New Algebraic Decoding of (17,9,5) Quadratic Residue Code by using Inverse Free Berlekamp-Massey Algorithm (IFBM)

Similar documents
New algebraic decoding method for the (41, 21,9) quadratic residue code

Decoding of the Five-Error-Correcting Binary Quadratic Residue Codes

x n k m(x) ) Codewords can be characterized by (and errors detected by): c(x) mod g(x) = 0 c(x)h(x) = 0 mod (x n 1)

Chapter 6 Reed-Solomon Codes. 6.1 Finite Field Algebra 6.2 Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding

An Enhanced (31,11,5) Binary BCH Encoder and Decoder for Data Transmission

PAPER A Low-Complexity Step-by-Step Decoding Algorithm for Binary BCH Codes

5.0 BCH and Reed-Solomon Codes 5.1 Introduction

The BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes

Cyclic codes: overview

EE512: Error Control Coding

ECEN 604: Channel Coding for Communications

The Golay codes. Mario de Boer and Ruud Pellikaan

Simplification of Procedure for Decoding Reed- Solomon Codes Using Various Algorithms: An Introductory Survey

Chapter 6. BCH Codes

Decoding Algorithm and Architecture for BCH Codes under the Lee Metric

VLSI Architecture of Euclideanized BM Algorithm for Reed-Solomon Code

Binary Primitive BCH Codes. Decoding of the BCH Codes. Implementation of Galois Field Arithmetic. Implementation of Error Correction

Error Correction Review

Berlekamp-Massey decoding of RS code

Solutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16

Coding Theory and Applications. Solved Exercises and Problems of Cyclic Codes. Enes Pasalic University of Primorska Koper, 2013

Fault Tolerance & Reliability CDA Chapter 2 Cyclic Polynomial Codes

Information redundancy

Linear Cyclic Codes. Polynomial Word 1 + x + x x 4 + x 5 + x x + x

G Solution (10 points) Using elementary row operations, we transform the original generator matrix as follows.

3. Coding theory 3.1. Basic concepts

Cyclic Redundancy Check Codes

On the Construction and Decoding of Cyclic LDPC Codes

Chapter 6 Lagrange Codes

B. Cyclic Codes. Primitive polynomials are the generator polynomials of cyclic codes.

Outline. MSRI-UP 2009 Coding Theory Seminar, Week 2. The definition. Link to polynomials

Error Detection & Correction

MATH3302 Coding Theory Problem Set The following ISBN was received with a smudge. What is the missing digit? x9139 9

On formulas for decoding binary cyclic codes

General error locator polynomials for binary cyclic codes with t 2 and n < 63

Objective: To become acquainted with the basic concepts of cyclic codes and some aspects of encoder implementations for them.

Algebra for error control codes

Cyclic codes. Vahid Meghdadi Reference: Error Correction Coding by Todd K. Moon. February 2008

Information Theory. Lecture 7

Know the meaning of the basic concepts: ring, field, characteristic of a ring, the ring of polynomials R[x].

MATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups.

Implementation of Galois Field Arithmetic. Nonbinary BCH Codes and Reed-Solomon Codes

Making Error Correcting Codes Work for Flash Memory


Coding Theory: Linear-Error Correcting Codes Anna Dovzhik Math 420: Advanced Linear Algebra Spring 2014

1 Vandermonde matrices

VHDL Implementation of Reed Solomon Improved Encoding Algorithm

Lecture 12: November 6, 2017

Error Correction Methods

RON M. ROTH * GADIEL SEROUSSI **

Constructions of Nonbinary Quasi-Cyclic LDPC Codes: A Finite Field Approach


Chapter 3 Linear Block Codes

Cyclic Codes. Saravanan Vijayakumaran August 26, Department of Electrical Engineering Indian Institute of Technology Bombay

MATH/MTHE 406 Homework Assignment 2 due date: October 17, 2016

Optical Storage Technology. Error Correction

4F5: Advanced Communications and Coding

On Irreducible Polynomial Remainder Codes

Structured Low-Density Parity-Check Codes: Algebraic Constructions

7.1 Definitions and Generator Polynomials

: Error Correcting Codes. October 2017 Lecture 1

A Brief Encounter with Linear Codes

Introduction to finite fields

Decoding Procedure for BCH, Alternant and Goppa Codes defined over Semigroup Ring

