International Journal of Soft Computing

Year: 2018
Volume: 13
Issue: 1
Page No. 25 - 30

A Novel Shorten Erasure Based Reed Solomon Fault Tolerance Code for Road Traffic Data Fault Tolerance

Authors : Md. Rafeeq, C. Sunil Kumar and N. Subhash Chandra

References

Adya, A., W.J. Bolosky, M. Castro, G. Cermak and G. Cermak et al., 2002. Farsite: Federated, available and reliable storage for an incompletely trusted environment. Proceedings of the 5th symposium on Operating systems design and implementation, Volume, 36, December 9-11, 2002, Boston, Massachusetts, USA., pp: 1-14.

Bellorado, J. and A. Kavcic, 2010. Low-complexity soft-decoding algorithms for reed-solomon codes-Part I: An algebraic soft-in hard-out chase decoder. IEEE. Trans. Inf. Theory, 56: 945-959.
CrossRef  |  Direct Link  |  

Druschel, P. and A. Rowstron, 2001. PAST: A large-scale, persistent peer-to-peer storage utility. Proceedings of the 8th Workshop on Hot Topics in Operating Systems, May 20-22, 2001, IEEE, Elmau, Germany, ISBN:0-7695-1040-X, pp: 75-80.

Garcia-Herrero, F., J. Valls and P.K. Meher, 2011. High-speed RS (255, 239) decoder based on LCC decoding. Circuits Syst. Signal Process., 30: 1643-1669.
CrossRef  |  Direct Link  |  

Haeberlen, A., A. Mislove and P. Druschel, 2005. Glacier: Highly durable, decentralized storage despite massive correlated failures. Proceedings of the 2nd Conference on Symposium on Networked Systems Design and Implementation Volume 2, May 2-4, 2005, USENIX Association, Berkeley, California, USA., pp: 143-158.

Jiang, J. and K.R. Narayanan, 2008. Algebraic soft-decision decoding of reed-solomon codes using bit-level soft information. IEEE. Trans. Inf. Theory, 54: 3907-3928.
CrossRef  |  Direct Link  |  

Kubiatowicz, J., D. Bindel, Y. Chen, S. Czerwinski, P. Eaton and D. Geels, 2000. Oceanstore: An architecture for global-scale persistent storage. ACM Sigplan Notices, 28: 190-201.
CrossRef  |  

Mallikharjuna, K.R. and K. Anuradha, 2015. An efficient method for software reliability growth model selection using modified particle swarm optimization technique. Intl. Rev. Comput. Software, 10: 1169-1178.
Direct Link  |  

Mallikharjuna, R.K. and A. Kodali, 2017. An efficient method for enhancing reliability and selection of software reliability growth model through optimization techniques. J. Software, 12: 1-8.
Direct Link  |  

Rao, K.M. and K. Anuradha, 2016. Performance evaluation of software reliability growth models using optimization techniques. Intl. J. Comput. Sci. Inf. Secur., 14: 355-362.
Direct Link  |  

Shao, J. and Z. Cao, 2009. CCA-secure proxy re-encryption without pairings. Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography, Vol. 5443, March 18-20, 2009, Springer, Irvine, California, USA., pp: 357-376.

Tang, Q., 2008. Type-based proxy re-encryption and its construction. Proceedings of the 9th International Conference on Cryptology in India Vol. 8, December 14-17, 2008, Springer, Kharagpur, India, pp: 130-144.

Zhang, W., H. Wang and B. Pan, 2013. Reduced-complexity LCC reed-solomon decoder based on unified syndrome computation. IEEE. Trans. Very Large Scale Integr. Syst., 21: 974-978.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved