CN100391141C - Coding parameter blind identification of fault tolerant code communicating channel - Google Patents

Coding parameter blind identification of fault tolerant code communicating channel Download PDF

Info

Publication number
CN100391141C
CN100391141C CNB2005100279701A CN200510027970A CN100391141C CN 100391141 C CN100391141 C CN 100391141C CN B2005100279701 A CNB2005100279701 A CN B2005100279701A CN 200510027970 A CN200510027970 A CN 200510027970A CN 100391141 C CN100391141 C CN 100391141C
Authority
CN
China
Prior art keywords
communication
blind identification
homogeneous
fault
tolerant
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB2005100279701A
Other languages
Chinese (zh)
Other versions
CN1713559A (en
Inventor
陆佩忠
邹艳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fudan University
Original Assignee
Fudan University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fudan University filed Critical Fudan University
Priority to CNB2005100279701A priority Critical patent/CN100391141C/en
Publication of CN1713559A publication Critical patent/CN1713559A/en
Application granted granted Critical
Publication of CN100391141C publication Critical patent/CN100391141C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The present invention belongs to the field of intelligence communication and information safety technology, particularly to a coding parameter blind identification method of a fault-tolerant code communicating channel. In the fields of the future intelligent mobile communication, broadcast multipoint communication and communication acquisition, a channel coding mode needs changing at any time following the change of time and environment in order to obtain the optimal communication efficiency and service quality. In the communication environment, the synchronous communication of persons who need multi-party communication can not be realized by a protocol generally; therefore, multi-part rapid blind identification which can realize channel coding parameters only by signal contents needs receiving so as to achieve the purpose of intelligent communication. Aiming at the requirement of intelligent communication, the present invention provides a coding parameter blind identification model without a protocol of a fault-tolerant code communicating channel; the model is quickly solved by solving a Homogeneous Key Module Equation (HKME); consequently, the quick coding blind identification without the protocol communication of a fault-tolerant channel is realized.

