Contents Introduction Primitive BCH Codes Generator Polynomial Properties Decoding of BCH Codes Syndrome Computation Syndrome and Error Pattern

Size: px
Start display at page:

Download "Contents Introduction Primitive BCH Codes Generator Polynomial Properties Decoding of BCH Codes Syndrome Computation Syndrome and Error Pattern"

Transcription

1 BCH CODE

2 Contents. Introduction. Primitive BCH Codes. Generator Polynomial 4. Properties 5. Decoding of BCH Codes 6. yndrome Computation 7. yndrome and Error Pattern 8. Error-location Polynomial 9. Decoding Procedure for BCH Codes

3 ContentsCont. 0. Berlekamp s Iterative Method for Finding σ. Finding the Roots of σ. The tep-by-tep Decoding

4 . Introduction BCH Bose Chaudhuri Hocquenghem codes form a large class of multiple random error-correcting codes. They were first discovered by Hocquenghem in 959, and independently by Bose and Chaudhuri in 960. They are cyclic codes. They are constructed based on Galois fields. 4

5 . Primitive BCH Codes For any integers m and t < m-, there exists a primitive BCH code with the following parameters: n m n k mt d min t This code is capable of correcting t or fewer random error over a span of m bit positions. The parameter t is called the designed errorcorrecting capability and the parameter t is called the designed minimum distance. 5

6 For example, for m 6 and t, there exists a BCH code with n 6-6 n k 6 8 d min 7 The code is a triple-error-correcting 6, 45 BCH code. 6

7 . Generator Polynomial Let be a primitive element in Galois field GF m. For i t, let φ i- be the minimum polynomial of the field element i-. The degree of φ i- is m or a factor of m. The generator polynomial g of a t-errorcorrecting primitive BCH code of length m is given by g LCM{ φ, φ, Lφt } 7

8 g Note that the degree of is mt or less. Hence the number of parity-check bits, n k, of the code is at most mt. Example : Let m 4 and t. Let be a primitive element in GF 4 which is constructed based on the 4 primitive polynomial p. The minimum polynomials of, and 5 are: φ 4 φ 4 φ 5 8

9 9 Hence the generator polynomial of the triple-errorcorrecting BCH code of length n 4 5 is The code is a 5, 5 cyclic code },, { LCM g φ φ φ φ φ φ

10 Example : Let m 6 and t 5. Let be a primitive element in GF 6 which is constructed based on the 6 primitive polynomial p. The minimum polynomials of,, 5, 7 and 9 are: φ 6 φ 4 6 φ φ 7 6 φ 9 Hence the generator polynomial of the 5-errorcorrecting BCH code of length n 6 6 is 0

11 g LCM{ φ, φ, φ5, φ7, φ9 φ φ φ φ φ } The degree of g is 7. Consequently, the code is a 6, 6 cyclic code.

12 Table : A list of primitive BCH codes

13 Table : A list of primitive BCH codes Cont.

14 Table : The elements of GF 4 generated by p 4 4

15 Table : Minimal polynomials of the elements in GF 4 generated by p 4 cont. Conjugate roots Minimal polynomials 0,, 4, 8 4, 6, 9, 4 5, 0 7,,, 4 4 5

16 Table : Minimal polynomials for GF m For example, the minimal polynomial of is φ, which is denoted by 0,, The conjugate roots of φ are, 6, 6 5 6

17 Table : Minimal polynomials for GF m cont. 76

18 Table : Minimal polynomials for GF m cont. 87

19 Table : Minimal polynomials for GF m cont. 98

20 Table : Minimal polynomials for GF m cont. 0 9

21 Table : Minimal polynomials for GF m cont. 0

22 4. Properties Consider a t-error-correcting BCH code of length n m with generator polynomial g g has,,,, t as root, i.e., i g 0, for i t. ince a code polynomial is a multiple of V g V also has,,,, t as roots, i.e., i V 0, for i t.

23 A polynomial V of degree less than m is a code polynomial if and only if it has,,,, t as roots.

24 5. Decoding of BCH Codes Consider a t-error-correcting BCH code of length n m with generator polynomial uppose a code polynomial V V v 0 v v... v n n is transmitted. r r 0 r r... Let be the received polynomial. r n n 4

25 Then r V e, where e is the error pattern caused by the channel noise. To check whether r is a code polynomial or not, we simply test whether. r r... r If yes, then r is a code polynomial; otherwise r is not a code polynomial and the presence of errors is detected. Decoding of a BCH code consists of the same three steps as for the decoding a cyclic code, namely: syndrome computation, determination of the error pattern, and error correction. t 0 5

26 6. yndrome Computation The syndrome consists of t components in GF m,,,..., t, i where r for i t. Computation: Let φ i be the minimum polynomial of i. Dividing r by φ i, we obtain Then i r a φi b i i b i i b can be obtained by feedback shift-register with connections based on φ i. 6

27 Example : Let m 4 and t. Consider the doubleerror correcting BCH code of length 4 5. The generator polynomial has,,, 4, as roots where is a primitive element in GF 4 4 constructed based on p. The code is a 5, 7 code. uppose the vector, is received. Then r r 8 7

28 The minimum polynomial of,,, 4 is φ φ φ 4 4. The minimum polynomial of is φ 4. Dividing r by φ and φ, we have b b 8

29 Then b b 4 4 b b Hence the syndrome of r is,,, 4 7 8,,, 4 9

30 Example 4: this example uses the built functions in MATLAB6. to simulate a Chinese poem transmission over the AWGN channel as NR 6.0 db. clear fid fopen' 杜甫詩.txt','r'; A freadfid; % A is an array of integers chara'; % to chinese character D sizea; NR 6 ; % 6dB NR 0logEb/No0logsignal_pw/code_rate**nois e_var, assume signal_pw noise_var /*code_rate*0^nr/0; 0

31 KK 6; % info length NN ; % code length TT ; % error correct capability for i::d for j:8 % to get all bits in two adjacent integers bj bitgetai,j; bj8 bitgetai,j; end u bchencob,nn,kk; % bch,6, encoder v -*u; % with BPK format, 0 <-->, <--> - r v sqrtnoise_var*randnsizev; % AWGN channel for j: if rj > 0 yj 0; % hard decision output else yj ;

32 end end y y6:; % without decoded, obtain the first 8-bit. y y4:; % without decoded, obtain the second 8-bit. Bi bitsnumy,8; Bi bitsnumy,8; v_hat bchdecoy,kk,tt; Ci bitsnumv_hat:8,8; Ci bitsnumv_hat9:6,8 ; end fid fopen' 杜甫詩 雜訊干擾.txt','w'; fid fopen' 杜甫詩 BCH decoded.txt','w'; fprintffid,'%c',charb; fprintffid,'%c',charc; fclose'all';

