Improved Lempel-Ziv-Welch s Error Detection and Correction Scheme using Redundant Residue Number System (RRNS)

Size: px
Start display at page:

Download "Improved Lempel-Ziv-Welch s Error Detection and Correction Scheme using Redundant Residue Number System (RRNS)"

Transcription

1 Circulation in Computer Science Vol2, No6, pp: (25-30), July Improved Lempel-Ziv-Welch s Error Detection and Correction Scheme using Redundant Residue Number System (RRNS) Alhassan Abdul-Barik University for Development Studies Faculty of Applied Sciences Department of Computer Science Navrongo, Ghana Mohammed Ibrahim Daabo University for Development Studies Faculty of Applied Sciences Department of Computer Science Navrongo, Ghana Stephen Akobre University for Development Studies Faculty of Applied Sciences Department of Computer Science Navrongo, Ghana ABSTRACT The greatest difficulty of compressing data is the assurance of the security, integrity, and accuracy of the data in storage in volatile media or transmission in network communication channels Various methods have been proposed for dealing with the accuracy and consistency of compressed and encrypted data using error detection and correction mechanisms The Redundant Residue Number System (RRNS) which is a trait of Residue Number System (RNS) is one of the available methods for detecting and correcting errors which involves the addition of extra moduli called redundant moduli In this paper, Residue Number System (RNS) is efficiently applied to the Lempel-Ziv-Welch (LZW) compression algorithm resulting in new LZW-RNS compression scheme using the traditional moduli set, and two redundant moduli added resulting in the moduli set 1, 2, 2 +1, 22 3, for the purposes of error detection and correction This is done by constraining the data or information within the legitimate range of the dynamic range provided by the non-redundant moduli Simulation with MatLab shows the efficiency and fault tolerance of the proposed scheme than the traditional LZW compression method and other related known state of the art schemes Keywords Compression, Correction, Detection, Error, LZW, RNS 1 INTRODUCTION Residue Number System (RNS) and its usage is becoming widespread given that a great deal of computing now takes place in embedded processors including those found in mobile devices Computer chips are also now dense that full testing is impossible or complex, necessitating the need for fault tolerance and the general area of computational integrity [7-9], [12] Data compression is the process of converting an input data stream into another data stream that has a smaller size [1] There exist a number of compression algorithms for compressing different types of file formats including text, image, sound, video or a combination of these which are classified as either lossy or lossless, dictionary or nondictionary based depending on the nature of the output for a specific input [1-6] RNS has been extensively used in various forms for enhancement of data compression algorithms In [12], the fault tolerance and security of information in networks using multi-level RRNS is investigated It states that, RRNS is a trait of RNS which provides reliable communication in networks and can detect and correct errors, and also used in the area of cryptography because of its fast computations Somayyeh et al in [13] also researched on high speed implementation of moduli where they combined RNS, Multi-Level RNS, and One-Hot RNS resulting in Multiple- Valued Logic high speed implementation for moduli This enabled the use of low power design with minimal use of transistors to give a high performing scheme In [14], a cyclic permutation networks modulo arithmetic processor which combines the features of cyclic permutation networks and unidirectional error detecting codes is introduced, which detects any faulty moduli without redundant moduli and also achieves less cost for added fault tolerance Similar research is done in [15] where they presented a multiple error detection and correction scheme based on RRNS which uses Chinese Remainder Theorem (CRT) and novel algorithm that sufficiently simplifies error correcting process for integers and also a reduction of computational complexity In this scheme, the residues are used to compute the erroneous integer using CRT The error value is then computed using either continuous fractions or integer programming There exist a lot of literature on improving the Lempel-Ziv- Welch s (LZW) compression algorithm Alhassan et al [16] also applied computer arithmetic using the traditional moduli set to propose the LZW-RNS (3-Moduli) scheme which shows better performance than the traditional lossless dictionary based LZW algorithm in terms of improved compression efficiency, security, and speed of execution Software implementations of the LZW algorithm are often not fast enough particularly in transmitting through high-speed media The research for hardware implementation of binary data compression of the LZW is therefore presented in [3] In [4] a comparative study of text compression algorithms is done where the LZW is found to be the least performing in terms of bits per compression The LZW is modified by Kaur and Verma [17] as content based addressable memory (CAM) array which utilizes less bits than its ASCII code Parthasarathy et al [18] in their research to determine the existence of secrete information hidden within an image, used Copyright 2017 Alhassan Abdul-Barik et al This is an open-access article distributed under the terms of the Creative Commons Attribution License 40, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited

2 LZW to manipulate 128 input using flipping, substitution, and permutation to achieve encryption and decryption This research therefore applies RNS using the moduli set to the LZW algorithm resulting in new efficient LZW-RNS scheme Two redundant moduli, and are added to detect and correct errors in encrypted and compressed data as applied in RRNS 2 MATERIALS AND METHODS Generally, compression algorithms are categorised into dictionary or non-dictionary based, and lossy or lossless Lossless compression algorithms allow for decoding back the original data whiles lossy allows for an approximation of the original data [1-2], [4-6] 21 The LZW Compression Algorithm In 1984, Terry Welch presented the lossless dictionary based LZW compression algorithm as an improved implementation of the LZ78 algorithm that was created by Jacob Ziv and Abraham Lempel This compression algorithm is simple to implement, and has the potential for very high throughput in hardware implementations [1-2] 22 Residue Number System (RNS) It utilizes remainders to represent numbers Using this method, any information or data symbol to be stored or transmitted, can be uniquely and unambiguously represented as a set of residues: with respect to a set of moduli, where is the remainder of with respect to for All of the moduli should be pair wise relatively prime The product of all moduli is called dynamic range, given by, and determines the maximum number of bits possible in a symbol These residues are mapped into a set of orthogonal sequences and are stored or transmitted in parallel The operations on individual residue channels are mutually independent An n-tuple integer represented by ( ) in RNS where the residue for and is defined as Using CRT, an integer can be calculated from its residue digits ) as follows; M and the interval [M, ) is called the illegitimate range The error detection and correction demands that we constrain the information within the legitimate range [8-9], [11], [14-15] 24 The Conversion Process Convertors are used to change from one number representation to the other A forward convertor converts from Decimal to RNS, and the reverse convertor converts from RNS to Decimal representation respectively [8-9] 241 The Forward Conversion Process The Encoder is designed using the forward convertor to convert from decimal to residue as follows; Given the moduli set,, and, where Let, and be redundant moduli for the purpose of detecting and correcting errors if they exist in the decoding process as well as securing data This results in the moduli set with a corresponding residue set For the given moduli set, any binary number is represented as a number for the original moduli set as in (3) and a number for an inclusion of the redundant moduli as in (4) (3) (4) Since,, the are computed as follows: Which is the least significant bit (LSB) of any number In order to compute the remaining s, the number is partitioned into four blocks,, and where; (5) Where,, and is the multiplicative inverse of with respect to [7-9] 23 Redundant Residue Number System (RRNS) RNS is primarily used for high-speed digital signal processing due to the modular carry free arithmetic operations It is defined by a set of relatively prime integers called non-redundant moduli Error detection and correction properties are introduced by inserting few redundant moduli Thus RRNS is defined by the moduli set Both the non-redundant and redundant moduli should be relatively prime and should satisfy the condition The total dynamic range of RRNS is given by This total range [0, ] is divided into two adjacent intervals in the ranges defined by the non-redundant and redundant moduli The interval [0, M) is called the legitimate range where The first block (ie ) becomes necessary only when the redundant moduli is used, otherwise the first three blocks are sufficient for the computation Which implies; Therefore, and, And in a similar manner the redundant residues and will be computed as follows: (7) (8) (9) (10) 26

3 and 2411 Implementation (11) Equations (10) (11) can further be simplified as (12) and, (13) Where; Add 1 OPPU Add 2 s c s c Add 3 Add 4 and, (14) Figure 1 Forward Convertor for the Moduli Set OPPU Concatenati C Concatenati D (15) 2412 Architecture The architecture for the computation of the residues is realised through (7) (9) and (12) (15) It begins with an Operands Preparation Unit (OPPU) which prepares the operands by simply manipulating the routing of the bits of the number into the four blocks Equations (14) and (15) involve the joining of bits which do not require any hardware The computation of does not also require any hardware since it is the least significant bit of the number The rest of the process requires regular Carry Save Adders (CSAs) and regular Carry Propagate Adders (CPAs) which takes inputs from the CSAs CSAs take in three inputs whilst the CPAs take in two inputs The schematic diagrams for the proposed forward converter is as follows; Figure 1 Forward Convertor for the LZW-RNS 3-Moduli Set Scheme s c s c Figure 2 Forward Convertor for the Redundant Moduli Set 27

4 242 The Reverse Conversion Process The Decoder is designed using the reverse convertor to convert from residues to decimal using the CRT according to equation (1) as follows; Given any RNS number with a three residue combination, corresponding to any moduli, then the and the can be computed accordingly and then substituted into the CRT in equation (1) in order to get in binary Example 2: Given that the RNS number respect to the moduli set respectively, we have; ; ; and And the multiplicative inverses are as follows: with in the order (16) } (17) Given the residue set corresponding to the selected first three moduli for and substituting (16) and (17) into (1), according to the CRT will be computed as; 243 Error Handling Mechanism By employing the two redundant moduli and, any error in the residue set during transmission or archiving can be recovered In RRNS, a number represented with an original moduli set (with m number of moduli) can still be represented with the original chosen moduli and redundant moduli ((q-m) number of redundant moduli) The redundancy in the system allows for the reconstruction of that number by using any v combinations of the moduli at the receiver and such RRNS (q, m) code has capability of simultaneously detecting s residue digit errors and correcting t random residue digit errors, if and only if t+s (q-m) [8-9], [11-12], [15] Example 3: The following example illustrates how a single error in the received residue digits is detected and corrected by employing the two redundant moduli For, the two redundant moduli will become and 17; therefore, take Assume that the digit is in error, ie (2, 2, 2, 11, 16) According to CRT, the integer in the range (0, 60) can be recovered by invoking any three moduli and their corresponding residue digits, if no errors occurred in the received RNS representation Let us now attempt to recover the integer represented as (2, 2, 2, 11, 16) by considering all possible cases Once all the possible combinations of three out of five residue digits are retained, it results in: where represents the recovered result by using moduli as well as their corresponding residue digits From these results, we observe that,,, and are all illegitimate numbers, since their values are out of the legitimate range [0, 59] In the remaining five cases, all the results are same and equal to 50, except for Moreover, all these results were recovered from three moduli without including, that is from,,, and which are equal to 50 Hence, we can conclude that the correct result is 50 and there was an error in, which can be corrected by computing 3 RESULTS AND DISCUSSION This scheme consists of a modified encoder and decoder pair with enhanced security, speed, and compression ratio RNS is applied to the ASCII character with decimal representation X which is used in the compression and encryption process using the LZW-RNS proposed scheme The encoder and decoder are then modified to detect and correct errors if they exist using RRNS 31 Performance Analysis of the LZW and Proposed LZW-RNS 3-Moduli Error Scheme The performance analysis of the LZW and proposed RNS- LZW algorithm is done on compression efficiency, security, execution speed, and fault tolerance 32 MatLab Implementation of the Proposed Error Detection and Correction Scheme The error detection and correction performance analysis is done using MatLab Given the non-redundant moduli set and two redundant moduli resulting in the moduli set 28

5 to be used for the purposes of error detection and correction Example 4 illustrates how the error will be detected and corrected using MatLab Simulation Consider the word Encoding to be encoded and decoded using the LZW-RNS (3-moduli) scheme, and then detect and correct errors using RRNS as follows; For n=3, we have the respective moduli {7, 8, 9, 61, 65}, resulting in respective residues for the word Encoding ; res1 = ([6, 5, 1, 6, 2, 0, 5, 5]); res2 = ([5, 6, 3, 7, 4, 1, 6, 7]); res3 = ([6, 2, 0, 3, 1, 6, 2, 5]); res4 = ([8, 49, 38, 50, 39, 44, 49, 42]); res5 = ([4, 45, 34, 46, 35, 40, 45, 38]);Any possible combinations/permutations encoded and decoded using the LZW-RNS (3-Moduli set) results in the following; Table 1 Encoded and Decoded Results for Error Detection and Correction Iteration Word to Encode, Decode and Check Errors Decoded Word E n C o d i n g Encodin Encoding Encoding Encodin Encodin Encoding Encodin Encodin Encodin From Table 1, notice that 103 corresponding to possible combinations ({1, 2, 4}, {1, 2, 5}, and {1, 4, 5}) appears most, within the [0, 210) legitimate dynamic range, and 256 ASCII character range Then, the missing moduli in the combination giving the most appearing message corresponding to position three (3) is modulo nine ( ) Hence, we find the residue of =4 We substitute the residue {4} into the last residue position of res3 as ([6, 2, 0, 3, 1, 6, 2, 4]) instead of ([6, 2, 0, 3, 1, 6, 2, 5]) The message can thus be decoded correctly using the combination without the redundant moduli Finally, the correct recovered word is Encoding 33 Security and Efficiency of the Proposed Scheme The purpose of data compression is to reduce data size, enhance speed of transmission, enhance security as well as fault tolerance The gain in this research in terms of security and efficiency include; the fast residue arithmetic computations, the challenge of having to know the moduli set before data can be hacked, and also having to have assess to the entire network before data can be decoded since data is either stored or transmitted in three bit stream secret order The residual and compartmental transmission of data also enhances the data transfer speed 4 CONCLUSIONS In this paper, Residue Number System (RNS) has been applied to the Lempel-Ziv-Welch s (LZW) algorithm using the moduli set which results in an encoder and decoder pair The decimal representations of the ASCII codes are converted to its residues in a process known as forward conversion and used in the encoding process The encoded message is then transmitted in a three bit stream channels in a secret order The decoder pair receives, reorganise the secret order sent bit stream message and converts it back to the decimal representations through a process known as reverse conversion The process continues with the proposed LZW- RNS scheme until the original message is acquired back Two redundant moduli has been added resulting in the moduli set for the purposes of error detection and correction Finally, the research has led to the development of new efficient compression scheme as well as fault tolerant scheme using RNS and Redundant Residue Number System (RRNS) which performs efficiently than the traditional LZW compression algorithm and other related known state of the art schemes 5 FUTURE RESEARCH WORK The proposed system is efficient in terms of security, compression efficiency, and speed of execution, as well as fault tolerance than the traditional LZW compression algorithm Further research is necessary to investigate the impact of moduli choice on the Lempel-Ziv-Welch s (LZW) algorithm in terms of security, and error detection and correction capabilities 6 REFERENCES [1] Amit, J Comparative Study of Dictionary Based Compression Algorithms on Text Data International Journal of Computer Engineering and Applications, Vol I, Issue II, Pg1-11, India, 2001 [2] Jane, J Trivedi, A Survey on Different Compression Techniques Algorithm for Data Compression, International Journal of Advanced Research in Computer Science and Technology, Volume II, Issue III, Pg1-5,

6 [3] Arif Sobhan, Md, Mamun, Md, Ahmad Ashrif, A B, and Hafizah, H (2013) Hardware Approach of Lempel- Ziv-Welch Algorithm for Binary Data Compression, World Applied Sciences Journal, Vol 22(1), Pp [4] Shammugasundaram, S, and Lourdusamy, R, (2012) A Comparative Study of Text Compression Algorithm, International Journal of Wisdom Based Computing, Vol 1(3), India, Pp [5] Massachusetts Institute of Technology (MIT), OpenCourseWare; Lecture, LZW [6] Ziv, J, and Lempel, A (1977) A Universal Algorithm for Sequential Data Compression, IEEE Transactions on Information Theory, Vol 23, No 3, Pp [7] Gbolagade, K A (2010) Effective Reverse Conversion in Residue Number System Processors, PhD thesis, Delft University of Technology (TU-Delft), The Netherlands, Pp [8] Omondi, A and Pumkumar, B (2007) Residue Number Systems: Theory and Implementation, Imperial College Press, 57 Shelton street, Covent Garden, London WC2H 9HE, Pp [9] Pahami, B (2007) Computer Arithmetic Algorithms and Hardware Design, Department of Electrical and Computer Engineering, University of California, Santa Barabara, Oxford University Press, New York, Pp [10] Mohan, P V A and Preemkumar, A B (2007): RNS-to- Binary Converter for Four-Moduli Set 1, 2, 2 +1, , IEEE Transaction Circuits Systems, Reg Papers, Vol 54, pp [11] Yang, L-L and Hanzo, L (2001) Redundant residue number system based error correction codes, Vehicular Technology Conference, VTC 2001 Fall, pp , vol3 [12] Pazahr, A, Mizanian, K, Safi, S M, Taghipour, E S, and Razaei, M (2014) Fault-Tolerant and Information Security in Networks using Multi-level Redundant Residue Number System, Research Journal of Recent Sciences, Volume3(3), pp [13] Somayyeh, J J, Mehdi, H, Omid, H, and Keivan, N (2008) High Speed Implementation of moduli, World Applied Sciences Journal, Volume 4(3), pp [14] Yavuz Oruc, A, and Lin, M, (1994) A Fault Tolerant Permutation Network Modulo Arithmetic Processor, IEEE Transaction on VLSI Systems, Volume 2(3), pp [15] Vik, T G and Mohammad, U S (2008) Multiple Error Detection and Correction Based on Redundant Residue Number Systems, IEEE Transactions on Communications, Volume 56(3), pp [16] Alhassan, A, Gbolagade, K A, and Bankas, E K (2015) A Novel and Efficient LZW-RNS Scheme for Enhanced Information Compression and Security, International Journal of Advanced Research in Computer Engineering and Technology (IJARCET), Vol4 (11) ISSN: Pp [17] Kaur, S and Verma, S (2012) Design and Implementation of LZW Data Compression Algorithm, International Journal of Information Sciences and Techniques (IJIST), Vol 2(4), Pp [18] Parthasaraty, C, Kalpana, G, and Gnanachandran, V (2012) LZW Data Compression for ISP Algorithm, International Journal of Advanced Information Technology, Vol 2(5), Pp CCS 2017 ISSN Published by: CSL Press, USA 30

International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research)

International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Emerging Technologies in Computational

More information

An Effective New CRT Based Reverse Converter for a Novel Moduli Set { 2 2n+1 1, 2 2n+1, 2 2n 1 }

An Effective New CRT Based Reverse Converter for a Novel Moduli Set { 2 2n+1 1, 2 2n+1, 2 2n 1 } An Effective New CRT Based Reverse Converter for a Novel Moduli Set +1 1, +1, 1 } Edem Kwedzo Bankas, Kazeem Alagbe Gbolagade Department of Computer Science, Faculty of Mathematical Sciences, University

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 8, August 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Efficient

More information

Information encoding and decoding using Residue Number System for {2 2n -1, 2 2n, 2 2n +1} moduli sets

Information encoding and decoding using Residue Number System for {2 2n -1, 2 2n, 2 2n +1} moduli sets Information encoding and decoding using Residue Number System for {2-1, 2, 2 +1} moduli sets Idris Abiodun Aremu Kazeem Alagbe Gbolagade Abstract- This paper presents the design methods of information

More information

Volume 3, No. 1, January 2012 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at

Volume 3, No. 1, January 2012 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at Volume 3, No 1, January 2012 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at wwwjgrcsinfo A NOVEL HIGH DYNAMIC RANGE 5-MODULUS SET WHIT EFFICIENT REVERSE CONVERTER AND

More information

KEYWORDS: Multiple Valued Logic (MVL), Residue Number System (RNS), Quinary Logic (Q uin), Quinary Full Adder, QFA, Quinary Half Adder, QHA.

KEYWORDS: Multiple Valued Logic (MVL), Residue Number System (RNS), Quinary Logic (Q uin), Quinary Full Adder, QFA, Quinary Half Adder, QHA. GLOBAL JOURNAL OF ADVANCED ENGINEERING TECHNOLOGIES AND SCIENCES DESIGN OF A QUINARY TO RESIDUE NUMBER SYSTEM CONVERTER USING MULTI-LEVELS OF CONVERSION Hassan Amin Osseily Electrical and Electronics Department,

More information

Fault Tolerance Technique in Huffman Coding applies to Baseline JPEG

Fault Tolerance Technique in Huffman Coding applies to Baseline JPEG Fault Tolerance Technique in Huffman Coding applies to Baseline JPEG Cung Nguyen and Robert G. Redinbo Department of Electrical and Computer Engineering University of California, Davis, CA email: cunguyen,

More information

Optimization of the Hamming Code for Error Prone Media

Optimization of the Hamming Code for Error Prone Media Optimization of the Hamming Code for Error Prone Media Eltayeb Abuelyaman and Abdul-Aziz Al-Sehibani College of Computer and Information Sciences Prince Sultan University Abuelyaman@psu.edu.sa Summery

