Decoding of the Five-Error-Correcting Binary Quadratic Residue Codes

Size: px
Start display at page:

Download "Decoding of the Five-Error-Correcting Binary Quadratic Residue Codes"

Transcription

1 American Journal of Mathematical and Computer Modelling 2017; 2(1): doi: /.amcm Decoding of the Five-Error-Correcting Binary Quadratic Residue Codes Yani Zhang, Xiaomin Bao, Zhihua Yuan, Xusheng Wu School of Mathematics & Statistics, Southwest University, Chongqing, China address: (Xiaomin Bao) o cite this article: Yani Zhang, Xiaomin Bao, Zhihua Yuan, Xusheng Wu. Decoding of the Five-Error-Correcting Binary Quadratic Residue Codes. American Journal of Mathematical and Computer Modelling. Vol. 2, No. 1, 2017, pp doi: /.amcm Received: October 29, 2016; Accepted: November 28, 2016; Published: January 6, 2017 Abstract: In this paper, a new efficient syndrome-weight decoding algorithm (NESWDA) is presented to decode up to five possible errors in a binary systematic (7,, 11) quadratic residue (QR) code. he main idea of NESWDA is based on the property cyclic codes together with the weight of syndrome difference. he advantage of the NESWDA decoding algorithm over the previous table look-up methods is that it has no need of a look-up table to store the syndromes and their corresponding error patterns in the memory. Moreover, it can be extended to decode all five-error-correcting binary QR codes. Keywords: Cyclic Codes, Decoding, Quadratic Residue Code 1. Introduction he well-known QR codes, introduced by Prange in his report [1] in 197, are cyclic BCH codes with code rates greater than or equal to one-half and generally have large minimum distances so that most of the known QR codes are among the best-known codes. he code augmented by a parity bit, for instance, the (, 12, 8) QR code has be used for numerous communication links, including the Voyager imaging system link of NASA [2]. In the past decades, a series of different decoding methods given in [6-1] have been developed to decode the QR code. However, these algebraic decoding techniques require a large number of complicated computations in a finite field. hese complicated computations will lead to a time delay in the decoding procedures and therefore the decoding time will become unrealistic when the code length is large. herefor, to reduce the decoding complexity, we introduce the NESWDA algorithm, which can be used to decode the (7,,11) QR code. It allows for the correction of up to t = ( d 1) 2 = ( 11 1) 2 = errors, where x denotes the greatest integer less than or equal to x; t is the error-correcting capability and d=11 is the minimum Hamming distance of the code. Recently, table look-up decoding algorithms have been developed to decode the (7,, 11) QR code. he full lookup table in the conventional table look-up decoding algorithm (CLDA) needs = syndromes and their corresponding i error patterns. It requires (6bytes + 3bytes) 1.8 Mbytes memory size to store the table. Such a large memory required makes the computation very complicated. An efficient algorithm named look-up table decoding (LD) algorithm in [3] to decode the (7,, 11) QR code needs 1.0 Mbytes memory size to store the table. he well-known syndrome decoder [2] Requires 1 7 i 7 = = syndromes corresponding to error patterns stored in a table with a (6bytes +3bytes)=10 3. Kbytes memory size, called the reduced lookup table (RL). However, this memory size of the RL is still so large that one needs to further reduce the memory size of the look-up table. o achieve this end, an efficient table look-up decoding algorithm (LDA) in [] is developed to decode the (7,, 11) QR code, the memory size of the developed condensed look-up table consists of 36.6 Kbytes, and Lin et al. [] used a novel table look-up decoding algorithm, called the cyclic weight (CW) decoding algorithm, together with a memory size 20.3 Kbytes to decode the (7,, 11) QR code. As shown in this paper, the proposed NESWDA does not need a memory size to store the look-up table. he prime idea of the proposed

2 American Journal of Mathematical and Computer Modelling 2017; 2(1): NESWDA is based on the weight of syndrome difference between the syndrome of the received word and the row vector of the transpose of the parity-check matrix. Moreover, no complicated computation in the finite field is required in the proposed NESWDA and it also can be extended to decode all five-error-correcting binary QR codes. he remainder of this paper is organized as follows: he background of the binary QR codes is briefly given in Section 2. he proposed NESWDA is described in Section 3. In Section, two examples are used to demonstrate the proposed NESWDA. Finally, this paper concludes with a brief summary in Section. 2. Background of the Binary QR Codes he binary QR codes are a nice family of linear cyclic codes. n, n + 1 2, d denote the binary QR Let ( n, k, d ) or codes with generator polynomial g( x ) over GF ( 2). he length of this code is a prime number of the form n = 8l ± 1, where l is some integer. Also, let k = ( n + 1) 2 denote the message length or information length, and d denote the minimum Hamming distance of the code. he set Q n of quadratic residues modulo n is the set of nonzero squares modulo n ; that is, Q { } 2 n x mod n,1 x n 1 = 7, then its quadratic residue set is =. If n Q 7 = { 1,2,3,,6,78,9,12,1,16,17,18,21,,2,27,28,32,3,36,37,2, }. Let the symbol C 7 denote the binary (7,, 11) QR code. Let α be a root of primitive irreducible polynomial p x = 1+ x + x such that α is a generator of the multiplicative group of all nonzero elements in ( 2 ) i ( β ) i Q7 GF. hen, the element β u = = 178, u = α where 81, is a primitive 7th root of unity in GF ( 2 ). he generator polynomial g ( x ) of the binary (7,, 11) QR code is defined by g x = x = 1+ x + x + x + x + x + x + x + x + x + x + x + x + x + x where the degree of g ( x ) is, which is the multiplicative order of the integer 2 modulo the code length 7; that is, 2 1mod 7. he (7,, 11) QR code generated by this manner can correct up to five errors. A codeword of binary QR code is a polynomial n c x = c + c x + c x + + c x such that it is a multiple n 1 of the generator polynomial g ( x ). If the codeword c x is transmitted through a noisy channel, then the received 2 n 1 polynomial r ( x) = r + r x + r x + + r x can be n 1 expressed as the sum of the codeword polynomial c( x ) and e x = e + e x + e x + + e x. For 2 n 1 the error polynomial n 1 simplicity, let the message or information, codeword, error pattern, received word, and syndrome be expressed as the binary vector forms m = ( m, m,, mk ), c = ( c, c,, cn ), e = ( e0, e1,, en 1 ), r ( r0, r1,, r n 1 ) ( s s ) = and s = 0, 1,, sn k 1, respectively. he systematic codeword of the vector form is given by c = mg, where G is called the k n k matrix and systematic generator matrix. Let A be a I k be a k k identity matrix, and G can be expressed as G =. he parity-check matrix H can be expressed as Ik A k n =, where H A I n k n ( n k) A denotes the ( n k ) k transpose matrix of A. he vector form of the syndrome is defined by s = rh, where n n k transpose matrix of H ; that is, H denotes the H can be expressed as H h0 A h 1 = I = n k h n 1 For C 7, Ahas the following form: Figure 1. A of C Decoding Algorithm and heorems Definition 1. he Hamming weight of a binary vector a is denoted by w(a), and the Hamming distance between a and b (1)

3 8 Yani Zhang et al.: Decoding of the Five-Error-Correcting Binary Quadratic Residue Codes is denoted by d(a, b) = w(a+b). heorem 1. Let a ( a0, a1,, an 1 ) ( b b ) = be two binary vectors, then 0, 1,, bn 1 w(a+b) = w(a) + w(b) = and b n 1 2 aibi. (2) 0 Corollary 1. If aib i = 0 for 0 i n 1, then w(a+b) = w(a) + w(b). (3) he following heorem is useful to compute the syndrome of the received word when the received word shifts one bit to the right. s x be the syndrome polynomial heorem 2. Let corresponding to a received polynomial r ( x ). Also, let r ( 1 ) x be the polynomial obtained by cyclically shifting the coefficients of r ( x) one bit to the right. hen the remainder obtained when dividing xs ( x ) by g ( x ) is the syndrome s ( 1 ) x corresponding to ( 1 r ) ( x ). For a detailed proof, see [2]. However, if the syndrome cyclically shifts many times, then the syndrome computation is quite time-consuming for g x many times. he following dividing xs ( x ) by theorem provides an efficient method to compute s for 0 i n 1, and it can save a lot of computational time. heorem 3. For the binary QR codes, let r be an element of r and h be the th row vector of hen the syndrome s of s H for 0 n 1. r i for 0 i n 1 has the form n 1 = rh[ i+ ], () = 0 where the suffix [ x ] of h denotes x mod n. Proof. Let r ( r0, r1,, r n 1 ) r = ( r,, r, r,, r ) for 0 i n 1 n i n 1 0 n i 1 = and. We have s i = rn ih0 + + rn 1hi 1 + r0 hi + + rn i 1hn 1 = rn ih[ n i i] + + rn 1h[ n 1 i] + r0 h[ 0 i] + + rn i 1h [ n i 1+ i] n 1 = = 0 rh[ i+ ] he proof is thus completed. heorem 3 reveals that the syndrome of can be fast computed by the vector addition. heorem also provides an efficient method to simplify the decoding step by using the syndrome weight. heorem. For the binary QR codes, it is assumed that there are verrors in the received word, where 1 v t and ( d ) t = 1 2. All v errors are in the parity-check bits if r i and only if the weight of syndrome w( s) = v. For a detailed proof, see []. heorem. For the binary QR codes, if v errors are in the information bits of the received word, where 1 v t and ( d ) t = 1 2, then the weight of the corresponding syndrome vector satisfies w( s) d v t + 1 () For a detailed proof, see []. heorem 6. For the binary QR codes, let e = ( e, e,, n ) be an error pattern and e = ( e,, k ), 0 1 e 1 ( e ) parity check section. Assume that ( m ) w( e) t, where t = ( d 1) 2 m 0 e 1 e p = k, en 1 be respectively its message section and w e 1, w( ep ) 1 and, then the weight of the corresponding syndrome vector satisfies Proof. As w ( s) = w( eh ) t 1 w s +. (6) = w( e,0 m 1 H + 01 k,e n k p H ) ( d w( em )) w( e p ) ( ( em ) ( e p )) = d w + w d t t + 1, the proof is thus completed. Given a received word r, the syndrome s of can be fast computed by theorem 3. According to theorem, if 1 w s then error positions are in the parity-check bits of r. If 1 w s, then the error positions are in the information bits of r. Let h denote the th row vector of H, where 0 n 1. Also let z denote the syndrome difference between the syndromes of r and h in each decoding step z. By using the weight of z, the error cases can be quickly determined. Let u 0 = ( 1,0,,0) be a k-tuples unit vector and u i has only one nonzero component at the i th position, where 0 i k 1. By using these properties the decoding algorithm can be constructed. Let case I, C, P denote the error position in the information bits, center bit, and parity-check bits of r, respectively. he decoding steps of the proposed NESWDA work as follows: (1)(No error, P, PP, PPP, PPPP, and PPPPP cases) By 0 w s, theorem 3, compute s and w( s ). If then the information vector is m ( r r ) r i 0 1 r 1 =,,, k. Go to step (8). (2)(I, II, III, IIII, and IIIII cases) By theorem 3, compute s and ( k) w s. If 1 w s, then the corrected

4 American Journal of Mathematical and Computer Modelling 2017; 2(1): information vector is ( ) 0 1 k 1 m = r, r,, r + s,0. Go to step (8). (3)(IP, IPP, IPPP, IPPPP, C, CP, CPP, CPPP, and CPPPP cases) Compute the syndrome difference 3 = s hi for 0 i k 1 w, then the and 3 ). If ( 3 ) corrected information vector m = r0, r1,, r k 1 + u i. Go to step (8). () (IC, IIC, IIIC, IIIIC, IIP, IIIP, and IIIIP cases) Compute the syndrome difference 0 i k 1 and ). If s h i = for w and i = 0, then the corrected information vector m = r, r,, r + u +,0 w and ( ). If 0 1 k 1 k 1 0 i k 1, then the corrected information vector m = r, r,, r +,0. Go to step (8). 0 1 k 1 able 1. he number of error patterns in each decoding step of C 7. Steps Cases Number of error patterns 1 P, PP, PPP, PPPP, PPPPP 1 2 I, II, III, IIII, IIIII 1 3 IP,IPP,IPPP,IPPPP,C,CP,CPP,CPPP,CPPPP IC, IIC, IIIC, IIIIC, IIP, IIIP, IIIIP IIPP, IIPPP, ICP, ICPP, ICPPP IICP, IIICP, IIIPP IICPP 6009 Sum = i ()(IIPP, IIPPP, ICP, ICPP, and ICPPP cases) Compute the syndrome difference = s hi h for 0 i k 1 < and ). If w, then the 3 corrected information vector m = ( r0, r1,, r k 1 ) + u i + u. Go to step (8). (6)(IICP, IIICP, and IIIPP cases) Compute the syndrome difference = s h h for 0 i < k 1 and 6 i 6 ). If 6 ) 3 and i = 0 information vector m = ( r0, r1,, rk 1 ) + uk 1 + ( 6,0) If 6 ) 3 and i > 0 information vector m = ( r, r,, r ) + (,0), then the corrected., then the corrected 0 1 k 1 6. Go to step (8). (7)(IICPP case) Compute the syndrome difference = s h h h for 0 i < k 2 and 7 k 1 i 7 ). If ( 7 ) 2 vector ( ) w, then the corrected information m = r, r,, r k + u i + u + u k Go to step (8). (8) Stop. able 1 lists all the 3 error cases and the number of error patterns in each decoding step of C7 of the proposed NESWDA. he flowchart of the proposed NESWDA is shown in figure 1.. Example In this section, two examples are presented to illustrate the proposed NESWDA. Example 1. Let a information m = ( ) be encoded into a C 7 codeword c = ( ). If the received word r = ( ), then the error pattern e = ( ), which means a III error case. he decoding procedure is composed of the following steps. (1) Compute s = ( ) and w(s) = 12. Since w(s) >, go to step 2. (2) Compute s = ( ) and w( s ) = 3. he corrected information vector is m = ( ) + ( ) = ( ). Go to stop.

