out using Orcad version 9.1 and
implemented on FPGA (Xilinx xc4013). In [11] application of
BCH code for error detection and correction in memory is
presented. They compared both single error correction and
double error correction BCH codes using 180nm technology.
The synthesis and simulations were carried out using
Synopsys Design Compiler, power consumption and area of
the circuit was summarized for different (n, k) BCH code
cases. The result shows that power consumption and area
required was less compared to single error correction.
Application of BCH codes in fault tolerant method is given in
[12]. They designed a 32 bit ALU, which is secure against
many faults and able to correct any 5 bit faults in any positions
of 32 bits input registers of ALU. The BCH codes were used
to correct multiple errors. Author shown that compared to
TMR (triple modular redundancy) & Residue code, BCH
codes were the better choice in estimated area. Non linear
multi error correcting codes in the reliable MLC NAND flash
memories using BCH and RS codes is discussed in [13]. The
encoder and decoder architectures for non linear 5 bit error
corrections in flash memories can be modeled in Verilog and
synthesized in RTL design compiler.
Proposed work discusses, FPGA implementation of (15, 7)
Binary BCH Encoder and Decoder for text message using
Verilog HDL. This work aim to correct double error in any
position of 15 bit codeword. Initially each character in a text
message is converted into binary data of 7 bits. This 7 bit is
encoded into 15 bit codeword. Using (15, 7) BCH Encoder if
any 2 bit error in a 15 bit codeword, it will detected and
corrected. The corrected data is converted into an ASCII
character. The decoder is implemented using the Peterson and
Zierler algorithm and chine‟s search algorithm. Simulation
was carried out by using Xilinx 12.1 ISE simulator, and
verified the results for an arbitrarily chosen message data.
Synthesis was successfully carried out using the Cadence
RTL compiler, power and area is estimated for 180nm
Technology.
3. BCH CODE
BCH codes can be defined by two parameters that are code
size n and the number of errors to be corrected t
Block length: n = 2m
- 1
Number of information bits: k ≥ n-m*t
Minimum distance: dmin≥2t + 1.
The generator polynomial of the code is specified in terms of
its roots over the Galois field GF (2m
). Let α be a primitive
element in GF (2m
).The generator polynomial g(x) of the code
is the lowest degree polynomial over GF (2). Let mi(x) be the
minimum polynomials of αi then generator polynomial G(x)
can be computed
G(x) = LCM [m1(x), m3(x), …., m2t(x)] (1)
In this work n=15, k=7 and t=2 is considered. Hence the
generator Polynomial with,, 2
,... 4
as the roots is obtained
by multiplying the following minimal polynomials:
m1(x) = 1+x +x4
m3(x) =1+x+x2
+x3
+x4
Substituting m1(x) and m3(x) in equation (1) generator
polynomial is obtained.
G(x) = LCM {m1(x), m3(x)}
G(x) = {(1+x +x4
) (1+x+x2
+x3
+x4
)}
G(x) =1+x4
+x6
+x7
+x8
(2)
To build BCH codes over GF (24
), we need to find out the
elements of GF (24
) generated by p(x) =1+x+x4 is given in
Table below.
Table-1: The elements of GF (24
) generated by p(x) =1+x+x4
.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 09 | Sep-2013, Available @ http://www.ijret.org 211
3.1 (15, 7) BCH ENCODER
The (15, 7) BCH Encoder is implemented with a Linear
Feedback Shift Register (LFSR). (15, 7) BCH codeword are
encoded as follows.
C(x) = x n-k
* M(x) + b(x) (3)
Where, Message bits M(x) = M0 + M1x +...+ Mk-1xk-1
Codeword C(x) is c0 + c1x +...+ cn-1xn-1
Remainder b(x) = b0 + b1x +...+ bm-1xm-1
also, ci, ji, bi are the
subsets of Galois field.
Figure 1 shows block diagram of (15, 7) BCH Encoder
module. The 7 message bits (M0, M1….M6) are applied to the
parallel to serial shift register. The output of parallel to serial
shift register will be sent to (15, 7) BCH Encoder module as
shown in figure. Using these message bits parity bits are
computed and sent to serial to parallel shift register. These
parity bits are appended to original message bits to obtain 15
bit encoded data. This entire encoding process requires 15
clock cycles.
Figure-1: Block diagram of (15,7) BCH Encoder
3.2 (15, 7) BCH Decoder
The Figure-2 shows the block diagram of (15, 7) BCH
decoder. The decoding algorithm for BCH codes consists of
three major steps.
 Calculate the syndrome value Si , i=1,2,….,2t from the
received word r(x).
 Determine the error location polynomial (x)
 Find the roots of (x)and then correct the errors
Figure-2: Block diagram for (15, 7) BCH Decoder.
The 15 bit received data is given as an input to the parallel to
serial shift register, the obtained serial output will be used as a
input to compute syndrome s(x) using the circuit as shown in
Figure-3. If s(x) = 0, the transmission is error free. Otherwise,
transmitted message will be in error. This entire process is
known as error detection process.
The error correction process includes Peterson and Zierler
algorithm, Chine‟s search algorithm. Peterson‟s algorithm
accepts syndrome s(x) as a input and computes error locator
polynomial σ(x). For finding the error locator polynomial
using the formula 1= S1,2 = (S3+S1
3
)* (S1
-1
). This
polynomial can be further used to find the location of the
errors. Using chine‟s search algorithm error location is
determined. This process includes searching the unique roots
of the error locator polynomial. The input for the chine‟s
search is σ(x) and it returns roots of error locator polynomial
which corresponds to the error positions.
Chine‟s search circuit for the double error correction (15, 7)
BCH code is shown in Figure-4. Using the error location
information, errors will be corrected by simply flipping
(converting 1 to 0 and 0 to 1) location in received 15 bit code
word. The corrected data will be converted in to ASCII
character. This decoding procedure will be repeated for other
received code words.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 09 | Sep-2013, Available @ http://www.ijret.org 212
Figure-3: Syndrome circuit for (15, 7) BCH Decoder
Figure-5: Chine‟s search circuit for the double error
correction (15, 7) BCH code
4. RESULTS AND DISCUSSION
In this section simulation and synthesis results of (15, 7) BCH
Encoder and Decoder is discussed. The system has been
simulated using Xilinx12.1 ISE simulator and functionality of
encoder and decoder is verified. Synthesis was carried out by
using the cadence RTL compiler and power and area is
estimated for 180nm technology.
4.1 Simulation Results of (15, 7) BCH Encoder and
Decoder
The Figure-6 shows simulation waveform of (15, 7) BCH
Encoder. Here “BENGALURU” is considered as a text
message. As seen in figure when the reset pin is high, the
input is loaded to Encoder and all other intermediate signals
are set to zero. When enable pin set to high and the reset pin to
low, ASCII character converted into 7 bit binary digits. Using
these binary digits the parity bits were calculated and these
parity bits are appended to the original message bits to obtain
a 15 bit encoded data or codeword. To indicate the Encoded
data in the output terminal hold pin is used. If hold pin is high
15 bit encoded data is obtained at the output port. The same
process repeats for other characters as well.
Figure-6: Simulation results for (15, 7) BCH Encoder
Figure-7 shows simulation waveform of (15, 7) BCH Decoder
with two bit errors. As seen in figure when the reset and load
pin is high, encoded data or received vector r(x) is loaded as
input to decoder and all other intermediate signals are set to
zero. In the decoding process initially, enable pin set to high
and the reset pin set to low. During this received 15 bit
encoded data is given as input for syndrome computation. If
no error in received code word syndrome output is zero. Else
syndrome output will not be zero. It indicates error present in
the 15 bit received data. Once error in two bits of 15 bit
codeword, it is detected and corrected using Peterson and
Zierler algorithm and Chine‟s search algorithm as discussed in
section 3. To indicate status of error in Message flag bit is
used. When the Flag pin is high, it indicates decoded data at
the output terminal and it remains low for next corrected data
available at the output terminal. This corrected data is
converted into an ASCII character. The same procedure is
repeated for other characters as well.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 09 | Sep-2013, Available @ http://www.ijret.org 213
Figure-7: Simulation results for (15, 7) BCH Decoder
4.2 Synthesis Results of (15, 7) BCH Encoder and
Decoder
The Figure-8 and Figure-9 shows RTL schematic of (15, 7)
BCH Encoder and Decoder generated by Cadence RTL
compiler. Table -2 shows power and area estimations of (15,
7) BCH Encoder for 180nm technology. Synthesis was
successfully carried out by using cadence RTL compiler.
Power and area is estimated for 180nm technology. The power
and area obtained for (15, 7) BCH Encoder are 151867.464
nw and 6961µm2
and for Decoder are 477932.501 nw and
14051 µm2
it is given in Table-2.
Figure-8: RTL schematic of (15, 7) BCH Encoder.
Figure -9: RTL schematic of (15,7) BCH Decoder
Table-2: Power and Area computations of (15,7) BCH
Encoder and Decoder for 180nm Technology
Name of the Module Power(nw) Area (µm2
)
Encoder 151867.464 6961
Decoder 477932.501 14051
5. CONCLUSIONS
The usage of error correcting codes is very important in a
modern communication system. In this paper implementation
of (15, 7) BCH Encoder and Decoder for text message is
discussed. Initially each character in a text message is
converted into binary data of 7 bits. This 7 bit is encoded into
15 bit codeword. If any 2 bit error in any position of 15 bit
codeword, it can be detected and corrected. This corrected
data is converted into an ASCII character. The decoder is
implemented using the Peterson and Zierler algorithm and
chine‟s search algorithm. Simulation was carried out by using
Xilinx 12.1 ISE simulator and verified results for an arbitrarily
chosen message data. Also design of both encoder and
decoder successfully implemented on Spartan 3E FPGA
hardware. Synthesis was successfully done by using the
cadence RTL compiler, power and area is estimated for
180nm technology. The power and area obtained for (15, 7)
BCH Encoder are 151867.464 nw and 6961µm2 and for
Decoder are 477932.501 nw and 14051 µm2.
REFERENCES
[1]. R.C.Bose and D.K. Ray-Chaudhuri, “On a class of error
correcting binary group codes”, Information and control, 3:
68-79, March 1960.
[2]. R. W. Hamming "Error Detection and Error Correction
Codes" Bell Systems Tech. Journal, vol 29, pp 147-160, April,
1950.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 09 | Sep-2013, Available @ http://www.ijret.org 214
[3]. Eltayeb S. Abuelyaman, Abdul-Aziz S. Al-Sehibani
“Optimization of the Hamming Code for Error Prone Media”,
IJCSNS International Journal of Computer Science and
Network Security, VOL.8 No.3, March 2008.
[4]. Thomas J. Richardson, M. Amin Shokrollahi, “Design of
Capacity-Approaching Irregular Low-Density Parity-Check
Codes”, IEEE transactions on information theory,Vol.47,No.2,
February 2001.
[3]. Amit Kumar Panda, “FPGA Implementation of Encoder
for (15, k) Binary BCH Code Using VHDL and Performance
Comparison for Multiple Error Correction Control”, 2012
International Conference on Communication Systems and
Network Technologies.
[4]. Warren J. Gross, Frank R. Kschischang, “Applications of
Algebraic Soft-Decision Decoding of Reed–Solomon Codes”,
IEEE transactions on communications, Vol. 54, No. 7, July
2006.
[5]. Claude Berrou, Alain Glavieeux, “Near optimum error
correcting coding and decoding Turbo codes”, IEEE
transactions on communications Vol.44, No.10, October 1996.
[6]. R.T. Chien, “Cyclic decoding procedure for Bose
Chaudhuri Hocquenghem Codes”, IEEE Trans. on
Information Theory, vol. IT-IO, pp. 357-363, October 1964.
[7]. Da-Chun Wu, AND Ming-Kao Hsu, “Authentication of
Binary Document Images Based on Embedding the BCH
Codes of Watermarks”, Asian Journal of Health and
Information Sciences, Vol. 1, No. 4, pp. 446-455, 2007.
[8]. Laurencin Mihai Ionesco, Constantin Anton, “Hardware
Implementation of BCH Error-Correcting Codes on a FPGA”,
International Journal of Intelligent Computing Research
(IJICR), Volume 1, Issue 3, June 2010.
[9]. P. Reviriego, C. Aggrades, J. A. Maestro, “Efficient error
detection in Double Error Correction BCH codes for memory
applications”, Microelectronics Reliability (2012) 1528–1530.
[10]. Mahadevaswamy V P, Sunitha S L, B N Shobha,
“Implementation of Fault Tolerant Method Using BCH Code
on FPGA”, International Journal of Soft Computing and
Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-4,
September 2012.
[11]. Zhen Wang, Mark Karpovsky, “Nonlinear Multi-Error
Correction Codes for Reliable MLC NAND Flash Memories”,
IEEE transactions on very large scale integration (VLSI)
systems, vo.20, no.7, pp.1221-1234, July 2012.
[12]. S.K Moschoyiannis,” Group theory and error
correcting/detecting codes” master of science in information
system, September 2001.
[13]. S. Lin, and D.J. Costello, Jr., “Error Control Coding”,
Prentice-Hall, New Jersey, 1983.
BIOGRAPHIES
ROHITH S received B.E. Degree in
Electronics and Communication Engineering
in 2006 and M.Tech degree in VLSI Design
and Embedded systems in 2008 from
Visvesvaraya Technological University,
Karnataka. He is also pursuing Ph.D Degree in Visvesvaraya
Technological University, Karnataka. Currently he is working
as a Asst. Professor in the Department of E&C, Nagarjuna
College of Engineering and Technology, Bangaluru, India.
His main area of interest includes Digital Watermarking,
Steganography, Error Control Coding, Cryptography and
VLSI Design.
PAVITHRA S was born in Mandya. I
received the B.E degree in ECE from VTU,
Belgaum, Karnataka, in 2010, and M.Tech in
VLSI Design and Embedded Systems from
VTU, Belgaum. Her area of research includes
VLSI Design, Error Control Coding.

Contenu connexe

Tendances

Information Theory - Introduction
Information Theory  -  IntroductionInformation Theory  -  Introduction
Information Theory - IntroductionBurdwan University
 
Shared Memory Centric Computing with CXL & OMI
Shared Memory Centric Computing with CXL & OMIShared Memory Centric Computing with CXL & OMI
Shared Memory Centric Computing with CXL & OMIAllan Cantle
 
8051 architecture
8051 architecture8051 architecture
8051 architecturesb108ec
 
DesignCon 2019 112-Gbps Electrical Interfaces: An OIF Update on CEI-112G
DesignCon 2019 112-Gbps Electrical Interfaces: An OIF Update on CEI-112GDesignCon 2019 112-Gbps Electrical Interfaces: An OIF Update on CEI-112G
DesignCon 2019 112-Gbps Electrical Interfaces: An OIF Update on CEI-112GLeah Wilkinson
 
Reed Soloman and convolution codes
Reed Soloman and convolution codesReed Soloman and convolution codes
Reed Soloman and convolution codesShailesh Tanwar
 
Error control coding using bose chaudhuri hocquenghem bch codes
Error control coding using bose chaudhuri hocquenghem bch codesError control coding using bose chaudhuri hocquenghem bch codes
Error control coding using bose chaudhuri hocquenghem bch codesIAEME Publication
 
OFDM based baseband Receiver
OFDM based baseband ReceiverOFDM based baseband Receiver
OFDM based baseband Receivernaveen sunnam
 
M-ary Modulation, noise modelling, bandwidth, Bandpass Modulation
M-ary Modulation, noise modelling, bandwidth, Bandpass ModulationM-ary Modulation, noise modelling, bandwidth, Bandpass Modulation
M-ary Modulation, noise modelling, bandwidth, Bandpass ModulationDrAimalKhan
 
Relationships Among EVM, BER and SNR + WiFi minimum SNR consideration
Relationships Among EVM, BER and SNR + WiFi minimum SNR considerationRelationships Among EVM, BER and SNR + WiFi minimum SNR consideration
Relationships Among EVM, BER and SNR + WiFi minimum SNR considerationPei-Che Chang
 
7 convolutional codes
7 convolutional codes7 convolutional codes
7 convolutional codesVarun Raj
 
Verification Strategy for PCI-Express
Verification Strategy for PCI-ExpressVerification Strategy for PCI-Express
Verification Strategy for PCI-ExpressDVClub
 

Tendances (20)

