期刊文献+
共找到21篇文章
< 1 2 >
每页显示 20 50 100
Single Photon Detection Technology in Underwater Wireless Optical Communication:Modulation Modes and Error Correction Coding Analysis
1
作者 GAI Lei LI Wendong WANG Guoyu 《Journal of Ocean University of China》 CAS CSCD 2024年第2期405-414,共10页
This study explores the application of single photon detection(SPD)technology in underwater wireless optical communication(UWOC)and analyzes the influence of different modulation modes and error correction coding type... This study explores the application of single photon detection(SPD)technology in underwater wireless optical communication(UWOC)and analyzes the influence of different modulation modes and error correction coding types on communication performance.The study investigates the impact of on-off keying(OOK)and 2-pulse-position modulation(2-PPM)on the bit error rate(BER)in single-channel intensity and polarization multiplexing.Furthermore,it compares the error correction performance of low-density parity check(LDPC)and Reed-Solomon(RS)codes across different error correction coding types.The effects of unscattered photon ratio and depolarization ratio on BER are also verified.Finally,a UWOC system based on SPD is constructed,achieving 14.58 Mbps with polarization OOK multiplexing modulation and 4.37 Mbps with polarization 2-PPM multiplexing modulation using LDPC code error correction. 展开更多
关键词 error correction coding modulation mode single photon detection underwater communication wireless optical communication
下载PDF
Generalized Minimum Rank Distance of Variable-Rate Linear Network Error Correction Codes
2
作者 ZHOU Hang 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2021年第1期19-23,共5页
By extending the notion of the minimum distance for linear network error correction code(LNEC), this paper introduces the concept of generalized minimum rank distance(GMRD) of variable-rate linear network error correc... By extending the notion of the minimum distance for linear network error correction code(LNEC), this paper introduces the concept of generalized minimum rank distance(GMRD) of variable-rate linear network error correction codes. The basic properties of GMRD are investigated. It is proved that GMRD can characterize the error correction/detection capability of variable-rate linear network error correction codes when the source transmits the messages at several different rates. 展开更多
关键词 network error correction code error pattern generalized minimum distance variable-rate
原文传递
Quantum Codes Do Not Increase Fidelity against Isotropic Errors
3
作者 Jesús Lacalle Luis Miguel Pozo-Coronado +1 位作者 André Luiz Fonseca de Oliveira Rafael Martín-Cuevas 《Journal of Applied Mathematics and Physics》 2023年第2期555-571,共17页
In this article, we study the ability of error-correcting quantum codes to increase the fidelity of quantum states throughout a quantum computation. We analyze arbitrary quantum codes that encode all qubits involved i... In this article, we study the ability of error-correcting quantum codes to increase the fidelity of quantum states throughout a quantum computation. We analyze arbitrary quantum codes that encode all qubits involved in the computation, and we study the evolution of n-qubit fidelity from the end of one application of the correcting circuit to the end of the next application. We assume that the correcting circuit does not introduce new errors, that it does not increase the execution time (i.e. its application takes zero seconds) and that quantum errors are isotropic. We show that the quantum code increases the fidelity of the states perturbed by quantum errors but that this improvement is not enough to justify the use of quantum codes. Namely, we prove that, taking into account that the time interval between the application of the two corrections is multiplied (at least) by the number of qubits n (due to the coding), the best option is not to use quantum codes, since the fidelity of the uncoded state over a time interval n times smaller is greater than that of the state resulting from the quantum code correction. 展开更多
关键词 Quantum error Correcting codes Isotropic Quantum Computing errors Quantum Computing error Fidelity Quantum Computing error Variance
下载PDF
A Comparison of Error Correction Models for Student’s Error Codes Based on Deep Learning 被引量:1
4
作者 Tao Lin Jian Wang +2 位作者 Qifan Jian Zhiming Wu Zhenbo Zhang 《计算机教育》 2022年第12期137-142,共6页
