The present invention generally relates to error correction coding for information transmission, data storage and signal processing systems, such as wired and wireless digital communication systems, flash memories and other memories, and storage drive systems. More particularly, the present invention relates to a decoding method and, in particular, a method of decoding low-density parity-check (LDPC) codes. The present invention also relates to a computer program product, including a computer-readable medium having recorded thereon a computer program for decoding LDPC codes.
Digital communication enables two devices to exchange information (e.g., data, voice, video, etc.). However, the channel (e.g., liquid, cable, air, etc.), on which such digital communication is conducted, is typically noisy and introduces errors into the transmitted information.
In one solution, the data transmitted by the source 110 is encoded to enable any errors that occurred during the transmission to be detected and corrected. Such an encoding is called a forward error correction (FEC) coding. The encoding involves adding redundancy to the source data. When the encoded data is received by the receiver, the source data is recovered by performing decoding to correct any corrupted data. The recovered source data is then provided to the sink 120.
The channel encoder 114 encodes the bit streams (generated by the source encoder 112) by adding redundant bits into the bit streams. The redundant bits enable the source data to be recovered at the receiver, even if the bit streams are corrupted during transmission via the channel 130. The encoded bit streams (having the redundant bits) are then transmitted via the channel 130.
The received encoded data (i.e., encoded bit streams) is then processed by a channel decoder 124 to detect and correct any errors in the encoded data. Once the errors are corrected, the data is sent to a source decoder 122. The source decoder 122 converts the bit streams back into the source data. The source data is then provided to the sink 120.
One FEC coding uses Low-Density Parity-Check (LDPC) codes, which are a type of linear block codes. The LDPC codes are decoded by the channel decoder 124.
An LDPC code produces parity data as the redundancy that is in the form of a binary matrix H with elements of 1 or 0. As the name LDPC suggests, the matrix H has a low density, meaning that there are more 0s than 1s. The low-density nature of the matrix H reduces complexity and makes it easier to implement the encoding and decoding of LDPC codes. The low-density nature of LDPC codes also ensures effective iterative decoding of LDPC codes.
The matrix H has two parameters, namely a row degree and a column degree. The row degree indicates the number of 1 in a row of the matrix H. The column degree indicates the number of 1 in a column of the matrix H.
LDPC codes are categorized into a regular or an irregular LDPC code. A regular LDPC code has the same row degree for each of the rows of the matrix H, and has the same column degree for each of the columns of the matrix H. An irregular LDPC code has varying row degrees for the rows of the matrix H, and has varying column degrees for the columns of the matrix H.
Hereinafter, check nodes 210A to 210E will be collectively referred to as check nodes 210 (when referring to all the check nodes) or check node 210 (when referring to one check node). Hereinafter, variable nodes 220A to 220J will be collectively referred to as variable nodes 220 (when referring to all the variable nodes) or variable node 220 (when referring to one variable node).
Only one of the edges 230 has been indicated with the reference numeral 230 for simplicity sake. Similar to the check nodes 210 and variable nodes 220, the edges 230 will be collectively referred to as edges 230 (when referring to all the edges) or edge 230 (when referring to one edge).
Each of the check nodes 210 relates to each row of the matrix H. For example, check node 210A relates to the first row of the matrix H, while check node 210B relates to the second row of the matrix H, and so on.
Each of the variable nodes 220 relates to each column of the matrix H. For example, variable node 220A relates to the first column of the matrix H, while variable node 220B relates to the second column of the matrix H, and so on.
A check node 210 is connected to a variable node 220 by an edge 230 when there is an element 1 in the corresponding entry in the matrix H. For example, check node 210A (representing the first row of matrix H) is connected by an edge 230 to variable node 220A as the matrix H has an element 1 in the first row and first column of the matrix H.
Each check node 210 has a check node degree dc indicating the number of variable nodes 220 to which the particular check node 210 is connected. For example, check node 210A has a check node degree dc of 4, as check node 210A is connected to variable nodes 220A to 220D.
Similarly, each variable node 220 has a variable node degree dv indicating the number of check nodes 210 to which the particular variable node 220 is connected. For example, variable node 220A has a variable node degree dv of 2, as variable node 220A is connected to check nodes 210A and 210B.
In other words, whenever there is an element 1 at row j and column i, there is an edge 230 connecting the corresponding check node 210 of row j and the corresponding variable node 220 of column i.
