CN101877591B - A kind of method and apparatus of binary symmetric source coding - Google Patents

A kind of method and apparatus of binary symmetric source coding Download PDF

Info

Publication number
CN101877591B
CN101877591B CN201010212112.5A CN201010212112A CN101877591B CN 101877591 B CN101877591 B CN 101877591B CN 201010212112 A CN201010212112 A CN 201010212112A CN 101877591 B CN101877591 B CN 101877591B
Authority
CN
China
Prior art keywords
code
check
matrix
generator matrix
sequence
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201010212112.5A
Other languages
Chinese (zh)
Other versions
CN101877591A (en
Inventor
袁志锋
郑贱平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Global Innovation Polymerization LLC
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201010212112.5A priority Critical patent/CN101877591B/en
Publication of CN101877591A publication Critical patent/CN101877591A/en
Application granted granted Critical
Publication of CN101877591B publication Critical patent/CN101877591B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The method that the invention discloses a kind of binary symmetric source coding, constructs the generator matrix of polynary low-density generated matrix (LDGM) code according to code check and code length;After given source sequence, use enhancement mode belief propagation (RBP) encryption algorithm that source sequence is compressed according to the generator matrix of structure, it is thus achieved that compressed sequence, it is achieved binary symmetric source encodes;The present invention also discloses the device of a kind of binary symmetric source coding, pass through the solution of the present invention, it is possible to achieve there is uniform enconding complexity and the distortion performance binary symmetric source coding close to rate distortion capacity.

Description

A kind of method and apparatus of binary symmetric source coding
Technical field
The present invention relates to source coding technique, the method and apparatus particularly relating to a kind of binary symmetric source coding.
Background technology
Multi-antenna technology is a key technology of Long Term Evolution (LTE, LongTermEvolution) system.When downlink sending and receiving end configures many antennas, the signal how designing sending and receiving end just becomes an important topic with the channel capacity obtaining multi-input multi-output system downlink (MIMOdownlink).Theoretical research shows, uses dirty paper code (DPC, DirtyPaperCoding) technology at transmitting terminal (base station), it is possible to obtain the capacity of multi-input multi-output system broadcast channel (MIMOBC).Not being given due to theoretical research and how to design structurized DPC, the most structurized DPC designing technique just becomes a current academic and study hotspot of engineering field.
Supercomposed coding is that a kind of effective structuring DPC recently proposed realizes technology, and it requires to provide a good channel code and a good source code.In supercomposed coding structure, channel code typically can use the code of the up channel capacity such as the most ripe low-density checksum (LDPC, Low-DensityParityCheck) code;Source code can use Trellis coding quantization (TCQ, TrellisCodedQuantization) or low-density generated matrix (LDGM, Low-DensityGeneratorMatrix) code.In order to approach rate distortion capacity, when source code uses TCQ, need the biggest status number, such as: status number is with 2tRepresenting, t is code storage length, and in order to approach rate distortion capacity, t typically requires more than 20.Accordingly, it would be desirable to research is based on LDGM code distortion quantizing of information source.Research show LDGM code be one can reach binary symmetric source (BSS, BinarySymmetricSource) rate distortion capacity have distortion message sink coding.But the complexity of the LDGM encryption algorithm that (SP, SurveyPropagation)/extraction (Decimation) is propagated in traditional employing investigation be code length square, complexity can be expressed as O (n2), n is code length.In view of in order to approach rate distortion capacity, the code length of LDGM code typically requires more than 104, therefore its complexity is higher.
A kind of LDGM encryption algorithm with linear complexity is TAP (ThoulessAndersonPalmer) method, it is 2 that TAP method have linear complexity to be because the row degree of the generator matrix of binary LDGM code in TAP method, therefore enhancement mode belief propagation (RBP can be used, ReinforcedBeliefPropagation) algorithm encodes, and this is it can be avoided that necessary extraction step in other coded methods.But the poor-performing of TAP method, the circulation binary LDPC code that check matrix column degree is 2 of the binary LDGM code antithesis that the poor-performing of TAP method is primarily due to generator matrix row degree is 2 is not a good channel code, and this is the conclusion generally acknowledged.From coding theory, farther out, therefore, the performance of TAP method also is difficult to close to rate distortion capacity to be primarily due to the code redistribution of optimum channel code on the code redistribution deviation theory of the circulation binary LDPC code that row degree is 2.
Summary of the invention
In view of this, present invention is primarily targeted at the method and apparatus that a kind of binary symmetric source coding is provided, it is achieved there is uniform enconding complexity and the distortion performance BSS coding close to rate distortion capacity.
For reaching above-mentioned purpose, the technical scheme is that and be achieved in that:
The method of a kind of binary symmetric source coding that the present invention provides, the method includes:
The generator matrix of polynary LDGM code is constructed according to code check and code length;
After given source sequence, use RBP encryption algorithm that source sequence is compressed according to the generator matrix of structure, it is thus achieved that compressed sequence.
In such scheme, the described generator matrix constructing polynary LDGM code according to code check and code length, particularly as follows: use progressive edge to increase (PEG, ProgressiveEdge-Growth) one size of algorithm construction is the check matrix of cyclic LDPC code of m × n, and wherein, m is the product of code check and code length, n is code length, m is 1 less than the element on only two positions on n, and each column, and on other positions, element is 0;By element that value each in check matrix is 1 with uniform probability random replacement for set 1,2 ..., the arbitrary element in q-1}, q is the positive integer more than 3;Finally verification matrix transpose is obtained the generator matrix of the polynary LDGM code that size is n × m.
In such scheme, the method farther includes: when the information updating using RBP encryption algorithm to calculate check-node, uses fast fourier transform to calculate the information updating of check-node.
In such scheme, described code check and code length are determined according to sequence to be compressed by the System Control Center being responsible for information allotment.
The device of a kind of binary symmetric source coding that the present invention provides, this device includes: generator matrix module, compressed sequence module, reconstruct source sequence module;Wherein,
