scholarly journals Area and Energy Efficient QCA Based Compact Serial Concatenated Convolutional Code Encoder

2022 ◽  
Vol 2161 (1) ◽  
pp. 012025
Author(s):  
B.S. Premananda ◽  
T.N. Dhanush ◽  
Vaishnavi S. Parashar

Abstract Quantum-dot Cellular Automata (QCA) is a transistor-less technology known for its low power consumption and higher clock rate. Serial Concatenated Convolutional Coding (SCCC) encoder is a class of forward error correction. This paper picturizes the implementation of the outer encoder as a (7, 4, 1) Bose Chaudhary Hocquenghem encoder that serves the purpose of burst error correction, a pseudo-random inter-leaver used for permuting of systematic code words and finally the inner encoder which is used for the correction of random errors in QCA. Two different architectures of the SCCC encoder have been proposed and discussed in this study. In the proposed two architectures, the first based on external clock signals whereas the second based on internal clock generation. The sub-blocks outer encoder, pseudo-random inter-leaver and inner encoder of the SCCC encoder are optimized, implemented and simulated using QCADesigner and then integrated to design a compact SCCC encoder. The energy dissipation is computed using QCADesigner-E. The proposed SCCC encoder reduced the total area by 46% and energy dissipation by 50% when compared to the reference SCCC encoder. The proposed encoders are more efficient in terms of cell count, energy dissipation and area occupancy respectively.

2018 ◽  
Vol 7 (3.27) ◽  
pp. 129 ◽  
Author(s):  
Huda Saleem ◽  
Huda Albermany ◽  
Husein Hadi

The typical scheme used to generated cryptographic key is a fuzzy extractor. The fuzzy extractor is the extraction of a stable data from biometric data or noisy data based on the error correction code (ECC) method. Forward error correction includes two ways are blocked and convolutional coding used for error control coding. “Bose_Chaudhuri_Hocquenghem” (BCH) is one of the error correcting codes employ to correct errors in noise data. In this paper use fuzzy extractor scheme to find strong key based on BCH coding, face recognition data used SVD method and hash function. Hash_512 converted a string with variable length into a string of fixed length, it aims to protect information against the threat of repudiation.  


Electronics ◽  
2020 ◽  
Vol 9 (2) ◽  
pp. 281 ◽  
Author(s):  
Valentina Bianchi ◽  
Filippo Savi ◽  
Ilaria De Munari ◽  
Davide Barater ◽  
Giampaolo Buticchi ◽  
...  

In modular distributed architectures, the adoption of a communication method that is at the same time robust and has a low and predictable latency is of utmost importance in order to support the required system dynamics. The aim of this paper is to evaluate the consequences of the random jitter on machine drives distributed control, caused by the messages’ re-transmission in case of an error in the received data. To achieve this goal, two different Forward Error Correction (FEC) techniques are introduced in the chosen protocol, so that the recipient of the message can correct random errors without the need of any additional round trip delays needed to request and obtain a re-transmission. Experimentally validated simulations are used to evaluate the impact of random network derived jitter on a real world closed loop control system for distributed power electronic converters.


2013 ◽  
Vol 33 (2) ◽  
pp. 393-396
Author(s):  
Xiaomeng WU ◽  
Hongli LIU ◽  
Cheng LI ◽  
Zhiru GU

2000 ◽  
Vol 36 (9) ◽  
pp. 812 ◽  
Author(s):  
Y. Miyamoto ◽  
K. Yonenaga ◽  
S. Kuwahara ◽  
M. Tomizawa ◽  
A. Hirano ◽  
...  

2013 ◽  
Vol 59 (1) ◽  
pp. 273-280 ◽  
Author(s):  
Linjia Hu ◽  
Saeid Nooshabadi ◽  
Todor Mladenov

Sign in / Sign up

Export Citation Format

Share Document