Understanding Reed-Solomon code
Understanding Reed-Solomon codeUnderstanding Reed-Solomon code
Understanding Reed-Solomon code
 
Information Theory - Introduction
Information Theory  -  IntroductionInformation Theory  -  Introduction
Information Theory - Introduction
 
Dft,fft,windowing
Dft,fft,windowingDft,fft,windowing
Dft,fft,windowing
 
serdes
serdesserdes
serdes
 
Bch codes
Bch codesBch codes
Bch codes
 
Reed solomon code
Reed solomon codeReed solomon code
Reed solomon code
 
Shared Memory Centric Computing with CXL & OMI
Shared Memory Centric Computing with CXL & OMIShared Memory Centric Computing with CXL & OMI
Shared Memory Centric Computing with CXL & OMI
 
8051 architecture
8051 architecture8051 architecture
8051 architecture
 
DesignCon 2019 112-Gbps Electrical Interfaces: An OIF Update on CEI-112G
DesignCon 2019 112-Gbps Electrical Interfaces: An OIF Update on CEI-112GDesignCon 2019 112-Gbps Electrical Interfaces: An OIF Update on CEI-112G
DesignCon 2019 112-Gbps Electrical Interfaces: An OIF Update on CEI-112G
 
What is 16 qam modulation
What is 16 qam modulationWhat is 16 qam modulation
What is 16 qam modulation
 
Reed Soloman and convolution codes
Reed Soloman and convolution codesReed Soloman and convolution codes
Reed Soloman and convolution codes
 
Source coding
Source coding Source coding
Source coding
 
Error control coding using bose chaudhuri hocquenghem bch codes
Error control coding using bose chaudhuri hocquenghem bch codesError control coding using bose chaudhuri hocquenghem bch codes
Error control coding using bose chaudhuri hocquenghem bch codes
 
OFDM based baseband Receiver
OFDM based baseband ReceiverOFDM based baseband Receiver
OFDM based baseband Receiver
 
Thinking about IP migration
Thinking about IP migration Thinking about IP migration
Thinking about IP migration
 
M-ary Modulation, noise modelling, bandwidth, Bandpass Modulation
M-ary Modulation, noise modelling, bandwidth, Bandpass ModulationM-ary Modulation, noise modelling, bandwidth, Bandpass Modulation
M-ary Modulation, noise modelling, bandwidth, Bandpass Modulation
 
Relationships Among EVM, BER and SNR + WiFi minimum SNR consideration
Relationships Among EVM, BER and SNR + WiFi minimum SNR considerationRelationships Among EVM, BER and SNR + WiFi minimum SNR consideration
Relationships Among EVM, BER and SNR + WiFi minimum SNR consideration
 
7 convolutional codes
7 convolutional codes7 convolutional codes
7 convolutional codes
 
Verification Strategy for PCI-Express
Verification Strategy for PCI-ExpressVerification Strategy for PCI-Express
Verification Strategy for PCI-Express
 
System on Chip (SoC)
System on Chip (SoC)System on Chip (SoC)
System on Chip (SoC)
 

Similaire à Fpga implementation of (15,7) bch encoder and decoder for text message

Design and Implementation of Encoder for (15, k) Binary BCH Code Using VHDL a...
Design and Implementation of Encoder for (15, k) Binary BCH Code Using VHDL a...Design and Implementation of Encoder for (15, k) Binary BCH Code Using VHDL a...
Design and Implementation of Encoder for (15, k) Binary BCH Code Using VHDL a...IOSR Journals
 
Design and implementation of log domain decoder
Design and implementation of log domain decoder Design and implementation of log domain decoder
Design and implementation of log domain decoder IJECEIAES
 
An Efficient Fault Tolerance System Design for Cmos/Nanodevice Digital Memories
An Efficient Fault Tolerance System Design for Cmos/Nanodevice Digital MemoriesAn Efficient Fault Tolerance System Design for Cmos/Nanodevice Digital Memories
An Efficient Fault Tolerance System Design for Cmos/Nanodevice Digital MemoriesIJERA Editor
 
Fpga implementation of linear ldpc encoder
Fpga implementation of linear ldpc encoderFpga implementation of linear ldpc encoder
Fpga implementation of linear ldpc encodereSAT Journals
 
Fpga implementation of linear ldpc encoder
Fpga implementation of linear ldpc encoderFpga implementation of linear ldpc encoder
Fpga implementation of linear ldpc encodereSAT Publishing House
 
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...eSAT Journals
 
Error control coding techniques
Error control coding techniquesError control coding techniques
Error control coding techniquesDhanashriNandre
 
IRJET-Error Detection and Correction using Turbo Codes
IRJET-Error Detection and Correction using Turbo CodesIRJET-Error Detection and Correction using Turbo Codes
IRJET-Error Detection and Correction using Turbo CodesIRJET Journal
 
IC Layout Design of 4-bit Magnitude Comparator using Electric VLSI Design System
IC Layout Design of 4-bit Magnitude Comparator using Electric VLSI Design SystemIC Layout Design of 4-bit Magnitude Comparator using Electric VLSI Design System
IC Layout Design of 4-bit Magnitude Comparator using Electric VLSI Design SystemIOSRJVSP
 
Design and implementation of single bit error correction linear block code sy...
Design and implementation of single bit error correction linear block code sy...Design and implementation of single bit error correction linear block code sy...
Design and implementation of single bit error correction linear block code sy...TELKOMNIKA JOURNAL
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
A Configurable and Low Power Hard-Decision Viterbi Decoder in VLSI Architecture
A Configurable and Low Power Hard-Decision Viterbi Decoder in VLSI ArchitectureA Configurable and Low Power Hard-Decision Viterbi Decoder in VLSI Architecture
A Configurable and Low Power Hard-Decision Viterbi Decoder in VLSI ArchitectureIRJET Journal
 
Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...
Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...
Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...VIT-AP University
 
A NOVEL APPROACH FOR LOWER POWER DESIGN IN TURBO CODING SYSTEM
A NOVEL APPROACH FOR LOWER POWER DESIGN IN TURBO CODING SYSTEMA NOVEL APPROACH FOR LOWER POWER DESIGN IN TURBO CODING SYSTEM
A NOVEL APPROACH FOR LOWER POWER DESIGN IN TURBO CODING SYSTEMVLSICS Design
 

Similaire à Fpga implementation of (15,7) bch encoder and decoder for text message (20)

Ijetcas14 378
Ijetcas14 378Ijetcas14 378
Ijetcas14 378
 
Design and Implementation of Encoder for (15, k) Binary BCH Code Using VHDL a...
Design and Implementation of Encoder for (15, k) Binary BCH Code Using VHDL a...Design and Implementation of Encoder for (15, k) Binary BCH Code Using VHDL a...
Design and Implementation of Encoder for (15, k) Binary BCH Code Using VHDL a...
 
Design and implementation of log domain decoder
Design and implementation of log domain decoder Design and implementation of log domain decoder
Design and implementation of log domain decoder
 
An Efficient Fault Tolerance System Design for Cmos/Nanodevice Digital Memories
An Efficient Fault Tolerance System Design for Cmos/Nanodevice Digital MemoriesAn Efficient Fault Tolerance System Design for Cmos/Nanodevice Digital Memories
An Efficient Fault Tolerance System Design for Cmos/Nanodevice Digital Memories
 
Fpga implementation of linear ldpc encoder
Fpga implementation of linear ldpc encoderFpga implementation of linear ldpc encoder
Fpga implementation of linear ldpc encoder
 
Fpga implementation of linear ldpc encoder
Fpga implementation of linear ldpc encoderFpga implementation of linear ldpc encoder
Fpga implementation of linear ldpc encoder
 
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
 
Turbo encoder and decoder chip design and FPGA device analysis for communicat...
Turbo encoder and decoder chip design and FPGA device analysis for communicat...Turbo encoder and decoder chip design and FPGA device analysis for communicat...
Turbo encoder and decoder chip design and FPGA device analysis for communicat...
 
10
1010
10
 
Error control coding techniques
Error control coding techniquesError control coding techniques
Error control coding techniques
 
IRJET-Error Detection and Correction using Turbo Codes
IRJET-Error Detection and Correction using Turbo CodesIRJET-Error Detection and Correction using Turbo Codes
IRJET-Error Detection and Correction using Turbo Codes
 
IC Layout Design of 4-bit Magnitude Comparator using Electric VLSI Design System
IC Layout Design of 4-bit Magnitude Comparator using Electric VLSI Design SystemIC Layout Design of 4-bit Magnitude Comparator using Electric VLSI Design System
IC Layout Design of 4-bit Magnitude Comparator using Electric VLSI Design System
 
Design and implementation of single bit error correction linear block code sy...
Design and implementation of single bit error correction linear block code sy...Design and implementation of single bit error correction linear block code sy...
Design and implementation of single bit error correction linear block code sy...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
D0151724
D0151724D0151724
D0151724
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
A Configurable and Low Power Hard-Decision Viterbi Decoder in VLSI Architecture
A Configurable and Low Power Hard-Decision Viterbi Decoder in VLSI ArchitectureA Configurable and Low Power Hard-Decision Viterbi Decoder in VLSI Architecture
A Configurable and Low Power Hard-Decision Viterbi Decoder in VLSI Architecture
 
Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...
Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...
Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...
 
K0216571
K0216571K0216571
K0216571
 
A NOVEL APPROACH FOR LOWER POWER DESIGN IN TURBO CODING SYSTEM
A NOVEL APPROACH FOR LOWER POWER DESIGN IN TURBO CODING SYSTEMA NOVEL APPROACH FOR LOWER POWER DESIGN IN TURBO CODING SYSTEM
A NOVEL APPROACH FOR LOWER POWER DESIGN IN TURBO CODING SYSTEM
 

Plus de eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case studyeSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementeSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteeSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabseSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
 

Plus de eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Dernier

Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitterShivangiSharma879191
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction managementMariconPadriquez1
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 

Dernier (20)

Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction management
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 