EECS Components and Design Techniques for Digital Systems. Lec 26 CRCs, LFSRs (and a little power)

MATH3302. Coding and Cryptography. Coding Theory

Alternant and BCH codes over certain rings

EE512: Error Control Coding

A 2-error Correcting Code

EE 229B ERROR CONTROL CODING Spring 2005

Part III. Cyclic codes

Proof: Let the check matrix be

Reed-Solomon codes. Chapter Linear codes over finite fields

Linear Cyclic Codes. Polynomial Word 1 + x + x x 4 + x 5 + x x + x f(x) = q(x)h(x) + r(x),

Lecture Introduction. 2 Linear codes. CS CTT Current Topics in Theoretical CS Oct 4, 2012

Subquadratic Computational Complexity Schemes for Extended Binary Field Multiplication Using Optimal Normal Bases

Decoding linear codes via systems solving: complexity issues and generalized Newton identities

Fault Tolerant Computing CS 530 Information redundancy: Coding theory. Yashwant K. Malaiya Colorado State University

CONSTRUCTION OF QUASI-CYCLIC CODES

Topic 3. Design of Sequences with Low Correlation

ELEC 519A Selected Topics in Digital Communications: Information Theory. Hamming Codes and Bounds on Codes

Chapter 5. Cyclic Codes

Design and Implementation of Reed-Solomon Decoder using Decomposed Inversion less Berlekamp-Massey Algorithm by

MATH Examination for the Module MATH-3152 (May 2009) Coding Theory. Time allowed: 2 hours. S = q

Communications II Lecture 9: Error Correction Coding. Professor Kin K. Leung EEE and Computing Departments Imperial College London Copyright reserved

REED-SOLOMON CODE SYMBOL AVOIDANCE

Duadic Codes over Finite Commutative Rings

Linear Codes and Syndrome Decoding

Hamming codes and simplex codes ( )

Vector spaces. EE 387, Notes 8, Handout #12

Modular numbers and Error Correcting Codes. Introduction. Modular Arithmetic.

Coset Decomposition Method for Decoding Linear Codes

Error-correcting codes and Cryptography

Low Density Parity Check (LDPC) Codes and the Need for Stronger ECC. August 2011 Ravi Motwani, Zion Kwok, Scott Nelson

Modular Multiplication in GF (p k ) using Lagrange Representation

Codes used in Cryptography

PAijpam.eu CONVOLUTIONAL CODES DERIVED FROM MELAS CODES

Efficient random number generation on FPGA-s

Some Easily Decoded, Efficient, Burst Error Correcting Block Codes

GF(2 m ) arithmetic: summary

Transcription:

International Journal of Computational Intelligence Research (IJCIR). ISSN: 097-87 Volume, Number 8 (207), pp. 205 2027 Research India Publications http://www.ripublication.com/ijcir.htm New Algebraic Decoding of (7,9,5) Quadratic Residue Code by using Inverse Free Berlekamp-Massey Algorithm (IFBM) Renuka Sahu, B.P. Tripathi and S.K. Bhatt Department of Mathematics, Govt. N.P.G.College of Science, Raipur (C.G.), India. Abstract In this paper a new algebraic decoding approach for (7,9,5) Quadratic Residue Code is proposed by using the Inverse Free Berlekamp-MasseyAlgorithm i.e. IFBM algorithm. By using an efficient algorithm an unknown syndrome are also developed in this paper. With the help of unknown syndromes, we achieve the alternative consecutive syndromes which are needed for the application of the Berlekamp-Massey algorithm. The decoding scheme developed here, is simpler to put into effect than the previous decoding algorithm developed for (7,9,5) QR code. AMS subject classification: 94A60. Keywords: Quadratic Residue Codes, Inverse free Berlekamp-Massey Algorithm, Unknown Syndromes, Known Syndromes.. Introduction The well-known QR codes, introduced by way of Prange [] in 957, are cyclic BCH codes with code rates greater than or same to at least one-half. Similarly, the codes typically have large minimum distances in order that maximum of recognised QR codes are the exceptional-known codes. The code augmented by using a parity bit, as an instance, the (24, 2, 8) QR code became utilized to provide error control on the Voyager deep-space challange [2]. In the past decades, several decoding strategies were advanced