More information

Optimization of the Hamming Code for Error Prone Media

Optimization of the Hamming Code for Error Prone Media 278 IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.3, March 2008 Optimization of the Hamming Code for Error Prone Media Eltayeb S. Abuelyaman and Abdul-Aziz S. Al-Sehibani

More information

Information redundancy

Information redundancy Information redundancy Information redundancy add information to date to tolerate faults error detecting codes error correcting codes data applications communication memory p. 2 - Design of Fault Tolerant

More information

On the Complexity of Error Detection Functions for Redundant Residue Number Systems

On the Complexity of Error Detection Functions for Redundant Residue Number Systems On the Complexity of Error Detection Functions for Redundant Residue Number Systems Tsutomu Sasao 1 and Yukihiro Iguchi 2 1 Dept. of Computer Science and Electronics, Kyushu Institute of Technology, Iizuka

More information

GENERALIZED ARYABHATA REMAINDER THEOREM

GENERALIZED ARYABHATA REMAINDER THEOREM International Journal of Innovative Computing, Information and Control ICIC International c 2010 ISSN 1349-4198 Volume 6, Number 4, April 2010 pp. 1865 1871 GENERALIZED ARYABHATA REMAINDER THEOREM Chin-Chen

More information

Image and Multidimensional Signal Processing

Image and Multidimensional Signal Processing Image and Multidimensional Signal Processing Professor William Hoff Dept of Electrical Engineering &Computer Science http://inside.mines.edu/~whoff/ Image Compression 2 Image Compression Goal: Reduce amount

More information

17.1 Binary Codes Normal numbers we use are in base 10, which are called decimal numbers. Each digit can be 10 possible numbers: 0, 1, 2, 9.

17.1 Binary Codes Normal numbers we use are in base 10, which are called decimal numbers. Each digit can be 10 possible numbers: 0, 1, 2, 9. ( c ) E p s t e i n, C a r t e r, B o l l i n g e r, A u r i s p a C h a p t e r 17: I n f o r m a t i o n S c i e n c e P a g e 1 CHAPTER 17: Information Science 17.1 Binary Codes Normal numbers we use

More information

Source Coding Techniques

Source Coding Techniques Source Coding Techniques. Huffman Code. 2. Two-pass Huffman Code. 3. Lemple-Ziv Code. 4. Fano code. 5. Shannon Code. 6. Arithmetic Code. Source Coding Techniques. Huffman Code. 2. Two-path Huffman Code.

More information

A VLSI Algorithm for Modular Multiplication/Division

A VLSI Algorithm for Modular Multiplication/Division A VLSI Algorithm for Modular Multiplication/Division Marcelo E. Kaihara and Naofumi Takagi Department of Information Engineering Nagoya University Nagoya, 464-8603, Japan mkaihara@takagi.nuie.nagoya-u.ac.jp

More information

E40M. Binary Numbers. M. Horowitz, J. Plummer, R. Howe 1

E40M. Binary Numbers. M. Horowitz, J. Plummer, R. Howe 1 E40M Binary Numbers M. Horowitz, J. Plummer, R. Howe 1 Reading Chapter 5 in the reader A&L 5.6 M. Horowitz, J. Plummer, R. Howe 2 Useless Box Lab Project #2 Adding a computer to the Useless Box alows us

More information

Optimization of new Chinese Remainder theorems using special moduli sets

Optimization of new Chinese Remainder theorems using special moduli sets Louisiana State University LSU Digital Commons LSU Master's Theses Graduate School 2010 Optimization of new Chinese Remainder theorems using special moduli sets Narendran Narayanaswamy Louisiana State

More information

Keywords- Source coding, Huffman encoding, Artificial neural network, Multilayer perceptron, Backpropagation algorithm

Keywords- Source coding, Huffman encoding, Artificial neural network, Multilayer perceptron, Backpropagation algorithm Volume 4, Issue 5, May 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Huffman Encoding

More information

UNIT I INFORMATION THEORY. I k log 2

UNIT I INFORMATION THEORY. I k log 2 UNIT I INFORMATION THEORY Claude Shannon 1916-2001 Creator of Information Theory, lays the foundation for implementing logic in digital circuits as part of his Masters Thesis! (1939) and published a paper

More information

A High-Speed Realization of Chinese Remainder Theorem

A High-Speed Realization of Chinese Remainder Theorem Proceedings of the 2007 WSEAS Int. Conference on Circuits, Systems, Signal and Telecommunications, Gold Coast, Australia, January 17-19, 2007 97 A High-Speed Realization of Chinese Remainder Theorem Shuangching

More information

Digital Systems Roberto Muscedere Images 2013 Pearson Education Inc. 1

Digital Systems Roberto Muscedere Images 2013 Pearson Education Inc. 1 Digital Systems Digital systems have such a prominent role in everyday life The digital age The technology around us is ubiquitous, that is we don t even notice it anymore Digital systems are used in:

More information

9. Datapath Design. Jacob Abraham. Department of Electrical and Computer Engineering The University of Texas at Austin VLSI Design Fall 2017

9. Datapath Design. Jacob Abraham. Department of Electrical and Computer Engineering The University of Texas at Austin VLSI Design Fall 2017 9. Datapath Design Jacob Abraham Department of Electrical and Computer Engineering The University of Texas at Austin VLSI Design Fall 2017 October 2, 2017 ECE Department, University of Texas at Austin

More information

Low Power, High Speed Parallel Architecture For Cyclic Convolution Based On Fermat Number Transform (FNT)

Low Power, High Speed Parallel Architecture For Cyclic Convolution Based On Fermat Number Transform (FNT) RESEARCH ARTICLE OPEN ACCESS Low Power, High Speed Parallel Architecture For Cyclic Convolution Based On Fermat Number Transform (FNT) T.Jyothsna 1 M.Tech, M.Pradeep 2 M.Tech 1 E.C.E department, shri Vishnu

More information

Residue Number Systems Ivor Page 1

Residue Number Systems Ivor Page 1 Residue Number Systems 1 Residue Number Systems Ivor Page 1 7.1 Arithmetic in a modulus system The great speed of arithmetic in Residue Number Systems (RNS) comes from a simple theorem from number theory:

More information

Fibonacci Coding for Lossless Data Compression A Review

Fibonacci Coding for Lossless Data Compression A Review RESEARCH ARTICLE OPEN ACCESS Fibonacci Coding for Lossless Data Compression A Review Ezhilarasu P Associate Professor Department of Computer Science and Engineering Hindusthan College of Engineering and

More information

A ROBUST NUMBER THEORETIC TRANSFORM WITH APPLICATIONS IN ERROR CONTROL AND COMMUNICATION SYSTEMS

A ROBUST NUMBER THEORETIC TRANSFORM WITH APPLICATIONS IN ERROR CONTROL AND COMMUNICATION SYSTEMS A ROBUST NUMBER THEORETIC TRANSFORM WITH APPLICATIONS IN ERROR CONTROL AND COMMUNICATION SYSTEMS YANTO JAKOP SCHOOL OF COMPUTER ENGINEERING 2008 A Robust Number Theoretic Transform with Applications in

