This application claims priority from French Patent Application No. 04 00 267 filed on Jan. 13, 2004, which is incorporated herein by reference.
The present invention concerns systems for communication or recording of data in which the data are subjected to a channel encoding in order to improve the fidelity of the transmission or storage. It concerns more particularly a decoding method, as well as the devices and apparatus adapted to implement this method.
It will be recalled that channel “block encoding” consists, when the “codewords” sent to a receiver or recorded on a data carrier are formed, of introducing a certain level of redundancy in the data. More particularly, by means of each codeword, the information is transmitted that is initially contained in a predetermined number k of symbols taken from an “alphabet” of finite size q; on the basis of these k information symbols, calculation is made of a number n>k of symbols belonging to that alphabet, which constitute the components of the codewords: v=(v1,v2, . . . , vn). The set of codewords obtained when each information symbol takes some value in the alphabet constitutes a sort of dictionary referred to as a “code” of “dimension” k and “length” n.
When the size q of the “alphabet” is a power of a prime number, the alphabet can be given the structure of what is known as a “Galois field”, denoted Fq, of which the non-zero elements may conveniently be identified as each being equal to γi for a corresponding value of i, where i=1, . . . , q−1, and where γ is a primitive (q−1 )th root of unity in Fq.
In particular, certain codes, termed “linear codes” are such that any linear combination of codewords (with the coefficients taken from the alphabet) is still a codeword. These codes may conveniently be associated with a matrix H of dimension (n−k)×n, termed “parity check matrix”: a word v of given length n is a codeword if, and only if, it satisfies the relationship: H·vT=0 (where the exponent T indicates the transposition); the code is then said to be “orthogonal” to the matrix H.
At the receiver, the associated decoding method then judiciously uses this redundancy to detect any transmission errors and if possible to correct them. There is a transmission error if the difference e between a received word r and the corresponding codeword v sent by the transmitter is non-zero.
More particularly, the decoding is carried out in two main steps.
The first step consists of associating an “associated codeword” with the received word. To do this, the decoder first of all calculates the “error syndromes” vector s=H·rT=H·eT. If the syndromes are all zero, it is assumed that no transmission error has occurred, and the “associated codeword” will then simply be taken to be equal to the received word. If that is not the case, it is thereby deduced that the received word is erroneous, and a correction algorithm is then implemented which is adapted to estimate the value of the error e; the algorithm will thus provide an estimated value ê such that (r−e) is a codeword, which will then constitute the associated codeword. Usually, this first step is divided into two substeps: first identification is made of what the components are in the received word whose value is erroneous, and then the corrected value of those components is calculated.
The second step simply consists in reversing the encoding method. In the ideal situation in which all the transmission errors have been corrected, the initial information symbols are thereby recovered.
It will be noted that in the context of the present invention, reference will often be made to “decoding” for brevity, to designate solely the first of those steps, it being understood that the person skilled in the art is capable without difficulty of implementing the second step.
The purpose of an error correction algorithm is to associate with the received word the codeword situated at the shortest Hamming distance from that received word, the “Hamming distance” being, by definition, the number of places where two words of the same length have a different symbol. The shortest Hamming distance between two different codewords of a code is termed the “minimum distance” d of that code. This is an important parameter of the code. More particularly, it is in principle possible to find the position of the possible errors in a received word, and to provide the correct replacement symbol (i.e. that is identical to that sent by the transmitter) for each of those positions, each time the number of erroneous positions is at most equal to INT[(d−1)/2] (where “INT” designates the integer part) for a code of minimum distance d (for certain error configurations, it is sometimes even possible to achieve better). However, in all cases, the concern is not with a possibility in principle, since it is often difficult to develop a decoding algorithm achieving such performance. It should also be noted that, when the chosen algorithm manages to propose a correction for the received word, that correction is all the more reliable (at least, for most transmission channels) the smaller the number of positions it concerns.
Among known codes, “Reed-Solomon” codes may be cited, which are reputed for their efficiency. They are linear codes, of which the minimum distance d is equal to (n−k+1). The parity check matrix H of the Reed-Solomon code of dimension k and length n (where n is necessarily equal to (q−1) or to a divisor of (q−1)) is a matrix with (n−k) lines and n columns, which has the structure of a Vandermonde matrix. This parity check matrix H may for example be defined by taking Hij=α(i+1)j (0≦i≦n−k−1, 0≦j≦n−1), where α is an nth root of unity in Fq. For more details on Reed-Solomon codes, reference may for example be made to the work by R. E. Blahut entitled “Theory and practice of error-control codes”, Addison-Wesley, Reading, Mass., 1983; this work provides in particular the description of the “Berlekamp-Massey” algorithm which enables the erroneous components in a received word to be identified, and of the “Forney” algorithm which then enables the value of those erroneous components to be corrected.