206 Renuka Sahu, B.P. Tripathi and S.K. Bhatt to decode the binary QR codes. The Algebraic Decoding Algorithm s most used to decode the QR codes are the Newton s identities with either Sylvester resultants []-[0] or Gröbner bases [], or inverse-free Berlekamp-Massey (IFBM) algorithm [2]-[6] to determine the error-locator polynomial. Amongst them, the ADA of the (7, 9, 5) QR code [6] can correct up to two errors within the finite field GF(2 8 ), due to tyhe fact the error-correcting capability of the code is t = (d )/2 = (5 )/2 = 2 errors, where x denotes the greatest integer less than or equal to x, and d = 5 is the minimum Hamming distance of the code. In [6], the authors use the known syndrome S to replace unknown syndromes. Furthermore, the coefficients of the error-locator polynomial are also replaced by S. Eventually, the Chien search algorithm [8] is implemented to find the roots of the error-locator polynomial. Moreover, with a purpose to decrease the computational complexity in the power of syndrome, a fast multiplier algorithm given in [9] is utilized in C++ program. This technique can speed up the decoding procedure and make this proposed decoding algorithm easy to implement in software and hardware. The rest parts of this paper are organized as follows: Section 2 gives the basic terminology of the QR codes and defines the unknown syndromes. Additionally, an efficient algorithm for calculating unknown syndromes is delivered in this section. Section is the main body of this paper; it demonstrate the unknown syndrome technique, developed in section 2 as well as the inverse-free BM algorithm [2] to decode the (7,9,5) QR code. Ultimately, a completely work-outed example, using the (7,9,5) QR code is demonstrated in detail. The final section gives some concluding remarks about the decoding scheme developed in this paper. 2. Preliminary 2.. Binary QR code [9] A binary QR code (n, k, d) or (n, (n + )/2,d) with minimum distance d is defined algebraically as a multiple of its generator polynomial g(x) over GF (2), where k = (n + )/2 is the message length and n is the code length. Let n be a prime number of the form n = 8m ±, where m is a positive integer and m be the smallest positive integer such that 2 m ( mod n). The set Q n of quadratic residues modulo n is the set of nonzero squares modulo n; that is, Q n ={j j x 2 mod n, x (n )/2}. For the binary (7, 9, 5) QR code over GF (2 8 ), the quadratic residue set Q 7 is Q 7 ={, 2, 4, 8, 9,, 5, 6} () Let an element α GF (2 8 ) be a root of primitive polynomial p(x) = x 8 + x 4 + x + x 2 + ; that is, p(α) = 0. Obviously, the element β = α u, where u = (2 m )/n = (2 8 )/7 = 5, is a primitive 5-th root of unity in GF (2 8 ). The generator polynomial g(x) is defined by g(x) = i Q 7 (x β i ) = x 8 + x 5 + x 4 + x + (2)

