Irregularly structured, low density parity check codes

Information

  • Patent Grant
  • 7458010
  • Patent Number
    7,458,010
  • Date Filed
    Friday, July 1, 2005
    19 years ago
  • Date Issued
    Tuesday, November 25, 2008
    15 years ago
Abstract
An error correction codeword. In one embodiment, an irregularly structured LDPC code ensemble possessing strong overall error performance and attractive storage requirements for a large set of codeword lengths. Embodiments of the invention can offer communication systems with better performance and lower terminal costs due to possible reductions in mandatory non-volatile memory over conventional systems.
Description
FIELD OF THE INVENTION

The present invention relates generally to correction codes in communication systems. More particularly, the present invention relates to the use of correction codes for reliably conveying information through channels having random events.


BACKGROUND OF THE INVENTION

Modern communication systems use Forward Error Correction (FEC) codes in an attempt to convey information more reliably through channels with random events. One such FEC error control system uses low density parity check (LDPC) codes. LDPC codes can have error correcting capabilities that rival the performance of “Turbo-Codes” and can be applicable over a wide range of statistical channels. In fact, some random irregular LDPC constructions based upon edge ensemble designs have error correcting capabilities measured in Bit Error Rate (BER) that are within 0.05 dB of the rate-distorted Shannon limit. Unfortunately, these LPDC code constructions often require long codeword constructions (on the order of 106 to 107 bits) in order to achieve these error rates. Despite good BER performance, these random code constructions often have poor Block Error Rate (BLER) performances. Therefore, these random constructions typically do not lend themselves well to packet-based communication systems.


Another disadvantage of random constructions based on edge distribution ensembles is that, for each codeword length, a separate random construction is needed. Thus, communication systems employing variable block sizes (e.g. TCP/IP systems) require multiple code definitions. Such multiple code definitions can consume a significant amount of non-volatile memory for large combinations of codeword lengths and code rates.


As an alternative to random LDPC constructions, structured LDPC constructions typically rely on a general algorithmic approach to constructing LDPC matrices which often requires much less non-volatile memory than random constructions. One such structured approach is based upon array codes. This approach can exhibit improved error performance (both BER and BLER performance) and a relatively low error floor for relatively high code rates (higher than 0.85). However, for code rates below 0.85, these code constructions have relatively poor performance with respect to irregular random constructions designed for lower code rates. One reason for this poor performance can be that their constructions are typically based on code ensembles that have poor asymptotic performances despite being an irregular construction.


One challenge therefore is to design irregular structured LDPC codes that have good overall error performance for a wide range of code rates with attractive storage requirements. Such resulting LDPC codes would provide a better performing communication system with lower cost terminals. These factors can make such FEC attractive for applications over a wide range of products, including but not limited to, wireless LAN systems, next generation cellular systems, and ultra wide band systems.


SUMMARY OF THE INVENTION

Embodiments of the present invention provides for an irregularly structured LDPC code ensemble that has strong overall error performance and attractive storage requirements for a large set of codeword lengths. Embodiments of the invention offer communication systems with better performance and lower terminal costs due to the reduction in mandatory non-volatile memory over conventional systems.


In contrast to conventional approaches, embodiments of the invention provide a structured approach to construction, offering reduced storage requirements and a simple construction. When used with seed matrices with good asymptotic performances and good girth properties, the irregularly structured LDPC codes used in embodiments of the present invention offer an improved overall level of error performance. Embodiments of the invention also offer a parity-check matrix that is lower in density than conventional array codes because there are fewer non-zero sub-matrices (i.e. there are more sub-matrices consisting of the all zeros matrix).