For modern information carriers, for example on computer hard disks, CDs (“compact discs”) and DVDs (“digital video discs”), it is sought to increase the density of information. When such a carrier is affected by a physical defect such as a scratch, a high number of information symbols may be rendered unreadable. This problem may nevertheless be remedied by using a very long code. However, as indicated above, the length n of the words in Reed-Solomon codes is less than the size q of the alphabet of the symbols. Consequently, if a Reed-Solomon code is desired having codewords of great length, high values of q must be envisaged, which leads to costly implementations in terms of calculation and storage in memory. Moreover, high values of q are sometimes ill-adapted to the technical application envisaged. For this reason, it has been sought to build codes which naturally provide words of greater length than Reed-Solomon codes.
In particular so-called “algebraic geometric codes” or “Goppa geometric codes” have recently been proposed (see for example “Algebraic Geometric Codes” by par J. H. van Lint, in “Coding Theory and Design Theory” 1st part, IMA Volumes Math. Appl., volume 21, Springer-Verlag, Berlin, 1990). These codes are constructed from a set of n pairs (x,y) of symbols belonging to a chosen Galois field Fq; this set of pairs is termed a “locating set”. In general terms, there is an algebraic equation with two unknowns X and Y such that the pairs (x,y) of that locating set are all solutions of that algebraic equation. The values of x and y of these pairs may be considered as coordinates of points Pj (where j=1, . . . , n) forming an “algebraic curve”.
An important parameter of such a curve is its “genus” g. In the particular case where the curve is a simple straight line (the genus g s then zero), the algebraic geometric code reduces to a Reed-Solomon code. For given q and g, certain algebraic curves, termed “maximum”, make it possible to achieve a length equal to (q+2g{square root}{square root over (q)}), which may be very high; for example, with an alphabet size of 256 and a genus equal to 120, codewords are obtained of length 4096.
For a “one point” algebraic geometric code a parity check matrix is conventionally defined as follows: With every monomial h=XsYl, where s and t are positive integers or zero, a “weight” is associated (see below for details). If, for an integer ρ≧0, there is at least one monomial of which the weight is ρ, it is said that ρ is an “achievable” weight. Let ρ1<ρ2< . . . <ρn−k be the (n−k) smallest achievable weights, and let hi (where i=1, . . . , n−k) be a monomial of weight ρi. The element in line i and column j of the parity check matrix is equal to the monomial hi evaluated at the point Pj (where, it may be recalled, j=1, . . . , n) of the algebraic curve. Each point Pj then serves to identify the jth component of any codeword.
Algebraic geometric codes are advantageous as to their minimum distance d, which is at least equal to (n−k+1−g), and, as has been said, as to the length of the codewords, but they have the drawback of requiring decoding algorithms that are rather complex, and thus rather expensive in terms of equipment (software and/or hardware) and processing time. This complexity is in fact greater or lesser according to the algorithm considered, a greater complexity being in principle the price to pay for increasing the error correction capability of the decoder (see for example the article by Tom Høholdt and Ruud Pellikaan entitled “On the Decoding of Algebraic-Geometric Codes”, IEEE Trans. Inform. Theory, vol. 41 no. 6, pages 1589 to 1614, November 1995). Generally, the higher the genus g of the algebraic curve used, the greater the length of the codewords, but also the greater the complexity of the decoding.
A decoding algorithm for algebraic geometric codes is known, for example, from the article by A. N. Skorobogatov and S. G. Vladut entitled “On the Decoding of Algebraic-Geometric codes”, IEEE Trans. Inform. Theory, vol. 36 no.5, pages 1051 to 1060, November 1990).
Another example of an algorithm is disclosed in the article by M. Sakata et al. entitled “Generalized Berlekamp-Massey Decoding of Algebraic-Geometric Codes up to Half the Feng-Rao Bound” (IEEE Trans. Inform. Theory, vol 41, pages 1762 to 1768, November 1995). This algorithm can be viewed as a generalization of the Berlekamp-Massey algorithm to algebraic geometric codes defined on a curve of non-zero genus.
Still another example is disclosed in the article by M. O'Sullivan entitled “A Generalization of the Berlekamp-Massey-Sakata Algorithm” (preprint 2001).
However, the authors of the present invention have discovered that it is possible to reconcile the apparently contradictory properties of high genus g and low decoding complexity, where the algebraic curve is of a particular type belonging to the general class of “fiber products”, which will now be defined.
Let there be a certain number μ, where μ is an integer greater than 1, of algebraic equations over Fq, where q=22p and p is a strictly positive integer, all having, for i=0, . . . , μ−1, the same general formula
Yie+Yi=βif(X) (1.i)
governing the unknowns X and Yi, and where:
Next let
in which the coefficients λi belong to Fq and are all non-zero.
Finally the Yi are eliminated between the equations (1.i) and equation (2), and the coefficients λi are chosen such that this elimination results in an equation of the form
g(Z)=β f(X), (3)
in which the β belongs to Fq. In the context of the present invention, equation (3) will be termed the “fiber product” of the equations (1.i) and the latter will be termed “component equations” of the fiber product (3). It can be shown that in equation (3), g(Z) is a polynomial in Z of degree 2μφ of which the coefficients are zero for the powers of Z which are not equal to a power of e=2φ; the result of this in particular is that equation (3) is of the type “C(a,b)”, defined below, and that the algebraic geometric code defined on that equation is a one-point code.
According to a first aspect, the invention thus concerns a method of decoding a one-point algebraic geometric code defined on an algebraic curve represented by an equation in X and Z of degree 2μφ in Z, where φ is a strictly positive integer and μ an integer greater than 1, obtained by taking the fiber product of μ component algebraic equations, each of said component equations governing the unknown X and an unknown Yi, where i=0, . . . , μ−1, and being of degree 2φ in Yi. This method is remarkable in that it comprises the decoding of 2(μ−1)φ “clustered” codes, all defined on the same algebraic curve represented by one of said component equations.
As explained in detail below, the method according to the invention relies on the subdivision of the locating set of the code into subsets which we will refer to as “clusters”. By definition, a “cluster” is associated with a given value of x among the solutions of equation (3) and with a given value of y0 among the solutions of equation (1.0), the other coordinates y1, y2, . . . , yμ−1 being able to take all the values which are respectively solutions to the equations (1.i) where i≠0 (it is naturally possible to exchange the role of Y0 with that of any other unknown Yi, where i≠0). Each “cluster” according to the invention thus comprises at most 2(μ−1)φ points of the locating set.
By virtue of the invention, the decoding of received words resulting from the transmission of words of great length, encoded in accordance with a code of high genus defined on a geometric curve represented by a fiber product, is being replaced by the less complex decoding of “clustered codes” defined on an algebraic curve represented by an equation of lower degree than the degree of the fiber product, and thus generally also of lower genus. These clustered codes being defined on the same general algebraic curve, they are of the same length, which is, as will be seen in the examples presented below, often considerably less than the length of the code defined on the algebraic curve represented by the fiber product.
It will be seen below, with the help of an example embodiment, that the method of decoding according to the invention makes it possible to correct sometimes more, and sometimes less transmission errors than the conventional methods such as that of O'Sullivan, depending on the manner in which the errors are produced by the channel: in this respect, the method according to the invention is advantageous when the channel produces burst-type errors rather than randomly occurring errors.
According to particular features, a word r having been received, the decoding method comprises the following steps:
By virtue of these provisions, it is possible to optimize the error correction capability of the decoding method according to the invention, by taking into account the “erasures”, that is to say by taking advantage of the information that the value of a particular component of the word to correct is uncertain.
According to a second aspect, the invention relates to various devices.
Thus, firstly, it concerns a device for correcting errors for the decoding of a one-point algebraic geometric code defined on an algebraic curve represented by an equation in X and Z of degree 2μφ in Z, where φ is a strictly positive integer and μ an integer greater than 1, obtained by taking the fiber product of μ component algebraic equations, each of said component equations governing the unknown X and an unknown Yi, where i=0, . . . , μ−1, and being of degree 2φ in Yi. This device is remarkable in that it comprises means for decoding 2(μ−1)φ “clustered” codes, all defined on the same algebraic curve represented by one of said component equations.
According to particular features, the error correction device comprises means which, a word r having been received, are for:
The advantages of these error correction devices are essentially the same as those of the methods complementary thereto described succinctly above.
The invention also concerns, secondly, a decoder comprising:
The invention also relates to:
The advantages provided by this decoder, this reception apparatus, this computer system, these data storage means and this computer program are essentially the same as those provided by the methods according to the invention.
Other aspects and advantages of the invention will emerge from a reading of the following detailed description of particular embodiments, given by way of non-limiting example. The description refers to the accompanying drawings, in which:
The function of this system is to transmit information of any nature from a source 100 to a recipient or user 109. First of all, the source 100 puts this information into the form of symbols belonging to a certain alphabet (for example bytes), and transmits these symbols to a storage unit 101, which accumulates the symbols so as to form sets each containing k symbols. Next, each of these sets is transmitted by the storage unit 101 to an encoder 102 which incorporates the redundancy therein, so as to construct a codeword of length n belonging to the chosen code.