New Algebraic Decoding of (7,9,5) Quadratic Residue Code 207 where the degree of g(x) is 8, which is the multiplicative order of the integer 2 modulo the code length 7; that is, 2 8 mod 7. If α = 2, then β = α 5 = 8 and g(β) = 0. By cyclically shifting β once to the left and mod g(x), then one obtains the 7 roots of x 7. Since the codewords are a multiple of the g(x), the codeword polynomial of the (7, 9, 5) QR code can be represented by c(x) = where c i GF (2) for 0 i 6, and 6 i=0 = m(x)g(x), m(x) = m 8 x 8 + +m x + m 0 denotes information polynomial, where m i GF (2) for 0 i 8. In such a representation, this type of codeword is called the nonsystematic encoding. In practice, the encoding procedure is often implemented by the use of systematic encoding. Let p(x) = p 7 x 7 + +p x+p 0 be the parity-check polynomial, where p i GF (2) for 0 i 7. Also, let m(x)x n k divide by g(x), then we get the following identity: m(x)x n k = q(x)g(x) + d(x). () Multiplying both sides of () by x k and using x n =, Then, it yields d(x)x k + m(x) = (q(x)x k )g(x). The term d(x)x k + m(x), which is a multiple of g(x), has m(x) in its lower k bits and p(x) = d(x)x k in its higher n k bits. Thus, the codeword can be represented by the equation below. c(x) = d(x)x k + m(x) = p(x) + m(x). (4) As shown in (4), this form of the codeword is called systematic encoding. Now, let a codeword be transmitted through a noisy channel to obtain a received word of the form r(x) = c(x) + e(x), where e(x) = e 6 x 6 + + e x + e 0 is the occurred error polynomial and e i GF (2). For simplification, the polynomial form can be expressed as the vector form. For example, c(x) can be expressed as c = (c 6,,c,c 0 ). The syndromes or known syndromes of the code are defined by S i = r(β i ) = c(β i ) + e(β i ) = e(β i ) = 6 j=0 e j (β i ) j, (5) where i(mod7) Q 7. If i not belongs to Q 7, the syndromes are called unknown syndromes. All known syndromes can be expressed as the power of S, such as, S 2 = S 2,S 4 = S 4, etc; thus, S is called the primary unknown syndrome. Similarly, S is

208 Renuka Sahu, B.P. Tripathi and S.K. Bhatt called the primary unknown syndrome, such as, S 6 = S 2,S 2 = S 4, etc. Note that S 0 = 0 or depends on the fact that v is even or odd, where v is the actual number of errors to be corrected and v 2. If there are v t errors in r(x), then e(x) has v nonzero terms over GF (2); that is, e (x) = x r + x r 2 + +x r v, where 0 r <r 2 < <r v n. For i Q n, the syndrome can be written as S i = Z i + Zi 2 + +Zi v, (6) where Z j = β r j for j v are called the error locators. For the (7, 9, 5) QR code, one has the following equalities among the known syndromes as: S 2 = S 2,S 4 = S 22,S 8 = S 2,S 6 = S 24,S 5 = S 25,S = S 26,S 9 = S 27 Assuming that v errors occur, the error-locator polynomial L v (x) is defined by where and σ(z) = v ( + Z j z) = + j= v σ j z j (7) j= σ = Z + Z 2 + +Z v,σ 2 = Z Z 2 + Z Z + +Z v Z v = Z i Z j,..., i<j v σ v = Z Z 2 Z v. By applying the BM algorithm the error-locator polynomial can be obtained. It is well known that the BM algorithm is an efficient method for determining the error-locator polynomial which used to decode both the RS codes and BCH codes. In this paper, we uses it to decode both the (7, 9, 5) QR code. In order to employ the BM algorithm to decode a code up to 2 errors, one needs in sequence the 4 syndromes, S,S 2,S,S 4. For the (7,9,5) code, the minimal distance is 5. It can correct up to 2 errors; however, the only syndromes that can be determined directly from r(x) are S,S 2 and S 4. The syndrome S is absent. It cannot be obtained by evaluating r(x) at the roots of g(x). The procedure given in [7], [20] to determine the unknown syndromes of this QR code is developed in the next subsection. 2.2. Efficient Algorithm to Determine the Unknown Syndromes To develop the algorithm for determining the unknown syndromes, some extra notations are needed.