Automatically correcting students’code errors using deep learning is an effective way to reduce the burden of teachers and to enhance the effects of students’learning.However,code errors vary greatly,and the adaptab... Automatically correcting students’code errors using deep learning is an effective way to reduce the burden of teachers and to enhance the effects of students’learning.However,code errors vary greatly,and the adaptability of fixing techniques may vary for different types of code errors.How to choose the appropriate methods to fix different types of errors is still an unsolved problem.To this end,this paper first classifies code errors by Java novice programmers based on Delphi analysis,and compares the effectiveness of different deep learning models(CuBERT,GraphCodeBERT and GGNN)fixing different types of errors.The results indicated that the 3 models differed significantly in their classification accuracy on different error codes,while the error correction model based on the Bert structure showed better code correction potential for beginners’codes. 展开更多
关键词 Deep learning code error correction code error classification
下载PDF
High Speed Versatile Reed-Solomon Decoder for Correcting Errors and Erasures
5
作者 王华 范光荣 +1 位作者 王平勤 匡镜明 《Journal of Beijing Institute of Technology》 EI CAS 2008年第1期81-86,共6页
A new Chien search method for shortened Reed-Solomon (RS) code is proposed, based on this, a versatile RS decoder for correcting both errors and erasures is designed. Compared with the traditional RS decoder, the we... A new Chien search method for shortened Reed-Solomon (RS) code is proposed, based on this, a versatile RS decoder for correcting both errors and erasures is designed. Compared with the traditional RS decoder, the weighted coefficient of the Chien search method is calculated sequentially through the three pipelined stages of the decoder. And therefore, the computation of the errata locator polynomial and errata evaluator polynomial needs to be modified. The versatile RS decoder with minimum distance 21 has been synthesized in the Xilinx Virtex-Ⅱ series field programmable gate array (FPGA) xe2v1000-5 and is used by coneatenated coding system for satellite communication. Results show that the maximum data processing rate can be up to 1.3 Gbit/s. 展开更多
关键词 Reed-Solomon code Berlekamp-Massey algorithm error correction codes versatile Reed-Solomon decoder
下载PDF
Performance of entanglement-assisted quantum codes with noisy ebits over asymmetric and memory channels
6
作者 樊继豪 夏沛文 +1 位作者 戴迪康 陈一骁 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第12期241-248,共8页
Entanglement-assisted quantum error correction codes(EAQECCs)play an important role in quantum communications with noise.Such a scheme can use arbitrary classical linear code to transmit qubits over noisy quantum chan... Entanglement-assisted quantum error correction codes(EAQECCs)play an important role in quantum communications with noise.Such a scheme can use arbitrary classical linear code to transmit qubits over noisy quantum channels by consuming some ebits between the sender(Alice)and the receiver(Bob).It is usually assumed that the preshared ebits of Bob are error free.However,noise on these ebits is unavoidable in many cases.In this work,we evaluate the performance of EAQECCs with noisy ebits over asymmetric quantum channels and quantum channels with memory by computing the exact entanglement fidelity of several EAQECCs.We consider asymmetric errors in both qubits and ebits and show that the performance of EAQECCs in entanglement fidelity gets improved for qubits and ebits over asymmetric channels.In quantum memory channels,we compute the entanglement fidelity of several EAQECCs over Markovian quantum memory channels and show that the performance of EAQECCs is lowered down by the channel memory.Furthermore,we show that the performance of EAQECCs is diverse when the error probabilities of qubits and ebits are different.In both asymmetric and memory quantum channels,we show that the performance of EAQECCs is improved largely when the error probability of ebits is reasonably smaller than that of qubits. 展开更多
关键词 asymmetric quantum channel entanglement fidelity entanglement-assisted quantum error correction code quantum memory channel
下载PDF
Quaternion Integers Based Higher Length Cyclic Codes and Their Decoding Algorithm 被引量:1
7
作者 Muhammad Sajjad Tariq Shah +2 位作者 Mohammad Mazyad Hazzazi Adel R.Alharbi Iqtadar Hussain 《Computers, Materials & Continua》 SCIE EI 2022年第10期1177-1194,共18页
