The present application relates generally to error correction, and more particularly to providing a low complexity systematic encoder for error correction using polar codes.
In modem digital data transmission (wireless telephony, wireless data transmission, optical disk transmission to a player, music players receiving music data, and so on), a source encoder can compress the data to be transmitted for efficiency and then a channel encoder can receive the compressed data and add redundancy to it to protect the data against noise in the transmission channel. The receiver (sometimes referred to as the “sink”) at the other end of the channel receives the encoded data and uses a channel decoder to perform the inverse of channel encoding, followed by a source decoder which performs the inverse of source encoding. The decoded information is then played by the sink, e.g., by an optical disk player or music player or receiving telephone as audio, or is otherwise used and/or stored by the receiver.
Present principles focus on channel encoding. Channel encoding typically works by sending a piece of data sought to be communicated, referred to as a “data word”, through a transformation to produce a “code word” that is better protected against errors than the data word from which it is derived and thus is more suitable for transmission than the data word. For present purposes suffice it to say that linear block encoders, which multiply a data word using a matrix, have been used for this purpose because they are able to achieve an acceptable tradeoff of offering significant (albeit not absolute) protection against noise, commonly expressed in terms of the error rates such as bit error rates (BER) that result from noise, while being of sufficiently “low complexity” in terms of the amount of computation they require. Higher complexity encoding schemes that reduce the BER of a received signal hut require too much computation for expected data transmission rates are of little practical use.
A newer type of linear block code is the polar code, which improves on older codes by being able to achieve channel capacity, i.e., by being able to encode data such that the full capacity of the transmission channel can be exploited. Channel polarization refers to the fact that given a binary-input discrete memoryless channel W with symmetric capacity I(W), it is possible to synthesize, out of N independent copies of W, a second set of N binary-input channels WN(i), 1≦i≦N such that as N becomes large, a fraction I(W) of the synthesized channels become near perfect while the remaining fraction of channels become near useless. Codes constructed on the basis of this idea are called polar codes. Non-systematic polar encoders effect polar coding by collecting an input data word d and a fixed word b into a transform input word u and by multiplying it with a transform matrix G to render a code word x, i.e., x=uG.
The transform matrix G used in polar codes is based on Kronecker products, and its dimension is established as appropriate for the desired channel rate or capacity. Polar coding essentially amounts to selecting some of the elements of the transform input word U to carry the data word d while “freezing” (not using for encoding) the remainder of the elements of the transform input word. The elements of the transform input word that are selected to carry the data word d are those that in effect “see” the relatively good channels created by channel polarization, while the elements of b that are frozen “see” the relatively had channels. In my paper which introduced polar codes, entitled “Channel Polarization: A Method for Constructing Capacity-Achieving Code for Symmetric Binary-Input Memoryless Channels”, IEEE Trans. Inf. Theory, volume 55, pages 3051-3073 (July 2009), incorporated herein by reference and included in the file history of this application, I describe how to carry out channel polarization and transmit data using the “good” channels.
The problem sought to be addressed by present principles is as follows. The polar codes described in the above-referenced paper are non-systematic polar codes, meaning that the information bits do not appear as part of the code word transparently. Systematic codes in general, in which information bits appear as part of the code word transparently, can provide better error reduction performance than their non-systematic counterparts.
As recognized herein, however, conventional techniques cannot be used to transform a non-systematic polar code into a systematic polar code because doing so destroys the requisite recursive structure of the Kronecker power-based transform matrix G typically used in polar codes, which in turn implicates an unacceptably high encoder complexity. Present principles critically recognize that a systematic encoder for polar codes desired to maximize channel capacity exploitation, maximize immunity from noise, while exhibiting a low computation complexity to enable it to feasibly operate in expected data transmission environments.
This disclosure describes a systematic variant of polar coding complete with an encoder and decoder that preserves the low-complexity properties of standard non-systematic polar coding while significantly improving its bit-error rate (BER) performance.
Embodiments of the invention present methods, apparatuses and systems for deriving and implementing channel encoding and decoding algorithms that perform near the Shannon limit with low computational complexity. These embodiments may be implemented in communication systems, in mass storage devices and in other systems that will be apparent to those of ordinary skill in the art. Present principles may be reflected at least in part in my paper entitled “Systematic Polar Coding”, IEEE Communications Letters, volume 15, pages 860-862 (August 2011), incorporated herein by reference and included in the file history of this application.