Description

A kind of communication channel blind identification method for coding parameters of error-tolerant code
Technical field
The invention belongs to intelligence communication and field of information security technology, be specifically related to a kind of communication channel blind identification method for coding parameters of error-tolerant code.
Technical background
In intelligent mobile communication, broadcast multipoint communication and the information acquisition field in future, along with the variation of time and environment need change channel coding method at any time, so that obtain optimum communication efficiency and service quality.In this communication environment, generally can't therefore need to receive the quick blind identification that can only realize the chnnel coding parameter in many ways by the agreement person's that realizes the multi-party communication synchronous contact by the content of signal, reach the purpose of intelligence communication.
The blind identification of signal (Blind Identification) technology is the field, forward position of current Communication Studies. and its target is in order to set up normal communication under the prerequisite that does not have training sequence (Training Sequence) equalization channel. and blind recognition technology is in communication, information theory, fields such as cybernetics and systematology have broad application prospects.
If F is a territory, establishing Z is an integer item, and N is a positive integer. the blind identification problem of so-called convolution code specifically describes as follows: establish a part of sequence of known convolution code sign indicating number sequence, with the polynomial repressentation on the integer item Z: C i(D)=c I0+ c I1D+c I2D 2+ ... + c IND N, i=1,2 ... k.Obtain the generator polynomial g of the encoder for convolution codes that can generate this codeword sequence i(D)=g I, 0+ g I, 1D+ ... + g I, tD t, i=1,2 ... k.For for simplicity, establish k=2.
Can adopt Gaussian elimination method to find the solution g i(D), but the Gauss elimination is not fault-tolerant, that is, each coefficient in the coefficient matrix in the equation group that find the solution can not be wrong.In the communication of routine, the error rate is 10 -2To 10 -3Between be recurrent.In order the identification that realize convolution code and other chnnel coding parameters under the situation of error code to be arranged, usually to adopt the lot of data acquisition test to calculate, by hundreds of times even tens thousand of secondary data collections and test calculating, making it possible to take a chance obtains one group of data of not having error code, solves separating of system of linear equations then.And the computation complexity of Gaussian elimination method is O (N 3).For example, the convolution code to 7/8 will be estimated t=60 usually, therefore, needs to gather about N=8 * 9 * 61=4392 the bit of zero defect continuously at least.Like this, be prob (e in the error rate Ij=1) under the condition=0.005, must carry out 8 * 10 9Repeatedly data are intercepted and captured, and can reach the bit that probability more than 95% is chosen 4392 zero defects.In order to make the Gauss elimination that unique solution be arranged, need 4 * 10 approximately 10Repeatedly sampling of data and Equation for Calculating.As seen the image data amount is very huge, and computational complexity is 3.2 * 10 21With computing last time.
In order to realize the fast decoding of BCH code, Berlekamp (1968) [Berl] has proposed key equation KE, and to have provided computational complexity be O (N 2) famous KE derivation algorithm .Massey (1969) [Mass] synthtic price index of linear recurring sequence (LRS) summed up in the point that find the solution the KE equation, and provided and iterated algorithm. above-mentioned algorithm now is called Berlekamp-Massey algorithm (abbreviating the BM algorithm as).
So-called key equation KE be to find the solution following element to (f (x), L) ∈ F[x] * Z, satisfy:
f(x)C 1(x)≡b(x)modx N+1
And make 0≤degb (x)<L, and f (0) ≠ 0, degf (x)≤L, and L reaches minimum.
Owing to find the solution the importance of KE, the contact of seeking new algorithm and disclosing the various inherences of existing algorithm is a flourishing long time research topic [Chen] in the field such as information theory, [Heyd], [Kail], [Kuij]. the efficiency parameters to the comprehensive relevant algorithm of LRS is one of cryptanalytic important evaluation criterion. and the BM algorithm has also been made special chip as the standard decoding algorithm of RS sign indicating number, be widely used in the storage of various communications and multimedia, improved everyone quality of life.
