9,066 research outputs found

    Probability of undetected error after decoding for a concatenated coding scheme

    Get PDF
    A concatenated coding scheme for error control in data communications is analyzed. In this scheme, the inner code is used for both error correction and detection, however the outer code is used only for error detection. A retransmission is requested if the outer code detects the presence of errors after the inner code decoding. Probability of undetected error is derived and bounded. A particular example, proposed for NASA telecommand system is analyzed

    The undetected error probability for shortened hamming codes

    Get PDF
    Hamming or shortened Hamming codes are widely used for error detection in data communications. For example, the CCITT (International Telegraph and Telephone Consultative Committee) recommendation X.25 for packet-switched data networks adopts a distance-4 cyclic Hamming code with 16 parity-check bits for error detection. The natural length of this code is n = 2(15)-1 = 32,767. In practice the length of a data packet is no more than a few thousand bits which is much shorter than the natural length of the code. Consequently, a shortened version of thecode is used. Often the length of a data packet varies, say from a few hundred bits to a few thousand bits, hence the code must be shortened by various degrees. Shortening affects the performance of the code. The error-detection performance of shortened Hamming codes, particularly the codes obtained from the distance-4 Hamming codes adopted by CCITT recommendation X.25, is investigated. A method for computing the probability of an undetected error is presented

    BCH codes for large IC random-access memory systems

    Get PDF
    In this report some shortened BCH codes for possible applications to large IC random-access memory systems are presented. These codes are given by their parity-check matrices. Encoding and decoding of these codes are discussed

    Performance analysis of the word synchronization properties of the outer code in a TDRSS decoder

    Get PDF
    A self-synchronizing coding scheme for NASA's TDRSS satellite system is a concatenation of a (2,1,7) inner convolutional code with a (255,223) Reed-Solomon outer code. Both symbol and word synchronization are achieved without requiring that any additional symbols be transmitted. An important parameter which determines the performance of the word sync procedure is the ratio of the decoding failure probability to the undetected error probability. Ideally, the former should be as small as possible compared to the latter when the error correcting capability of the code is exceeded. A computer simulation of a (255,223) Reed-Solomon code as carried out. Results for decoding failure probability and for undetected error probability are tabulated and compared

    A bandwidth efficient coding scheme for the Hubble Space Telescope

    Get PDF
    As a demonstration of the performance capabilities of trellis codes using multidimensional signal sets, a Viterbi decoder was designed. The choice of code was based on two factors. The first factor was its application as a possible replacement for the coding scheme currently used on the Hubble Space Telescope (HST). The HST at present uses the rate 1/3 nu = 6 (with 2 (exp nu) = 64 states) convolutional code with Binary Phase Shift Keying (BPSK) modulation. With the modulator restricted to a 3 Msym/s, this implies a data rate of only 1 Mbit/s, since the bandwidth efficiency K = 1/3 bit/sym. This is a very bandwidth inefficient scheme, although the system has the advantage of simplicity and large coding gain. The basic requirement from NASA was for a scheme that has as large a K as possible. Since a satellite channel was being used, 8PSK modulation was selected. This allows a K of between 2 and 3 bit/sym. The next influencing factor was INTELSAT's intention of transmitting the SONET 155.52 Mbit/s standard data rate over the 72 MHz transponders on its satellites. This requires a bandwidth efficiency of around 2.5 bit/sym. A Reed-Solomon block code is used as an outer code to give very low bit error rates (BER). A 16 state rate 5/6, 2.5 bit/sym, 4D-8PSK trellis code was selected. This code has reasonable complexity and has a coding gain of 4.8 dB compared to uncoded 8PSK (2). This trellis code also has the advantage that it is 45 deg rotationally invariant. This means that the decoder needs only to synchronize to one of the two naturally mapped 8PSK signals in the signal set

    Identifying safety strategies for on-farm grain bins using risk analysis

    Get PDF
    The potential for grain bin accidents exists each year on Arkansas farms and farms across the nation. The trend toward increasing utilization of on-farm grain drying and storage could lead to an increase in grain bin accidents. The sharp contrast between a safe, efficient operation and one that leads to injury or death can be represented as sets of farmer-decisions and subsequent chance events. A model was constructed to define the risk associated with grain bin entry and inbin activity so that safety interventions could be identified and implemented to reduce the probability of injury and death. A survey was distributed to Arkansas grain farmers to gather data on the level of safety education, storage techniques, operations management, and other parameters. The data collected from the survey provided quantitative input of many of the model’s probability-distribution functions. Using a fault tree (with parallel modes of failure) in conjunction with a Monte Carlo simulation technique, we evaluated six safety intervention strategies and identified the one with the greatest potential for reducing the risk of serous injury or death. As part of senior design in biological engineering, plans are underway to design and test a probe that can locate and break bridged grain (a common risk factor in grain bin management) while working outside the bin on the ground

    Fast decoding techniques for extended single-and-double-error-correcting Reed Solomon codes

    Get PDF
    A problem in designing semiconductor memories is to provide some measure of error control without requiring excessive coding overhead or decoding time. For example, some 256K-bit dynamic random access memories are organized as 32K x 8 bit-bytes. Byte-oriented codes such as Reed Solomon (RS) codes provide efficient low overhead error control for such memories. However, the standard iterative algorithm for decoding RS codes is too slow for these applications. Some special high speed decoding techniques for extended single and double error correcting RS codes. These techniques are designed to find the error locations and the error values directly from the syndrome without having to form the error locator polynomial and solve for its roots

    Permanence analysis of a concatenated coding scheme for error control

    Get PDF
    A concatenated coding scheme for error control in data communications is analyzed. In this scheme, the inner code is used for both error correction and detection, however, the outer code is used only for error detection. A retransmission is requested if the outer code detects the presence of errors after the inner code decoding. Probability of undetected error is derived and bounded. A particular example, proposed for the planetary program, is analyzed

    Automatic-repeat-request error control schemes

    Get PDF
    Error detection incorporated with automatic-repeat-request (ARQ) is widely used for error control in data communication systems. This method of error control is simple and provides high system reliability. If a properly chosen code is used for error detection, virtually error-free data transmission can be attained. Various types of ARQ and hybrid ARQ schemes, and error detection using linear block codes are surveyed

    Coevolving through disrupted discussions on critical thinking, human rights and empathy

    Get PDF
    This chapter considers how teaching and learning cross culturally inevitably disrupts or interrupts and disturbs teachers 'and students' assumptions. Such educational confrontation can produce mind-opening opportunities or mind-numbing fear that can preclude learning. The teachers challenge is to find a balance between harnessing disruption as an impetus for learning and creating a safe environment for constructive learning exchanges. Six stories illustrate some of the frustration, confusion, and insight that can arise from mis-interpretation, acontextual teaching, and pedagogical assumptions. The author discusses personal and pedagogical discoveries that emerged during an international social work education program with refugee teachers, health, and community workers from Burma living in exile on the Thailand Burma border (the border).Tensions between East and Western philosophies and methods of teaching called for processes to indigenize the Australian model of social work to the local cultures. The resulting exchanges of knowledge laid the ground for knowledge and cultural exchanges in interactive, unexpected educational processes
    • …
    corecore