SlideShare a Scribd company logo
1 of 7
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.3, May 2013
DOI:10.5121/ijfcst.2013.3304 41
ON 2-REPEATED SOLID BURST ERRORS
P. K. Das
Department of Mathematics, Shivaji College (University of Delhi), Raja Garden, Ring
Road, New Delhi, India
pankaj4thapril@yahoo.co.in
ABSTRACT
There are several kinds of errors for which error detecting and error correcting codes have been
constructed. Solid burst errors are common in many communications. In general communication due to the
long messages, the strings of solid bursts of small length may repeat in a vector itself. The concept of
repeated bursts is introduced by Beraradi, Dass and Verma[3] which has opened a new area of study. They
defined 2-repeated bursts and obtained results for detection and correction of such type of errors.
This paper considers a new similar kind of error which will be termed as '2-repeated solid burst error of
length b'. Lower and upper bounds on the number of parity checks required for the existence of codes that
detect 2-repeated solid burst error of length b or less are obtained. This is followed by an example of such
a code. Further, codes capable of detecting and simultaneously correcting such errors have also been dealt
with.
KEYWORDS
Parity check matrix, syndrome, standard array, solid bursts error
1. INTRODUCTION
Investigations in coding theory have been made in several directions but one of the most
important aspects considered has been the detection and correction of errors. The nature of errors
differs from channel to channel depending upon the behaviour of channels. Due to various
channels with the possibility of occurrence of solid burst error (viz. semiconductor memory data
[5], supercomputer storage system [1]), solid burst error is one of the important area for
mathematicians to study. For study on solid burst, one may refer to [9, 10, 12, etc]. This paper
also presents a study on solid burst error, but not occurring in ordinary way.
In very busy communication channels, it is observed that errors repeat themselves. So is a
situation when errors need to consider in repeated form. In this direction, an error pattern, called
2-repeated burst has been introduced by Dass, Verma and Berardi [3]. This is an extension of the
idea of open-loop burst given by Fire [4]. Later on Dass and Verma [2] defined m-repeated bursts
and obtained results regarding the number of parity-check digits required for codes detecting such
errors. Some results have been obtained on weights of such errors by Sharma and Rohtagi [11].
This paper introduces yet another kind of a repeated error, termed as '2-repeated solid burst of
length b' and presents a study on such errors. The paper is organized as follows. Basic definitions,
related to our study are stated with some examples in Section 2. In Section 3, bounds on the parity
checks for a code that detects 2-repeated solid bursts of length b or less are obtained. This is
followed by an illustration of such a code in section 4. Section 5 gives a bound on code for
simultaneous detection and correction of such errors.
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.3, May 2013
42
In what follows a linear code will be considered as a subspace of the space of all n-tuples over
GF(q). The distance between two vectors shall be considered in the Hamming sense.
2. PRELIMINARIES
The definition of a solid burst may be given as follows:
Definition 1. A solid burst of length b is a vector whose all the b-consecutive components are
non zero and rest are zero.
A vector may have not just one solid burst errors, but more than one. Putting them together into
one burst amounts to neglecting the nature of communication and unnecessarily considering a
longer solid burst. In a very busy communication channel, sometimes solid bursts repeat
themselves. In view of this, a kind of 2-repeated solid burst of length b is required to be
considered. The paper obtains lower and upper bounds for a code detecting 2-repeated solid burst
of length b or less, also presents the case when simultaneous detection and correction is required.
A 2-repeated solid burst of length b may be defined as follows:
Definition 2. A 2-repeated solid burst of length b is a vector of length n whose only nonzero
components are confined consecutively to two distinct sets of b consecutive components.
As an illustration (1100011000) is a 2-repeated solid burst of length 2 (upto 5) whereas
(0000100100) is a 2-repeated burst of length 3 or less. Also the vector (122211111100) may be
considered to be a 2-repeated solid burst of length 5 or 6.
The development of codes detecting and correcting such errors may prove to be useful for
channels already dealing with multiple solid burst errors improving upon their efficiency as such
errors are relatively simpler to handle. Such codes emerge as a natural generalization of single
solid burst error detecting and correcting codes.
3. DETECTION OF 2-REPEATED SOLID BURST ERROR
Consider the linear codes that are capable of detecting any 2-repeated solid burst of length b or
less. Clearly, the patterns to be detected should not be code words. In other words, codes are
considered which have no 2-repeated solid burst of length b or less as a code word. Firstly, a
lower bound over the number of parity-check digits required for such a code is obtained.
Theorem 1. Any (n, k) linear code over GF(q) that detects any 2-repeated solid burst of length b
or less must have at least







b
i
i
q qloq
0
)1(2 parity-check digits.
Proof. The result will be proved on the basis that no detectable error vector can be a code word.
Let V be an (n, k) linear code over GF(q). Let X be the set of all vectors such that all non zero
components are confined consecutively (starting from the positions) in some two distinct fixed set
of b consecutive components.
We claim that no two vectors of the set X can belong to the same coset of the standard array; else
a code word shall be expressible as a sum or difference of two error vectors.
Assume on the contrary that there is a pair, say x1, x2 in X belonging to the same coset of the
standard array. Their difference viz. x1 -x2 must be a code vector. But x1 -x2 is a vector all of
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.3, May 2013
43
whose non-zero components occur consecutively in the same two fixed b components and so is a
member of X, i.e., x1 -x2 is an 2-repeated solid bursts of length b or less, which is a contradiction.
Thus all the vectors in X must belong to distinct cosets of the standard array.
The number of such vectors, including all zero vector, over GF(q) is clearly
2
0
)1( 






b
i
i
q . (1)
The theorem follows since there must be at least this number of cosets and number of available is
qn-k
.
An upper bound on the number of check digits required for the construction of a linear
code is provided in the following theorem. This bound assures the existence of a linear code that
can detect all 2-repeated solid bursts of length b or less. The bound has been obtained by the well
known technique used in Varshomov-Gilbert Sacks bound by constructing a parity check matrix
for such a code (refer Sacks [8], also theorem 4.7 Peterson and Weldon [6]).
Theorem 2. There exists an (n, k) linear code over GF(q) that has no 2-repeated solid bursts of
length b or less as a code word provided that