These and other objects, advantages and features of the invention, together with the organization and manner of operation thereof, will become apparent from the following detailed description when taken in conjunction with the accompanying drawings, wherein like elements have like numerals throughout the several drawings described below.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 is an overview diagram of a system within which embodiments of the invention may be implemented;



FIG. 2 is a perspective view of a mobile telephone that can be used in the implementation of one embodiment the present invention;



FIG. 3 is a schematic representation of the telephone circuitry of the mobile telephone of FIG. 2;



FIG. 4 is a flow chart showing the implementation of one embodiment of the present invention;



FIG. 5 is an example of a code rate 1/2 irregular parity-check matrix according to one embodiment of the present invention;



FIG. 6 is an example of a code rate 2/3 irregular parity-check matrix according to one embodiment of the present invention; and



FIG. 7 is an example of a code rate 3/4 irregular parity-check matrix according to one embodiment of the present invention.





DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

Various exemplary embodiments of the invention are described below with reference to the drawing figures. One embodiment of the invention can be described in the general context of method steps, which may be implemented in one embodiment by a program product including computer-executable instructions, such as program code, executed by computers in networked environments. Embodiments of the invention may be implemented in either hardware or software, and can be placed both within a transmitter and/or a receiver.



FIG. 1 shows a system 10 illustrating one embodiment of the invention, comprising multiple communication devices that can communicate through a network. The system 10 may comprise any combination of wired or wireless networks including, but not limited to, a mobile telephone network, a wireless Local Area Network (LAN), a Bluetooth personal area network, an Ethernet LAN, a token ring LAN, a wide area network, the Internet, etc. The system 10 may include both wired and wireless communication devices.


For exemplification, the system 10 shown in FIG. 1 can include a mobile telephone network 11 and the Internet 28. Connectivity to the Internet 28 may include, but is not limited to, long range wireless connections, short range wireless connections, and various wired connections including, but not limited to, telephone lines, cable lines, power lines, and the like.


Exemplary communication devices of the system 10 may include, but are not limited to, a mobile telephone 12, a combination PDA and mobile telephone 14, a PDA 16, an integrated messaging device (IND) 18, a desktop computer 20, and a notebook computer 22. The communication devices may be stationary or mobile as when carried by an individual who is moving. The communication devices may also be located in a mode of transportation including, but not limited to, an automobile, a truck, a taxi, a bus, a boat, an airplane, a bicycle, a motorcycle, etc. Some or all of the communication devices may send and receive calls and messages and communicate with service providers through a wireless connection 25 to a base station 24. The base station 24 may be connected to a network server 26 that allows communication between the mobile telephone network 11 and the Internet 28. The system 10 may include additional communication devices and communication devices of different types. A communication device may communicate using various media including, but not limited to, radio, infrared, laser, cable connection, and the like. One such portable electronic device incorporating a wide variety of features is shown in FIG. 4. This particular embodiment may serves as both a video gaming device and a portable telephone.


The communication devices may communicate using various transmission technologies including, but not limited to, Code Division Multiple Access (CDMA), Global System for Mobile Communications (GSM), Universal Mobile Telecommunications System (UMTS), Time Division Multiple Access (TDMA), Frequency Division Multiple Access (FDMA), Transmission Control Protocol/Internet Protocol (TCP/IP), Short Messaging Service (SMS), Multimedia Messaging Service (MMS), e-mail, Instant Messaging Service (IMS), Bluetooth, IEEE 802.11, etc.



FIGS. 2 and 3 show one representative mobile telephone 12 within which one embodiment of the present invention may be implemented. It should be understood, however, that the present invention is not intended to be limited to one particular type of mobile telephone 12 or other electronic device. The mobile telephone 12 of FIGS. 2 and 3 comprises a housing 30, a display 32 in the form of a liquid crystal display, a keypad 34, a microphone 36, an ear-piece 38, a battery 40, an infrared port 42, an antenna 44, a smart card 46 in the form of a universal integrated circuit card (UICC) according to one embodiment of the invention, a card reader 48, radio interface circuitry 52, codec circuitry 54, a controller 56 and a memory 58.


Generally, program modules can include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. Computer-executable instructions, associated data structures, and program modules represent examples of program code for executing steps of the methods disclosed herein. The particular sequence of such executable instructions or associated data structures represents examples of corresponding acts for implementing the functions described in such steps.


