Reed-Solomon code


Also found in: Acronyms.

Reed-Solomon code

[¦rēd ′säl·ə·mən ‚kōd]
(communications)
A linear, block-based error-correcting code with wide-ranging applications, which is based on the mathematics of finite fields.
References in periodicals archive ?
According to the technical specification of QR code, QR code employs Reed-Solomon code to correct the errors when a portion of QR code was defaced or some QR code modules were wrongly decoded.
Next, students are required as an assignment to work with the actual Reed-Solomon code used on Voyager II.
Verification algorithms, such as hash, CRC, and the Reed-Solomon code, are used to verify whether query minutiae have security problems.
Kumar, "Soft-decision decoding of reed-solomon codes using successive error-and-ersure decoding," in Proceedings of the 2008 IEEE Global Telecommunications Conference, GLOBECOM2008, pp.
For the attack scenario of bit flipping by increasing or decreasing values of one or more spectral components of pixels by one unit, Reed-Solomon codes were selected.
The proposed scheme consists of channel coding performed by Reed-Solomon codes at the user nodes and punctured convolutional code acting as network code at the common relay.
Ma, "Progressive list-enlarged algebraic soft decoding of Reed-Solomon codes," IEEE Communications Letters, vol.
of Denmark) present chapters on the basics of information theory, finite-state sources, channels and linear codes, Reed-Solomon codes and their decoding, and source coding that are suitable for a one-semester course.
Many good quantum error-correcting codes were constructed from BCH codes, Reed-Muller codes, Reed-Solomon codes and algebraic geometric codes, see [2-6].
There are several expressions available in the literature giving the performances for Reed-Solomon codes. One of them is an upper bound derived in [17]:
Day; "The Ubiquitous Reed-Solomon Codes," by Barry A.
Subsequent chapters cover areas including block designs, error-correcting codes, Reed-Solomon codes, algebraic cryptography, RSA ciphers, and graph theory.