The codewords so formed are next transmitted to a modulator 103, which associates a modulation symbol (for example, a complex amplitude) with each symbol of the codeword. Next, these modulation symbols are transmitted to a transmitter or to a recorder 104, which inserts the symbols in a transmission channel. This channel may for example be constituted by a wired transmission or wireless transmission such as a radio signal, or by storage on an appropriate carrier such as a DVD or a magnetic tape. This transmission arrives at a receiver or a reader 105, after having been affected by a “transmission noise” whose effect is to modify or delete certain of the modulation symbols at random.
The receiver (or reader) 105 then transmits these symbols to the demodulator 106, which transforms them into symbols of the alphabet mentioned above. The n symbols resulting from the transmission of the same codeword are next grouped together into a “received word” in an error correction unit 107, which implements a decoding method according to the invention, so as to provide an “associated codeword”. Next, this associated codeword is transmitted to a redundancy removal unit 108, which extracts from it k information symbols by implementing a decoding algorithm that is the reverse of that implemented by the encoder 102. Finally, these information symbols are supplied to their recipient 109.
Units 107 and 108 can be considered to form conjointly a “decoder” 10.
The method of error correction according to the invention will now be illustrated, with the aid of a numerical example. Note that this example does not necessarily constitute a preferred choice of parameters for the encoding or decoding. It is provided here to enable the person skilled in the art to understand more easily the operation of the method according to the invention.
An algebraic geometric code will thus be considered of dimension 2953 and length 3264 defined as follows.
The alphabet of the symbols is constituted by the 210 elements of the Galois field F1024. The following “algebraic curve” is then considered of genus g=35 constituted by the set of the solutions (X=x,Z=z) of the equation with two unknowns
Z8+β17Z4+β5Z2+β10Z+β11X11=0 (99)
over F1024, where β=α33 is an element of F32 and α is an element of F1024 satisfying
α10+α3+1=0.
These solutions (x,z ) of equation (99), of which there are 3264 (i.e. (q+2g{square root}{square root over (q)}), this algebraic curve thus being “maximum”), constitute the “finite points of the curve” (the curve also contains a point at infinity denoted P∞) and will constitute the locating set. Each point Pj of the locating set serves to identify the jth component of any codeword. The number of such points here being equal to 3264, the length n of the code is thus itself also equal to 3264.
It will be noted that the algebraic curve (99) is of the general form:
Xb+cZa+ΣcijXiZj=0,
where c≠0 and the cij are elements of Fq, a and b are strictly positive mutually prime integers, and where the sum only applies to the integers i and j which satisfy ai+bj<ab. This form of equation is referred to as “C(a,b)”.
Furthermore, it is possible to verify that the algebraic equation (99) is the fiber product of the following algebraic equations:
Y02+Y0+X11=0, (100)
Y12+Y1+βX11=0, et (101)
Y22+Y2+β2X11=0 (102)
which are themselves of type C(a,b) (more particularly, they are equations known as “hyperelliptic” since they are quadratic in Y0, Y1 and Y2). This fiber product is obtained by eliminating the unknowns Y0, Y1 and Y2 between the three equations (100-102) and the following equation:
Z=Y0+β20Y1+β7Y2. (103)
This example thus does indeed fall within the scope of the invention, with, in this case: p=5, φ=1 and μ=3.
There are 672 values x of X in F1024 for which there exist two values of y0 of Y0 in F1024 such that the pair (X=x, Y0=y0) satisfies the equation (100) (for the 352 other values x of X in F1024, there is no other value y0 of Y0 in F1024 such that the pair (X=x, Y0=y0) satisfies the equation (100)). Similarly, there are 672 values x of X in F1024 for which there exist two values y1 of Y1 in F1024 such that the pair (X=x, Y1=y1) satisfies the equation (101) (for the 352 other values x of X in F1024, there is no other value y1 of Y1 in F1024 such that the pair (X=x, Y1=y1) satisfies the equation (101)). Similarly, there are 672 values x of X in F1024 for which there exist two values y2 of Y2 in F1024 such that the pair (X=x, Y2=y2) satisfies the equation (102) (for the 352 other values x of X in F1024, there is no other value of y2 of Y2 in F1024 such that the pair (X=x, Y2=y2 ) satisfies the equation (102)). The intersection of these three sets of values of x comprises 408 elements, on the basis of which a total number of multiplets (x,y0,y1,y2) is obtained equal to: 408×2×2×2=3264, which is indeed equal to the number of solutions (x,z ) of the equation (99).
