Two-dimensional (2-D) intersymbol-interference (ISI) channels have become practically relevant in various data recording technologies such as two-dimensional magnetic recording (TDMR), optical holographic memories as well as in other areas such as pixelated wireless optical channels and 2-D grid networks. From a signal processing viewpoint, data recording systems in 2-D have advantages over traditional 1-D systems. 2-D recording systems are less sensitive to timing instabilities due to wider tracks and hence not restrictive to the size of sensory read elements. With clever 2-D signal processing, guard bands between tracks can be avoided. This improves format efficiency. Lastly, if 2-D ISI can be handled beneficially to gain signal-to-noise ratio (SNR) by appropriate signal processing.
The emergence of 2-D ISI channels motivates the development of 2-D signal processing techniques for combatting ISI. There is a wide spectrum of 1-D detection techniques ranging from decision feedback equalization (DFE) to the optimal maximum a-posteriori (MAP) algorithm that can be extended to the 2-D case. 2-D DFE based methods are easy to implement but suffer from error propagation. The 1-D MAP algorithm is theoretically optimal and is the best-in-class detector for minimizing bit-error rate. However, unlike 1-D MAP detection that can be easily realized, 2-D MAP detection is in general NP-complete. It is difficult to realize a 2-D trellis that spans signal dimensions over 2-D blocks of data greater than just a few bits. Low complexity 2-D signal detection algorithms based on 1-D schemes are needed to approach 2-D MAP detection performance. Several authors have considered various approaches towards 2-D detection. Nelson et al. (J. K. Nelson, A. C. Singer, and U. Madhow, “Multi-directional Decision Feedback for 2D Equalization,” in Proc. IEEE Intl. Conf. on Acoust. Speech and Signal Proc. ICASSP'04, vol. 4, pp. 921-924, May 2004) derived a multi-dimensional decision feedback scheme for 2-D equalization. Wu et al. (Y. Wu, J. A. O'Sullivan, R. S. Indeck, and N. Singla, “Iterative Detection and Decoding for Seperable Two-Dimensional Intersymbol Interference,” IEEE Trans. Magn., vol. 39, pp. 2115-2210, July 2003) developed 2-D iterative detection and decoding scheme for a separable 2-D ISI system. However, in most practical systems, 2-D ISI is not separable. Shental et al. (O. Shental, N. Shental, S. Shamai, I. Kanter, A. J. Weiss, and Y. Weiss, “Discrete-Input Two-Dimensional Gaussian Channels With Memory: Estimation and Information Rates via Graphical Models and Statistical Mechanics,” IEEE Trans. Inform. Theory., vol. 54, pp. 1500-1513, April 2008) developed a generalized belief propagation approach that achieves near ML performance for 2-D ISI channels. Simulations in Shental et al. considered (20×20) 2-D data sizes with smaller 2-D ISI masks (2×2) and low energy distribution on side taps; such cases are easily handled since nearby boundary conditions can aid the estimation algorithm. In a recent prior work, Chen et al. (Y. Chen, T. Cheng, P. Njeim, B. Belzer, and K. Sivakumar, “Iterative Soft Decision Feedback Zig-Zag Equalizer for 2D Intersymbol Interference Channels,” IEEE Jour. on Sel. Areas in Comm., vol. 28, pp. 167-180, February 2010) developed an iterative soft-decision feedback zig-zag MAP algorithm. This method demonstrated performance close to nearly optimal detection and compared well with the method in Shental et al.
Some embodiments are directed to methods and systems for encoding and decoding data, including but not limited to data stored in a data storage device such as a disk drive.
Considering the detection of an M×N equiprobable 2-D independent and identically distributed (i.i.d.) binary signal x with elements x(k,l)ε{−1, +1} from received image y with elements
y(m,n)=g(m,n)+w(m,n) (1)
where g(m, n) is the 2-D convolution, defined as
In the above equations h(k, l) are the elements of a 2-D finite impulse response/2-D blurring mask and w(m, n) are zero mean independent and identically distributed i.i.d. Gaussian random variables (r.v.s). The double sum is computed over the support of h(m−k, n−l):S(m, n)=(k, l):h(m−k,n−l)≠0. The discrete model in (1) and (2) is applicable to many 2-D ISI channels post front-end signal processing after dealing with channel/media distortions and whitening the media noise.
According to one embodiment, the shape of the 2-D mask may be selected so as to emphasize ISI contributions of adjacent pixels in the orthogonal directions over adjacent pixels in the diagonal directions. A ‘pixel’, as referred to herein, is a 2-D bit cell related to a 2-D sector or a bit cell in shingled magnetic recording, unlike the term “pixel” as used in cameras and imaging. Practical 2-D ISI channels in recording systems may be represented by the ‘band-aid’ shape mask shown in
As in the conventional BCJR algorithm described in L. R. Bahl, J. Cocke, F. Jelinek, and J. Raviv, “Optimal decoding of linear codes for minimizing symbol error rate,” IEEE Trans. Inform. Theory., vol. 20, pp. 284-287, March 1974), scans based on the forward-backward procedure may be carried out. In one embodiment, to compute the received image y, a boundary of −1 pixels is assumed around x; the detector uses this boundary condition so that the MAP trellis can begin and end in an ‘all −1’ state as demonstrated in Bahl et al., in which ‘−1’ is the bi-polar mapping of an all zero logical state.
For the generalized 2-D mask shown in
Sj=s[s−K
the input vector
ui,j=[ui−K
and the received vector sequence Z(i){yi,j}1≦j≦N, where the vector yi,j is the local received samples for trellis stage j at ith row, defined as:
yi,j=[yi−k
and
is defined as
The a-posteriori probability may now be computed for this multi-row detector as
using a modified BCJR algorithm.
The following are defined:
αi,j(s)=P(Sj=s,{yi,a}1≦a≦j),
βi,j(S)=P({yi,a}j+1≦a≦N|Sj=s),
γi,j(s′,s)=P(Sj=s,yi,j|Sj−1=s′); (8)
the state transition probability γ may be computed at every stage along the trellis, and after all the γ's are available, the α's and β's may be updated based on the following equations using the forward-backward recursion,
After all the α's, δ's and γ's become available, the y probability in equation (6) may be computed as,
To estimate the pixel located at (i, j+K1) from the λ's, the λ's may be marginalized over all the other pixels in the input vector ui,j as,
The delay of K1 of the index accounts for the ISI shape and boundary conditions.
The output pixel LLR may be computed as:
If L(i, j)>0 pixel (i, j) may be detected as +1; otherwise pixel (i, j) may be detected as −1.
The conditional probability γi,j (s′, s) is decomposed to the product of two other conditional probabilities based on Bayesian rule:
The last equality holds in (14), because the input is the branch connecting two adjacent stages, and this vector determines the next state given the current state. For the non-iterative detection embodiment, there is no a-priori information. It is assumed in that case that all the input pixels are equally likely when computing P(ui,j) in equation (14). Since the first conditional probability in the product of (14) is Gaussian distributed, it may be computed it as,
In one embodiment, in the second step of equation (15), it is assumed that all the conditional probabilities are statistically independent of each other. This may not be is true for larger ISI spans, but this assumption is a reasonable practical approximation to realize the algorithm. For the conditional probabilities in equation (15), the expectations are computed based on the index (m, n) of the received sample y and the components of the 2D mask shown in
Given i−K2≦m<i and n=j−1, the expectation is,
There are i−m feedback pixels in vertical direction, (i.e., ω1,v through ωi-m,v), and 2K1−1 feedback pixels in the horizontal direction, (i.e., ω2,h through ωK
Given i<m≦i+K2 and n=j−1, the expectation is,
There are m−i feedback pixels in vertical direction, (i.e., ω1,v through w and 2K1−1 feedback pixels in the horizontal direction, (i.e., ω2,h through ωK
In one embodiment, the total number of the feedback pixels in the vertical direction is |i−m| which will change with the index m; while the total number of feedback pixels in the horizontal direction is a constant 2K1−1.
The selection of the mask may include selecting a shape (through selection of the channel coefficients) so as to emphasize ISI contributions of adjacent pixels in an orthogonal direction over adjacent pixels in a diagonal direction. Accordingly, the channel coefficients at the corners of the channel model h above may be selected to be zero. Since the ISI is spanning 3 rows, a local span of 3 rows and 3 columns may be considered in one embodiment. In general, a 2-D trellis must span over the entire 2-D signal span and the forward backward technique must be computed at each point over the entire signal span. Thus the worst case complexity is N4 assuming an N×N size 2-D data sector.
Let {yi,j} denote the set of received samples. In reality for TDMR, these will be equalized samples post front-end signal processing. A ‘pixel’, as referred to herein, is a 2-D bit cell related to a 2-D sector or a bit cell in a shingled setup, unlike the term “pixel” as used in cameras and imaging. The current state is defined as the 2-D “band-aid” type shape shown in thick lines in
As shown in Block B52, a signal is then received, and equalized samples are generated from the received signal. That is, the received signal may correspond to an input pixel of a current state from each of the plurality of tracks. The received signal may be analog-to-digital converted, filtered through a Finite Impulse Response (FIR) filter and equalized to generate the equalized samples.
Transition branch probabilities (from a current state s′ to a next state s) may then be computed for each input vector based on a Gaussian noise distribution using the equalized samples, ideal samples and a priori probabilities of the input vector, as shown at Block B53. According to one embodiment, the ideal samples may be computed by convolving the input vector with a 2-D partial response target. Block B54 calls for computing forward and backward probabilities, according to equations (8), (9) and (10) above, via 2-D recursions using the computed transition branch probabilities for each of the plurality of states of the trellis. Each iteration of the recursion may utilize the results from the last recursion, as set forth in equations (9) and (10) above. As shown in block B55, the computed forward probabilities, backward probabilities and the transition branch probabilities may then be combined, to generate a-posteriori probabilities for the input vector, as defined in equation (11) above. As shown at block B56 and as defined in equation (12) above, the a-posteriori probabilities may then be marginalized over values of neighboring pixels to generate an a-posteriori probability for a pixel of the input vector in a given state. Finally, as called for by block B57 and as defined at equation (13), the pixel may be decoded as a first logical state (e.g., 0 or 1 in a binary system) or a second logical state (e.g., 0 or 1 in a binary system) from the marginalized a-posteriori probabilities.
According to one embodiment, the decoding in block B57 may be carried out by summing each of the plurality of states of the trellis corresponding to the pixel assuming a first value (such as −1, for example) and summing each of the plurality of states of the trellis corresponding to the pixel assuming a second value that is of opposite polarity as the first value (such as +1, for example). A ratio may then be calculated of a sum over most or all the states of the marginalized a-posteriori probabilities corresponding to pixels that are of the first value over a sum of most or all states corresponding to pixels that are of the second value, to obtain an output pixel log likelihood ratio (LLR). From the output pixel LLR (equation (13) above), the input pixel's value may be decoded as a first logical state if the output pixel LLR is greater than 0 and as a second logical state if the output pixel LLR is less than or equal to 0. For example, if the output pixel LLR of equation (13) evaluates to zero, the pixel may be decoded as having a first logical value (0, for example) and if equation (13) evaluates to a value that is greater than zero, the pixel may be decoded as having a second logical value (such as 1, for example).
Practical channels usually have small ISI span. For purposes of computational illustration, in one embodiment, a simple 2-D mask is chosen such that h=[0α0;β1β; 0α0] of size 3×3, and assumed to be symmetric, as shown in
The branch metrics may be defined as the squared Euclidean distances (SEDs) between the branch output vectors and the received pixel vectors yi,j[yi−1,j−1, yi,j, yi+1,j−1]. As shown in
For the 3×3 mask shown in
In equation (19), the expectations of the terms within the Gaussian conditional probabilities are computed based on the states definitions, the feedback pixels for the corresponding trellis and the 3×3 mask h, as shown in
All the Gaussian probabilities above have the same variance.
The multi-row trellis shown in equation (19) processes three adjacent data tracks simultaneously. In the computation of P(yi,j|Sj=s, Sj−1=s′), yi,j may be defined as yi,j=[yi−1,j−1, yi,j, yi+1,j−1]. For convenience, this non-iterative 2-D detection embodiment that processes three adjacent data tracks simultaneously is denoted ‘algorithm B’.
However, for the ‘one-row version’ embodiment that only processes one single data track, the trellis definition in
where the yi,j is just the received sample from one single data track, and
The relation between the ‘one-row’ version embodiment and ‘three-rows’ version embodiment may be also be generalized to arbitrary 2D ISI channels. In one or more embodiments, the best performance may be obtained by processing R adjacent rows (data tracks) simultaneously, where R=max(2K1+1, 2K2+1), but with the highest complexity.
Turbo Based Detection
One embodiment is based on a 2-D iterative scheme that takes advantage of different error decisions and noise distribution at the output of the row and column detectors.
