نتایج جستجو برای: error identification techniques
تعداد نتایج: 1229110 فیلتر نتایج به سال:
This paper is an introduction to the subject of error-control coding. Undesirable disturbances like noise, EMI, crosstalk can occur across the communication channel, causing the received information to be different from the original information sent. So to remove this we need some methods to detect as well as correct errors. This paper presents in a tutorial form a survey of the old and recent,...
“Side channel” attacks (SCA) pose a serious threat on many cryptographic devices and are shown to be effective on many existing security algorithms which are in the black box model considered to be secure. These attacks are based on the key idea of recovering secret information using implementation specific side-channels. Especially active fault injection attacks are very effective in terms of ...
This paper describes a mechanism for identifying errors made by a student during a computer-aided language learning dialogue. The mechanism generates a set of ‘perturbations’ of the student’s original typed utterance, each of which embodies a hypothesis about an error made by the student. Perturbations are then passed through the system’s ordinary utterance interpretation pipeline, along with t...
Compressed video bitstreams are intended for real-time transmission over communication networks. Most of the video coding standards employ the temporal and spatial prediction structure to reduce the transmitted video data. Therefore, the coded video bitstreams are highly sensitive to information loss and channel errors. Even a single bit error can lead to disastrous quality degradation in both ...
This technical report contains the text of Subhasish Mitra’s PhD thesis “Diversity Techniques for Concurrent Error Detection.” Funding: This research was supported by the Advanced Research Projects Agency under Contract No. DABT63-97-C-0024. Copyright © 2000 by Subhasish Mitra. All rights reserved, including the right to reproduce this report, or portions thereof, in any form.
Modular reduction is the basic building block of many publickey cryptosystems. BCH codes require repeated polynomial reductions modulo the same constant polynomial. This is conceptually very similar to the implementation of public-key cryptography where repeated modular reduction in Zn or Zp are required for some fixed n or p. It is hence natural to try and transfer the modular reduction expert...
By using the theory ofjinite5eld Fourier transforms, the subject of rror control codes is described in N language familiar to thejield of signal processing. The many importunt uses of spectral techniques in error control are summarized. Many classes of linear codes are given a spectral interpretation and some new codes are described, Several nlternative encoder1 decoder schemes are described by...
Error diagnosis is becoming more difficult in VLSI circuit designs due to the increasing complexity. In this paper, we present an algorithm based on verification for improving the accuracy of design error diagnosis. This algorithm integrates three-valued logic simulation and Boolean satisfiability(SAT). It uses test patterns generated by gate level stuck-at fault ATPG tool for parallel pattern ...
In the past decade, a significant progresshas been reported in the field of error control coding. In particular, the innovation ofturbo codes and rediscovery of LDPC codes have been recognized as two significant breakthroughs in this field. The distinct features of these capacity approaching codes have enabled them to be widely proposed and/or adopted in existing wireless standards. Furthermore...
In this paper we describe two error-recovery approaches for MPEG encoded video over ATM networks. The first approach aims at reconstructing each lost pixel by spatial interpolation from the nearest undamaged pixels. The second approach recovers lost macroblocks by minimizing intersample variations within each block and across its boundaries. Moreover, a new technique for packing ATM cells with ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید