Research Group

OCEAN (OverCome Error And Noise)

This group focuses on the algorithms, VLSI implementations and architectures of several widely used error correcting codes (ECC), which are currently involved LDPC code and RS/BCH code. 

LDPC

The LDPC sub-group majorly focuses on the algorithms, VLSI architectures, and the applications of Low Density Parity Check (LDPC) code. Among various kinds of error correcting codes, LDPC codes are famous for their low-hardware-complexity and high performance characteristic. As a result, they are widely used in applications such as wireless communication and storage systems, including WiFi, WPAN, WiMAX, DVB and Advanced Flash Storage Systems. Our latest research topics involve LDPC-CC, NB-LDPC, Stochastic LDPC, Error Floor of LDPC, ..., etc.

Wireless Communication

Storage Systems

RS/BCH

The RS/BCH sub-group majorly focuses on the algorithms, VLSI architectures, and the applications of Reed-Solomon (RS) and Bose-Chaudhuri-Hocquenghem (BCH) code. Among various kinds of error correcting codes, RS and BCH codes are famous for their low-hardware-complexity characteristic, burst-error immunity.

As a result, they are widely used in applications such as storage systems, including DVD, flash drive, solid-state drive (SSD). Our latest research topics involve BCH codec for advanced flash memory, BCH and LDPC joint decoding algorithms, soft-decision RS/BCH code, ..., etc.

It's always welcome to join us !!

ML (Machine Learning)

Machine learning extracts features from data and using machine learning method to build particular model.  This group recently focus on data analysis, biomedical image processing, human voice recognition and some interesting issues.

Data Analysis

Biomedical Image Processing

3D MRI Brain Tumors Image Segmentation

Human Voice

Interesting Issuses

Path Planning Engine for Robot Navigation System

Siamese Network for PCB detect 

STAR (Secure Trust And Reliability)

The main research focus on various data encryption and decryption algorithms to protect the security of data during transmission, as well as security analysis and protection of cryptographic chips. Cryptographic systems, such as Elliptic Curve Cryptography, AEAD, Cryptocurrency, Post-Quantum Cryptography, etc., and storage systems, such as Memory Authentication, Database/Storage Encryption, are also studied.