According to one embodiment, to compute the a-priori probability for a specified pixel yi,j from the incoming extrinsic information of this pixel Lein (yi,j), the following equations may be applied:
where yi,j˜ denotes the a-priori information on pixel yi,j. For convenience, the iterative 2-D detection embodiment that computes y's using the equation (19) taking account of the a-priori information for both the feedback pixels and P(ui,j) is denoted herein ‘algorithm D’ in Table 1 herein below and in
A state is defined comprising of two adjacent pixels s0 and s1 in the row direction as shown in
The scaling process (i.e. weight) on the extrinsic information (LLRs) may be used to avoid quick convergence during iterative detection. The weights δ 706, 708 may be effective to lower the magnitude of the ‘bad’ LLRs with high magnitude in opposite polarity that may propagate into the next detection cycle. The performance tends to converge after several turbo iterations.
In the turbo embodiment, the log-likelihood ratio L(i, j) may be split into a term that depends on the incoming extrinsic information Lein (yi,j) to the current (row or column) detector 702, 704, and a term that does not. Hence, Lein (yi,j) may be subtracted from L(i, j) to form the extrinsic information Lout(i, j) that may be passed to the next detector as the extrinsic information,
Lout(i,j)=L(i,j)−Lein(i,j). (23)
The same process may be carried out for one or more of the iterative 2-D detection embodiments disclosed herein.
Complexity Analysis
One embodiment is a low complexity 2-D detection algorithms employing 1-D MAP technique operating over rows and columns within a turbo iteration framework to realize a ‘near true 2-D detection’ performance. A size N×N binary source image may be used for complexity test. The length of the trellis within a single row is N. Operating over the entire image with N rows, the data may be processed N×N times. The complexity comparison between different algorithms is summarized in Table 1 below. The comparison unit is ‘per detector per iteration’, since some algorithms employ iterative schemes with more than one detector in a single iteration.
Simulation Results
Monte Carlo simulation of the 2-D detection algorithms were carried out and the results thereof compared. All simulations employ a random 64×64 binary source image x(m, n)ε{−1, +1}. All of the images have a boundary corresponding to the mask size, so that the trellis may start and end at an ‘all −1’ state. The Signal-To-Noise Ratio (SNR) may be defined as:
where σωz is the variance of the Gaussian r.v.s ω (m, n) in Equation (2). It is assumed that α=β in the 3×3 mask h, for simulation purposes.
Iterative algorithms C and D employ a 5-iteration scheme with a weight σ=0.8 for extrinsic information scaling; while algorithm E uses a 10-iteration scheme with weight σ=0.5. The performance of the algorithms converges; i.e., no more significant SNR gain, after these numbers of iterations discussed herein. The three-row non-iterative version ‘algorithm B’ performs much better than the one-row version ‘algorithm is A’, since the state transition probability in BCJR algorithm is computed more accurately (i.e. more contributing terms dealing with ISI rather than in the single case). Algorithms C and D spanning multi-rows/columns perform better than algorithm E with simplified trellis because handling multiple row/columns have better 2-D ISI cancellation than a single-row/column iterative detector.
Algorithm E in
While certain embodiments of the inventions have been described, these embodiments have been presented by way of example only, and are not intended to limit the scope of the inventions. Indeed, the novel methods, devices and systems described herein may be embodied in a variety of other forms. Furthermore, various omissions, substitutions and changes in the form of the detection methods and detectors described and shown herein may be made without departing from the spirit of the inventions. The accompanying claims and their equivalents are intended to cover such forms or modifications as would fall within the scope and spirit of the inventions. For example, those skilled in the art will appreciate that in various embodiments, the actual structures (such as, for example,) may differ from those shown in the figures. Depending on the embodiment, certain of the steps described and shown herein may be removed, while others may be added. Also, the features and attributes of the specific embodiments disclosed above may be combined in different ways to form additional embodiments, all of which fall within the scope of the present disclosure. Although the present disclosure provides certain preferred embodiments and applications, other embodiments that are apparent to those of ordinary skill in the art, including embodiments which do not provide all of the features and advantages set forth herein, are also within the scope of this disclosure. Accordingly, the scope of the present disclosure is intended to be defined only by reference to the appended claims.
