IEEE COMMUNICATIONS LETTERS, VOL. 11, NO. 10, OCTOBER 2007

811

Chase Decoding of Linear Z4 Codes at Low to Moderate Rates Marc A. Armand, Senior Member, IEEE, A. Halim, and A. Nallanathan, Senior Member, IEEE

Abstract— A free Z4 code C may be decoded by decoding its canonical image C over Z2 twice in succession. Hence, a Chase decoder for C could employ as its hard-decision (HD) decoder, a two-stage decoder which performs HD decoding on C in each stage. Alternatively, one could have a two-stage soft-decision decoder by employing a Chase decoder for C in each stage. We demonstrate that the latter approach can offer a significant reduction in complexity over the other, with little or no price to pay in terms of word error rate performance, particularly at low to moderate code rates.

Channel output

Preprocessor for Stage 2

HD decoder for binary image of C Stage1

HASE decoding [2] is a suboptimal decoding technique which can provide substantial coding gains over conventional hard-decision (HD) decoding with significant reduction in decoding complexity compared to maximum-likelihood decoding. Of particular interest to coding theorists are techniques enabling a Chase decoder to employ fewer test patterns with little sacrifice in performance – see e.g. [1], [3]. In [4], the word error rate (WER) performance of Chase decoding when applied to a t-error correcting, free1 (n, k) Z4 code C of design distance 2t + 1 on an AWGN channel with QPSK modulation, was investigated. The HD decoder considered there was a twostage decoder based on the algorithm in [6, Section III] where each stage was a conventional (errors-only) HD decoder acting on the canonical image C of C over Z2 , as depicted in Fig. 1(a). It was shown that with such a HD decoder, a Chase decoder utilizing about 2t−1 test patterns can yield a better WER over one that uses a conventional HD decoder and 2t test patterns. An alternative, and obvious, way of realizing Chase-like decoding of the code C is to employ in each stage of the algorithm in [6, Section III], a Chase decoder for C, as depicted in Fig. 1(b), with each Chase decoder employing a conventional HD decoder. It is however not obvious whether this alternative approach offers any advantage over the Chase decoder advocated in [4]. Indeed, no insight is offered there in this regard. The purpose of this letter is therefore to fill that void. Specifically, we demonstrate that the latter approach can offer a significant reduction in complexity over the other, with little or no price to pay in terms of WER performance, particularly at low to moderate code rates.

C

Manuscript received May 21, 2007. The associate editor coordinating the review of this letter and approving it for publication was Prof. Marc Fossorier. The authors are with the Communications & Information Engineering Group, Department of Electrical & Computer Engineering, National University of Singapore (email: [email protected]). Digital Object Identifier 10.1109/LCOMM.2007.070821. 1 From [5, Corollary 4.7(i)], if there is a linear Z code which is not free, 4 there exists a free Z4 code of the same length and minimum Hamming distance but of higher rate. For this reason, it suffices to limit our study to free codes.

Codeword estimate

S tage 2 Two-stage HD decoder

Chase decoder for C with two-stage HD decoder

(a)

Index Terms— BCH codes, Chase decoding, Z4 codes.

I. I NTRODUCTION

HD decoder for binary image of C

Channel output

Preprocessor for Stage 2

Chase decoder for binary image of C

Chase decoder for binary image of C

Stage1

Codeword estimate

S tage 2 Cascaded Chase decoder for C

(b)

Fig. 1. (a) The Chase decoder with two-stage HD decoder; (b) the cascaded Chase decoder.

