CN1697330A - Method of using algorithm of adding edge one by one for encoding and decoding low-density parity check code in multiple system of carry digit - Google Patents

Method of using algorithm of adding edge one by one for encoding and decoding low-density parity check code in multiple system of carry digit Download PDF

Info

Publication number
CN1697330A
CN1697330A CN 200510057105 CN200510057105A CN1697330A CN 1697330 A CN1697330 A CN 1697330A CN 200510057105 CN200510057105 CN 200510057105 CN 200510057105 A CN200510057105 A CN 200510057105A CN 1697330 A CN1697330 A CN 1697330A
Authority
CN
China
Prior art keywords
alpha
prime
decoding
algorithm
sign indicating
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 200510057105
Other languages
Chinese (zh)
Other versions
CN100424999C (en
Inventor
王琳
黎勇
徐位凯
陈岗
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CHENGXIN ELECTROMECHANIC Manufacturing Co Ltd CHONGQING CITY
Original Assignee
CHENGXIN ELECTROMECHANIC Manufacturing Co Ltd CHONGQING CITY
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CHENGXIN ELECTROMECHANIC Manufacturing Co Ltd CHONGQING CITY filed Critical CHENGXIN ELECTROMECHANIC Manufacturing Co Ltd CHONGQING CITY
Priority to CNB2005100571051A priority Critical patent/CN100424999C/en
Publication of CN1697330A publication Critical patent/CN1697330A/en
Application granted granted Critical
Publication of CN100424999C publication Critical patent/CN100424999C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Error Detection And Correction (AREA)

Abstract

The method includes encoding part and corresponding decoding part. PEG design method is adopted to complete design for encoding codes of multiple scale system low-density parity check (LDPC). Using equivalent transformation and combining it with Fourier transformation realizes decoding codes of LDPC in multiple scale system. The invention improves performance of error rate of LDPC code in multiple scale system evidently, and reduces complexity of decoding codes. Moreover, loss of performance is in acceptable range. In condition of transmitting middle - short frames, the invention is superior to performance of traditional random structured LDPC code.

Description

Add the multi-system encoding and decoding low-density parity check code method of limit algorithm one by one
Technical field
The invention belongs to digital communication technology field, be specifically related to a kind of based on multi-system low-density checksum (LDPC) code coding/decoding method that adds limit (PEG) algorithm one by one.
Background technology
Shannon had proposed famous channel coding theorem first in his laying a foundation property paper " mathematical principle of communication " in 1948: be the communication channel of C to any channel capacity, if the desired transmission rate R of communication system is less than C, then there is a coding method, fully big and when adopting maximum-likelihood decoding as code length n, it is arbitrarily small that the error rate of system can reach.His theorem has three primary conditions:
1) adopts random coded;
2) code length n → ∞, promptly code length is tending towards unlimited;
3) best maximum likelihood (ML) method is adopted in decoding.
In the research and development process of chnnel coding, be main developing direction with latter two condition basically.Owing to be difficult to realize the randomness coding method in practice, and when code length is very big, adopt the maximum-likelihood decoding algorithm to be difficult to realize.And 1993 by Berrou C, Glavieux A, Thitimajshima propose new channel coding schemes Turbo code, obtain almost decoding performance near the Shannon theoretical limit thereby then used the stochastic behaviour of coding and iterative decoding well.About the research of Turbo code coding and iterative decoding becomes the hot subject that channel coding theorem is studied soon, and in 3GPP, be applied.
Iterative decoding algorithm has better performance again when having reduced complexity, its principle is exactly to carry out hard decision by the iteration of external information after satisfying condition.
The error correcting code theoretical developments is to today, particularly after the nineties, become the main research object of industry based on the efficient error correcting code of random coded and iterative decoding, new error correcting system based on graph theory is flourish, and Here it is with tanner figure is the method for visualizing of the base growth code Design of getting up: factor graph and the iterative decoding algorithm and the sum-product algorithm that transmit based on information on the limit among the figure.
The LDPC sign indicating number is to propose (R.G.Gallager. low density parity check code [J] .IRE Trans.Info.Theory1962IT-8 (1): 1-28) by Gallager in 1962.Do not cause at that time that people noted too much, the nineties in 20th century, the someone finds that the LDPC sign indicating number adopts the sum-product algorithm iterative decoding can reach the performance of nearly shannon limit when long frame.So the LDPC sign indicating number becomes new research focus rapidly.
The LDPC sign indicating number is based on the parity check code of sparse matrix, and the design principle of matrix H is the relation of adjusting between code word bits and the check bit, thereby reaches the optimized purpose of information flow in the decode procedure.Therefore, the design of matrix H is most important.Usually H adopts random configuration and eliminates the mode that length is 4 ring, and X.Y.Hu etc. have proposed a kind of sub-optimal method---PEG (Progressive Edge--Growth) method (X.-Y.Hu that can construct long as far as possible ring, E.Eleftheriou, and D.-M.Arnold; " the Taylor diagram that the limit increases one by one " IEEE Proc.Globecom ' 2001; San Antorio, TX, Nov.2001.).Its simulation result shows: based on good than based on random fashion of the LDPC sign indicating number of PEG algorithm, especially in short-and-medium frame.But prior art only discloses the binary system LDPC sign indicating number based on the PEG algorithm.
Above-mentioned binary system LDPC sign indicating number can also generally change into finite field gf (q) (q=2 p, p ∈ Z +) on the m-ary LDPC sign indicating number.Its bilateral figure and binary system LDPC sign indicating number similar, different is the variable point has q may value, the constrained of checkpoint is also more complicated in addition.David J.C.Mackay discovers, the performance outline of some m-ary LDPC sign indicating number is better than binary system LDPC sign indicating number, code check (the M.C.Davey that is improved simultaneously, low density parity check code [J] .IEEE Commun.Lett. on the D.J.C.Mackay.Q unit territory, 1998,2 (6): 165-167.).