Number | Name | Date | Kind |
---|---|---|---|
7555070 | Ulriksson et al. | Jun 2009 | B1 |
7788572 | Ulriksson | Aug 2010 | B1 |
8194801 | Bitran et al. | Jun 2012 | B1 |
20060115029 | Marrow | Jun 2006 | A1 |
Entry |
---|
Notice of Allowance dated Jul. 8, 2013 in U.S. Appl. No. 13/404,380, 13 pages. |
R. Wood, M. Williams, A. Kavcic, and J. Miles, “The Feasibility of Magnetic Recording at 10 Terabits Per Square Inch on Conventional Media,” IEEE Trans. Magn., vol. 45, No. 2, pp. 917-923, Feb. 2009. |
L. R. Bahl, J.Cocke, F.Jelinek and J.Raviv, “Optimal decoding of linear codes for minimizing symbol error rate,” IEEE Trans. Inform. Theory., vol. 20, Mar. 1974, pp. 284-287. |
E. Ordentlich and R. Roth, “On the Computational Complexity of 2D Maximum-likelihood Sequence Detection,” Hewlett-Packard Labs, Palo Alto, CA, 2006, Tech. Rep. HPL-2006-69, 15 pgs. |
J. K. Nelson, A. C. Singer, and U. Madhow, “Multi-directional Decision Feedback for 2D Equalization,” in Proc. IEEE Intl. Conf. on Acoust. Speech and Signal Proc. ICASSP'04, vol. 4, May 2004, pp. 921-924. |
Y. Wu, J. A. O'Sullivan, R. S. Indeck, and N. Singla, “Iterative Detection and Decoding for Separable Two-Dimensional Intersymbol Interference,” IEEE Trans. Magn., vol. 39 Jul. 2003, pp. 2115-2120. |
O. Shental, N. Shental, S. Shamai, I. Kanter, A. J. Weiss, and Y. Weiss, “Discrete-Input Two-Dimensional Gaussian Channels With Memory: Estimation and Information Rates via Graphical Models and Statistical Mechanics,” IEEE Trans. Inform. Theory., vol. 54, Apr. 2008, pp. 1500-1513. |
Y. Chen, T. Cheng, P. Njeim, B. Belzer, and K. Sivakumar, “Iterative Soft Decision Feedback Zig-Zag Equalizer for 2D Intersymbol Interference Channels,” IEEE Jour. on Sel. Areas in Comm., vol. 28, Feb. 2010, pp. 1-14. |
C. Berrou and A. Glavieux, “Near Shannon Limit Error-correcting Coding and Decoding: Turbo Codes,” IEEE Trans. Comm., vol. 44, Oct. 1996, pp. 1064-1070. |
S. G. Srinivasa, O. Momtahan, A. Karbaschi, S. W. McLaughlin, F. Fekri, and A. Adibi, “Volumetric Storage Limits and Space-Volume Multiplexing Tradeoffs for Holographic Channels,” Opt. Eng., vol. 49, Jan. 2010, pp. 1-9. |
C. L. Miller, B. R. Hunt, M. W. Marcellin, and M. A. Neifeld, “Image restoration using the Viterbi algorithm,” Jour. of the Opt. Soc. of America A., vol. 17, No. 2, Feb. 2000, pp. 265-274. |
M. Tuchler, R. Koetter and A. Singer, “Turbo equalization: Principles and New Results,” IEEE. Trans. Comm., vol. 50, No. 5, pp. 754-767, May 2002. |
S. Jeong and J. Moon, “Self-Iterating Soft Equalizer,” accepted to IEEE. Trans. Communication, 6 pgs. |
Steve Hranilovic, Member, IEEE, and Frank R. Kschischang, Fellow, “A Pixelated MIMO Wireless Optical Communication System”, IEEE Journal of Selected Topics in Quantum Electronics, vol. 12, No. 4, Jul./Aug. 2006, pp. 859-874. |
Chan Kheong Sann et al., “Channel Models and Detectors for Two-Dimensional Magnetic Recording (TDMR)”, IEEE Transactions on Magnetics, vol. 46, No. 3, Mar. 2010, pp. 804-811. |
X. Chen, K. M. Chugg, and M. A. Neifeld “Near-optimal data detection for two dimensional ISI/AWGN channels using concatenated modeling and iterative algorithms,” in Proc. IEEE International Conference on Communications, ICC98, 1998, pp. 952-956. |
M. Marrow, and J. K. Wolf, “Iterative Detection of 2-Dimensional ISI Channels,” in Proc. Inf. Theory Workshop, Paris, France, pp. 131-134, Mar./Apr. 2003. |
S. G. Srinivasa, and S. W. McLaughlin, “Capacity Bounds for Two-Dimensional Asymmetric M-ary (0, k) and (d,$) Runlength-Limited Channels,” IEEE Trans. Comm., vol. 57, No. 6, pp. 1584-1587, Jun. 2009. |
S. ten Brink, “Convergence behavior of iteratively decoded parallel concatenated codes,” IEEE Trans. Commun., vol. 49, pp. 1727-1737, Oct. 2001. |