The present invention is summed up as a homogeneous crucial modular equation HKME with the quick blind identification problem of fault-tolerant chnnel coding of no-protocol contact, and with the polynomial ring F[x of two arguments, y] homogeneous ideal portray homogeneous crucial modular equation.
HKME has promoted KE.But it promotes direction and G.L.Feng[Feng] and S, Sakata[Saka] the popularization direction all different.The new direction of the present invention's research has stem-winding future.In fields such as intelligence communication, information acquisition and cryptanalysises important use is arranged.
List of references
[Adam]W.W.Adams and P.Loustaunau,An Introduction to Gr\″obner Bases,Amer.Math.Society,1994.
[Berl]E.R.Berlekamp,Algebraic Coding Theory,McGrw-Hill,New York,1968.
[Chen]M.H.Cheng,Generalised Berlekamp-Massey Algorithm,IEE Proceedings Communications,Vol.149(4),207-210,August 2002.
[Feng]G.L.Feng,K.K.Tzeng,A New Procedure for Decoding Cyclic and BCH Codes up to Actual MinimunDistance,IEEE Trans.on Inform.Theory,vol.40,No.5,1994,pp1364-1374.
[Heyd]A.E.Heydtmann and J.M.Jensen,ON the Equivalence of the Berlekamp-Massey and the EuclideanAlgorithms for Decoding,IEEE Trans.Inform.Theory,vol.46(7),2614-2624,2000.
[Kail]T.Kailath,Encounters with the Berlekamp-Massey Algorithm,in Communication and Cryptography,edited by R.E.Blahut,etl.Kluwer Academic Publisher,pp.209-220,1994.
[Kuij]]M.Kuijper and J.C.Willems,″On constructing a shortest linear recurrence relation,″IEEE Trans.Automat.Contr.vol.42,No.11,p1554-1558,1997.
[Lu05] Lu Peizhong, Shen Li, Zou Yan, Luo Xiangyang, the blind identification of deletion convolution code, Chinese science E collects, and 35 (2), 173-185,2005.
[Mass]Massey,J L,Shift-Register Synthesis and BCH Decoding,IEEE Trans.Info.Theory,15(1):122-127,1969.
[Saka]S.Sakata,Synthesis of Two-Dimensional Linear Feedback Shift-Registers and Groebner Basis,LectureNotes in Comput.Sci.356,Springer-Verlag,Berlin,1989.
Summary of the invention
The objective of the invention is to propose the error-tolerant code communication channel blind identification method for coding parameters of low, the widely applicable no-protocol contact of a kind of computational complexity.
The communication channel blind identification method for coding parameters of the error-tolerant code that the present invention proposes comprises the structural model of the blind identification of fault-tolerant chnnel coding of a no-protocol contact of design, sets up the homogeneous crucial modular equation HKME of this structural model; And propose to find the solution the pairing algorithm of the SY2SY of this homogeneous crucial modular equation HKME, this model is carried out rapid solving, thereby realize the quick blind identification of fault-tolerant chnnel coding of no-protocol contact.
1, model
Sequence synthtic price index can be described as: known array c=(c 0, c 1..., c N), ask can formation sequence the proper polynomial of number of times minimum of c.Traditional linear recurring sequence collective model such as Fig. 3 represent.
Because the primary signal of being obtained under the information acquisition background must have serious error code.Therefore must seek the problem that new method goes to find the solution the blind identification of signal parameter, determine the signal data form rapidly, entanglement form, error correction coding mode and frame structure form etc.The fault-tolerant analysis-by-synthesis of sequence is the basic problem in the cryptanalysis.
The difficult point of problem is fault-tolerance.The progression of different with the problem of finding the solution that contains wrong linear equation on the finite field is linear recurrence without limits.If therefore the progression of linear recurrence is oversize, it is infeasible then studying this problem with DISCRETE W alsh spectral method.
