• Title/Summary/Keyword: Undetected error

Search Result 16, Processing Time 0.022 seconds

Analysis of CRC-p Code Performance and Determination of Optimal CRC Code for VHF Band Maritime Ad-hoc Wireless Communication (CRC-p 코드 성능분석 및 VHF 대역 해양 ad-hoc 무선 통신용 최적 CRC 코드의 결정)

  • Cha, You-Gang;Cheong, Cha-Keon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.6A
    • /
    • pp.438-449
    • /
    • 2012
  • This paper presents new CRC-p codes for VHF band maritime wireless communication system based on performance analysis of various CRC codes. For this purpose, we firstly describe the method of determination of undetected error probability and minimum Hamming distance according to variation of CRC codeword length. By using the fact that the dual code of cyclic Hamming code and primitive BCH code become maximum length codes, we present an algorithm for computation of undetected error probability and minimum Hamming distance where the concept of simple hardware that is consisted of linear feedback shift register is utilized to compute the weight distribution of CRC codes. We also present construction of transmit data frame of VHF band maritime wireless communication system and specification of major communication parameters. Finally, new optimal CRC-p codes are presented based on the simulation results of undetected error probability and minimum Hamming distance using the various generator polynomials of CRC codes, and their performances are evaluated with simulation results of bit error rate based on the Rician maritime channel model and ${\pi}$/4-DQPSK modulator.

Performance Analysis of CRC Error Detecting Codes (CRC 오류검출부호의 성능 분석)

  • 염흥렬;권주한;양승두;이만영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.14 no.6
    • /
    • pp.590-603
    • /
    • 1989
  • In tnis paper, the CRC-CCITT code and primitive polynomial CRC code are selected for analysing error detecting performance. However, general formulas for obtaining the weight distribution of these two CRC codes are not so far dericed. So, a new method for calculating the weight distribution of the shortened cyclic Hamming code is presented and an undetected error probability of these two codes is obtained when used in cell of ATM for broadband ISDN user-network interface. Consequently, we show that CRC code too much does affect its error detection performance. All the computer simulation is performed by IBM PC/AT.

  • PDF

CRC-Turbo Concatenated Code for Hybrid ARQ System

  • Kim, Woo-Tae;Kim, Jeong-Goo;Joo, Eon-Kyeong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.3C
    • /
    • pp.195-204
    • /
    • 2007
  • The cyclic redundancy check(CRC) code used to decide retransmission request in hybrid automatic repeat request(HRAQ) system can also be used to stop iterative decoding of turbo code if it is used as an error correcting code(ECC) of HARQ system. Thus a scheme to use CRC code for both iteration stop and repeat request in the HARQ system with turbo code based on the standard of cdma 2000 system is proposed in this paper. At first, the optimum CRC code which has the minimum length without performance degradation due to undetected errors is found. And the most appropriate turbo encoder structure is also suggested. As results, it is shown that at least 32-bit CRC code should be used and a turbo code with 3 constituent encoders is considered to be the most appropriate one.

Erasure decoding strategies for RS product code reducing undetected error rate (검출 불능 오류율을 향상기키는 Reed-Solomon 적부호의 이레이져 복호방법)

  • 김정헌;염창열;송홍엽;강구호;김순태;백세현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.4B
    • /
    • pp.427-436
    • /
    • 2001
  • RS product codes are widely used in digital storage systems. There are lots of decoding strategies for product code for short-length RS codes. Unfortunately many of them cannot be applied to long-length RS product codes because of the complexity of decoder. This paper proposes new decoding strategies which can be used in long length RS product codes.

  • PDF

A Study on Improvement of Just Safety Culture in Aviation Maintenance (항공정비 분야의 공정한 안전문화 개선방안에 관한 연구)

  • Kim, Chun-Yong
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.20 no.4
    • /
    • pp.84-90
    • /
    • 2012
  • Aviation Maintenance Technician(AMT)'s error is not directly link to deficiency which is differ to flight crew's error and it potentially maintains. Due to it usually occur as undesired aircraft state, hazards, like unreported maintenance error or near miss fortunately undetected and are not develop to accident. This could be a crucial influence of an accident occurrence. To remove these hazards, just safety culture should be support that anyone can report about safety problems and person who reported safety problems and hazards like near miss, should not get disadvantages. Also if it is satisfied, they must exempt for punishment and guaranteed for security. Hence, on this study, aviation maintenance site's just culture need to be researched and analysed about improvement for aviation maintenance field's positive just culture.

Fault diagnosis of a logical circuit by use of input grouping method

  • Miyata, Chikara;Kashiwagi, Hiroshi
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1996.10a
    • /
    • pp.279-282
    • /
    • 1996
  • The authors have already proposed a method for grouping of inputs of a logical circuit under test (LCUT) by use of M-sequence correlation. We call this method as input grouping (IG) method. In this paper, the authors propose a new method to estimate the faulty part in the circuit by use of IG when some information on the candidate of faulty part can be obtained beforehand. The relationship between IG and fault probabilities of a LCUT, and undetected fault ratios are investigated for various cases. Especially the investigation was made in case where the IG was calculated by use of n correlation functions (I $G_{inp}$). From the theoretical study and simulation results it is shown that the estimation error ratio of fault probabilities and undetected fault ratio of LCUT are sufficiently small even when only a part of correlation functions are used. It is shown that the number of correlation functions which are to be memorized to calculate IG can be considerably reducible from 2$^{n}$ - 1 to n by use of I $G_{inp}$. So this method would be very useful for a fault diagnosis of actual logic circuit.uit.