b
i
b
l
likn
linqq
1
1
0
).()1(1 (2)
Proof. The existence of such a code will be shown by constructing an appropriate (n - k) × n
parity-check matrix H. The requisite parity-check matrix H shall be constructed as follows.
Select any non-zero (n - k)-tuples as the first column. Subsequent columns are added to H such
that after having selected the first j-1 columns h1, h2, ..., hj-1; the jth
column hj is added provided
that
).....().....( 11112211   sisiiiiiljljjj hvhvhvhuhuhuh (3)
where );(, qGFvu ii  bs  and hi’s in the second bracket are any s consecutive columns
among the first j-l-1 columns, l = 0, 1, 2, . . ., (b-1) .
Thus coefficients iu form a solid burst of length l and the coefficients iv form a solid burst of
length b or less in a ( j-l-1)-tuple. This condition ensures that no 2-repeated solid burst of length b
or less will be a code word. The number of choices of these coefficients can be calculated as
follows:
If iu is chosen to be a solid burst of length 0, then the number of solid bursts of length b or less in
a (j-1)-tuple is


b
i
i
ijq
1
)11()1( . (4)
If iu is chosen to be a solid burst of length 1, then the number of solid bursts of length b or less in
a (j-2)-tuple is
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.3, May 2013
44


b
i
i
ijq
1
)12()1( . (5)
If iu is chosen to be a solid burst of length 3, then the number of solid bursts of length b or less in
a (j-3)-tuple is


b
i
i
ijq
1
)13()1( . (6)
Continuing the process, if iu is chosen to be a solid burst of length b-1, then the number of solid
bursts of length b or less in a (j-b)-tuple is


b
i
i
ibjq
1
)1()1( . (7)
Therefore, the total number of possible choices of the coefficients iu and iv , is


b
i
i
ijq
1
)11()1( + (q-1) 

b
i
i
ijq
1
)12()1( + (q-1)2


b
i
i
ijq
1
)13()1(
+. . . . . . .+ (q-1)b-1


b
i
i
ibjq
1
)1()1( ,
which is equal to





b
i
b
l
li
lijq
1
1
0
).()1( (8)
At worst, all these linear combinations might yield a distinct sum.
Therefore a column hj can be added to H provided that





b
i
b
l
likn
lijqq
1
1
0
).()1(1 (9)
For a code of length n, replacing j by n gives the result. □
4. ILLUSTRATION
Example. Consider a (7, 2) binary code with parity check matrix
H=
















1010000
1101000
1100100
1100010
0100001
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.3, May 2013
45
This matrix has been constructed by the synthesis procedure, outlined in the proof of Theorem 2,
by taking q = 2, n = 7 and b = 2. It can be seen from Table 1 that the syndromes of the different 2-
repeated solid bursts of length 2 or less are nonzero, showing thereby that the code that is the null
space of this matrix can detect all 2-repeated solid bursts of length 2 or less.
Table 1
Error patterns Syndromes Error patterns Syndromes
1000000 10000
1100000 11000
1010000 10100
1001000 10010
1000100 10001
1000010 01110
1000001 11111
1110000 11100
1011000 10110
1001100 10011
1000110 01111
1000011 00001
0100000 01000
0110000 01100
0101000 01010
0100100 01001
0100010 10110
0100001 00111
0111000 01110
0101100 01011
0100110 10110
0100011 11001
0010000 00100
0011000 00110
0010100 00101
0010010 11010
0010001 01011
0001000 00010
0001100 00011
0001010 11100
0001001 01101
0001110 11101
0001011 10011
0000100 00001
0000110 11111
0000101 01110
0000111 10000
0000010 11110
0000011 10001
0000001 01111
1101000 11010
1100100 11001
1100010 00110
1100001 10111
1111000 11110
1101100 11011
1100110 00111
1100011 01001
0110100 01101
0110010 10010
0110001 00011
0111100 01111
0110110 10011
0110011 11101
0011010 11000
0011001 01001
0011110 11001
0011011 10111
0001101 01100
0001111 10010
5. SIMULTANEOUS DETECTION AND CORRECTION OF 2-REPEATED SOLID
BURST ERRORS
This section determines extended Reiger's bound (refer [8]; also Theorem 4.15, Peterson and
Weldon[7] ) for simultaneous detection and correction of 2-repeated solid bursts of length b or
less. The following theorem gives a bound on the number of parity-check digits for a linear code
that simultaneously detects and corrects such errors.
Theorem 3. An (n, k) linear code over GF(q) that corrects all 2- repeated solid bursts of length b
or less must have at least







b
i
i
q qloq
2
0
)1(2 parity-check digits. Further, if the code corrects all
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.3, May 2013
46
2-repeated solid bursts of length b or less and simultaneously detects 2-repeated solid bursts of
length d (d > b) or less then the code must have at least









db
i
i
q qloq
0
)1(2 parity-check digits.
Proof. To prove the first part, consider a solid burst of length 4b or less. Such a vector is
expressible as a sum or difference of two vectors, each of which is a 2-repeated solid burst of
length b or less. These component vectors must belong to different cosets of the standard array
because both such errors are correctable errors. Accordingly, such a vector viz. solid burst of
length 4b or less can not be a code vector. A solid burst of length 4b or less is also a 2-repeated
solid burst of length 2b or less. Applying Theorem 1, such a code must have at least







b
i
i
q qloq
2
0
)1(2 parity-check digits.
Further, consider a solid burst of length 2(b + d) or less. Such a vector is expressible as a
sum or difference of two vectors, one of which is a 2-repeated solid burst of length b or less and
the other is a 2-repeated solid burst of length d or less. Both such component vectors, one being a
detectable error and the other being a correctable error, can not belong to the same coset of the
standard array. Therefore such a vector can not be a code vector, i.e., a 2-repeated solid burst of
length b + d or less can not be a code vector. Hence the code must have at least