33 烽火連三月家書抵萬金白頭騷更短渾欲不勝簪 烽火連三月頡股抵萬? 白貄騷更短渾欲提細穠? 烽火連三月家書抵萬金白頭騷更短渾欲不勝簪 國破山河在城春草木深感時花濺淚恨別鳥驚心 國? 廾河在城春秦 d 麮 c 感時兕濺? 鳥驚心 國破山河在城春草木深感時花濺淚恨別鳥驚心 Figure : the original Chinese poem left, degraded by AWGN middle, recovered with BCH. encoder/decoder right

34 HW #9 g. What is the generator polynomial of the three-error-correcting of BCH code with length, which employed in Example 4?. Referring to Example 4, please input a new Chinese poem, and what is the result of this poem with BPK signal transmission over the Rayleigh fading channel as NR 6.0?. 4

35 7. yndrome and Error Pattern ince, then for i t. r v e i i i i r v e i e, This gives a relationship between the syndrome and the error pattern. uppose e has v errors at the locations j j j,,..., v, i.e., where e j j L 0 j < j <... < j < n. v v j, 5

36 6 From and, we have the following relation between the syndrome components and error locations : t j t j t j t t j j j j j j v v v e e e L M L L

37 If we can solve these t equations, we can j j j v determine,, L,. j v Once, j, L, j are determined, the exponents j, j,, j v tell us the locations of errors. Any method for solving these t equations is a decoding method. j v ince the elements, j, L, j give the locations of errors, they are called error-location numbers. For simplicity, let βl j l, for l v 7

38 Then, we have β β... β β β... β v β β... β t t t t v v M 4 These equations are known as power-sum symmetric functions. 8

39 8. Error-location Polynomial Define σ β β... β 0 σ σ Lσ where σ 0. σ has β, β, L, βv the reciprocals of errorlocation numbers as roots. σ is called the error-location polynomial. If we can determine σ from the syndrome, then the roots of σ give us the error location numbers, and hence the error pattern can be determined. v v v 5 9

40 From 5, we have the following relationship between the coefficients of σ and the errorlocation numbers: σ 0 σ β β Lβ σ β β β β Lβ β v σ βββ βββ Lβ β β 4 v v v σ β β Lβ v M v v v 6 40

41 The above equations are called elementary symmetric functions. From 4 and 6, we have the following relationship between the syndrome and the coefficients of σ: σ 0 σ σ 0 σ σ σ 0 M σ σ σ Lσ vσ v v v v v v σ σ σ Lσ v v v v v M

42 Note that 0. Then iσ σ, ; { 0, i for odd i i for even i The equations of 7 are called the Newton s identities. If we can determine σ, σ,, σ v from the Newton s identities, then we can determine the error-location numbers, β, β,, β v by finding the roots of σ. 4

43 A procedure for finding the error pattern yndrome Error-location Polynomial σ Error-location Numbers Error Patterns e 4

44 9. Decoding Procedure for BCH Codes Compute the syndrome Find error location polynomial σ. Determine the error-location numbers by finding the roots of σ. 4 Correct errors 44

45 Example 5: As we mentioned in Example, if the allzero vector is transmitted, i.e., V V and the received vector is, r r 8 The syndrome is computed as,,, ,,, 45

46 46 From the Newton s identities 7, we obtain the following equations ince it is a -error-correcting BCH code, the errorlocation polynomial is σ σ σ σ σ σ σ σ σ σ 0 σ σ σ σ 0 4 σ σ

47 47 We substitutes these syndrome values and the Newton s identities become o that, σ σ σ σ σ σ 8, σ σ > 8 σ

48 48 The error location polynomial is factored as The roots are and. Their multiplication inverse elements is and. Therefore the error location numbers are and. The error polynomial is The decoded polynomial is β β σ β e 0 ˆ V e r V 8 β

49 0. Berlekamp s Iterative Method for Finding σ σ can be computed iteratively. The iteration process consists of t steps. At the u-th step, we determine a minimum-degree polynomial lu σ σ σ Lσ u u u u l whose coefficients satisfy the first u Newton s identities u 49

50 Our next step is to find σ u whose coefficients satisfy the first u Newton s identities. First we check whether σ u also satisfies the u -th Newton s identity. If yes, σ u σ u is a minimum degree polynomial whose coefficients satisfy the first u Newton identities. If not, a correction term is added to σ u to form σ u so that its coefficients satisfy the first u Newton s identities. 50

51 To test whether σ u satisfies the u -th Newton s identity, we computes u u u du u σ u σ u... σl u u lu This quantity is called the u-th discrepancy. If d u 0, then the coefficients of σ u satisfies the u -th Newton s identity. We set σ u σ u l u l u actually, l u is the degree of σ u If d u 0, σ u needs to be adjusted to satisfy the u -th Newton s identity. 5

52 Correction: We go back to the steps prior to the u- th step and determine a polynomial σ p such that d and p - l p has the largest value, where p 0 l p is the degree of σ p. Then σ σ d d σ u u u p p u p σ u is the solution at the u -th step of the iteration process. Repeat the testing and correction until we reach the t-th step. Then σ σ t. The above iteration method applies to both binary and nonbinary BCH codes. 5

53 For binary BCH codes, it can be reduced to t steps. Every even step can be skipped. Execution of the Iteration Process Note that σ t satisfies the first Newton s identity. To carry out the iteration, we set up a table as below and fill out the table: u σ u d u l u u - l u M t 5

54 . Finding the Roots of σ The roots of σ in GF m in σ. If σ i 0, then i is a root of σ and σ -i m i is an error-location number. Roots error-location numbers determination and error correction can be carried out simultaneously. To decode the first received digit r n-, we check whether is a root of σ. If σ 0, then r n- is erroneous and must be corrected. If σ 0, then r n- is error-free. 54

55 Iterative formula, u, t σ σ d d σ u u u p p u p d u u u u u σ u σ u Lσ l u u l u u u u du u σ u σ u... σl u u lu 55

56 To decode r n-i, we test whether σ i 0. If σ i 0, r n-i is erroneous and must be corrected, otherwise r n-i is error-free. Example 6: Consider the decoding of the 5, 5 triple-error-correcting BCH code given in Example. The generator polynomial has,,, 4, 5, 6 as roots. The roots, and 4 have the same minimum polynomial, φ φ φ

57 The roots and 6 have the same minimum polynomial, φ φ 6 4 The minimum polynomial of 5 is uppose V is transmitted and is received. r φ

58 58 Then Clearly the error pattern is Dividing by φ, φ and φ 5 respectively, we have the following remainders: 5 r 5 e 5 b b b

59 59 The syndrome components are: Hence b b b b b b,,,,, 5 0 0

60 The st step: d σ 0 The nd step: σ d σ σ The rd step: since d 0 and in comparison of the values of d u and u l in steps and 0. u p 0 is taken i.e. step 0,

61 u σ σ d d σ u u u p p u p d u u u u u σ u σ u Lσ l u u l u σ σ d d 0 0 σ 0 5 d 0 4 σ 0 σ 5 6

62 d d σ σ σ σ σ d The 4 th step: 4 σ σ σ σ d

63 The 5 th step: consider the values of du and u l prior to the 4 th step. We take p i.e. nd step u σ 5 σ d 5 6 σ 5 5 σ 5 4 σ The 6 th step: σ σ 6

64 Iterative process results in the following table : u σ u d u l u u - l u take p take p

65 Iterative process results in the following table : Note that σ σ 6 5 σ σ σ 0 0 Hence, 0 and are roots of σ. The reciprocals of these roots are -, -0 5 and -. Hence, 5 and are the error-location numbers. Consequently, the error pattern is e 5 65

66 HW #0. In Example 6, what are the error pattern e and the output of BCH decoder, if the received vector is r

67 67. The tep-by-tep Decoding In this decoding, we do not find the error-location polynomial. Instead, we use the concept of the error-trapping decoding. First we define the syndrome matrix as following: where v v v v v M L M M L L ,,, t L

68 Theorem : For any binary BCH n, k, t code, and any v such that v t, the v by v syndrome matrix is singular if the number of errors is v- or less, and is nonsingular if the number of errors is v or v. The decision vector is defined m m, m, L, m t where decision bit is calculated as m v m m v v 0 if if det M det M v v

69 The decision vector of a general t-error-correcting binary BCH code can be determined as follows: if there are no errors, then m 0,0, L,0 if there is one error, then m,0, L,0 if there are u errors, then m {,,,0 0 where the symbol can be 0 or. 4if there are no less than t errors, the t,0 u t u t } m { u,,} 69

70 For example, if t, the decision vector could be 0, 0 for no errors,, 0 for single error, and, for two errors. For a received sequence r r0, r, Lrn, and error pattern with weight L, the step-by-step decoding is et i t, j - Check if detm i 0, If detm i 0, i i-, go to step 4. j j, Complement r n-j- to determine the modified syndrome and whether detm i 0. If detm i 0, set r n j rn j.otherwise, i i-. If i 0, go to 5. 70

71 4If j < k, go to. If j k, go to 5. 5Read the information digits r n-, r n-,., r n-k Example 7: in Example, for -error-correcting 5, 7 BCH code, suppose the all-zero vector is transmitted. and the received sequence is r The syndrome is computed as follows: r 9 7

72 r r 0 det det M There are at least two errors at the received sequence. To complement, the received sequence polynomial becomes as follows: r 4

73 7 4 9 r The syndrome is computed as follows: r r 0 det det M From the syndrome matrix, it shows that to complement does not reduce the number of errors. r 4

74 74 For p > 0, is obtained by cyclically shifting p places to the right. The syndrome matrix for is defined as follows: p r p v p v p v p v p p p p p v M L M L L p r r

75 The modified step-by-step decoding is described as follows: et i t, p. 0 0 Check det M i 0, if det M i 0, i i-, go to step 4. p Complement r to determine the shift 0 p syndrome and whether det M i 0. p If det M, set r p. 0 r p i 0 0 Otherwise, r n p r n p, and i i-. If i 0, go to 5. 4 p p, if p < k, go to. If p k, stop. 5Read the information digits r n-, r n-,., r n-k 75

76 Example 8: Consider -error-correcting 5, 7 BCH code over GF 4 with the primitive polynomial 4. The generator polynomial is g φ φ 8 uppose the all-zero vector is transmitted. And the received sequence is r The whole procedure of the step-by-step decoding is shown in the following page. After 7 steps, the information vector is obtained. 76

77 77 9 r r r det det det 0 0 M M

78 The corresponding decision vector is m, As one time cycle shift in r, the corresponding syndrome is r r

79 det M det M det 8 8 det 8 The corresponding decision vector is m, The whole decoding process is shown as follows. 79

80 p r m r p p 8 4,,, m 8,,,, p p 4 p4 p , Info. r ,,,, ,,,, ,,, 7,,, p ,,,, p ,,,, , ,

81 Example 8: This example uses the built functions in MATLAB 6. to simulate a photo transmission over the AWGN channel as NR 6.0 db. All statements in this program are almost as Example 4. The original photo, deteriorated photo and recovered photo are shown in the following page. Example 9: this example uses the built functions in MATLAB 6. to simulate a sound record transmission over the AWGN channel as NR 6.0 db. These three program files are attached on website 老胡小舖 8

82 Figure : the original photo 8

83 Figure : the deteriorated photo by AWGN channel. 8

84 Figure 4: the recovered photo with BCH encoder/decoder 84

85 HW #0-. Referring to Example 6, what is the result of this photo with BPK signal transmission over the Rayleigh fading channel as NR 6.0? Compare with the results of Example 6.. Referring to Example 7, what is the result of this sound record with BPK signal transmission over the Rayleigh fading channel as NR 6.0? Compare with the results of Example 7.. Referring to Example, find the BCH decoded sequence. 85

Chapter 6. BCH Codes

Chapter 6. BCH Codes Chapter 6 BCH Codes Description of the Codes Decoding of the BCH Codes Outline Implementation of Galois Field Arithmetic Implementation of Error Correction Nonbinary BCH Codes and Reed-Solomon Codes Weight

More information

Binary Primitive BCH Codes. Decoding of the BCH Codes. Implementation of Galois Field Arithmetic. Implementation of Error Correction

Binary Primitive BCH Codes. Decoding of the BCH Codes. Implementation of Galois Field Arithmetic. Implementation of Error Correction BCH Codes Outline Binary Primitive BCH Codes Decoding of the BCH Codes Implementation of Galois Field Arithmetic Implementation of Error Correction Nonbinary BCH Codes and Reed-Solomon Codes Preface The

More information

Implementation of Galois Field Arithmetic. Nonbinary BCH Codes and Reed-Solomon Codes

Implementation of Galois Field Arithmetic. Nonbinary BCH Codes and Reed-Solomon Codes BCH Codes Wireless Information Transmission System Lab Institute of Communications Engineering g National Sun Yat-sen University Outline Binary Primitive BCH Codes Decoding of the BCH Codes Implementation

More information

PAPER A Low-Complexity Step-by-Step Decoding Algorithm for Binary BCH Codes

PAPER A Low-Complexity Step-by-Step Decoding Algorithm for Binary BCH Codes 359 PAPER A Low-Complexity Step-by-Step Decoding Algorithm for Binary BCH Codes Ching-Lung CHR a),szu-linsu, Members, and Shao-Wei WU, Nonmember SUMMARY A low-complexity step-by-step decoding algorithm

More information

Implementation of Galois Field Arithmetic. Nonbinary BCH Codes and Reed-Solomon Codes

Implementation of Galois Field Arithmetic. Nonbinary BCH Codes and Reed-Solomon Codes BCH Codes Wireless Information Transmission System La. Institute of Communications Engineering g National Sun Yat-sen University Outline Binary Primitive BCH Codes Decoding of the BCH Codes Implementation

More information

An Enhanced (31,11,5) Binary BCH Encoder and Decoder for Data Transmission

An Enhanced (31,11,5) Binary BCH Encoder and Decoder for Data Transmission An Enhanced (31,11,5) Binary BCH Encoder and Decoder for Data Transmission P.Mozhiarasi, C.Gayathri, V.Deepan Master of Engineering, VLSI design, Sri Eshwar College of Engineering, Coimbatore- 641 202,

More information

Chapter 6 Reed-Solomon Codes. 6.1 Finite Field Algebra 6.2 Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding

Chapter 6 Reed-Solomon Codes. 6.1 Finite Field Algebra 6.2 Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding Chapter 6 Reed-Solomon Codes 6. Finite Field Algebra 6. Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding 6. Finite Field Algebra Nonbinary codes: message and codeword symbols

More information

Error Correction Review

Error Correction Review Error Correction Review A single overall parity-check equation detects single errors. Hamming codes used m equations to correct one error in 2 m 1 bits. We can use nonbinary equations if we create symbols

More information

5.0 BCH and Reed-Solomon Codes 5.1 Introduction

5.0 BCH and Reed-Solomon Codes 5.1 Introduction 5.0 BCH and Reed-Solomon Codes 5.1 Introduction A. Hocquenghem (1959), Codes correcteur d erreurs; Bose and Ray-Chaudhuri (1960), Error Correcting Binary Group Codes; First general family of algebraic

More information

The BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes

The BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes S-723410 BCH and Reed-Solomon Codes 1 S-723410 BCH and Reed-Solomon Codes 3 Background The algebraic structure of linear codes and, in particular, cyclic linear codes, enables efficient encoding and decoding

More information

A 2-error Correcting Code

A 2-error Correcting Code A 2-error Correcting Code Basic Idea We will now try to generalize the idea used in Hamming decoding to obtain a linear code that is 2-error correcting. In the Hamming decoding scheme, the parity check

More information

Error Correction Methods

Error Correction Methods Technologies and Services on igital Broadcasting (7) Error Correction Methods "Technologies and Services of igital Broadcasting" (in Japanese, ISBN4-339-06-) is published by CORONA publishing co., Ltd.

More information

Optimum Soft Decision Decoding of Linear Block Codes

Optimum Soft Decision Decoding of Linear Block Codes Optimum Soft Decision Decoding of Linear Block Codes {m i } Channel encoder C=(C n-1,,c 0 ) BPSK S(t) (n,k,d) linear modulator block code Optimal receiver AWGN Assume that [n,k,d] linear block code C is

More information

Information redundancy

Information redundancy Information redundancy Information redundancy add information to date to tolerate faults error detecting codes error correcting codes data applications communication memory p. 2 - Design of Fault Tolerant

More information

Dr. Cathy Liu Dr. Michael Steinberger. A Brief Tour of FEC for Serial Link Systems

Dr. Cathy Liu Dr. Michael Steinberger. A Brief Tour of FEC for Serial Link Systems Prof. Shu Lin Dr. Cathy Liu Dr. Michael Steinberger U.C.Davis Avago SiSoft A Brief Tour of FEC for Serial Link Systems Outline Introduction Finite Fields and Vector Spaces Linear Block Codes Cyclic Codes

More information

Lecture 12. Block Diagram

Lecture 12. Block Diagram Lecture 12 Goals Be able to encode using a linear block code Be able to decode a linear block code received over a binary symmetric channel or an additive white Gaussian channel XII-1 Block Diagram Data

More information

x n k m(x) ) Codewords can be characterized by (and errors detected by): c(x) mod g(x) = 0 c(x)h(x) = 0 mod (x n 1)

x n k m(x) ) Codewords can be characterized by (and errors detected by): c(x) mod g(x) = 0 c(x)h(x) = 0 mod (x n 1) Cyclic codes: review EE 387, Notes 15, Handout #26 A cyclic code is a LBC such that every cyclic shift of a codeword is a codeword. A cyclic code has generator polynomial g(x) that is a divisor of every

More information

Chapter 7. Error Control Coding. 7.1 Historical background. Mikael Olofsson 2005

Chapter 7. Error Control Coding. 7.1 Historical background. Mikael Olofsson 2005 Chapter 7 Error Control Coding Mikael Olofsson 2005 We have seen in Chapters 4 through 6 how digital modulation can be used to control error probabilities. This gives us a digital channel that in each

More information

Chapter 5. Cyclic Codes

Chapter 5. Cyclic Codes Wireless Information Transmission System Lab. Chapter 5 Cyclic Codes Institute of Communications Engineering National Sun Yat-sen University Outlines Description of Cyclic Codes Generator and Parity-Check

More information

B. Cyclic Codes. Primitive polynomials are the generator polynomials of cyclic codes.

B. Cyclic Codes. Primitive polynomials are the generator polynomials of cyclic codes. B. Cyclic Codes A cyclic code is a linear block code with the further property that a shift of a codeword results in another codeword. These are based on polynomials whose elements are coefficients from

More information

Reed-Solomon codes. Chapter Linear codes over finite fields

Reed-Solomon codes. Chapter Linear codes over finite fields Chapter 8 Reed-Solomon codes In the previous chapter we discussed the properties of finite fields, and showed that there exists an essentially unique finite field F q with q = p m elements for any prime

More information

Cyclic codes: overview

Cyclic codes: overview Cyclic codes: overview EE 387, Notes 14, Handout #22 A linear block code is cyclic if the cyclic shift of a codeword is a codeword. Cyclic codes have many advantages. Elegant algebraic descriptions: c(x)

More information

Error Detection & Correction

Error Detection & Correction Error Detection & Correction Error detection & correction noisy channels techniques in networking error detection error detection capability retransmition error correction reconstruction checksums redundancy

More information

VHDL Implementation of Reed Solomon Improved Encoding Algorithm

VHDL Implementation of Reed Solomon Improved Encoding Algorithm VHDL Implementation of Reed Solomon Improved Encoding Algorithm P.Ravi Tej 1, Smt.K.Jhansi Rani 2 1 Project Associate, Department of ECE, UCEK, JNTUK, Kakinada A.P. 2 Assistant Professor, Department of

More information

Error Correction and Trellis Coding

Error Correction and Trellis Coding Advanced Signal Processing Winter Term 2001/2002 Digital Subscriber Lines (xdsl): Broadband Communication over Twisted Wire Pairs Error Correction and Trellis Coding Thomas Brandtner brandt@sbox.tugraz.at

More information

: Coding Theory. Notes by Assoc. Prof. Dr. Patanee Udomkavanich October 30, upattane