Henceforth, we refer to the decoders depicted in Fig. 1(a) and 1(b) as the non-cascaded Chase decoder (NCD) and cascaded Chase decoder (CCD), respectively. We proceed with a more detailed description of the CCD. II. T HE CCD A. Decoder Description Consider encoding the message block m as the codeword v := mG of C where G is a generator matrix for the code. Writing the 2-adic expansions of m, v and G as 2m1 + m0 , 2v1 + v0 and 2G1 + G0 , respectively, one readily sees that v0 = m0  G0 ∈ C while v1 = m0  G1 ⊕ m1  G0 ∈ Zn2 where  and ⊕ denote the respective operations over Z2 . Suppose v is QPSK modulated such that each pair (vj,1 , vj,0 ) is mapped to the signal point given by (2vj,1 − 1, 2vj,0 − 1) and then transmitted, where v0 := (v1,0 , . . . , vn,0 ) and v1 := (v1,1 , . . . , vn,1 ). Evaluating the sign of the corresponding 2n unquantized detector outputs (r1,1 , r1,0 , r2,1 , r2,0 , . . . , rn,1 , rn,0 ) yields the HD received word h := (h1,1 , h1,0 , h2,1 , h2,0 , . . . , hn,1 , hn,0 ) ∈ Z2n 2 . It is convenient to define r0 := (r1,0 , . . . , rn,0 ),  := r1 := (r1,1 , . . . , rn,1 ), h0 := (h1,0 , . . . , hn,0 ) and h n hn ) ∈ Z4 such that the 2-adic expansion of  hj is ( h1 , . . . ,  2hj,1 + hj,0 . Now, let {e1,j , . . . , e2sj ,j } be a set of 2sj binary test patterns of length n and Hamming weight at most sj where the ones are restricted to the sj least reliable positions in rj . For each i, 1 ≤ i ≤ 2s0 , the first Chase decoder of the

c 2007 IEEE 1089-7798/07$25.00 

812

IEEE COMMUNICATIONS LETTERS, VOL. 11, NO. 10, OCTOBER 2007

B. Choice of s0 and s1 Turning our attention now to choosing s0 and s1 , observe that errors of values 1 and 3 are “visible” to the first decoding stage of the CCD while errors of values 2 and 3 are “visible” to the second. Thus, a reasonable choice of value for s0 /s1 is the ratio of the average number of errors of values 1 and 3, to the  Assuming average number of errors of values 2 and 3, in h. transmission on an AWGN channel with QPSK modulation and all codewords are equally likely, we therefore have from [4], n s0 ≈ −k s1 n + 2 B  (1) where B  (x) is the first-order derivative of the weight enumerator of C with respect to x. Now, it is well-known that among the three versions of the Chase decoder in [2], the second one, i.e., [2, Algorithm 2], has the best performance/complexity trade-off and utilizes 2t test patterns. For this reason, we fix s1 = t 

and in turn, s0 =

0

10

−1

10

−2

WER

10

−3

10

nt n + 2−k B  (1)

(1)  (2)

where [·] denotes rounding-off to the nearest integer. It is interesting to note that codes whose canonical images over Z2 satisfy B  (1) = 2k−1 n do exist. Indeed, the codes used in our computer simulations all have this property. In this case, with s0 and s1 as specified by (1) and (2), the complexity of CCD(s0 , s1 ) is therefore about 22t/3 +2t . On the other hand, 2 Since C is free, C is consequently a linear code over Z . Hence, decoding 2 C need not be a hard task as compared to the problem of decoding a nonlinear binary code.

CCD(2,3) CCD(3,3) NCD(3) Classical

−4

10

−5

10

4

4.5

5

5.5 SNR (dB)

6

6.5

7

Fig. 2. WER’s of CCD(s0 , 3) and NCD(3) when applied to (63, 45) BCH code for s0 = 2, 3. −1