New Algebraic Decoding of (7,9,5) Quadratic Residue Code 209. First let I ={i,i 2,...,i v+ } denote a subset of {0,,...,46} consisting of v + distinct elements. 2. Next, define a matrix X(I) of size (v + ) v as shown below: Z i Z i 2... Z i v Z i 2 Z i 2 2... Z i 2 v X(I) =...... Z i v Z i v... Z i v Z i v+ Z i v+... Z i v+ (8). Also, let J ={j,j 2,...,j v+ } be another (v + )-subset of {0,,...,46} and define a matrix S(I,J) of size (v + ) (v + ) as follows: S(I,J) = X(I)X(J) T, where X(J) T denotes the transpose of the matrix X(J). In terms of this notation one has the following theorem describing the matrix S(I,J). Theorem 2.. [] The (v + ) (v + ) matrix S(I,J) in Eq. (7) has the form S i +j S i +j 2... S i +j v+ S i2 +j S i2 +j 2... S i2 +j v+ S(I,J) =...... S iv +j S iv +j 2... S iv +j v+ (9) S iv+ +j S iv+ +j 2... S iv+ +j v+ where the summation of the sub-indices of the S i s are modulo 47. Moreover, the determinant of S(I,J) equals zero, i.e., det(s(i,j)) = 0 (0) If the matrix S(I,J) has unknown syndromes as its entries, then the equality det(s(i,j)) = 0 gives a polynomial equation for those unknown syndromes with coefficients that are functions of the known syndromes. If there is only one unknown syndrome, say S r, among the entries of S(I,J), then one can express S r as a function in terms of known syndromes. Hence, during the decoding process, one is able to calculate the value of S r with the information of such known syndromes. More precisely, one has the following theorem: Theorem 2.2. [] If among the entries of S(I,J), there is only one unknown syndrome, say S r, then S r can be expressed as a fraction of two determinants of matrices obtained from S(I,J). IfS r appears in the (i, j)th position of S(I,J), then S r = det( 0) det( ), ()

2020 Renuka Sahu, B.P. Tripathi and S.K. Bhatt where 0 is the (v + )' (v + ) matrix that is identical with S(I,J) except for the (i, j)th entry which equals 0 instead of S r, and is the v' v submatrix of S(I,J), obtained by deleting the ith row and jth column of S(I,J). The proofs of theorems 2. and 2.2 are given in the Appendix []. Theorem 2.2 is used to determine the primary unknown syndrome S of (7, 9, 5) QR code by searching for the two subsets I and J of {0,,...,6} such that matrix S(I,J) contains the unknown syndrome as its entry only once. To do this, an exhaustive search needs at most (Cv+ 7 )2 choices, where (Cv+ 7 ) = (7!)/((7 (v + ))!(v + )!) is the binomial coefficient for the number of combinations taking v + from a set of 7 elements. For the (7, 9, 5) QR code, the primary unknown syndrome is S. Let Q = Q 7 ' {0, }. Before stating the algorithm, one needs some more notations. For i' Q, define the difference of i from Q to be: Q i ={(q i) mod 7 q Q}. Next, define a special sum of the two subsets I and J to be the multi-set; that is, each element should be kept, as I J ={(i + j) mod 7 i' I,j' J }, where one uses a star-sign '" "' to indicate that the set is a multi-set. For example, let v = and i =. Then the difference of from Q is Q ={(q ) mod7 q Q} ={0,, 2,...,6 } ={6, 0,,, 7, 8, 2, 4, 5}. Next, let v = 2,I ={, 2} and J ={0, }. Then I J ={ + 0, +, 2 + 0, 2 + } ={, 2, 2, }. With the above definitions the efficient algorithm to find the two (v + )-subsets I, J, needed to determine the primary unknown syndrome S r is as follows Algorithm: [] Step : Choose a subset I ={i,i 2,..., i v+ }' Q. Step 2: Check the number of elements in the intersection (Q i )' (Q i 2 )'... '(Q i v+ ). If this set intersection contains less than v + elements, return to step. Step : Choose a subset J with v + elements from the intersection in step 2. Step 4: Check the number of r Q n in the multi-set I J. If the multi-set I J contains exactly one r, then stop; I and J are the desired sets. Otherwise, return to step.