More information

Coset Decomposition Method for Decoding Linear Codes

Coset Decomposition Method for Decoding Linear Codes International Journal of Algebra, Vol. 5, 2011, no. 28, 1395-1404 Coset Decomposition Method for Decoding Linear Codes Mohamed Sayed Faculty of Computer Studies Arab Open University P.O. Box: 830 Ardeya

More information

On Equivalences and Fair Comparisons Among Residue Number Systems with Special Moduli

On Equivalences and Fair Comparisons Among Residue Number Systems with Special Moduli On Equivalences and Fair Comparisons Among Residue Number Systems with Special Moduli Behrooz Parhami Department of Electrical and Computer Engineering University of California Santa Barbara, CA 93106-9560,

More information

Hardware Design I Chap. 4 Representative combinational logic

Hardware Design I Chap. 4 Representative combinational logic Hardware Design I Chap. 4 Representative combinational logic E-mail: shimada@is.naist.jp Already optimized circuits There are many optimized circuits which are well used You can reduce your design workload

More information

Elliptic Curve Cryptography and Security of Embedded Devices

Elliptic Curve Cryptography and Security of Embedded Devices Elliptic Curve Cryptography and Security of Embedded Devices Ph.D. Defense Vincent Verneuil Institut de Mathématiques de Bordeaux Inside Secure June 13th, 2012 V. Verneuil - Elliptic Curve Cryptography

More information

1. Basics of Information

1. Basics of Information 1. Basics of Information 6.004x Computation Structures Part 1 Digital Circuits Copyright 2015 MIT EECS 6.004 Computation Structures L1: Basics of Information, Slide #1 What is Information? Information,

More information

IOSR Journal of Mathematics (IOSR-JM) e-issn: , p-issn: x. Volume 9, Issue 2 (Nov. Dec. 2013), PP

IOSR Journal of Mathematics (IOSR-JM) e-issn: , p-issn: x. Volume 9, Issue 2 (Nov. Dec. 2013), PP IOSR Journal of Mathematics (IOSR-JM) e-issn: 2278-5728, p-issn:2319-765x. Volume 9, Issue 2 (Nov. Dec. 2013), PP 33-37 The use of Algorithmic Method of Hamming Code Techniques for the Detection and Correction

More information

Design of Low Power, High Speed Parallel Architecture of Cyclic Convolution Based on Fermat Number Transform (FNT)

Design of Low Power, High Speed Parallel Architecture of Cyclic Convolution Based on Fermat Number Transform (FNT) Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 3, Number 6 (2013), pp. 641-650 Research India Publications http://www.ripublication.com/aeee.htm Design of Low Power, High Speed

More information

Performance Evaluation of Signed-Digit Architecture for Weighted-to-Residue and Residue-to-Weighted Number Converters with Moduli Set (2 n 1, 2 n,

Performance Evaluation of Signed-Digit Architecture for Weighted-to-Residue and Residue-to-Weighted Number Converters with Moduli Set (2 n 1, 2 n, Regular Paper Performance Evaluation of Signed-Digit Architecture for Weighted-to-Residue and Residue-to-Weighted Number Converters with Moduli Set (2 n 1, 2 n, 2 n +1) Shuangching Chen and Shugang Wei

More information

Logic. Combinational. inputs. outputs. the result. system can

Logic. Combinational. inputs. outputs. the result. system can Digital Electronics Combinational Logic Functions Digital logic circuits can be classified as either combinational or sequential circuits. A combinational circuit is one where the output at any time depends

More information

Example: sending one bit of information across noisy channel. Effects of the noise: flip the bit with probability p.

Example: sending one bit of information across noisy channel. Effects of the noise: flip the bit with probability p. Lecture 20 Page 1 Lecture 20 Quantum error correction Classical error correction Modern computers: failure rate is below one error in 10 17 operations Data transmission and storage (file transfers, cell

More information

Chapter 5. Digital Design and Computer Architecture, 2 nd Edition. David Money Harris and Sarah L. Harris. Chapter 5 <1>

Chapter 5. Digital Design and Computer Architecture, 2 nd Edition. David Money Harris and Sarah L. Harris. Chapter 5 <1> Chapter 5 Digital Design and Computer Architecture, 2 nd Edition David Money Harris and Sarah L. Harris Chapter 5 Chapter 5 :: Topics Introduction Arithmetic Circuits umber Systems Sequential Building

More information

Implementation Of Digital Fir Filter Using Improved Table Look Up Scheme For Residue Number System

Implementation Of Digital Fir Filter Using Improved Table Look Up Scheme For Residue Number System Implementation Of Digital Fir Filter Using Improved Table Look Up Scheme For Residue Number System G.Suresh, G.Indira Devi, P.Pavankumar Abstract The use of the improved table look up Residue Number System

More information

Ch 0 Introduction. 0.1 Overview of Information Theory and Coding

Ch 0 Introduction. 0.1 Overview of Information Theory and Coding Ch 0 Introduction 0.1 Overview of Information Theory and Coding Overview The information theory was founded by Shannon in 1948. This theory is for transmission (communication system) or recording (storage

More information

Cosc 412: Cryptography and complexity Lecture 7 (22/8/2018) Knapsacks and attacks

Cosc 412: Cryptography and complexity Lecture 7 (22/8/2018) Knapsacks and attacks 1 Cosc 412: Cryptography and complexity Lecture 7 (22/8/2018) Knapsacks and attacks Michael Albert michael.albert@cs.otago.ac.nz 2 This week Arithmetic Knapsack cryptosystems Attacks on knapsacks Some

More information

Multimedia. Multimedia Data Compression (Lossless Compression Algorithms)

Multimedia. Multimedia Data Compression (Lossless Compression Algorithms) Course Code 005636 (Fall 2017) Multimedia Multimedia Data Compression (Lossless Compression Algorithms) Prof. S. M. Riazul Islam, Dept. of Computer Engineering, Sejong University, Korea E-mail: riaz@sejong.ac.kr

More information

( c ) E p s t e i n, C a r t e r a n d B o l l i n g e r C h a p t e r 1 7 : I n f o r m a t i o n S c i e n c e P a g e 1

( c ) E p s t e i n, C a r t e r a n d B o l l i n g e r C h a p t e r 1 7 : I n f o r m a t i o n S c i e n c e P a g e 1 ( c ) E p s t e i n, C a r t e r a n d B o l l i n g e r 2 0 1 6 C h a p t e r 1 7 : I n f o r m a t i o n S c i e n c e P a g e 1 CHAPTER 17: Information Science In this chapter, we learn how data can

More information

Top Ten Algorithms Class 6

Top Ten Algorithms Class 6 Top Ten Algorithms Class 6 John Burkardt Department of Scientific Computing Florida State University... http://people.sc.fsu.edu/ jburkardt/classes/tta 2015/class06.pdf 05 October 2015 1 / 24 Our Current

More information

AREA EFFICIENT MODULAR ADDER/SUBTRACTOR FOR RESIDUE MODULI

AREA EFFICIENT MODULAR ADDER/SUBTRACTOR FOR RESIDUE MODULI AREA EFFICIENT MODULAR ADDER/SUBTRACTOR FOR RESIDUE MODULI G.CHANDANA 1 (M.TECH),chandana.g89@gmail.com P.RAJINI 2 (M.TECH),paddam.rajani@gmail.com Abstract Efficient modular adders and subtractors for

More information

Digital Communications III (ECE 154C) Introduction to Coding and Information Theory

Digital Communications III (ECE 154C) Introduction to Coding and Information Theory Digital Communications III (ECE 154C) Introduction to Coding and Information Theory Tara Javidi These lecture notes were originally developed by late Prof. J. K. Wolf. UC San Diego Spring 2014 1 / 8 I

More information

Power Consumption Analysis. Arithmetic Level Countermeasures for ECC Coprocessor. Arithmetic Operators for Cryptography.