Turning back to
The log-likelihood ratio (LLR), denoted as ri, of each of bits xi can then be calculated using the equation
The channel decoder 124 receives the signal yi (where i=1 to n) and calculates the corresponding LLR ri. Each of the LLR ri is then assigned to a variable node 220, which in turn connects to one or more check nodes 210 via edges 230. As discussed hereinbefore, the connection between check nodes 210 and variable nodes 220 is determined by the matrix H of the LDPC codes.
Each of the variable nodes 220 has an LLR value that is the sum of the LLR (i.e., ri) of the corresponding bit xi assigned to that variable node 220 and the CTV messages Ej,i from check nodes 210 to which that variable node 220 is connected. An equation of the LLR value of a variable node 220 is:
VTC messages Zj,i are calculated by
where Zj,i is a VTC message from the ith variable node 220 to the jth check node 210; Ai is the set of check nodes 210 connected to the ith variable node 220. The variable node 220 at the ith index calculates all the VTC messages Zj,i to be sent by the variable node 220 at the ith index. The calculated VTC messages Zj,i are sent to check nodes 210 (to which the variable node 220 at the ith index is connected).
The VTC message Zj,i being calculated by the ith variable node 220 for the jth check node 210 is effectively the updated LLR (i.e, Li) of the ith variable node 220 subtracted by the CTV message Ej,i received from the jth check node 210. The calculation removes self-information. Self-information is the information sent by the jth check node 210.
Similar to the calculation of the VTC message Zj,i, the check node 210 at the jth index calculates all the CTV messages Ej,i to be sent by the check node 210 at the jth index to the ith variable node 220. The calculated CTV messages Ej,i are sent to all ith variable nodes 220, to which the check node 210 at the jth index is connected.
The CTV messages Ej,i can be calculated with a belief propagation (BP) algorithm known as the sum-product algorithm (SPA). SPA uses a non-linear hyperbolic function to calculate the CTV messages Ej,i. The function is:
where Ej,i is a CTV message from the jth check node 210 to the ith variable node 220; Bj is the set of variable nodes 220 connected to the jth check node 210; and sgn(Zj,i′) is a function for determining the sign for Zj,i′ such that if Zj,i′≥0 then sgn(Zj,i′)=1. Otherwise, sgn(Zj,i′)=−1.
Once all the CTV messages Ej,i are generated, the LLR value Li of each bit is computed based on the equation in paragraph [0024] above. When Li≥0 then
where H is the parity check matrix,
However, the above SPA calculation is complex and requires a high computing resources to determine all the CTV messages Ej,i.
Accordingly, there is a need to provide a decoding method that is lower in complexity and requires fewer computing resources.
It is an object of the present invention to substantially overcome, or at least ameliorate, one or more disadvantages of existing arrangements.
According to one aspect of the present disclosure, there is provided a method of decoding Low-Density Parity-Check (LDPC) codes in received data, the method comprising: determining check nodes, variable nodes, and variable-to-check (VTC) messages based on the LDPC codes; determining three or more minimum magnitude values of the determined VTC messages to obtain a determined minimum VTC message set; and determining a set of check node messages from the determined minimum VTC message set, wherein the determined set of check node and the determined minimum VTC message set messages are used to determine a set of check-to-variable (CTV) messages.
According to another aspect of the present disclosure, there is provided an apparatus for implementing any one of the aforementioned methods.
According to another aspect of the present disclosure, there is provided a computer program product including a computer-readable medium having recorded thereon a computer program for implementing any one of the methods described above.
Other aspects are also disclosed.
Some aspects of the prior art and at least one embodiment of the present invention will now be described with reference to the drawings and appendices, in which:
Where reference is made in any one or more of the accompanying drawings to steps and/or features, which have the same reference numerals, those steps and/or features have for the purposes of this description the same function(s) or operation(s), unless the contrary intention appears.
It is to be noted that the discussions contained in the “Background” section and that above relating to prior art arrangements relate to discussions of documents or devices which form public knowledge through their respective publication and/or use. Such should not be interpreted as a representation by the present inventor(s) or the patent applicant that such documents or devices in any way form part of the common general knowledge in the art.