New Algebraic Decoding of (7,9,5) Quadratic Residue Code 202 If the multi-set I J contains exactly one r, then from Eq. (), one can see that the matrix S(I,J)has only one S r as its entry, and all other entries belong to the set Q n ' {0}. The proof of this algorithm can be found in the Appendix []. 2.. The Inverse Free Berlekamp-Massey Algorithm To decode the (7, 9, 5) QR code, the inverse-free BM algorithm is much more efficient to implement than any other known algorithm, e.g. see [2]. A pseudo code for this inverse-free BM algorithm developed originally for BCH and RS codes is given below: Step : Set initial values: k =,C (0) (x) =,A (0) (x) =,l (0) = 0 and γ (0). Step 2: Compute (k) = l (k ) j=0 c (k ) j s k j, (2) where the coefficients c (k ) are the coefficient of polynomial C (k ) (x) at the (k )-th stage. Step : Compute C (k) (x) = γ (k ) C (k ) (x) (k) A (k ) (x) x. () Step 4: A (k) (x) = x A (k ) (x) if (k) = 0 or 2l (k ) >k C (k ) (x) if (k) = 0 or 2l (k ) k. (4) l (k) = l (k ) if (k) = 0 or 2l (k ) >k k l (k ) if (k) = 0 or 2l (k ) k γ (0) = γ (k ) if (k) = 0 or 2l (k ) >k (k) if (k) = 0 or 2l (k ) k (5) (6) Step 5: set k = k + ifk 2t, the step 2. Otherwise stop. In the algorithm, the parameter t equals the maximum number of the errors that can be corrected, and C (2t) /c0 2t denotes the error-locator polynomial σ(z), defined in Eq. ().

2022 Renuka Sahu, B.P. Tripathi and S.K. Bhatt. Proposed Algebraic Decoder for (7,9,5) QR Code using the IFBM Algorithm This section is the main part of the paper. It illustrates the ideas needed to decode the (7, 9, 5) QR code. There are two subsections: The first subsection describes how to determine the primary unknown syndrome, S, for every case of a different number of errors, The second subsection shows how to use the inverse-free BM algorithm to find the error-locator polynomial from the sequence of the 4 known syndromes, including the one calculated unknown syndromes, for the (7, 9, 5) code. Fig. is a flowchart of the decoding method that consists of both the calculation of the unknown syndromes and the inverse-free BM algorithm. In this figure, for r' {}, S v r denotes the unknown syndrome S r for the v-errors case... Determination of the Unknown Syndrome S The three cases from case 0 to case 2 are discussed separately. The digit after the word Case indicates the number of errors for that case. In each case, one lists explicitly the two subsets I and J that are needed in Theorem 2 to determine the primary unknown syndrome S. Moreover, the attachment of a super-index to S 5 to obtain the notation "S (v) r " indicates that it is valid for the v-error case only. Case 0: (0 error) In this case where v=0, the Unknown Syndrome is S (0) = 0. Case : ( error) Let us choose I ={0, } and J ={, 2}for v = Then, by Theorem 2., one obtains the matrix S(I,J ) of size 2 2 [ ] S S 2 S(I,J ) = S 2 S () (7) where S 2 = S 2 is given by where = S and. Thus, by Theorem 2, the unknown syndrome S() for -error case S () = det( 0) det( ). 0 = [ S ] S 2 S 2 0 This is a trival case : by defination of syndrome for - error case is S () = (Z ) = S.

New Algebraic Decoding of (7,9,5) Quadratic Residue Code 202 Figure : flowchart

2024 Renuka Sahu, B.P. Tripathi and S.K. Bhatt case 2: (2 error) For v = 2, let us choose I 2 ={,, 6} and J 2 ={, 4, 9} Then, by Theorem 2., one obtains the matrix S(I 2,J 2 ) of size S S S 6 S(I 2,J 2 ) = S 5 S (2) S (8) S 0 S 4 S 8 where S 0 = 0,S 4 = S 4,S 5 = S 2,S 8 = S 8,S = S 64,S 6 = S 6. Thus, by Theorem 2.2, the unknown syndrome S (2) for 2-error case is given by S (2) = det( 0) det( ). where and = [ ] S S 6 S 0 S 8 S S S 6 0 = S 5 0 S S 0 S 4 S 8 To illustrate this algorithm, let us consider details of this simple example of a QR code are given here of the (7, 9, 5) QR code..2. Example To decode the (7, 9, 5) QR code, first, let Sk v denote the unknown syndrome which is computed from v errors that occur in the received vector, where k', 2,, 4 and v', 2,. Then one can construct the needed consecutive syndromes S,S 2,S v,s 4 for the inverse-free BM algorithm. Let β = α 5 be a primitive 7 th root of unity in GF (2 8 ), where α is a root of the primitive polynomial P(x) = x 8 + x 4 + x + x 2 + The set of quadratic residues modulo is Q 7 ={, 2, 4, 8, 9,, 5, 6}. The generator polynomial of the (2, 2, 7) QR code is given by g(x) = (x β i ) = x 8 + x 5 + x 4 + x + i Q 7 Let be the I = (0, 0,,, 0,, 0, 0, ) message. Multiplying its associated polynomial one obtains the code polynomial I(x) = x 6 + x 5 + x + byg(x), c(x) = I(x) x 8 + d(x) = x 4 + x + x + x 9 + x 7 + x 6 + x +,

