Decoding method for trellis codes employing a convolutional processor

Information

  • Patent Grant
  • 5841818
  • Patent Number
    5,841,818
  • Date Filed
    Wednesday, January 17, 1996
    29 years ago
  • Date Issued
    Tuesday, November 24, 1998
    27 years ago
Abstract
A trellis code of a special class is encoded by employing a binary convolutional code with a small constraint length, followed by a convolutional processor and a signal mapper. The trellis code is decoded by the trellis of the binary convolutional code.
Description

BACKGROUND OF THE INVENTION
In a digital communication system, the transmission of information will be corrupted by channel noise or other channel defects and hence transmission errors are likely to occur. In a digital communication system which requires high reliability, channel coding is usually needed to lower the probability of transmission errors. In a channel coding design, each unit or bit of digitized information will be mapped into a corresponding codeword (or code path). The set of all codewords is called a code. The distance property among codewords of a code can be used to correct transmission errors. In this way, the transmission reliability can be increased. The mapping between the set of information units or bits and the set of codewords is called "coding" or "encoding". If the symbols in each codeword are binary symbols, the channel coding is a binary coding. Sometimes, the mapping is also referred to as a "code". The procedure of recovering the information from the received symbols which are possibly error-corrupted is called "decoding".
The binary trellis code is a frequently used channel coding technique. For a rate k/n binary trellis code, for each time unit, k information bits are fed into-the encoder which generates n code bits as output. The n code bits depend not only on the k information bits currently used as input to the encoder but also depend on information bits which were used as input to the encoder for some earlier time units. A binary trellis code is hence a kind of code with a memory. The codewords of a binary trellis code can be represented by paths in a trellis. The most important class of binary trellis codes is the binary convolutional code. A binary convolutional code is a linear time-invariant binary trellis code. Binary convolutional codes were introduced several decades ago and are still very popular.
In the 1982 paper entitled "Channel coding with multilevel/phase signals," published in IEEE Trans. Inform. Theory., vol. 28, no. 1, pp. 55-67, G. Ungerboeck proposed a new idea of channel coding, in which the design of trellis codes and modulation are integrated, called trellis coded modulation (TCM). Consider the signal space 106 , which consists of 2.sup.m signal points {z.sub.1, z.sub.2, . . . , z.sub.2m }. Every signal point z in .OMEGA. corresponds to a unique binary m-tuple s=(s.sub.1,s.sub.2, . . . , s.sub.m) for z .epsilon.{z.sub.1, z.sub.2, . . . , z.sub.2m } and s.sub.1, s.sub.2, . . . , s.sub.m .epsilon.{0,1}. The encoding of Ungerboeck's TCM having an information rate of r information bits per signal point of .OMEGA. is shown in FIG. 1. During the t-th time unit, the encoder of a binary convolutional code C converts the r-bit information u(t)=(u.sub.1 (t), u.sub.2 (t), . . . , u.sub.r (t)) into an m-bit output s(t)=(s.sub.1 (t),s.sub.2 (t), . . . , s.sub.m (t)), which is then mapped into a signal point .omega.(s.sub.1 (t),s.sub.2 (t), . . . , s.sub.m (t))=.omega.(s(t)) of the signal space .OMEGA. through a signal mapper S.
Binary trellis codes and trellis coded modulation (TCM) can be combined as a class of codes called trellis codes. The performances of a trellis code are primarily evaluated by three parameters: coding rate, decoding complexity and probability of decoding errors. Designing a trellis code with high coding rate, low decoding complexity and low probability of decoding errors is always a goal in the area of digital communications. To achieve low probability of decoding errors for a trellis coding system, a large free distance is desired, where the free distance of a trellis code is the smallest one of all the possible distances, each of which is measured between a pair of distinct code paths of the trellis code.