The m-ary LDPC sign indicating number can adopt the decoding of BP algorithm, but complexity is very high like this, Richardson and Urbanke suggestion adopt the decoding of FT (Fourier transform) algorithm to reduce decoding complexity (T.Richardson and R.Urbanke. adopts the capacity .Submitted to IEEE Transactions onInformation Theory of the low density parity check code of reliability pass-algorithm decoding, 1998.).For example, the Fourier transform of GF (2) superior function f is: F 0=f 0+ f 1, F 1=f 0-f 1.GF (2 p) on Fourier transform can regard a succession of 2 system conversion as, each has p dimension.Therefore, the Fourier transform on the GF (4) is:
F 0=[f 0+f 1]+[f 2+f 3]
F 1=[f 0-f 1]+[f 2-f 3]
F 2=[f 0+f 1]-[f 2+f 3]
F 3=[f 0-f 1]-[f 2-f 3]
The form of inverse fourier transform is identical with Fourier transform, just will remove last 2 more p
From the situation of above-mentioned prior art, very poor by the H matrix stability of random fashion structure for the m-ary LDPC sign indicating number, cause corresponding code performance to alternate betwwen good and bad thus, so all adopt expectation to measure its performance usually.And adopting the complexity of BP algorithm decoding too high, this has limited its application in practical communication system.We wish to adopt more stable H matrix, thereby obtain the LDPC sign indicating number of stable performance, adopting the decoding algorithm of suboptimum simultaneously is that cost reduces decoding complexity with certain performance loss, makes encoding and decoding algorithm guarantee that being easy to hardware under certain performance advantage prerequisite simultaneously realizes.
Summary of the invention
The present invention is directed to the prior art above shortcomings, purpose is to provide a kind of m-ary LDPC code coding/decoding method based on the PEG algorithm, employing PEG design is finished the code Design to the m-ary LDPC sign indicating number, adopt equivalent transformation, and combine with Fourier transform and to realize the decoding of m-ary LDPC sign indicating number, significantly improve the bit error rate performance of m-ary LDPC sign indicating number, reduce the complexity of decoding, and performance loss can accepted in the scope, under the short-and-medium frame transmission conditions of use in digital communication system, significantly be superior to the performance of the m-ary LDPC sign indicating number of conventional random configuration.
Technical scheme of the present invention is as follows:
One, coded portion:
Know all that as the researcher in this field H matrix stability of random configuration is very poor in the LDPC sign indicating number, so can not guarantee that the H performance that constructs is all fine at every turn.Obtained stable in the m-ary LDPC sign indicating number code Design and the Tanner figure long length of minimum ring so we introduce the PEG algorithm.The PEG algorithm is a kind of structure algorithm of the Tanner figure of long ring as far as possible.The mode that it adopts the limit to add one by one, application drawing is discussed knowledge, the limit is joined among the Tanner figure one by one go.A given symbol node s j, suppose that its degree is ds j, adding ds so jShould follow during the bar limit: new limit of every interpolation should make among the current Tanner figure by node s jThe long maximized principle of minimum ring.
Coding step is as follows:
1, utilize PEG to construct binary H earlier.
Suppose the H matrix that will construct m * n dimension, Tanner figure so correspondingly has m variable nodes and n parity check nodes.We are the Tanner seal that (V, E), V is fixed point set and V=V c∪ V s, V c={ c 0, c 1..., c M-1Be the set of checkpoint, V s={ s 0, s 1..., S N-1It is the set of variable point.E is limit collection and E=V c* V s, the current h that only works as Ij≠ 0 o'clock, limit (c i, s j) ∈ E, h IjIt is the capable j column element of i of H.Variable point s jDegree be designated as ds j, the set that all limits associated therewith constitute is designated as Es j, E=Es is then arranged 0∪ ES 1∪ ... ∪ Es N-1With s jRelated k bar limit is designated as E Sj k, 0≤k≤ds j-1.As shown in Figure 1, we are s jThe checkpoint set that can arrive in the l layer on its expansion tree is designated as N Sj l, supplementary set correspondingly is designated as