: Coding Theory. Notes by Assoc. Prof. Dr. Patanee Udomkavanich October 30, upattane 2301532 : Coding Theory Notes by Assoc. Prof. Dr. Patanee Udomkavanich October 30, 2006 http://pioneer.chula.ac.th/ upattane Chapter 1 Error detection, correction and decoding 1.1 Basic definitions and

More information

Fault Tolerant Computing CS 530 Information redundancy: Coding theory. Yashwant K. Malaiya Colorado State University

Fault Tolerant Computing CS 530 Information redundancy: Coding theory. Yashwant K. Malaiya Colorado State University CS 530 Information redundancy: Coding theory Yashwant K. Malaiya Colorado State University March 30, 2017 1 Information redundancy: Outline Using a parity bit Codes & code words Hamming distance Error

More information

Communications II Lecture 9: Error Correction Coding. Professor Kin K. Leung EEE and Computing Departments Imperial College London Copyright reserved

Communications II Lecture 9: Error Correction Coding. Professor Kin K. Leung EEE and Computing Departments Imperial College London Copyright reserved Communications II Lecture 9: Error Correction Coding Professor Kin K. Leung EEE and Computing Departments Imperial College London Copyright reserved Outline Introduction Linear block codes Decoding Hamming

More information

Decoding Procedure for BCH, Alternant and Goppa Codes defined over Semigroup Ring

Decoding Procedure for BCH, Alternant and Goppa Codes defined over Semigroup Ring Decoding Procedure for BCH, Alternant and Goppa Codes defined over Semigroup Ring Antonio Aparecido de Andrade Department of Mathematics, IBILCE, UNESP, 15054-000, São José do Rio Preto, SP, Brazil E-mail:

More information

16.36 Communication Systems Engineering

16.36 Communication Systems Engineering MIT OpenCourseWare http://ocw.mit.edu 16.36 Communication Systems Engineering Spring 2009 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 16.36: Communication

More information

ELEC 519A Selected Topics in Digital Communications: Information Theory. Hamming Codes and Bounds on Codes

ELEC 519A Selected Topics in Digital Communications: Information Theory. Hamming Codes and Bounds on Codes ELEC 519A Selected Topics in Digital Communications: Information Theory Hamming Codes and Bounds on Codes Single Error Correcting Codes 2 Hamming Codes (7,4,3) Hamming code 1 0 0 0 0 1 1 0 1 0 0 1 0 1

More information

Constructions of Nonbinary Quasi-Cyclic LDPC Codes: A Finite Field Approach

Constructions of Nonbinary Quasi-Cyclic LDPC Codes: A Finite Field Approach Constructions of Nonbinary Quasi-Cyclic LDPC Codes: A Finite Field Approach Shu Lin, Shumei Song, Lan Lan, Lingqi Zeng and Ying Y Tai Department of Electrical & Computer Engineering University of California,

More information

Fully-parallel linear error block coding and decoding a Boolean approach

Fully-parallel linear error block coding and decoding a Boolean approach Fully-parallel linear error block coding and decoding a Boolean approach Hermann Meuth, Hochschule Darmstadt Katrin Tschirpke, Hochschule Aschaffenburg 8th International Workshop on Boolean Problems, 28

More information

MATH 291T CODING THEORY

MATH 291T CODING THEORY California State University, Fresno MATH 291T CODING THEORY Fall 2011 Instructor : Stefaan Delcroix Contents 1 Introduction to Error-Correcting Codes 3 2 Basic Concepts and Properties 6 2.1 Definitions....................................

More information

Linear Codes and Syndrome Decoding

Linear Codes and Syndrome Decoding Linear Codes and Syndrome Decoding These notes are intended to be used as supplementary reading to Sections 6.7 9 of Grimaldi s Discrete and Combinatorial Mathematics. The proofs of the theorems are left

More information

Simplification of Procedure for Decoding Reed- Solomon Codes Using Various Algorithms: An Introductory Survey

Simplification of Procedure for Decoding Reed- Solomon Codes Using Various Algorithms: An Introductory Survey 2014 IJEDR Volume 2, Issue 1 ISSN: 2321-9939 Simplification of Procedure for Decoding Reed- Solomon Codes Using Various Algorithms: An Introductory Survey 1 Vivek Tilavat, 2 Dr.Yagnesh Shukla 1 PG Student,

More information

Channel Coding I. Exercises SS 2017

Channel Coding I. Exercises SS 2017 Channel Coding I Exercises SS 2017 Lecturer: Dirk Wübben Tutor: Shayan Hassanpour NW1, Room N 2420, Tel.: 0421/218-62387 E-mail: {wuebben, hassanpour}@ant.uni-bremen.de Universität Bremen, FB1 Institut

More information

Channel Coding I. Exercises SS 2017

Channel Coding I. Exercises SS 2017 Channel Coding I Exercises SS 2017 Lecturer: Dirk Wübben Tutor: Shayan Hassanpour NW1, Room N 2420, Tel.: 0421/218-62387 E-mail: {wuebben, hassanpour}@ant.uni-bremen.de Universität Bremen, FB1 Institut

More information

Making Error Correcting Codes Work for Flash Memory

Making Error Correcting Codes Work for Flash Memory Making Error Correcting Codes Work for Flash Memory Part I: Primer on ECC, basics of BCH and LDPC codes Lara Dolecek Laboratory for Robust Information Systems (LORIS) Center on Development of Emerging

More information

Structured Low-Density Parity-Check Codes: Algebraic Constructions

Structured Low-Density Parity-Check Codes: Algebraic Constructions Structured Low-Density Parity-Check Codes: Algebraic Constructions Shu Lin Department of Electrical and Computer Engineering University of California, Davis Davis, California 95616 Email:shulin@ece.ucdavis.edu

More information

Linear Cyclic Codes. Polynomial Word 1 + x + x x 4 + x 5 + x x + x

Linear Cyclic Codes. Polynomial Word 1 + x + x x 4 + x 5 + x x + x Coding Theory Massoud Malek Linear Cyclic Codes Polynomial and Words A polynomial of degree n over IK is a polynomial p(x) = a 0 + a 1 x + + a n 1 x n 1 + a n x n, where the coefficients a 0, a 1, a 2,,

More information

ECE8771 Information Theory & Coding for Digital Communications Villanova University ECE Department Prof. Kevin M. Buckley Lecture Set 2 Block Codes

ECE8771 Information Theory & Coding for Digital Communications Villanova University ECE Department Prof. Kevin M. Buckley Lecture Set 2 Block Codes Kevin Buckley - 2010 109 ECE8771 Information Theory & Coding for Digital Communications Villanova University ECE Department Prof. Kevin M. Buckley Lecture Set 2 Block Codes m GF(2 ) adder m GF(2 ) multiplier

More information

Solutions or answers to Final exam in Error Control Coding, October 24, G eqv = ( 1+D, 1+D + D 2)

