Summary of the invention
The deficiency existing for prior art, the object of this invention is to provide a kind of file transfer coding method based on complex network, evades Fourth Ring and six ring structures of LT code, to overcome the problem of the maximization becate of LT code in testing process.
Technical scheme of the present invention is achieved in that a kind of file transfer coding method based on complex network, comprises the following steps:
Step 1: add up file size to be transmitted, file waiting for transmission is divided into groups;
Described grouping process is: file to be transmitted is divided into k group by bit-order, and wherein, k is positive integer, and k>10
3if the data volume in last grouping is less than average amount, by the remaining bits position zero padding in this grouping;
Step 2: select a degree according to k value and distribute;
Step 3: generate new grouping in a plurality of packet by packet basis of original to be exported, coded identification, makes original transmit in network with the form of coded identification sequence;
Step 3.1: generate first coded identification;
Step 3.1.1: the degree of being selected by step 2 distributes and generates at random a value d, d different grouping of random selection in former output file, wherein, d is natural number;
Step 3.1.2: XOR is carried out in this d different grouping, forms a new grouping, this grouping is first coded identification for generating just;
Step 3.1.3: the coded identification that the step 3.1.2 of take is generated is start node, generates a network configuration being comprised of a node;
Step 3.1.4: this coded identification is placed in channel and is transmitted;
Step 3.2: generate next coded identification;
Step 3.2.1: distribute according to the degree of step 2, by this degree, distribute and generate at random another positive integer d ', from k grouping of original, select a grouping at random, the grouping that this is grouped into first original selected that generates next coded identification selection is also first the optional grouping that generates next coded identification.In network configuration, add a new node.If a grouping of the original of selecting be generate other certain or some there is a grouping of coded identification, so, one of having between corresponding node in network configuration that the weights that connect ,Qie limit, limit are the original selected of this new node and above-mentioned certain or some already present coded identification is grouped in the sequence number in the grouping of all k original; If d '=1, performs step 3.2.2; Otherwise execution step 3.2.3;
Grouping complete zero bit sequence isometric with it of the original that step 3.2.2: step 3.2.1 selects carries out XOR, form a new grouping, the next coded identification that this is grouped into generation, is placed on this coded identification in channel and transmits, and to step 3.3, continues to carry out;
Step 3.2.3: except the grouping of having selected for the next coded identification of generation, select another grouping of original in remaining grouping in all groupings of original, this is grouped into another grouping selected that generates next coded identification;
Step 3.2.4: find out that all another groupings in step 3.2.3 participate in to generate there is coded identification and in network configuration corresponding node, check that whether corresponding with these node of new node in step 3.2.1 exists and connect limit.If the company of existence limit, does not show that another grouping of selecting can not cause the Fourth Ring structure of LT code, continues to carry out from step 3.2.5; If the company of existence limit, shows that this another grouping will cause the Fourth Ring structure of LT code, this another grouping is not the optional grouping that generates next coded identification.Now, if still exist for, generate the not grouping of the original of selected mistake of next coded identification, get back to step 3.2.3 and continue to carry out, otherwise continue to carry out to step 3.2.9;
Step 3.2.5: find out that all another groupings in step 3.2.3 participate in to generate there is coded identification and in network configuration corresponding node, check in network configuration with new node and exist the node that connects limit whether to have even limit with the coded identification corresponding node in network configuration that exists that another grouping participates in generating.If the weights on the company of existence limit or the company of existence limit and limit do not equal the sequence number in another all groupings that are grouped in original, show that so another grouping can not cause six ring structures of LT code, this another be grouped into the optional grouping that generates next coded identification, to step 3.2.6, continue to carry out; If the company of existence limit, and the weights that connect limit are not equal to the sequence number in another grouping that is grouped in original, show to exist six ring structures, i.e. this another grouping will cause six ring structures of LT code, and this another grouping is not the optional grouping that generates next coded identification.Now, if still there is the not grouping of the original of selected mistake, get back to step 3.2.3 and continue to carry out; Otherwise, from step 3.2.9, continue to carry out;
Step 3.2.6; There is coded identification and corresponding node in network configuration in that finds out that all another groupings in step 3.2.3 participate in to generate, in network configuration, add the company limit of these corresponding nodes and new node, the weights on limit are grouped in the sequence number in all groupings of original for another;
Step 3.2.7: if equaling d ', optional grouping number continues to carry out from step 3.2.8, individual if optional grouping number is less than d ', from step 3.2.9, continue to carry out;
Step 3.2.8: the individual grouping of this d ' is carried out XOR and obtained a new grouping, this is new is grouped into next coded identification.This coded identification is placed in channel and is transmitted; Execution step 3.3;
Step 3.2.9: if still there is the not grouping of the original of selected mistake, repeating step 3.2.3; If there is no the not grouping of selected mistake, beyond optional grouping, select arbitrarily the grouping of original so, until selecteed packet count is d '.The individual grouping of this d ' is carried out XOR and is generated a new grouping, i.e. next coded identification, and this coded identification is placed in channel and is transmitted;
Step 3.3: the process of repeated execution of steps 3.2, generates remaining coded identification, until transmitting terminal receives the feedback information that file that receiving terminal returns to has correctly recovered.
