error correction codes
Recently Published Documents


TOTAL DOCUMENTS

293
(FIVE YEARS 90)

H-INDEX

17
(FIVE YEARS 5)

Author(s):  
Hasan Aldiabat ◽  
Nedal Al-ababneh

In this paper, the bandwidth density of misaligned free space optical interconnects (FSOIs) system with and without coding under a fixed bit error rate is considered. In particular, we study the effect of using error correction codes of various codeword lengths on the bandwidth density and misalignment tolerance of the FSOIs system in the presence of higher order modes. Moreover, the paper demonstrates the use of the fill factor of the detector array as a design parameter to optimize the bandwidth density of the communication. The numerical results demonstrate that the bandwidth density improves significantly with coding and the improvement is highly dependent on the used codeword length and code rate. In addition, the results clearly show the optimum fill factor values that achieve the maximum bandwidth density and misalignment tolerance of the system.


Author(s):  
Dongsheng Wang ◽  
Yunjiang Wang ◽  
Ningping Cao ◽  
Bei Zeng ◽  
Raymond Lafflamme

Abstract In this work, we develop the theory of quasi-exact fault-tolerant quantum (QEQ) computation, which uses qubits encoded into quasi-exact quantum error-correction codes (``quasi codes''). By definition, a quasi code is a parametric approximate code that can become exact by tuning its parameters. The model of QEQ computation lies in between the two well-known ones: the usual noisy quantum computation without error correction and the usual fault-tolerant quantum computation, but closer to the later. Many notions of exact quantum codes need to be adjusted for the quasi setting. Here we develop quasi error-correction theory using quantum instrument, the notions of quasi universality, quasi code distances, and quasi thresholds, etc. We find a wide class of quasi codes which are called valence-bond-solid codes, and we use them as concrete examples to demonstrate QEQ computation.


Universe ◽  
2021 ◽  
Vol 8 (1) ◽  
pp. 1
Author(s):  
Chun-Jun Cao

In this note, I review a recent approach to quantum gravity that “gravitizes” quantum mechanics by emerging geometry and gravity from complex quantum states. Drawing further insights from tensor network toy models in AdS/CFT, I propose that approximate quantum error correction codes, when re-adapted into the aforementioned framework, also have promise in emerging gravity in near-flat geometries.


2021 ◽  
Vol 2021 ◽  
pp. 1-8
Author(s):  
Othman O. Khalifa ◽  
Nur Amirah bt Sharif ◽  
Rashid A Saeed ◽  
S. Abdel-Khalek ◽  
Abdulaziz N. Alharbi ◽  
...  

Quantum computing is a computer development technology that uses quantum mechanics to perform the operations of data and information. It is an advanced technology, yet the quantum channel is used to transmit the quantum information which is sensitive to the environment interaction. Quantum error correction is a hybrid between quantum mechanics and the classical theory of error-correcting codes that are concerned with the fundamental problem of communication, and/or information storage, in the presence of noise. The interruption made by the interaction makes transmission error during the quantum channel qubit. Hence, a quantum error correction code is needed to protect the qubit from errors that can be caused by decoherence and other quantum noise. In this paper, the digital system design of the quantum error correction code is discussed. Three designs used qubit codes, and nine-qubit codes were explained. The systems were designed and configured for encoding and decoding nine-qubit error correction codes. For comparison, a modified circuit is also designed by adding Hadamard gates.


Sensors ◽  
2021 ◽  
Vol 21 (24) ◽  
pp. 8271
Author(s):  
Duy-Thanh Nguyen ◽  
Nhut-Minh Ho ◽  
Weng-Fai Wong ◽  
Ik-Joon Chang

With technology scaling, maintaining the reliability of dynamic random-access memory (DRAM) has become more challenging. Therefore, on-die error correction codes have been introduced to accommodate reliability issues in DDR5. However, the current solution still suffers from high overhead when a large DRAM capacity is used to deliver high performance. We present a DRAM chip architecture that can track faults at byte-level DRAM cell errors to address this problem. DRAM faults are classified as temporary or permanent in our proposed architecture, with no additional pins and with minor DRAM chip modifications. Hence, we achieve reliability comparable to that of other state-of-the-art solutions while incurring negligible performance and energy overhead. Furthermore, the faulty locations are efficiently exposed to the operating system (OS). Thus, we can significantly reduce the required scrubbing cycle by scrubbing only faulty DRAM pages while reducing the system failure probability up to 5000∼7000 times relative to conventional operation.


2021 ◽  
Vol 2131 (2) ◽  
pp. 022119
Author(s):  
N S Mogilevskaya ◽  
V V Dolgov

Abstract The situation when an illegal user intercepts data from the communication channel of two legal users is considered. The data in the legal channel is protected from distortion by error correction codes. It is assumed that the intercept channel may be noisier than the legal channel. And, consequently, the interceptor receives low-quality data. The possibility of using a special type of error-correction code decoders by an illegal user to restore damaged data is discussed. The interceptor model is constructed. The model includes a receiving block of the intercept channel, as well as several auxiliary blocks, such as a memory device, a block for determining the quality of communication in the legal channel, databases with possible decoders and their parameters. Examples are given that show the potential capabilities of the interceptor. The examples demonstrate the difference in decoding quality between different decoders for LDPC codes and Reed-Muller codes. These examples show that an illegal user with the various decoders described in the open press can receive information with satisfactory quality even at a weak signal level in the intercept channel. The constructed model can be useful in the tasks of developing methods of protection against intruders who organize illegitimate data interception channels.


2021 ◽  
Author(s):  
Hanbyeol Kwon ◽  
Kwangrae Kim ◽  
Dongsuk Jeon ◽  
Ki-Seok Chung

Sign in / Sign up

Export Citation Format

Share Document