Generator matrix module, for constructing the generator matrix of polynary LDGM code according to code check and code length, and notifies compressed sequence module by generator matrix;
Compressed sequence module, for after given source sequence, uses RBP encryption algorithm to compress source sequence according to the generator matrix of generator matrix module structure, it is thus achieved that compressed sequence.
In such scheme, described generator matrix module constructs the generator matrix of polynary LDGM code according to code check and code length, particularly as follows: the check matrix of the cyclic LDPC code that generator matrix module employing one size of PEG algorithm construction is m × n, wherein, m is the product of code check and code length, and n is code length, and m is less than n, and the element on only two positions is 1 in each column, on other positions, element is 0;Then by element that value each in check matrix is 1 with uniform probability random replacement for set 1,2 ..., the arbitrary element in q-1}, q is the positive integer more than 3;Finally verification matrix transpose is obtained the generator matrix of the polynary LDGM code that size is n × m, and by generator matrix notice reconstruct source sequence module.
In such scheme, described compressed sequence module, when being further used for the information updating using RBP encryption algorithm calculating check-node, use fast fourier transform to calculate the information updating of check-node.
The method and apparatus of a kind of binary symmetric source coding that the present invention provides, constructs the generator matrix of polynary LDGM code according to code check and code length;After given source sequence, use RBP encryption algorithm that source sequence is compressed according to the generator matrix of structure, it is thus achieved that compressed sequence;So, it is possible to achieve there is uniform enconding complexity and the distortion performance BSS coding close to rate distortion capacity, improve the distortion performance of BSS coding.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet that the present invention realizes the method for binary symmetric source coding;
Fig. 2 is that the present invention is for representing the factor graph of LDGM code;
Fig. 3 is the emulation schematic diagram that TAP method and the inventive method realize the distortion performance that binary symmetric source encodes;
Fig. 4 is the structural representation that the present invention realizes the device of binary symmetric source coding.
Detailed description of the invention
In having distortion information source coding problem, source sequence y to be compressed is that each element obeys independent same distribution (i.i.d.) yiThe sampled value of random vector, wherein, y ∈ S, yi∈PS, S represents the character set belonging to information source, PSRepresent the set that in character set S, the probability of each element is constituted.The thought of message sink coding is exactly by certain code word in code book CRepresent this source sequence y, to realize the quantization compression of source sequence y.As: the Binary Symmetric Bernoulli information source (Ber (1/2)) of parameter p=1/2, code check R (i.e. compression ratio) is that the source encoder of R=m/n is by source sequence y ∈ { 0,1}nIt is mapped as the binary vector x ∈ { 0,1} of a length of m < nm, x then is mapped as reconstructing source sequence by source decoder as compressed sequence
For given binary sequence pairTypically use Hamming (Hamming) distortion D as the tolerance of reconstruction fidelity.Wherein, Represent y andBetween Hamming distance from, i.e. sequences y andThe number that on middle correspondence position, element value is different, such as: dH(001,101)=1.For Ber (1/2) information source, there is a following formula (1) according to Shannon rate distortion theory:
R ( D ) = 1 - H ( D ) , D ∈ [ 0,0.5 ] 0 , otherwise - - - ( 1 )
Wherein H () is binary system entropy function.
For using binary LDGM code to have distortion message sink coding, given code check R < 1, make A ∈ { 0,1}n×mFor the generator matrix of LDGM code, and suppose that its order is m, i.e. rankA=m without loss of generality.Further, since the low-density characteristic of LDGM code, the number always bounded of the element 1 in each row and column of generator matrix A, therefore, quantization code book based on LDGM code is defined as formula (2).
C (A) :={ z ∈ { 0,1}n| z=Axforsomex ∈ { 0,1}m}(2)
Wherein, z represents the code word in LDGM code quantization code book, and arithmetical operation therein patrols China territory (GF (2)) based on the gal that size is 2.
Source encoder is by given source sequence y ∈ { 0,1}nIt is mapped as dope vector x ∈ { 0,1}m, source decoding is then by simpleRealize, wherein,It is properly termed as the source sequence of reconstruct.
It can be seen that the significant challenge having distortion message sink coding using LDGM code is how to determine that information bit vector x makes Hamming distortion | | y-Ax | |1/ n is minimum.
Present invention contemplates that when in GF (q), parameter q is bigger, most row degree of the optimal LDPC code on GF (q) are 2, propose the check matrix of polynary cyclic LDPC code that row degree is 2 as the generator matrix of LDGM code, and use RBP algorithm to encode, realization has uniform enconding complexity (O (n)) and performance has distortion to quantify close to the BSS based on polynary LDGM code of rate distortion capacity, described GF (q)={ 0,1, ..., q-1}.