Accordingly, an encoding assembly is implemented by an electrical circuit or by a processor accessing a computer readable storage medium storing instructions executable by the processor to implement a coding circuit to establish a systematic encoder for a code C to encode data prior to transmission of the data to ameliorate the effects of noise. The code C is an affine subspace of a range space of a transform G, and the transform G has a form P(F1G1)Q, wherein P is a row-permuter, F1 is a first kernel transform, G1 is a first-tier transform, and Q is a column permuter. The row permuter is a permutation matrix and likewise the column permuter is a permutation matrix. According to this aspect, the first kernel transform F1 has a size greater than one, while the first-tier transform has a size smaller than a size of the transform G. The coding circuit being configured to derive from an input data word d a plurality of first-tier data words d(1), . . . , d(k) to be encoded into a plurality of respective first-tier code words x(1), . . . , x(k). The plurality of code words belong to a plurality of respective first-tier codes C1, . . . Ck, with the plurality of first-tier codes being equal to respective first-tier affine subspaces of the first-tier transform G1. For each i from 1 to k, the circuit carries out systematic encoding of the ith first-tier data word d(1) into an ith first-tier code word x(i). The ith first-tier code word x(i) belongs to the ith first-tier code C1. Furthermore, the coding circuit combines the plurality of first-tier code words x(1), . . . , x(k) to obtain the code word x. In this way, systematic encoding for the code C is accomplished at low-complexity due to effective reduction of a given systematic encoding problem instance for the code C into a plurality of systematic encoding problem instances for the plurality of first-tier codes C1, . . . Ck, with each code in the plurality of first-tier codes being smaller than the code C.
In example embodiments, a transmitter receives the code word from the encoding circuit and transmits the code word to a receiver system. If desired, the coding circuit may be implemented by a sequential logic circuit. In a specific example described further below, the encoding assembly is implemented by an electrical circuit including logic gates and memory arrays.
In some examples, the first-tier transform G1 is the Kronecker product of a plurality of kernel transforms: G1=F2 . . . Fn, wherein each of the plurality of kernel transforms has a size greater than one. Indeed, if desired Fi=F1, for all 2≦i≦n, and in a specific instance
In another aspect, a systematic encoder includes a machine-implemented circuit establishing a systematic encoder that encodes data words into code words and that has a complexity of no more than a constant multiple of N log(N), wherein N is the dimension of a matrix of the nth Kronecker power associated with a matrix effectively employed by the encoder. The encoder transmits the code words as robust representations of the data words to a receiver system for retrieval of the data words from the code words by the receiver system.
In another aspect, a systematic encoder assembly of low complexity has an input receiving data symbols sought to be transmitted. The assembly accesses at least one fixed word that does not change from transmission to transmission. A circuit of the assembly receives the data symbols and the fixed word and uses the data symbols to define systematic parts of code words. The circuit also uses the fixed word to define a fixed part of an input word which establishes a parity part of a code word. The circuit outputs, for transmission, code words transparently encapsulating data symbols and including respective parity parts.
In another aspect, a systematic encoder assembly includes a parallelized hardware implementation of a systematic encoder. In this aspect, the parallelized hardware implementation includes a circuit configured for a transform G. This circuit contains memory and is configured for implementing local constraints. According to this aspect, the circuit propagates knowledge between parts of the memory by way of the local constraints. The circuit is initialized by a loading a data word into the memory, and the knowledge in the circuit initially includes a knowledge of the data word and a knowledge of a fixed word. The local constraints are used to gain new knowledge from existing knowledge iteratively according to a schedule of calculations, so that the memory can be updated in accordance with the new knowledge to derive a parity word such that a combination of the parity word and the data word is output as a code word for transmission thereof as a robust transform of the data word.
The details of current embodiments, both as to structure and parts, can best be understood in reference to the accompanying figures, in which like figures refer to like parts, and in which:
In accordance with established conventions in coding theory, data words, parity words, and code words in the system, are represented herein as vectors over a finite field Fq where q denotes the number of elements in the field. Field elements (scalars) are denoted by plain lower case letters, such as α∈F1. Vectors over a field are denoted by lower-case boldface letters, such as a∈FqN where N denotes the length of the vector. The notation αi denotes the ith coordinate of a vector a, A vector a∈FqN is alternatively denoted in terms of its elements as (α1, . . . αN) or (αi: 1≦i≦N). Matrices over a field are denoted by upper-case boldface letters, such as A∈FqM×N where M denotes the number of rows and N denotes the number of columns of A . The notation αi,j denotes the element in the ith row and jth column of A. A matrix A∈FqM×N is denoted in terms of its elements as (αi,j: 1≦i≦M, 1≦j≦N). The size of a matrix A is defined as the number of elements in A; thus, the size of a matrix with M rows and N columns is MN.