Figure A20051005710500071
Then have N ‾ s j l = V c \ N s j l .
The PEG algorithm is as follows:
for?j=0:n-1
for?k=0:ds j-1
if?k=0
Limit (c i, s j) compose and give E Sj 0, c iBe current Tanner figure Es 0∪ Es 1∪ ... ∪ Es J-1The parity check nodes of moderate minimum.
else
In current Tanner figure from variable nodes s jExpand a l layer tree up to satisfying But
Figure A20051005710500074
Perhaps N Sj lGesture no longer continue to increase but still less than M.We are limit (c then i, s j) compose and give E Sj k, c iBe from In a minimum checkpoint of select degree.
end
end
When two circulations were finished, Tanner figure had just built up, and also is that corresponding H has constructed.
It should be noted that we are selecting c iThe time, be chosen in that parity check nodes of current figure moderate minimum, be that the degree of parity check nodes distributes even as far as possible among the Tanner figure that generates thus in order to allow.If the minimum nodes of a plurality of degree are arranged, this schemes often to occur when initial at structure Tanner.To this, two kinds of processing modes are arranged: 1) select one of them randomly, 2) according to these nodes at c 0, c 1..., c M-1In order, select that node of subscript minimum all the time.What here, we adopted is first kind of mode.
2, then the nonzero element among the H is used randomly 1,2 ..., the element substitution among the q-1} has obtained stable and more excellent H.
for?i=0:m-1
for?j=0:n-1
if(h ij≠0)
h ij=rand_int(q-1)+1
end
end
Wherein, function rand_int (q) produces an integer between 0~q-1 at random.
3, decomposition can obtain generator matrix G according to LU, and information bit S and generator matrix G multiply each other and can obtain code word U then.That is U=S  G.Multiplication is followed the multiplication rule on the GF (q).
Two, decoding part:
The employing said method has obtained the m-ary LDPC sign indicating number based on the PEG algorithm, and we wish that decoding algorithm is accurate and simple simultaneously.
Suppose that C is a code word allowable, c jBe j component of code word.We go up at GF (2) earlier and analyze Σ j h ij c j = 0 (h Ij≠ 0, h IjBe the capable j column element of i among the H).Because h Ij=1, so have Σ j c j = 0 (j is the nonzero element subscript of every row among the H).And on GF (q), because h Ij∈ 1,2 ..., so q-1} is can not be with h IjSave.If we make c ' j=h Ijc j(multiplication is followed the multiplication rule on the GF (q)) then has Σ j c ′ j = 0 (j is the nonzero element subscript of every row among the H).So just nonzero element among the H has been transferred in the code word the contribution of each verification, the equivalent H of this moment is exactly a binary H.Like this, we just can decipher according to the mode of similar binary decoding, and Equivalent Thought is come therefrom.
The BP algorithm is one for binary system LDPC sign indicating number well to be selected, but for the m-ary LDPC sign indicating number, its algorithm complex is too high (with q 2Be directly proportional).We propose a kind of equivalent transformation according to above-mentioned Equivalent Thought, and it combines with the FT conversion and can realize decoding.Order
Figure A20051005710500084
Be the code word vector that sends, decoding is exactly to seek to satisfy H x ^ = 0 ^ Be zero vector.During concrete realization of decoding, equivalence is conciliate equivalence and is all carried out at probabilistic information, and transformation for mula is:
q mn ′ a = ET [ q mn a ] = q mn a ÷ h mn (equivalent transformation)
r mn a = IET [ r mn ′ a ] = r mn ′ ( a ⊗ h mn ) (contrary equivalent transformation)
Wherein, " ÷ " is the inverse operation (introducing for convenience) of "  ", a=0, and 1,2 ..., q-1.q Mn a(q Mn ' a) expression x ^ n = a Probability, r Mn a(r Mn ' a) expression ought x ^ n = a The time m the probability that verification is satisfied,
Figure A20051005710500094
For
Figure A20051005710500095
N component, h MnThe element of the capable n row of m among the expression H.ET represents equivalent transformation, and IET represents contrary equivalent transformation.
Concrete decoding algorithm performing step is as follows:
1, initialization
According to channel model q Mn aBe initialized as f n a, promptly work as x ^ n = a The time likelihood value.Make N (m) :={ n:h Mn≠ 0} represents to participate in the set of the variable point of m verification, M (n) :={ m:h Mn≠ 0} represents the set of n the check that variable point participated in.
2, carry out ET (equivalent transformation) and FT (Fourier transform)
q mn ′ a = q mn a ÷ h mn
Q mn ′ a = FT [ q mn ′ 0 , q mn ′ 1 , . . . , q mn ′ q - 1 ]
3, (contrary equivalent transformation upgrades r to carry out IFT (inverse fourier transform) and IFT Mn a)
r mn ′ a = IFT [ ( Π j ∈ N ( m ) \ n Q mj ′ 0 ) , . . . , ( Π j ∈ N ( m ) \ n Q mj ′ q - 1 ) ]
r mn a = r mn ′ ( a ⊗ h mn )
4., upgrade q Mn a
q mn a = α mn f n a Π j ∈ M ( n ) \ m r jn a
α wherein MnBe normalization factor, satisfy Σ a = 0 q - 1 q mn a = 1
5., calculate q n a
q n a = α n f n a Π j ∈ M ( n ) r jn a
α wherein nBe normalization factor, satisfy Σ a = 0 q - 1 q n a = 1 .
6, decoding judgement:
x ^ n = arg max a f n a Π j ∈ M ( n ) r jn a
If H x ^ = 0 ^ Perhaps iterations has reached default maximum, and then algorithm stops, and continues iteration otherwise got back to for the 2nd step.
Above-mentioned steps has clearly illustrated the decode procedure of m-ary LDPC sign indicating number.
We have built emulation platform, referring to Fig. 2 and Fig. 3, compared on the GF (4) respectively based on the performance of the sign indicating number of PEG algorithm and random configuration mode, and all based on the PEG algorithm, during identical frame length, the performance of 4 system LDPC sign indicating numbers and 2 system LDPC sign indicating numbers.All code checks all are 1/2.By Fig. 2. as seen: under awgn channel, better than the LDPC code performance of random fashion coding based on the 4 system LDPC sign indicating numbers of PEG.As seen from Figure 3, equally based on the PEG algorithm, 4 system LDPC sign indicating numbers are better than 2 system LDPC code performance outlines.
Though we have only provided the simulation result (as Fig. 2 and Fig. 3) on the GF (4), decoding algorithm is at GF (2 p) on be general, other m-ary LDPC sign indicating numbers also are suitable for.
Invention advantage or good effect:
Confirm by a large amount of computer simulation experiments and theory analysis, utilize the PEG algorithm can significantly improve the bit error rate performance of m-ary LDPC sign indicating number, and the decoded mode that adopts equivalent transformation to combine with Fourier transform can reduce decoding complexity greatly, and performance loss can accepted in the scope.It has remarkable improvement than the performance of the LDPC sign indicating number of the random configuration of routine, and this advantage is very obvious under short-and-medium frame transmission situation.This shows and adopts such sign indicating number type to have important practical significance in the digital communication system of reality, in following digital communication system, under the short-and-medium frame transmission conditions, is a better choice based on the m-ary LDPC sign indicating number of PEG algorithm.
Description of drawings
Fig. 1 .s jExpansion tree go up the parity check nodes that can arrive in the l layer and gather N Sj l
Fig. 2.: based on the ber curve of the quaternary LDPC sign indicating number of PEG algorithm and random configuration mode, frame length is respectively 1000,4000,20000bits.
Fig. 3: based on the ber curve of binary system LDPC sign indicating number under the identical frame length of PEG algorithm and quaternary LDPC sign indicating number, frame length is for being 1000,4000bits.
Embodiment
Below we are example with a concrete coding and decode procedure, further describe the realization of the inventive method.
We are example with (3,6) on the GF (4) sign indicating number.For the ease of understanding, can adopt the H of random fashion earlier, understand decoding and how to realize.Then the H of random fashion is changed into the H that is constructed by the PEG mode, other places are just the same.
Suppose that code word size is N, then H is the matrix of one M * N, M=N/2.h IjBe the capable j column element of i among the H.Function rand_int (n) produces 0---random integers between the n-1.Generator matrix is designated as G, and code word is designated as
Figure A20051005710500111
Information bit is designated as computing such as the table 1 on the  .GF (4), and division table wherein is according to the multiplication table structure, and division is the inverse operation of multiplication.
0 1 2 3
0 0 1 2 3
1 1 0 3 2