5 10 Yani Zhang et al.: Decoding of the Five-Error-Correcting Binary Quadratic Residue Codes Figure 2. Flowchart of the proposed NESWDA.

6 American Journal of Mathematical and Computer Modelling 2017; 2(1): Example 2. Let a information m = ( ) be encoded into a C 7 codeword c = ( ). If the received word r = ( ), then the error pattern e = ( ), which means a IICP case. he decoding procedure is composed of the following steps. (1) Compute s = ( ) and w(s) = 9 >, go to step 2. (2) Compute s = ( ) and w( s ) = 16 >, go to step 3. (3) Compute 3 = s hi for 0 i and 3). ( ) 3 0 = ( ), 3 1 3) = 9. ( ) = ( ), 3 9 3) = 13: ( ) = ( ), 3 3) =. ( ) = ( ), 3) = 11. Since every 3) >, go to step. () Compute = s h for 0 i and ). i = s h0 = ( ) ( ) = ( ), ) = 12. = s h1 = ( ) ( ) = ( ), ) = 6. = s h = ( ) ( ) = ( ), ) = 1. Since every ) >, go to step. () Compute = s hi h for 0 i < and ). = s h0 h = ( ), 1 ) = 6. = s h0 h = ( ), 2 ) = 1. = s h0 h = ( ), w( ) = 11. = s h1 h = ( ), 2 ) = 11. = s h1 h = ( ), ) = 7. = s h22 h = ( ), ) = 10. Since every ) > 3, go to step 6. (6) Compute = s h h for 0 i < and 6) i = s h h = ( ), 6) = 12. = s h h = ( ), 6) = Since 6) = 2 3, and i = 0. he corrected information

7 12 Yani Zhang et al.: Decoding of the Five-Error-Correcting Binary Quadratic Residue Codes Go to stop.. Conclusions ( r r r ) u ( ) m =,,, + +,0 = ( ) + ( ) + ( ) = ( ). A new NESWDA decoding algorithm is developed to correct up to five errors for the approximate half-rate (7,, 11) QR code. he main idea behind the proposed NESWDA is based on the fact that it makes use of the properties of cyclic codes, the weight of syndrome difference. he proposed NESWDA has no need of a look-up table to store the syndromes and their corresponding error patterns in the memory. Moreover, it can be extended to decode all five-error-correcting binary QR codes. References [1] E. Prange, Some Cyclic Error-Correcting Codes with Simple Decoding Algorithms, Air Force Cambridge Research Center, Cambridge, MA, 198 (N-8-16). [2] S. B. Wicker, Error Control Systems for Digital Communication and Storage, Prentice Hall, 199. [3] Y. H. Chen,. K. ruong, C. H. Huang, C. H. Chien, A lookup table decoding of systematic (7,, 11)quadratic residue code, Information Science 179 (2009) []. C. Lin, H. P. Lee, H. C. Chang, S. I. Chu,. K. ruong, High speed decoding of the binary (7,, 11)quadratic residue code, Information Science 180 (2010) []. C. Lin, H. P. Lee, H. C. Chang,. K. ruong, A cyclic weight algorithm of decoding (7,, 11) quadratic residue code, Information Science 197 (2012) [6] G. Dubney, I. S. Reed,. K. ruong, J. Yang, Decoding the (7,, 11) quadratic residue code using bit-error probability estimates, IEEE ransactions on Communications 7 (2009). [7] R. He, I. S. Reed,. K. ruong, X. Chen, Decoding the (7,, 11) quadratic residue code, IEEE ransactions on Information heory 7 (2001) [8]. C. Lin,. K. ruong, and H. P. Lee, Algebraic decoding of the (1, 21, 9) quadratic residue code, Information Sciences 179 (2009) [9] X. Chen, I. S. Reed,. Helleseth, and. K. ruong, Use of Grobner bases to decode binary cyclic codes up to the true minimum distance, IEEE ransactions on Information heory 0 (199) [10] Y. H. Chen,. K. ruong, Y. Chang, C. D. Lee, S. H. Chen, Algebraic decoding of Quadratic Residue codes using Berlekamp Massey algorithm, Journal of Information Science and Engineering (2007) [11] I. S. Reed, X. Chen, Error-Control Coding for Data Networks, Kluwer, Boston, MA, [12] I. S. Reed, M.. Shih,. K. ruong, VLSI design of inverse-free Berlekamp-Massey algorithm, Processings IEE 138 (1991) [13] I. S. Reed,. K. ruong, X. Chen, X. Yin, he algebraic decoding of the (1, 21, 9) Quadratic Residue code, IEEE ransactions on Information heory 38(1992) [1] I. S. Reed, X. Yin,. K. ruong, Algebraic decoding of the (32, 16, 8) Quadratic Residue code, IEEE ransactions on Information heory 36 (1990) [1] I. S. Reed, X. Yin,. K. ruong, J. K. Holmes, Decoding the (, 12, 8) Golay code, IEE Proceedings 137 (3) (1990)

New Algebraic Decoding of (17,9,5) Quadratic Residue Code by using Inverse Free Berlekamp-Massey Algorithm (IFBM)

New Algebraic Decoding of (17,9,5) Quadratic Residue Code by using Inverse Free Berlekamp-Massey Algorithm (IFBM) International Journal of Computational Intelligence Research (IJCIR). ISSN: 097-87 Volume, Number 8 (207), pp. 205 2027 Research India Publications http://www.ripublication.com/ijcir.htm New Algebraic

More information

New algebraic decoding method for the (41, 21,9) quadratic residue code

New algebraic decoding method for the (41, 21,9) quadratic residue code New algebraic decoding method for the (41, 21,9) quadratic residue code Mohammed M. Al-Ashker a, Ramez Al.Shorbassi b a Department of Mathematics Islamic University of Gaza, Palestine b Ministry of education,

More information

An Enhanced (31,11,5) Binary BCH Encoder and Decoder for Data Transmission

An Enhanced (31,11,5) Binary BCH Encoder and Decoder for Data Transmission An Enhanced (31,11,5) Binary BCH Encoder and Decoder for Data Transmission P.Mozhiarasi, C.Gayathri, V.Deepan Master of Engineering, VLSI design, Sri Eshwar College of Engineering, Coimbatore- 641 202,

More information

Chapter 6 Reed-Solomon Codes. 6.1 Finite Field Algebra 6.2 Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding

Chapter 6 Reed-Solomon Codes. 6.1 Finite Field Algebra 6.2 Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding Chapter 6 Reed-Solomon Codes 6. Finite Field Algebra 6. Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding 6. Finite Field Algebra Nonbinary codes: message and codeword symbols

More information

Error Correction Review

Error Correction Review Error Correction Review A single overall parity-check equation detects single errors. Hamming codes used m equations to correct one error in 2 m 1 bits. We can use nonbinary equations if we create symbols

More information

MATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups.

MATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups. MATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups. Binary codes Let us assume that a message to be transmitted is in binary form. That is, it is a word in the alphabet

More information

The BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes

The BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes S-723410 BCH and Reed-Solomon Codes 1 S-723410 BCH and Reed-Solomon Codes 3 Background The algebraic structure of linear codes and, in particular, cyclic linear codes, enables efficient encoding and decoding

More information

A 2-error Correcting Code

A 2-error Correcting Code A 2-error Correcting Code Basic Idea We will now try to generalize the idea used in Hamming decoding to obtain a linear code that is 2-error correcting. In the Hamming decoding scheme, the parity check

More information

ELEC 519A Selected Topics in Digital Communications: Information Theory. Hamming Codes and Bounds on Codes

ELEC 519A Selected Topics in Digital Communications: Information Theory. Hamming Codes and Bounds on Codes ELEC 519A Selected Topics in Digital Communications: Information Theory Hamming Codes and Bounds on Codes Single Error Correcting Codes 2 Hamming Codes (7,4,3) Hamming code 1 0 0 0 0 1 1 0 1 0 0 1 0 1

More information

Cyclic codes: overview

Cyclic codes: overview Cyclic codes: overview EE 387, Notes 14, Handout #22 A linear block code is cyclic if the cyclic shift of a codeword is a codeword. Cyclic codes have many advantages. Elegant algebraic descriptions: c(x)

More information

x n k m(x) ) Codewords can be characterized by (and errors detected by): c(x) mod g(x) = 0 c(x)h(x) = 0 mod (x n 1)

x n k m(x) ) Codewords can be characterized by (and errors detected by): c(x) mod g(x) = 0 c(x)h(x) = 0 mod (x n 1) Cyclic codes: review EE 387, Notes 15, Handout #26 A cyclic code is a LBC such that every cyclic shift of a codeword is a codeword. A cyclic code has generator polynomial g(x) that is a divisor of every

More information

4F5: Advanced Communications and Coding

4F5: Advanced Communications and Coding 4F5: Advanced Communications and Coding Coding Handout 4: Reed Solomon Codes Jossy Sayir Signal Processing and Communications Lab Department of Engineering University of Cambridge jossy.sayir@eng.cam.ac.uk

More information

G Solution (10 points) Using elementary row operations, we transform the original generator matrix as follows.

G Solution (10 points) Using elementary row operations, we transform the original generator matrix as follows. EE 387 October 28, 2015 Algebraic Error-Control Codes Homework #4 Solutions Handout #24 1. LBC over GF(5). Let G be a nonsystematic generator matrix for a linear block code over GF(5). 2 4 2 2 4 4 G =

More information

5.0 BCH and Reed-Solomon Codes 5.1 Introduction

5.0 BCH and Reed-Solomon Codes 5.1 Introduction 5.0 BCH and Reed-Solomon Codes 5.1 Introduction A. Hocquenghem (1959), Codes correcteur d erreurs; Bose and Ray-Chaudhuri (1960), Error Correcting Binary Group Codes; First general family of algebraic

More information

Berlekamp-Massey decoding of RS code

Berlekamp-Massey decoding of RS code IERG60 Coding for Distributed Storage Systems Lecture - 05//06 Berlekamp-Massey decoding of RS code Lecturer: Kenneth Shum Scribe: Bowen Zhang Berlekamp-Massey algorithm We recall some notations from lecture

More information

The Golay codes. Mario de Boer and Ruud Pellikaan

The Golay codes. Mario de Boer and Ruud Pellikaan The Golay codes Mario de Boer and Ruud Pellikaan Appeared in Some tapas of computer algebra (A.M. Cohen, H. Cuypers and H. Sterk eds.), Project 7, The Golay codes, pp. 338-347, Springer, Berlin 1999, after

More information

Binary Primitive BCH Codes. Decoding of the BCH Codes. Implementation of Galois Field Arithmetic. Implementation of Error Correction

Binary Primitive BCH Codes. Decoding of the BCH Codes. Implementation of Galois Field Arithmetic. Implementation of Error Correction BCH Codes Outline Binary Primitive BCH Codes Decoding of the BCH Codes Implementation of Galois Field Arithmetic Implementation of Error Correction Nonbinary BCH Codes and Reed-Solomon Codes Preface The

More information

Decoding Algorithm and Architecture for BCH Codes under the Lee Metric

Decoding Algorithm and Architecture for BCH Codes under the Lee Metric Decoding Algorithm and Architecture for BCH Codes under the Lee Metric Yingquan Wu and Christoforos N. Hadjicostis Coordinated Science Laboratory and Department of Electrical and Computer Engineering University

More information

PAPER A Low-Complexity Step-by-Step Decoding Algorithm for Binary BCH Codes

PAPER A Low-Complexity Step-by-Step Decoding Algorithm for Binary BCH Codes 359 PAPER A Low-Complexity Step-by-Step Decoding Algorithm for Binary BCH Codes Ching-Lung CHR a),szu-linsu, Members, and Shao-Wei WU, Nonmember SUMMARY A low-complexity step-by-step decoding algorithm

More information

Simplification of Procedure for Decoding Reed- Solomon Codes Using Various Algorithms: An Introductory Survey

Simplification of Procedure for Decoding Reed- Solomon Codes Using Various Algorithms: An Introductory Survey 2014 IJEDR Volume 2, Issue 1 ISSN: 2321-9939 Simplification of Procedure for Decoding Reed- Solomon Codes Using Various Algorithms: An Introductory Survey 1 Vivek Tilavat, 2 Dr.Yagnesh Shukla 1 PG Student,

More information

VHDL Implementation of Reed Solomon Improved Encoding Algorithm

VHDL Implementation of Reed Solomon Improved Encoding Algorithm VHDL Implementation of Reed Solomon Improved Encoding Algorithm P.Ravi Tej 1, Smt.K.Jhansi Rani 2 1 Project Associate, Department of ECE, UCEK, JNTUK, Kakinada A.P. 2 Assistant Professor, Department of

More information

Chapter 3 Linear Block Codes

Chapter 3 Linear Block Codes Wireless Information Transmission System Lab. Chapter 3 Linear Block Codes Institute of Communications Engineering National Sun Yat-sen University Outlines Introduction to linear block codes Syndrome and

More information

Cyclic Redundancy Check Codes

Cyclic Redundancy Check Codes Cyclic Redundancy Check Codes Lectures No. 17 and 18 Dr. Aoife Moloney School of Electronics and Communications Dublin Institute of Technology Overview These lectures will look at the following: Cyclic

More information

Chapter 6. BCH Codes

Chapter 6. BCH Codes Chapter 6 BCH Codes Description of the Codes Decoding of the BCH Codes Outline Implementation of Galois Field Arithmetic Implementation of Error Correction Nonbinary BCH Codes and Reed-Solomon Codes Weight

More information

EE 229B ERROR CONTROL CODING Spring 2005

EE 229B ERROR CONTROL CODING Spring 2005 EE 229B ERROR CONTROL CODING Spring 2005 Solutions for Homework 1 1. Is there room? Prove or disprove : There is a (12,7) binary linear code with d min = 5. If there were a (12,7) binary linear code with

More information

Know the meaning of the basic concepts: ring, field, characteristic of a ring, the ring of polynomials R[x].