The basic thought of the present invention is: construct the generator matrix of polynary LDGM code according to code check and code length;After given source sequence, use RBP encryption algorithm that source sequence is compressed according to the generator matrix of structure, it is thus achieved that compressed sequence.
Below by drawings and the specific embodiments, the present invention is described in further detail.
The present invention realizes the method for a kind of binary symmetric source coding, as it is shown in figure 1, the method includes following step:
Step 101: construct the generator matrix of polynary LDGM code according to code check and code length;
Concrete, initially with the check matrix B of the cyclic LDPC code that one size of PEG algorithm construction is m × n, wherein, m is the product of code check and code length, and n is code length, and m is 1 less than the element on only two positions on n, and each column, and on other positions, element is 0;Then by verification matrix B in each value be 1 element with uniform probability random replacement for set 1,2 ..., the arbitrary element in q-1}, q is the positive integer more than 3;Finally verification matrix B transposition is obtained the generator matrix A of the polynary LDGM code that size is n × m;The System Control Center that described code check and code length can be allocated by responsible information determines according to sequence to be compressed, and System Control Center can be the control centre of image data samples, or the control centre etc. of audio data samples.
Step 102: given source sequence;
Concrete, LDGM code can be with factor graph G=(V, C as shown in Figure 2, E) represent, wherein V={1,2, ..., m} represents the "○" on the left side in the set of information node x, i.e. Fig. 2, C={1,2 ..., n} represents the set of check-node z, " " in i.e. Fig. 2, E represent the set on the limit connecting check-node and information node.From figure 2 it can be seen that each check-node zi(i=1,2...n) has exclusive information source node yi(i=1,2...n) neighbours, and two information node neighbours, described information source node yiThe "○" on the right in (i=1,2...n) neighbours i.e. Fig. 2.G is defined on the limit of link information node j and check-node i in factor graphI, j∈ GF (q)/{ 0}, described gI, jThe value of the nonzero element of the i-th row jth row in corresponding generator matrix A;
The set of the information node neighbours of verification node i is designated as V (i), the set of the inspection nodes neighbors of information node i is designated as C (i).Obviously, the LDGM code of structure has | V (i) |=2, i=1,2 ..., n.Given all bits meet the source sequence y of verification relational expression (3), and the code length of source sequence y is n.
Σ j ∈ V ( i ) g j , i x j + y i = 0 , ( i = 1,2 , . . . , n ) - - - ( 3 )
Wherein, the arithmetical operation in formula (3) is based on GF (q).
Step 103: after given source sequence, uses RBP encryption algorithm to compress source sequence according to the generator matrix of structure, it is thus achieved that compressed sequence;
Concrete, orderFrom information node x to the message vector of check-node z when representing the l time iteration, to arbitrary symbol a ∈ GF (q),The probability of a representation in components information node symbol x=a, be designated asSimilar,From check-node z to the message vector of information node x when representing the l time iteration,ForThe a component;μy→zRepresent from information source node y to the message vector of check-node z, μy→zA () is μy→zThe a component;λlRepresent the reliability vector of information node x, λ after the l time iterationlA () is λlThe a component;
Information source node message initialization is as shown in formula RBP-1;
μy→z(a)∝exp(-2βdH(y, a)) (RBP-1)
In formula RBP-1, parameter beta be chosen as meeting following formula on the occasion of solution:
Lncosh β-β tanh β+Rln2=0
Information node message initialization is as shown in formula RBP-2;
μ x → z 1 ( a ) = 1 / q ± dither - - - ( RBP - 2 )
Wherein, dither is (0,1/q2Equally distributed random number between);
Check-node information updating is as shown in formula RBP-3;
μ z → x l ( a ) = Σ g x ′ z a 1 + a 2 = - g xz a μ x ′ ∈ V ( z ) \ { x } → z l ( a 1 ) · μ y → z ( a 2 ) - - - ( RBP - 3 )
Wherein, gx`zRepresent the nonzero element value of z row xth ` row, g in generator matrix AxzRepresent the nonzero element value of z row xth row in generator matrix A;
Information node reliability updates as shown in formula RBP-4;
λ l ( a ) = α Π z ∈ C ( x ) μ z → x l ( a ) - - - ( RBP - 4 )
Information node information updating is as shown in formula RBP-5;
μ x → z l + 1 ( a ) ∝ ( λ 1 ( a ) ) γ ( l ) Π z ′ ∈ C ( x ) \ { z } μ z ′ → x l ( a ) - - - ( RBP - 5 )
Wherein, γ (l) is defined asr0, r1∈ [0,1].
Above-mentioned, the iteration stopping condition of RBP algorithm is: iterations l reaches a predetermined maximum Lmax;Or there is formula (4) to set up for all of information node and check-node;
μ z → x l + 1 ( a ) = μ z → x l ( a ) - - - ( 4 )
After RBP algorithm calculates, obtaining the probability of all symbol a in each information node according to formula RBP-4, the symbol a taking maximum probability in each information node constitutes compressed sequence x, then the code length of x is m, because m is less than n, it is achieved that the compression to source sequence y, i.e. BSS encodes.