Sets are denoted by Italic upper-case letters such as A, B. If A is a set specified as a subset of a universal set U, then the notation Ac denotes the complement of the set. A in the universal set, i.e., Ac={α∈U:α∉A}. The number of elements in set A is denoted as |A|. For r and s any two integers, with r≦s, the set (r, r+1, . . . s) is alternatively denoted as [r, s]; this is the set of all integers i such that r≦i≦s.
For a∈FqN and A⊂{1, . . . , N}, the notation aA denotes the sub-vector of a consisting of those elements αi with indices in A: aA=(αi: i∈A). Likewise, aA
For A∈FqM×N, A∈{1, 2, . . . , M}, and B⊂{1, 2, . . . , N}, the notation AAB denotes the sub-matrix of A consisting of elements αi,j with i∈A, j∈B, that is, AAB=αi,j: i∈A, j∈B). The product of a row vector a∈Fqm and a matrix A∈Fqm×n is denoted as aA. The Kronecker product of two matrices A∈Fqm×n and B∈Fqk×l is defined as:
which is a mk-by-rl matrix. A matrix C is said to factorize into a Kronecker product of a matrix A and B if C=AB. The nth Kronecker power of a matrix A is defined recursively as =A for n≧2, with =A.
Encoding operations comprise various transformations of vector representations of data words, parity words, and code words. The term “transform” is used below to refer to linear vector space transformations. Transforms are represented by matrices. Transforms are usually cited below together with a specific matrix representation; for example, “transform G” refers to a transform that is represented by the matrix G in a specific basis.
With the above in mind, initially referring to
It is to be understood that present principles apply to various transmission systems and media. For example, in a wireless communication system, the transmission medium 30 typically is space or the atmosphere, in which case the communication system 10 is a wireless communication system. However, embodiments of the invention may be implemented in wired communications systems, in which case the transmission medium 30 may be a cable or a wire that connects the transmission system 20 to the reception system 40. Embodiments of the invention may also be implemented for storage systems, in which case the transmission medium 30 may be a magnetic tape or a hard disk drive or optical disk drive or solid state memory or other storage medium.
As will be apparent to those of ordinary skill in the art, input data 110 is ordinarily input into the transmission system 20 for eventual transmission to the reception system 40. A source encoder 120 compresses input data 110 so that the amount of data that must be transmitted is reduced. Data output from the source encoder 120 is then encoded by a channel encoder 130 which is configured according to description below. Such encoding renders the data to be transmitted more robust against errors that may be introduced during transmission across the transmission medium 30. In accordance with present principles, the channel encoder 130 implements a systematic encoder. After such encoding, the data is modulated by a modulator 140 and provided to a transmitter 150 for transmission through the transmission medium 30 to the reception system 40. The transmitter 150 has the task of converting information into signals capable of being transmitted across the transmission medium 30. For example, the transmitter 150 may be an RF radio transmitter with an antenna when the transmission medium 30 is airwaves or the transmitter 150 may be a laser device sending light into a fiber-optic cable.
The reception system 40 generally receives signals from the transmission medium 30 and demodulates and decodes them to extract the output data 195. With more specificity, a receiver 160 of the reception system 40 receives data front the transmission system 20 and passes the data to a demodulator 170, which demodulates the data. The demodulated data is then sent to a channel decoder 180 which produces a decoded data as an estimate of the transmitted data, and then the decoded data is sent to a source decoder 190 to decompress the data. It will readily be appreciated that the demodulator 170, channel decoder 180, and source decoder 190 perform the inverse of the operations performed by the modulator 140, channel encoder 130, and source encoder 120, respectively, subject to limitations imposed by noise effects and other non-idealities in the system. In any case, if the communication system 10 is properly designed and operated within its design parameters, extracted output data 195 should match the input data 110 with high reliability.