Know the meaning of the basic concepts: ring, field, characteristic of a ring, the ring of polynomials R[x]. The second exam will be on Friday, October 28, 2. It will cover Sections.7,.8, 3., 3.2, 3.4 (except 3.4.), 4. and 4.2 plus the handout on calculation of high powers of an integer modulo n via successive

More information

Information redundancy

Information redundancy Information redundancy Information redundancy add information to date to tolerate faults error detecting codes error correcting codes data applications communication memory p. 2 - Design of Fault Tolerant

More information

Cyclic Codes. Saravanan Vijayakumaran August 26, Department of Electrical Engineering Indian Institute of Technology Bombay

Cyclic Codes. Saravanan Vijayakumaran August 26, Department of Electrical Engineering Indian Institute of Technology Bombay 1 / 25 Cyclic Codes Saravanan Vijayakumaran sarva@ee.iitb.ac.in Department of Electrical Engineering Indian Institute of Technology Bombay August 26, 2014 2 / 25 Cyclic Codes Definition A cyclic shift

More information

MATH3302 Coding Theory Problem Set The following ISBN was received with a smudge. What is the missing digit? x9139 9

MATH3302 Coding Theory Problem Set The following ISBN was received with a smudge. What is the missing digit? x9139 9 Problem Set 1 These questions are based on the material in Section 1: Introduction to coding theory. You do not need to submit your answers to any of these questions. 1. The following ISBN was received

More information

New Steganographic scheme based of Reed- Solomon codes

New Steganographic scheme based of Reed- Solomon codes New Steganographic scheme based of Reed- Solomon codes I. DIOP; S.M FARSSI ;O. KHOUMA ; H. B DIOUF ; K.TALL ; K.SYLLA Ecole Supérieure Polytechnique de l Université Dakar Sénégal Email: idydiop@yahoo.fr;

More information

Linear Cyclic Codes. Polynomial Word 1 + x + x x 4 + x 5 + x x + x

Linear Cyclic Codes. Polynomial Word 1 + x + x x 4 + x 5 + x x + x Coding Theory Massoud Malek Linear Cyclic Codes Polynomial and Words A polynomial of degree n over IK is a polynomial p(x) = a 0 + a 1 x + + a n 1 x n 1 + a n x n, where the coefficients a 0, a 1, a 2,,

More information

Communications II Lecture 9: Error Correction Coding. Professor Kin K. Leung EEE and Computing Departments Imperial College London Copyright reserved

Communications II Lecture 9: Error Correction Coding. Professor Kin K. Leung EEE and Computing Departments Imperial College London Copyright reserved Communications II Lecture 9: Error Correction Coding Professor Kin K. Leung EEE and Computing Departments Imperial College London Copyright reserved Outline Introduction Linear block codes Decoding Hamming

More information

RON M. ROTH * GADIEL SEROUSSI **

RON M. ROTH * GADIEL SEROUSSI ** ENCODING AND DECODING OF BCH CODES USING LIGHT AND SHORT CODEWORDS RON M. ROTH * AND GADIEL SEROUSSI ** ABSTRACT It is shown that every q-ary primitive BCH code of designed distance δ and sufficiently

More information

ECEN 604: Channel Coding for Communications

ECEN 604: Channel Coding for Communications ECEN 604: Channel Coding for Communications Lecture: Introduction to Cyclic Codes Henry D. Pfister Department of Electrical and Computer Engineering Texas A&M University ECEN 604: Channel Coding for Communications

More information

Solutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16

Solutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16 Solutions of Exam Coding Theory (2MMC30), 23 June 2016 (1.a) Consider the 4 4 matrices as words in F 16 2, the binary vector space of dimension 16. C is the code of all binary 4 4 matrices such that the

More information

Decoding Procedure for BCH, Alternant and Goppa Codes defined over Semigroup Ring

Decoding Procedure for BCH, Alternant and Goppa Codes defined over Semigroup Ring Decoding Procedure for BCH, Alternant and Goppa Codes defined over Semigroup Ring Antonio Aparecido de Andrade Department of Mathematics, IBILCE, UNESP, 15054-000, São José do Rio Preto, SP, Brazil E-mail:

More information

On formulas for decoding binary cyclic codes

On formulas for decoding binary cyclic codes On formulas for decoding binary cyclic codes Daniel Augot INRIA-Rocquencourt Domaine de Voluceau Le Chesnay, FRANCE Magali Bardet Laboratoire LITIS Université de Rouen Jean-Charles Faugère INRIA Rocquencourt,

More information

Error Detection & Correction

Error Detection & Correction Error Detection & Correction Error detection & correction noisy channels techniques in networking error detection error detection capability retransmition error correction reconstruction checksums redundancy

More information

B. Cyclic Codes. Primitive polynomials are the generator polynomials of cyclic codes.

B. Cyclic Codes. Primitive polynomials are the generator polynomials of cyclic codes. B. Cyclic Codes A cyclic code is a linear block code with the further property that a shift of a codeword results in another codeword. These are based on polynomials whose elements are coefficients from

More information

Reed-Solomon codes. Chapter Linear codes over finite fields

Reed-Solomon codes. Chapter Linear codes over finite fields Chapter 8 Reed-Solomon codes In the previous chapter we discussed the properties of finite fields, and showed that there exists an essentially unique finite field F q with q = p m elements for any prime

More information

Algebra for error control codes

Algebra for error control codes Algebra for error control codes EE 387, Notes 5, Handout #7 EE 387 concentrates on block codes that are linear: Codewords components are linear combinations of message symbols. g 11 g 12 g 1n g 21 g 22

More information

On the minimum distance of LDPC codes based on repetition codes and permutation matrices 1

On the minimum distance of LDPC codes based on repetition codes and permutation matrices 1 Fifteenth International Workshop on Algebraic and Combinatorial Coding Theory June 18-24, 216, Albena, Bulgaria pp. 168 173 On the minimum distance of LDPC codes based on repetition codes and permutation

More information

Coding Theory: Linear-Error Correcting Codes Anna Dovzhik Math 420: Advanced Linear Algebra Spring 2014