db
i
i
q qloq
0
)1(2 parity check digits.
6. CONCLUSION
The paper presents lower and upper bounds for a code detecting 2-repeated solid burst of length b
or less, also presents the case when simultaneous detection and correction is required. As
correction of errors, if possible, is more important than detection of errors, the codes correcting
such errors may be quite useful study.
ACKNOWLEDGEMENT
The author is thankful to Prof. B.K. Dass, Department of Mathematics, University of Delhi and
Dr. V.K. Tyagi, Department of Mathematics, Shyamlal college(Eve.), University of Delhi for
their suggestions.
REFERENCES
[1] Arlat, J. & Carter, W. C., (1984) “Implementation and Evaluation of a (b,k)-Adjacent Error-
Correcting/Detecting Scheme for Supercomputer Systems”, IBM J. Res. Develop., Vol. 28, No. 2, pp.
159-169.
[2] Dass, B. K., & Verma, R., (2009) “Repeated Burst Error Detecting Linear Codes”, Ratio Mathematica
Journal of Applied Mathematics, Vol. 19, pp. 25-30.
[3] Dass, B. K., Verma, R. & Berardi, L., (2009) “On 2-Repeated Burst Error Detecting Codes”, Journal
of Statistical Theory and Practice, Vol. 3, pp. 381-391.
[4] Fire, P., (1959) “A Class of Multiple-Error-Correcting Binary Codes for Non-Independent Errors”,
Sylvania Report RSL-E-2, Sylvania Reconnaissance System Laboratory, Mountain View, Calif. 12
[5] Jensen, D. W., (2003) “Block code to efficiently correct adjacent data and/or check bit errors”, Patent
number: US 6604222 B1, Date of Patent Aug 5,(www.google.com/patents/US6604222).
[6] Peterson, W.W. & Weldon(Jr.), E. J., (1972) Error-Correcting Codes, 2nd edition, The MIT Press,
Mass.
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.3, May 2013
47
[7] Reiger, S. H., (1960) “Codes for the Correction of Clustered Errors”, IRE Trans. Inform. Theory,IT-6,
pp. 16-21.
[8] Sacks, G. E., (1958) “Multiple error correction by means of parity-checks”, IRE Trans. Inform.
Theory, IT-4(December), pp. 145-147.
[9] Schillinger, A. G., (1964) “A class of solid burst error correcting codes”, Polytechnic Institute of
Brooklyn , N.Y., Research Rept. PIBMRI, April, pp. 1223-64.
[10] Sharma, B. D. & Dass, B. K., (1977) “Adjacent error correcting binary perfect codes”, J. Cybernetics,
No.7, pp. 9-13.
[11] Sharma, B. D., & Rohtagi, B., (2011) “Some Results on Weights of Vectors Having 2-Repeated
Bursts”, Cybernetics and Information Technologies, Vol. 11, No 1, pp. 36-44.
[12] Shiva, S. G. S. & Sheng, C. L., (1969) “Multiple solid burst-error- correcting binary codes”. IEEE
Trans. Inform. Theory, IT-15, pp. 188-189.
Author
Pankaj Kumar Das is currently working in the Department of Mathematics, Shivaji
College (University of Delhi), Delhi as Assistant Professor. He was born at Goalpara,
Assam (India). He graduated from Goalpara College (Gauhati University), Assam in
1998. In 2000, he got his M.Sc. degree in Mathematics from University of Delhi,
Delhi. He received M.Phil. degree in Mathematics from the same university in 2005.
He has given talks at national/international conferences. His area of research is
Coding Theory.

More Related Content

What's hot

Feasibility Issues in Shortest-Path Routing with Trafiic Flow Split
Feasibility Issues in Shortest-Path Routing with Trafiic Flow SplitFeasibility Issues in Shortest-Path Routing with Trafiic Flow Split
Feasibility Issues in Shortest-Path Routing with Trafiic Flow SplitAbang Sabri
 
Evaluation of Performance Characteristics of Polynomial based and Lattice bas...
Evaluation of Performance Characteristics of Polynomial based and Lattice bas...Evaluation of Performance Characteristics of Polynomial based and Lattice bas...
Evaluation of Performance Characteristics of Polynomial based and Lattice bas...IDES Editor
 
Detailed cryptographic analysis of contact tracing protocols
Detailed cryptographic analysis of contact tracing protocolsDetailed cryptographic analysis of contact tracing protocols
Detailed cryptographic analysis of contact tracing protocolsChristian Spolaore
 
BLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALS
BLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALSBLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALS
BLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALSIJNSA Journal
 
Partial generation of 2n length walsh codes using n-bit gray and inverse gray c
Partial generation of 2n length walsh codes using n-bit gray and inverse gray cPartial generation of 2n length walsh codes using n-bit gray and inverse gray c
Partial generation of 2n length walsh codes using n-bit gray and inverse gray cIAEME Publication
 
On the Usage of Chained Codes in Cryptography
On the Usage of Chained Codes in CryptographyOn the Usage of Chained Codes in Cryptography
On the Usage of Chained Codes in CryptographyCSCJournals
 
Arithmetic coding
Arithmetic codingArithmetic coding
Arithmetic coding09lavee
 
Error Control Coding -Introduction
Error Control Coding -IntroductionError Control Coding -Introduction
Error Control Coding -IntroductionBurdwan University
 
A method to determine partial weight enumerator for linear block codes
A method to determine partial weight enumerator for linear block codesA method to determine partial weight enumerator for linear block codes
A method to determine partial weight enumerator for linear block codesAlexander Decker
 
Digital Watermarking through Embedding of Encrypted and Arithmetically Compre...
Digital Watermarking through Embedding of Encrypted and Arithmetically Compre...Digital Watermarking through Embedding of Encrypted and Arithmetically Compre...
Digital Watermarking through Embedding of Encrypted and Arithmetically Compre...IJNSA Journal
 
WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES
WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODESWEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES
WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODESIJNSA Journal
 
Error Detection and Correction in SRAM Cell Using Decimal Matrix Code
Error Detection and Correction in SRAM Cell Using Decimal Matrix CodeError Detection and Correction in SRAM Cell Using Decimal Matrix Code
Error Detection and Correction in SRAM Cell Using Decimal Matrix Codeiosrjce
 
Linear block coding
Linear block codingLinear block coding
Linear block codingjknm
 

What's hot (20)

C04922125
C04922125C04922125
C04922125
 
Feasibility Issues in Shortest-Path Routing with Trafiic Flow Split
Feasibility Issues in Shortest-Path Routing with Trafiic Flow SplitFeasibility Issues in Shortest-Path Routing with Trafiic Flow Split
Feasibility Issues in Shortest-Path Routing with Trafiic Flow Split
 
Evaluation of Performance Characteristics of Polynomial based and Lattice bas...
Evaluation of Performance Characteristics of Polynomial based and Lattice bas...Evaluation of Performance Characteristics of Polynomial based and Lattice bas...
Evaluation of Performance Characteristics of Polynomial based and Lattice bas...
 