For an algebraic equation of the C(a,b) type, the monomials hi=Z1Xu are usually considered where the exponent t of Z is strictly less than a, and the “weight” of such a monomial is defined by ρ(t,u)=bt+au. Next, the vector space L(m P∞) is considered of the polynomials in X and Z with coefficients in F1024 of which solely the poles are situated in P∞, and are of order less than or equal to m, where m is a strictly positive integer (the image of this space of polynomials on the finite points of a curve C(a,b) is thus a “one-point” algebraic geometric code). This vector space, which is of dimension greater than or equal to (m−g+1) (equal if m>2g−2), has a base constituted by the monomials hi=ZtXu, where t is an integer between 0 and a, u is a positive integer or zero, and ρ(t,u)≦m.
Take for example: m=345; by taking into account g=35, a set of monomials hi, where i=1, . . . , 311, is then obtained since:
m−g+1=345−35+1=311 .
Finally, the parity check matrix H of the code is defined in the following manner: the element in line i and column j of that matrix is equal to the value taken by the monomial hi for the coordinates of the point Pj of the algebraic curve. Thus, n−k=311 and so k=2953.
The monomials hi may be classified into subsets of monomials
Mt={ZtXu|0≦u≦(m−bt)/a},
where t≦0, t<a, and t≦m/b. In the case of the equation (99), where a=8 and b=11, and for m=345, eight such subset of monomials are obtained:
It is verified that the number of lines of the parity check matrix H is indeed equal to: 44+42+41+40+38+37+35+34=311.
A new formulation for belonging to the code will now be presented, which is equivalent to the orthogonal relationship H·vT=0, and which then facilitate the understanding of the decoding method according to the invention.
This new formulation relies on the subdivision of the locating set of the code into subsets which we will term “clusters”. By definition, a cluster is associated with a value x of X and with a value y0 of—let us say—Y0. In the present example, as the coordinate Y1 can take the values y11 or y12, and the coordinate y2 can take the values y21 and y22, the 3264 points of the locating set form 816 clusters each comprising four points. The components of any codeword v will then be denoted v(y0,y1i,y2j,z(y0,y1i,y2j,x)), where i,j=1,2, so as to emphasize the cluster structure, and it will be stated that the components, indexed for that purpose, which have the same value of x and of y0 form a “cluster of components” of the codeword.
Next, for each cluster, four “clustered symbols” are defined
for s=0,1,2,3. These clustered symbols then constitute, for each value of s, the components of a “clustered word” vs of length 816.
It will now be shown that the condition H·vT=0 of belonging to the code is equivalent to the four conditions H(s)·vsT=0 (where s=0,1,2,3), where each matrix H(s) is the parity check matrix of a code of length n′=816 and of dimension k′s defined on the algebraic curve represented by the hyperelliptic equation (100), which is of genus g′=5. Given the exponents of X and of Y0 in the equation (100), the parity check matrix of such a code may be constructed on the basis of the monomials Y0tXu of weight ρ′(t,u)=11t+2u. More particularly, it will be shown that:
It will be noted that, whatever the formulation chosen for the encoding, the total dimension of the code must be conserved since that dimension reflects the number of degrees of freedom available for that encoding. Verification is made that this is indeed the case with the values below:
k′0+k′1+k′2+k′3=734+737+740+742=2953=k.
The algebraic codes so obtained are termed “clustered” codes associated with the code defined on the algebraic curve represented by the equation (99).
To construct this equivalence, the concept of “weight” (standard in the general context of the theory of algebraic geometric codes) is generalized to the polynomials with two variables X and Z comprising at least two monomials: first the weight ρ(t,u)=bt+au of each monomial ZtXu of that polynomial is calculated, and then it is verified whether the greatest weight so calculated is in respect of a unique monomial; if that is the case, a weight equal to that maximum weight is then attributed to the polynomial, otherwise the available algebraic equations are used to achieve that case.
Thus: ρ(Y02+Y0)=ρ(Y02)=2ρ(Y0) However, according to equation (100):
ρ(Y02+Y0)=ρ(X11)=11·ρ(X)=88
taking into account that ρ(X)=a=8. It is deduced from this that: ρ(Y0)=44, which is furthermore equal to ρ(Z4)=4·ρ(Z)=44, taking into account that ρ(Z)=b=11.
This result ρ(Z4)=ρ(Y0) is used as justification for replacing Z4 with Y0 in the subset of monomials M4, M5, M6, and M7, which gives:
M′4={Y0Xu|0≦u≦37},
M′5={ZY0Xu|0≦u≦36},
M′6={Z2Y0Xu|0≦u≦34}, and
M′7{Z3Y0Xu|0≦u≦33}.