Coding Theory: Linear-Error Correcting Codes Anna Dovzhik Math 420: Advanced Linear Algebra Spring 2014 Anna Dovzhik 1 Coding Theory: Linear-Error Correcting Codes Anna Dovzhik Math 420: Advanced Linear Algebra Spring 2014 Sharing data across channels, such as satellite, television, or compact disc, often

More information

3. Coding theory 3.1. Basic concepts

3. Coding theory 3.1. Basic concepts 3. CODING THEORY 1 3. Coding theory 3.1. Basic concepts In this chapter we will discuss briefly some aspects of error correcting codes. The main problem is that if information is sent via a noisy channel,

More information

Exact Probability of Erasure and a Decoding Algorithm for Convolutional Codes on the Binary Erasure Channel

Exact Probability of Erasure and a Decoding Algorithm for Convolutional Codes on the Binary Erasure Channel Exact Probability of Erasure and a Decoding Algorithm for Convolutional Codes on the Binary Erasure Channel Brian M. Kurkoski, Paul H. Siegel, and Jack K. Wolf Department of Electrical and Computer Engineering

More information

REED-SOLOMON CODE SYMBOL AVOIDANCE

REED-SOLOMON CODE SYMBOL AVOIDANCE Vol105(1) March 2014 SOUTH AFRICAN INSTITUTE OF ELECTRICAL ENGINEERS 13 REED-SOLOMON CODE SYMBOL AVOIDANCE T Shongwe and A J Han Vinck Department of Electrical and Electronic Engineering Science, University

More information

Lecture 12. Block Diagram

Lecture 12. Block Diagram Lecture 12 Goals Be able to encode using a linear block code Be able to decode a linear block code received over a binary symmetric channel or an additive white Gaussian channel XII-1 Block Diagram Data

More information

Section 3 Error Correcting Codes (ECC): Fundamentals

Section 3 Error Correcting Codes (ECC): Fundamentals Section 3 Error Correcting Codes (ECC): Fundamentals Communication systems and channel models Definition and examples of ECCs Distance For the contents relevant to distance, Lin & Xing s book, Chapter

More information

Alternant and BCH codes over certain rings

Alternant and BCH codes over certain rings Computational and Applied Mathematics Vol. 22, N. 2, pp. 233 247, 2003 Copyright 2003 SBMAC Alternant and BCH codes over certain rings A.A. ANDRADE 1, J.C. INTERLANDO 1 and R. PALAZZO JR. 2 1 Department

More information

Fault Tolerance & Reliability CDA Chapter 2 Cyclic Polynomial Codes

Fault Tolerance & Reliability CDA Chapter 2 Cyclic Polynomial Codes Fault Tolerance & Reliability CDA 5140 Chapter 2 Cyclic Polynomial Codes - cylic code: special type of parity check code such that every cyclic shift of codeword is a codeword - for example, if (c n-1,

More information

ELEC-E7240 Coding Methods L (5 cr)

ELEC-E7240 Coding Methods L (5 cr) Introduction ELEC-E7240 Coding Methods L (5 cr) Patric Östergård Department of Communications and Networking Aalto University School of Electrical Engineering Spring 2017 Patric Östergård (Aalto) ELEC-E7240

More information

ELEC3227/4247 Mid term Quiz2 Solution with explanation

ELEC3227/4247 Mid term Quiz2 Solution with explanation ELEC7/447 Mid term Quiz Solution with explanation Ang Man Shun Department of Electrical and Electronic Engineering, University of Hong Kong Document creation date : 015 1 05 This document explain the solution

More information

Efficient Decoding of Permutation Codes Obtained from Distance Preserving Maps

Efficient Decoding of Permutation Codes Obtained from Distance Preserving Maps 2012 IEEE International Symposium on Information Theory Proceedings Efficient Decoding of Permutation Codes Obtained from Distance Preserving Maps Yeow Meng Chee and Punarbasu Purkayastha Division of Mathematical

More information

ELEC 405/ELEC 511 Error Control Coding. Hamming Codes and Bounds on Codes

ELEC 405/ELEC 511 Error Control Coding. Hamming Codes and Bounds on Codes ELEC 405/ELEC 511 Error Control Coding Hamming Codes and Bounds on Codes Single Error Correcting Codes (3,1,3) code (5,2,3) code (6,3,3) code G = rate R=1/3 n-k=2 [ 1 1 1] rate R=2/5 n-k=3 1 0 1 1 0 G

More information

Implementation of Galois Field Arithmetic. Nonbinary BCH Codes and Reed-Solomon Codes

Implementation of Galois Field Arithmetic. Nonbinary BCH Codes and Reed-Solomon Codes BCH Codes Wireless Information Transmission System Lab Institute of Communications Engineering g National Sun Yat-sen University Outline Binary Primitive BCH Codes Decoding of the BCH Codes Implementation

More information

Error Correction Methods

Error Correction Methods Technologies and Services on igital Broadcasting (7) Error Correction Methods "Technologies and Services of igital Broadcasting" (in Japanese, ISBN4-339-06-) is published by CORONA publishing co., Ltd.

More information

Making Error Correcting Codes Work for Flash Memory

Making Error Correcting Codes Work for Flash Memory Making Error Correcting Codes Work for Flash Memory Part I: Primer on ECC, basics of BCH and LDPC codes Lara Dolecek Laboratory for Robust Information Systems (LORIS) Center on Development of Emerging

More information

A Brief Encounter with Linear Codes

A Brief Encounter with Linear Codes Boise State University ScholarWorks Mathematics Undergraduate Theses Department of Mathematics 8-2014 A Brief Encounter with Linear Codes Brent El-Bakri Boise State University, brentelbakri@boisestate.edu

More information

MATH Examination for the Module MATH-3152 (May 2009) Coding Theory. Time allowed: 2 hours. S = q

MATH Examination for the Module MATH-3152 (May 2009) Coding Theory. Time allowed: 2 hours. S = q MATH-315201 This question paper consists of 6 printed pages, each of which is identified by the reference MATH-3152 Only approved basic scientific calculators may be used. c UNIVERSITY OF LEEDS Examination

More information

Error Correction and Trellis Coding

Error Correction and Trellis Coding Advanced Signal Processing Winter Term 2001/2002 Digital Subscriber Lines (xdsl): Broadband Communication over Twisted Wire Pairs Error Correction and Trellis Coding Thomas Brandtner brandt@sbox.tugraz.at

More information

Chapter 5. Cyclic Codes

Chapter 5. Cyclic Codes Wireless Information Transmission System Lab. Chapter 5 Cyclic Codes Institute of Communications Engineering National Sun Yat-sen University Outlines Description of Cyclic Codes Generator and Parity-Check

More information

ECE8771 Information Theory & Coding for Digital Communications Villanova University ECE Department Prof. Kevin M. Buckley Lecture Set 2 Block Codes