Power Consumption Analysis. Arithmetic Level Countermeasures for ECC Coprocessor. Arithmetic Operators for Cryptography. Power Consumption Analysis General principle: measure the current I in the circuit Arithmetic Level Countermeasures for ECC Coprocessor Arnaud Tisserand, Thomas Chabrier, Danuta Pamula I V DD circuit traces

More information

Lecture 8: Sequential Multipliers

Lecture 8: Sequential Multipliers Lecture 8: Sequential Multipliers ECE 645 Computer Arithmetic 3/25/08 ECE 645 Computer Arithmetic Lecture Roadmap Sequential Multipliers Unsigned Signed Radix-2 Booth Recoding High-Radix Multiplication

More information

repetition, part ii Ole-Johan Skrede INF Digital Image Processing

repetition, part ii Ole-Johan Skrede INF Digital Image Processing repetition, part ii Ole-Johan Skrede 24.05.2017 INF2310 - Digital Image Processing Department of Informatics The Faculty of Mathematics and Natural Sciences University of Oslo today s lecture Coding and

More information

CS483 Design and Analysis of Algorithms

CS483 Design and Analysis of Algorithms CS483 Design and Analysis of Algorithms Lectures 2-3 Algorithms with Numbers Instructor: Fei Li lifei@cs.gmu.edu with subject: CS483 Office hours: STII, Room 443, Friday 4:00pm - 6:00pm or by appointments

More information

Logic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation

Logic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation Quantum logic gates Logic gates Classical NOT gate Quantum NOT gate (X gate) A NOT A α 0 + β 1 X α 1 + β 0 A N O T A 0 1 1 0 Matrix form representation 0 1 X = 1 0 The only non-trivial single bit gate

More information

Design of A Efficient Hybrid Adder Using Qca

Design of A Efficient Hybrid Adder Using Qca International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 PP30-34 Design of A Efficient Hybrid Adder Using Qca 1, Ravi chander, 2, PMurali Krishna 1, PG Scholar,

More information

FPGA BASED DESIGN OF PARALLEL CRC GENERATION FOR HIGH SPEED APPLICATION

FPGA BASED DESIGN OF PARALLEL CRC GENERATION FOR HIGH SPEED APPLICATION 258 FPGA BASED DESIGN OF PARALLEL CRC GENERATION FOR HIGH SPEED APPLICATION Sri N.V.N.Prasanna Kumar 1, S.Bhagya Jyothi 2,G.K.S.Tejaswi 3 1 prasannakumar429@gmail.com, 2 sjyothi567@gmail.com, 3 tejaswikakatiya@gmail.com

More information

Addition. Ch1 - Algorithms with numbers. Multiplication. al-khwārizmī. al-khwārizmī. Division 53+35=88. Cost? (n number of bits) 13x11=143. Cost?

Addition. Ch1 - Algorithms with numbers. Multiplication. al-khwārizmī. al-khwārizmī. Division 53+35=88. Cost? (n number of bits) 13x11=143. Cost? Ch - Algorithms with numbers Addition Basic arithmetic Addition ultiplication Division odular arithmetic factoring is hard Primality testing 53+35=88 Cost? (n number of bits) O(n) ultiplication al-khwārizmī

More information

Efficient encryption and decryption. ECE646 Lecture 10. RSA Implementation: Efficient Encryption & Decryption. Required Reading

Efficient encryption and decryption. ECE646 Lecture 10. RSA Implementation: Efficient Encryption & Decryption. Required Reading ECE646 Lecture 10 RSA Implementation: Efficient Encryption & Decryption Required Reading W. Stallings, "Cryptography and etwork-security, Chapter 9.2 The RSA Algorithm Chapter 8.4 The Chinese Remainder

More information

PARITY BASED FAULT DETECTION TECHNIQUES FOR S-BOX/ INV S-BOX ADVANCED ENCRYPTION SYSTEM

PARITY BASED FAULT DETECTION TECHNIQUES FOR S-BOX/ INV S-BOX ADVANCED ENCRYPTION SYSTEM PARITY BASED FAULT DETECTION TECHNIQUES FOR S-BOX/ INV S-BOX ADVANCED ENCRYPTION SYSTEM Nabihah Ahmad Department of Electronic Engineering, Faculty of Electrical and Electronic Engineering, Universiti

More information

Concurrent Error Detection in S-boxes 1

Concurrent Error Detection in S-boxes 1 International Journal of Computer Science & Applications Vol. 4, No. 1, pp. 27 32 2007 Technomathematics Research Foundation Concurrent Error Detection in S-boxes 1 Ewa Idzikowska, Krzysztof Bucholc Poznan

More information

Run-length & Entropy Coding. Redundancy Removal. Sampling. Quantization. Perform inverse operations at the receiver EEE

Run-length & Entropy Coding. Redundancy Removal. Sampling. Quantization. Perform inverse operations at the receiver EEE General e Image Coder Structure Motion Video x(s 1,s 2,t) or x(s 1,s 2 ) Natural Image Sampling A form of data compression; usually lossless, but can be lossy Redundancy Removal Lossless compression: predictive

More information

A new conic curve digital signature scheme with message recovery and without one-way hash functions

A new conic curve digital signature scheme with message recovery and without one-way hash functions Annals of the University of Craiova, Mathematics and Computer Science Series Volume 40(2), 2013, Pages 148 153 ISSN: 1223-6934 A new conic curve digital signature scheme with message recovery and without

More information

About Vigenere cipher modifications

About Vigenere cipher modifications Proceedings of the Workshop on Foundations of Informatics FOI-2015, August 24-29, 2015, Chisinau, Republic of Moldova About Vigenere cipher modifications Eugene Kuznetsov Abstract TheaimofthisworkisamodificationoftheclassicalVigenere

More information

Digital Communication Systems ECS 452. Asst. Prof. Dr. Prapun Suksompong 5.2 Binary Convolutional Codes

Digital Communication Systems ECS 452. Asst. Prof. Dr. Prapun Suksompong 5.2 Binary Convolutional Codes Digital Communication Systems ECS 452 Asst. Prof. Dr. Prapun Suksompong prapun@siit.tu.ac.th 5.2 Binary Convolutional Codes 35 Binary Convolutional Codes Introduced by Elias in 1955 There, it is referred

More information

Lecture 1: Shannon s Theorem

Lecture 1: Shannon s Theorem Lecture 1: Shannon s Theorem Lecturer: Travis Gagie January 13th, 2015 Welcome to Data Compression! I m Travis and I ll be your instructor this week. If you haven t registered yet, don t worry, we ll work