  • PDF

A study on the characteristics on the error of the flight crew (운항승무원 실수 특성에 관한 연구 : LOSA를 중심으로)

  • Choi, Jin-Kook;Kim, Chil-Young
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.17 no.2
    • /
    • pp.62-67
    • /
    • 2009
  • LOSA is a flight safety program that analyses human errors in normal operations. Trained pilot observers monitor the normal flights at the observer seat. LOSA is a proactive non jeopardy data collection tool using threat and error management(TEM) as a framework. With the analysis of crew behaviors through LOSA with The LOSA collaborative(TLC), the airlines can identify the behaviors of the crew during normal operations. The major objective of LOSA is to measure how the crew manage threats, errors and undesired aircraft deviations in the cockpit on day to day operations. The airlines are able to set up effective TEM training with practical six generation Crew recourse management(CRM) with data of error from LOSA instead of theoretical CRM courses. The Airlines can use TEM as an integral part of a Safety Management System(SMS) and uses monitoring and cross-checking skills in the flight operations to manage threats and errors effectively when we know the errors we make in the cockpit on daily operation. The result of LOSA indicates that the error detection rate should be enhanced since around the half of the errors went undetected. The areas which should be focused for enhancing the error detection are monitor, cross-check, the management of workload, automation and taxiway/ runway to manage errors effectively.

  • PDF

Validation of MODIS fire product over Sumatra and Borneo using High Resolution SPOT Imagery

  • LIEW, Soo-Chin;SHEN, Chaomin;LOW, John;Lim, Agnes;KWOH, Leong-Keong
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.1149-1151
    • /
    • 2003
  • We performed a validation study of the MODIS active fire detection algorithm using high resolution SPOT image as the reference data set. Fire with visible smoke plumes are detected in the SPOT scenes, while the hotspots in MODIS data are detected using NASA's new version 4 fire detection algorithm. The detection performance is characterized by the commission error rate (false alarms) and the omission error rate (undetected fires). In the Sumatra and Kalimantan study area, the commission rate and the omission rate are 27% and 34% respectively. False alarms are probably due to recently burnt areas with warm surfaces. False negative detection occur where there are long smoke plumes and where fires occur in densely vegetated areas.

  • PDF

Control Flow Checking at Virtual Edges

  • Liu, LiPing;Ci, LinLin;Liu, Wei;Yang, Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.1
    • /
    • pp.396-413
    • /
    • 2017
  • Dynamically checking the integrity of software at run-time is always a hot and difficult spot for trusted computing. Control-flow integrity is a basic and important safety property of software integrity. Many classic and emerging security attacks who introduce illegal control-flow to applications can cause unpredictable behaviors of computer-based systems. In this paper, we present a software-based approach to checking violation of control flow integrity at run-time. This paper proposes a high-performance and low-overhead software control flow checking solution, control flow checking at virtual edges (CFCVE). CFCVE assigns a unique signature to each basic block and then inserts a virtual vertex into each edge at compile time. This together with insertion of signature updating instructions and checking instructions into corresponding vertexes and virtual vertexes. Control flow faults can be detected by comparing the run-time signature with the saved one at compile time. Our experimental results show that CFCVE incurs only 10.61% performance overhead on average for several C benchmark programs and the average undetected error rate is only 9.29%. Compared with previous techniques, CFCVE has the characteristics of both high fault coverage and low memory and performance overhead.

A Configurable Software-based Approach for Detecting CFEs Caused by Transient Faults

  • Liu, Wei;Ci, LinLin;Liu, LiPing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.5
    • /
    • pp.1829-1846
    • /
    • 2021
  • Transient faults occur in computation units of a processor, which can cause control flow errors (CFEs) and compromise system reliability. The software-based methods perform illegal control flow detection by inserting redundant instructions and monitoring signature. However, the existing methods not only have drawbacks in terms of performance overhead, but also lack of configurability. We propose a configurable approach CCFCA for detecting CFEs. The configurability of CCFCA is implemented by analyzing the criticality of each region and tuning the detecting granularity. For critical regions, program blocks are divided according to space-time overhead and reliability constraints, so that protection intensity can be configured flexibly. For other regions, signature detection algorithms are only used in the first basic block and last basic block. This helps to improve the fault-tolerant efficiency of the CCFCA. At the same time, CCFCA also has the function of solving confusion and instruction self-detection. Our experimental results show that CCFCA incurs only 10.61% performance overhead on average for several C benchmark program and the average undetected error rate is only 9.29%. CCFCA has high error coverage and low overhead compared with similar algorithms. This helps to meet different cost requirements and reliability requirements.