Spelling suggestions: "subject:"reedsolomon modes"" "subject:"reedsolomon codes""
21 |
The hybrid list decoding and Chase-like algorithm of Reed-Solomon codes.Jin, Wei. January 2005 (has links)
Reed-Solomon (RS) codes are powerful error-correcting codes that can be found in a
wide variety of digital communications and digital data-storage systems. Classical
hard decoder of RS code can correct t = (dmin -1) /2 errors where dmin = (n - k+ 1)
is the minimum distance of the codeword, n is the length of codeword and k is the
dimension of codeword. Maximum likelihood decoding (MLD) performs better
than the classical decoding and therefore how to approach the performance of
the MLD with less complexity is a subject which has been researched extensively.
Applying the bit reliability obtained from channel to the conventional decoding
algorithm is always an efficient technique to approach the performance of MLD,
although the exponential increase of complexity is always concomitant. It is definite
that more enhancement of performance can be achieved if we apply the bit
reliability to enhanced algebraic decoding algorithm that is more powerful than
conventional decoding algorithm.
In 1997 Madhu Sudan, building on previous work of Welch-Berlekamp, and others,
discovered a polynomial-time algorithm for decoding low-rate Reed- Solomon
codes beyond the classical error-correcting bound t = (dmin -1) /2. Two years later
Guruswami and Sudan published a significantly improved version of Sudan's algorithm
(GS), but these papers did not focus on devising practical implementation.
The other authors, Kotter, Roth and Ruckenstein, were able to find realizations for
the key steps in the GS algorithm, thus making the GS algorithm a practical instrument
in transmission systems. The Gross list algorithm, which is a simplified one
with less decoding complexity realized by a reencoding scheme, is also taken into
account in this dissertation. The fundamental idea of the GS algorithm is to take
advantage of an interpolation step to get an interpolation polynomial produced by
support symbols, received symbols and their corresponding multiplicities. After
that the GS algorithm implements a factorization step to find the roots of the interpolation
polynomial. After comparing the reliability of these codewords which
are from the output of factorization, the GS algorithm outputs the most likely
one. The support set, received set and multiplicity set are created by Koetter Vardy
(KV) front end algorithm. In the GS list decoding algorithm, the number
of errors that can be corrected increases to tcs = n - 1 - lJ (k - 1) n J. It is easy
to show that the GS list decoding algorithm is capable of correcting more errors
than a conventional decoding algorithm.
In this dissertation, we present two hybrid list decoding and Chase-like algorithms.
We apply the Chase algorithms to the KV soft-decision front end. Consequently,
we are able to provide a more reliable input to the KV list algorithm. In
the application of Chase-like algorithm, we take two conditions into consideration,
so that the floor cannot occur and more coding gains are possible. With an increase
of the bits that are chosen by the Chase algorithm, the complexity of the hybrid
algorithm increases exponentially. To solve this problem an adaptive algorithm
is applied to the hybrid algorithm based on the fact that as signal-to-noise ratio
(SNR) increases the received bits are more reliable, and not every received sequence
needs to create the fixed number of test error patterns by the Chase algorithm. We
set a threshold according to the given SNR and utilize it to finally decide which
unreliable bits are picked up by Chase algorithm. However, the performance of the
adaptive hybrid algorithm at high SNRs decreases as the complexity decreases. It
means that the adaptive algorithm is not a sufficient mechanism for eliminating
the redundant test error patterns.
The performance of the adaptive hybrid algorithm at high SNRs motivates us
to find out another way to reduce the complexity without loss of performance.
We would consider the two following problems before dealing with the problem
on hand. One problem is: can we find a terminative condition to decide which
generated candidate codeword is the most likely codeword for received sequence
before all candidates of received set are tested? Another one is: can we eliminate
the test error patterns that cannot create more likely codewords than the generated
codewords? In our final algorithm, an optimality lemma coming from the Kaneko
algorithm is applied to solve the first problem and the second problem is solved by a
ruling out scheme for the reduced list decoding algorithm. The Gross list algorithm
is also applied in our final hybrid algorithm. After the two problems have been
solved, the final hybrid algorithm has performance comparable with the hybrid
algorithm combined the KV list decoding algorithm and the Chase algorithm but
much less complexity at high SNRs. / Thesis (M.Sc.Eng.)-University of KwaZulu-Natal, 2005
|
22 |
Performance analysis of a LINK-16/JTIDS compatible waveform with noncoherent detection, diversity and side informationKagioglidis, Ioannis. January 2009 (has links) (PDF)
Thesis (M.S. in Electrical Engineering)--Naval Postgraduate School, September 2009. / Thesis Advisor(s): Robertson, R. Clark. "September 2009." Description based on title screen as viewed on 6 November 2009. Author(s) subject terms: Link-16/JTIDS, (31, 15) Reed-Solomon (RS) coding, 32-ary Orthogonal signaling, Additive White Gaussian Noise (AWGN), Pulse-Noise Interference (PNI), Perfect Side Information (PSI). Includes bibliographical references (p. 49-51). Also available in print.