ECE8771 Information Theory & Coding for Digital Communications Villanova University ECE Department Prof. Kevin M. Buckley Lecture Set 2 Block Codes Kevin Buckley - 2010 109 ECE8771 Information Theory & Coding for Digital Communications Villanova University ECE Department Prof. Kevin M. Buckley Lecture Set 2 Block Codes m GF(2 ) adder m GF(2 ) multiplier

More information

Coding Theory. Ruud Pellikaan MasterMath 2MMC30. Lecture 11.1 May

Coding Theory. Ruud Pellikaan MasterMath 2MMC30. Lecture 11.1 May Coding Theory Ruud Pellikaan g.r.pellikaan@tue.nl MasterMath 2MMC30 /k Lecture 11.1 May 12-2016 Content lecture 11 2/31 In Lecture 8.2 we introduced the Key equation Now we introduce two algorithms which

More information

VLSI Architecture of Euclideanized BM Algorithm for Reed-Solomon Code

VLSI Architecture of Euclideanized BM Algorithm for Reed-Solomon Code JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 2, 4-4 (29) VLSI Architecture of Euclideanized BM Algorithm for Reed-Solomon Code HUANG-CHI CHEN,2, YU-WEN CHANG 3 AND REY-CHUE HWANG Deaprtment of Electrical

More information

Error-Correcting Codes

Error-Correcting Codes Error-Correcting Codes HMC Algebraic Geometry Final Project Dmitri Skjorshammer December 14, 2010 1 Introduction Transmission of information takes place over noisy signals. This is the case in satellite

More information

Linear Codes and Syndrome Decoding

Linear Codes and Syndrome Decoding Linear Codes and Syndrome Decoding These notes are intended to be used as supplementary reading to Sections 6.7 9 of Grimaldi s Discrete and Combinatorial Mathematics. The proofs of the theorems are left

More information

Linear Cyclic Codes. Polynomial Word 1 + x + x x 4 + x 5 + x x + x f(x) = q(x)h(x) + r(x),

Linear Cyclic Codes. Polynomial Word 1 + x + x x 4 + x 5 + x x + x f(x) = q(x)h(x) + r(x), Coding Theory Massoud Malek Linear Cyclic Codes Polynomial and Words A polynomial of degree n over IK is a polynomial p(x) = a 0 + a 1 + + a n 1 x n 1 + a n x n, where the coefficients a 1, a 2,, a n are

More information

Error-correcting codes and Cryptography

Error-correcting codes and Cryptography Error-correcting codes and Cryptography Henk van Tilborg Code-based Cryptography Workshop Eindhoven, May -2, 2 /45 CONTENTS I II III IV V Error-correcting codes; the basics Quasi-cyclic codes; codes generated

More information

The E8 Lattice and Error Correction in Multi-Level Flash Memory

The E8 Lattice and Error Correction in Multi-Level Flash Memory The E8 Lattice and Error Correction in Multi-Level Flash Memory Brian M Kurkoski University of Electro-Communications Tokyo, Japan kurkoski@iceuecacjp Abstract A construction using the E8 lattice and Reed-Solomon

More information

Solutions to problems from Chapter 3

Solutions to problems from Chapter 3 Solutions to problems from Chapter 3 Manjunatha. P manjup.jnnce@gmail.com Professor Dept. of ECE J.N.N. College of Engineering, Shimoga February 28, 2016 For a systematic (7,4) linear block code, the parity

More information

MATH 291T CODING THEORY

MATH 291T CODING THEORY California State University, Fresno MATH 291T CODING THEORY Spring 2009 Instructor : Stefaan Delcroix Chapter 1 Introduction to Error-Correcting Codes It happens quite often that a message becomes corrupt

More information

CONSTRUCTION OF QUASI-CYCLIC CODES

CONSTRUCTION OF QUASI-CYCLIC CODES CONSTRUCTION OF QUASI-CYCLIC CODES by Thomas Aaron Gulliver B.Sc., 1982 and M.Sc., 1984 University of New Brunswick A DISSERTATION SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF

More information

Objective: To become acquainted with the basic concepts of cyclic codes and some aspects of encoder implementations for them.

Objective: To become acquainted with the basic concepts of cyclic codes and some aspects of encoder implementations for them. ECE 7670 Lecture 5 Cyclic codes Objective: To become acquainted with the basic concepts of cyclic codes and some aspects of encoder implementations for them. Reading: Chapter 5. 1 Cyclic codes Definition

More information

Reverse Berlekamp-Massey Decoding

Reverse Berlekamp-Massey Decoding Reverse Berlekamp-Massey Decoding Jiun-Hung Yu and Hans-Andrea Loeliger Department of Information Technology and Electrical Engineering ETH Zurich, Switzerland Email: {yu, loeliger}@isi.ee.ethz.ch arxiv:1301.736v

More information

Dr. Cathy Liu Dr. Michael Steinberger. A Brief Tour of FEC for Serial Link Systems

Dr. Cathy Liu Dr. Michael Steinberger. A Brief Tour of FEC for Serial Link Systems Prof. Shu Lin Dr. Cathy Liu Dr. Michael Steinberger U.C.Davis Avago SiSoft A Brief Tour of FEC for Serial Link Systems Outline Introduction Finite Fields and Vector Spaces Linear Block Codes Cyclic Codes

More information

Coding Theory and Applications. Solved Exercises and Problems of Cyclic Codes. Enes Pasalic University of Primorska Koper, 2013

Coding Theory and Applications. Solved Exercises and Problems of Cyclic Codes. Enes Pasalic University of Primorska Koper, 2013 Coding Theory and Applications Solved Exercises and Problems of Cyclic Codes Enes Pasalic University of Primorska Koper, 2013 Contents 1 Preface 3 2 Problems 4 2 1 Preface This is a collection of solved

More information

EE512: Error Control Coding

EE512: Error Control Coding EE51: Error Control Coding Solution for Assignment on BCH and RS Codes March, 007 1. To determine the dimension and generator polynomial of all narrow sense binary BCH codes of length n = 31, we have to

More information

an author's https://oatao.univ-toulouse.fr/18723 http://dx.doi.org/10.1109/isit.2017.8006599 Detchart, Jonathan and Lacan, Jérôme Polynomial Ring Transforms for Efficient XOR-based Erasure Coding. (2017)

More information

Coset Decomposition Method for Decoding Linear Codes

Coset Decomposition Method for Decoding Linear Codes International Journal of Algebra, Vol. 5, 2011, no. 28, 1395-1404 Coset Decomposition Method for Decoding Linear Codes Mohamed Sayed Faculty of Computer Studies Arab Open University P.O. Box: 830 Ardeya

More information

Instruction Set Extensions for Reed-Solomon Encoding and Decoding

Instruction Set Extensions for Reed-Solomon Encoding and Decoding Instruction Set Extensions for Reed-Solomon Encoding and Decoding Suman Mamidi and Michael J Schulte Dept of ECE University of Wisconsin-Madison {mamidi, schulte}@caewiscedu http://mesaecewiscedu Daniel

More information

Definition 2.1. Let w be a word. Then the coset C + w of w is the set {c + w : c C}.