2 2 3 0 1
3 3 2 1 0
Addition table on table 1.1 GF (4)
0 1 2 3
0 0 0 0 0
1 0 1 2 3
2 0 2 3 1
3 0 3 1 2
Multiplication table on table 1.2 GF (4)
÷ 0 1 2 3
0 × × × ×
1 0 1 2 3
2 0 3 1 2
3 0 2 3 1
Division table on table 1.3 GF (4), row is a dividend, row be place's number we produce binary H earlier, then at random usefulness of ' 1 ' among the H 1,2, an element substitution among the 3}
for?i=0:M-1
for?j=0:N-1
if(h ij=1)
h ij=rand_int(3)+1
end
end
We utilize LU to decompose and find G then, utilize formula then
u ^ = s ^ ⊗ G
Obtain code word.
We adopt binary channel to transmit code word.With the code word on the GF (4)
Figure A20051005710500122
Be mapped as the code word on the GF (2) Send into awgn channel after the BPSK modulation, the noise variance of channel is σ 2
Figure A20051005710500124
Be channel output, y[i] be its i component.P0[2*N), p1[2*N] store code word respectively
Figure A20051005710500125
In each component be 0 or be 1 posterior probability: pn0[N], pn1[N], pn2[N], pn3[N] store code word respectively
Figure A20051005710500126
In each component be 0,1,2,3 posterior probability.That is:
for?i=0:2*N-1
p1[i]=1/(1+exp(-2*y[i]/σ 2))
p0[i]=1-p1[i]
end
With binary code word
Figure A20051005710500127
The posterior probability inverse mapping become quaternary code word Posterior probability.
for?i=0:N-1
pn0[i]=p0[2*i]*p0[2*i+1]
pn1[i]=p0[2*i]*p1[2*i+1]
pn2[i]=p1[2*i]*p0[2*i+1]
pn3[i]=p1[2*i]*p1[2*i+1]
end
Below just can decipher with the mode that equivalent transformation combines with Fourier transform.
*Initialization
for?m=0:M-1
for?n=N(m)
q mn 0 = pn 0 [ n ]
q mn 1 = pn 1 [ n ]
q mn 2 = pn 2 [ n ]
q mn 3 = pn 3 [ n ]
end
end
*The beginning iterative decoding, iter_num is the maximum iteration time of presetting.
for?c=1:iter_num
for?m=0:M-1
/ * * * * * * * calculates Q Mn ' a* * * * * * */
for?n=N(m)
/ * * * * * * * * equivalent transformation * * * * * * * */
q mn ′ 0 = q mn 0 ÷ h mn
q mn ′ 1 = q mn 1 ÷ h mn
q mn ′ 2 = q mn 2 ÷ h mn
q mn ′ 3 = q mn 3 ÷ h mn
/ * * * * * * * * * Fourier transform * * * * * * * * * */
Q mn ′ 0 = [ q mn ′ 0 + q mn ′ 1 ] + [ q mn ′ 2 + q mn ′ 3 ]
Q mn ′ 1 = [ q mn ′ 0 - q mn ′ 1 ] + [ q mn ′ 2 - q ′ mn 3 ]
Q mn ′ 2 = [ q mn ′ 0 + q mn ′ 1 ] - [ q mn ′ 2 + q mn ′ 3 ]
Q mn ′ 3 = [ q mn ′ 0 - q mn ′ 1 ] - [ q mn ′ 2 - q mn ′ 3 ]
end
/ * * * * * * * * * calculates r Mn a* * * * * * * */
for?n=N(m)
/ * * * * * * * * * * * * * inverse Fourier transform * * * * * * * * */
r mn ′ 0 = ( [ Π j ∈ N ( m ) \ n Q mj ′ 0 + Π j ∈ N ( m ) \ n Q mj ′ 1 ] + [ Π j ∈ N ( m ) \ n Q mj ′ 2 + Π j ∈ N ( m ) \ n Q mj ′ 3 ] ) / 4
r mn ′ 1 = ( [ Π j ∈ N ( m ) \ n Q mj ′ 0 - Π j ∈ N ( m ) \ n Q mj ′ 1 ] + [ Π j ∈ N ( m ) \ n Q mj ′ 2 - Π j ∈ N ( m ) \ n Q mj ′ 3 ] ) / 4
r mn ′ 2 = ( [ Π j ∈ N ( m ) \ n Q mj ′ 0 + Π j ∈ N ( m ) \ n Q mj ′ 1 ] - [ Π j ∈ N ( m ) \ n Q mj ′ 2 + Π j ∈ N ( m ) \ n Q mj ′ 3 ] ) / 4
r mn ′ 3 = ( [ Π j ∈ N ( m ) \ n Q mj ′ 0 - Π j ∈ N ( m ) \ n Q mj ′ 1 ] - [ Π j ∈ N ( m ) \ n Q mj ′ 2 - Π j ∈ N ( m ) \ n Q mj ′ 3 ] ) / 4
The contrary equivalent transformation * * * * * * * * * * of/* * * * * * * */
r mn 0 = r mn ′ ( 0 ⊗ h mn )
r mn 1 = r mn ′ ( 1 ⊗ h mn )
r mn 2 = r mn ′ ( 2 ⊗ h mn )
r mn 3 = r mn ′ ( 3 ⊗ h mn )
end
end
/ * * * * * * * upgrades q Mn a, the judgement of do decoding simultaneously * * * * * * */
for?n=0:N-1
for?m=M(n)
q mn 0 = α mn pn 0 [ n ] Π j ∈ M ( n ) \ m r jn 0
q mn 1 = α mn pn 1 [ n ] Π j ∈ M ( n ) \ m r jn 1
q mn 2 = α mn pn 2 [ n ] Π j ∈ M ( n ) \ m r jn 2
q mn 3 = α mn pn 3 [ n ] Π j ∈ M ( n ) \ m r jn 3
/ * * * * * is α wherein MnSatisfy Σ a = 0 3 q mn a = 1 ********/
/ * * * * * * * * * * calculates q n a* * * * * * * * */
q n 0 = α n pn 0 [ n ] Π j ∈ M ( n ) r jn 0
q n 1 = α n pn 1 [ n ] Π j ∈ M ( n ) r jn 1
q n 2 = α n pn 2 [ n ] Π j ∈ M ( n ) r jn 2
q n 3 = α n pn 3 [ n ] Π j ∈ M ( n ) r jn 3
/ * * * * * * is α wherein nSatisfy Σ a = 0 3 q n a = 1 *******/
/ * * * * * * decoding judgement * * * * * * */
x ^ n = arg max a q n a
end
end
If/* * * * * * * then jumps out circulation successfully decoded, otherwise continue iteration up to circulation end * * * * * * */
if ( H x ^ = 0 ^ )
break;
end
Provided the coding and decoding false code of the LDPC sign indicating number on the GF (4) above.As long as certain basis is arranged, will be easy to correct GF (4) and other GF (2 of simulating according to false code for binary system LDPC sign indicating number m) the emulation of LDPC sign indicating number on awgn channel on the territory.