Further, in RBP algorithm, owing to degree is dxThe computation complexity of information node be O (dxQ), degree be the computation complexity of check-node (i.e. including 2 information node neighbours and 1 information source node neighbour) of 3 be O (32·q2).In order to reduce complexity, the information updating of check-node can use the fast fourier transform of formula (5) to realize;
μ z → x l ( a ) = F - 1 ( F ( μ C ( z ) \ { x } → z l ( a ) ) · F ( μ y → z ( a ) ) ) - - - ( 5 )
Wherein, F and F-1Represent respectively and use fast fourier transform and fast Flourier inverse transformation.Using fast fourier transform, the complexity of the Fourier transform of the message vector of each check-node is O (p q), wherein p=log2q.The computation complexity of the most each check-node is O (32P q), code length (symbol lengths) be the encoder complexity of the LDGM code of n be O (32P q n), it can be seen that complexity O (32P q n) it is linear complexity.
In the present invention, can by reconstruct source sequence verification and measurement ratio distortion performance, can set reconstruct source sequence asAccording to the compressed sequence x obtained in the generator matrix A in step 101 and step 103, according toReconstruct source sequence.
Such as, according to above-mentioned method, when q=8, i.e. when GF (q) is GF (8), it is assumed that code length is n=4000 GF (8) symbol, corresponding bit length is 12000, γ1=0.9995, γ0=0.95, Lmax=300, the value of parameter beta is as shown in table 1, code check R value is R=0.1,0.2 ..., 0.9;Then in the distortion performance such as Fig. 3 of GF (8) the upper LDGM code employing RBP encryption algorithm under different code checks shown in " ", the distortion performance of TAP method represents with "○" in figure 3, as can be seen from the figure, the distortion performance of the present embodiment compares the distortion performance of TAP method improvement greatly, and the distortion performance of the present embodiment is closer to rate distortion Capacity Ratio.
Table 1
When q=16, i.e. when GF (q) is GF (16), it is assumed that code length is n=3000 GF (16) symbol, corresponding bit length is 12000, γ1=0.9995, γ0=0.95, Lmax=300, the value of parameter beta is as shown in table 1, code check R value is R=0.1,0.2 ..., 0.9;Then in the distortion performance such as Fig. 3 of GF (16) the upper LDGM code employing RBP encryption algorithm under different code checks shown in " △ ", as can be seen from the figure, the distortion performance of this embodiment is compared the upper LDGM code of GF (8) of same code length and is used the distortion performance of RBP encryption algorithm to improve, and with rate distortion capacity closely.Wherein, when code check≤0.5, the distortion performance distance rate distortion capacity of the present embodiment is less than 0.005;When code check > 0.5, the distortion performance distance rate distortion capacity of the present embodiment is less than 0.01.
When q=256, i.e. when GF (q) is GF (256), it is assumed that code length is n=1500 GF (256) symbol, corresponding bit length is 12000, γ1=0.9995, Lmax=300, γ0Being chosen as testing optimal value, the value of parameter beta is as shown in table 1, code check R value is R=0.1,0.2 ..., 0.9;Then in the distortion performance such as Fig. 3 of GF (256) the upper LDGM code employing RBP encryption algorithm under different code checks shown in " ◇ ", it can be seen that the upper LDGM code of GF (16) that the distortion performance of the present embodiment compares same code length uses the distortion performance of RBP encryption algorithm to only have raising more by a small margin.
In order to realize said method, present invention also offers a kind of binary symmetric source coding device, as shown in Figure 4, this device includes: generator matrix module 41, compressed sequence module 42 wherein,
Generator matrix module 41, for constructing the generator matrix of polynary LDGM code according to code check and code length, and notifies compressed sequence module 42 by generator matrix;
Concrete, the check matrix of the cyclic LDPC code that generator matrix module 41 uses one size of PEG algorithm construction to be m × n, wherein, m is the product of code check and code length, and n is code length, and m is less than n, and the element on only two positions is 1 in each column, on other positions, element is 0;Then by element that value each in check matrix is 1 with uniform probability random replacement for set 1,2 ..., the arbitrary element in q-1}, q is the positive integer more than 3;Finally verification matrix transpose is obtained the generator matrix of the polynary LDGM code that size is n × m, and by generator matrix notice reconstruct source sequence module 43;
Compressed sequence module 42, for after given source sequence, uses RBP encryption algorithm to compress source sequence according to the generator matrix of generator matrix module 41 structure, it is thus achieved that compressed sequence;
Further, when described compressed sequence module 42 uses the information updating that RBP encryption algorithm calculates check-node, use fast fourier transform to calculate the information updating of check-node, specifically may refer to formula (5), repeat no more here.
The above, only presently preferred embodiments of the present invention, it is not intended to limit protection scope of the present invention, all any amendment, equivalent and improvement etc. made within the spirit and principles in the present invention, should be included within the scope of the present invention.

