National Repository of Grey Literature 5 records found  Search took 0.00 seconds. 
Data protection in SRAM type memory with error correction code
Záhora, Jakub ; Fujcik, Lukáš (referee) ; Dvořák, Vojtěch (advisor)
The thesis contains basic concepts necessary for understanding the theory of coding. It then explains the parameters that will be monitored for the described codes. Based on the criteria, it selects the BCH code and the Extended Hamming Code, as appropriate, and further compares their properties to select a more efficient code from this pair. As a result of the comparison, it selects the Extended Hamming Code as more suitable for the subsequent design of the program. The code design procedures, tests that verify the functionality of the code, and the resources used for the Spartan-3 circuit to implement the code for the Spartan-3 circuit are then shown.
An Encoder and Decoder of an Error-correction Code for Programmable Read-only Memories
Bareš, Jan ; Dvořák, Vojtěch (referee) ; Šťáva, Martin (advisor)
This work deals with theory of coding, analyses current groups of error correction codes and describes features and parametres of chosen representatives of these groups. By comparing these parametres along with given criteria it choses extended Hamming code as suitable code for securing read-only-memories (ROM). For this code it choses way of realization of synthetisable modules of coder and decoder and describes their design. The work describes design of synthetizable modules of coder and decoder in VHDL. Then it explains functionality of created application which is able to generate these synthetisable modules. For verification of generated modules it creates authentication environment. Part of this environment is also model of ROM allowing writing of any error value into the memory. In the end it automatically verifies generated modules of coder and decoder with various width of input information vector.
Analysis of Computational Effort of Self-Correcting Codes
Bártů, Tomáš ; Drábek, Vladimír (referee) ; Bidlo, Michal (advisor)
The work deals with error-correcting codes, specifically encoding and decoding Reed-Solomon codes. An introduction to error-correcting codes is provided, followed by a description of the encoding and decoding principle of Reed-Solomon codes using the Petterson-Gorenstein-Zierler, Berlekamp-Massey, and Euclidean algorithms. Implementation is then described, which realizes some of the mentioned algorithms. This is followed by experiments with applications that compare the time and iteration complexity of the encoding and decoding processes.
Data protection in SRAM type memory with error correction code
Záhora, Jakub ; Fujcik, Lukáš (referee) ; Dvořák, Vojtěch (advisor)
The thesis contains basic concepts necessary for understanding the theory of coding. It then explains the parameters that will be monitored for the described codes. Based on the criteria, it selects the BCH code and the Extended Hamming Code, as appropriate, and further compares their properties to select a more efficient code from this pair. As a result of the comparison, it selects the Extended Hamming Code as more suitable for the subsequent design of the program. The code design procedures, tests that verify the functionality of the code, and the resources used for the Spartan-3 circuit to implement the code for the Spartan-3 circuit are then shown.
An Encoder and Decoder of an Error-correction Code for Programmable Read-only Memories
Bareš, Jan ; Dvořák, Vojtěch (referee) ; Šťáva, Martin (advisor)
This work deals with theory of coding, analyses current groups of error correction codes and describes features and parametres of chosen representatives of these groups. By comparing these parametres along with given criteria it choses extended Hamming code as suitable code for securing read-only-memories (ROM). For this code it choses way of realization of synthetisable modules of coder and decoder and describes their design. The work describes design of synthetizable modules of coder and decoder in VHDL. Then it explains functionality of created application which is able to generate these synthetisable modules. For verification of generated modules it creates authentication environment. Part of this environment is also model of ROM allowing writing of any error value into the memory. In the end it automatically verifies generated modules of coder and decoder with various width of input information vector.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.