Solutions or answers to Final exam in Error Control Coding, October 24, G eqv = ( 1+D, 1+D + D 2) Solutions or answers to Final exam in Error Control Coding, October, Solution to Problem a) G(D) = ( +D, +D + D ) b) The rate R =/ and ν i = ν = m =. c) Yes, since gcd ( +D, +D + D ) =+D + D D j. d) An

More information

Chapter 3 Linear Block Codes

Chapter 3 Linear Block Codes Wireless Information Transmission System Lab. Chapter 3 Linear Block Codes Institute of Communications Engineering National Sun Yat-sen University Outlines Introduction to linear block codes Syndrome and

More information

Cyclic codes. Vahid Meghdadi Reference: Error Correction Coding by Todd K. Moon. February 2008

Cyclic codes. Vahid Meghdadi Reference: Error Correction Coding by Todd K. Moon. February 2008 Cyclic codes Vahid Meghdadi Reference: Error Correction Coding by Todd K. Moon February 2008 1 Definitions Definition 1. A ring < R, +,. > is a set R with two binary operation + (addition) and. (multiplication)

More information

ELEC3227/4247 Mid term Quiz2 Solution with explanation

ELEC3227/4247 Mid term Quiz2 Solution with explanation ELEC7/447 Mid term Quiz Solution with explanation Ang Man Shun Department of Electrical and Electronic Engineering, University of Hong Kong Document creation date : 015 1 05 This document explain the solution

More information

Optical Storage Technology. Error Correction

Optical Storage Technology. Error Correction Optical Storage Technology Error Correction Introduction With analog audio, there is no opportunity for error correction. With digital audio, the nature of binary data lends itself to recovery in the event

More information

Channel Coding and Interleaving

Channel Coding and Interleaving Lecture 6 Channel Coding and Interleaving 1 LORA: Future by Lund www.futurebylund.se The network will be free for those who want to try their products, services and solutions in a precommercial stage.

More information

SPA decoding on the Tanner graph

SPA decoding on the Tanner graph SPA decoding on the Tanner graph x,(i) q j,l = P(v l = x check sums A l \ {h j } at the ith iteration} x,(i) σ j,l = Σ P(s = 0 v = x,{v : t B(h )\{l}}) q {vt : t B(h j )\{l}} j l t j t B(h j )\{l} j,t

More information

Error Control Codes for Memories

Error Control Codes for Memories The 2 th Korea Test Conference Error Control Codes for Memories June 22, 2 Jun Jin Kong, Ph.D. (jjkong@samsung.com) Samsung Electronics Co., Ltd. (Memory) Biography of Jun Jin Kong Brief History Present:

More information

Construction and Performance Evaluation of QC-LDPC Codes over Finite Fields

Construction and Performance Evaluation of QC-LDPC Codes over Finite Fields MEE10:83 Construction and Performance Evaluation of QC-LDPC Codes over Finite Fields Ihsan Ullah Sohail Noor This thesis is presented as part of the Degree of Master of Sciences in Electrical Engineering

More information

MATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups.

MATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups. MATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups. Binary codes Let us assume that a message to be transmitted is in binary form. That is, it is a word in the alphabet

More information

Design of Non-Binary Quasi-Cyclic LDPC Codes by Absorbing Set Removal

Design of Non-Binary Quasi-Cyclic LDPC Codes by Absorbing Set Removal Design of Non-Binary Quasi-Cyclic LDPC Codes by Absorbing Set Removal Behzad Amiri Electrical Eng. Department University of California, Los Angeles Los Angeles, USA Email: amiri@ucla.edu Jorge Arturo Flores

More information

Polynomial Codes over Certain Finite Fields

Polynomial Codes over Certain Finite Fields Polynomial Codes over Certain Finite Fields A paper by: Irving Reed and Gustave Solomon presented by Kim Hamilton March 31, 2000 Significance of this paper: Introduced ideas that form the core of current

More information

Chapter 7 Reed Solomon Codes and Binary Transmission

Chapter 7 Reed Solomon Codes and Binary Transmission Chapter 7 Reed Solomon Codes and Binary Transmission 7.1 Introduction Reed Solomon codes named after Reed and Solomon [9] following their publication in 1960 have been used together with hard decision

More information

CS6304 / Analog and Digital Communication UNIT IV - SOURCE AND ERROR CONTROL CODING PART A 1. What is the use of error control coding? The main use of error control coding is to reduce the overall probability

More information

MATH 291T CODING THEORY

MATH 291T CODING THEORY California State University, Fresno MATH 291T CODING THEORY Spring 2009 Instructor : Stefaan Delcroix Chapter 1 Introduction to Error-Correcting Codes It happens quite often that a message becomes corrupt

More information

The Pennsylvania State University. The Graduate School. Department of Computer Science and Engineering

The Pennsylvania State University. The Graduate School. Department of Computer Science and Engineering The Pennsylvania State University The Graduate School Department of Computer Science and Engineering A SIMPLE AND FAST VECTOR SYMBOL REED-SOLOMON BURST ERROR DECODING METHOD A Thesis in Computer Science

More information

IN this paper, we will introduce a new class of codes,

IN this paper, we will introduce a new class of codes, IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 44, NO 5, SEPTEMBER 1998 1861 Subspace Subcodes of Reed Solomon Codes Masayuki Hattori, Member, IEEE, Robert J McEliece, Fellow, IEEE, and Gustave Solomon,

More information

MATH Examination for the Module MATH-3152 (May 2009) Coding Theory. Time allowed: 2 hours. S = q

MATH Examination for the Module MATH-3152 (May 2009) Coding Theory. Time allowed: 2 hours. S = q MATH-315201 This question paper consists of 6 printed pages, each of which is identified by the reference MATH-3152 Only approved basic scientific calculators may be used. c UNIVERSITY OF LEEDS Examination

More information

Error Detection, Correction and Erasure Codes for Implementation in a Cluster File-system

Error Detection, Correction and Erasure Codes for Implementation in a Cluster File-system Error Detection, Correction and Erasure Codes for Implementation in a Cluster File-system Steve Baker December 6, 2011 Abstract. The evaluation of various error detection and correction algorithms and

More information

SIDDHARTH GROUP OF INSTITUTIONS :: PUTTUR Siddharth Nagar, Narayanavanam Road UNIT I

SIDDHARTH GROUP OF INSTITUTIONS :: PUTTUR Siddharth Nagar, Narayanavanam Road UNIT I SIDDHARTH GROUP OF INSTITUTIONS :: PUTTUR Siddharth Nagar, Narayanavanam Road 517583 QUESTION BANK (DESCRIPTIVE) Subject with Code : CODING THEORY & TECHNIQUES(16EC3810) Course & Branch: M.Tech - DECS

More information

Introduction to Wireless & Mobile Systems. Chapter 4. Channel Coding and Error Control Cengage Learning Engineering. All Rights Reserved.