10

−2

10

−3

10

WER

CCD computes h0 ⊕ ei,0 and feeds it to a (conventional) HD ˆ 0 := (ˆ v1,0 , . . . , vˆn,0 ) of decoder2 which outputs an estimate v ˆ 0∗ of the first Chase decoder v0 . The output v  is the estimate ˆ 0 of v0 that maximizes the correlation − nj=1 (−1)vˆj,0 rj,0 v ˆ 0 . This completes between r0 and the modulated version of v the description of the first decoding stage of the CCD. ˆ 0∗ . ˆ ∗0 , the message corresponding to v Next, denote by m The task of the pre-processor for the second decoding stage −m ˆ ∗0 G − indicated in Fig. 1(b) is to compute h1 := (h ∗ n ˆ 0 ))/2 ∈ Z2 where − here denotes subtraction over (h0 ⊕ v Z4 . Following [6, Step i in Section III], h1 is the harddecision “received word” to be fed to the HD decoder in the second Chase decoder after modification by the ei,1 ’s. That is, for each i, 1 ≤ i ≤ 2s1 , the second Chase decoder computes h1 ⊕ ei,1 and feeds it to a HD decoder which ˆ 1  G0 of m1  G0 ∈ C. The output outputs an estimate m ˆ 1 G0 ˆ ∗1 G0 of the second m n Chase decoder is the estimate m that maximizes − j=1 (−1)vˆj,1 rj,1 where (ˆ v1,1 , . . . , vˆn,1 ) := ˆ ∗0  G1 ⊕ m ˆ 1  G0 . The estimate of m computed by the m ˆ ∗0 . ˆ ∗1 + m CCD is therefore given by 2m Hereafter, take CCD(s0 , s1 ) to mean the CCD employing 2s0 and 2s1 test patterns in the first and second stage, respectively. The complexity of CCD(s0 , s1 ) will be measured in terms of the total number of test patterns used, or equivalently, the total number of calls made to the HD decoder for C.

−4

10

−5

10

CCD(3,5) CCD(4,5) CCD(5,5) NCD(5) Classical

−6

10

−7

10

4

4.5

5

5.5 SNR (dB)

6

6.5

7

Fig. 3. WER’s of CCD(s0 , 5) and NCD(5) when applied to (63, 36) BCH code for s0 = 3, 4, 5.

the NCD(t), i.e., the NCD employing 2t test patterns, incurs 2t+1 calls3 to its HD decoder for C. Thus, for sufficiently large t, e.g. t > 9, the complexity of CCD(s0 , s1 ) is close to half of that of NCD(t). We next present our simulation results which focus on this special case. III. S IMULATION R ESULTS We begin by comparing the WER performance of CCD([2t/3], t) and NCD(t) on an AWGN channel with QPSK modulation. Three codes whose canonical images over Z2 satisfy B  (1) = 2k−1 n are considered, namely, a (63, 45), (63, 36) and (63, 24) BCH code, for which t is 3, 5 and 7, respectively. From Figs. 2 and 3, we see that for the high and moderate rate codes, NCD(t) performs better than CCD([2t/3], t) in the 3 Note that for the NCD, each test pattern leads to two calls to the HD decoder for C. Therefore, for a fair comparison to be made between the complexity of CCD and that of NCD, we measure the complexity of NCD in terms of the number of calls made to the HD for C, rather than the number of test patterns used.

ARMAND et al.: CHASE DECODING OF LINEAR Z4 CODES AT LOW TO MODERATE RATES

IV. C ONCLUDING R EMARKS

0

10

−1

10

−2

WER

10

−3

10

−4

10

CCD(5,7) CCD(6,7) CCD(7,7) NCD(7) Classical

−5

10

−6

10

813

4

4.5

5

5.5 SNR (dB)

6

6.5

7

Fig. 4. WER’s of CCD(s0 , 7) and NCD(7) when applied to (63, 24) BCH code for s0 = 5, 6, 7.

Through our computer simulations, we have demonstrated that for codes whose canonical images over Z2 satisfy B  (1) = 2k−1 n, CCD(s0 , t) can offer a significant reduction in complexity over NCD(t) for [2t/3] ≤ s0 < t, with little or no price to pay in terms of WER performance (within the WER region of practical interest at least), particularly at low to moderate rates. It would be interesting to see if CCD(s0 , t) will continue to offer similar performance/complexity tradeoffs in cases where B  (1) = 2k−1 n. Finally, we note that there are obviously several ways to further improve the performance of CCD(s0 , s1 ). One way is for the first decoding stage to pass a list of two or more codeword estimates to the second stage, instead of just one. However, we have found that the performance improvements this approach brings is too small to warrant the corresponding large increase in complexity. ACKNOWLEDGEMENT