Software and web implementations of the present invention could be accomplished with standard programming techniques with rule-based logic and other logic to accomplish the various database searching steps, correlation steps, comparison steps and decision steps. It should also be noted that the words “component” and “module” as used herein, and in the claims, are intended to encompass implementations using one or more lines of software code, and/or hardware implementations, and/or equipment for receiving manual inputs.


By taking into account the density evolution of messages passed in belief propagation decoding, random constructions of irregular LDPC codes can be developed that approach Shannon limits for an assortment of channels (e.g. Additive White Gaussian Noise (AWGN), Binary Erasure Channel (BEC), Binary Symmetric Channel (BSC)). These are typically described as ensembles with variable and check edge polynomials







λ


(
x
)


=




i
=
2


d
l





λ
i



x

i
-
1









and








ρ


(
x
)


=




j
=
2


d
r





ρ
j



x

j
-
1





,





respectively, where λi and ρj are the fraction of total edges connected to variable and check nodes of degree i=2,3, . . . , dl and j=2,3, . . . , dl respectively. These random constructions sometimes require the relatively long codeword lengths to approach the capacity limit and do not always provide the strong BLER performance required by packet-based communication systems. In actual communication terminals, these random constructions can require storage of the entire parity-check matrix, and for systems employing variable packet-length, the storage of multiple random constructions is both necessary and costly.


Alternatively, structured approaches to LDPC code designs that allow for reduced storage requirements and simple code description may be used. One such example is the LDPC code construction based upon array constructions. For code rates 0.85 and above, these code constructions can have acceptable performance with good error floors and BLERs. However, with respect to random constructions, these constructions sometimes suffer at lower code rates because they have edge distributions that result in relatively poor asymptotic performance and thus poor performance in general.


It is desirable thus, to provide irregularly structured LDPC codes that have good overall error performance for a wide range of code rates with attractive storage requirements that make communication terminals cost effective. The result of such LDPC codes can do a better performing communication system with lower cost terminals. These factors can make such a FEC attractive for applications over a wide range of products including but not limited to wireless LAN, next generation cellular systems, and ultra wide band systems.


As discussed herein, an irregular “seed” parity-check matrix can be used as the “seed” for irregular structured LDPC code some embodiments according to the present invention. One embodiment invention involves the construction of an irregular “seed” low-density parity check-matrix HSEED of dimension ((NSEED−KSEED)×NSEED) derived from an edge distribution, λSEED (x) and ρSEED (x), with good asymptotic performance and good girth properties. In one embodiment, good asymptotic performance may be characterized by a good threshold value using belief propagation decoding and good girth may be characterized by having very few if no variable nodes with a girth of 4. This can be accomplished manually or via a software program once given the code ensemble and/or node degrees.


Although there are no limits on the maximum values of KSEED and NSEED, which represent the number of information bits and the resulting codeword length, respectively in one embodiment, for the code defined by HSEED, these values can be relatively small in comparison to the target message-word and codeword length. This can allow for more potential integer multiples of NSEED within the target range of codeword lengths, reduced storage requirements, and simplified code descriptions. In one embodiment of the invention, the smallest possible value for HSEED can be used with edge distributions defined by λSEED (x) and ρSEED (x), while still maintaining good girth properties.