Beneficial effect of the present invention: the present invention has set up the mapping relations between the complex network structures that LT code short-and-medium ring structure is corresponding with it, according to complex network structures, detect and evade to greatest extent the becate structure in LT code cataloged procedure, improve its successfully decoded probability, constructed a kind of efficient and reliable file transfer encoding scheme based on complex network.Especially for the transfer of data having in the wireless channel of time-varying characteristics, this invention can effectively improve the bandwidth availability ratio of channel so that receiving terminal receives less data just can be recovered initial data, reduces propagation delay time.
Embodiment
Below in conjunction with accompanying drawing, embodiment of the present invention is described in further detail.
The file transfer coding method based on complex network adopting in present embodiment, as shown in figure 10.Concrete steps are as follows:
Step 1: add up file size to be transmitted, file waiting for transmission is divided into groups.
If data waiting for transmission are file, first want statistics file size, adopt in the present embodiment the fopen () function of C language to open file, adopt fseek () function pointer to be navigated to the position of file, with ftell () function, by the position of the last byte of identification, obtain the size of file.If data waiting for transmission are bit stream, directly treat transmission bit stream and divide into groups.Described grouping process is: file to be transmitted is divided into K group by bit-order, and wherein, K is positive integer, and K>10
3.Suppose that file to be transmitted can be converted into the bit stream of 2KB, can adopt said method that this bit stream is divided into K=2000 group, wherein each grouping comprises L=8 bit.As shown in Figure 1, wherein
First grouping: total 8bits, content is 01011000;
Second grouping: total 8bits, content is 10110011;
……
K=2000 grouping: total 8bits, content is 11100101.
In the present embodiment, the file of 2KB (16000bit) just in time can be divided into the grouping of 2000 8bit.Yet for some file, it just in time can not be divided into a plurality of groupings, that is, the data volume of last grouping after division is less than packeting average data volume.Now, need the end zero padding of an in the end grouping, the bit number that last grouping is comprised equals the average number of bits of each grouping.For example: suppose the file of a 15994bit to divide into groups, still bit stream is divided into 2000 groups, every group comprises L=8 Bit data, last grouping is by 8 of less thaies so, and we need to mend 0 thereafter.As shown in Figure 2, wherein
First grouping: total 8bits, content is 01011000;
Second grouping: total 8bits, content is 10110011;
……
K=2000 grouping: total 8bits, content is 11000000.Wherein last 6bit is filler.
Through said process, we can be 2000 groups by the Divide File of a 2KB.
Step 2: select a degree according to the value of packet count K and distribute;
Described degree distributes and can adopt sane orphan to distribute, also can adopt the degree of the coded identification of scale-free degree distribution and sane existing common LT codes such as scale-free degree distribution to distribute, and what user can be according to oneself need to select distribution function voluntarily.It is example that the sane orphan of take in present embodiment divides μ (d) cloth, and the deterministic process that degree of explanation distributes is as follows:
μ (d) is defined as follows,
Wherein
And
In formula, the coding symbol number that in each step that S is decode procedure, the remaining degree of expectation is 1:
In formula, β ∈ (0,1) is a free variable, when δ represents that receiving terminal is received K coded identification, and tolerable decoding error probability.
For all K values, sane orphan distributes and need to meet following formula:
Parameter beta=0.1 distributing as sane orphan is found in research, δ=1.0 o'clock, and the LT code distributing based on sane orphan has good performance.By β=0.1, δ=1.0, K=10000 substitution formula (2), can obtain S=92.10.And then can obtain K=10000 time, the degree of coded identification distributes.