Claims (2)

1, adds the multi-system encoding and decoding low-density parity check code method of limit algorithm one by one, comprise coded portion and corresponding decoding part, method is to adopt that to add the limit one by one be that the PEG algorithm carries out the coding that the multi-system low-density checksum is the LDPC sign indicating number, obtain stable and the long long Taner figure of minimum ring, adopt equivalent transformation simultaneously and combine and carry out the decoding of m-ary LDPC sign indicating number with Fourier transform.
2, the m-ary LDPC code coding/decoding method of PEG algorithm according to claim 1 is characterized in that:
Coding step is as follows:
(1) utilize PEG to construct binary matrix H earlier:
(2) then the nonzero element among the H is used randomly 1,2 ..., the element substitution among the q-1} has obtained stable and more excellent H;
(3) decompose according to LU and obtain generator matrix G, suppose that information bit is designated as S, code word is designated as U, then has U=S  G multiplication to follow multiplication rule on the GF (q);
The decoding step is as follows:
(1) initialization
According to channel model q Mn αBe initialized as f n α, that is, and the likelihood value when =α;
Make N (m) :={ n: h Mn≠ 0}, expression participates in the set of the variable point of m verification, M (n) :={ m: h Mn≠ 0},
Represent the set of n the check that variable point participated in;
(2) carrying out ET is that equivalent transformation and FT are Fourier transform
q mn α ′ = q mn α ÷ h mn
Q mn α ′ = FT [ q mn 0 ′ , q mn 1 ′ , . . . , q mn q - 1 ′ ]
(3) carrying out IFT is the promptly contrary equivalent transformation of inverse fourier transform and IET, to calculate r Mn α
r mn α ′ = IFT [ ( Π j ∈ N ( m ) \ n Q mj 0 ′ ) , . . . , ( Π j ∈ N ( m ) \ n Q mj q - 1 ′ ) ]
r mn α = r mn ( α ⊗ h mn ) ′
(4) upgrade q Mn α
q mn α = α mn f n α Π j ∈ M ( n ) \ m r jn α
α wherein MnSatisfy Σ α = 0 q - 1 q mn α = 1
(5) calculate q n α
q n α = α n f n α Π j ∈ M ( n ) r jn α
α wherein nSatisfy Σ α = 0 q - 1 q n α = 1 ;
(6) decoding judgement:
x ^ n = arg max α q n α
If H x ^ = 0 ^ Perhaps iterations has reached default maximum, and then algorithm stops, and continues iteration otherwise got back to for (2) step.
CNB2005100571051A 2005-06-06 2005-06-06 Method of using algorithm of adding edge one by one for encoding and decoding low-density parity check code in multiple system of carry digit Expired - Fee Related CN100424999C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2005100571051A CN100424999C (en) 2005-06-06 2005-06-06 Method of using algorithm of adding edge one by one for encoding and decoding low-density parity check code in multiple system of carry digit

