L-Bit to M-Bit Code Mapping

Abstract

We investigate codes that map L bits to m bits to achieve a set of codewords which contain no consecutive n “0”s. Such codes are desirable in the design of line codes which, in the absence of clock information in data, provide reasonable clock recovery due to sufficient state changes. Two problems are tackled- (i) we derive n_min for a fixed L and m and (ii) determine m_min for a fixed L and n. Results benefit telecommunication applications where clock synchronization of received data needs to be done with minimum overhead.

Authors and Affiliations

Ruixing Li, Shahram Latifi, Yun Lun, Ming Lun

Keywords

Related Articles

Construction of TVET M-Learning Model based on Student Learning Style

Mobile learning or m-learning is emerging as the innovation of virtual learning that used mobile devices for teaching and learning which can be accessed readily at hand anywhere either in classroom or group. Whereas prel...

Differential Evolution based SHEPWM for Seven-Level Inverter with Non-Equal DC Sources

This paper presents the application of differential evolution algorithm to obtain optimal switching angles for a single-phase seven-level to improve AC voltage quality. The proposed inverter in this article is composed o...

Very Low Power Viterbi Decoder Employing Minimum Transition and Exchangeless Algorithms for Multimedia Mobile Communication

  A very low power consumption viterbi decoder has been developed by low supply voltage and 0.15 µm CMOS process technology. Significant power reduction can be achieved by modifying the design and implementatio...

Extended Fuzzy Analytical Hierarchy Process Approach in Determinants of Employees’ Competencies in the Fourth Industrial Revolution

This paper explored the education factors and ranked their impacts on the employees’ competencies development in Vietnam. Factors contributing to the employees’ competencies in the Vietnamese context are proposed based o...

DDoS Classification Using Neural Network and Naïve Bayes Methods for Network Forensics

Distributed Denial of Service (DDoS) is a network security problem that continues to grow dynamically and has increased significantly to date. DDoS is a type of attack that is carried out by draining the available resour...

Download PDF file
  • EP ID EP111998
  • DOI 10.14569/IJACSA.2015.061116
  • Views 103
  • Downloads 0

How To Cite

Ruixing Li, Shahram Latifi, Yun Lun, Ming Lun (2015). L-Bit to M-Bit Code Mapping. International Journal of Advanced Computer Science & Applications, 6(11), 112-118. https://europub.co.uk/articles/-A-111998