According to present principles, each component 120, 130, 140, and 150 of the transmission system 20 may be implemented on its own respective semiconductor chip, with the various chips communicating with each other according to the system of
Turning to
It is to be noted that the direct computation of an arbitrary affine transform p=dD+c 230 may be computationally prohibitive for many applications. If the parity-generator transform D 231 lacks any structure the complexity of computing the parity word p for a given data word d may be proportional to N2, where JV is the length of code words. Present principles give a relatively low-complexity method for computing the affine transform 230 under certain restrictions on the structure of the parity-generator transform D 231. In particular, present principles apply effectively when the parity-generator transform D 231 is derived from transforms defining polar codes. For polar codes, present principles describe a systematic encoding method with complexity order N log(N). Present methods are primarily but not exclusively directed to polar codes and their variants.
Attention is now turned to
a transform G 311, which is an N-by-N matrix, G∈FqM×N, G=(gi,j: 1≦i≦N, 1≦j≦N);
a row index set A 312, which is a subset, of {1, 2, . . . , N} with K elements;
a column index set B 313, which is a subset of {1, 2, . . . , N} with K elements;
a fixed word b 314, which is a vector of length N−K, b∈FqN−K;
with a joint constraint on the parameters (G, A, B) that the matrix GAB=(gi,j: i∈A, j∈B) has an inverse.
The systematic encoder (G, A, B, b) 300 receives a data word d∈FqK, computes the affine transform p−dD+c 333, and assembles the code word x by setting xB=d 334 and xB
Theorem. Let code C be the set of all code words generated by the systematic encoder (G, A, B, b) 300 . For any code word x∈C, there exists a u∈FqN with uA=b such that x=uG; in other words, the code C is an affine subspace of the range space of the transform G
Proof. Write the transform equation x=uG as
Taking xB and uA
u
A=(xB−uA
x
B
=x
B(GAB)−1GAB
which are valid since (GAB)−1 exists as part of the parameter constraints. Eq. 2 and Eq. 3 determine (uA, xB
x
B
=x
B
D+c (Eq. 4)
where D and C are as defined by the rules 331 and 332, respectively. Eq. 4 is the same as the affine transform 333 defining the parity word p in terms of the data word d for the code C. Thus, the code C equals the set
{x∈FqN:x=uG, uA
which in turn equals the set
{x∈FqN:x=uG, uA
due to the fact that for any fixed uA
In order to further illustrate the systematic encoder just described, cross-reference is made between
For a more specific discussion of systematic encoders with structured transforms, turn to
Transforms G that have a Kronecker power form as at 510 are commonly used in connection with polar codes, which is a class of codes for which present principles apply effectively. Transforms for polar coding may have more general structures than the Kronecker power structure shown at 510 and present principles can be used effectively for systematic encoding of more general polar code constructions.
It is noted that in some applications of polar coding the transform G is obtained by applying a row permutation or a column permutation (or both) to a Kronecker power of a kernel transform. For example it is common to use a “bit-reversal” permutation in polar coding. Present principles apply effectively for all such variations. More generally, present principles apply equally effectively for any two transforms G and G′ that are related to each other by G=PG′Q where P and Q are arbitrary permutation matrices, i.e., matrices in which each column (row) contains a single 1 with all other entries in the column (row) being 0. In particular, present methods apply effectively for transforms G that can fee obtained from a lower triangular G′ by permutations P and Q as in the preceding formula
As recognized herein, the Kronecker power 510 can be written in the form G=FG1 which expresses the transform G as a Kronecker product of the kernel transform F and a first-tier transform G1 511. The first-tier transform 511 in this instance also has a Kronecker power structure, G1=. The first-tier transform G1 511 may be factorized as G1=FG2 to obtain a second-tier transform G2=512, provided n≧2. Proceeding similarly, one obtains n trans forms G1=, 1≦i≦n. The transform G, obtained this wav is called the “ith-tier transform” (in the Kronecker decomposition of the original transform G). The ith-tier transform is a 2n−i-by-2n−i matrix; its size decreases exponentially with i.
As recognized by present principles, the ability to factorize a transform into Kronecker products of smaller transforms is an important property for construction of low-complexity systematic encoders. In particular, as understood herein any code based on a transform that can be factors zed into a Kronecker product of a plurality of kernel transforms, such as G=F1F2 . . . Fn 530 can benefit from present principles for constructing a low-complexity systematic encoder. For the more general case 530, the ith-tier transform can be obtained as Gi=Fl+1 . . . Fn 531, 1≦i≦n. Essentially, using this principle of factorizing a given transform into a Kronecker product of smaller transforms the coding circuitry reduces an original systematic encoding problem instance into a number of first-tier systematic encoding problem instances. The number of first-tier problem instances equals the number of rows of the first-tier kernel transform F1. In preferred embodiments of present principles the number of rows of the first-tier kernel transform F1 is a small number, independent of the problem size.