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2005100571051A CN100424999C (en) 2005-06-06 2005-06-06 Method of using algorithm of adding edge one by one for encoding and decoding low-density parity check code in multiple system of carry digit

Publications (2)

Publication Number Publication Date
CN1697330A true CN1697330A (en) 2005-11-16
CN100424999C CN100424999C (en) 2008-10-08

Family

ID=35349886

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2005100571051A Expired - Fee Related CN100424999C (en) 2005-06-06 2005-06-06 Method of using algorithm of adding edge one by one for encoding and decoding low-density parity check code in multiple system of carry digit

Country Status (1)

Country Link
CN (1) CN100424999C (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101257311B (en) * 2008-04-03 2010-06-02 浙江大学 Quick interpretation method of LDPC code under multiple scale
CN101159515B (en) * 2007-11-22 2010-08-25 普天信息技术研究院有限公司 Encoding method and system of variable length low-density parity code
CN101997552A (en) * 2009-08-31 2011-03-30 电子科技大学 Design of multi-element irregular low density parity check (LDPC) codes with low coding complexity
CN103812614A (en) * 2014-03-04 2014-05-21 西安电子科技大学 Multi-system orthogonal signal low-density check code coding/decoding method

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3808769B2 (en) * 2001-12-27 2006-08-16 三菱電機株式会社 LDPC code check matrix generation method
KR100543154B1 (en) * 2002-07-26 2006-01-20 휴우즈 일렉트로닉스 코오포레이션 Method and system for generating low density parity check codes

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101159515B (en) * 2007-11-22 2010-08-25 普天信息技术研究院有限公司 Encoding method and system of variable length low-density parity code
CN101257311B (en) * 2008-04-03 2010-06-02 浙江大学 Quick interpretation method of LDPC code under multiple scale
CN101997552A (en) * 2009-08-31 2011-03-30 电子科技大学 Design of multi-element irregular low density parity check (LDPC) codes with low coding complexity
CN103812614A (en) * 2014-03-04 2014-05-21 西安电子科技大学 Multi-system orthogonal signal low-density check code coding/decoding method

Also Published As

Publication number Publication date
CN100424999C (en) 2008-10-08

Similar Documents

Publication Publication Date Title
CN1547806A (en) Method and system for routing in low density parity check (ldpc) decoders
CN1113295C (en) Error correcting encoding set
CN1697359A (en) System, apparatus and method for transmitting and receiving data
CN1941635A (en) Method for constructing low-density and irregular parity checking code
CN1836394A (en) Apparatus and method for coding/decoding block ldpc codes in a mobile communication system for maximizing error correction performance and minimizing coding complexity
CN1830149A (en) Method for encoding low-density parity check code
CN1256812C (en) Engine encoder and channel encoding method
CN1838542A (en) Decoding apparatus and method and program
CN1558556A (en) Systematic code design method for irregular low density parity check code and communication system thereof
CN1947368A (en) Apparatus and method for coding/decoding block low density parity check code with variable block length
CN1185796C (en) Improved correcting decoding method for non-regular low-density parity-check code
CN1993892A (en) Apparatus and method for encoding and decoding a block low density parity check code
CN1770640A (en) Coder/decoder for low-density parity check code and its forming method
CN1701515A (en) Decoding method, decoding device, and program
CN1494770A (en) Interleaver for TURBO decoder
CN1783729A (en) Method and apparatus for decoding low density parity check code using united node processing
CN1993917A (en) Apparatus and method for coding/decoding block low density parity check code with variable block length
CN1463500A (en) Method of decoding variable-length codeword sequence
CN1526196A (en) Reduced soft output information packet selection
CN101039119A (en) Encoding and decoding methods and systems
CN1692557A (en) Encoding device, encoding method, encoding program, decoding device, decoding method, decoding program
CN1306698A (en) Interleaving appts. and method for use in serial concatenated convolutional code encoder in mobile communication system
CN1701516A (en) Check matrix generation method and check matrix generation device
CN1252935C (en) Information source-channel united coding method based on low-density odd-even check coding
CN1961517A (en) Method for error correction coding comprising local error detection codes, corresponding decoding method, transmitting, receiving and storage device and program

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20081008

Termination date: 20110606