scholarly journals Error Control Coding for Flash Memory

10.5772/18803 ◽  
2011 ◽  
Author(s):  
Haruhiko Kaneko
Author(s):  
V.K. Bhargava ◽  
T. Le-Ngoc ◽  
Y.R. Shayan

2021 ◽  
Author(s):  
Sheldon Mark Foulds

Over the last few years evolution in electronics technology has led to the shrinkage of electronic circuits. While this has led to the emergence of more powerful computing systems it has also caused a dramatic increase in the occurrence of soft errors and a steady climb in failure in time (FIT) rates. This problem is most prevalent in FPGA based systems which are highly susceptible to radiation induced errors. Depending upon the severity of the problem a number of methods exist to counter these effects including Triple Modular Redundancy (TMR), Error Control Coding (ECC), scrubbing systems etc. The following project presents a simulation of an FPGA based system that employs one of the popular error control code techniques called the Hamming Code. A resulting analysis shows that Hamming Code is able to mitigate the effects of single event upsets (SEUs) but suffers due to a number of limitations.


2013 ◽  
pp. 873-891
Author(s):  
Mehul S. Raval

Intellectual property right, copyright, trade mark, digital rights management (DRM) are buzz words heard more often in era of Internet. Along with the uncountable advantages Internet has also brought certain evils. These evils have social, technological, economical and legal impact on our society in general. One of the issues concerning the “content creators” is mass violations of copyrights for their work through illegal distribution via “darknet”. Watermarking is seen as one of the component for DRM systems that can act as a deterrent to content flowing into the darknet. The performance of watermarking schemes can be improved if channel codes are used for encoding the hidden message. The chapter targets applications of Error Control Coding (ECC) to watermarking namely: copyright protection, authentication, forensics and stego watermarking techniques including active steganography. This chapter aims at studying various properties of watermarking systems (depending on application), looking into their specific requirements and then try to search for suitable error control code. This will boost the over all performance of watermarking techniques. This chapter also intends to discuss the state of art research in this direction and then presents a watermarking method based on facts covered in chapter.


Sign in / Sign up

Export Citation Format

Share Document