We start with from the desirable global nature of analysis recursion sequence and algebraically, have found many methods of finding the solution this problem.The present invention adopts a new Mathematical Modeling delineation to contain the synthtic price index of incorrect order row.Originally the key equation that was used to describe the BM algorithm is transformed into a homogeneous ideal equation.With a desirable linear recurrence that writes down all local sequences of all different starting points of sequence of reflection of relation.Therefore model of the present invention has been widened the implication of Berlekamp (1968) about the Mathematical Modeling of the comprehensive key equation of sequence widely.Our target is to calculate this homogeneous relation ideal apace, and further analyzes its graded algebra structure.Because the desirable rigid structure of relation has very strong fault-tolerance, therefore, utilize the multiple Syzygy decomposition computation of polynomial algebra mould, with some characteristic parameters of overall importance that utilize graded algebra (for example Hilbert function), can filter out the desirable generator of the most rational linear recurrence, thereby obtain correct answer about the linear recurring sequence synthtic price index that contains error code.Show through a large amount of real analysis of experimental data: the fault-tolerant synthtic price index of linear recurring sequence can change into pure calculating algebraic geometry problem.Can be with calculating algebro geometric Algebraic Structure and algorithm rule, the global nature of delineation linear recurrence.The stochastic variable that so just can overcome on the finite field can't use the method for statistics to disclose the difficulty of global nature.
Fig. 4. the structural model of the blind identification of fault-tolerant chnnel coding that a kind of no-protocol of having illustrated the present invention to propose is got in touch with.Promptly for the burst of receiving, through the syzygies decomposition algorithm, find out the homogeneous ideal structure of the whole recurrence relations all relevant with each part of sequence, graded ideal is cleared up algorithm and is obtained optimal solution then.
2, homogeneous key equation
We adopt the structural model of the blind identification of fault-tolerant chnnel coding of following equation portrayal no-protocol contact:
If F is a territory, F[x, y] be the polynomial ring on the F; If
C i(x, y)=c I0y N+ c I1Xy N-1+ c I2x 2y N-2+ ... + c INx N, i=1,2 ..., k (1) is F[x, y] in t quantic; If I=<x N+1, y N+1Be F[x, y] by x N+1, y N+1Generated ideal.
Homogeneous crucial modular equation HKME: ask F[x, y]-Mo
Γ (k)={ (H 1..., H k) ∈ F[x, y] k| H 1C 1(x, y)+... + H kC k(x, y) the minimum standard generator of ≡ 0modI} (2).
In above-mentioned crucial modular equation, work as k=1, problem has become sequence synthtic price index.As shown in Figure 2, the synthtic price index of linear recurring sequence (LRS) is the special case of convolution code identification problem, at this moment, as long as linear recurring sequence is regarded as the code word of a convolution code, wherein LRS is I (D) information output sequence, and the verification road output sequence that complete 0 sequence is a coded sequence, because omit when being the output of identical sequence.This is the code word of a systematic convolutional code.
3, fast algorithm
For understanding the algorithm of this section easily, we introduce GB base theoretical [Adam] briefly.
If F is a territory, F[x 1..., x n] be n the indeterminate x that have on the F of territory 1..., x nPolynomial ring.At F[x 1..., x n] individual event set go up a definition Xiang Xu ">".Like this, for f ∈ F[x 1..., x n], f can be expressed as f = α 1 X α 1 + α 2 X α 2 + · · · + α r X α r ,
0 ≠ α wherein i∈ F, α i=(e I1..., e In) ∈ Z + n, X α i = x 1 e i 1 · · · x n e in , and X α 1 > X α 2 > · · · > X α r 。At this moment, claim lp ( f ) = X α 1 The first power that is f is long-pending; Lc (f)=α iIt is the leading coefficient of f; lt ( f ) = a 1 X α 1 It is the first term of f.
If 0 ≠ f, g ∈ F[x 1..., x n], L=lcm (lp (f), lp (g)), promptly L is lp (f), the least common multiple of lp (g) then claims S ( f , g ) = L lt ( f ) f - L lt ( g ) g It is the S multinomial of f and g.
Given F[x 1..., x n] in two polynomial f, h and a subclass G={f 1..., f t, if h=f-is (c 1X 1f 1+ ... + c tX tf t), c wherein i∈ F, X iBe the power product term, satisfy lp (f)=X iLp (f i), lp (h)<lp (f) then is designated as f → G h . ; If there is h i∈ F[x 1..., x n], make f → G h 1 → G · · · → G h s → G h , Then be designated as f → G + h .
To K={f 1, f 2..., f k∈ F[x 1..., x n], the syzygies of K is following F[x 1..., x n] on finitely generated module:
Syzygy(K)={(h 1,...,h k)∈F[x 1,…,x n] k|h 1f 1+…+h kf k=0}