WER region of practical interest although only marginally, particularly for the latter code. From Fig. 4 however, we see that for the low rate code, CCD([2t/3], t) performs better than NCD(t) over the entire SNR range considered. On the other hand, the complexity of CCD([2t/3], t) is only 75% (respectively, 62.5%) that of NCD(t) for the high rate code (respectively, moderate and low rate codes). The WER performance of CCD(s0 , t) for [2t/3] < s0 ≤ t is also given so that additional comparisons can be made between the two decoders. Observe that CCD(t, t) and NCD(t) have the same complexity. Thus as s0 increases, the reduction in complexity that CCD(s0 , t) offers over NCD(t) diminishes. Not surprisingly, as Figs. 2 to 4 show, the performance of CCD(s0 , t) improves as s0 increases. In particular, Fig. 3 shows that for the moderate rate code, CCD(t − 1, t) and NCD(t) essentially have identical performance in the WER region of practical interest. The complexity of the former decoder however is only 75% that of the other.

The authors gratefully acknowledge financial support from the Singapore’s Ministry of Education’s AcRF Tier 1 grant number R-263-000-361-112. The authors would also like to thank the anonymous referees for their useful comments which helped improve the quality of this Letter. R EFERENCES [1] G. Arico and J. H. Weber, “Limited-trial Chase decoding,” IEEE Trans. Inf. Theory, vol. 49, no. 11, pp. 2972–2975, Nov. 2003. [2] D. Chase, “A class of algorithms for decoding block codes with channel measurement information,” IEEE Trans. Inf. Theory, vol. 18, no. 1, pp. 170–182, Jan. 1972. [3] J. H. Weber and M. P. C. Fossorier, “Limited-trial Chase-like algorithms achieving bounded-distance decoding,” IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3318-3323, Dec. 2004. [4] M. A. Armand, “Chase decoding of linear Z4 codes,” Electronics Lett., vol. 42, no. 18, pp. 1049–1051, Aug. 2006. [5] G. H. Norton and A. S˘al˘agean, “On the Hamming distance of linear codes over a finite chain ring,” IEEE Trans. Inf. Theory, vol. 46, no. 3, pp. 1060–1067, May 2000. [6] M. Greferath and U. Velbinger,“Efficient decoding of Zpk -linear codes,” IEEE Trans. Inf. Theory, vol. 44, no. 3, pp. 1288–1291, May 1998.

Chase Decoding of Linear Z4 Codes at Low to Moderate ... - IEEE Xplore

two-stage decoder which performs HD decoding on C in each stage. Alternatively, one could have a two-stage soft-decision decoder by employing a Chase ...

135KB Sizes 4 Downloads 217 Views

Recommend Documents

Fountain codes - IEEE Xplore
7 Richardson, T., Shokrollahi, M.A., and Urbanke, R.: 'Design of capacity-approaching irregular low-density parity check codes', IEEE. Trans. Inf. Theory, 2001 ...

A Low ML-Decoding Complexity, Full-Diversity, Full ... - IEEE Xplore
knowledge available at both the transmitter and the receiver. For two transmit antennas and QAM constellations, a real-valued precoder which is approximately ...

Low ML-Decoding Complexity, Large Coding Gain, Full ... - IEEE Xplore
Jan 13, 2010 - the Golden code in performance and ML-decoding complexity for square QAM ... Index Terms—Coding gain, full-rate space-time block codes.

Generalized quasi-cyclic low-density parity-check codes ... - IEEE Xplore
Email: {sd07501,hmatsui,smita}@toyota-ti.ac.jp. Abstract—In this study, we proved that several promising classes of codes based on finite geometries cannot be ...

Low-power design - IEEE Xplore
tors, combine microcontroller architectures with some high- performance analog circuits, and are routinely produced in tens of millions per year with a power ...

Providing Secrecy with Lattice Codes - IEEE Xplore
Wireless Communications and Networking Laboratory. Electrical Engineering Department. The Pennsylvania State University, University Park, PA 16802.

Trellis State Aggregation for soft decoding of Variable ... - IEEE Xplore
combination is shown to be optimal for the Viterbi algorithm. I. INTRODUCTION. Variable Length Codes are widely used in modern com- pression codecs such ...