The decoding algorithm for the correction of errors of arbitrary Mannheim weight has discussed for Lattice constellations and codes from quadratic number fields.Following these lines,the decoding algorithms for the co... The decoding algorithm for the correction of errors of arbitrary Mannheim weight has discussed for Lattice constellations and codes from quadratic number fields.Following these lines,the decoding algorithms for the correction of errors of n=p−12 length cyclic codes(C)over quaternion integers of Quaternion Mannheim(QM)weight one up to two coordinates have considered.In continuation,the case of cyclic codes of lengths n=p−12 and 2n−1=p−2 has studied to improve the error correction efficiency.In this study,we present the decoding of cyclic codes of length n=ϕ(p)=p−1 and length 2n−1=2ϕ(p)−1=2p−3(where p is prime integer andϕis Euler phi function)over Hamilton Quaternion integers of Quaternion Mannheim weight for the correction of errors.Furthermore,the error correction capability and code rate tradeoff of these codes are also discussed.Thus,an increase in the length of the cyclic code is achieved along with its better code rate and an adequate error correction capability. 展开更多
关键词 Mannheim distance monoid ring cyclic codes parity check matrix extension syndromes decoding code rate and error correction capability
下载PDF
On the Computing of the Minimum Distance of Linear Block Codes by Heuristic Methods
8
作者 Mohamed Askali Ahmed Azouaoui +1 位作者 Said Nouh Mostafa Belkasmi 《International Journal of Communications, Network and System Sciences》 2012年第11期774-784,共11页
The evaluation of the minimum distance of linear block codes remains an open problem in coding theory, and it is not easy to determine its true value by classical methods, for this reason the problem has been solved i... The evaluation of the minimum distance of linear block codes remains an open problem in coding theory, and it is not easy to determine its true value by classical methods, for this reason the problem has been solved in the literature with heuristic techniques such as genetic algorithms and local search algorithms. In this paper we propose two approaches to attack the hardness of this problem. The first approach is based on genetic algorithms and it yield to good results comparing to another work based also on genetic algorithms. The second approach is based on a new randomized algorithm which we call 'Multiple Impulse Method (MIM)', where the principle is to search codewords locally around the all-zero codeword perturbed by a minimum level of noise, anticipating that the resultant nearest nonzero codewords will most likely contain the minimum Hamming-weight codeword whose Hamming weight is equal to the minimum distance of the linear code. 展开更多
关键词 Minimum Distance error Impulse Method Heuristic Methods Genetic Algorithms NP-HARDNESS Linear error Correcting codes BCH codes QR codes Double Circulant codes
下载PDF
Majority Voting Procedure Allowing Soft Decision Decoding of Linear Block Codes on Binary Channels
9
作者 Said Nouh Achraf El Khatabi Mostafa Belkasmi 《International Journal of Communications, Network and System Sciences》 2012年第9期557-568,共12页
In this paper we present an efficient algorithm to decode linear block codes on binary channels. The main idea consists in using a vote procedure in order to elaborate artificial reliabilities of the binary received w... In this paper we present an efficient algorithm to decode linear block codes on binary channels. The main idea consists in using a vote procedure in order to elaborate artificial reliabilities of the binary received word and to present the obtained real vector r as inputs of a SIHO decoder (Soft In/Hard Out). The goal of the latter is to try to find the closest codeword to r in terms of the Euclidean distance. A comparison of the proposed algorithm over the AWGN channel with the Majority logic decoder, Berlekamp-Massey, Bit Flipping, Hartman-Rudolf algorithms and others show that it is more efficient in terms of performance. The complexity of the proposed decoder depends on the weight of the error to decode, on the code structure and also on the used SIHO decoder. 展开更多
关键词 error Correcting codes Genetic Algorithms HIHO Decoder SIHO Decoder Vote Procedure
下载PDF
Novel Double Modular Redundancy Based Fault-Tolerant FIR Filter for Image Denoising
10
作者 V.S.Vaisakhi D.Surendran 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期181-193,共13页