More information

Implementation of Lossless Huffman Coding: Image compression using K-Means algorithm and comparison vs. Random numbers and Message source

Implementation of Lossless Huffman Coding: Image compression using K-Means algorithm and comparison vs. Random numbers and Message source Implementation of Lossless Huffman Coding: Image compression using K-Means algorithm and comparison vs. Random numbers and Message source Ali Tariq Bhatti 1, Dr. Jung Kim 2 1,2 Department of Electrical

More information

Forward and Reverse Converters and Moduli Set Selection in Signed-Digit Residue Number Systems

Forward and Reverse Converters and Moduli Set Selection in Signed-Digit Residue Number Systems J Sign Process Syst DOI 10.1007/s11265-008-0249-8 Forward and Reverse Converters and Moduli Set Selection in Signed-Digit Residue Number Systems Andreas Persson Lars Bengtsson Received: 8 March 2007 /

More information

Network Security Based on Quantum Cryptography Multi-qubit Hadamard Matrices

Network Security Based on Quantum Cryptography Multi-qubit Hadamard Matrices Global Journal of Computer Science and Technology Volume 11 Issue 12 Version 1.0 July Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN:

More information

L. Yaroslavsky. Fundamentals of Digital Image Processing. Course

L. Yaroslavsky. Fundamentals of Digital Image Processing. Course L. Yaroslavsky. Fundamentals of Digital Image Processing. Course 0555.330 Lec. 6. Principles of image coding The term image coding or image compression refers to processing image digital data aimed at

More information

ISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-10,

ISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-10, A NOVEL DOMINO LOGIC DESIGN FOR EMBEDDED APPLICATION Dr.K.Sujatha Associate Professor, Department of Computer science and Engineering, Sri Krishna College of Engineering and Technology, Coimbatore, Tamilnadu,

More information

Computer Architecture 10. Residue Number Systems

Computer Architecture 10. Residue Number Systems Computer Architecture 10 Residue Number Systems Ma d e wi t h Op e n Of f i c e. o r g 1 A Puzzle What number has the reminders 2, 3 and 2 when divided by the numbers 7, 5 and 3? x mod 7 = 2 x mod 5 =

More information

COMBINATIONAL LOGIC FUNCTIONS

COMBINATIONAL LOGIC FUNCTIONS COMBINATIONAL LOGIC FUNCTIONS Digital logic circuits can be classified as either combinational or sequential circuits. A combinational circuit is one where the output at any time depends only on the present

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 5 Other Coding Techniques Instructional Objectives At the end of this lesson, the students should be able to:. Convert a gray-scale image into bit-plane

More information

Design and FPGA Implementation of Radix-10 Algorithm for Division with Limited Precision Primitives

Design and FPGA Implementation of Radix-10 Algorithm for Division with Limited Precision Primitives Design and FPGA Implementation of Radix-10 Algorithm for Division with Limited Precision Primitives Miloš D. Ercegovac Computer Science Department Univ. of California at Los Angeles California Robert McIlhenny

More information

NEW SELF-CHECKING BOOTH MULTIPLIERS

NEW SELF-CHECKING BOOTH MULTIPLIERS Int. J. Appl. Math. Comput. Sci., 2008, Vol. 18, No. 3, 319 328 DOI: 10.2478/v10006-008-0029-4 NEW SELF-CHECKING BOOTH MULTIPLIERS MARC HUNGER, DANIEL MARIENFELD Department of Electrical Engineering and

More information

CHAPTER 2 NUMBER SYSTEMS

CHAPTER 2 NUMBER SYSTEMS CHAPTER 2 NUMBER SYSTEMS The Decimal Number System : We begin our study of the number systems with the familiar decimal number system. The decimal system contains ten unique symbol 0, 1, 2, 3, 4, 5, 6,

More information

Discrete Mathematics GCD, LCM, RSA Algorithm

Discrete Mathematics GCD, LCM, RSA Algorithm Discrete Mathematics GCD, LCM, RSA Algorithm Abdul Hameed http://informationtechnology.pk/pucit abdul.hameed@pucit.edu.pk Lecture 16 Greatest Common Divisor 2 Greatest common divisor The greatest common

More information

Information and Entropy

Information and Entropy Information and Entropy Shannon s Separation Principle Source Coding Principles Entropy Variable Length Codes Huffman Codes Joint Sources Arithmetic Codes Adaptive Codes Thomas Wiegand: Digital Image Communication

More information

Analytical Performance of One-Step Majority Logic Decoding of Regular LDPC Codes

Analytical Performance of One-Step Majority Logic Decoding of Regular LDPC Codes Analytical Performance of One-Step Majority Logic Decoding of Regular LDPC Codes Rathnakumar Radhakrishnan, Sundararajan Sankaranarayanan, and Bane Vasić Department of Electrical and Computer Engineering

More information

Cryptography. P. Danziger. Transmit...Bob...

Cryptography. P. Danziger. Transmit...Bob... 10.4 Cryptography P. Danziger 1 Cipher Schemes A cryptographic scheme is an example of a code. The special requirement is that the encoded message be difficult to retrieve without some special piece of

More information

DESIGN OF QCA FULL ADDER CIRCUIT USING CORNER APPROACH INVERTER

DESIGN OF QCA FULL ADDER CIRCUIT USING CORNER APPROACH INVERTER Research Manuscript Title DESIGN OF QCA FULL ADDER CIRCUIT USING CORNER APPROACH INVERTER R.Rathi Devi 1, PG student/ece Department, Vivekanandha College of Engineering for Women rathidevi24@gmail.com

More information

Chapter 5 Arithmetic Circuits

Chapter 5 Arithmetic Circuits Chapter 5 Arithmetic Circuits SKEE2263 Digital Systems Mun im/ismahani/izam {munim@utm.my,e-izam@utm.my,ismahani@fke.utm.my} February 11, 2016 Table of Contents 1 Iterative Designs 2 Adders 3 High-Speed

More information

PAST EXAM PAPER & MEMO N3 ABOUT THE QUESTION PAPERS:

PAST EXAM PAPER & MEMO N3 ABOUT THE QUESTION PAPERS: EKURHULENI TECH COLLEGE. No. 3 Mogale Square, Krugersdorp. Website: www. ekurhulenitech.co.za Email: info@ekurhulenitech.co.za TEL: 011 040 7343 CELL: 073 770 3028/060 715 4529 PAST EXAM PAPER & MEMO N3

More information

Formal Fault Analysis of Branch Predictors: Attacking countermeasures of Asymmetric key ciphers

Formal Fault Analysis of Branch Predictors: Attacking countermeasures of Asymmetric key ciphers Formal Fault Analysis of Branch Predictors: Attacking countermeasures of Asymmetric key ciphers Sarani Bhattacharya and Debdeep Mukhopadhyay Indian Institute of Technology Kharagpur PROOFS 2016 August

More information

Introduction to Information Theory. Part 3

Introduction to Information Theory. Part 3 Introduction to Information Theory Part 3 Assignment#1 Results List text(s) used, total # letters, computed entropy of text. Compare results. What is the computed average word length of 3 letter codes