Introduction to Wireless & Mobile Systems. Chapter 4. Channel Coding and Error Control Cengage Learning Engineering. All Rights Reserved. Introduction to Wireless & Mobile Systems Chapter 4 Channel Coding and Error Control 1 Outline Introduction Block Codes Cyclic Codes CRC (Cyclic Redundancy Check) Convolutional Codes Interleaving Information

More information

IOSR Journal of Mathematics (IOSR-JM) e-issn: , p-issn: x. Volume 9, Issue 2 (Nov. Dec. 2013), PP

IOSR Journal of Mathematics (IOSR-JM) e-issn: , p-issn: x. Volume 9, Issue 2 (Nov. Dec. 2013), PP IOSR Journal of Mathematics (IOSR-JM) e-issn: 2278-5728, p-issn:2319-765x. Volume 9, Issue 2 (Nov. Dec. 2013), PP 33-37 The use of Algorithmic Method of Hamming Code Techniques for the Detection and Correction

More information

1 1 0, g Exercise 1. Generator polynomials of a convolutional code, given in binary form, are g

1 1 0, g Exercise 1. Generator polynomials of a convolutional code, given in binary form, are g Exercise Generator polynomials of a convolutional code, given in binary form, are g 0, g 2 0 ja g 3. a) Sketch the encoding circuit. b) Sketch the state diagram. c) Find the transfer function TD. d) What

More information

Code design: Computer search

Code design: Computer search Code design: Computer search Low rate codes Represent the code by its generator matrix Find one representative for each equivalence class of codes Permutation equivalences? Do NOT try several generator

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.2: Error Detection & Correction Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527

More information

SIPCom8-1: Information Theory and Coding Linear Binary Codes Ingmar Land

SIPCom8-1: Information Theory and Coding Linear Binary Codes Ingmar Land SIPCom8-1: Information Theory and Coding Linear Binary Codes Ingmar Land Ingmar Land, SIPCom8-1: Information Theory and Coding (2005 Spring) p.1 Overview Basic Concepts of Channel Coding Block Codes I:

More information

Topic 3. Design of Sequences with Low Correlation

Topic 3. Design of Sequences with Low Correlation Topic 3. Design of Sequences with Low Correlation M-sequences and Quadratic Residue Sequences 2 Multiple Trace Term Sequences and WG Sequences 3 Gold-pair, Kasami Sequences, and Interleaved Sequences 4

More information

Codes used in Cryptography

Codes used in Cryptography Prasad Krishnan Signal Processing and Communications Research Center, International Institute of Information Technology, Hyderabad March 29, 2016 Outline Coding Theory and Cryptography Linear Codes Codes

More information

Decoding Algorithm and Architecture for BCH Codes under the Lee Metric

Decoding Algorithm and Architecture for BCH Codes under the Lee Metric Decoding Algorithm and Architecture for BCH Codes under the Lee Metric Yingquan Wu and Christoforos N. Hadjicostis Coordinated Science Laboratory and Department of Electrical and Computer Engineering University

More information

3. Coding theory 3.1. Basic concepts

3. Coding theory 3.1. Basic concepts 3. CODING THEORY 1 3. Coding theory 3.1. Basic concepts In this chapter we will discuss briefly some aspects of error correcting codes. The main problem is that if information is sent via a noisy channel,

More information

Coding Theory: Linear-Error Correcting Codes Anna Dovzhik Math 420: Advanced Linear Algebra Spring 2014

Coding Theory: Linear-Error Correcting Codes Anna Dovzhik Math 420: Advanced Linear Algebra Spring 2014 Anna Dovzhik 1 Coding Theory: Linear-Error Correcting Codes Anna Dovzhik Math 420: Advanced Linear Algebra Spring 2014 Sharing data across channels, such as satellite, television, or compact disc, often

More information

Alternant and BCH codes over certain rings

Alternant and BCH codes over certain rings Computational and Applied Mathematics Vol. 22, N. 2, pp. 233 247, 2003 Copyright 2003 SBMAC Alternant and BCH codes over certain rings A.A. ANDRADE 1, J.C. INTERLANDO 1 and R. PALAZZO JR. 2 1 Department

More information

New Steganographic scheme based of Reed- Solomon codes

New Steganographic scheme based of Reed- Solomon codes New Steganographic scheme based of Reed- Solomon codes I. DIOP; S.M FARSSI ;O. KHOUMA ; H. B DIOUF ; K.TALL ; K.SYLLA Ecole Supérieure Polytechnique de l Université Dakar Sénégal Email: idydiop@yahoo.fr;

More information

EECS Components and Design Techniques for Digital Systems. Lec 26 CRCs, LFSRs (and a little power)

EECS Components and Design Techniques for Digital Systems. Lec 26 CRCs, LFSRs (and a little power) EECS 150 - Components and esign Techniques for igital Systems Lec 26 CRCs, LFSRs (and a little power) avid Culler Electrical Engineering and Computer Sciences University of California, Berkeley http://www.eecs.berkeley.edu/~culler

More information

1.6: Solutions 17. Solution to exercise 1.6 (p.13).

1.6: Solutions 17. Solution to exercise 1.6 (p.13). 1.6: Solutions 17 A slightly more careful answer (short of explicit computation) goes as follows. Taking the approximation for ( N K) to the next order, we find: ( N N/2 ) 2 N 1 2πN/4. (1.40) This approximation

More information

Berlekamp-Massey decoding of RS code

Berlekamp-Massey decoding of RS code IERG60 Coding for Distributed Storage Systems Lecture - 05//06 Berlekamp-Massey decoding of RS code Lecturer: Kenneth Shum Scribe: Bowen Zhang Berlekamp-Massey algorithm We recall some notations from lecture

More information

National University of Singapore Department of Electrical & Computer Engineering. Examination for

National University of Singapore Department of Electrical & Computer Engineering. Examination for National University of Singapore Department of Electrical & Computer Engineering Examination for EE5139R Information Theory for Communication Systems (Semester I, 2014/15) November/December 2014 Time Allowed:

More information

Coding Theory and Applications. Linear Codes. Enes Pasalic University of Primorska Koper, 2013

Coding Theory and Applications. Linear Codes. Enes Pasalic University of Primorska Koper, 2013 Coding Theory and Applications Linear Codes Enes Pasalic University of Primorska Koper, 2013 2 Contents 1 Preface 5 2 Shannon theory and coding 7 3 Coding theory 31 4 Decoding of linear codes and MacWilliams

More information

Lattices for Communication Engineers

Lattices for Communication Engineers Lattices for Communication Engineers Jean-Claude Belfiore Télécom ParisTech CNRS, LTCI UMR 5141 February, 22 2011 Nanyang Technological University - SPMS Part I Introduction Signal Space The transmission