This reduction of the original systematic encoding problem instance into successively higher-tier systematic encoding problem instances can continue recursively until a tier i is reached for which the ith-tier transform Gi has no non-trivial Kronecker factorizations, i.e., for any factorization G1=Fl+1Gl+1 either where the size of Fl+1 is one or the size of Gl+1 is one. At this point, the systematic encoding problem instances for the ith-tier problems are solved by direct computation of the affine transform 333. Present principles exploit this recursive reduction of a given problem to smaller problems to me extent possible to obtain a low-complexity systematic encoder.
It is also to be noted that at 530 if each of the kernel, transforms Fi, 1≦i≦n, is lower-triangular with non-zero diagonal entries, then the transform G is also lower-triangular with non-zero diagonal entries. For any lower-triangular transform G with non-zero diagonal entries, the row index set A and the column index set B may be chosen equal (A=B) to obtain a sub-matrix GAB=GAA that is lower-triangular with non-zero diagonal entries, ensuring that GAB=GAA has an inverse.
It is recognized herein that having lower-triangular kernels F1, 1≦i≦n, is advantageous for application of present principles. More generally, it is recognized that the method can be applied with the same advantages if each kernel transform Fi is such that it can be brought into lower-triangular form by a series of row exchanges and column exchanges. For instance, a kernel transform Fi that is originally upper-triangular can be brought into lower-triangular form by row and column exchanges. Embodiments of present principles are given below tor the case where the transforms are specified as lower-triangular transforms with non-zero diagonal entries for convenience and are non-limiting.
It is also recognized herein that transform matrices can be brought into more convenient forms for implementation by employing permutations. It is known that for any two matrices A and B, there exist permutations P such that Q such that AB=P(BA)Q. Thus, for example, a transform matrix that is originally in the form G=G1F can be brought by a row permutation P and a column permutation Q into the form PGQ=FG1 which may be more advantageous for implementation. In light of this fact, it is recognized that present principles can be used effectively for a broader class of transforms than the ones illustrated herein.
While still remaining within the general framework of
An encoding cycle begins with the systematic encoder 600 receiving a data word d 601 and terminates with the generation of a code word x 606. A first first-tier data generator 610 generates a first first-tier data word d(1) 602 as a function of the data word d 601. A second first-tier data word generator 620 generates a second first-tier data word d(2) 603 using the data word d 601 and a part of the first first-tier code word x(1) 604 supplied by a feedback link 609. In preferred embodiments of present principles, however, the second first-tier data generator 620 generates the second first-tier data word d(2) 603 from d 601 only, and the feedback link 609 becomes redundant and it can be eliminated from the circuit entirely, thereby reducing complexity and eliminating a latency caused by having to wait for the part of the first first-tier code word x(1) to become available at the output of the first first-tier systematic encoder output. The elimination of the feedback link 609 makes it possible to run the two first-tier encoders 630 and 640 in parallel.
The first first-tier data word d(1) 602 is processed by a first first-tier encoder (G1, A(1), B(1), b(1)) 620 to generate a first first-tier code word x(1) 604. The second first-tier data word d(2) 603 is processed by a second first-tier systematic encoder (G1, A(2), B(2), b(2)) 640 to generate a second first-tier code word x(2) 605. A code word assembler 650 assembles the code word x 606 using-the first first-tier code word x(1) 604 and the second first-tier code word x(2) 605.
It is to be noted that an alternative code word assembler as a replacement for 650 is possible, with the alternative code word assembler assembling the data part of the code word x directly from the data word d and the parity part of the code word x from the parity parts of the first-tier code words.
It is noted that the two first-tier systematic encoders 630 and 640 may be implemented by direct computation of the affine transform 333, with the affine transform adapted to the parameter (G1, A(1), B(1), b(1)) in one computation and to (G1, A(2), B(2), b(2)) in the second. However, such a direct computation is costly and present principles seek to avoid direct computations of affine transforms by exploiting Kronecker factorizations whenever possible. Specifically, if the first-tier transform G1 can be factorized into a non-trivial Kronecker product G1=FG2 then the same principles described above for the encoder 600 can be applied to the first-tier systematic encoders 630 and 640 to reduce the complexity still further. This recursive reduction of a problem instance into smaller problem instances may be continued if the second-tier transform G2 also factors into a non-trivial Kronecker product.
