Efficient Recovery of Data In Digital Communication Using FPGA
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 8
Abstract
Survey on reduction in error by special encoding and decoding technique using FPGA that is by using convolutional encoding and viterbi decoding. Forward error correction (FEC) is one of the key parts of any digital communication system (especially system that sends the information in a noisy environment) for the reliable data transfer. FEC requires only one way link, and its parity bits target both error detection and correction. The purpose of FEC communication scheme is to add redundancy to the transmitted data so that any errors introduced by the communication channel can be corrected by the receiver. Convolutional encoding with the viterbi decoding is one of the most popular and excellent error correction techniques for correcting random errors. It is one of the most widely used FEC methods in many digital communication systems. In this case the convolutional encoding and viterbi decoding is by using FPGA with variable input bit lengths (as 7, 8 and 9) is shown using the special simulation modules with XILINX software.
Authors and Affiliations
Jayant Ramesh Namdwalkar, Dr. D. J. Pete
Representing Competent Revocable Data Access Influence for Multi-Authority Cloud Storage
Cloud computing is rising immensely because of its points of interest and the adaptable storage administrations provided by it. Because of this the quantity of clients has come to at the top. Clearly the clients will...
Advanced Power Allocation in OFDM Systems
In this project, we propose a power allocation strategy by utilizing the duality gap in OFDM systems for the maximization of the sum of data rates at all subcarriers. In order to achieve the maximum capacity, the prop...
Implementation of a Personalized Mobile Query Search Engine
PMSE, Personalized Mobile Search Engine has been proposed to show any client craved result or re-ranking result as per the client given question (UGQ) which incorporates content and the area of the client. It meets e...
Homomorphic Token and Distributed Erasure-Code for cloud
Cloud users store their data in the cloud environment which is privileged by the service provider. Cloud users can access their cloud storage. Here we propose a flexible distributed storage integrity auditing mechani...
Review on Algorithms and Techniques of Reversible Data Hiding
Nowadays, with the rapid development of information technology more and more images and data are available on the internet..So there is a need to provide some kind of authentication to such important data. With the i...