Next, the parity check matrix H′ is defined that is constructed on the basis of the monomials contained in the subsets M0, M1, M2, M3, M′4, M′5, M′6, and M′7. In the general context of the theory of algebraic geometric codes, it can be shown that the matrices H and H′ define the same code, that is to say that the equation H·vT=0 is equivalent to the equation H′·vT=0.
Next, a matrix H′0 is defined on the basis of H′ by deleting the lines corresponding to the monomials belonging to M1, M2, M3, M′5, M′6, and M′7; similarly, a matrix H′1 is defined on the basis of H′ by deleting the lines corresponding to the monomials belonging to M0, M2, M3, M′4, M′6, and M′7; a parity check matrix H′2 is defined on the basis of H′ by deleting the lines corresponding to the monomials belonging to M0, M1, M3, M′4, M′5, and M′7; and finally a parity check matrix H′3 is defined on the basis of H′ by deleting the lines corresponding to the monomials belonging to M0, M1, M2, M′4, M′5 and M′6.
The result of these manipulations is that a word v obeys H′·vT=0 (that is to say, belongs to the code defined on the algebraic curve represented by the equation (99)) if, and only if, it obeys the four equations
H′0·vT=0, H′1·vT=0, H′2·vT0 and H′3·vT=0
simultaneously.
Finally, it is found that, within H′0, each column appears identically four times, since the monomials of M0 and M′4 are independent from Y1 and Y2. A matrix H(0) is then defined, of dimension (44+38)×816, obtained from H′0 by keeping only a single copy for each group of four identical columns, such that, obviously,
H′0·vT=H(0)·vT,
where v0 has been defined above; similarly there is obtained
H′1·vT=H(1)·v1T,
where v1 has been defined above, and where the matrix H(1), of dimension (42+37)×816, is obtained from H′1 by deleting the factor Z in the monomials, and by keeping only a single copy for each group of four identical columns; there is obtained
H′2·vT=H(2)·v2T,
where v2 has been defined above, and where the matrix H(2), of dimension (41+35)×816, is obtained from H′2 by deleting the factor Z2 in the monomials, and by keeping only a single copy for each group of four identical columns; and there is obtained
H′3·vT=H(3)·v3T,
where v3 has been defined above, and where the matrix H(3), of dimension (40+34)×816, is obtained from H′3 by deleting the factor Z3 in the monomials, and by keeping only a single copy for each group of four identical columns.
By virtue this reformulation, the invention makes it possible to replace the decoding of received words resulting from the transmission of words of great length, encoded in accordance with a code of high genus defined on a geometric curve represented by a fiber product, by the less complex decoding of “clustered codes” defined on an algebraic curve of lower degree. Furthermore, in the particular case which has just been described in detail, the clustered codes associated with the parity check matrices H(0), H(1), H(2) and H(3) are hyperelliptic codes, which are known for being particularly simple to decode (see the article by A. N. Skorobogatov and S. G. Vl{haeck over (a)}dut cited above).
According to an embodiment of the invention, a received word r of length n=3264 is corrected taking into account the erasures. The components of any received word r will then be denoted r(y0,y1i,y2j,z(y0,y1i,y2j,x)), where i,j=1,2, and it will be stated that the components, indexed for that purpose, which have the same value of x and of y0 form a “cluster of components of the received word”.
Firstly, for s=0,1,2,3:
Next, an attempt is made to calculate a word {circumflex over (v)}0 by correcting the word r0 according to the error syndromes vector σ0 by means of a conventional error correction algorithm for algebraic geometric codes, adapted to take into account the erasures (see the article by Tom Høholdt and Ruud Pellikaan cited above).
If that algorithm has not been able to provide a corrected word, it is thereby concluded that the means implemented do not enable that received word to be corrected, due to too high a number of transmission errors; the operations following (for example, replacing the word with a predetermined word such as the zero word) depend on the applications envisaged for the decoding method.
If, on the other hand, the correction algorithm is capable of proposing a word {circumflex over (v)}0, then for every pair (x,y0) such that {circumflex over (v)}0(x,y0)≠ro(x,y0), the symbols r1(x,y0) are erased for l=1,2,3.
Next, an attempt is made to calculate a word {circumflex over (v)}1 by correcting the word r1 according to the error syndromes vector σ1 by means of a conventional error correction algorithm for algebraic geometric codes, adapted to take into account the erasures.
If that algorithm has not been able to provide a corrected word, it is thereby concluded that the means implemented do not enable that received word to be corrected, due to too high a number of transmission errors; the operations following (for example, replacing the word with a predetermined word such as the zero word) depend on the applications envisaged for the decoding method.
If, on the other hand, the correction algorithm is capable of proposing a word {circumflex over (v)}1, then for every pair (x,y0) such that {circumflex over (v)}1(x,y0)≠r1(x,y0), the symbols r1(x,y0) are erased for l=2,3.
Next, an attempt is made to calculate a word {circumflex over (v)}2 by correcting the word r2 according to the error syndromes vector σ2 by means of a conventional error correction algorithm for algebraic geometric codes, adapted to take into account the erasures.
If that algorithm has not been able to provide a corrected word, it is thereby concluded that the means implemented do not enable that received word to be corrected, due to too high a number of transmission errors; the operations following (for example, replacing the word with a predetermined word such as the zero word) depend on the applications envisaged for the decoding method.
If, on the other hand, the correction algorithm is capable of proposing a word {circumflex over (v)}2, then for every pair (x,y0) such that {circumflex over (v)}2(x,y0)≠r2(x,y0), the symbols r3(x,y0) are erased.
Next, an attempt is made to calculate a word {circumflex over (v)}3 by correcting the word r3 according to the error syndromes vector σ3 by means of a conventional error correction algorithm for algebraic geometric codes, adapted to take into account the erasures.
If that algorithm has not been able to provide a corrected word, it is thereby concluded that the means implemented do not enable that received word to be corrected, due to too high a number of transmission errors; the operations following (for example, replacing the word with a predetermined word such as the zero word) depend on the applications envisaged for the decoding method.
If on the other hand the correction algorithm is capable of proposing a word {circumflex over (v)}3, then, for each pair (x,y0), calculation is made of the symbols {circumflex over (v)}(y0,y1i,y2j,z(y0,y1i,y2j,x)), where i,j=1,2, which are respectively the estimations of the transmitted symbols corresponding to the received symbols r(y0,y1i,y2j,z(y0,y1i,y2j,x)), by solving the system of four linear equations with four unknowns as follows:
where s=0,1,2,3.
It will be noted that, due to equation (2), the four symbols z(y0,y1i,y2j,x)) at fixed x and y0 are distinct taken in pairs, and the result of this is that the determinant of system (200) is a Vandermonde determinant, which guarantees that the system has one solution, and only one.
The word {circumflex over (v)}, of which the components are the symbols {circumflex over (v)}(y0,y1i,y2j,z(y0,y1i,y2j,x)) so obtained, constitutes the codeword associated with the received word r. It is possible optionally to add a supplementary step to the method consisting of verifying that the word {circumflex over (v)} satisfies the equation H·vT=0, which makes it possible to detect a possible erroneous correction.
A few observations will now be given concerning the error correction capability of the decoding algorithm according to the invention, by using the example which has just been studied.
The minimum distance guaranteed for the code associated with H(0) is:
d0=n′−k′0+1−g′=78.
In correcting the word r0, it is thus possible to correct at most INT[(d0−1)/2]=38 clusters. Assuming that execution of all the following steps of the decoding method is achieved for the received word considered, it is possible to correct 38 components of r having suffered from a transmission error if each erroneous component of r0 only contains a single erroneous component of r, but it is possible to correct up to 152 erroneous components of r (since each cluster contains four components) if it happens that those erroneous components belong to a number of clusters less than or equal to 38. This is to be compared to the conventional error correction algorithms, such as those mentioned advance, which are adapted to correct INT[(277−1)/2]=138 symbols, since the minimum distance guaranteed for the code associated with the matrix H is equal to n−k+1−g=311+1−35=277.
The method according to the invention is thus well adapted for applications concerning transmission channels in which burst-type errors tend to occur: this is because this method is simpler to implement than the conventional algorithms, while being essentially as effective on that type of channel. To profit from this advantage in the case where such channels are concerned, the components of the codewords belonging to the same cluster are preferably transmitted one after the other.
Furthermore, it will be shown that the algorithm taking into account the erasures described above makes it possible in favorable cases to reliably correct a number of clusters greater than 38.
It should be recalled first of all that, for an algorithm adapted to take into account the erasures, the natural quantity to consider is the number (2θ+τ), where τ designates the number of deletions in the word to correct, and θ the number of symbols in that word which have been modified by the algorithm (and in relation to which it did not know in advance that they had to be corrected, that is to say which were not in “erased” positions; this number θ does not necessarily coincide with the real number of erroneous symbols, that is to say different from those transmitted, since it may occasionally occur that the algorithm proposes a “corrected” word which, although belonging to the code, is nevertheless not the transmitted word). For the algorithms with the best performance, their capability to be able to reliably propose a correction of a received word in all cases (that is to say, whatever the received word), is represented by the formula:
2θ+τ≦d−1,
where d is the minimum distance of the code.
In the algorithm described above, account is taken of the pairs (x,y0) identifying the components of r0 which have been corrected, to erase the corresponding components of r1.