Fpga implementation of (15,7) bch encoder and decoder for text message

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 09 | Sep-2013, Available @ http://www.ijret.org 209 FPGA IMPLEMENTATION OF (15,7) BCH ENCODER AND DECODER FOR TEXT MESSAGE Rohith S1 , Pavithra S2 1 Assistant Professor, 2 PG Scholar, ECE, Nagarjuna college of engineering & Technology, Karnataka, India, rohithvjp2006@gmail.com, paviec01@gmail.com Abstract In a communication channel, noise and interferences are the two main sources of errors occur during the transmission of the message. Thus, to get the error free communication error control codes are used. This paper discusses, FPGA implementation of (15, 7) BCH Encoder and Decoder for text message using Verilog Hardware Description Language. Initially each character in a text message is converted into binary data of 7 bits. These 7 bits are encoded into 15 bit codeword using (15, 7) BCH encoder. If any 2 bit error in any position of 15 bit codeword, is detected and corrected. This corrected data is converted back into an ASCII character. The decoder is implemented using the Peterson algorithm and Chine’s search algorithm. Simulation was carried out by using Xilinx 12.1 ISE simulator, and verified results for an arbitrarily chosen message data. Synthesis was successfully done by using the RTL compiler, power and area is estimated for 180nm Technology. Finally both encoder and decoder design is implemented on Spartan 3E FPGA. Index Terms: BCH Encoder, BCH Decoder, FPGA, Verilog, Cadence RTL compiler. -----------------------------------------------------------------------***----------------------------------------------------------------------- 1. INTRODUCTION Rapid growth in internet and mobile technology, exchange of information is common practice. Information may be text, audio, video etc form. Transmission of information through a physical medium or wireless medium, possibility that data get corrupted this leads to an error in a random only selected locations of a symbol or the entire symbol. To have a reliable communication through a communication channel that has an acceptable Bit Error Rate (BER) and High Signal to Noise Ratio (SNR) error correcting codes are used. These codes are introduced in order to detect and correct a specified number of errors which may occur during transmission of message over a communication channel [1]-[4]. There are different types of Error correction codes are used in present digital communication system based on the type of channel noise. Few of them are Hamming code [3], Low Density Parity Check code (LDPC) [4], Bose-Chaudhuri Hocquenghem code (BCH) [5], Reed Solomon code [6], and Turbo code [7]. These codes are different from each other in their complexity and implementation. BCH codes are widely used in the areas like, mobile communication, digital communications, satellite communications, optical and magnetic storage systems, and computer networks etc. In this work (15, 7) BCH encoder and decoder is implemented on Sparten3E FPGA. For designing the BCH codes, two coding techniques are used. They are Systematic codes and Non systematic codes. In case of systematic codes original message d(x) is as it is in the encoded word c(x). Where as in case of non-systematic code encoded word c(x) is obtained by multiplying message d(x) with generator polynomial G(x). Hence message data will not be same in the encoded code word. At the transmitter side using encoder circuit binary digits are encoded by appending some extra bits with message bits also known as parity bits. The parity bits and message bits together called as „Codeword. At the Receiver end codeword will be received and error detection and correction process is applied. This process is known as decoding. If error presents in received data within a correction limits, the error will be corrected and original message is retrieved. This improves the quality of transmitted message to great extent and hence reduction in error rate. The rest of this paper is organized as follows. Related work is discussed in section 2. (15, 7) BCH Encoder and Decoder are discussed section 3. In section 4 Simulation and synthesis results are discussed. Finally conclusion remarks are given in section 5. 2. RELATED WORK Cyclic decoding procedures for error corrections in BCH code was discussed in [8]. They implemented binary BCH codes for 5 bit error correction with a length of 127 bits using Peterson decoding procedure. Author shown that burst error correcting codes are less speed and more complex in hardware compared to BCH codes Application of BCH codes in authentication of binary document images is discussed in [9]. They used (7, 4) BCH encoder for encoding of a character and embedded in a binary document image, each 4 bit in a character is encoded to a 7 bit. They used BCH codes to correct one bit error in any position of 7 bit data. Implementation of (7, 4) BCH encoder to correct single error
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 09 | Sep-2013, Available @ http://www.ijret.org 210 in any position of 7 bits is discussed in [10]. The circuit design and simulation was carried out using Orcad version 9.1 and implemented on FPGA (Xilinx xc4013). In [11] application of BCH code for error detection and correction in memory is presented. They compared both single error correction and double error correction BCH codes using 180nm technology. The synthesis and simulations were carried out using Synopsys Design Compiler, power consumption and area of the circuit was summarized for different (n, k) BCH code cases. The result shows that power consumption and area required was less compared to single error correction. Application of BCH codes in fault tolerant method is given in [12]. They designed a 32 bit ALU, which is secure against many faults and able to correct any 5 bit faults in any positions of 32 bits input registers of ALU. The BCH codes were used to correct multiple errors. Author shown that compared to TMR (triple modular redundancy) & Residue code, BCH codes were the better choice in estimated area. Non linear multi error correcting codes in the reliable MLC NAND flash memories using BCH and RS codes is discussed in [13]. The encoder and decoder architectures for non linear 5 bit error corrections in flash memories can be modeled in Verilog and synthesized in RTL design compiler. Proposed work discusses, FPGA implementation of (15, 7) Binary BCH Encoder and Decoder for text message using Verilog HDL. This work aim to correct double error in any position of 15 bit codeword. Initially each character in a text message is converted into binary data of 7 bits. This 7 bit is encoded into 15 bit codeword. Using (15, 7) BCH Encoder if any 2 bit error in a 15 bit codeword, it will detected and corrected. The corrected data is converted into an ASCII character. The decoder is implemented using the Peterson and Zierler algorithm and chine‟s search algorithm. Simulation was carried out by using Xilinx 12.1 ISE simulator, and verified the results for an arbitrarily chosen message data. Synthesis was successfully carried out using the Cadence RTL compiler, power and area is estimated for 180nm Technology. 