As seen in
The computer module 1301 typically includes at least one processor unit 1305, and a memory unit 1306. For example, the memory unit 1306 may have semiconductor random access memory (RAM) and semiconductor read only memory (ROM). The computer module 1301 also includes a number of input/output (I/O) interfaces including: an audio-video interface 1307 that couples to the video display 1314, loudspeakers 1317 and microphone 1380; an I/O interface 1313 that couples to the keyboard 1302, mouse 1303, scanner 1326, camera 1327 and optionally a joystick or other human interface device (not illustrated); and an interface 1308 for the external modem 1316 and printer 1315. In some implementations, the modem 1316 may be incorporated within the computer module 1301, for example within the interface 1308. The computer module 1301 also has a local network interface 1311, which permits coupling of the computer system 1300 via a connection 1323 to a local-area communications network 1322, known as a Local Area Network (LAN). As illustrated in
The I/O interfaces 1308 and 1313 may afford either or both of serial and parallel connectivity, the former typically being implemented according to the Universal Serial Bus (USB) standards and having corresponding USB connectors (not illustrated). Storage devices 1309 are provided and typically include a hard disk drive (HDD) 1310. Other storage devices such as a floppy disk drive and a magnetic tape drive (not illustrated) may also be used. An optical disk drive 1312 is typically provided to act as a non-volatile source of data. Portable memory devices, such as optical disks (e.g., CD-ROM, DVD, Blu-ray Disc™), USB-RAM, portable, external hard drives, and floppy disks, for example, may be used as appropriate sources of data to the system 1300.
The components 1305 to 1313 of the computer module 1301 typically communicate via an interconnected bus 1304 and in a manner that results in a conventional mode of operation of the computer system 1300 known to those in the relevant art. For example, the processor 1305 is coupled to the system bus 1304 using a connection 1318. Likewise, the memory 1306 and optical disk drive 1312 are coupled to the system bus 1304 by connections 1319. Examples of computers on which the described arrangements can be practised include IBM-PC's and compatibles, Sun Sparcstations, Apple Mac™ or like computer systems.
The method of generating CTV messages Ej,i may be implemented using the computer system 1300 wherein the processes of
The software may be stored in a computer readable medium, including the storage devices described below, for example. The software is loaded into the computer system 1300 from the computer readable medium, and then executed by the computer system 1300. A computer readable medium having such software or computer program recorded on the computer readable medium is a computer program product. The use of the computer program product in the computer system 1300 preferably effects an advantageous apparatus for generating CTV messages Ej,i and decoding LDPC codes.
The software 1333 is typically stored in the HDD 1310 or the memory 1306. The software is loaded into the computer system 1300 from a computer readable medium, and executed by the computer system 1300. Thus, for example, the software 1333 may be stored on an optically readable disk storage medium (e.g., CD-ROM) 1325 that is read by the optical disk drive 1312. A computer readable medium having such software or computer program recorded on it is a computer program product. The use of the computer program product in the computer system 1300 preferably effects an apparatus for generating CTV messages Ej,i and decoding LDPC codes.
In some instances, the application programs 1333 may be supplied to the user encoded on one or more CD-ROMs 1325 and read via the corresponding drive 1312, or alternatively may be read by the user from the networks 1320 or 1322. Still further, the software can also be loaded into the computer system 1300 from other computer readable media. Computer readable storage media refers to any non-transitory tangible storage medium that provides recorded instructions and/or data to the computer system 1300 for execution and/or processing. Examples of such storage media include floppy disks, magnetic tape, CD-ROM, DVD, Blu-ray™ Disc, a hard disk drive, a ROM or integrated circuit, USB memory, a magneto-optical disk, or a computer readable card such as a PCMCIA card and the like, whether or not such devices are internal or external of the computer module 1301. Examples of transitory or non-tangible computer readable transmission media that may also participate in the provision of software, application programs, instructions and/or data to the computer module 1301 include radio or infra-red transmission channels as well as a network connection to another computer or networked device, and the Internet or Intranets including e-mail transmissions and information recorded on Websites and the like.
The second part of the application programs 1333 and the corresponding code modules mentioned above may be executed to implement one or more graphical user interfaces (GUIs) to be rendered or otherwise represented upon the display 1314. Through manipulation of typically the keyboard 1302 and the mouse 1303, a user of the computer system 1300 and the application may manipulate the interface in a functionally adaptable manner to provide controlling commands and/or input to the applications associated with the GUI(s). Other forms of functionally adaptable user interfaces may also be implemented, such as an audio interface utilizing speech prompts output via the loudspeakers 1317 and user voice commands input via the microphone 1380. For example, certain parameters (e.g., the parameters k and l) of the method for generating CTV messages Ej,i can be set by the user to adjust the accuracy in detecting and correcting errors in the received data.