One function of the seed matrix can be to identify the location and type of sub-matrices in the expanded LDPC parity-check matrix H constructed from HSEED and a given set of permutation matrices. The permutation matrices in HSEED can determine the location of sub-matrices in the expanded matrix H that contain a permutation matrix of dimension (NSPREAD×NSPREAD) from the given set. One selection within the given set of permutation matrices is defined below. As an example only, the given set of permutation matrices used herein can be finite and consist of the set

{PSPREAD, PSPREAD0, PSPREAD1, PSPREAD2, . . . , PSPREADp-1}


where p is a positive integer (a prime number in a preferred embodiment of the invention), PSPREAD0=I is the identity matrix, PSPREAD1 is a full-rank permutation matrix, PSPREAD2=PSPREAD1PSPREAD1, etc. up to PSPREADp−1. One example embodiment of PSPREAD1 is a single circular shift mutation matrix







P
SPREAD
1

=



[



0


1


0


0


0




0


0


1


0


0




0


0


0


1


0




0


0


0


0


1




1


0


0


0


0



]






for






N
SPREAD


=
5





Another example embodiment of PSPREAD1 is an alternate single circular shift permutation matrix







P
SPREAD
1

=



[



0


0


0


0


1




1


0


0


0


0




0


1


0


0


0




0


0


1


0


0




0


0


0


1


0



]






for






N
SPREAD


=
5.





For notational sake, PSPREAD denotes the all zeros matrix 0 of dimension (NSPREAD×NSPREAD) (i.e. PSPREAD=0 where every element is a zero), and the zeros in HSEED indicate the location of the sub-matrix PSPREAD=0 in the expanded matrix H. Thus, the expanded LDPC matrix H can be of dimension (NSPREAD(NSEED−KSEED)×NSPREADNSEED) with sub-matrices consisting of permutation matrices of dimension (NSPREAD×NSPREAD) raised to an exponential power from the set of {0,1, . . . , p−1, ∞}.


Furthermore, the expanded LDPC code can have the same edge distribution as HSEED and hence can achieve the desired asymptotic performance described by λSEED (x) and ρSEED (x), provided both HSEED and the expanded matrix H have satisfactory girth properties.


The following description concerns one embodiment of the invention that constructs a structured array exponent matrix that may be described as








E
ARRAY

=

[




E

1
,
1





E

1
,
2








E

1
,
p







E

2
,
1





E

2
,
2








E

2
,
p





















E

p
,
1





E

p
,
2








E

p
,
p





]


,


where






E

i
,
j



=


(

i
-
1

)



(

j
-
1

)






mod





p






using modulo arithmetic (but not limited to) of a number p. In one embodiment of the invention, p can be a prime number, but this is not necessary for the principles of the present invention. p can be at least the column dimension of the irregular “seed” parity check matrix and the column dimension of the spreading permutation matrix. In one embodiment, NSEED≦p and NSPREAD≦p. However, other values are also possible.


Other embodiments of the present invention can use transformed versions of EARRAY. In particular, one such transformation involves the shifting of rows to construct an upper triangular matrix while replacing vacated element locations with ∞, i.e.







E
SHIFT

=


[




E

1
,
1





E

1
,
2





E

1
,
3








E

1
,
p










E

2
,
1





E

2
,
2








E

2
,

p
-
1














E

3
,
1








E

3
,

p
-
2





































E

p
,
1





]

.





Another embodiment of the present invention transforms EARRAY by the truncation of columns and/or rows to select a sub-matrix of EARRAY for implementation with a specified HSEED. Still another embodiment of the invention uses the combination of both shifting and truncation. For example, given NSEED+1≦p and NSPREAD≦p (with p being a prime number in a particular embodiment of the invention)







E

TRUNCATE





1


=

[




E

1
,
2





E

1
,
3





E

1
,
4








E

1
,

(


N
SEED

-

K
SEED


)









E

1
,

(


N
SEED

+
1

)








E

2
,
1





E

2
,
2





E

2
,
3








E

2
,

(


N
SEED

-

K
SEED

-
1

)









E

2
,

N
SEED











E

3
,
1





E

3
,
2








E

3
,

(


N
SEED

-

K
SEED

-
2

)









E

3
,

(


N
SEED

-
1

)











































E


(


N
SEED

-

K
SEED


)

,
1








E


(


N
SEED

-

K
SEED


)

,

(


K
SEED

+
2

)






]





For NSEED+2≦p and NSPREAD≦p (with p being a prime number in a particular embodiment of the invention)