In 1995, Lin and Wang in their U.S. patent application with application Ser. No. 08/398,797 filed on Mar. 6, 1995, now U.S. Pat. No. 5,570,391, proposed a class of trellis codes for which the encoding can be implemented by introducing a multilevel delay processor Q between the encoder of the binary convolutional code C and the signal mapper S. The encoding is shown in FIG. 2. During the t-th time unit, the encoder of a rate r/m binary convolutional code C converts the r-bit information u(t) into an m-bit output v(t)=(v.sub.1 (t), v.sub.2 (t), . . . , v.sub.m (t)), which is fed into a multilevel delay processor Q. The output of the multilevel delay processor is s(t)=(s.sub.1 (t), s.sub.2 (t), . . . , s.sub.m (t)), where s.sub.p (t)=v.sub.p (t-.SIGMA..sub.i=p.sup.m .lambda..sub.i), 1.ltoreq.p.ltoreq.m, with .lambda..sub.1, .lambda..sub.2, . . . , .lambda..sub.m being nonnegative constants. Through the signal mapper S, a signal point .omega.(s(t)) in the signal space .OMEGA. is obtained as the final output symbol. The decoding of the class of trellis codes which can apply the encoding method illustrated in FIG. 2 can be implemented by using the trellis of C.
In this invention, the inventors design a new class of trellis codes for which the encoding can be implemented by modifying the above mentioned method by replacing the multilevel delay processor by a convolutional processor. In this way, a trellis code with a large free distance can be designed even though the constraint length of the binary convolutional code C is small. The inventors also propose a decoding method for the new class of trellis code which uses the trellis of convolutional code C.
SUMMARY OF THE INVENTION
This invention is a decoding method for the trellis code T for which the encoding can be implemented by first using the encoder E of a rate r/m binary convolutional code C to encode an information sequence u={. . . , u(t-1), u(t), . . . } into a sequence v={. . . , v(t-1), v(t), . . . } that is sequentially converted into a sequence s={. . . , s(t-1), s(t), . . . , } and a sequence .omega.={. . . ,.omega.(s(t-1)), .omega.(s(t)), . . . } through a convolutional processor P and a signal mapper S, respectively illustrated in FIG. 3, where u(t) is the r-bit information to be encoded during the t-th time unit of encoding, and v(t), s(t) and .omega.(s(t)) are the associated output symbols of E, P and S respectively. Note that v(t) and s(t) are binary m-tuples and .omega.(s(t)) can be either a binary m-tuple or a signal point of a signal constellation. The convolutional processor P is in fact an encoder having a rate m/m binary convolutional code, which can be characterized by a transfer function matrix as is described in the 1983 book, Error Control Coding : Fundamentals and Applications authored by Shu Lin and Daniel J. Costello, Jr. The transfer function matrix G for the convolutional processor is an m.times.m matrix for which the entry at the intersection of the p-th row and the q-th column is g.sup.(p,q) (X), i.e.,
G=�g.sup.(p,q) (X)!, p,q.epsilon.{1,2, . . . , m}, (1)
where g.sup.(p,q) (X) represents the generator sequence (impulse response) for the case in which only the p-th input line of the convolutional processor is used as input and the q-th output line of the convolutional processor is used as output. The parameter g.sup.(p,q) (X) is written in polynomial form by ##EQU1## where .alpha..sub.i.sup.(p,q) .epsilon.{0,1} and .lambda. is a positive constant.
Referring to FIG. 4, assume that
.LAMBDA.=max{i.lambda.:.alpha..sub.i.sup.(p,q) =1,1.ltoreq.p.ltoreq.m,1.ltoreq.q.ltoreq.m}.
The decoding method is implemented by two processors P(.sup.2) and P.sup.(1). Let the received symbol be denoted by y(t), which is the possibly noise-corrupted form of the symbol .omega.(s(t)). The processor P(.sup.2) takes the received sequence y={. . . , y(t-1), y(t),y(t+1), . . . , } as input. Based on {. . . , y(t), . . . , y(t+.LAMBDA.-1), y(t+.LAMBDA.)} and the transfer function matrix G and {. . . , v(t-.lambda.-1), v(t-.lambda.)}, the processor P(.sup.2) determines M.sub.v(t), where M.sub.v(t) is the branch metric needed by the decoding trellis code T, for each of the 2.sup.m possible values of v(t). Then, the set T.sub.M (t)={M.sub.v(t) : v(t).epsilon.{0,1}.sup.m } is fed into the processor P.sup.(1).
The processor P.sup.(1) takes the metric sequence {. . . , T.sub.M (t-1), T.sub.M (t)} as input and applies the Viterbi algorithm to the trellis of C to recover the transmitted symbols u(t-.lambda.+1) and v(t-.lambda.+1) by setting the truncation length of decoding for C to be .lambda..
The trellis code T can be generalized in such a way that g.sup.(p,q) (X) of the transfer function matrix is modified to be ##EQU2## where n.sub.p is a nonnegative constant. Then, in the decoding, the parameter .LAMBDA. is modified to be
.LAMBDA.=max{n.sub.p +i.lambda.:.alpha..sub.i.sup.(p,q) =1,1.ltoreq.p.ltoreq.m,1.ltoreq.q.ltoreq.m}.
Note that if g.sup.(p,q) (X)=0 for p.noteq.q and g.sup.(p,p) (X)=X.sup.r.sbsp.p.sup..lambda.+n.sbsp.p for 1.ltoreq.p.ltoreq.m, then trellis code T becomes a trellis code described in the U.S. Pat. No. 5,570,391, where r.sub.p is a nonnegative constant. Hence, this invention is restricted to the case that g.sup.(p,q) (X) is nonzero for some pair of (p,q) with p.noteq.q.





BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 illustrates the encoding method for the Ungerboeck's TCM;
FIG. 2 illustrates the encoding method for the trellis code proposed by Lin and Wang in March 1995;
FIG. 3 illustrates an encoding method of the trellis code T suitable for the proposed decoding method;
FIG. 4 illustrates the decoding method for the trellis code T;
FIG. 5 shows an 8PSK signal constellation;
FIG. 6 illustrates the encoder E of the linear binary convolutional code C used in the first embodiment;
FIG. 7 illustrates the state transition diagram of the linear binary convolutional code C used in the first embodiment;
FIG. 8 illustrates the relation between v(t) and s(t) for the first embodiment; and
FIG. 9 illustrates the simulation results for the first embodiment.





DESCRIPTION OF THE PREFERRED EMBODIMENT
The preferred embodiment shows that it is possible to design a trellis code with a large free distance, which can be encoded by using the multilevel encoding method illustrated in FIG. 3. This embodiment demonstrates the powerful capabilities of the proposed decoding method.
The signal space .OMEGA. which consists of 2.sup.m signal points z.sub.1, z.sub.2, . . . , z.sub.2m can be partitioned into an m-level structure such that each signal point z corresponds to a unique binary m-tuple s=(s.sub.1,s.sub.2, . . . , s.sub.m) for z.epsilon.{z.sub.1,z.sub.2, . . . , z.sub.2m } and s.sub.1,s.sub.2, . . . , s.sub.m .epsilon.{0,1}. Let the mapping relation between z and s be .omega.(s)=z. The level distance .DELTA..sub.p of the signal space .OMEGA. is defined as follows: ##EQU3## If .OMEGA. is a signal constellation then .DELTA.(z,z') stands for the squared Euclidean distance between z and z', i.e., D.sup.2 (z,z'); and if .OMEGA. is a collection of binary m-tuples then .DELTA.(z, z') stands for the Hamming distance between the binary representations of z and z', i.e., d(z, z'). It can be said that the distance structure of the signal space is {.DELTA..sub.1,.DELTA..sub.2, . . . , .DELTA..sub.m }. For example, the 8PSK signal constellation can be partitioned into a three-level structure as shown in FIG. 5, for which the distance structure is described by
.DELTA..sub.1 =D.sub.1.sup.2 =0.586, .DELTA..sub.2 =D.sub.2.sup.2 =2, .DELTA..sub.3 =D.sub.3.sup.2 =4.