Below fast algorithm, ask homogeneous ideal<K〉GB base and corresponding syzygies Syzygy (K).
Sy2Sy pairing algorithm concrete steps:
Input: the homogeneous set K={f of strict ordering 0, f 1..., f l}
Output: GB base G makes<G 〉=<K〉and the generators set of syzygies Syzygy (K).
(1) initial:
If (f 0,0, f 1,0..., f L, 0)=(f 0, f 1..., f l).And establish:
(deg yLp (f 0), deg xLp (f 0))=min I=0,1 ..., l(deg yLp (f i), deg xLp (f i)), here, integer vectors (n 1, m 1)≤(n 2, m 2), and if only if n 1<n 2, perhaps n 1=n 2And m 1≤ m 2If g 0=f 0, A (0)=I is a unit matrix, G={g 0, K 0={ f 1..., f l.
(2) suppose that k step finished following algorithm:
Selected go out to gather G and by G reduction residual polynomial set K k, satisfy following relation:
<G∪K k>=<K>,
K=0 wherein, 1 ..., l.G={g 0, g 1..., g k, K k={ f 1, k, f 2, k..., f L, k,
And calculated coefficient matrices A (k)Satisfy
f 0 , k f 1 , k . . . f l . k = A ( k ) f 0,0 f 1,0 . . . f l . 0 ,
And note A i (k)It is matrix A (k)I capable, i=0,1 ..., l.
(3) the k+1 step will be carried out following calculating:
1) selects f 0, k+1, f 0, k+1Be K kIn a special polynomial f S, k, satisfy
( deg y lp ( f s , k ) , deg x lp ( f s , k ) ) = min f &Element; K k ( deg y lp ( f i , k ) , deg y lp ( f i , k ) ) ,
g k + 1 = &Delta; f 0 , k + 1 = &Delta; f s , k , G = G &cup; { g k + 1 }
2) calculate S ( g k , g k + 1 ) &RightArrow; G + f s , k + 1 = y l k + 1 f 0 , k - q s , k f 0 , k + 1
3) calculate f i , k &RightArrow; G + f i , k + 1 = f i , k - q i , k f 0 , k + 1 , I ≠ 0 wherein, i ≠ s.
Above-mentioned each step has been finished following calculating
f 0 , k + 1 . . . f i , k + 1 . . . f s , k + 1 . . . f j , k + 1 . . . = f s . k . . . f i , k - q i , k f s , k . . . y l k + 1 f 0 , k - q s , k f s , k . . . f i , k - q j , k f s , k . . . ,
K k+1={f 1,k+1,…,f l,k+1}
4) corresponding above-mentioned each step, the design factor matrix:
A ( k + 1 ) = A 0 ( k + 1 ) . . . A i ( k + 1 ) . . . A s ( k + 1 ) . . . A j ( k + 1 ) . . . = A s ( k ) . . . A i ( k ) - q i , k A s ( k ) . . . y l k + 1 A 0 ( k ) - q s , k A s ( k ) . . . A j ( k ) - q i , k A s ( k ) . . .
(4) stop condition:, make f up to l step 1, l=f 2, l=...=f L, l=0.
(5) output: G and coefficient matrices A (l)
Sy2Sy realizes following the generator A that calculates syzygies Syzygy (K) by the GB base G of calculating K 1 (l)..., A l (l), at the vectorial A of each row i (l)In choose the row of degree of polynomial minimum, comprehensive exactly needed the separating of (Synthesis) construction problem.
So the blind identification problem of convolution code is changed into the computational problem of Syzygy, and the computation complexity of Sy2Sy algorithm is O (N 2).
If sequence is comprehensive, ask sequence C 1(x, feature ideal y) are then asked following desirable GB base and corresponding Syzygy:
K={f 0=x N+1,f 1=C 1(x,y),f 2=y N+1}
If require the blind identification of convolution code, then ask following desirable GB base and corresponding Syzygy:
K={x N+1,C 1(x,y),...,C k(x,y),y N+1}
As long as calculate the GB base, then corresponding Syzygy also just follows simultaneously and obtains, and the major event of computational complexity is exactly to calculate the computational complexity of GB base.
We prove theoretically that the computation complexity of SY2SY algorithm is O (N 2), wherein N is the sampling input data volume that observes.Therefore the SY2SY algorithm has reached almost ideal degree at aspects such as computational complexity and space complexities.
To sum up, the present invention proposes a kind of structural model of the blind identification of fault-tolerant chnnel coding of no-protocol contact, set up the homogeneous key equation (HKME) of describing this structural model, provided the quick SY2SY algorithm of finding the solution this HKME.This algorithm has utilized the Algebraic Structure of HKME, by finding the solution the computational process of the desirable GB base of binary polynomial, determines this desirable syzygies of following out to reach synthesis structure by syzygies in computational process.
The significant key equation KE that is proposed by Berlekamp is the special case of HKME of the present invention when k=1.
The BM algorithm that is proposed by Berlekamp and Massey is the special case of SY2SY algorithm of the present invention at k=1 the time.
The present invention has utilized HKME and has become application software and chip with the SY2SY algorithm development.And, be made into the various products in communication and the information security field, comprise: utilize the limited data from the sample survey of observing, realize that the synthesis structure device of minimal linear recurrence generating apparatus, the key of stream cipher generate the application software of integration unit, the blind identification of algebraic coding parameter, the decoder of cyclic code, the big number of rapid solving involved extensive sparse linear equation group in decomposing.
Description of drawings
The coding of Fig. 1 convolution code.g 1(D), g 2(D) be the multinomial that unknown needs are found the solution, I (D) is unknown information sequence multinomial, and C 1(D), C 2(D) be the codeword sequence multinomial of known finite length.How only from the sequence C of finite length 1(D), C 2(D) the anti-generator polynomial g that releases convolution code 1(D), g 2(D) be the problem that homogeneous crucial modular equation that the present invention proposes will be described.
Fig. 2 shows that LRS synthtic price index is the special case of the blind identification problem of convolution code.
Fig. 3. conventional not fault-tolerant synthesis structure model.
Fig. 4. illustrated the model of the blind identification of fault-tolerant chnnel coding of a kind of no-protocol contact.
Embodiment
Below by a Practical Calculation example, computational process of the present invention is described.
Example calculation
We have obtained the two-way sequence: 111110111000001101
001011110010000111
Ask the generator polynomial of the convolution code of 1/2 code check that can generate this two-way sequence.Establish for this reason
f 0=x 17+x 16y+x 15y 2+x 14y 3+x 13y 4+x 11y 6+x 10y 7
+x 9y 8+x 3y 14+x 2y 15+y 17
f 1=x 18
f 2=x 15y 2+x 13y 4+x 12y 5+x 11y 6+x 10y 7
+x 7y 10+x 2y 15+xy 16+y 17
f 3=y 18
Step 0
f 0,0=f 0, this goes on foot corresponding pairing algorithm steps (1)
(1,0) f 0,0=f 0 =x 17+x 16y+x 15y 2+x 14y 3+x 13y 4+x 11y 6 +x 10y 7+x 9y 8+x 3y 14+x 2y 15+y 17
(0,0)-(x+y)(1,0) f 1,0=f 1,-1-(x+y)f 0 =x 13y 5+x 12y 6+x 9y 9+x 4y 4+x 2y 16+xy 17
(0,1) f 2,0=f 2 =x 15y 2+x 13y 4+x 12y 5+x 11y 6+x 10y 7 +x 7y 10+x 2y 15+xy 16+y 17
(0,0) f 3,0=f 3 =y 18
Wherein matrix A is shown in first tabulation of the form of k in the step (k+1)The 1st row and the 3rd be listed as.
Step 1
f 0,1=f 2,0=f 2, this step is a corresponding SY2SY algorithm steps (3), 1) and the step
(0,1) f 0,1=f 2,0 =x 15y 2+x 13y 4+x 12y 5+x 11y 6 +x 10y 7+x 7y 10+x 2y 15+xy 16+y 17
(0,0)-(x+y,0) f 1,1=f 1,0 =x 13y 5+x 12y 6+x 9y 9+x 4y 4+x 2y 16+xy 17
y 2(1,0) +(x 2+xy)(0,1) f 2,1=y 2f 0,0 +(x 2+xy)f 2,0 =x 14y 5+x 13y 6+x 10y 9+x 8y 11 +x 4y 15+x 3y 16+x 2y 17
(0,0) f 3,1=f 3,0 =y 18
Step 2
f 0,2=f 1,1, this step is a corresponding SY2SY algorithm steps (3), 1) and the step
(x+y,0) f 0,2=f 1,1 =x 13y 5+x 12y 6+x 9y 9+x 4y 4+x 2y 16+xy 17
y 3(0,1) +(x 2+xy)(x+y,0) f 1,2=y 3f 0,1 +(x 2+xy)f 1,1In the corresponding algorithm (3), 2) step =x 12y 8+x 7y 13+x 6y 14+x 5y 15+x 4y 16
(y 2,x 2+xy) +x(x+y,0) f 2,2=f 2,1+xf 1,1In the corresponding algorithm (3), 3) step =x 8y 11+x 4y 15+x 5y 14
(0,0) f 3,1=f 3,0 =y 18
Step 3
f 0,3=f 1,2
(x 3+xy 2,y 3) f 0,3=f 1,2 =x 12y 8+x 7y 13+x 6y 14+x 5y 15+x 4y 16
y 3(x+y,0) +(x+y)(x 3+xy 2,y 3) f 1,3=y 3f 0,2 +(x+y)f 1,2 =x 9y 11+x 8y 13
(y 2+x 2+x 2,x 2+xy) f 2,3=f 2,2 =x 8y 11+x 4y 15+x 5y 14
(0,0) f 3,3=f 3,2 =y 18
Step 4
f 0,4=f 2,3
(y 2+x 2+xy,x 2+xy) f 0,4=f 2,3 =x 8y 11+x 4y 15+x 5y 14
(x 4+x 2y 2+x 3y+y 4,xy 3+y 4) +(xy+y 2)(y 2+x 2+xy,x 2+xy) f 1,4=f 1,3 +(xy+y 2)f 2,3 =x 6y 15+x 4y 17
y 3(x 3+xy 2,y 3) +(x 4+xy 3+y 4)(y 2+x 2+xy,x 2+xy) f 2,4=y 3f 0,3 +(x 4+xy 3+y 4)f 2,3 =x 7y 16
(0,0) f 3,4=f 3,3 =y 18
Step 5
f 0,5=f 1,4
(x 4+x 2y 2,y 4+x 3y) f 0,5=f 1,4 =x 6y 15+x 4y 17
y 4(y 2+x 2+xy,x 2+xy) +(x 2+y 2)(x 4+x 2y 2,y 4+x 3y) f 1,5=y 4f 0,4+(x 2+y 2)f 1,4 =0
(xy 5+x 4y 2+x 6+x 5y+y 6,y 6+x 6+x 5y+x 3y 3+xy 5) +xy(x 4+x 2y 2,y 4+x 3y) f 2,5=f 2,4+xyf 1,4 =0
(0,0) f 3,4=f 3,3 =y 18
Step 6
f 0,6=f 3,5
(0,0) f 0,6=f 3,5 =y 18
(x 6+xy 5+y 6,x 5y+x 3y 3+xy 5+y 6) f 1,6=f 1,5 =0
(x 6+x 4y 2+x 3y 3+xy 5+y 6,x 6+x 5y +x 4y 2+x 3y 3+y 6) f 2,6=f 2,5 =0
y 3(x 4+x 2y 2,y 4+yx 3) f 3,6=y 3f 0,5+(x 6+x 2y 4)f 3,5 =0
Obtain GB base G={f 0,0, f 0,1, f 0,2, f 0,3, f 0,4, f 0,5, f 0,6, in the above-mentioned frame, first row have constituted matrix A (l)At A (l)In select the row (promptly the 2nd row) of number of times minimum, be exactly separating of SY2SY algorithm,, also just obtain the generator polynomial of convolution code here:
H 1=x 6+x 4y 2+x 3y 3+xy 5+y 6,H 2=x 6+x 5y+x 4y 2+x 3y 3+y 6.

Claims (2)

1. the communication channel blind identification method for coding parameters of an error-tolerant code, it is characterized in that designing the structural model of the blind identification of fault-tolerant chnnel coding of a no-protocol contact, set up the homogeneous crucial modular equation HKME of this structural model, the SY2SY pairing algorithm of this homogeneous crucial modular equation HKME is found the solution in proposition, this model is carried out rapid solving, thereby realize the quick blind identification of the fault-tolerant chnnel coding of no-protocol contact; Wherein homogeneous crucial modular equation HKME is:
Ask F[x, y]-Mo
Γ (k)={(H 1,...,H k)∈F[x,y] k|H 1C 1(x,y)+…+H kC k(x,y)≡0mod I} (2)
Minimum standard generator:
Wherein, F is a territory, F[x, y] be the polynomial ring on the F;
C i(x,y)=c i0y N+c i1xy N-1+c i2x 2y N-2+…+c iNx N,i=1,2,…,k (1)
Be F[x, y] in t quantic; I=<x N+1, y N+1Be F[x, y] by x N+1, y N+1Generated ideal;
The concrete steps of said SY2SY pairing algorithm are as follows:
Input: the homogeneous set K={f of strict ordering 0, f 1..., f l}
Output: GB base G makes<G 〉=<K〉and the generators set of syzygies Syzygy (K);
(1) initial:
If (f 0,0, f 1,0..., f L, 0)=(f 0, f 1..., f l), and establish:
(deg ylp(f 0),deg xlp(f 0))=min i=0,1,...,l(deg ylp(f i),deg xlp(f i)),
If g 0=f 0, A (0)=I is a unit matrix, G={g 0, K 0={ f 1..., f l;
(2) suppose that k step finished following algorithm:
Selected go out to gather G and by G reduction residual polynomial set K k, satisfy following relation:
<G∪K k>=<K>,
K=0 wherein, 1 ..., l. G={g 0, g 1..., g k, K k={ f 1, k, f 2, k..., f L, k,
And calculated coefficient matrices A (k)Satisfy
f 0 , k f 1 , k . . . f l , k = A ( k ) f 0,0 f 1 , 0 . . . f l , 0 ,
And note A i (k)It is matrix A (k)I capable, i=0,1 ..., l,
(3) the k+1 step will be carried out following calculating:
1. select f 0, k+1, f 0, k+1, be K kIn a special polynomial f S, k, satisfy
( deg y lp ( f s , k ) , deg x lp ( f s , k ) ) = min f &Element; K k ( deg y lp ( f i , k ) , deg y lp ( f i , k ) ) ,
g k + 1 = &Delta; f 0 , k + 1 = &Delta; f s , k , G = G &cup; { g k + 1 }
2. calculate S ( g k , g k + 1 ) &RightArrow; G + f s , k + 1 = y l k + 1 f 0 , k - q s , k f 0 , k + 1
3. calculate f i , k &RightArrow; G + f i , k + 1 = f i , k - q i , k f 0 , k + 1 , I ≠ 0 wherein, i ≠ s;
1., 2., 3. above-mentioned steps has finished following calculating
Figure C2005100279700003C5
K k+1={f 1,k+1,…,f l,k+1)
4) corresponding above-mentioned steps 1., 2., 3., the design factor matrix:
Figure C2005100279700003C6
(4) stop condition:, make f up to l step 1, l=f 2, l=...=f L, l=0;
(5) output: GB base G and coefficient matrices A (l), be separating of homogeneous key equation HKME, wherein, coefficient matrices A (l)Generators set for syzygies Syzygy (K).
2. method according to claim 1 is characterized in that at the vectorial A of each row i (l)In pick out the row of degree of polynomial minimum, promptly get separating of synthesis structure problem.
CNB2005100279701A 2005-07-21 2005-07-21 Coding parameter blind identification of fault tolerant code communicating channel Expired - Fee Related CN100391141C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2005100279701A CN100391141C (en) 2005-07-21 2005-07-21 Coding parameter blind identification of fault tolerant code communicating channel

