We present a novel error correcting code and decoding algorithm which have construction similar to expander codes. The code is based on a bipartite graph derived from the subsumption relations of finite projective geometry, and Reed-Solomon codes as component codes. We use a modified version of well-known Zemor’s decoding algorithm for expander codes, for decoding our codes. By derivation of geometric bounds rather than eigenvalue bounds, it has been proved that for practical values of the code rate, the random error correction capability of our codes is much better than those derived for previously studied graph codes, including Zemor’s bound. MATLAB simulations further reveal that the average case performance of this code is 10 times bett...
C. Shannon presented theoretical conditions under which communication was possible error-free in the...
Wherever information is transmitted we can find error-correcting codes. LDPC (low density parity che...
In order to meet the demands of data-hungry applications, modern data storage systems are expected t...
Quite recently, codes based on real field are gaining momentum in terms of research and applications...
In the presented work we define a class of error-correcting codes based on incidence vectors of proj...
Codes derived from algebraic curves are called algebraic geometry (AG) codes. They provide a way to ...
The security of the most popular number-theory public key crypto (PKC) systems will be devastatingly...
Coordinated Science Laboratory was formerly known as Control Systems LaboratoryJoint Services Electr...
We present a new decoding algorithm based on error locating pairs and correcting an amount of errors...
A study of the efficiency, error-correcting capabilities, and limitations of graph theoretic block c...
This paper is concerned with a new family of error-correcting codes based on algebraic curves over f...
Abstract-Improvement to an earlier decoding algorithm for codes from algebraic geometry is presented...
In order to communicate successfully over a noisy channel, a method for detecting and correcting tra...
A variety of new Euclidean codes are investigated. These codes are suitable for discrete-time Gaussi...
International audienceProofs of Retrievability (PoR) protocols ensure that a client can fully retrie...
C. Shannon presented theoretical conditions under which communication was possible error-free in the...
Wherever information is transmitted we can find error-correcting codes. LDPC (low density parity che...
In order to meet the demands of data-hungry applications, modern data storage systems are expected t...
Quite recently, codes based on real field are gaining momentum in terms of research and applications...
In the presented work we define a class of error-correcting codes based on incidence vectors of proj...
Codes derived from algebraic curves are called algebraic geometry (AG) codes. They provide a way to ...
The security of the most popular number-theory public key crypto (PKC) systems will be devastatingly...
Coordinated Science Laboratory was formerly known as Control Systems LaboratoryJoint Services Electr...
We present a new decoding algorithm based on error locating pairs and correcting an amount of errors...
A study of the efficiency, error-correcting capabilities, and limitations of graph theoretic block c...
This paper is concerned with a new family of error-correcting codes based on algebraic curves over f...
Abstract-Improvement to an earlier decoding algorithm for codes from algebraic geometry is presented...
In order to communicate successfully over a noisy channel, a method for detecting and correcting tra...
A variety of new Euclidean codes are investigated. These codes are suitable for discrete-time Gaussi...
International audienceProofs of Retrievability (PoR) protocols ensure that a client can fully retrie...
C. Shannon presented theoretical conditions under which communication was possible error-free in the...
Wherever information is transmitted we can find error-correcting codes. LDPC (low density parity che...
In order to meet the demands of data-hungry applications, modern data storage systems are expected t...