Chapter 31 INTRODUCTION TO ALGEBRAIC CODING THEORY.

Slides:



Advertisements
Similar presentations
Mahdi Barhoush Mohammad Hanaysheh
Advertisements

Noise, Information Theory, and Entropy (cont.) CS414 – Spring 2007 By Karrie Karahalios, Roger Cheng, Brian Bailey.
STATISTIC & INFORMATION THEORY (CSNB134) MODULE 12 ERROR DETECTION & CORRECTION.
Cyclic Code.
Error Control Code.
Information and Coding Theory
II. Linear Block Codes. © Tallal Elshabrawy 2 Last Lecture H Matrix and Calculation of d min Error Detection Capability Error Correction Capability Error.
IV054 CHAPTER 2: Linear codes ABSTRACT
DIGITAL COMMUNICATION Coding
Error detection and correction
Orthogonality and Least Squares
Copyright © Cengage Learning. All rights reserved.
15-853Page :Algorithms in the Real World Error Correcting Codes I – Overview – Hamming Codes – Linear Codes.
Hamming Code Rachel Ah Chuen. Basic concepts Networks must be able to transfer data from one device to another with complete accuracy. Data can be corrupted.
exercise in the previous class (1)
Hamming Codes 11/17/04. History In the late 1940’s Richard Hamming recognized that the further evolution of computers required greater reliability, in.
ChannelCoding Hafiz Malik Dept. of Electrical & Computer Engineering The University of Michigan-Dearborn
MAT 1000 Mathematics in Today's World Winter 2015.
Linear codes 1 CHAPTER 2: Linear codes ABSTRACT Most of the important codes are special types of so-called linear codes. Linear codes are of importance.
Syndrome Decoding of Linear Block Code
Linear Codes.
DIGITAL COMMUNICATION Error - Correction A.J. Han Vinck.
USING THE MATLAB COMMUNICATIONS TOOLBOX TO LOOK AT CYCLIC CODING Wm. Hugh Blanton East Tennessee State University
Information and Coding Theory Linear Block Codes. Basic definitions and some examples. Juris Viksna, 2015.
Exercise in the previous class p: the probability that symbols are delivered correctly C: 1 00 → → → → What is the threshold.
4-2 binary fields and binary vector spaces Special Thanks to Dr. Samir Al-Ghadhban & EE430 Students.
CODING/DECODING CONCEPTS AND BLOCK CODING. ERROR DETECTION CORRECTION Increase signal power Decrease signal power Reduce Diversity Retransmission Forward.
Error Control Code. Widely used in many areas, like communications, DVD, data storage… In communications, because of noise, you can never be sure that.
PEDS: A PARALLEL ERROR DETECTION SCHEME FOR TCAM DEVICES Author: Anat Bremler-Barr, David Hay, Danny Hendler and Ron M. Roth Publisher/Conf.: IEEE INFOCOM.
Codes Codes are used for the following purposes: - to detect errors - to correct errors after detection Error Control Coding © Erhan A. Ince Types: -Linear.
MIMO continued and Error Correction Code. 2 by 2 MIMO Now consider we have two transmitting antennas and two receiving antennas. A simple scheme called.
Practical Session 10 Error Detecting and Correcting Codes.
Introduction to Coding Theory. p2. Outline [1] Introduction [2] Basic assumptions [3] Correcting and detecting error patterns [4] Information rate [5]
Basic Characteristics of Block Codes
Error Control Code. Widely used in many areas, like communications, DVD, data storage… In communications, because of noise, you can never be sure that.
§6 Linear Codes § 6.1 Classification of error control system § 6.2 Channel coding conception § 6.3 The generator and parity-check matrices § 6.5 Hamming.
DIGITAL COMMUNICATIONS Linear Block Codes
Hamming codes. Golay codes.
1 Introduction to Quantum Information Processing CS 667 / PH 767 / CO 681 / AM 871 Richard Cleve DC 2117 Lecture 20 (2009)
ADVANTAGE of GENERATOR MATRIX:
Linear Block Code 指導教授:黃文傑 博士 學生:吳濟廷
Information and Coding Theory Cyclic codes Juris Viksna, 2015.
Information Theory Linear Block Codes Jalal Al Roumy.
Word : Let F be a field then the expression of the form a 1, a 2, …, a n where a i  F  i is called a word of length n over the field F. We denote the.
Error control coding – binary linear codes Background material for linear error control codes.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
The parity bits of linear block codes are linear combination of the message. Therefore, we can represent the encoder by a linear system described by matrices.
Error Detection and Correction – Hamming Code
Some Computation Problems in Coding Theory
Error Detection and Correction
Digital Communications I: Modulation and Coding Course Term Catharina Logothetis Lecture 9.
Sense making in linear algebra Lee Peng Yee Bangkok
Information and Coding Theory Linear Block Codes. Basic definitions and some examples. Some bounds on code parameters. Hemming and Golay codes. Syndrome.
Hamming Distance & Hamming Code
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Richard Cleve DC 2117 Introduction to Quantum Information Processing QIC 710 / CS 667 / PH 767 / CO 681 / AM 871 Lecture (2011)
Chapter 4 Vector Spaces Linear Algebra. Ch04_2 Definition 1: ……………………………………………………………………. The elements in R n called …………. 4.1 The vector Space R n Addition.
Matrices CHAPTER 8.9 ~ Ch _2 Contents  8.9 Power of Matrices 8.9 Power of Matrices  8.10 Orthogonal Matrices 8.10 Orthogonal Matrices 
Practical Session 10 Computer Architecture and Assembly Language.
Channel Coding: Part I Presentation II Irvanda Kurniadi V. ( ) Digital Communication 1.
8 Coding Theory Discrete Mathematics: A Concept-based Approach.
Computer Architecture and Assembly Language
Chapter 6.
Subject Name: Information Theory Coding Subject Code: 10EC55
II. Linear Block Codes.
Information Redundancy Fault Tolerant Computing
Standard Array.
Copyright © Cengage Learning. All rights reserved.
주민등록번호.
Computer Architecture and Assembly Language
Presentation transcript:

