2020
DOI: 10.1109/tvlsi.2020.2998364
|View full text |Cite
|
Sign up to set email alerts
|

Integer Codes Correcting Double Errors and Triple-Adjacent Errors Within a Byte

Abstract: This paper presents a class of integer codes that are suitable for use in optical computer networks where the data is transmitted serially. The presented codes are constructed with the help of a computer and have three desirable properties. First, they use integer and lookup table operations, which makes them suitable for software implementation. Second, depending on the application requirements, the proposed codes can be used as lower rate error correction (EC) codes or as high-rate error detection (ED) codes… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8

Relationship

3
5

Authors

Journals

citations
Cited by 13 publications
(14 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…The error control procedure for the proposed codes is very similar to that from [9][10][11][12][13]. In short, after receiving corrupted packet (S ≠ 0), the decoder will look up the syndrome table (ST) to find the entry with the error correction data (Figure 2).…”
Section: Error Control Proceduresmentioning
confidence: 99%
See 2 more Smart Citations
“…The error control procedure for the proposed codes is very similar to that from [9][10][11][12][13]. In short, after receiving corrupted packet (S ≠ 0), the decoder will look up the syndrome table (ST) to find the entry with the error correction data (Figure 2).…”
Section: Error Control Proceduresmentioning
confidence: 99%
“…Definition [13] Let Z2b1${Z}_{{2}^b - 1}$ = {0, 1,…, 2 b ‒ 2} be the ring of integers modulo 2 b ‒ 1 and let Bi0.16em=n=0b1an·2n$\smash{{B}_i\, = \sum\nolimits_{n = \mathop 0\limits }^{b - 1} {{a}_n \cdot {{\mathop {\mathop 2\limits }\limits }}^n}} $ be the integer representation of a b ‐bit byte, where an${a}_n \in $ {0, 1} and 1 ≤ i ≤ k . Then, the code defined as C ( b, k, c ), Cfalse(b,0.16emk,0.16emcfalse)=xZ2b1k+1:i=1kCi·BiBk+1false(mod0.16em2bgoodbreak−1false)-0.16em$$\begin{eqnarray} \hskip-10pt C(b,\, k,\, c) = \left\{ {x \in Z_{{2}^b - 1}^{k + 1}{:}\sum_{\,i = 1}^{\,k} {{C}_i \cdot {B}_{i}} \equiv {B}_{k{+ 1}}({\rm mod}\,{2}^b - {1})}\!\right\} \end{eqnarray}$$is an ( kb + b, kb ) integer code, where x = ( B 1 , B 2 , …, B k , B k +1 ) Z2b1k+1$ \in Z_{{2}^b - 1}^{k + 1}$ is the codeword vector, c = ( C 1 , C 2 , … , C k , 1) Z2b1k+1$ \in Z_{{2}^b - 1}^{k + 1}$ is the coefficient vector and B k +1 Z2b1$ \in Z_{{2}^b - 1}$ is an integer. Definition [13] Let x = ( B 1 , B 2...…”
Section: Codes Constructionmentioning
confidence: 99%
See 1 more Smart Citation
“…The first step in constructing any integer code is to define the integer values of the errors to be corrected. In our case, this step is simplified, since from [23] we already know that the integer value of a single error is equal to e i = ± 2 r , where 0 ≤ r ≤ b ‒ 1 and 1 ≤ i ≤ k + 1. When it comes to DA errors, we know that they can corrupt one or two b ‐bit bytes.…”
Section: Codes Constructionmentioning
confidence: 99%
“…But the promising future of electronics at nanoscale allows the devices get closer where the devices undergo radiation effects giving rise to multiple event upsets that induce soft errors in memories [20]- [23]. For embedded memories, the correction capability must be as high as possible within a single clock cycle to ensure at-speed testing [24]- [28]. This paper addresses the correction of maximum number of erroneous bits as fast as possible by using minimum number of redundant bits and maximum code rate.…”
Section: Introductionmentioning
confidence: 99%