3. BCH CODE BCH codes can be defined by two parameters that are code size n and the number of errors to be corrected t Block length: n = 2m - 1 Number of information bits: k ≥ n-m*t Minimum distance: dmin≥2t + 1. The generator polynomial of the code is specified in terms of its roots over the Galois field GF (2m ). Let α be a primitive element in GF (2m ).The generator polynomial g(x) of the code is the lowest degree polynomial over GF (2). Let mi(x) be the minimum polynomials of αi then generator polynomial G(x) can be computed G(x) = LCM [m1(x), m3(x), …., m2t(x)] (1) In this work n=15, k=7 and t=2 is considered. Hence the generator Polynomial with,, 2 ,... 4 as the roots is obtained by multiplying the following minimal polynomials: m1(x) = 1+x +x4 m3(x) =1+x+x2 +x3 +x4 Substituting m1(x) and m3(x) in equation (1) generator polynomial is obtained. G(x) = LCM {m1(x), m3(x)} G(x) = {(1+x +x4 ) (1+x+x2 +x3 +x4 )} G(x) =1+x4 +x6 +x7 +x8 (2) To build BCH codes over GF (24 ), we need to find out the elements of GF (24 ) generated by p(x) =1+x+x4 is given in Table below. Table-1: The elements of GF (24 ) generated by p(x) =1+x+x4 .
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 09 | Sep-2013, Available @ http://www.ijret.org 211 3.1 (15, 7) BCH ENCODER The (15, 7) BCH Encoder is implemented with a Linear Feedback Shift Register (LFSR). (15, 7) BCH codeword are encoded as follows. C(x) = x n-k * M(x) + b(x) (3) Where, Message bits M(x) = M0 + M1x +...+ Mk-1xk-1 Codeword C(x) is c0 + c1x +...+ cn-1xn-1 Remainder b(x) = b0 + b1x +...+ bm-1xm-1 also, ci, ji, bi are the subsets of Galois field. Figure 1 shows block diagram of (15, 7) BCH Encoder module. The 7 message bits (M0, M1….M6) are applied to the parallel to serial shift register. The output of parallel to serial shift register will be sent to (15, 7) BCH Encoder module as shown in figure. Using these message bits parity bits are computed and sent to serial to parallel shift register. These parity bits are appended to original message bits to obtain 15 bit encoded data. This entire encoding process requires 15 clock cycles. Figure-1: Block diagram of (15,7) BCH Encoder 3.2 (15, 7) BCH Decoder The Figure-2 shows the block diagram of (15, 7) BCH decoder. The decoding algorithm for BCH codes consists of three major steps.  Calculate the syndrome value Si , i=1,2,….,2t from the received word r(x).  Determine the error location polynomial (x)  Find the roots of (x)and then correct the errors Figure-2: Block diagram for (15, 7) BCH Decoder. The 15 bit received data is given as an input to the parallel to serial shift register, the obtained serial output will be used as a input to compute syndrome s(x) using the circuit as shown in Figure-3. If s(x) = 0, the transmission is error free. Otherwise, transmitted message will be in error. This entire process is known as error detection process. The error correction process includes Peterson and Zierler algorithm, Chine‟s search algorithm. Peterson‟s algorithm accepts syndrome s(x) as a input and computes error locator polynomial σ(x). For finding the error locator polynomial using the formula 1= S1,2 = (S3+S1 3 )* (S1 -1 ). This polynomial can be further used to find the location of the errors. Using chine‟s search algorithm error location is determined. This process includes searching the unique roots of the error locator polynomial. The input for the chine‟s search is σ(x) and it returns roots of error locator polynomial which corresponds to the error positions. Chine‟s search circuit for the double error correction (15, 7) BCH code is shown in Figure-4. Using the error location information, errors will be corrected by simply flipping (converting 1 to 0 and 0 to 1) location in received 15 bit code word. The corrected data will be converted in to ASCII character. This decoding procedure will be repeated for other received code words.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 09 | Sep-2013, Available @ http://www.ijret.org 212 Figure-3: Syndrome circuit for (15, 7) BCH Decoder Figure-5: Chine‟s search circuit for the double error correction (15, 7) BCH code 4. RESULTS AND DISCUSSION In this section simulation and synthesis results of (15, 7) BCH Encoder and Decoder is discussed. The system has been simulated using Xilinx12.1 ISE simulator and functionality of encoder and decoder is verified. Synthesis was carried out by using the cadence RTL compiler and power and area is estimated for 180nm technology. 4.1 Simulation Results of (15, 7) BCH Encoder and Decoder The Figure-6 shows simulation waveform of (15, 7) BCH Encoder. Here “BENGALURU” is considered as a text message. As seen in figure when the reset pin is high, the input is loaded to Encoder and all other intermediate signals are set to zero. When enable pin set to high and the reset pin to low, ASCII character converted into 7 bit binary digits. Using these binary digits the parity bits were calculated and these parity bits are appended to the original message bits to obtain a 15 bit encoded data or codeword. To indicate the Encoded data in the output terminal hold pin is used. If hold pin is high 15 bit encoded data is obtained at the output port. The same process repeats for other characters as well. Figure-6: Simulation results for (15, 7) BCH Encoder Figure-7 shows simulation waveform of (15, 7) BCH Decoder with two bit errors. As seen in figure when the reset and load pin is high, encoded data or received vector r(x) is loaded as input to decoder and all other intermediate signals are set to zero. In the decoding process initially, enable pin set to high and the reset pin set to low. During this received 15 bit encoded data is given as input for syndrome computation. If no error in received code word syndrome output is zero. Else syndrome output will not be zero. It indicates error present in the 15 bit received data. Once error in two bits of 15 bit codeword, it is detected and corrected using Peterson and Zierler algorithm and Chine‟s search algorithm as discussed in section 3. To indicate status of error in Message flag bit is used. When the Flag pin is high, it indicates decoded data at the output terminal and it remains low for next corrected data available at the output terminal. This corrected data is converted into an ASCII character. The same procedure is repeated for other characters as well.