More information

Information Redundancy: Coding

Information Redundancy: Coding Info Redundancy April 2, 23 Information Redundancy: Coding Often applied to Info transfer: often serial communication thru a channel Info storage Hamming distance: error detection & correction capability

More information

Linear Feedback Shift Registers (LFSRs) 4-bit LFSR

Linear Feedback Shift Registers (LFSRs) 4-bit LFSR Linear Feedback Shift Registers (LFSRs) These are n-bit counters exhibiting pseudo-random behavior. Built from simple shift-registers with a small number of xor gates. Used for: random number generation

More information

Decoding of the Five-Error-Correcting Binary Quadratic Residue Codes

Decoding of the Five-Error-Correcting Binary Quadratic Residue Codes American Journal of Mathematical and Computer Modelling 2017; 2(1): 6-12 http://www.sciencepublishinggroup.com//amcm doi: 10.1168/.amcm.20170201.12 Decoding of the Five-Error-Correcting Binary Quadratic

More information

Ma/CS 6b Class 25: Error Correcting Codes 2

Ma/CS 6b Class 25: Error Correcting Codes 2 Ma/CS 6b Class 25: Error Correcting Codes 2 By Adam Sheffer Recall: Codes V n the set of binary sequences of length n. For example, V 3 = 000,001,010,011,100,101,110,111. Codes of length n are subsets

More information

On the minimum distance of LDPC codes based on repetition codes and permutation matrices 1

On the minimum distance of LDPC codes based on repetition codes and permutation matrices 1 Fifteenth International Workshop on Algebraic and Combinatorial Coding Theory June 18-24, 216, Albena, Bulgaria pp. 168 173 On the minimum distance of LDPC codes based on repetition codes and permutation

More information

Some Results in Decoding of Certain Maximal-distance

Some Results in Decoding of Certain Maximal-distance INFORMATION AND CONTROL 20, 232--243 (1972) Some Results in Decoding of Certain Maximal-distance and BCH Codes DAVID MANDELBAUM P. O. Box 645, Eatontown, New Jersey 07724 It is shown how binary polynomial

More information

Low Density Parity Check (LDPC) Codes and the Need for Stronger ECC. August 2011 Ravi Motwani, Zion Kwok, Scott Nelson

Low Density Parity Check (LDPC) Codes and the Need for Stronger ECC. August 2011 Ravi Motwani, Zion Kwok, Scott Nelson Low Density Parity Check (LDPC) Codes and the Need for Stronger ECC August 2011 Ravi Motwani, Zion Kwok, Scott Nelson Agenda NAND ECC History Soft Information What is soft information How do we obtain

More information

EE 229B ERROR CONTROL CODING Spring 2005

EE 229B ERROR CONTROL CODING Spring 2005 EE 9B ERROR CONTROL CODING Spring 005 Solutions for Homework 1. (Weights of codewords in a cyclic code) Let g(x) be the generator polynomial of a binary cyclic code of length n. (a) Show that if g(x) has

More information

Efficient Decoding of Permutation Codes Obtained from Distance Preserving Maps

Efficient Decoding of Permutation Codes Obtained from Distance Preserving Maps 2012 IEEE International Symposium on Information Theory Proceedings Efficient Decoding of Permutation Codes Obtained from Distance Preserving Maps Yeow Meng Chee and Punarbasu Purkayastha Division of Mathematical

More information

ERROR CORRECTING CODES

ERROR CORRECTING CODES ERROR CORRECTING CODES To send a message of 0 s and 1 s from my computer on Earth to Mr. Spock s computer on the planet Vulcan we use codes which include redundancy to correct errors. n q Definition. A

More information

Soft-Decision Decoding Using Punctured Codes

Soft-Decision Decoding Using Punctured Codes IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 47, NO 1, JANUARY 2001 59 Soft-Decision Decoding Using Punctured Codes Ilya Dumer, Member, IEEE Abstract Let a -ary linear ( )-code be used over a memoryless

More information

9 THEORY OF CODES. 9.0 Introduction. 9.1 Noise

9 THEORY OF CODES. 9.0 Introduction. 9.1 Noise 9 THEORY OF CODES Chapter 9 Theory of Codes After studying this chapter you should understand what is meant by noise, error detection and correction; be able to find and use the Hamming distance for a

More information

The E8 Lattice and Error Correction in Multi-Level Flash Memory

The E8 Lattice and Error Correction in Multi-Level Flash Memory The E8 Lattice and Error Correction in Multi-Level Flash Memory Brian M. Kurkoski kurkoski@ice.uec.ac.jp University of Electro-Communications Tokyo, Japan ICC 2011 IEEE International Conference on Communications

More information

Error-correcting codes and Cryptography

Error-correcting codes and Cryptography Error-correcting codes and Cryptography Henk van Tilborg Code-based Cryptography Workshop Eindhoven, May -2, 2 /45 CONTENTS I II III IV V Error-correcting codes; the basics Quasi-cyclic codes; codes generated

More information

Solutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16

Solutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16 Solutions of Exam Coding Theory (2MMC30), 23 June 2016 (1.a) Consider the 4 4 matrices as words in F 16 2, the binary vector space of dimension 16. C is the code of all binary 4 4 matrices such that the

More information

New Algebraic Decoding of (17,9,5) Quadratic Residue Code by using Inverse Free Berlekamp-Massey Algorithm (IFBM)

New Algebraic Decoding of (17,9,5) Quadratic Residue Code by using Inverse Free Berlekamp-Massey Algorithm (IFBM) International Journal of Computational Intelligence Research (IJCIR). ISSN: 097-87 Volume, Number 8 (207), pp. 205 2027 Research India Publications http://www.ripublication.com/ijcir.htm New Algebraic

More information

1 Reed Solomon Decoder Final Project. Group 3 Abhinav Agarwal S Branavan Grant Elliott. 14 th May 2007

1 Reed Solomon Decoder Final Project. Group 3 Abhinav Agarwal S Branavan Grant Elliott. 14 th May 2007 1 Reed Solomon Decoder 6.375 Final Project Group 3 Abhinav Agarwal S Branavan Grant Elliott 14 th May 2007 2 Outline Error Correcting Codes Mathematical Foundation of Reed Solomon Codes Decoder Architecture

More information

Iterative Encoding of Low-Density Parity-Check Codes

Iterative Encoding of Low-Density Parity-Check Codes Iterative Encoding of Low-Density Parity-Check Codes David Haley, Alex Grant and John Buetefuer Institute for Telecommunications Research University of South Australia Mawson Lakes Blvd Mawson Lakes SA

More information

ECEN 5022 Cryptography

ECEN 5022 Cryptography Elementary Algebra and Number Theory University of Colorado Spring 2008 Divisibility, Primes Definition. N denotes the set {1, 2, 3,...} of natural numbers and Z denotes the set of integers {..., 2, 1,

More information