Definition 2.1. Let w be a word. Then the coset C + w of w is the set {c + w : c C}. 2.4. Coset Decoding i 2.4 Coset Decoding To apply MLD decoding, what we must do, given a received word w, is search through all the codewords to find the codeword c closest to w. This can be a slow and

More information

Coding for Memory with Stuck-at Defects

Coding for Memory with Stuck-at Defects Coding for Memory with Stuck-at Defects Yongjune Kim B. V. K. Vijaya Kumar Electrical Computer Engineering, Data Storage Systems Center (DSSC) Carnegie Mellon University Pittsburgh, USA yongjunekim@cmu.edu,

More information

ELG 5372 Error Control Coding. Lecture 5: Algebra 3: Irreducible, Primitive and Minimal Polynomials

ELG 5372 Error Control Coding. Lecture 5: Algebra 3: Irreducible, Primitive and Minimal Polynomials ELG 5372 Error Control Coding Lecture 5: Algebra 3: Irreducible, Primitive and Minimal Polynomials Irreducible Polynomials When f() is divided by g() and r() = 0, then g() is a factor of f() and we say

More information

Information Theory. Lecture 7

Information Theory. Lecture 7 Information Theory Lecture 7 Finite fields continued: R3 and R7 the field GF(p m ),... Cyclic Codes Intro. to cyclic codes: R8.1 3 Mikael Skoglund, Information Theory 1/17 The Field GF(p m ) π(x) irreducible

More information

16.36 Communication Systems Engineering

16.36 Communication Systems Engineering MIT OpenCourseWare http://ocw.mit.edu 16.36 Communication Systems Engineering Spring 2009 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 16.36: Communication

More information

Some Easily Decoded, Efficient, Burst Error Correcting Block Codes

Some Easily Decoded, Efficient, Burst Error Correcting Block Codes INFORMATION AND CONTROL 23, 234--244 (1973) Some Easily Decoded, Efficient, Burst Error Correcting Block Codes DAVID MANDELBAUM P.O. Box 645, Eatontown, New Jersey 07724 Single phased burst correcting

More information

Error Detection, Correction and Erasure Codes for Implementation in a Cluster File-system

Error Detection, Correction and Erasure Codes for Implementation in a Cluster File-system Error Detection, Correction and Erasure Codes for Implementation in a Cluster File-system Steve Baker December 6, 2011 Abstract. The evaluation of various error detection and correction algorithms and

More information

: Error Correcting Codes. October 2017 Lecture 1

: Error Correcting Codes. October 2017 Lecture 1 03683072: Error Correcting Codes. October 2017 Lecture 1 First Definitions and Basic Codes Amnon Ta-Shma and Dean Doron 1 Error Correcting Codes Basics Definition 1. An (n, K, d) q code is a subset of

More information

On the Construction and Decoding of Cyclic LDPC Codes

On the Construction and Decoding of Cyclic LDPC Codes On the Construction and Decoding of Cyclic LDPC Codes Chao Chen Joint work with Prof. Baoming Bai from Xidian University April 30, 2014 Outline 1. Introduction 2. Construction based on Idempotents and

More information

Some error-correcting codes and their applications

Some error-correcting codes and their applications Chapter 14 Some error-correcting codes and their applications J. D. Key 1 14.1 Introduction In this chapter we describe three types of error-correcting linear codes that have been used in major applications,

More information

} has dimension = k rank A > 0 over F. For any vector b!

} has dimension = k rank A > 0 over F. For any vector b! FINAL EXAM Math 115B, UCSB, Winter 2009 - SOLUTIONS Due in SH6518 or as an email attachment at 12:00pm, March 16, 2009. You are to work on your own, and may only consult your notes, text and the class

More information

Chapter 7. Error Control Coding. 7.1 Historical background. Mikael Olofsson 2005

Chapter 7. Error Control Coding. 7.1 Historical background. Mikael Olofsson 2005 Chapter 7 Error Control Coding Mikael Olofsson 2005 We have seen in Chapters 4 through 6 how digital modulation can be used to control error probabilities. This gives us a digital channel that in each

More information

CS6304 / Analog and Digital Communication UNIT IV - SOURCE AND ERROR CONTROL CODING PART A 1. What is the use of error control coding? The main use of error control coding is to reduce the overall probability

More information

AN IMPROVED LOW LATENCY SYSTOLIC STRUCTURED GALOIS FIELD MULTIPLIER

AN IMPROVED LOW LATENCY SYSTOLIC STRUCTURED GALOIS FIELD MULTIPLIER Indian Journal of Electronics and Electrical Engineering (IJEEE) Vol.2.No.1 2014pp1-6 available at: www.goniv.com Paper Received :05-03-2014 Paper Published:28-03-2014 Paper Reviewed by: 1. John Arhter

More information

MATH 291T CODING THEORY

MATH 291T CODING THEORY California State University, Fresno MATH 291T CODING THEORY Fall 2011 Instructor : Stefaan Delcroix Contents 1 Introduction to Error-Correcting Codes 3 2 Basic Concepts and Properties 6 2.1 Definitions....................................

More information

Graph-based codes for flash memory

Graph-based codes for flash memory 1/28 Graph-based codes for flash memory Discrete Mathematics Seminar September 3, 2013 Katie Haymaker Joint work with Professor Christine Kelley University of Nebraska-Lincoln 2/28 Outline 1 Background

More information

Fully-parallel linear error block coding and decoding a Boolean approach

Fully-parallel linear error block coding and decoding a Boolean approach Fully-parallel linear error block coding and decoding a Boolean approach Hermann Meuth, Hochschule Darmstadt Katrin Tschirpke, Hochschule Aschaffenburg 8th International Workshop on Boolean Problems, 28

More information

9 THEORY OF CODES. 9.0 Introduction. 9.1 Noise

9 THEORY OF CODES. 9.0 Introduction. 9.1 Noise 9 THEORY OF CODES Chapter 9 Theory of Codes After studying this chapter you should understand what is meant by noise, error detection and correction; be able to find and use the Hamming distance for a

More information

Low Density Parity Check (LDPC) Codes and the Need for Stronger ECC. August 2011 Ravi Motwani, Zion Kwok, Scott Nelson

Low Density Parity Check (LDPC) Codes and the Need for Stronger ECC. August 2011 Ravi Motwani, Zion Kwok, Scott Nelson Low Density Parity Check (LDPC) Codes and the Need for Stronger ECC August 2011 Ravi Motwani, Zion Kwok, Scott Nelson Agenda NAND ECC History Soft Information What is soft information How do we obtain

More information

Lecture 12: November 6, 2017

Lecture 12: November 6, 2017 Information and Coding Theory Autumn 017 Lecturer: Madhur Tulsiani Lecture 1: November 6, 017 Recall: We were looking at codes of the form C : F k p F n p, where p is prime, k is the message length, and

More information