It will be clear to the skilled person in the art that the recursive reduction may be applied until a tier i is reached such that the ith-tier transform cannot be factored into a non-trivial Kronecker product. Each problem instance at this final level i may be solved by a direct computation of an affine transform 333, with the affine transform adapted to the parameters of that problem instance (namely, the transform 311, the row index set 312, the column index set 313, and the fixed word 314). Once all problem instances at the final level i are obtained, the ith-tier code words are combined to obtain the (i−1)th-tier code words, leading to a recursive combining of solutions, which terminates when eventually the first-tier code words are combined to yield the code word x.
It is further noted that a systematic encoding problem instance is trivial when the instance has a code rate K/N that equals 1; in this case, one can simply set x=d to accomplish systematic encoding without any further computation. It is important to detect the presence of rate-1 encoding instances to take advantage of such computational short-cuts. It may be that the original problem instance has a rate less than 1, K/N<1, but the first first-tier problem instance has rate 1, K1/N1=1; in this case, block 630 can be replaced with the direct assignment x(1)=d(1), leading again to significant savings in computational complexity. More generally, in the course of running the algorithm recursively at successively higher order tiers, one can take advantage of this computational short-cut by detecting the occurrence of rate-1 encoding instances. Present principles call for incorporating such short-cuts into the control logic of the algorithms that are described herein, although such details are omitted in the illustration of the basic principles.
To illustrate an implementation of a systematic encoder in accordance with
The rules in
It is to be noted that if the first-tier transform has the form G1=FG2, the rules at
While still looking at
In the the above illustrative example of
Returning now to the more general case with insight gained from the above example, it is noted that present principles apply most effectively when the transform matrix is a Kronecker power G=, as in standard polar coding. Then, the original systematic encoding problem instance for the transform G can be reduced recursively to systematic encoding problem instances at n−1 successive tiers. For each 1≦i≦n−1, there are 2i ith-tier problem instances, each defined for an ith-tier transform G1= with dimension 2n−1.
It is to be further noted that recursive reduction of an original systematic encoding problem instance to similar systematic encoding problem instances at higher order tiers and at exponentially decreasing sizes is an advantageous aspect of present principles that allows re-use of computational resources. For example, a single configurable systematic encoder implementation may be used to solve all systematic encoding problem instances generated by the recursive reduction of the original problem instance. Alternatively semi-parallel implementation architectures can be used that duplicate some of the resources that are re-used to achieve a desired trade-off between hardware complexity and latency.
It is further recognized that in some implementations where latency is important it is desirable to be able to run the two first-tier systematic encoders 630 and 640 in parallel; for this to be possible it is desirable that the step 620 generate the second first-tier data word d(2) 603 as a function of only the data word d 601 without having to wait for the first first-tier code word x(1) 604 to become available on the feedback line 609. A sufficient condition for this to be the case is to use a column index set B such that B(2)⊂B(1), because then the coordinates of x(1) with indices in B(2) become known as soon as the data word d 601 becomes available. The latency reduction is especially significant if each problem instance created by the recursive reduction inherits this property. It is known to the skilled artisan that polar codes in their ordinary mode of implementation have the property of having B(2)⊂B(1) at the first-tier and at all subsequent tiers; so as recognized herein, systematic encoders can be implemented using full parallelism to reduce the latency for systematic encoding of polar codes. A fully parallel implementation of a polar code is illustrated below in
The rules stated in
The non-limiting example circuit 700 in
The circuit 700 is designed for coding over the binary field Fq=2 with the exclusive-or gates 705 implementing the addition operation in Fq=2. Dots 706 in the figure show points where wires are connected to each other. The circuit 700 uses sequential logic with a clock. The circuit includes a memory which is arranged into various arrays. Each memory element in the circuit 700 can store either a 0 or a 1. Data can be written into memory elements at clock ticks. A data written into a memory element is maintained until a new data is written into that memory element.