Channel coding
Channel coding  Channel coding
Channel coding
 
Detailed cryptographic analysis of contact tracing protocols
Detailed cryptographic analysis of contact tracing protocolsDetailed cryptographic analysis of contact tracing protocols
Detailed cryptographic analysis of contact tracing protocols
 
Source coding theorem
Source coding theoremSource coding theorem
Source coding theorem
 
BLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALS
BLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALSBLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALS
BLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALS
 
Partial generation of 2n length walsh codes using n-bit gray and inverse gray c
Partial generation of 2n length walsh codes using n-bit gray and inverse gray cPartial generation of 2n length walsh codes using n-bit gray and inverse gray c
Partial generation of 2n length walsh codes using n-bit gray and inverse gray c
 
On the Usage of Chained Codes in Cryptography
On the Usage of Chained Codes in CryptographyOn the Usage of Chained Codes in Cryptography
On the Usage of Chained Codes in Cryptography
 
Arithmetic coding
Arithmetic codingArithmetic coding
Arithmetic coding
 
Hamming codes
Hamming codesHamming codes
Hamming codes
 
C6 agramakrishnan1
C6 agramakrishnan1C6 agramakrishnan1
C6 agramakrishnan1
 
Source coding
Source codingSource coding
Source coding
 
Error Control Coding -Introduction
Error Control Coding -IntroductionError Control Coding -Introduction
Error Control Coding -Introduction
 
A method to determine partial weight enumerator for linear block codes
A method to determine partial weight enumerator for linear block codesA method to determine partial weight enumerator for linear block codes
A method to determine partial weight enumerator for linear block codes
 
Digital Watermarking through Embedding of Encrypted and Arithmetically Compre...
Digital Watermarking through Embedding of Encrypted and Arithmetically Compre...Digital Watermarking through Embedding of Encrypted and Arithmetically Compre...
Digital Watermarking through Embedding of Encrypted and Arithmetically Compre...
 
WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES
WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODESWEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES
WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES
 
Error Detection and Correction in SRAM Cell Using Decimal Matrix Code
Error Detection and Correction in SRAM Cell Using Decimal Matrix CodeError Detection and Correction in SRAM Cell Using Decimal Matrix Code
Error Detection and Correction in SRAM Cell Using Decimal Matrix Code
 
Linear block coding
Linear block codingLinear block coding
Linear block coding
 
Compression Ii
Compression IiCompression Ii
Compression Ii
 

Viewers also liked

The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...Brian Solis
 
Open Source Creativity
Open Source CreativityOpen Source Creativity
Open Source CreativitySara Cannon
 
Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)maditabalnco
 
What's Next in Growth? 2016
What's Next in Growth? 2016What's Next in Growth? 2016
What's Next in Growth? 2016Andrew Chen
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsBarry Feldman
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome EconomyHelge Tennø
 
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your BusinessBarry Feldman
 

Viewers also liked (7)

The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...
 
Open Source Creativity
Open Source CreativityOpen Source Creativity
Open Source Creativity
 
Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)
 
What's Next in Growth? 2016
What's Next in Growth? 2016What's Next in Growth? 2016
What's Next in Growth? 2016
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post Formats
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome Economy
 
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
 

Similar to ON 2-REPEATED SOLID BURST ERRORS

Performance Analysis of Steepest Descent Decoding Algorithm for LDPC Codes
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC CodesPerformance Analysis of Steepest Descent Decoding Algorithm for LDPC Codes
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC Codesidescitation
 
Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...
Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...
Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...IJERA Editor
 
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...ijitjournal
 
Design of arq and hybrid arq protocols for wireless channels using bch codes
Design of arq and hybrid arq protocols for wireless channels using bch codesDesign of arq and hybrid arq protocols for wireless channels using bch codes
Design of arq and hybrid arq protocols for wireless channels using bch codesIAEME Publication
 
An Efficient Fault Tolerance System Design for Cmos/Nanodevice Digital Memories
An Efficient Fault Tolerance System Design for Cmos/Nanodevice Digital MemoriesAn Efficient Fault Tolerance System Design for Cmos/Nanodevice Digital Memories
An Efficient Fault Tolerance System Design for Cmos/Nanodevice Digital MemoriesIJERA Editor
 
BCH Decoder Implemented On CMOS/Nano Device Digital Memories for Fault Tolera...
BCH Decoder Implemented On CMOS/Nano Device Digital Memories for Fault Tolera...BCH Decoder Implemented On CMOS/Nano Device Digital Memories for Fault Tolera...
BCH Decoder Implemented On CMOS/Nano Device Digital Memories for Fault Tolera...inventy
 
Application of Fuzzy Algebra in Coding Theory
Application of Fuzzy Algebra in Coding TheoryApplication of Fuzzy Algebra in Coding Theory
Application of Fuzzy Algebra in Coding TheoryIJERA Editor
 
Application of Fuzzy Algebra in Coding Theory
Application of Fuzzy Algebra in Coding TheoryApplication of Fuzzy Algebra in Coding Theory
Application of Fuzzy Algebra in Coding TheoryIJERA Editor
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Speech recognition using vector quantization through modified k means lbg alg...
Speech recognition using vector quantization through modified k means lbg alg...Speech recognition using vector quantization through modified k means lbg alg...
Speech recognition using vector quantization through modified k means lbg alg...Alexander Decker
 