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 09 | Sep-2013, Available @ http://www.ijret.org 213 Figure-7: Simulation results for (15, 7) BCH Decoder 4.2 Synthesis Results of (15, 7) BCH Encoder and Decoder The Figure-8 and Figure-9 shows RTL schematic of (15, 7) BCH Encoder and Decoder generated by Cadence RTL compiler. Table -2 shows power and area estimations of (15, 7) BCH Encoder for 180nm technology. Synthesis was successfully carried out by using cadence RTL compiler. Power and area is estimated for 180nm technology. The power and area obtained for (15, 7) BCH Encoder are 151867.464 nw and 6961µm2 and for Decoder are 477932.501 nw and 14051 µm2 it is given in Table-2. Figure-8: RTL schematic of (15, 7) BCH Encoder. Figure -9: RTL schematic of (15,7) BCH Decoder Table-2: Power and Area computations of (15,7) BCH Encoder and Decoder for 180nm Technology Name of the Module Power(nw) Area (µm2 ) Encoder 151867.464 6961 Decoder 477932.501 14051 5. CONCLUSIONS The usage of error correcting codes is very important in a modern communication system. In this paper implementation of (15, 7) BCH Encoder and Decoder for text message is discussed. Initially each character in a text message is converted into binary data of 7 bits. This 7 bit is encoded into 15 bit codeword. If any 2 bit error in any position of 15 bit codeword, it can be detected and corrected. This corrected data is converted into an ASCII character. The decoder is implemented using the Peterson and Zierler algorithm and chine‟s search algorithm. Simulation was carried out by using Xilinx 12.1 ISE simulator and verified results for an arbitrarily chosen message data. Also design of both encoder and decoder successfully implemented on Spartan 3E FPGA hardware. Synthesis was successfully done by using the cadence RTL compiler, power and area is estimated for 180nm technology. The power and area obtained for (15, 7) BCH Encoder are 151867.464 nw and 6961µm2 and for Decoder are 477932.501 nw and 14051 µm2. REFERENCES [1]. R.C.Bose and D.K. Ray-Chaudhuri, “On a class of error correcting binary group codes”, Information and control, 3: 68-79, March 1960. [2]. R. W. Hamming "Error Detection and Error Correction Codes" Bell Systems Tech. Journal, vol 29, pp 147-160, April, 1950.
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 09 | Sep-2013, Available @ http://www.ijret.org 214 [3]. Eltayeb S. Abuelyaman, Abdul-Aziz S. Al-Sehibani “Optimization of the Hamming Code for Error Prone Media”, IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.3, March 2008. [4]. Thomas J. Richardson, M. Amin Shokrollahi, “Design of Capacity-Approaching Irregular Low-Density Parity-Check Codes”, IEEE transactions on information theory,Vol.47,No.2, February 2001. [3]. Amit Kumar Panda, “FPGA Implementation of Encoder for (15, k) Binary BCH Code Using VHDL and Performance Comparison for Multiple Error Correction Control”, 2012 International Conference on Communication Systems and Network Technologies. [4]. Warren J. Gross, Frank R. Kschischang, “Applications of Algebraic Soft-Decision Decoding of Reed–Solomon Codes”, IEEE transactions on communications, Vol. 54, No. 7, July 2006. [5]. Claude Berrou, Alain Glavieeux, “Near optimum error correcting coding and decoding Turbo codes”, IEEE transactions on communications Vol.44, No.10, October 1996. [6]. R.T. Chien, “Cyclic decoding procedure for Bose Chaudhuri Hocquenghem Codes”, IEEE Trans. on Information Theory, vol. IT-IO, pp. 357-363, October 1964. [7]. Da-Chun Wu, AND Ming-Kao Hsu, “Authentication of Binary Document Images Based on Embedding the BCH Codes of Watermarks”, Asian Journal of Health and Information Sciences, Vol. 1, No. 4, pp. 446-455, 2007. [8]. Laurencin Mihai Ionesco, Constantin Anton, “Hardware Implementation of BCH Error-Correcting Codes on a FPGA”, International Journal of Intelligent Computing Research (IJICR), Volume 1, Issue 3, June 2010. [9]. P. Reviriego, C. Aggrades, J. A. Maestro, “Efficient error detection in Double Error Correction BCH codes for memory applications”, Microelectronics Reliability (2012) 1528–1530. [10]. Mahadevaswamy V P, Sunitha S L, B N Shobha, “Implementation of Fault Tolerant Method Using BCH Code on FPGA”, International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-4, September 2012. [11]. Zhen Wang, Mark Karpovsky, “Nonlinear Multi-Error Correction Codes for Reliable MLC NAND Flash Memories”, IEEE transactions on very large scale integration (VLSI) systems, vo.20, no.7, pp.1221-1234, July 2012. [12]. S.K Moschoyiannis,” Group theory and error correcting/detecting codes” master of science in information system, September 2001. [13]. S. Lin, and D.J. Costello, Jr., “Error Control Coding”, Prentice-Hall, New Jersey, 1983. BIOGRAPHIES ROHITH S received B.E. Degree in Electronics and Communication Engineering in 2006 and M.Tech degree in VLSI Design and Embedded systems in 2008 from Visvesvaraya Technological University, Karnataka. He is also pursuing Ph.D Degree in Visvesvaraya Technological University, Karnataka. Currently he is working as a Asst. Professor in the Department of E&C, Nagarjuna College of Engineering and Technology, Bangaluru, India. His main area of interest includes Digital Watermarking, Steganography, Error Control Coding, Cryptography and VLSI Design. PAVITHRA S was born in Mandya. I received the B.E degree in ECE from VTU, Belgaum, Karnataka, in 2010, and M.Tech in VLSI Design and Embedded Systems from VTU, Belgaum. Her area of research includes VLSI Design, Error Control Coding.