In signal processing and communication systems,digital filters are widely employed.In some circumstances,the reliability of those systems is crucial,necessitating the use of fault tolerant filter implementations.Many ... In signal processing and communication systems,digital filters are widely employed.In some circumstances,the reliability of those systems is crucial,necessitating the use of fault tolerant filter implementations.Many strategies have been presented throughout the years to achieve fault tolerance by utilising the structure and properties of the filters.As technology advances,more complicated systems with several filters become possible.Some of the filters in those complicated systems frequently function in parallel,for example,by applying the same filter to various input signals.Recently,a simple strategy for achieving fault tolerance that takes advantage of the availability of parallel filters was given.Many fault-tolerant ways that take advantage of the filter’s structure and properties have been proposed throughout the years.The primary idea is to use structured authentication scan chains to study the internal states of finite impulse response(FIR)components in order to detect and recover the exact state of faulty modules through the state of non-faulty modules.Finally,a simple solution of Double modular redundancy(DMR)based fault tolerance was developed that takes advantage of the availability of parallel filters for image denoising.This approach is expanded in this short to display how parallel filters can be protected using error correction codes(ECCs)in which each filter is comparable to a bit in a standard ECC.“Advanced error recovery for parallel systems,”the suggested technique,can find and eliminate hidden defects in FIR modules,and also restore the system from multiple failures impacting two FIR modules.From the implementation,Xilinx ISE 14.7 was found to have given significant error reduction capability in the fault calculations and reduction in the area which reduces the cost of implementation.Faults were introduced in all the outputs of the functional filters and found that the fault in every output is corrected. 展开更多
关键词 Fault tolerance FILTERS efficiency REDUNDANCY image denoising error correction codes double modular redundancy
下载PDF
Matroidal Error Correction Networks and Linear Network Error Correction MDS Codes
11
作者 ZHOU Hang LIU Guangjun 《Wuhan University Journal of Natural Sciences》 CAS 2013年第6期477-483,共7页
In this paper, we further study the connections between linear network error correction codes and representable matroids. We extend the concept of matroidal network introduced by Dougherty et al. to a generalized case... In this paper, we further study the connections between linear network error correction codes and representable matroids. We extend the concept of matroidal network introduced by Dougherty et al. to a generalized case when errors occur in multi- ple channels. Importantly, we show the necessary and sufficient conditions on the existence of linear network error correction mul- ticast/broadcast/dispersion maximum distance separable (MDS) code on a matroidal error correction network. 展开更多
关键词 network error correction code error pattern imagi-nary error channels extended network MATROID
原文传递
ELIMINATING SPEED PENALTIES IN ECC PROTECTED MEMORY DESIGNS USING “BIT BYPASSING” TECHNIQUES
12
作者 Zhi Tian Yang Haigang +4 位作者 Cai Gang Qiu Xiaoqiang Shu Yi Li Yue Cheng Xiaoyan 《Journal of Electronics(China)》 2014年第4期290-297,共8页
In deep sub-micron ICs, growing amounts of on-die memory and scaling effects make embedded memories more vulnerable to reliability problems, such as soft errors induced by radiation. Error Correction Code(ECC) along w... In deep sub-micron ICs, growing amounts of on-die memory and scaling effects make embedded memories more vulnerable to reliability problems, such as soft errors induced by radiation. Error Correction Code(ECC) along with scrubbing is an efficient method for protecting memories against these errors. However, the latency of coding circuits brings speed penalties in high performance applications. This paper proposed a "bit bypassing" ECC protected memory by buffering the encoded data and adding an identifying address for the input data. The proposed memory design has been fabricated on a 130 nm CMOS process. According to the measurement, the proposed scheme only gives the minimum delay overhead of 22.6%, compared with other corresponding memories. Furthermore, heavy ion testing demonstrated the single event effects performance of the proposed memory achieves error rate reductions by 42.9 to 63.3 times. 展开更多