Hamming net based Low Complexity Successive Cancellation Polar Decoder
Hamming net based Low Complexity Successive Cancellation Polar DecoderHamming net based Low Complexity Successive Cancellation Polar Decoder
Hamming net based Low Complexity Successive Cancellation Polar DecoderRSIS International
 
Conception of a new Syndrome Block for BCH codes with hardware Implementation...
Conception of a new Syndrome Block for BCH codes with hardware Implementation...Conception of a new Syndrome Block for BCH codes with hardware Implementation...
Conception of a new Syndrome Block for BCH codes with hardware Implementation...IJERA Editor
 
Damage detection in cfrp plates by means of numerical modeling of lamb waves ...
Damage detection in cfrp plates by means of numerical modeling of lamb waves ...Damage detection in cfrp plates by means of numerical modeling of lamb waves ...
Damage detection in cfrp plates by means of numerical modeling of lamb waves ...eSAT Journals
 
On solving coverage problems in a wireless sensor networks using diagrams
On solving coverage problems in a wireless sensor networks using diagrams On solving coverage problems in a wireless sensor networks using diagrams
On solving coverage problems in a wireless sensor networks using diagrams marwaeng
 
Dynamic time wrapping (dtw), vector quantization(vq), linear predictive codin...
Dynamic time wrapping (dtw), vector quantization(vq), linear predictive codin...Dynamic time wrapping (dtw), vector quantization(vq), linear predictive codin...
Dynamic time wrapping (dtw), vector quantization(vq), linear predictive codin...Tanjarul Islam Mishu
 
An Algorithm For Vector Quantizer Design
An Algorithm For Vector Quantizer DesignAn Algorithm For Vector Quantizer Design
An Algorithm For Vector Quantizer DesignAngie Miller
 
Mimo radar detection in compound gaussian clutter using orthogonal discrete f...
Mimo radar detection in compound gaussian clutter using orthogonal discrete f...Mimo radar detection in compound gaussian clutter using orthogonal discrete f...
Mimo radar detection in compound gaussian clutter using orthogonal discrete f...ijma
 
Analysis of LDPC Codes under Wi-Max IEEE 802.16e
Analysis of LDPC Codes under Wi-Max IEEE 802.16eAnalysis of LDPC Codes under Wi-Max IEEE 802.16e
Analysis of LDPC Codes under Wi-Max IEEE 802.16eIJERD Editor
 
The Last Line Effect
The Last Line EffectThe Last Line Effect
The Last Line EffectAndrey Karpov
 

Similar to ON 2-REPEATED SOLID BURST ERRORS (20)

Performance Analysis of Steepest Descent Decoding Algorithm for LDPC Codes
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC CodesPerformance Analysis of Steepest Descent Decoding Algorithm for LDPC Codes
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC Codes
 
Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...
Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...
Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...
 
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...
 
Design of arq and hybrid arq protocols for wireless channels using bch codes
Design of arq and hybrid arq protocols for wireless channels using bch codesDesign of arq and hybrid arq protocols for wireless channels using bch codes
Design of arq and hybrid arq protocols for wireless channels using bch codes
 
An Efficient Fault Tolerance System Design for Cmos/Nanodevice Digital Memories
An Efficient Fault Tolerance System Design for Cmos/Nanodevice Digital MemoriesAn Efficient Fault Tolerance System Design for Cmos/Nanodevice Digital Memories
An Efficient Fault Tolerance System Design for Cmos/Nanodevice Digital Memories
 
BCH Decoder Implemented On CMOS/Nano Device Digital Memories for Fault Tolera...
BCH Decoder Implemented On CMOS/Nano Device Digital Memories for Fault Tolera...BCH Decoder Implemented On CMOS/Nano Device Digital Memories for Fault Tolera...
BCH Decoder Implemented On CMOS/Nano Device Digital Memories for Fault Tolera...
 
Application of Fuzzy Algebra in Coding Theory
Application of Fuzzy Algebra in Coding TheoryApplication of Fuzzy Algebra in Coding Theory
Application of Fuzzy Algebra in Coding Theory
 
Application of Fuzzy Algebra in Coding Theory
Application of Fuzzy Algebra in Coding TheoryApplication of Fuzzy Algebra in Coding Theory
Application of Fuzzy Algebra in Coding Theory
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Speech recognition using vector quantization through modified k means lbg alg...
Speech recognition using vector quantization through modified k means lbg alg...Speech recognition using vector quantization through modified k means lbg alg...
Speech recognition using vector quantization through modified k means lbg alg...
 
Hamming net based Low Complexity Successive Cancellation Polar Decoder
Hamming net based Low Complexity Successive Cancellation Polar DecoderHamming net based Low Complexity Successive Cancellation Polar Decoder
Hamming net based Low Complexity Successive Cancellation Polar Decoder
 
K505028085
K505028085K505028085
K505028085
 
Conception of a new Syndrome Block for BCH codes with hardware Implementation...
Conception of a new Syndrome Block for BCH codes with hardware Implementation...Conception of a new Syndrome Block for BCH codes with hardware Implementation...
Conception of a new Syndrome Block for BCH codes with hardware Implementation...
 
Damage detection in cfrp plates by means of numerical modeling of lamb waves ...
Damage detection in cfrp plates by means of numerical modeling of lamb waves ...Damage detection in cfrp plates by means of numerical modeling of lamb waves ...
Damage detection in cfrp plates by means of numerical modeling of lamb waves ...
 
On solving coverage problems in a wireless sensor networks using diagrams
On solving coverage problems in a wireless sensor networks using diagrams On solving coverage problems in a wireless sensor networks using diagrams
On solving coverage problems in a wireless sensor networks using diagrams
 
Dynamic time wrapping (dtw), vector quantization(vq), linear predictive codin...
Dynamic time wrapping (dtw), vector quantization(vq), linear predictive codin...Dynamic time wrapping (dtw), vector quantization(vq), linear predictive codin...
Dynamic time wrapping (dtw), vector quantization(vq), linear predictive codin...
 
An Algorithm For Vector Quantizer Design
An Algorithm For Vector Quantizer DesignAn Algorithm For Vector Quantizer Design
An Algorithm For Vector Quantizer Design
 
Mimo radar detection in compound gaussian clutter using orthogonal discrete f...
Mimo radar detection in compound gaussian clutter using orthogonal discrete f...Mimo radar detection in compound gaussian clutter using orthogonal discrete f...
Mimo radar detection in compound gaussian clutter using orthogonal discrete f...
 
Analysis of LDPC Codes under Wi-Max IEEE 802.16e
Analysis of LDPC Codes under Wi-Max IEEE 802.16eAnalysis of LDPC Codes under Wi-Max IEEE 802.16e
Analysis of LDPC Codes under Wi-Max IEEE 802.16e
 
The Last Line Effect
The Last Line EffectThe Last Line Effect
The Last Line Effect
 

More from ijfcstjournal

A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLESA COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLESijfcstjournal
 
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...ijfcstjournal
 
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...ijfcstjournal
 
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...ijfcstjournal
 
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...ijfcstjournal
 
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDINGAN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDINGijfcstjournal
 
EAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITYEAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITYijfcstjournal
 
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHSEDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHSijfcstjournal
 
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEMCOMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEMijfcstjournal
 
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMSPSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMSijfcstjournal
 
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...ijfcstjournal
 
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTINGA MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTINGijfcstjournal
 
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...ijfcstjournal
 
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCHA NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCHijfcstjournal
 
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKSAGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKSijfcstjournal
 
International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)ijfcstjournal
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESijfcstjournal
 
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...ijfcstjournal
 
A STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMS
A STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMSA STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMS
A STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMSijfcstjournal
 
A LOCATION-BASED MOVIE RECOMMENDER SYSTEM USING COLLABORATIVE FILTERING
A LOCATION-BASED MOVIE RECOMMENDER SYSTEM USING COLLABORATIVE FILTERINGA LOCATION-BASED MOVIE RECOMMENDER SYSTEM USING COLLABORATIVE FILTERING
A LOCATION-BASED MOVIE RECOMMENDER SYSTEM USING COLLABORATIVE FILTERINGijfcstjournal
 

More from ijfcstjournal (20)

A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLESA COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
 
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
 
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
 
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
 
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
 
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDINGAN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
 
EAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITYEAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITY
 
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHSEDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
 
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEMCOMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
 
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMSPSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
 
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
 
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTINGA MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
 
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
 
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCHA NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
 
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKSAGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
 
International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMES
 
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
 
A STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMS
A STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMSA STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMS
A STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMS
 
A LOCATION-BASED MOVIE RECOMMENDER SYSTEM USING COLLABORATIVE FILTERING
A LOCATION-BASED MOVIE RECOMMENDER SYSTEM USING COLLABORATIVE FILTERINGA LOCATION-BASED MOVIE RECOMMENDER SYSTEM USING COLLABORATIVE FILTERING
A LOCATION-BASED MOVIE RECOMMENDER SYSTEM USING COLLABORATIVE FILTERING
 