In like manner, can adopt similar method, try to achieve the parameter in scale-free degree distribution and sane scale-free degree distribution, determine that the degree to the LT code of defining K value distributes.
Be grouped into example with K=2000 that in present embodiment, 2KB file is divided into, by β=0.1, δ=1.0, the value that K=2000 substitution formula (2) obtains S is 33.99.The value substitution formula (1) of S, the δ number that just can obtain dividing into groups, be that 2000 the degree based on sane orphan's calibration distributes.
Step 3: treating to generate new grouping in 2000 packet by packet basis of output size for the original of 2KB, coded identification, makes original transmit in network with the form of coded identification sequence; 2000 groupings of original are called as incoming symbol.This implementation process is simple in order to describe, and only having selected 5 incoming symbols in 2000 incoming symbols is the generative process that example is introduced its part coded identification.These 5 groups of incoming symbols are designated as respectively S
1, S
2, S
3, S
4, S
5, S wherein
1=01011000, S
2=10110011, S
3=11100101, S
4=01011000, S
5=10110010.
Step 3.1: generate first coded identification, as shown in figure 11.
Step 3.1.1: in the present embodiment, the degree of selecting according to step 2 distributes and generates at random a value d
1, the degree that work done in the manner of a certain author is first coded identification.From S
1, S
2, S
3, S
4, S
5in these 5 groups of incoming symbols, select d
1group is used for generating first coded identification.Value d
1selection course as follows:
The degree of selecting according to step 2 distributes, and the variable d in formula (1) gets respectively 1 ..., it is 1 that K different value can be spent ..., the probability that K coded identification is shared.Because carry out example with the cataloged procedure of 5 groups in 2000 groups in the present embodiment, therefore, we suppose K=5 herein, and limit d and get the integer between [1,5].First, 0-1.0 scope is divided into 5 sections according to this probability; Then use the rand () function in C language to produce a random number, judge this random number is in which segmentation of these 5 segmentations of 0-1.0, in which segmentation, the degree value of selected first coded identification of step 3.1.1 is just several so.As shown in Figure 3, the probability that degree of hypothesis is 1 is 0.1, the probability 0.4 that degree is 2, and the probability that degree is 3 is 0.3, and the probability that degree is 4 is 0.15, and the probability that degree is 5 is 0.05.Application cumulative distribution, if the size of random number between 0~0.1, the degree value of selecting is 1; If the size of random number is between 2~0.5, the degree value of selecting is 2; By that analogy.
Now, suppose to produce a random number that value is 0.51, as shown in Figure 3, known 0.51 is greater than 0.5, is less than 0.8, drops in the 3rd segmentation, therefore, plans the degree d of first coded identification
1assignment is 2.
3 different groupings of random selection in 5 groupings of original, the probability of arbitrary grouping of selection original is identical, and in the present embodiment, this probability is 1/5.
In present embodiment, adopt the rand () function in C language to produce 2 random numbers, be respectively 0.29,0.17.They drop in the 2nd segmentation and the 1st segmentation as shown in Figure 4, and therefore, select by this step 2 groupings that are used for generating the original of first coded identification are respectively the 1st grouping and the 2nd grouping.
Step 3.1.2: first grouping in present embodiment is designated as C
1, C
1value equal the XORs of 2 different original groupings that step 3.1.1 selects.That is, C
1=S
1⊕ S
2=11101011;
Step 3.1.3: the coded identification that the step 3.1.2 of take is generated is start node, generates a network configuration G who is comprised of a node, as shown in Figure 5.In the present embodiment, refer to coded identification C
1corresponding node V
0generating network structure G, this step is mainly for G is carried out to initialization, the content relating to mainly comprises node and the limit that adopts malloc () the function initialization G in C language.
Step 3.1.4: coded identification C
1be placed in channel and transmit;
Step 3.2: in the present embodiment, generate the 2nd coded identification;
Step 3.2.1: distribute according to the degree of step 2, by the degree d of random second coded identification of this degree distribution
2=1, at random from S
1, S
2, S
3, S
4, S
5in these 5 groupings, select 1 grouping, suppose this selected S of being grouped into
1.In network configuration G, add a new node V
1, because S
1to generate C
1a grouping, so, C
2and C
1the node V of correspondence on G
1, V
0between exist to connect limit, and the weight on limit is S
1, as shown in Figure 6.