Claims (5)

1. the method for a binary symmetric source coding, it is characterised in that the method includes:
The generator matrix of polynary low-density generated matrix LDGM code is constructed according to code check and code length;
After given source sequence, use enhancement mode belief propagation RBP encryption algorithm that source sequence is compressed according to the generator matrix of structure, it is thus achieved that compressed sequence;
The described generator matrix constructing polynary low-density generated matrix LDGM code according to code check and code length, particularly as follows: the check matrix of the cyclic low-density parity check LDPC code using progressive edge increasing one size of PEG algorithm construction to be m × n, wherein, m is the product of code check and code length, n is code length, m is 1 less than the element on only two positions on n, and each column, and on other positions, element is 0;By element that value each in check matrix is 1 with uniform probability random replacement for set 1,2 ..., the arbitrary element in q-1}, q is the positive integer more than 3;Finally verification matrix transpose is obtained the generator matrix of the polynary low-density generated matrix LDGM code that size is n × m.
Method the most according to claim 1, it is characterised in that the method farther includes: when the information updating using enhancement mode belief propagation RBP encryption algorithm to calculate check-node, uses fast fourier transform to calculate the information updating of check-node.
Method the most according to claim 1, it is characterised in that described code check and code length are determined according to sequence to be compressed by the System Control Center being responsible for information allotment.
4. the device of a binary symmetric source coding, it is characterised in that this device includes: generator matrix module, compressed sequence module, reconstruct source sequence module;Wherein,
Generator matrix module, for constructing the generator matrix of polynary low-density generated matrix LDGM code according to code check and code length, and notifies compressed sequence module by generator matrix;
Compressed sequence module, for after given source sequence, uses enhancement mode belief propagation RBP encryption algorithm to compress source sequence according to the generator matrix of generator matrix module structure, it is thus achieved that compressed sequence;
Described generator matrix module constructs the generator matrix of polynary low-density generated matrix LDGM code according to code check and code length, the check matrix of the cyclic low-density parity check LDPC code that one size of PEG algorithm construction is m × n particularly as follows: generator matrix module uses progressive edge to increase, wherein, m is the product of code check and code length, n is code length, m is 1 less than the element on only two positions on n, and each column, and on other positions, element is 0;Then by element that value each in check matrix is 1 with uniform probability random replacement for set 1,2 ..., the arbitrary element in q-1}, q is the positive integer more than 3;Finally verification matrix transpose is obtained the generator matrix of the polynary low-density generated matrix LDGM code that size is n × m, and by generator matrix notice reconstruct source sequence module.
Device the most according to claim 4, it is characterised in that described compressed sequence module, when being further used for the information updating using enhancement mode belief propagation RBP encryption algorithm calculating check-node, uses fast fourier transform to calculate the information updating of check-node.
CN201010212112.5A 2010-06-18 2010-06-18 A kind of method and apparatus of binary symmetric source coding Expired - Fee Related CN101877591B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201010212112.5A CN101877591B (en) 2010-06-18 2010-06-18 A kind of method and apparatus of binary symmetric source coding