|
23 |
Performance analysis of the link-16/JTIDS waveform with concatenated codingKoromilas, Ioannis. January 2009 (has links) (PDF)
Thesis (M.S. in Electronic Warfare Systems Engineering)--Naval Postgraduate School, September 2009. / Thesis Advisor(s): Robertson, Ralph C. "September 2009." Description based on title screen as viewed on 5 November 2009. Author(s) subject terms: Link-16/JTIDS, Reed-Solomon (RS) coding, Cyclic Code-Shift Keying (CCSK), Minimum-Shift Keying (MSK), convolutional codes, concatenated codes, perfect side information (PSI), Pulsed-Noise Interference (PNI), Additive White Gaussian Noise (AWGN), coherent detection, noncoherent detection. Includes bibliographical references (p. 79). Also available in print.
|
24 |
Hardware Implementation of Error Control DecodersChen, Bainan 02 June 2008 (has links)
No description available.
|
25 |
Efficient VLSI Architectures for Algebraic Soft-decision Decoding of Reed-Solomon CodesZhu, Jiangli 26 May 2011 (has links)
No description available.
|
26 |
Symbol level decoding of Reed-Solomon codes with improved reliability information over fading channelsOgundile, Olanyika Olaolu January 2016 (has links)
A thesis submitted to the Faculty of Engineering and the Built Environment, University of the Witwatersrand, Johannesburg, in fulfilment of the requirements for the degree of Doctor of Philosophy in the School of Electrical and Information Engineering, 2016 / Reliable and e cient data transmission have been the subject of current research,
most especially in realistic channels such as the Rayleigh fading channels. The focus
of every new technique is to improve the transmission reliability and to increase
the transmission capacity of the communication links for more information to be
transmitted. Modulation schemes such as M-ary Quadrature Amplitude Modulation
(M-QAM) and Orthogonal Frequency Division Multiplexing (OFDM) were
developed to increase the transmission capacity of communication links without
additional bandwidth expansion, and to reduce the design complexity of communication
systems.
On the contrary, due to the varying nature of communication channels, the message
transmission reliability is subjected to a couple of factors. These factors include the
channel estimation techniques and Forward Error Correction schemes (FEC) used
in improving the message reliability. Innumerable channel estimation techniques
have been proposed independently, and in combination with di erent FEC schemes
in order to improve the message reliability. The emphasis have been to improve
the channel estimation performance, bandwidth and power consumption, and the
implementation time complexity of the estimation techniques. Of particular interest, FEC schemes such as Reed-Solomon (RS) codes, Turbo
codes, Low Density Parity Check (LDPC) codes, Hamming codes, and Permutation
codes, are proposed to improve the message transmission reliability of communication
links. Turbo and LDPC codes have been used extensively to combat
the varying nature of communication channels, most especially in joint iterative
channel estimation and decoding receiver structures. In this thesis, attention is
focused on using RS codes to improve the message reliability of a communication
link because RS codes have good capability of correcting random and burst errors,
and are useful in di erent wireless applications.
This study concentrates on symbol level soft decision decoding of RS codes. In
this regards, a novel symbol level iterative soft decision decoder for RS codes
based on parity-check equations is developed. This Parity-check matrix Transformation
Algorithm (PTA) is based on the soft reliability information derived from
the channel output in order to perform syndrome checks in an iterative process.
Performance analysis verify that this developed PTA outperforms the conventional
RS hard decision decoding algorithms and the symbol level Koetter and Vardy
(KV ) RS soft decision decoding algorithm.
In addition, this thesis develops an improved Distance Metric (DM) method of
deriving reliability information over Rayleigh fading channels for combined demodulation
with symbol level RS soft decision decoding algorithms. The newly
proposed DM method incorporates the channel state information in deriving the
soft reliability information over Rayleigh fading channels. Analysis verify that this
developed metric enhances the performance of symbol level RS soft decision decoders
in comparison with the conventional method. Although, in this thesis, the
performance of the developed DM method of deriving soft reliability information
over Rayleigh fading channels is only veri ed for symbol level RS soft decision
decoders, it is applicable to any symbol level soft decision decoding FEC scheme.
Besides, the performance of the all FEC decoding schemes plummet as a result
of the Rayleigh fading channels. This engender the development of joint iterative channel estimation and decoding receiver structures in order to improve the message
reliability, most especially with Turbo and LDPC codes as the FEC schemes.
As such, this thesis develops the rst joint iterative channel estimation and Reed-
Solomon decoding receiver structure. Essentially, the joint iterative channel estimation
and RS decoding receiver is developed based on the existing symbol level
soft decision KV algorithm. Consequently, the joint iterative channel estimation
and RS decoding receiver is extended to the developed RS parity-check matrix
transformation algorithm. The PTA provides design ease and
exibility, and lesser
computational time complexity in an iterative receiver structure in comparison
with the KV algorithm.