When the computer module 1301 is initially powered up, a power-on self-test (POST) program 1350 executes. The POST program 1350 is typically stored in a ROM 1349 of the semiconductor memory 1306 of
The operating system 1353 manages the memory 1334 (1309, 1306) to ensure that each process or application running on the computer module 1301 has sufficient memory in which to execute without colliding with memory allocated to another process. Furthermore, the different types of memory available in the system 1300 of
As shown in
The application program 1333 includes a sequence of instructions 1331 that may include conditional branch and loop instructions. The program 1333 may also include data 1332 which is used in execution of the program 1333. The instructions 1331 and the data 1332 are stored in memory locations 1328, 1329, 1330 and 1335, 1336, 1337, respectively. Depending upon the relative size of the instructions 1331 and the memory locations 1328-1330, a particular instruction may be stored in a single memory location as depicted by the instruction shown in the memory location 1330. Alternately, an instruction may be segmented into a number of parts each of which is stored in a separate memory location, as depicted by the instruction segments shown in the memory locations 1328 and 1329.
In general, the processor 1305 is given a set of instructions which are executed therein. The processor 1305 waits for a subsequent input, to which the processor 1305 reacts to by executing another set of instructions. Each input may be provided from one or more of a number of sources, including data generated by one or more of the input devices 1302, 1303, data received from an external source across one of the networks 1320, 1302, data retrieved from one of the storage devices 1306, 1309 or data retrieved from a storage medium 1325 inserted into the corresponding reader 1312, all depicted in
The disclosed CTV messages Ej,i generation method uses input variables 1354, which are stored in the memory 1334 in corresponding memory locations 1355, 1356, 1357. The disclosed arrangements produce output variables 1361, which are stored in the memory 1334 in corresponding memory locations 1362, 1363, 1364. Intermediate variables 1358 may be stored in memory locations 1359, 1360, 1366 and 1367.
Referring to the processor 1305 of
a fetch operation, which fetches or reads an instruction 1331 from a memory location 1328, 1329, 1330;
a decode operation in which the control unit 1339 determines which instruction has been fetched; and
an execute operation in which the control unit 1339 and/or the ALU 1340 execute the instruction.
Thereafter, a further fetch, decode, and execute cycle for the next instruction may be executed. Similarly, a store cycle may be performed by which the control unit 1339 stores or writes a value to a memory location 1332.
Each step or sub-process in the processes of
The method of generating CTV messages Ej,i may alternatively be implemented in dedicated hardware such as one or more integrated circuits performing the functions or sub functions of the method shown in
The method 400 commences at step 402 by receiving data from the channel 130. The method 400 then proceeds from step 402 to step 404.
In step 404, the method 400 determines check nodes 210, variable nodes 220, and VTC messages Zj,i from the received data and LDPC code. As described hereinbefore, the received data includes signal yi (where i=1 to n). The signal yi is used to calculate the corresponding LLR ri. Each of the LLR ri is then assigned to a variable node 220. The variable nodes 220 are then connected to one or more check nodes 210 according to a matrix H of the LDPC code.
The VTC messages Zj,i are then calculated using the equation Zj,i=ri+Σj′∈A
The total number of VTC messages Zj,i is based on the number of the element 1 in the matrix H of the LDPC code. The total number of VTC messages Zj,i of each row of His represented by dc, (which is also the degree of each check node 210).
The method 400 then proceeds from step 404 to step 406.
In step 406, the method 400 calculates three or more minimum magnitude values of the determined VTC messages Zj,i to obtain a determined minimum VTC message set m={m1, m2, . . . , mk}. The number of minimum magnitude values of the VTC messages Zj,i to be determined is set by the parameter k, where 3≤k≤dc and dc is the total number of VTC messages Zj,i of each check node 210. The parameter k is set by a user during programming of the method 400. In one alternative arrangement, the parameter k is set by a user by using one of the input devices of the computer system 1300.
The method 400 proceeds from step 406 to step 408.
In step 408, the method 400 determines a set of check node messages M={M1, M2, . . . . Ml}, from the determined minimum VTC message set m, where 3≤l≤k+1. The parameter l is set by a user during programming of the method 400. In one alternative arrangement, the parameter/is set by a user by using one of the input devices of the computer system 1300.