Recently uploaded

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 

ON 2-REPEATED SOLID BURST ERRORS

  • 1. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.3, May 2013 DOI:10.5121/ijfcst.2013.3304 41 ON 2-REPEATED SOLID BURST ERRORS P. K. Das Department of Mathematics, Shivaji College (University of Delhi), Raja Garden, Ring Road, New Delhi, India pankaj4thapril@yahoo.co.in ABSTRACT There are several kinds of errors for which error detecting and error correcting codes have been constructed. Solid burst errors are common in many communications. In general communication due to the long messages, the strings of solid bursts of small length may repeat in a vector itself. The concept of repeated bursts is introduced by Beraradi, Dass and Verma[3] which has opened a new area of study. They defined 2-repeated bursts and obtained results for detection and correction of such type of errors. This paper considers a new similar kind of error which will be termed as '2-repeated solid burst error of length b'. Lower and upper bounds on the number of parity checks required for the existence of codes that detect 2-repeated solid burst error of length b or less are obtained. This is followed by an example of such a code. Further, codes capable of detecting and simultaneously correcting such errors have also been dealt with. KEYWORDS Parity check matrix, syndrome, standard array, solid bursts error 1. INTRODUCTION Investigations in coding theory have been made in several directions but one of the most important aspects considered has been the detection and correction of errors. The nature of errors differs from channel to channel depending upon the behaviour of channels. Due to various channels with the possibility of occurrence of solid burst error (viz. semiconductor memory data [5], supercomputer storage system [1]), solid burst error is one of the important area for mathematicians to study. For study on solid burst, one may refer to [9, 10, 12, etc]. This paper also presents a study on solid burst error, but not occurring in ordinary way. In very busy communication channels, it is observed that errors repeat themselves. So is a situation when errors need to consider in repeated form. In this direction, an error pattern, called 2-repeated burst has been introduced by Dass, Verma and Berardi [3]. This is an extension of the idea of open-loop burst given by Fire [4]. Later on Dass and Verma [2] defined m-repeated bursts and obtained results regarding the number of parity-check digits required for codes detecting such errors. Some results have been obtained on weights of such errors by Sharma and Rohtagi [11]. This paper introduces yet another kind of a repeated error, termed as '2-repeated solid burst of length b' and presents a study on such errors. The paper is organized as follows. Basic definitions, related to our study are stated with some examples in Section 2. In Section 3, bounds on the parity checks for a code that detects 2-repeated solid bursts of length b or less are obtained. This is followed by an illustration of such a code in section 4. Section 5 gives a bound on code for simultaneous detection and correction of such errors.
  • 2. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.3, May 2013 42 In what follows a linear code will be considered as a subspace of the space of all n-tuples over GF(q). The distance between two vectors shall be considered in the Hamming sense. 2. PRELIMINARIES The definition of a solid burst may be given as follows: Definition 1. A solid burst of length b is a vector whose all the b-consecutive components are non zero and rest are zero. A vector may have not just one solid burst errors, but more than one. Putting them together into one burst amounts to neglecting the nature of communication and unnecessarily considering a longer solid burst. In a very busy communication channel, sometimes solid bursts repeat themselves. In view of this, a kind of 2-repeated solid burst of length b is required to be considered. The paper obtains lower and upper bounds for a code detecting 2-repeated solid burst of length b or less, also presents the case when simultaneous detection and correction is required. A 2-repeated solid burst of length b may be defined as follows: Definition 2. A 2-repeated solid burst of length b is a vector of length n whose only nonzero components are confined consecutively to two distinct sets of b consecutive components. As an illustration (1100011000) is a 2-repeated solid burst of length 2 (upto 5) whereas (0000100100) is a 2-repeated burst of length 3 or less. Also the vector (122211111100) may be considered to be a 2-repeated solid burst of length 5 or 6. The development of codes detecting and correcting such errors may prove to be useful for channels already dealing with multiple solid burst errors improving upon their efficiency as such errors are relatively simpler to handle. Such codes emerge as a natural generalization of single solid burst error detecting and correcting codes. 3. DETECTION OF 2-REPEATED SOLID BURST ERROR Consider the linear codes that are capable of detecting any 2-repeated solid burst of length b or less. Clearly, the patterns to be detected should not be code words. In other words, codes are considered which have no 2-repeated solid burst of length b or less as a code word. Firstly, a lower bound over the number of parity-check digits required for such a code is obtained. Theorem 1. Any (n, k) linear code over GF(q) that detects any 2-repeated solid burst of length b or less must have at least        b i i q qloq 0 )1(2 parity-check digits. Proof. The result will be proved on the basis that no detectable error vector can be a code word. Let V be an (n, k) linear code over GF(q). Let X be the set of all vectors such that all non zero components are confined consecutively (starting from the positions) in some two distinct fixed set of b consecutive components. We claim that no two vectors of the set X can belong to the same coset of the standard array; else a code word shall be expressible as a sum or difference of two error vectors. Assume on the contrary that there is a pair, say x1, x2 in X belonging to the same coset of the standard array. Their difference viz. x1 -x2 must be a code vector. But x1 -x2 is a vector all of
  • 3. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.3, May 2013 43 whose non-zero components occur consecutively in the same two fixed b components and so is a member of X, i.e., x1 -x2 is an 2-repeated solid bursts of length b or less, which is a contradiction. Thus all the vectors in X must belong to distinct cosets of the standard array. The number of such vectors, including all zero vector, over GF(q) is clearly 2 0 )1(        b i i q . (1) The theorem follows since there must be at least this number of cosets and number of available is qn-k . An upper bound on the number of check digits required for the construction of a linear code is provided in the following theorem. This bound assures the existence of a linear code that can detect all 2-repeated solid bursts of length b or less. The bound has been obtained by the well known technique used in Varshomov-Gilbert Sacks bound by constructing a parity check matrix for such a code (refer Sacks [8], also theorem 4.7 Peterson and Weldon [6]). Theorem 2. There exists an (n, k) linear code over GF(q) that has no 2-repeated solid bursts of length b or less as a code word provided that      b i b l likn linqq 1 1 0 ).()1(1 (2) Proof. The existence of such a code will be shown by constructing an appropriate (n - k) × n parity-check matrix H. The requisite parity-check matrix H shall be constructed as follows. Select any non-zero (n - k)-tuples as the first column. Subsequent columns are added to H such that after having selected the first j-1 columns h1, h2, ..., hj-1; the jth column hj is added provided that ).....().....( 11112211   sisiiiiiljljjj hvhvhvhuhuhuh (3) where );(, qGFvu ii  bs  and hi’s in the second bracket are any s consecutive columns among the first j-l-1 columns, l = 0, 1, 2, . . ., (b-1) . Thus coefficients iu form a solid burst of length l and the coefficients iv form a solid burst of length b or less in a ( j-l-1)-tuple. This condition ensures that no 2-repeated solid burst of length b or less will be a code word. The number of choices of these coefficients can be calculated as follows: If iu is chosen to be a solid burst of length 0, then the number of solid bursts of length b or less in a (j-1)-tuple is   b i i ijq 1 )11()1( . (4) If iu is chosen to be a solid burst of length 1, then the number of solid bursts of length b or less in a (j-2)-tuple is