关键词 error correction code(ECC) MEMORY Performance
下载PDF
Real-time video compression system design and hardware implementation based on multiple ADV212 被引量:1
13
作者 徐冬冬 Wang Wenhua +3 位作者 Zhang Yu Zhang Xingxiang Fu Tianjiao Ren Jianyue 《High Technology Letters》 EI CAS 2016年第3期282-287,共6页
In order to improve the transmission rate of the compression system,a real-time video lossy compression system based on multiple ADV212 is proposed and achieved. Considering the CMOS video format and the working princ... In order to improve the transmission rate of the compression system,a real-time video lossy compression system based on multiple ADV212 is proposed and achieved. Considering the CMOS video format and the working principle of ADV212,a Custom-specific mode is used for various video formats firstly. The data can be cached through the FPGA internal RAM and SDRAM Ping-Pong operation. And the working efficiency is greatly promoted. Secondly,this method can realize direct code stream transmission or do it after storage. Through the error correcting coding,the correction ability of the flash memory is highly improved. Lastly,the compression and de-compression circuit boards are involved to specify the performance of the method. The results show that the compression system has a real-time and stable performance. And the compression ratio can be changed arbitrarily by configuring the program. The compression system can be realized and the real-time performance is good with large amount of data. 展开更多
关键词 compression system ADV212 Custom-specific Ping-Pong operation error correction coding
下载PDF
Verification of SEU resistance in 65 nm high-performance SRAM with dual DICE interleaving and EDAC mitigation strategies 被引量:2
14
作者 Ze He Shi-Wei Zhao +5 位作者 Tian-Qi Liu Chang Cai Xiao-Yu Yan Shuai Gao Yu-Zhu Liu Jie Liu 《Nuclear Science and Techniques》 SCIE EI CAS CSCD 2021年第12期64-76,共13页
A dual double interlocked storage cell(DICE)interleaving layout static random-access memory(SRAM)is designed and manufactured based on 65 nm bulk complementary metal oxide semiconductor technology.The single event ups... A dual double interlocked storage cell(DICE)interleaving layout static random-access memory(SRAM)is designed and manufactured based on 65 nm bulk complementary metal oxide semiconductor technology.The single event upset(SEU)cross sections of this memory are obtained via heavy ion irradiation with a linear energy transfer(LET)value ranging from 1.7 to 83.4 MeV/(mg/cm^(2)).Experimental results show that the upset threshold(LETth)of a 4 KB block is approximately 6 MeV/(mg/cm^(2)),which is much better than that of a standard unhardened SRAM with an identical technology node.A 1 KB block has a higher LETth of 25 MeV/(mg/cm^(2))owing to the use of the error detection and correction(EDAC)code.For a Ta ion irradiation test with the highest LET value(83.4 MeV/(mg/cm^(2))),the benefit of the EDAC code is reduced significantly because the multi-bit upset proportion in the SEU is increased remarkably.Compared with normal incident ions,the memory exhibits a higher SEU sensitivity in the tilt angle irradiation test.Moreover,the SEU cross section indicates a significant dependence on the data pattern.When comprehensively considering HSPICE simulation results and the sensitive area distributions of the DICE cell,it is shown that the data pattern dependence is primarily associated with the arrangement of sensitive transistor pairs in the layout.Finally,some suggestions are provided to further improve the radiation resistance of the memory.By implementing a particular design at the layout level,the SEU tolerance of the memory is improved significantly at a low area cost.Therefore,the designed 65 nm SRAM is suitable for electronic systems operating in serious radiation environments. 展开更多
关键词 Double interlocked storage cell(DICE) error detection and correction(EDAC)code Heavy ion Radiation hardening technology Single event upset(SEU) Static random-access memory(SRAM)
下载PDF
Review of Public-Key Cryptosystem Based on the Error Correcting Code 被引量:1
15
作者 LI Zhongyuan QU Chengqin +1 位作者 ZHOU Xueguang ZHUO Lifeng 《Wuhan University Journal of Natural Sciences》 CAS 2014年第6期489-496,共8页