New Algebraic Decoding of (7,9,5) Quadratic Residue Code 2025 where d(x) is the reminder of I(x) x 8 divided by g(x). Let c be the code vector of this polynomial c = (0, 0,,, 0,, 0,, 0,,, 0, 0,, 0, 0, ) Let us assume that there will be one error in the message and the error vector e = (0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, ). Then the received vector is r = c + e = (0, 0,,, 0,, 0,, 0,,, 0, 0,, 0, 0, 0) and its associated polynomial is For i =,2 and 4, the syndromes are r(x) = x 4 + x + x + x 9 + x 7 + x 6 + x. S i = r(β i ) = (β i ) 4 + (β i ) + (β i ) + (β i ) 9 + (β i ) 6 + (β i ) +. That is,s = α 5,S 2 = α 0, ands 4 = α 60. By the use of Eqs. (7) and (),the single un-known syndrome for - error case is found to be S = α 45. Using the inverse-free BM algorithm, the computation terminates at step k = 4, and one obtains C (4) = α 60 x + α 45 from the consecutive syndromes S = α 5,S 2 = α 0,S = α 45, and S 4 = α 60. In the last step, deg[c (6) ]= = v so that C (4) (z) = ( + σ z).σ 0 = ( + α 5 z).α 45 = ( + Z z).α 45. The root of σ(z)is Z = α 5 = β. Thus, the error polynomial is e(x) = x As in the above illustrative example of the (7, 9, 5) QR code the decoder This algorithm is summarized by the following seven steps:. Initialize by letting v =. 2. Compute the known syndromes S,S 2,S 4, from Eq. ().. Compute the two unknown syndromes S v developed in section. for v 5 from the algorithm 4. Compute the error-locator polynomial σ(z) from the consecutive known syndromes S,S 2,S v,s 4 for v errors, using the inverse-free BM algorithm. 5. If deg[σ(z)]=v go to step (7). Otherwise set v = v +.

2026 Renuka Sahu, B.P. Tripathi and S.K. Bhatt 6. If v>t, stop. Otherwise, go to step (). 7. Obtain the error-locator polynomial σ(z)with deg[σ(z)]=v for the v-errors case, and compute the roots of σ(z) by a use of the Chien-search method. Finally, the corrected QR code is obtained by subtracting the error vector from the received vector. 4. Conclusion The generally utilized BM calculation was initially created to interpret both BCH and RS codes. It is the most powerful and efficient method for determining the error-locator polynomial of a code. The primary condition needed to be able to apply the BM algorithm is that it has enough consecutive syndromes. Unfortunately, the QR codes do not have enough consecutive syndromes to entirely decode all errors; some syndromes are missing. In this paper it is shown how to find the unknown syndromes to provide the absent terms. As a consequence, the completed syndrome list is obtained for the inverse-free BM algorithm. Also an efficient algorithm is found to calculate the desired unknown syndromes. Although these algorithms are designed for the (7, 9, 5) QR code and can be extended to every QR code with irreducible generating polynomial, In this paper, the result shows for the (7, 9, 5) QR code to correct all cases of 2 or less errors without mistake. This algorithm is easier to implement for both software and the hardware design, compared with the decoding algorithm for the (7, 9, 5) QR code found in [9] previously by part of the authors of the present paper. References [] E. Prange, Cyclic error-correcting codes in two symbols, AFCRC-TN-57-0, Air Force Cambridge Research Center, Cambridge, Mass. September 957. [2] S. B. Wicker, Error Control Systems for Digital Communication and Storage, Englewood Cliffs, NJ: Prentice Hall, 995. [] M. Elia, Algebraic decoding of the (2, 2, 7) Golay codes, IEEE Trans. Inf. Theory, vol., no., pp. 50 5, January 987. [4] I. S. Reed, X.Yin, T. K. Truong, and J. K. Holmes, Decoding the (24,2, 8) Golay code, Proc. IEE, vol. 7, no., pp. 202 206, May 990. [5] I. S. Reed, X.Yin, and T. K. Truong, Algebraic decoding of the (2, 6,8) quadratic residue code, IEEE Trans. Inf. Theory, vol. 6, no. 4, pp. 876 880, July 990. [6] I. S. Reed, T. K. Truong, X. Chen, X. Yin, The algebraic decoding of the (4, 2, 9) Quadratic Residue code, IEEE Trans. Inf. Theory, vol. 8, no., pp. 974 986, May 992. [7] R. He, I. S. Reed, T. K. Truong, and X. Chen, Decoding the (47, 24, ) quadratic residue code, IEEE Trans. Inf. Theory, vol. 47, no., pp. 8 86, March 200.