E

TRUNCATE





2


=


[




E

2
,
2





E

2
,
3





E

2
,
4








E

2
,

(


N
SEED

-

K
SEED


)









E

2
,

(


N
SEED

+
1

)








E

3
,
1





E

3
,
2





E

3
,
3








E

3
,

(


N
SEED

-

K
SEED

-
1

)









E

3
,

N
SEED











E

4
,
1





E

4
,
2








E

4
,

(


N
SEED

-

K
SEED

-
2

)









E

4
,

(


N
SEED

-
1

)











































E


(


N
SEED

-

K
SEED

+
1

)

,
1








E


(


N
SEED

-

K
SEED

+
1

)

,

(


K
SEED

+
2

)






]

.





Many shift and truncate embodiments can be used with the present invention, as well as column and row permutation transformations performed either prior to or after other individual transformations in a nested fashion. More generally, the transformation of the EARRAY matrix can be described using the functional notation T(EARRAY) that represents a transformed exponent matrix of dimension ((NSEED−KSEED)×NSEED). Yet another embodiment of this family of transformations may include an identity transformation. For example, in another embodiment of the invention, T(EARRAY)=EARRAY.


In one embodiment of the present invention HSEED and T(EARRAY) can be used to construct the final exponent matrix in order to expand the seed matrix into H. The final exponent matrix may be defined as







F
FINAL

=

[




F

1
,
1





F

1
,
2








F

1
,

N
SEED








F

2
,
1





F

2
,
2








F

2
,

N
SEED






















F


(


N
SEED

-

K
SEED


)

,
1





F


(


N
SEED

-

K
SEED


)

,
2








F


(


N
SEED

-

K
SEED


)

,

N
SEED






]





of dimension ((NSEED−KSEED)×NSEED) by replacing each one in HSEED with the corresponding matrix element (i.e. the same row and column) in the transformed structured array exponent matrix T(EARRAY) and each zero in HSEED with ∞. Thus, the elements of FFINAL can belong to the set {0,1, . . . , p−1, ∞} if modulo arithmetic is used in the construction of EARRAY.


The following is a discussion of one embodiment of the expansion of HSEED using FFINAL to construct a final LDPC parity-check matrix H that describes the LDPC code. The matrix HSEED of dimension ((NSEED−KSEED)×NSEED) can be spread or expanded using the elements of the permutation matrix set

{PSPREAD, PSPREAD0, PSPREAD1, PSPREAD2, . . . , PSPREADp-1}


with elements of dimension (NSPREAD×NSPREAD), where PSPREAD=0 is the all zeros matrix, PSPREAD0=I is the identity matrix, PSPREAD1 is a permutation matrix, PSPREAD2=PSPREAD1PSPREAD1, PSPREAD3=PSPREAD1PSPREAD1PSPREAD1, etc.(but not limited to) to construct






H
=

[




P
SPREAD

F

1
,
1






P
SPREAD

F

1
,
2









P
SPREAD

F

1
,

N
SEED









P
SPREAD

F

2
,
1






P
SPREAD

F

2
,
2









P
SPREAD

F

2
,

N
SEED























P
SPREAD

F


(


N
SEED

-

K
SEED


)

,
1






P
SPREAD

F


(


N
SEED

-

K
SEED


)

,
2









P
SPREAD

F


(


N
SEED

-

K
SEED


)

,

N
SEED







]





of dimension (NSPREAD(NSEED−KSEED)×NSPREADNSEED). Thus, this embodiment of the present invention can be used to describe an expanded LDPC code with sub-matrices of dimension (NSPREAD×NSPREAD) in the (i,j)th sub-matrix location consisting of the permutation matrix PSPREAD raised to the Fi,j power (i.e. PSPREADFi,j).