More information

Tree and Array Multipliers Ivor Page 1

Tree and Array Multipliers Ivor Page 1 Tree and Array Multipliers 1 Tree and Array Multipliers Ivor Page 1 11.1 Tree Multipliers In Figure 1 seven input operands are combined by a tree of CSAs. The final level of the tree is a carry-completion

More information

Algorithmic Number Theory and Public-key Cryptography

Algorithmic Number Theory and Public-key Cryptography Algorithmic Number Theory and Public-key Cryptography Course 3 University of Luxembourg March 22, 2018 The RSA algorithm The RSA algorithm is the most widely-used public-key encryption algorithm Invented

More information

BASIC COMPRESSION TECHNIQUES

BASIC COMPRESSION TECHNIQUES BASIC COMPRESSION TECHNIQUES N. C. State University CSC557 Multimedia Computing and Networking Fall 2001 Lectures # 05 Questions / Problems / Announcements? 2 Matlab demo of DFT Low-pass windowed-sinc

More information

Reduce the amount of data required to represent a given quantity of information Data vs information R = 1 1 C

Reduce the amount of data required to represent a given quantity of information Data vs information R = 1 1 C Image Compression Background Reduce the amount of data to represent a digital image Storage and transmission Consider the live streaming of a movie at standard definition video A color frame is 720 480

More information

Mark Redekopp, All rights reserved. Lecture 1 Slides. Intro Number Systems Logic Functions

Mark Redekopp, All rights reserved. Lecture 1 Slides. Intro Number Systems Logic Functions Lecture Slides Intro Number Systems Logic Functions EE 0 in Context EE 0 EE 20L Logic Design Fundamentals Logic Design, CAD Tools, Lab tools, Project EE 357 EE 457 Computer Architecture Using the logic

More information

Department of Electrical & Electronics EE-333 DIGITAL SYSTEMS

Department of Electrical & Electronics EE-333 DIGITAL SYSTEMS Department of Electrical & Electronics EE-333 DIGITAL SYSTEMS 1) Given the two binary numbers X = 1010100 and Y = 1000011, perform the subtraction (a) X -Y and (b) Y - X using 2's complements. a) X = 1010100

More information

CRYPTOGRAPHY AND LARGE PRIMES *

CRYPTOGRAPHY AND LARGE PRIMES * CRYPTOGRAPHY AND LARGE PRIMES * B. Hartley University of Manchester, England, and National University of Singapore The word "cryptography" derives from Greek and means "secret writing". Since ancient times,

More information

DEPARTMENT OF EECS MASSACHUSETTS INSTITUTE OF TECHNOLOGY. 6.02: Digital Communication Systems, Fall Quiz I. October 11, 2012

DEPARTMENT OF EECS MASSACHUSETTS INSTITUTE OF TECHNOLOGY. 6.02: Digital Communication Systems, Fall Quiz I. October 11, 2012 6.02 Fall 2012, Quiz 2 Page 1 of 12 Name: DEPARTMENT OF EECS MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.02: Digital Communication Systems, Fall 2012 Quiz I October 11, 2012 your section Section Time Recitation

More information

assume that the message itself is considered the RNS representation of a number, thus mapping in and out of the RNS system is not necessary. This is p

assume that the message itself is considered the RNS representation of a number, thus mapping in and out of the RNS system is not necessary. This is p Montgomery Modular Multiplication in Residue Arithmetic Jean-Claude Bajard LIRMM Montpellier, France bajardlirmm.fr Laurent-Stephane Didier Universite de Bretagne Occidentale Brest, France laurent-stephane.didieruniv-brest.fr

More information

Gurgen Khachatrian Martun Karapetyan

Gurgen Khachatrian Martun Karapetyan 34 International Journal Information Theories and Applications, Vol. 23, Number 1, (c) 2016 On a public key encryption algorithm based on Permutation Polynomials and performance analyses Gurgen Khachatrian

More information

An Enhanced (31,11,5) Binary BCH Encoder and Decoder for Data Transmission

An Enhanced (31,11,5) Binary BCH Encoder and Decoder for Data Transmission An Enhanced (31,11,5) Binary BCH Encoder and Decoder for Data Transmission P.Mozhiarasi, C.Gayathri, V.Deepan Master of Engineering, VLSI design, Sri Eshwar College of Engineering, Coimbatore- 641 202,

More information

Implementation of Reversible Control and Full Adder Unit Using HNG Reversible Logic Gate

Implementation of Reversible Control and Full Adder Unit Using HNG Reversible Logic Gate Implementation of Reversible Control and Full Adder Unit Using HNG Reversible Logic Gate Naresh Chandra Agrawal 1, Anil Kumar 2, A. K. Jaiswal 3 1 Research scholar, 2 Assistant Professor, 3 Professor,

More information

ENG2410 Digital Design Introduction to Digital Systems. Fall 2017 S. Areibi School of Engineering University of Guelph

ENG2410 Digital Design Introduction to Digital Systems. Fall 2017 S. Areibi School of Engineering University of Guelph ENG2410 Digital Design Introduction to Digital Systems Fall 2017 S. Areibi School of Engineering University of Guelph Resources Chapter #1, Mano Sections 1.1 Digital Computers 1.2 Number Systems 1.3 Arithmetic

More information

9 THEORY OF CODES. 9.0 Introduction. 9.1 Noise

9 THEORY OF CODES. 9.0 Introduction. 9.1 Noise 9 THEORY OF CODES Chapter 9 Theory of Codes After studying this chapter you should understand what is meant by noise, error detection and correction; be able to find and use the Hamming distance for a

More information

Introduction to Cybersecurity Cryptography (Part 5)

Introduction to Cybersecurity Cryptography (Part 5) Introduction to Cybersecurity Cryptography (Part 5) Prof. Dr. Michael Backes 13.01.2017 February 17 th Special Lecture! 45 Minutes Your Choice 1. Automotive Security 2. Smartphone Security 3. Side Channel

More information

Binary addition example worked out

Binary addition example worked out Binary addition example worked out Some terms are given here Exercise: what are these numbers equivalent to in decimal? The initial carry in is implicitly 0 1 1 1 0 (Carries) 1 0 1 1 (Augend) + 1 1 1 0

More information

2018/5/3. YU Xiangyu

2018/5/3. YU Xiangyu 2018/5/3 YU Xiangyu yuxy@scut.edu.cn Entropy Huffman Code Entropy of Discrete Source Definition of entropy: If an information source X can generate n different messages x 1, x 2,, x i,, x n, then the

More information

ASYMMETRIC NUMERAL SYSTEMS: ADDING FRACTIONAL BITS TO HUFFMAN CODER

ASYMMETRIC NUMERAL SYSTEMS: ADDING FRACTIONAL BITS TO HUFFMAN CODER ASYMMETRIC NUMERAL SYSTEMS: ADDING FRACTIONAL BITS TO HUFFMAN CODER Huffman coding Arithmetic coding fast, but operates on integer number of bits: approximates probabilities with powers of ½, getting inferior

More information