New Algebraic Decoding of (7,9,5) Quadratic Residue Code 2027 [8] T. C. Lin, T. K. Truong, H. P. Lee, and H. C. Chang, Algebraic decoding of the (4, 2, 9) Quadratic Residue code, Inf. Sci., vol. 79, no. 9, pp. 45 459, September 2009. [9] T. C. Lin, H. C. Chang, H. P. Lee, S. I. Chu, and T. K. Truong, Decoding of the (, 6, 7) Quadratic Residue code, J. Chin. Inst. Eng., vol., no. 4, pp. 57 580, June 200. [0] X. Chen, I. S. Reed, T. Helleseth, T. K. Truong, Use of Grobner bases to decode binary cyclic codes up to the true minimum distance, IEEE Trans. on Comm., vol. 40, no. 5, pp. 654 66, September. 994. [] T. C. Lin, H. P. Lee, H. C. Chang, S. I. Chu, and T. K. Truong, High speed decoding of the binary (47, 24, ) quadratic residue code, Inf. Sci., vol. 80, no. 20, pp. 4060 4068, October 200. [2] I. S. Reed, M. T. Shih, and T. K. Truong, VLSI design of inverse-free Berlekamp- Massey algorithm, IEE Proc. On Computers and Digital Techniques, vol. 8, no. 5, pp. 295 298, September 99. [] Y. H. Chen, T. K. Truong,Y. Chang, C. D. Lee, and S.H. Chen, Algebraic Decoding of Quadratic Residue Codes Using BerlekampMassey Algorithm, J. Inf. Sci. Eng., vol. 2, no., January 2007 [4] Y. Chang, T. K. Truong, I. S. Reed, H.Y. Cheng, and C. D. Lee, Algebraic Decoding of (7, 6, ), (79, 40, 5), and (97, 49, 5) Quadratic Residue Codes, IEEE Trans. on Comm., vol. 5, no. 9, pp. 46 47, September 200. [5] T. K Truong, P. Y. Shih, W. K. Su, C. D. Lee, and Y Chang, Algebraic Decoding of The (89, 45, 7) Quadratic Residue Code, IEEE Trans. Inf. Theory, vol. 54, no., pp. 5005 50, November 2008. [6] Y. Chang, C. D. Lee, Algebraic decoding of a class of binary cyclic codes via Lagrange interpolation formula, IEEE Trans. Inf. Theory, v.56 n., p. 0 9, January 200. [7] R. T. Chien, Cyclic decoding procedure for the Bose-ChaudhuriHocquenghem codes, IEEE Trans. on Inf. Theory, vol. 0, no. 4, pp. 57 6, October 964. [8] C. C. Wang, T. K. Truong, H. M. Shao, L. J. Deutsch, J. K. Omura, and I. S. Reed, VLSIArchitectures for Computing Multiplications and Inverses in GF(2m), IEEE Transactions on Computers., vol. C-4, no. 8, pp. 709 76, Auguest 985. [9] H. P. Lee, Fast algebraic decoding of the (7, 9, 5) quadratic residue code, 202, 2nd International Conference on 202. [20] I. M. Duursma and R. Kotter. Error-locating pairs for cyclic codes, IEEE Trans. on Inf. Theory, vol. IT-40, 994, pp. 08 2,