Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

125 results about "Linear code" patented technology

In coding theory, a linear code is an error-correcting code for which any linear combination of codewords is also a codeword. Linear codes are traditionally partitioned into block codes and convolutional codes, although turbo codes can be seen as a hybrid of these two types. Linear codes allow for more efficient encoding and decoding algorithms than other codes (cf. syndrome decoding).

Protection of data from erasures using subsymbol based codes

An encoder uses output symbol subsymbols to effect or control a tradeoff of computational effort and overhead efficiency to, for example, greatly reduce computational effort for the cost of a small amount of overhead efficiency. An encoder reads an ordered plurality of input symbols, comprising an input file or input stream, and produces output subsymbol. The ordered plurality of input symbols are each selected from an input alphabet, and the generated output subsymbols comprise selections among an output subsymbol alphabet. An output subsymbol is generated using a function evaluator applied to subsymbols of the input symbols. The encoder may be called one or more times, each time producing an output subsymbol. Output subsymbols can then be assembled into output symbols and transmitted to their destination. The functions used to generate the output subsymbols from the input subsymbols can be XOR's of some of the input subsymbols and these functions are obtained from a linear code defined over an extension field of GF(2) by transforming each entry in a generator or parity-check matrix of this code into an appropriate binary matrix using a regular representation of the extension field over GF(2). In a decoder, output subsymbols received by the recipient are obtained from output symbols transmitted from one sender that generated those output symbols based on an encoding of an input sequence (file, stream, etc.).
Owner:QUALCOMM INC

Protection of data from erasures using subsymbol based codes

An encoder uses output symbol subsymbols to effect or control a tradeoff of computational effort and overhead efficiency to, for example, greatly reduce computational effort for the cost of a small amount of overhead efficiency. An encoder reads an ordered plurality of input symbols, comprising an input file or input stream, and produces output subsymbol. The ordered plurality of input symbols are each selected from an input alphabet, and the generated output subsymbols comprise selections among an output subsymbol alphabet. An output subsymbol is generated using a function evaluator applied to subsymbols of the input symbols. The encoder may be called one or more times, each time producing an output subsymbol. Output subsymbols can then be assembled into output symbols and transmitted to their destination. The functions used to generate the output subsymbols from the input subsymbols can be XOR's of some of the input subsymbols and these functions are obtained from a linear code defined over an extension field of GF(2) by transforming each entry in a generator or parity-check matrix of this code into an appropriate binary matrix using a regular representation of the extension field over GF(2). In a decoder, output subsymbols received by the recipient are obtained from output symbols transmitted from one sender that generated those output symbols based on an encoding of an input sequence (file, stream, etc.).
Owner:QUALCOMM INC

Method and apparatus for transmitting and receiving a data block in a wireless communication system

The invention provides methods and apparatus for transmitting and receiving a source data block in a wireless communication system using hybrid automatic retransmission request protocol. According to the scheme provided by the invention, at transmitting side, the source data block or part of source data block that is not decoded correctly at receiving side is divided into a plurality of data segments, each the plurality of data segments may be paded with known data to expand the data segments to be a predetermined lengthen, the data segment is encoded with linear code to be a data packet including the data segment and a redundancy information segment or including only redundancy information, and after that the encoded data packets are transmitted. At the receiving side, when each of the received data packets includes a data segment and a redundancy information segment, decoding is performed directly based on the received data packet, decoding is performed based on the received redundancy information segment and an data segment and redundancy information segment extracted from buffered data packets with a first and second chance to restore the data segment that is not decoded correctly in previous decoding processing. With the additional decoding chance, the scheme provided by the invention can improve decoding probability and thus the transmission efficiency of the system.
Owner:KONINKLJIJKE PHILIPS NV

Method and Apparatus for Public Key Encryption Scheme RLCE and IND-CCA2 Security

This invention discloses a method and system for generating a private key and a corresponding public key. These keys can be used for encrypting a message into a cipher-text for transmission through an insecure communication channel, and for decrypting said ciphertext into a clear plaintext. The goal of the present invention is to provide encryption and decryption methods of the McEliece type which are capable of improving the security level of a post-quantum cryptosystem. In one embodiment, this object is achieved by three methods: a method for creating a public key from a private linear code generator matrix, a method for encrypting a message into a ciphertext and a method for decrypting the cipher-text into a plaintext. The key generation and encryption methods of the present invention comprises the following steps:
    • selecting an [n, k] linear code generator matrix Gs=[g0 , . . . , gn] over GF(q) as the private key, where k, w, n and q are positive integers and where g0 , . . . , gn−1 are length k column vectors; selecting k×1 random matrices C0 , . . . , C w−1; selecting a k×k non-singular matrix S; selecting an (n+w)×(n+w) matrix A; selecting an (n+w)×(n+w) permutation matrix P; and setting the public key as G=S[g0 , . . . , gn−w, C0 , . . . , gn−1, Cn−1]AP.
    • receiving the public key G, which is a k×(n+w) matrix over a finite field GF(q); generating an error vector e having elements in GF(q) and having a predetermined weight t; and encrypting a message vector m, to a ciphertext vector y=mG+e.
The main difference between the proposed cryptosystem and known variants of the McEliece cryptosystem consists in the way the private generator matrix is disguised into the public one by inserting and mixing random columns within the private generator matrix.
Owner:WANG YONGGE

Quasi-cyclic low-density parity-check (QC-LDPC) code and correcting and linear coding method thereof

The invention relates to a quasi-cyclic low-density parity-check (QC-LDPC) code and a correcting and linear coding method thereof. The variable nodes of the LDPC code, the dimensionality of which is greater than 2, are informational nodes; and the variable nodes the dimensionality of which is 2 form a big end-to-end ring on a bipartite graph. The correcting method comprises the following implementation steps: randomly selecting one edge on the big ring the dimensionality of which is 2, cutting off the edge, and filling 0 in the corresponding position of a low-density check matrix, thereby acquiring a corrected structure of the code. The linear coding method of the corrected code comprises the following implementation steps: firstly, multiplying an input information vector s and a part of the check matrix the load of which is greater than 2 as a vector by a matrix to acquire an intermediate vector u; directly intercepting the corresponding position of the intermediate vector u to acquire a coding vector the variable node dimensionality of which is 1; computing bit by bit from a start bit according to the characteristics of the big ring on the bipartite graph to acquire a coding vector the variable node dimensionality of which is 2; and combining the two coding vectors to finally form a coding vector.
Owner:PLA UNIV OF SCI & TECH

Control method for code rate of three-dimensional video based on SAQD domain

InactiveCN101883283AAccurate descriptionSolve the optimal code rate allocation problemTelevision systemsDigital video signal modificationSimulationPeak value
The invention provides a control method for the code rate of a three-dimensional video based on an absolutely quantified residual error and an SAQD domain. In the method, a coding frame of a three-dimensional video with a gradable space coding structure based on an SVC solves the problem of optimal code rate distribution between the channels of the three-dimensional video by introducing the SAQD domain. The invention provides a rate model and a distortion model based on the SAQD domain and obtains the optimal code rates of a left channel and a right channel of the three-dimensional video by the resolution of an Lagrange's equation; and then, the quantified step length of each coding unit is obtained according to the calculated optimal code rate of each coding unit by the calculation of a linear code rate control model, thereby further coding each coding unit. Compared with the modes that the two channels of the three-dimensional video adopt fixed code rate distribution and a code rate control algorithm in an H.264 / SVC standard is adopted in each channel, the peak signal-to-noise ratio of a decoding image obtained by carrying out code rate control by adopting the method is higher, the bias of the output code rate of a coding end and a target code rate is smaller, and the method can adapt to the change of the bandwidth of a network fully.
Owner:BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products