To correct r1, the algorithm associated with H(1) must thus take into account, at most, τ1=38 erasures. However, this algorithm will generally also have to correct θ1 symbols r1(x,y0) corresponding to pairs (x,y0) for which, by chance, r0(x,y0) has a correct value (which means that such a cluster has not been detected by the algorithm associated with H(0) as comprising errors), even though at least two of the symbols r(y0,y1i,y2j,z(y0,y1i,y2j,x)) are erroneous (such a case is very infrequent, and more particularly of the order of 1/q where the channel produces errors at random). As furthermore the minimum distance guaranteed for the code associated with H(1) is:
d1=n′−k′1+1−g′=75,
it can be seen that, in most cases, the condition 2θ1+τ1≦d1−1 will be satisfied, and it will thus be possible to correct r1 reliably.
Similar reasoning naturally then applies to the decoding of r2 and r3. Finally, it will thus be possible to correct the symbols of the received word which belong to clusters not detected by the algorithm associated with H(0), in addition to the symbols of the received word belonging to the (maximum of 38) clusters detected at this step.
In the most general case concerned by the present invention (see above the equations (1.i), (2) and (3)), φ may be equal to 1, but also greater than 1. The method of constructing clustered codes illustrated in the above example can easily be generalized as follows:
First of all, the 2μφ subsets Mt of monomials ZtXu are constructed as above, and then each monomial ZtXu is replaced by the monomial Y0fZsXu, where the integers f and s satisfy t=f·2(μ−1)φ+s, and are obtained as quotient and remainder: this is because the monomials ZtXu and Y0fZsXu have the same weight on account of the equations (1.0) and (3). For the maximum value of t, i.e. (2μφ−1), the quotient f has the value (2φ−1), and the remainder s has the value (2(μ−1)φ−1). The number of clustered words vs necessary to “absorb” all the successive powers Zs is thus equal to 2(μ−1)φ. On decoding, construction is made on the basis of the received word r and the clustered received words rs are corrected, of which each is considered as coming from a codeword defined on an algebraic curve represented by the equation (1.0) (it will be noted that in the subsets of monomials which have just been constructed, the last one contains the monomials Y0e−1Xu after the elimination of the power of Z).
By way of supplementary example, consider the curve represented by the equation
Z16+Z+X17=0 (299)
over F256. It is of genus g=120, and may be obtained by taking the fiber product of the μ=2 following algebraic equations:
Y04+Y0+X17=0, and (300)
Y14+Y1+βX17=0, (301)
where β=α17, and α is an element of F256 satisfying
α8+α4+α3+α2+1=0.
This fiber product is obtained by eliminating the unknowns Y0 and Y1 between the two equations (300-301) and the following equation:
Z=β4Y0+Y1. (302)
As, in this case, φ=2, it is possible here to define the clustered codes, of which their are four, on the algebraic curve associated with the equation (300).
The curve defined by the equation (299) has 4096 points on F256, it is thus advantageously maximum, as is the curve defined by equation (99). Nevertheless, the method according to the invention applies just as well to fiber products which are not maximum algebraic curves.
It will be noted that, in the example described in detail above, the clusters are all of identical size, that is to say they all comprise the same number of points of the locating set (i.e. four). This is not the case in general, but the invention applies just as well in the case in which the clusters are of variable size.
To terminate the calculation of the estimated symbols, a system of 2φ(μ−1) equations is solved, similar to the system (200), for each cluster; when a cluster is of size strictly less than 2φ(μ−1), this system is overdetermined, which advantageously makes it possible to detect estimation errors in the clustered symbols {circumflex over (v)}s(x,y0) of that cluster. It can be seen that, when the decoding method according to the invention is implemented, the correction of the symbols belonging to small clusters may be rendered more reliable than that of the symbols belonging to large clusters; consequently, this decoding method provides the possibility of “unequal protection” against errors, which is desirable in certain applications as is well known to the person skilled in the art.
The block diagram of
The decoder 10 comprises, connected together by an address and data bus 702:
Each of the elements illustrated in
The random access memory 704 stores data, variables and intermediate processing results, in memory registers bearing, in the description, the same names as the data whose values they store. The random access memory 704 contains in particular the following registers:
The read only memory 705 is adapted to store, in registers which, for convenience, have the same names as the data which they store:
An application of the invention to the mass storage of data has been described above by way of example, but it is clear that the methods according to the invention may equally well be implemented within a telecommunications network, in which case unit 105 could for example be a receiver adapted to implement a protocol for data packet transmission over a radio channel.
Number | Date | Country | Kind |
---|---|---|---|
0400267 | Jan 2004 | FR | national |