The first l−1 messages of the check node message set M is calculated using the equation:
M
t
=U({mt′|t′=1,2,3, . . . ,k and t′≠t}),t=1,2,3, . . . ,l−1
The U function used in calculating the check node messages Mt is an approximation function for recursive calculation. The general form of U function is expressed by:
Some examples of the F function are as follows:
Linear F equations:
Non-linear F equations:
Jacobian logarithmic identity
Approximation of Jacobian logarithmic identity
The method 400 then proceeds from step 408 to step 410.
In step 410, the method 400 determines the minimum and maximum values from the first l−1 messages of the check node message set M. The minimum is stored as Mmin and the maximum is stored as Mmax. The method 400 then proceeds from step 410 to step 412.
In step 412, the method 400 determines the value of regulated minimum check node message Ml of the check node message set M using the equation:
where Pmin(Mmin, dc)=α1Mmin+β1dc. Pmin is a linear or non-linear mathematical function that is regulated by the check node degree dc. The parameters α1 and β1 are constants that are adjustable to optimise the performance of the method 400.
The method 400 proceeds from step 412 to step 414.
In step 414, the method 400 determines the value of regulated maximum check node message W using the equation:
where Pmax(Mmax, dc)=α2Mmax+β2dc. Pmax is a linear or non-linear mathematical function that is regulated by the check node degree dc. The parameters α2 and β2 are constants that are adjustable to optimise the performance of the method 400.
The method 400 proceeds from step 414 to step 416.
In step 416, the method 400 modifies the check node message set M by replacing the maximum value of the check node message set M with W (which is determined at step 414). The modified check node message set M′ is therefore the check node message set M with its maximum value replaced with W. The method 400 proceeds from step 416 to step 418.
In step 418, the method 400 determines the CTV messages Ej,i based on the determined minimum VTC message set m and the modified check node message set M′ (as determined at steps 408 to 416). In particular, the modified check node message set M′ is used to assign CTV messages Ej,i based on the received VTC messages Zj,i.
In a first step, the sign of each of the CTV messages Ej,i is determined using the equation:
where
is the product of all the signs except the sign of the VTC message sent by variable node i and sgn(Zj,i′) finds the sign for Zj,i′ such that if Zj,i′≥0 then sgn(Zj,i′)=1. Otherwise, sgn(Zj,i′)=−1.
Accordingly, the sign of the CTV message Ej,i assigned to a variable node 220 is determined by the signs of all other VTC messages Zj,i except the sign of the VTC message sent by variable node i.
In a second step, the CTV messages Ej,i are assigned according to the pseudocodes shown in Appendix A.
The second step can be referred to as a “compare and select” step. When assigning a CTV message Ej,i to be sent to a variable node 220 (e.g., 220A), the check node 210 first compares the VTC message Zj,i received from this variable node 220 (i.e., 220A) with the set of minimum VTC messages m={m1, m2, . . . , ml-1}, to select which check node message in the modified check node message set M′ to assign. If the absolute value of a VTC message Zj,i is equal to one of the minimum VTC messages m={m1, m2, . . . , ml-1}, then the corresponding check node message in the modified check node message set M′ is assigned. For example, if the absolute value of a VTC message Zj,i is equal to m1, then the CTV message Ej,i is the corresponding check node message, M1, in the modified check node message set M′. However if, the absolute value of a VTC message Zj,i is not equal to any one of the minimum VTC messages m={m1, m2, . . . , ml-1}, then Ml is assigned. Ml is the regulated minimum check node message determined at step 412.
Note: m={m1, m2, . . . , ml-1} is a subset of m={m1, m2, . . . , mk} as 3≤l≤k+1
The method 400 concludes at the conclusion of step 418.
The arrangements described are applicable to the computer and data processing industries and particularly for decoding of LDPC codes.
The foregoing describes only some embodiments of the present invention, and modifications and/or changes can be made thereto without departing from the scope and spirit of the invention, the embodiments being illustrative and not restrictive.
In the context of this specification, the word “comprising” means “including principally but not necessarily solely” or “having” or “including”, and not “consisting only of”. Variations of the word “comprising”, such as “comprise” and “comprises” have correspondingly varied meanings.
Number | Date | Country | Kind |
---|---|---|---|
2021902647 | Aug 2021 | AU | national |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/AU2022/050939 | 8/22/2022 | WO |