Because the degree value of the 2nd coded identification is 1, and selected unique S that is grouped into
1, therefore, by step 3.2, generate second coded identification C
2=S
1=01011000.And by C
2be placed in channel and transmit.
Step 3.3: in the present embodiment, generate the 3rd coded identification;
Step 3.3.1: distribute and select at random the degree of the 3rd coded identification according to the degree of step 2, suppose that its value is for d
3=3, now we need to be at S
1, S
2, S
3, S
4, S
5in these 5 groupings, select 3 groupings that satisfy condition.Its process is as follows:
At random from S
1, S
2, S
3, S
4, S
5in these 5 groupings, select to generate the 1st grouping of the 3rd coded identification, suppose this selected S of being grouped into
1.In network configuration G, add a new node V
2, due to S
1to generate C
1and C
2the grouping of an original, in G, increase so a connected node V
2with node V
0weights be S
1company limit, an and connected node V
2with node V
1weights be S
1company limit.
At random from S
2, S
3, S
4, S
5in the grouping of these 4 originals, select a grouping to select grouping as the 2nd that generates the 3rd coded identification, suppose that it is S
2.S
2participation has generated coded identification C
1, while new node V
2with C
1corresponding node V
0having weights is S
1company limit, as shown in Figure 7.Yin Yin, selects S herein
2will cause Fourth Ring structure, it is not an optional grouping.
Random from remaining grouping S
3, S
4, S
5in these 3 groupings, select a grouping S
3, because it does not form Fourth Ring and six ring structures, so S
3can be used as an optional grouping that generates the 3rd coded identification.Again from remaining grouping S
4, S
5in random select a grouping, be assumed to be S
4if find S simultaneously
4be placed on and in complex network structures, also do not form Fourth Ring or six ring structures so S
4also can be used as an optional grouping that generates the 3rd coded identification.
Therefore, the 3rd coded identification C
3can there is S
1, S
3, S
4this three coded identification XORs and obtaining, i.e. C
3=S
1⊕ S
3⊕ S
4=01100101, by coded identification C
3be placed in channel and transmit.
Step 3.4: in the present embodiment, generate the 4th coded identification C
4;
Step 3.4.1: distribute and select at random the degree of the 4th coded identification according to the degree of step 2, suppose its value d
4=2, now we need to be at S
1, S
2, S
3, S
4, S
5in these 5 groupings, select 2 groupings that satisfy condition.Process is as follows:
At random from S
1, S
2, S
3, S
4, S
5in these 5 groupings, select to generate the 1st grouping of the 4th coded identification, suppose this selected S of being grouped into
2.In network configuration G, add a new node V
3, due to S
2to generate coded identification C
1the grouping of an original, therefore, in G, add a connected node V
3with node V
0weights be S
2company limit.
Random 4 grouping S from remainder
1, S
3, S
4, S
5grouping S of middle selection
4as the 2nd that generates the 4th coded identification, select grouping.Due in network configuration G, new node V
3connected node V
0, with grouping S
4there is coded identification C in what participate in to generate
3corresponding node V
2between exist to connect ,Qie Lian limit, limit weights be S
1≠ S
4, as shown in Figure 8.So, select S herein
4can cause six ring structures, that is, and S
4not to generate C
4an optional grouping.
Random 3 grouping S from remainder
1, S
3, S
5grouping of middle selection, supposes the selected S of being grouped into
5, that is, and S
5as the next one that generates the 4th coded identification, selected grouping.Due to S
5can not form Fourth Ring structure and six ring structures, therefore, S
5to generate coded identification C
4another optional grouping.
By step 3.4, generate in the present embodiment the 4th coded identification C
4=S
2⊕ S
5=00000001.Coded identification C
4putting into channel transmits.
Step 3.5: in the present embodiment, generate the 5th coded identification C
5;
According to the degree of step 2, distribute and select at random the degree of the 5th coded identification, suppose its value d
5=2, now need to be at S
1, S
2, S
3, S
4, S
5in these 5 groupings, select 2 groupings that satisfy condition.Process is as follows:
At random from S
1, S
2, S
3, S
4, S
5in these 5 groupings, select a grouping as an optional grouping that generates the 5th coded identification, suppose that this is grouped into S
3.In G, add a new node V
4, due to S
3participation has generated coded identification C
3, therefore, in G, add a connected node V
2and V
4weights be S
3limit.
Random 4 grouping S from remainder
1, S
2, S
4, S
5in these 4 groupings, select 1 grouping, be assumed to be S
2.Due in G with new node V
4the node V on the company of existence limit
2with S
2participate in the coded identification C generating
1the node V of correspondence in G
0the weights on the company of existence ,Qie limit, limit are S
1≠ S
2, therefore, if herein by S
2as optional grouping, will cause six ring structures.
Random 3 grouping S from remainder
1, S
4, S
5in these 3 groupings, select 1 grouping, be assumed to be S
1, as selecting grouping.Due to S
1participate in the coded identification C generating
3the node V of correspondence in G
2with new node V
4having weights is S
3company limit, therefore, S
1as optional grouping, will cause Fourth Ring structure.
Random 2 grouping S from remainder
4, S
51 grouping of middle selection, as generating coded identification C
5the next one selected grouping, be assumed to be S
4.Due to S
4participate in the coded identification C generating
3the node V of correspondence in G
2with new node V
4having weights is S
3company limit, therefore, if S
4as optional grouping, will cause Fourth Ring structure.
Random 1 grouping S from remainder
51 grouping of middle selection, this is grouped into S
5if select S herein
5can not cause Fourth Ring structure can not cause six ring structures yet, so, S
5to generate coded identification C
5an optional grouping.Due to S
5participation has generated coded identification C
4so,, in G, add a connected node V
3and V
4weights be S
5company limit.As shown in Figure 9.
By step 3.5, generate in the present embodiment the 5th coded identification C
5=S
3⊕ S
5=01010111, C
5be placed in channel and transmit.
Step 3.6: in the present embodiment, generate the 6th coded identification C
6;
According to the degree of step 2, distribute and select at random the degree of the 6th coded identification, suppose its value d
6=3.Now need to be at S
1, S
2, S
3, S
4, S
5in these 5 groupings, select 3 groupings that satisfy condition.Process is as follows:
At random from S
1, S
2, S
3, S
4, S
5in these 5 groupings, select a grouping as 1 the optional grouping that generates the 6th coded identification, suppose that this is grouped into S
2.In G, add a new node V
5, due to S
2participation has generated coded identification C
1and C
4, therefore, in G, add and connect V
5, V
0weights be S
2company limit be connected V
5, V
3weights be S
2company limit.
At random from S
1, S
3, S
4, S
5in these 4 groupings, select 1 grouping to select grouping as the 2nd that generates the 6th coded identification, suppose that this is grouped into S
1.Due in network configuration G, S
1participate in the coded identification C generating
1the node V of correspondence in G
0with new node V
5having weights is S
2company limit, therefore, if select S herein
1will cause Fourth Ring structure.
At random from 3 remaining grouping S
3, S
4, S
51 grouping of middle selection is as generating C
6the 3rd select grouping, suppose that this is grouped into S
3.Due in G with new node V
5the node V on the company of existence limit
0with S
3participate in the coded identification C generating
3the node V of correspondence in G
2between exist to connect Qie Lian limit, limit weights be S
1≠ S
3, therefore, S herein
3it not an optional grouping.
At random from 2 remaining grouping S
4, S
5grouping of middle selection is as generating C
6the 4th select grouping, be assumed to be S
4.Due in G with new node V
5the node V on the company of existence limit
0with S
4participate in the coded identification C generating
3the node V of correspondence in G
2between exist to connect Qie Lian limit, limit weights be S
1≠ S
4, therefore, if S herein
4as optional grouping, will form six ring structures.
Analyze last grouping S
5, due to S
5participate in the coded identification C generating
4the node V of correspondence in G
3with new node V
5having weights is S
2company limit, therefore, S
5as optional grouping, will cause Fourth Ring structure.
In summary, if generate the 6th selected first of coded identification, be grouped into S
2, so no matter to select S
1, S
3, S
4or S
5becate structure is caused in capital.Now, from removing S
2outer S
1, S
3, S
4, S
52 groupings of these 4 the random selections of grouping, are assumed to be S
1, S
4, as generating coded identification C
6two other optional grouping.
By step 3.6, obtain the 6th coded identification C
6=S
2⊕ S
1⊕ S
4=10110011, C6 is placed in channel and is transmitted.
By said process, generated 6 coded identifications, they are all 5 generations of dividing into groups in original.In the present embodiment, for the original that comprises 2000 groupings, also can adopt identical method, generate coded identification sequence.At receiving terminal, according to the relation of a plurality of groupings of the value of coded identification and coded identification and original, original is recovered.
The present invention can directly apply to the transmittings of Volume data in wireless channel such as video, image, for the ease of verifying feasibility and the advantage of described method, only from the encoding scheme of successfully decoded probability angle and traditional LT code, be analyzed herein.
It is 10 that 1000 groups of incoming symbol numbers are take in the present invention
4, block length is that the sane LT code without characteristics of scale of having of 1 bit and the LT code based on sane orphan's distribution are that example is verified validity of the present invention, the LT code that wherein participates in contrast comprises;
(1) RD-SF (cycle-6priority): parameter is selected P
1the sane LT code without characteristics of scale of having of Fourth Ring and six ring structures is reduced in=0.1, λ=1.9 as far as possible;
(2) RD-SF (cycle-4priority): parameter is selected P
1fourth Ring is reduced in=0.1, λ=1.9 as far as possible, does not consider the sane LT code without characteristics of scale of having of six rings;
(3) RD-SF (random): parameter is selected P
1=0.1, λ=1.9, that does not consider Fourth Ring and six rings has a sane LT code without characteristics of scale;
(4) RSD (cycle-6priority): parameter is selected c=0.1, the LT code distributing based on sane orphan of Fourth Ring and six ring structures is reduced in δ=1 as far as possible;
(5) RSD (cycle-4priority): parameter selection c=0.1, Fourth Ring is reduced in δ=1 as far as possible, does not consider the LT code distributing based on sane orphan of six rings;
(6) RSD (random): parameter is selected c=0.1, δ=1, does not consider the LT code distributing based on sane orphan that Fourth Ring and six is encircled.
The degree that this invention does not change coded identification distributes, therefore, average XOR number of times and original coding scheme that generating coded identification needs are more or less the same, but due to Fourth Ring and six ring probabilities of occurrence reductions, the coding symbol number that recovering identical incoming symbol needs will decrease, and the average XOR number of times of this scheme decode procedure is reduced.As shown in table 1 is the relativity of redundancy factor in different encoding schemes, and redundancy factor is lower, and the coding symbol number that shows to recover original incoming symbol needs is fewer, and required decoding delay is lower:
The LT code of table 1 the present embodiment structure and the Performance Ratio of traditional LT code are
Analytical table 1 is known, the average redundancy factor of the LT code of application six ring priority algorithms is less than the average redundancy factor of the LT of application Fourth Ring priority algorithm, they are all less than the average redundancy factor of the LT code that does not carry out becate optimization, and the coding symbol number that the LT code that therefore adopts becate to evade algorithm recovers the incoming symbol needs of similar number is less than the LT code that does not carry out becate optimization.
Because the degree of each coded identification is independent generation, as long as and there is the sane LT code without characteristics of scale and the LT code that distributes based on desirable orphan receives enough coded identifications and just can guarantee that recipient can Complete Decoding, irrelevant with the channel condition of transmission data, therefore, only consider LT code that the becate of application based on Complex Networks Theory the evade algorithm successfully decoded probability under desirable channel condition herein.
Figure 12 is that incoming symbol number is 10
4, construct respectively 1000 groups of above-mentioned six kinds of LT codes, obtain their successfully decoded probability and the relation between redundancy factor.
Analysis Figure 12 is known, under the identical prerequisite of redundancy factor, application becate is evaded the successfully decoded probability with the sane LT code without characteristics of scale that algorithm generates higher than not considering the sane LT code without characteristics of scale of having of becate structure and other three kinds of LT codes that distribute based on sane orphan.And application becate is evaded the LT code distributing based on sane orphan that algorithm generates, receiving terminal receives the successfully decoded probability of coded identification N=(1+ α) K of similar number higher than the LT code distributing based on sane orphan of not considering becate structure.
Above-mentioned research shows, application becate is evaded the LT code of algorithm design and can be compiled under the prerequisite of (translating) code efficiency guaranteeing, successfully decoded probability is greatly improved.
Although more than described the specific embodiment of the present invention, the those skilled in the art in this area should be appreciated that these only illustrate, and can make various changes or modifications to these execution modes, and not deviate from principle of the present invention and essence.Scope of the present invention is only limited by appended claims.