25,007 research outputs found

    Wakes from arrays of buildings

    Get PDF
    Experiments were carried out in a small wind tunnel in which atmospheric flow around buildings was simulated. Arrays of one, two, three, and four model buildings were tested, and wake profiles of velocity and turbulence were measured. The data indicate the effect of the buildings on the wind environment encountered by aircraft during landing or takeoff operations. It was possible to use the results to locate the boundaries of the air regions affected by the obstacles and to recommend preferred arrangements of buildings to maximize light safety

    Probability of undetected error after decoding for a concatenated coding scheme

    Get PDF
    A concatenated coding scheme for error control in data communications is analyzed. In this scheme, the inner code is used for both error correction and detection, however the outer code is used only for error detection. A retransmission is requested if the outer code detects the presence of errors after the inner code decoding. Probability of undetected error is derived and bounded. A particular example, proposed for NASA telecommand system is analyzed

    The undetected error probability for shortened hamming codes

    Get PDF
    Hamming or shortened Hamming codes are widely used for error detection in data communications. For example, the CCITT (International Telegraph and Telephone Consultative Committee) recommendation X.25 for packet-switched data networks adopts a distance-4 cyclic Hamming code with 16 parity-check bits for error detection. The natural length of this code is n = 2(15)-1 = 32,767. In practice the length of a data packet is no more than a few thousand bits which is much shorter than the natural length of the code. Consequently, a shortened version of thecode is used. Often the length of a data packet varies, say from a few hundred bits to a few thousand bits, hence the code must be shortened by various degrees. Shortening affects the performance of the code. The error-detection performance of shortened Hamming codes, particularly the codes obtained from the distance-4 Hamming codes adopted by CCITT recommendation X.25, is investigated. A method for computing the probability of an undetected error is presented

    BCH codes for large IC random-access memory systems

    Get PDF
    In this report some shortened BCH codes for possible applications to large IC random-access memory systems are presented. These codes are given by their parity-check matrices. Encoding and decoding of these codes are discussed

    Wind tunnel measurements of three-dimensional wakes of buildings

    Get PDF
    Measurements relevant to the effect of buildings on the low level atmospheric boundary layer are presented. A wind tunnel experiment was undertaken to determine the nature of the flow downstream from a gap between two transversely aligned, equal sized models of rectangular cross section. These building models were immersed in an equilibrium turbulent boundary layer which was developed on a smooth floor in a zero longitudinal pressure gradient. Measurements with an inclined (45 degree) hot-wire were made at key positions downstream of models arranged with a large, small, and no gap between them. Hot-wire theory is presented which enables computation of the three mean velocity components, U, V and W, as well as Reynolds stresses. These measurements permit understanding of the character of the wake downstream of laterally spaced buildings. Surface streamline patterns obtained by the oil film method were used to delineate the separation region to the rear of the buildings for a variety of spacings

    Performance analysis of the word synchronization properties of the outer code in a TDRSS decoder

    Get PDF
    A self-synchronizing coding scheme for NASA's TDRSS satellite system is a concatenation of a (2,1,7) inner convolutional code with a (255,223) Reed-Solomon outer code. Both symbol and word synchronization are achieved without requiring that any additional symbols be transmitted. An important parameter which determines the performance of the word sync procedure is the ratio of the decoding failure probability to the undetected error probability. Ideally, the former should be as small as possible compared to the latter when the error correcting capability of the code is exceeded. A computer simulation of a (255,223) Reed-Solomon code as carried out. Results for decoding failure probability and for undetected error probability are tabulated and compared

    Fast decoding techniques for extended single-and-double-error-correcting Reed Solomon codes

    Get PDF
    A problem in designing semiconductor memories is to provide some measure of error control without requiring excessive coding overhead or decoding time. For example, some 256K-bit dynamic random access memories are organized as 32K x 8 bit-bytes. Byte-oriented codes such as Reed Solomon (RS) codes provide efficient low overhead error control for such memories. However, the standard iterative algorithm for decoding RS codes is too slow for these applications. Some special high speed decoding techniques for extended single and double error correcting RS codes. These techniques are designed to find the error locations and the error values directly from the syndrome without having to form the error locator polynomial and solve for its roots

    Permanence analysis of a concatenated coding scheme for error control

    Get PDF
    A concatenated coding scheme for error control in data communications is analyzed. In this scheme, the inner code is used for both error correction and detection, however, the outer code is used only for error detection. A retransmission is requested if the outer code detects the presence of errors after the inner code decoding. Probability of undetected error is derived and bounded. A particular example, proposed for the planetary program, is analyzed

    Automatic-repeat-request error control schemes

    Get PDF
    Error detection incorporated with automatic-repeat-request (ARQ) is widely used for error control in data communication systems. This method of error control is simple and provides high system reliability. If a properly chosen code is used for error detection, virtually error-free data transmission can be attained. Various types of ARQ and hybrid ARQ schemes, and error detection using linear block codes are surveyed

    Reed Solomon codes for error control in byte organized computer memory systems

    Get PDF
    A problem in designing semiconductor memories is to provide some measure of error control without requiring excessive coding overhead or decoding time. In LSI and VLSI technology, memories are often organized on a multiple bit (or byte) per chip basis. For example, some 256K-bit DRAM's are organized in 32Kx8 bit-bytes. Byte oriented codes such as Reed Solomon (RS) codes can provide efficient low overhead error control for such memories. However, the standard iterative algorithm for decoding RS codes is too slow for these applications. Some special decoding techniques for extended single-and-double-error-correcting RS codes which are capable of high speed operation are presented. These techniques are designed to find the error locations and the error values directly from the syndrome without having to use the iterative algorithm to find the error locator polynomial
    corecore