Generally, the ndings of this thesis are relevant in improving the message transmission
reliability of a communication link with RS codes. For instance, it is
pertinent to numerous data transmission technologies such as Digital Audio Broadcasting
(DAB), Digital Video Broadcasting (DVB), Digital Subscriber Line (DSL),
WiMAX, and long distance satellite communications. Equally, the developed, less
computationally intensive, and performance e cient symbol level decoding algorithm
for RS codes can be use in consumer technologies like compact disc and
digital versatile disc. / GS2016
|
27 |
On algebraic geometric codes and some related codesGuenda, Kenza 12 1900 (has links)
Thesis (MSc (Mathematics))--University of Stellenbosch, 2006. / The main topic of this thesis is the construction of the algebraic geometric
codes (Goppa codes), and their decoding by the list-decoding, which allows
one to correct beyond half of the minimum distance. We also consider the
list-decoding of the Reed–Solomon codes as they are subclass of the Goppa
codes, and the determination of the parameters of the non primitive BCH
codes.
AMS Subject Classification: 4B05, 94B15, 94B35, 94B27, 11T71, 94B65,B70.
Keywords: Linear codes, cyclic codes, BCH codes, Reed–Solomon codes,
list-decoding, Algebraic Geometric codes, decoding, bound on codes, error
probability.
|
28 |
Performance of Single Layer H.264 SVC Video Over Error Prone NetworksJanuary 2011 (has links)
abstract: With tremendous increase in the popularity of networked multimedia applications, video data is expected to account for a large portion of the traffic on the Internet and more importantly next-generation wireless systems. To be able to satisfy a broad range of customers requirements, two major problems need to be solved. The first problem is the need for a scalable representation of the input video. The recently developed scalable extension of the state-of-the art H.264/MPEG-4 AVC video coding standard, also known as H.264/SVC (Scalable Video Coding) provides a solution to this problem. The second problem is that wireless transmission medium typically introduce errors in the bit stream due to noise, congestion and fading on the channel. Protection against these channel impairments can be realized by the use of forward error correcting (FEC) codes. In this research study, the performance of scalable video coding in the presence of bit errors is studied. The encoded video is channel coded using Reed Solomon codes to provide acceptable performance in the presence of channel impairments. In the scalable bit stream, some parts of the bit stream are more important than other parts. Parity bytes are assigned to the video packets based on their importance in unequal error protection scheme. In equal error protection scheme, parity bytes are assigned based on the length of the message. A quantitative comparison of the two schemes, along with the case where no channel coding is employed is performed. H.264 SVC single layer video streams for long video sequences of different genres is considered in this study which serves as a means of effective video characterization. JSVM reference software, in its current version, does not support decoding of erroneous bit streams. A framework to obtain H.264 SVC compatible bit stream is modeled in this study. It is concluded that assigning of parity bytes based on the distribution of data for different types of frames provides optimum performance. Application of error protection to the bit stream enhances the quality of the decoded video with minimal overhead added to the bit stream. / Dissertation/Thesis / M.S. Electrical Engineering 2011
|
29 |
Variace Reed-Solomonových kódů nad jinými algebraickými strukturami / Variants of Reed-Solomon codes over other algebraic structuresKončický, Václav January 2022 (has links)
Reed-Solomon codes are a well known family of error-correcting codes with many good properties. However, they require a finite field to operate, limiting the alphabet size to a prime power. In this work, we build a weaker algebraic structure which supports alphabet of any integer size and requires only standard addition, multiplication and division to implement. Then we study a family of error-correcting codes based on matrix multiplication over this structure. We also adapt the Reed-Solomon code principle on this code family and study its properties. We prove and verify experimentally that while a random code of this family has high distance, the Reed-Solomon adaptation fails to perform well. 1
|
30 |
Goppovy kódy a jejich aplikace / Goppa codes and their applicationsKotil, Jaroslav January 2013 (has links)
Title: Goppa codes and their applications Author: Bc. Jaroslav Kotil Department: Department of algebra Supervisor: prof. RNDr. Aleš Drápal, CSc., DSc. Abstract: In this diploma paper we introduce Goppa codes, describe their para- metres and inclusion in Alternant codes, which are residual Generalized Reed- Solomon codes, and Algebraic-geometry codes. Aftewards we demonstrate deco- ding of Goppa codes and introduce Wild Goppa codes. We also describe post- quantum cryptography member: McEliece cryptosystem for which no effective attacks with quantum computers are known. We outline a usage of this crypto- system with Goppa codes and describe the security of the cryptosystem together with possible attacks of which the most effective ones are based on information- set decoding. Keywords: Goppa codes, Generalized Reed-Solomon codes, Algebraic-geometry codes, Post-quantum cryptography, McEliece cryptosystem 1
|
Page generated in 0.0464 seconds