The following is one particular example of the implementation of one embodiment of the present invention. In this example,








H
SEED

=

[



1


0


0


1


0


0




1


1


0


1


1


0




0


1


1


0


0


1




0


0


1


0


1


1



]


,


thus






N
SEED


=
6

,




while








P
SPREAD
1

=

[



0


0


1




1


0


0




0


1


0



]


,


thus






N
SPREAD


=
3

,




Therefore, p=11 is the smallest prime number that satisfies the example conditions NSEED+2 ≦p and NSPREAD≦p. The interim and final exponent matrices as defined above can be:










E

TRUNCATE





2


=


[



1


2


3


4


5


6




0


2


4


6


8


10







0


3


6


9


1










0


4


8


1



]






and








F
=

[



1








4










0


2





6


8










0


3








1










0





8


1



]


,







and the corresponding expanded LDPC matrix can be:






H
=


[



0


0


1


0


0


0


0


0


0


0


0


1


0


0


0


0


0


0




1


0


0


0


0


0


0


0


0


1


0


0


0


0


0


0


0


0




0


1


0


0


0


0


0


0


0


0


1


0


0


0


0


0


0


0




1


0


0


0


1


0


0


0


0


1


0


0


0


1


0


0


0


0




0


1


0


0


0


1


0


0


0


0


1


0


0


0


1


0


0


0




0


0


1


1


0


0


0


0


0


0


0


1


1


0


0


0


0


0




0


0


0


1


0


0


1


0


0


0


0


0


0


0


0


0


0


1




0


0


0


0


1


0


0


1


0


0


0


0


0


0


0


1


0


0




0


0


0


0


0


1


0


0


1


0


0


0


0


0


0


0


1


0




0


0


0


0


0


0


1


0


0


0


0


0


0


1


0


0


0


1




0


0


0


0


0


0


0


1


0


0


0


0


0


0


1


1


0


0




0


0


0


0


0


0


0


0


1


0


0


0


1


0


0


0


1


0



]

.





One embodiment of a method for constructing irregularly structured LDPC codes according to the present invention is depicted in FIG. 4. At step 100, an irregular “seed” parity check matrix HSEED of dimension ((NSEED−KSEED)×NSEED) can be constructed, being derived from an edge ensemble, λSEED(x) and ρSEED(x), with good asymptotic performance. In one embodiment, good asymptotic performance can be characterized by good threshold value using belief propagation decoding and good girth properties such as by having very few if no variable nodes with girth of 4. At step 110, a structured array exponent matrix can be constructed, as shown below:







E
ARRAY

=



[




E

1
,
1





E

1
,
2








E

1
,
p







E

2
,
1





E

2
,
2








E

2
,
p





















E

p
,
1





E

p
,
2








E

p
,
p





]






where






E

i
,
j



=


(

i
-
1

)



(

j
-
1

)






mod





p






This matrix can be constructed using modulo arithmetic of a number p that can be at least the column dimension of the irregular “seed” parity check matrix and the column dimension of the spreading permutation matrix. In other words, NSEED≦p and NSPREAD≦p.


At step 120, the structured array exponent matrix can be transformed using a transform T(EARRAY) that may perform shifts, truncations, permutations, etc. operations to construct an exponent matrix of dimension ((NSEED−KSEED)×NSEED) from EARRAY. At step 130, a final exponential matrix can be constructed,







F
FINAL

=

[




F

1
,
1





F

1
,
2








F

1
,

N
SEED








F

2
,
1





F

2
,
2








F

2
,

N
SEED






















F


(


N
SEED

-

K
SEED


)

,
1





F


(


N
SEED

-

K
SEED


)

,
2








F


(


N
SEED

-

K
SEED


)

,

N
SEED






]





of dimension ((NSEED−KSEED)×NSEED) by replacing each one in HSEED with the corresponding element in the transformed structured array exponent matrix T(EARRAY) and each zero in HSEED with ∞. Thus, the elements of FFINAL belong to the set {0,1, . . . , p−1, ∞}.