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2005100279701A CN100391141C (en) 2005-07-21 2005-07-21 Coding parameter blind identification of fault tolerant code communicating channel

Publications (2)

Publication Number Publication Date
CN1713559A CN1713559A (en) 2005-12-28
CN100391141C true CN100391141C (en) 2008-05-28

Family

ID=35719018

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2005100279701A Expired - Fee Related CN100391141C (en) 2005-07-21 2005-07-21 Coding parameter blind identification of fault tolerant code communicating channel

Country Status (1)

Country Link
CN (1) CN100391141C (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101534168B (en) * 2009-04-16 2011-11-23 中国电子科技集团公司第五十四研究所 Blind identification method of coding parameters of RS code of error-tolerant code

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102201883B (en) * 2010-03-23 2014-08-13 中国电子科技集团公司第三十六研究所 Reed-solomon (RS) code coding parameter blind identification method
CN102201882B (en) * 2010-03-23 2014-06-18 中国电子科技集团公司第三十六研究所 Blind identification method for coding parameters of linear block codes
CN102244555B (en) * 2010-05-11 2014-06-18 中国电子科技集团公司第三十六研究所 Blind identification method for coding parameter of Turbo code
CN102244554B (en) * 2010-05-11 2014-06-18 中国电子科技集团公司第三十六研究所 Blind recognition method of punctured Turbo coding parameters
CN102244553B (en) * 2010-05-11 2014-09-17 中国电子科技集团公司第三十六研究所 Non-return-to-zero Turbo code encoding parameter blind identification method
CN104426555A (en) * 2013-09-03 2015-03-18 电子科技大学 Quasi-cyclic code blind recognition method based on submodule space Gr*bner base
CN108933606B (en) * 2018-08-15 2021-07-27 电子科技大学 System convolutional code blind identification method of error-tolerant code

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1167416A (en) * 1997-03-28 1997-12-10 北京信威通信技术有限公司 Method for testing spectrum spreading signal in code division multi-address radio communication system
WO1999044159A1 (en) * 1998-02-27 1999-09-02 Engage Technologies System and method for building user profiles
US20040174894A1 (en) * 1998-09-22 2004-09-09 Hughes Electronics Corporation System and method for transmitting data in frame format using an R-Rake retransmission technique with blind identification of data frames
EP1465338A2 (en) * 2003-04-01 2004-10-06 Thales Fourth order autodidact identification method and device for identifying an underdetermined mixture of signals

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1167416A (en) * 1997-03-28 1997-12-10 北京信威通信技术有限公司 Method for testing spectrum spreading signal in code division multi-address radio communication system
WO1999044159A1 (en) * 1998-02-27 1999-09-02 Engage Technologies System and method for building user profiles
US20040174894A1 (en) * 1998-09-22 2004-09-09 Hughes Electronics Corporation System and method for transmitting data in frame format using an R-Rake retransmission technique with blind identification of data frames
EP1465338A2 (en) * 2003-04-01 2004-10-06 Thales Fourth order autodidact identification method and device for identifying an underdetermined mixture of signals

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101534168B (en) * 2009-04-16 2011-11-23 中国电子科技集团公司第五十四研究所 Blind identification method of coding parameters of RS code of error-tolerant code

Also Published As

Publication number Publication date
CN1713559A (en) 2005-12-28

Similar Documents

Publication Publication Date Title
CN100391141C (en) Coding parameter blind identification of fault tolerant code communicating channel
Goldfarb et al. Convergence of fixed-point continuation algorithms for matrix rank minimization
Sinha et al. Capturing" attrition intensifying" structural traits from didactic interaction sequences of MOOC learners
Wright et al. Dense error correction via $\ell^ 1$-minimization
Ta-Shma et al. Extractors from reed–muller codes
Porat et al. Explicit non-adaptive combinatorial group testing schemes
Guruswami et al. Explicit subspace designs
Kheirkhahzadeh et al. Efficient community detection of network flows for varying Markov times and bipartite networks
Chou et al. Efficient computation of robust average of compressive sensing data in wireless sensor networks in the presence of sensor faults
US20110239077A1 (en) Method for constructing checking matrix of ldpc code and coding and decoding apparatus utilizing the method
Xiang et al. Interactive hypothesis testing against independence
Araujo et al. Beyond blocks: Hyperbolic community detection
Eppstein et al. Privacy-preserving data-oblivious geometric algorithms for geographic data
Hassanzadeh et al. An axiomatic approach to constructing distances for rank comparison and aggregation
Li et al. A hybrid information reconciliation method for physical layer key generation
Scarlett et al. Phase transitions in the pooled data problem
Johnson et al. An analysis of error reconciliation protocols used in quantum key distribution systems
Bauer et al. Internal compression of protocols to entropy
Eftekhari et al. Density evolution analysis of node-based verification-based algorithms in compressed sensing
Tandon et al. Exact asymptotics for learning tree-structured graphical models with side information: Noiseless and noisy samples
Mourad et al. Designing pooling systems for noisy high-throughput protein-protein interaction experiments using Boolean compressed sensing
Wang et al. St-mlp: A cascaded spatio-temporal linear framework with channel-independence strategy for traffic forecasting
Chen et al. Poisson process approximation for dependent superposition of point processes
Wang et al. How to construct polar codes for ring-LWE-based public key encryption
CN110990188B (en) Construction method of partial repetition code based on Hadamard matrix

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20080528

Termination date: 20110721