On the Linear Programming Decoding of HDPC Codes
The decision boundaries divide the signal space into M disjoint decision regions, each of which consists of all the point in Rn closest in. Euclidean distance to the received signal r. An ML decoder finds which decision region Zi contains r, and outp

performance of random fingerprinting codes under ... - IEEE Xplore
University of Illinois at Urbana-Champaign, USA. ABSTRACT. This paper analyzes the performance of arbitrary nonlinear collu- sion attacks on random fingerprinting codes. We derive the error exponent of the fingerprinting system, which determines the

Performance of Orthogonal Fingerprinting Codes Under ... - IEEE Xplore
Abstract—We study the effect of the noise distribution on the error probability of the detection test when a class of randomly ro- tated spherical fingerprints is used. The detection test is performed by a focused correlation detector, and the sphe

design of unequal-length linear-phase filter banks ... - IEEE Xplore
Department of Electronics and Electrical Engineering. 3-14-1, Hiyoshi, Kohoku-ku, Yokohama, Kanagawa, 223-0061, Japan phone: + (81) 45-566-1530, email: ...

Insufficiency of Linear-Feedback Schemes in Gaussian ... - IEEE Xplore
Jul 10, 2014 - by the point-to-point capacity to the receiver with the largest noise variance. That the performance of linear-feedback schemes with a common ...

Correcting Erasure Bursts with Minimum Decoding Delay - IEEE Xplore
Email: [email protected]. Abstract—Erasure correcting codes are widely used in upper layers of packet-switched networks, where the packet erasures.

Optimizing Binary Fisher Codes for Visual Search - IEEE Xplore
The Institute of Digital Media, Peking University, Beijing, China. {zhew,lingyu,linjie,cjie,tjhuang,wgao}@pku.edu.cn. Fisher vectors (FV), a global representation obtained by aggregating local invari- ant features (e.g., SIFT), generates the state-of

Shadow Codes over Z4
Shadow Codes over Z4. Steven T. Dougherty. Department of Mathematics. University of Scranton. Scranton, PA 18510. USA. Email: [email protected].

overlapped quasi-arithmetic codes for distributed video ... - IEEE Xplore
The presence of correlated side information at the decoder is used to remove this ... Index Terms— Distributed video coding, Wyner-Ziv coding, coding with side ...

Delay-Optimal Burst Erasure Codes for Parallel Links - IEEE Xplore
Cisco Systems, 170 West Tasman Drive, San Jose, CA 95134, USA. Email: ∗{leeoz ... implications on the code design – erasure burst and link outage.

A Survey on Network Codes for Distributed Storage - IEEE Xplore
ABSTRACT | Distributed storage systems often introduce redundancy to increase reliability. When coding is used, the repair problem arises: if a node storing ...

Buffer-Aided Two-Way Relaying with Lattice Codes - IEEE Xplore
relaying with lattice codes to improve the sum-rate in asymmetric SNR two-way relay channels (TWRCs). Specifically, the relay can store some amount of data.

IEEE Photonics Technology - IEEE Xplore
Abstract—Due to the high beam divergence of standard laser diodes (LDs), these are not suitable for wavelength-selective feed- back without extra optical ...

Low Complexity Multi-authority Attribute Based ... - IEEE Xplore
Encryption Scheme for Mobile Cloud Computing. Fei Li, Yogachandran Rahulamathavan, Muttukrishnan Rajarajan. School of Engineering and Mathematical ...

Tight Mixed Integer Linear Programming Formulations ... - IEEE Xplore
Page 1 ... mizes system-wide operational costs of power generators by providing an optimal ... generator so that the demand for electricity is met. Genera-.

wright layout - IEEE Xplore
tive specifications for voice over asynchronous transfer mode (VoATM) [2], voice over IP. (VoIP), and voice over frame relay (VoFR) [3]. Much has been written ...

Device Ensembles - IEEE Xplore
Dec 2, 2004 - time, the computer and consumer electronics indus- tries are defining ... tered on data synchronization between desktops and personal digital ...