At step 140, the expanded parity check matrix can be constructed,






H
=

[




P
SPREAD

F

1
,
1






P
SPREAD

F

1
,
2









P
SPREAD

F

1
,

N
SEED









P
SPREAD

F

2
,
1






P
SPREAD

F

2
,
2









P
SPREAD

F

2
,

N
SEED























P
SPREAD

F


(


N
SEED

-

K
SEED


)

,
1






P
SPREAD

F


(


N
SEED

-

K
SEED


)

,
2









P
SPREAD

F


(


N
SEED

-

K
SEED


)

,

N
SEED







]





of dimension (NSPREAD(NSEED−KSEED)×NSPREADNSEED) that describes the expanded LDPC code with sub-matrices of dimension (NSPREAD×NSPREAD) in the (i,j)th sub-matrix location consisting of the permutation matrix PSPREAD raised to the Fi,j power, i.e. PSPREADFi,j, where Fi,j is the matrix element in the (i,j)th location of FFINAL.



FIG. 5 is an example of one embodiment of a rate 1/2 irregular parity-check matrix. FIG. 6 is an example of one embodiment of a rate 2/3 irregular parity-check matrix. FIG. 7 is an example of one embodiment of a rate 3/4 irregular parity-check matrix.


The foregoing description of embodiments of the present invention have been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the present invention to the precise form disclosed, and modifications and variations are possible in light of the above teachings or may be acquired from practice of the present invention. The embodiments were chosen and described in order to explain the principles of the present invention and its practical application to enable one skilled in the art to utilize the present invention in various embodiments and with various modifications as are suited to the particular use contemplated.

Claims
  • 1. A method of generating an error correction codeword, the method comprising: constructing an irregular seed parity check matrix derived from an edge ensemble, the seed parity check matrix having a column dimension and a row dimension; constructing a structured array exponent matrix using modulo arithmetic of a number equal to or greater than the seed parity check matrix column dimension;constructing a final exponential matrix by replacing each one in the seed parity check matrix with the corresponding element from the structured array exponent matrix and each zero in the seed parity check matrix with infinity;expanding the final exponential matrix to form a parity check matrix corresponding to the error correction code; andgenerating an error correction codeword in accordance with the parity check matrix.
  • 2. The method of claim 1 further comprising transforming the structured array exponent matrix prior to constructing the final exponential matrix.
  • 3. The method of claim 2, wherein transforming the structured array exponent matrix comprises performing shift, truncation, and/or permutation operations on the structured array exponent matrix.
  • 4. The method of claim 1 further comprising constructing a set of permutation matrices, wherein the permutation matrices are used to expand the final exponential matrix.
  • 5. The method of claim 4 wherein the set of permutation matrices comprises {PSPREAD∞, PSPREAD0, PSPREAD1, PSPREAD2, . . . , PSPREADp−1} and each permutation matrix in the set of permutation matrices comprises a matrix of dimension (NSPREAD×NSPREAD) where NSPREAD comprises a column dimension of each permutation matrix, p is a positive integer, PSPREAD∞=0 is the all zeros matrix, PSPREAD0=I is the identity matrix, PSPREAD1 is a permutation matrix, PSPREAD1=PSPREAD1, PSPREAD3=PSPREAD1PSPREAD1PSPREAD1, etc.
  • 6. The method of claim 5, wherein the error correction codeword includes a number of information bits and a length and wherein the seed parity check matrix comprises HSEED of dimension ((NSEED−KSEED)×NSEED), wherein KSEED is the number of information bits of the error correction codeword and NSEED is the resulting error correction codeword length.
  • 7. The method of claim 6, wherein the structured array matrix comprises
  • 8. The method of claim 7 wherein the final exponential matrix comprises
  • 9. The method of claim 5, wherein p is a prime number.
  • 10. A computer program product embodied on a computer readable medium for generating an error correction codeword, comprising: computer code for constructing an irregular seed parity check matrix derived from an edge ensemble, the seed parity check matrix having a column dimension and a row dimension;computer code for constructing a structured array exponent matrix using modulo arithmetic of a number equal to or greater than the seed parity check matrix column dimension;computer code for constructing a final exponential matrix by replacing each one in the seed parity check matrix with the corresponding element from the structured array exponent matrix and each zero in the seed parity check matrix with infinity;computer code for expanding the final exponential matrix to form a parity check matrix corresponding to the error correction code; andcomputer code for generating an error correction codeword in accordance with the parity check matrix.
  • 11. The computer program product of claim 10 further comprising computer code for transforming the structured array exponent matrix prior to constructing the final exponential matrix.
  • 12. The computer program product of claim 11, wherein transforming the structured array exponent matrix comprises performing shift, truncation, and/or permutation operations on the structured array exponent matrix.
  • 13. The computer program product of claim 10 further comprising computer code for constructing a set of permutation matrices, wherein the permutation matrices include a column dimension and the permutation matrices are used to expand the final exponential matrix.
  • 14. The computer program product of claim 13, wherein the error correction codeword includes a number of information bits and a length and wherein the seed parity check matrix comprises HSEED of dimension ((NSEED−KSEED)×NSEED), wherein KSEED is the number of information bits of the error correction codeword and NSEED is the resulting error correction codeword length.
  • 15. The computer program product of claim 14, wherein the structured array matrix comprises
  • 16. The computer program product of claim 15 wherein the final exponential matrix comprises
  • 17. The computer program product of claim 15, wherein p is a prime number.
  • 18. An electronic device, comprising: a processor; anda memory unit operative connected to the processor and including:computer code for generating an error correction codeword, the computer code comprising: computer code for constructing an irregular seed parity check matrix derived from an edge ensemble, the seed parity check matrix having a column dimension and a row dimension;computer code for constructing a structured array exponent matrix using modulo arithmetic of a number equal to or greater than the seed parity check matrix column dimension;computer code for constructing a final exponential matrix by replacing each one in the seed parity check matrix with the corresponding element from the structured array exponent matrix and each zero in the seed parity check matrix with infinity;computer code for expanding the final exponential matrix to form a parity check matrix corresponding to the error correction code; andcomputer code for generating an error correction codeword in accordance with the parity check matrix.
  • 19. The device of claim 18 further comprising computer code for transforming the structured array exponent matrix prior to constructing the final exponential matrix.
  • 20. The device of claim 19, wherein transforming the structured array exponent matrix comprises performing shift, truncation, and/or permutation operations on the structured array exponent matrix.
  • 21. The device of claim 18 further comprising computer code for constructing a set of permutation matrices, wherein the permutation matrices include a column dimension and the permutation matrices are used to expand the final exponential matrix.
  • 22. The device of claim 21, wherein the error correction codeword includes a number of information bits and a length and wherein the seed parity check matrix comprises HSEED of dimension ((NSEED−KSEED)×NSEED), wherein KSEED is the number of information bits of the error correction codeword and NSEED is the resulting error correction codeword length.
  • 23. The device of claim 22, wherein the structured array matrix comprises
  • 24. The device of claim 23 wherein the final exponential matrix comprises
  • 25. The device of claim 23, wherein p is a prime number.
CROSS-REFERENCE TO RELATED PATENT APPLICATIONS

This application is an application claiming the benefit under 35 USC 119(e) of U.S. Application No. 60/599,283, filed Aug. 5, 2004, incorporated herein by reference in its entirety.

US Referenced Citations (7)
Number Name Date Kind
6298035 Heiskala Oct 2001 B1
6675012 Gray Jan 2004 B2
6738599 Black et al. May 2004 B2
7302629 Kyung et al. Nov 2007 B2
7313752 Kyung et al. Dec 2007 B2
20030119481 Haverinen et al. Jun 2003 A1
20040097232 Haverinen May 2004 A1
Related Publications (1)
Number Date Country
20060031734 A1 Feb 2006 US
Provisional Applications (1)
Number Date Country
60599283 Aug 2004 US