The paper review the public-key cryptosystems based on the error correcting codes such as Goppa code, BCH code, RS code, rank distance code, algebraic geometric code as well as LDPC code, and made the comparative anal... The paper review the public-key cryptosystems based on the error correcting codes such as Goppa code, BCH code, RS code, rank distance code, algebraic geometric code as well as LDPC code, and made the comparative analyses of the merits and drawbacks of them. The cryptosystem based on Goppa code has high security, but can be achieved poor. The cryptosystems based on other error correcting codes have higher performance than Goppa code. But there are still some disadvantages to solve. At last, the paper produce an assumption of the Niederreiter cascade combination cryptosystem based on double public-keys under complex circumstances, which has higher performance and security than the traditional cryptosystems. 展开更多
关键词 error correcting code public-key cryptosystem cascaded code safety
原文传递
Error correction coding paves an avenue to ultra-high accuracyof DNA sequencing
16
《Science Foundation in China》 CAS 2017年第4期22-,共1页
With the support from the National Natural Science Foundation of China,Prof.Huang Yanyi(黄岩谊)led a team at Peking University to demonstrate a novel approach,which combined fluorogenic sequencingby-synthesis(SBS)chem... With the support from the National Natural Science Foundation of China,Prof.Huang Yanyi(黄岩谊)led a team at Peking University to demonstrate a novel approach,which combined fluorogenic sequencingby-synthesis(SBS)chemistry with an information theory-based error-correction coding scheme to 展开更多
关键词 DNA ECC error correction coding paves an avenue to ultra-high accuracyof DNA sequencing
原文传递
A CLASS OF GENERALIZED CYCLIC CODES
17
作者 刘卓军 林东岱 《Acta Mathematicae Applicatae Sinica》 SCIE CSCD 2000年第1期53-58,共6页
In this paper, we discuss how to construct a class of generalized cyclic codes, denoted by GCC. It is well known that a cyclic code is generated by a factor of x^n - 1. Clearly, any monic polynomial g(x) with degree l... In this paper, we discuss how to construct a class of generalized cyclic codes, denoted by GCC. It is well known that a cyclic code is generated by a factor of x^n - 1. Clearly, any monic polynomial g(x) with degree less than n could be considered as a factor of some polynomial of degree n. Similarly the construction of cyclic codes, we explain how g(x) can generate a GCC. Meanwhile, as related to cyclic codes, experiments show that GCC can always produce a better parameter and/or give more linear codes. On the basis the of concept of GCC, we can also construct a linear code of [90,76,5] _2. 展开更多
关键词 Cyclic code generating pdynomial generating matrix error correcting code
全文增补中
Simple Three-Party Password Authenticated Key Exchange Protocol
18
作者 罗乃维 叶国晖 《Journal of Shanghai Jiaotong university(Science)》 EI 2011年第5期600-603,共4页
Three-party password authenticated key exchange (3PAKE) protocol plays a significant role in the history of secure communication area in which two clients agree a robust session key in an authentic manner based on pas... Three-party password authenticated key exchange (3PAKE) protocol plays a significant role in the history of secure communication area in which two clients agree a robust session key in an authentic manner based on passwords. In recent years, researchers focused on developing simple 3PAKE (S-3PAKE) protocol to gain system e?ciency while preserving security robustness for the system. In this study, we first demonstrate how an undetectable on-line dictionary attack can be successfully applied over three existing S-3PAKE schemes. An error correction code (ECC) based S-3PAKE protocol is then introduced to eliminate the identified authentication weakness. 展开更多
关键词 AUTHENTICATION CRYPTANALYSIS error correction code (ECC) simple three-party password authenticated key exchange (S-3PAKE) security undetectable on-line dictionary attack
原文传递
Accurate and Simplified Prediction of AVF for Delay and Energy Efficient Cache Design
19
作者 马安国 成玉 邢座程 《Journal of Computer Science & Technology》 SCIE EI CSCD 2011年第3期504-519,共16页