Moreover, for example, the collection of binary two-tuples .OMEGA.={0,1}.sup.2 ={z.sub.0 =(0,0), z.sub.1 =(1,0), z.sub.2 =(0,1), z.sub.3 =(1,1)} can be partitioned as ##EQU4##
The distance structure for .OMEGA. is described by ##EQU5##
Consider the proposed trellis code T with the signal space .OMEGA.. Suppose that for each i there is at most one a.sub.i.sup.(p,q) =1 for all 1.ltoreq.p.ltoreq.m and 1.ltoreq.q.ltoreq.m. In the decoding, the bit metric can be calculated from the received sequence y={. . . , y(t), . . . , y(t+.LAMBDA.-1), y(t+.LAMBDA.)} by ##EQU6## where y(t) is the possibly noise-corrupted form of the transmitted symbol .omega.(s(t)). Note that the minimum value in the equation (4) is determined under the m constraints on the parameters, s.sub.1, . . . , s.sub.m, i.e., s.sub.k =.SIGMA..sub.h=1.sup.m .SIGMA..sub.j=0 a.sub.j.sup.(h,k) v.sub.h (t+�i-j!.lambda.) for k=1,2, . . . , m. In general, not all of these m constraints can be set, since there may exist s.sub.k which is determined by v.sub.h (t+�i-j!.lambda.) that is not yet recovered. For each k, if the constraint on Sk can not be set, we may remove the constraint on s.sub.k in equation (4). However, in many cases, we may design schemes such that all the parameters s.sub.k, 1.ltoreq.k<q can be determined by the previously recovered results. Then, the branch metric M.sub.v(t) which is needed to decode trellis code T using the trellis of C can be easily calculated by summing the bit metrics of M.sub.v.sbsb.1.sub.(t), . . . , M.sub.v.sbsb.m.sub.(t).
With a proper design of the transfer function matrix, the free distance of T can be very large while the constraint length of C remains small. In the following, a design of the transfer function matrix for the trellis code T with an m-level form is given.
Let l.sub.1 =.zeta..sub.1 =0 and let l.sub.2, l.sub.3, . . . , l.sub.m,.zeta..sub.2,.zeta..sub.3, . . . , be nonnegative constants. Let r.sub.p =.SIGMA..sub.i=p+1.sup.m (l.sub.i +.zeta..sub.i) for p=1,2, . . . , m-1 and r.sub.m =0. Set ##EQU7##
During the t-th time unit of encoding, the output of the convolutional processor is s(t)=(s.sub.1 (t), s.sub.2 (t), . . . , s.sub.m (t)), where ##EQU8##
Consider the following example. Let m=3 and v=(. . . , (000), (000), (000), . . . ) and v'=(. . . , (000), v'(t)=(100), v'(t+1)=(110), v'(t+2)=(111), (000), . . . ). Let g.sup.(1,1) (X)=X.sup.4.lambda., g(.sup.2,1)(X)=X.sup.3.lambda., g.sup.(2,2) (X)=X.sup..lambda., g.sup.(3,3) (X) =1 and g.sup.(p,q) (X)=0 otherwise. Setting .lambda.=3, the sequences v and v' are converted into sequences s and s', which are respectively given by ##EQU9##
Then, using the 8PSK signal constellation, ##EQU10## for i=10,11,12,13,14. Thus, .DELTA.(.omega.,.omega.')=D.sup.2 (.omega.,.omega.')=0.586.times.5+2.times.2+4.times.1=10.93.
The free distance of T, denoted by .DELTA..sub.free, is the smallest one of all the possible distances, each of which is measured between any pair of two distinct symbol sequences .omega. and .omega.' of T, i.e., ##EQU11## Note that if the signal space is a signal constellation then .DELTA..sub.free =D.sub.free.sup.2 is the squared free distance of T which is the smallest one of all the possible squared distances, each of which is measured between any pair of distinct symbol sequences of T. If the signal space is a collection of binary m-tuples then .DELTA..sub.free =d.sub.free is the free distance of T which is the smallest one of all the possible Hamming distances each of which is measured between binary representations of any pair of distinct symbol sequences of T.
For 2.ltoreq.p.ltoreq.m, let l.sub.p >.left brkt-bot..DELTA..sub.p /.DELTA..sub.p-1 .right brkt-bot.. Moreover, let .zeta..sub.p .gtoreq..zeta..sub.p-1 +l.sub.p if l.sub.p >0 and .zeta..sub.p =0 if l.sub.p =0. If the convolutional code C is not catastrophic, by taking .lambda. to be a large enough number, it can be shown that the free distance of the trellis code T is ##EQU12##
Consider the following embodiment which is an 8PSK TCM using a 4-state binary convolutional code C. The encoder and the state diagram of code C are given in FIG. 6 and FIG. 7 respectively. The transfer function matrix of the convolutional processor is G with g.sup.(1,1) (X)=X.sup.4.lambda., g.sup.(2,1) (X)=X.sup.3.lambda., g.sup.(2,2) (X)=X.sup..lambda., g.sup.(3,3) (X)=1 and g.sup.(p,q) (X)=0 otherwise. It can be checked that the path with the smallest free distance from the all zero path is the nonzero self-loop around the state S.sub.00 as shown in FIG. 7. The squared free distance of the TCM is then .DELTA..sub.free =D.sub.free.sup.2 =0.586+2+2+4=7.17. The decoding for this TCM needs to use the trellis for the binary convolutional code C. The relation between s(t) and v(t) is shown in FIG. 8. At the (t+4.lambda.)-th time unit of decoding, y(t+4.lambda.), y(t+4.lambda.-1), and y(t+4.lambda.-2), . . . are already received. We assume that v(t-i) has already been correctly recovered for i.gtoreq..lambda.. The decoding consists of the following steps.
Step 1 : We calculate the metric M.sub.v.sbsb.3.sub.(t) for each v.sub.3 (t).epsilon.{0,1} by min{.DELTA.(y(t),.omega.(s)):s.sub.1 =v.sub.1 (t-4.lambda.)+v.sub.2 (t-3.lambda.),s.sub.2 =v.sub.2 (t-.lambda.), s.sub.3 =v.sub.3 (t)}.
Step 2 : We calculate the metric M.sub.v.sbsb.2.sub.(t) for each v.sub.2 (t).epsilon.{0,1} by min{.DELTA.(y(t+.lambda.),.omega.(s)) : s.sub.1 =v.sub.1 (t-3.lambda.)+v.sub.2 (t-2.lambda.),s.sub.2 =v.sub.2 (t),s.sub.3 .epsilon.{0,1}}+min{.DELTA.(z(t+3.lambda.),.omega.(s)) : s.sub.1 =v.sub.1 (t-.lambda.)+v.sub.2 (t),s.sub.2 .epsilon.{0,1},s.sub.3 .epsilon.{0,1}}
Step 3 : We calculate the metric M.sub.v.sbsb.1.sub.(t) for each v.sub.1 (t).epsilon.{0,1} by min{.DELTA.(z(t+4.lambda.),.omega.(s)) : s.sub.1 =v.sub.1 (t)+v.sub.2 (t+.lambda.),s.sub.2 .epsilon.{0,1},s.sub.3 .epsilon.{0,1}},
where v.sub.2 (t+.lambda.) is estimated to be equal to s.sub.2 which minimizes .alpha.(z(t+2.lambda.),.omega.(s)) with s.sub.1 =v.sub.1 (t-2.lambda.)+v.sub.2 (t-.lambda.).
Step 4: By summing M.sub.v.sbsb.1.sub.(t), M.sub.v.sbsb.2.sub.(t) and M.sub.v.sbsb.3.sub.(t), we have the branch metric M.sub.v(t). Then, we use the 4-state decoding trellis of the convolutional code C with a decoding truncation length of .lambda. to recover v(t-.lambda.+1). The decoding procedure is then back to step 1.
Simulation results for the embodiment using the above decoding method are given in FIG. 9, where .lambda.=30. We see that a coding gain of about 3.5 dB over the uncoded QPSK is achieved at bit error rate of 10.sup.-6.
Finally, the binary convolutional code C used in encoding and decoding T can be replaced by the more general binary trellis code, or the encoder of the trellis code C can be replaced by encoders of a plurality of trellis codes which together convert u(t) into v(t), and which is then processed by the convolutional processor P and the signal mapper S; the Viterbi algorithm for C used in the processor P.sup.(1) being replaced by a plurality of Viterbi algorithms for the plurality of trellis codes.
As an alternative to summing bit metrics M.sub.v.sbsb.1.sub.(t), . . . , M.sub.v.sbsb.m.sbsb.(t) to calculate M.sub.v(t) in the situation where symbol v(t) is a binary m-tuple which can be expressed by v(t) =(v.sub.1 (t), . . . , v.sub.m (t)), the branch metric M.sub.v(t) may also be calculated by summing metrics M.sub.x.sbsb.1.sub.(t), . . . , M.sub.x.sbsb.L.sub.(t), 1<L<m, where M.sub.x.sbsb.j.sub.(t), 1.ltoreq.j.ltoreq.L, is calculated based on y(t+i.lambda.), and i is determined by a corresponding transfer function matrix.
In addition, it will be appreciated that the information symbol u(f) can be replaced by l information symbols, i.e., u(t), u(t+1/l)), . . . , u(t+(l-1)/l); the output branch symbol of C, v(t) can be replaced by l output branch symbols of C, i.e., v(t), v(t+(1/l)), . . . , v(t+(l-1)/.lambda.; the output symbol of P, s(t) can be replaced by l' output branch symbols of P, i.e., s(t), s(t+1/l'), . . . , u(t+(l'-1)/l')); and the output symbol of S, .omega.(s(t+(l'-1)/l')) can be replaced by l' output branch symbols of P, i.e., .omega.(s(t)), .omega.(s(t+1/l')), . . . , (s(t+(l'-1)/l')), where l and l' are positive integers.
Claims
  • 1. A decoding method for a trellis code T for which the encoding can be implemented by feeding an information sequence u={. . . , u(t-1), u(t), . . . } into an encoder of a convolutional code C followed by a convolutional processor P and a signal mapper S for generating output sequences v={. . . , v(t-1), v(t), . . . }, s={. . . ,s(t-1),s(t), . . . }, and .omega.={. . . , .omega.(s(t-1)), .omega.(s(t)), . . . } respectively, wherein u(t) is an information symbol to be encoded during a t-th time unit, v(t) is an associated output branch symbol of the encoder of C, s(t) is an associated output symbol of P, and .omega.(s(t)) is an associated output symbol of S which represents a signal point of a signal space .OMEGA., and wherein the convolutional processor P is characterized by a transfer function matrix G=�G.sup.(p,q) (X)! with G.sup.(p,q) (X).noteq.0 for some p.noteq.q, comprising the decoding steps of:
  • (a) Determining, in a processor P.sup.(2), a branch metric M.sub.v(t) for each of the possible v(t) based on the received sequence y={. . . , y(t-1), y(t), . . . , }, the transfer function matrix G, and the previously recovered symbols v(t-1), i.gtoreq..lambda., wherein .lambda. is a positive constant and y(t) is a possibly noise-corrupted form of .omega.(s(t));
  • (b) Applying, in a processor P.sup.(1), the Viterbi algorithm to the trellis of C to recover u(t-.lambda.+1) and v(t-.lambda.+1) based on a metric sequence {. . . , T.sub.M(t-1), T.sub.M(t) }, wherein T.sub.M(t) is a set consisting of M.sub.v(t) for all the possible v(t).
  • 2. A decoding method as in claim 1, wherein said convolutional code C is replaced by a trellis code also denoted by C.
  • 3. A decoding method as in claim 2, wherein said encoder of the trellis code C is replaced by encoders of a plurality of trellis codes which together convert u(t) into v(t) , which is then processed by the convolutional processor P and the signal mapper S; and said Viterbi algorithm for C used in the processor p.sup.(1) is replaced by a plurality of Viterbi algorithms for said plurality of trellis codes.
  • 4. A decoding method as in claims 2 or 3, wherein said transfer function matrix is G=�g.sup.(p,q) (X)!, p,q.epsilon.{1, 2, . . . , m} such that ##EQU13## wherein .alpha..sub.i.sup.(p,q) .epsilon.{0,1}, r.sub.p and n.sub.p are nonnegative constants, and r.sub.1 +n.sub.1 .gtoreq.r.sub.2 +n.sub.2 .gtoreq.. . . .gtoreq.r.sub.m +n.sub.m.
  • 5. A decoding method as in claims 2 or 3, wherein said symbol v(t) is a binary m-tuple which can be expressed by v(t)=(v.sub.1 (t), . . . , v.sub.m (t)), and said branch metric M.sub.v(t) is calculated by summing bit metrics M.sub.v.sbsb.1.sub.(t), . . . , M.sub.v.sbsb.m.sub.(t) up, in which M.sub.v.sbsb.j.sub.(t), 1.ltoreq.j.ltoreq.m, is calculated based on y(t+i.lambda.) with i determined by said transfer function matrix.
  • 6. A decoding method as in claim 2 or 3, wherein said symbol v(t) is a binary m-tuple, which is expressed by v(t)=(v.sub.1 (t), . . . , v.sub.m (t)) �=(x.sub.1 (t), . . . , x.sub.L (t)), 1<L<m!, and said branch metric M.sub.v(t) is calculated by summing metrics M.sub.x.sbsb.1.sub.(t), . . . , M.sub.x.sbsb.L.sub.(t), 1<L<m, with M.sub.x.sbsb.j.sub.(t), 1.ltoreq.j.ltoreq.L, being calculated based on y(t+i.lambda.) and i being determined by said transfer function matrix.
  • 7. A decoding method as in claims 2 or 3, wherein the signal space .OMEGA. is a signal constellation and said trellis code T is be a trellis coded modulation.
  • 8. A decoding method as in claims 2 or 3, wherein the signal space .OMEGA. is a collection of binary m-tuples and said trellis code T is a binary trellis code.
  • 9. A decoding method as in claims 1 or 2, wherein said information symbol u(t) is replaced by l information symbols, i.e., v(t), u(t+(1/l)), . . . , u(t+(l-1)/l); and said output branch symbol of C, v(t), is replaced by l output branch symbols of C, i.e., v(t), v(t+1/l), . . . , v(t+(l-1)/l); and said output symbol of P, s(t), is replaced by l' output symbols of P, i.e., s(t), s(t+1/l'), . . . , s(t+(l-1)/l); and said output symbol of S, .omega.(s(t)), is replaced by l' output symbols of S, i.e., .omega.(s(t)), .omega.(s(t+1/l')), . . . , .omega.(s(t+(l'-1)/l')), where l and l' are positive integers.
US Referenced Citations (6)
Number Name Date Kind
4888775 Karabed et al. Dec 1989
5181208 Hagenauer et al. Jan 1993
5406570 Berrou et al. Apr 1995
5414738 Bienz May 1995
5581568 Togami Dec 1996
5619167 Adachi Apr 1997
Non-Patent Literature Citations (1)
Entry
Dimakis, C.E., Kouris, S.S. and Avramis, S.K., "Performance Evaluation of Concatenated Coding Schemes on Multilevel QAM Signalling in Non-Gaussian Products Environment," IEE Proceedings, Part I: Communications, Speech and Vision, vol. 140, No. 4, pp. 269, Aug. 1993.