Memory elements are used to keep track of various words used by the encoding algorithm, such as the data word, the parity word, and various other auxiliary words. Accordingly, the memory is partitioned into four arrays: an input array u 701, a first internal array v 702, a second internal array w 703, and a code word array x 704. (In general, the number of internal arrays will vary.) The input array u has a fixed part uA
Each memory element is either in state “known” or state “unknown”. The state of a memory element at a given time signifies whether the value of the variable associated with that memory element is known or unknown at that time. As a mutational convention, the name of a memory element is also used to represent the value stored in it.
The values stored in “known” memory elements constitute the “existing knowledge” in the circuit. In each clock cycle, the circuit extracts “new knowledge” from the existing knowledge by determining values of some of the “unknown” memory elements using some “new knowledge extraction rules”. The new knowledge extraction rules are based on “local constraints”. The local constraints are typically derived from the kernel transform F. For the specific kernel transform F used in
Existing knowledge in the circuit is initialized by loading a data word d into the data part xs of the code word array and the fixed word b into the fixed part uA
A state evolution, table 790 in
The state evolution table 790 shows that initial existing knowledge is contained in the fixed part uA
As seen in table 790, knowledge propagates from left-to-right and from right-to-left in each time period. At time 6 all memory elements become determined and the encoding is completed. The code word computed by the circuit is x=(0, 1, 1, 0, 0, 1, 0, 1) which contains the data word d in xB and the parity word p in the complementary part xB
Looking at
An important feature of circuit 700 can he appreciated by recognizing that two sub-circuits 710 and 720 are each designed to implement a first-tier transform G1=: first-tier subcircuits 710 and 720 are implementations, respectively, of steps 630 and 640 in
It is also to be noted that the two first-tier subcircuits 710 and 720 are independent of each other and identical in structure. Present principles recognize that this independent and identical nature of the first-tier subcircuits allows re-use of hardware resources. Present principles also recognize that the second-tier subcircuits 730, 740, 750, 760 are identical and independent; hence, there is room for further hardware re-use as one descends down the tiers. It will be apparent to the skilled person in the art that the architecture of the systematic encoder 600 presents a wide range of semi-parallel implementations options, the fully parallel implementation in circuit 700 being at one extreme and the fully serial implementation discussed in connection with the illustration of the rules in
It is to be noted that time complexity of the systematic encoder circuit in
It Is to be noted that the encoder circuit can be reduced in size by “pre-extraction” of knowledge from the fixed part uA
It is to be noted that present principles can be implemented by circuits of the form 700 in a variety of ways. The connections between the different layers of memory arrays can be made to look structurally identical by certain permutations; this brings advantages such as simplified layout for VLSI implementation or pipelining. The transform itself may be modified by using a bit-reversal permutation operation as is customary in standard polar coding. Such variations are well known to the skilled person in the art of polar coding. Present principles can be adapted for operation on such alternative circuits as will be clear to the skilled person in the art.
As will be readily understood in light of the above disclosure, circuits similar to the one shown in
It will be apparent to those skilled in the art that a circuit similar to the circuit 700 can be constructed to implement any transform of the form G=F1 . . . Fn. The general circuit can be constructed by using an input array u, a sequence of internal arrays v1, 1≦i≦(n−1), and an output array x, each array having a length equal to the dimension (number of rows) of the transform G. The circuit would have local constraints based on the first kernel F1 between the input array and the first internal array, local constraints based on the ith kernel transform Fi between the (i−1)th internal array and the ith internal array for 2≦i≦(n−1), and local constraints based on the nth kernel transform Fn between the (n−1)th internal array and the code word array x.
Turning to
The architecture of the systematic decoder 800 is advantageous especially in connection with polar coding for which low-complexity non-systematic decoders are available. An example of a low-complexity non-systematic decoding algorithms that can be used to implement the decoder block 810 for polar codes is the successive cancellation decoding algorithm.
The significantly superior bit-error rate (BER) performance of systematic polar codes can be appreciated in reference to
With more specificity,
While the particular METHOD AND SYSTEM FOR ERROR CORRECTION IN TRANSMITTING DATA USING LOW COMPLEXITY SYSTEMATIC ENCODER is herein shown and described in detail, it is to be understood that the subject matter which is encompassed by the present invention is limited only by the claims.
Number | Date | Country | |
---|---|---|---|
Parent | 13597765 | Aug 2012 | US |
Child | 14706795 | US | |
Parent | 13450775 | Apr 2012 | US |
Child | 13597765 | US |