With continuous technology scaling, on-chip structures are becoming more and more susceptible to soft errors. Architectural vulnerability factor (AVF) has been introduced to quantify the architectural vulnerability ... With continuous technology scaling, on-chip structures are becoming more and more susceptible to soft errors. Architectural vulnerability factor (AVF) has been introduced to quantify the architectural vulnerability of on-chip structures to soft errors. Recent studies have found that designing soft error protection techniques with the awareness of AVF is greatly helpful to achieve a tradeoff between performance and reliability for several structures (i.e., issue queue, reorder buffer). Cache is one of the most susceptible components to soft errors and is commonly protected with error correcting codes (ECC). However, protecting caches closer to the processor (i.e., L1 data cache (LID)) using ECC could result in high overhead. Protecting caches without accurate knowledge of the vulnerability characteristics may lead to over-protection. Therefore, designing AVF-aware ECC is attractive for designers to balance among performance, power and reliability for cache, especially at early design stage. In this paper, we improve the methodology of cache AVF computation and develop a new AVF estimation framework, soft error reliability analysis based on SimpleScalar. Then we characterize dynamic vulnerability behavior of LID and detect the correlations between L1D AVF and various performance metrics. We propose to employ Bayesian additive regression trees to accurately model the variation of L1D AVF and to quantitatively explain the important effects of several key performance metrics on L1D AVF. Then, we employ bump hunting technique to reduce the complexity of L1D AVF prediction and extract some simple selecting rules based on several key performance metrics, thus enabling a simplified and fast estimation of L1D AVF. Based on the simplified and fast estimation of L1D AVF, intervals of high L1D AVF can be identified online, enabling us to develop the AVF-aware ECC technique to reduce the overhead of ECC. Experimental results show that compared with traditional ECC technique which provides complete ECC protection throughout the entire lifetime of a program, AVF-aware ECC technique reduces the L1D access latency by 35% and saves power consumption by 14% for SPEC2K benchmarks averagely. 展开更多
关键词 AVF (architectural vulnerability factor) prediction BART (Bayesian additive regression) AVF-aware ECC(error correction codes)
原文传递
Parallel LDPC Decoding on GPUs Using a Stream-Based Computing Approach 被引量:2
20
作者 Gabriel Falcao Student Member +3 位作者 Shinichi Yamagiwa Vitor Silva Leonel Sousa Senior Member 《Journal of Computer Science & Technology》 SCIE EI CSCD 2009年第5期913-924,共12页
Low-Density Parity-Check (LDPC) codes are powerful error correcting codes adopted by recent communication standards. LDPC decoders are based on belief propagation algorithms, which make use of a Tanner graph and ver... Low-Density Parity-Check (LDPC) codes are powerful error correcting codes adopted by recent communication standards. LDPC decoders are based on belief propagation algorithms, which make use of a Tanner graph and very intensive message-passing computation, and usually require hardware-based dedicated solutions. With the exponential increase of the computational power of commodity graphics processing units (GPUs), new opportunities have arisen to develop general purpose processing on GPUs. This paper proposes the use of GPUs for implementing flexible and programmable LDPC decoders. A new stream-based approach is proposed, based on compact data structures to represent the Tanner graph. It is shown that such a challenging application for stream-based computing, because of irregular memory access patterns, memory bandwidth and recursive flow control constraints, can be efficiently implemented on GPUs. The proposal was experimentally evaluated by programming LDPC decoders on GPUs using the Caravela platform, a generic interface tool for managing the kernels' execution regardless of the GPU manufacturer and operating system. Moreover, to relatively assess the obtained results, we have also implemented LDPC decoders on general purpose processors with Streaming Single Instruction Multiple Data (SIMD) Extensions. Experimental results show that the solution proposed here efficiently decodes several codewords simultaneously, reducing the processing time by one order of magnitude. 展开更多
关键词 data-parallel computing graphics processing unit (GPU) Caravela low-density parity-check (LDPC) code error correcting code
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部