  • 4. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.3, May 2013 44   b i i ijq 1 )12()1( . (5) If iu is chosen to be a solid burst of length 3, then the number of solid bursts of length b or less in a (j-3)-tuple is   b i i ijq 1 )13()1( . (6) Continuing the process, if iu is chosen to be a solid burst of length b-1, then the number of solid bursts of length b or less in a (j-b)-tuple is   b i i ibjq 1 )1()1( . (7) Therefore, the total number of possible choices of the coefficients iu and iv , is   b i i ijq 1 )11()1( + (q-1)   b i i ijq 1 )12()1( + (q-1)2   b i i ijq 1 )13()1( +. . . . . . .+ (q-1)b-1   b i i ibjq 1 )1()1( , which is equal to      b i b l li lijq 1 1 0 ).()1( (8) At worst, all these linear combinations might yield a distinct sum. Therefore a column hj can be added to H provided that      b i b l likn lijqq 1 1 0 ).()1(1 (9) For a code of length n, replacing j by n gives the result. □ 4. ILLUSTRATION Example. Consider a (7, 2) binary code with parity check matrix H=                 1010000 1101000 1100100 1100010 0100001
  • 5. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.3, May 2013 45 This matrix has been constructed by the synthesis procedure, outlined in the proof of Theorem 2, by taking q = 2, n = 7 and b = 2. It can be seen from Table 1 that the syndromes of the different 2- repeated solid bursts of length 2 or less are nonzero, showing thereby that the code that is the null space of this matrix can detect all 2-repeated solid bursts of length 2 or less. Table 1 Error patterns Syndromes Error patterns Syndromes 1000000 10000 1100000 11000 1010000 10100 1001000 10010 1000100 10001 1000010 01110 1000001 11111 1110000 11100 1011000 10110 1001100 10011 1000110 01111 1000011 00001 0100000 01000 0110000 01100 0101000 01010 0100100 01001 0100010 10110 0100001 00111 0111000 01110 0101100 01011 0100110 10110 0100011 11001 0010000 00100 0011000 00110 0010100 00101 0010010 11010 0010001 01011 0001000 00010 0001100 00011 0001010 11100 0001001 01101 0001110 11101 0001011 10011 0000100 00001 0000110 11111 0000101 01110 0000111 10000 0000010 11110 0000011 10001 0000001 01111 1101000 11010 1100100 11001 1100010 00110 1100001 10111 1111000 11110 1101100 11011 1100110 00111 1100011 01001 0110100 01101 0110010 10010 0110001 00011 0111100 01111 0110110 10011 0110011 11101 0011010 11000 0011001 01001 0011110 11001 0011011 10111 0001101 01100 0001111 10010 5. SIMULTANEOUS DETECTION AND CORRECTION OF 2-REPEATED SOLID BURST ERRORS This section determines extended Reiger's bound (refer [8]; also Theorem 4.15, Peterson and Weldon[7] ) for simultaneous detection and correction of 2-repeated solid bursts of length b or less. The following theorem gives a bound on the number of parity-check digits for a linear code that simultaneously detects and corrects such errors. Theorem 3. An (n, k) linear code over GF(q) that corrects all 2- repeated solid bursts of length b or less must have at least        b i i q qloq 2 0 )1(2 parity-check digits. Further, if the code corrects all
  • 6. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.3, May 2013 46 2-repeated solid bursts of length b or less and simultaneously detects 2-repeated solid bursts of length d (d > b) or less then the code must have at least          db i i q qloq 0 )1(2 parity-check digits. Proof. To prove the first part, consider a solid burst of length 4b or less. Such a vector is expressible as a sum or difference of two vectors, each of which is a 2-repeated solid burst of length b or less. These component vectors must belong to different cosets of the standard array because both such errors are correctable errors. Accordingly, such a vector viz. solid burst of length 4b or less can not be a code vector. A solid burst of length 4b or less is also a 2-repeated solid burst of length 2b or less. Applying Theorem 1, such a code must have at least        b i i q qloq 2 0 )1(2 parity-check digits. Further, consider a solid burst of length 2(b + d) or less. Such a vector is expressible as a sum or difference of two vectors, one of which is a 2-repeated solid burst of length b or less and the other is a 2-repeated solid burst of length d or less. Both such component vectors, one being a detectable error and the other being a correctable error, can not belong to the same coset of the standard array. Therefore such a vector can not be a code vector, i.e., a 2-repeated solid burst of length b + d or less can not be a code vector. Hence the code must have at least          db i i q qloq 0 )1(2 parity check digits. 6. CONCLUSION The paper presents lower and upper bounds for a code detecting 2-repeated solid burst of length b or less, also presents the case when simultaneous detection and correction is required. As correction of errors, if possible, is more important than detection of errors, the codes correcting such errors may be quite useful study. ACKNOWLEDGEMENT The author is thankful to Prof. B.K. Dass, Department of Mathematics, University of Delhi and Dr. V.K. Tyagi, Department of Mathematics, Shyamlal college(Eve.), University of Delhi for their suggestions. REFERENCES [1] Arlat, J. & Carter, W. C., (1984) “Implementation and Evaluation of a (b,k)-Adjacent Error- Correcting/Detecting Scheme for Supercomputer Systems”, IBM J. Res. Develop., Vol. 28, No. 2, pp. 159-169. [2] Dass, B. K., & Verma, R., (2009) “Repeated Burst Error Detecting Linear Codes”, Ratio Mathematica Journal of Applied Mathematics, Vol. 19, pp. 25-30. [3] Dass, B. K., Verma, R. & Berardi, L., (2009) “On 2-Repeated Burst Error Detecting Codes”, Journal of Statistical Theory and Practice, Vol. 3, pp. 381-391. [4] Fire, P., (1959) “A Class of Multiple-Error-Correcting Binary Codes for Non-Independent Errors”, Sylvania Report RSL-E-2, Sylvania Reconnaissance System Laboratory, Mountain View, Calif. 12 [5] Jensen, D. W., (2003) “Block code to efficiently correct adjacent data and/or check bit errors”, Patent number: US 6604222 B1, Date of Patent Aug 5,(www.google.com/patents/US6604222). [6] Peterson, W.W. & Weldon(Jr.), E. J., (1972) Error-Correcting Codes, 2nd edition, The MIT Press, Mass.
  • 7. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.3, May 2013 47 [7] Reiger, S. H., (1960) “Codes for the Correction of Clustered Errors”, IRE Trans. Inform. Theory,IT-6, pp. 16-21. [8] Sacks, G. E., (1958) “Multiple error correction by means of parity-checks”, IRE Trans. Inform. Theory, IT-4(December), pp. 145-147. [9] Schillinger, A. G., (1964) “A class of solid burst error correcting codes”, Polytechnic Institute of Brooklyn , N.Y., Research Rept. PIBMRI, April, pp. 1223-64. [10] Sharma, B. D. & Dass, B. K., (1977) “Adjacent error correcting binary perfect codes”, J. Cybernetics, No.7, pp. 9-13. [11] Sharma, B. D., & Rohtagi, B., (2011) “Some Results on Weights of Vectors Having 2-Repeated Bursts”, Cybernetics and Information Technologies, Vol. 11, No 1, pp. 36-44. [12] Shiva, S. G. S. & Sheng, C. L., (1969) “Multiple solid burst-error- correcting binary codes”. IEEE Trans. Inform. Theory, IT-15, pp. 188-189. Author Pankaj Kumar Das is currently working in the Department of Mathematics, Shivaji College (University of Delhi), Delhi as Assistant Professor. He was born at Goalpara, Assam (India). He graduated from Goalpara College (Gauhati University), Assam in 1998. In 2000, he got his M.Sc. degree in Mathematics from University of Delhi, Delhi. He received M.Phil. degree in Mathematics from the same university in 2005. He has given talks at national/international conferences. His area of research is Coding Theory.