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010212112.5A CN101877591B (en) 2010-06-18 2010-06-18 A kind of method and apparatus of binary symmetric source coding

Publications (2)

Publication Number Publication Date
CN101877591A CN101877591A (en) 2010-11-03
CN101877591B true CN101877591B (en) 2016-08-03

Family

ID=43020066

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010212112.5A Expired - Fee Related CN101877591B (en) 2010-06-18 2010-06-18 A kind of method and apparatus of binary symmetric source coding

Country Status (1)

Country Link
CN (1) CN101877591B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103095312B (en) * 2012-12-28 2016-03-16 中国科学院微电子研究所 source coding method and device
CN107919941B (en) * 2016-10-10 2022-01-25 深圳市硅派科技有限公司 Modulation-demodulation method and device based on overlapping multiplexing

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7414549B1 (en) * 2006-08-04 2008-08-19 The Texas A&M University System Wyner-Ziv coding based on TCQ and LDPC codes
CN101459430A (en) * 2007-12-14 2009-06-17 中兴通讯股份有限公司 Encoding method low density generation matrix code
CN101471743A (en) * 2007-12-28 2009-07-01 中兴通讯股份有限公司 Method for encoding low density generated matrix code

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7414549B1 (en) * 2006-08-04 2008-08-19 The Texas A&M University System Wyner-Ziv coding based on TCQ and LDPC codes
CN101459430A (en) * 2007-12-14 2009-06-17 中兴通讯股份有限公司 Encoding method low density generation matrix code
CN101471743A (en) * 2007-12-28 2009-07-01 中兴通讯股份有限公司 Method for encoding low density generated matrix code

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Lossy Source Compression Using Low-Density Generator Matrix Codes: Analysis and Algorithms;Martin J.Wainwright ,et al;《IEEE Transactions on Information Theory》;20100331;第56卷(第3期);摘要,第1部分,第2部分,第4部分的B部分,附录的B部分 *

Also Published As

Publication number Publication date
CN101877591A (en) 2010-11-03

Similar Documents

Publication Publication Date Title
Li et al. Algebra-assisted construction of quasi-cyclic LDPC codes for 5G new radio
US8433972B2 (en) Systems and methods for constructing the base matrix of quasi-cyclic low-density parity-check codes
KR20210032007A (en) Encoding method and decoding method and device for structured ldpc
KR20070058480A (en) Method of encoding and decoding using low density parity check matrix
US20080008270A1 (en) Code Design Method for Repeat-Zigzag Hadamard Codes
CN101159435B (en) Low density check code check matrix constructing method based on shift matrix classified extension
CN100508442C (en) Coding-decoding method and device
CN101373976A (en) Method and equipment for generating LDPC check matrix
CN110999092B (en) Reduced pre-ordered syndrome-based Extended Minimum Sum (EMS) decoding of non-binary LDPC codes
Pishro-Nik et al. Results on punctured LDPC codes
CN101488760B (en) Encoding method for low code rate LDPC code
CN101877591B (en) A kind of method and apparatus of binary symmetric source coding
CN103199877B (en) Method for constructing and coding structured LDPC (Low Density Parity Check) convolutional codes
Ma Coding theorem for systematic low density generator matrix codes
CN105871385B (en) A kind of LDPC convolutional-code building method
Kalsi et al. A base matrix method to construct column weight 3 quasi-cyclic LDPC codes with high girth
Ren et al. The design and implementation of high-speed codec based on FPGA
Yuan et al. A new coding scheme of QC-LDPC codes for optical transmission systems
CN103401655A (en) LDPC decoding message storage structure and decoding method
Xiao et al. Alternative good LDPC codes for DVB-S2
He et al. Disjoint-set data structure-aided structured Gaussian elimination for solving sparse linear systems
Zhu et al. Array based quasi-cyclic LDPC codes and their tight lower bounds on the lifting degree
Mazumdar et al. Local recovery properties of capacity achieving codes
Mu et al. Improved construction of LDPC convolutional codes with semi-random parity-check matrices
CN105471444A (en) Coding method for LDPC codes

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20180705

Address after: California, USA

Patentee after: Global innovation polymerization LLC

Address before: 518057 Nanshan District high tech Industrial Park, Shenzhen, Guangdong, Ministry of justice, Zhongxing Road, South China road.

Patentee before: ZTE Corp.

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160803