Chapter 31 INTRODUCTION TO ALGEBRAIC CODING THEORY

Motivation: Suppose you wish to send a message to either execute or not a particular command; 1 to execute, 0 to not. The message is to be transmitted thousands of miles away and is susceptible to interference (noise) that could alter the intended message. What could be done to improve a safe delivery? Suppose you wish to send a message to either execute or not a particular command; 1 to execute, 0 to not. The message is to be transmitted thousands of miles away and is susceptible to interference (noise) that could alter the intended message. What could be done to improve a safe delivery?

Simple apply redundancy Start with the idea of majority rule. So if you want to send the message of 0, turn it into Whichever number appears the most is the intended one. Start with the idea of majority rule. So if you want to send the message of 0, turn it into Whichever number appears the most is the intended one. This involves the idea of independent error (maximum-likelihood decoding) This involves the idea of independent error (maximum-likelihood decoding) So if you send a sequence of length 500 and each digit has a probability of error q=.01 (p=.99). SO the chance that the message is sent error free equals (.99)^500 or approx So if you send a sequence of length 500 and each digit has a probability of error q=.01 (p=.99). SO the chance that the message is sent error free equals (.99)^500 or approx..0066

Three fold repetition scheme > > > >111 Error can only occur if 001,010,100,000 Error can only occur if 001,010,100,000 Q (error)= (.01)(.01)(.99)+(.01)(.99)(.01)+(.99)(.01)(.01)+(.01)(. 01)(.01) ≈ Q (error)= (.01)(.01)(.99)+(.01)(.99)(.01)+(.99)(.01)(.01)+(.01)(. 01)(.01) ≈ P(no error) = (.99702)^500 ≈.86 P(no error) = (.99702)^500 ≈.86

Goal To devise reliable, efficient, and reasonably easy to implement To devise reliable, efficient, and reasonably easy to implement Three basic features: 1.set of messages 2.method of encoding 3. method of decoding Three basic features: 1.set of messages 2.method of encoding 3. method of decoding

Example 1:

Example 1 cont.

Definition: Linear Code An (n, k) linear code over a field F is a k-dimensional subspace V of the vector space An (n, k) linear code over a field F is a k-dimensional subspace V of the vector space F = F + F +… +F n copies Over F. The members of V are called the code words. When F is Z 2 the code is called binary. The message consist of k digits and the redundancy of the remaining n - k The message consist of k digits and the redundancy of the remaining n - k

Example 4: The set {0000,0121, 0212, 1022, 1110, 1201, 2011, 2102, 2220} is a (4,2) linear code over Z3; called a ternary code.

Definitions: The Hamming distance between two vectors of a vector space is the number of components in which they differ. Denoted d(u,v). The Hamming weight of a vector is the number of nonzero components of the vector. Denoted wt(u). The Hamming weight of a linear code is the minimum weight of any nonzero vector in the code. Example s = , t = , v = d(s,t) = 4, d(s,v) = 5, wt(s) = 4, wt(v) = 5

Theorem For any vectors u,v, and w, d(u,v) ≤ d(u,w) + d(w,v) and d(u,v) = wt(u – v). This theorem and the previous definitions give the following.Theorem If the Hamming weight of a linear code is at least 2t + 1, then the code can correct any to or fewer errors. Alternatively, the same code can detect any 2t or fewer errors. Note: A linear code with Hamming weight 2t + 1 can detect t errors or 2t errors, not both.

Example Hamming (7,4) code revisited (Table on p523) Hamming weight is 3 = 2 * This code can detect 1 error or 1 or 2 errors.

CHOSING THE G MATRIX

Parity-check matrix decoding For any received word w, compute wH. For any received word w, compute wH. If wH is the zero vector, assume no error was made. If wH is the zero vector, assume no error was made. If there exist one instance of a nonzero element s € F and a row i of H s.t. wH is s times row i, assume the sent word was w – (0…s…0) where s occurs in the ith component. If there is more than one such instance, do not decode. If there exist one instance of a nonzero element s € F and a row i of H s.t. wH is s times row i, assume the sent word was w – (0…s…0) where s occurs in the ith component. If there is more than one such instance, do not decode. If wH does not fit into either category 2 or 3, at least two errors occurred; don’t decode. If wH does not fit into either category 2 or 3, at least two errors occurred; don’t decode.

Example Hamming (7,4) code The generator matrix G is The parity-check matrix H is

Example (cont) Consider received word v = , vH = is 1 st row of H and no other, so an error was made in the 1 st position of v. So the received word is really

Lemma: Orthogonality Relation Let C be an (n, k) linear code over F with generator matrix G and parity- check matrix H. Then for any vector in F^n, we have vH = 0 (the zero vector) iff v belongs to C Let C be an (n, k) linear code over F with generator matrix G and parity- check matrix H. Then for any vector in F^n, we have vH = 0 (the zero vector) iff v belongs to C

Theorem 31.3 Parity-Check Matrix Decoding Parity-check matrix decoding will correct any single error if and only if if and only if the rows of the parity-check matrix are nonzero and no one row is a scalar multiple of any other. the rows of the parity-check matrix are nonzero and no one row is a scalar multiple of any other.

Coset Decoding Do this by constructing a table called a standard array. 1 st row is the set C of received code words beginning with the identity st row is the set C of received code words beginning with the identity choose another element v in V and consider the coset v + C choose another element v in V and consider the coset v + C (where v is not an element already listed in the table) (where v is not an element already listed in the table) among the elements of v + C, choose one of minimum weight, among the elements of v + C, choose one of minimum weight, call it v‘. call it v‘. create the next row by placing vector v‘ + c under the code create the next row by placing vector v‘ + c under the code word c word c continue until all vectors in V have been listed continue until all vectors in V have been listed (Note: an (n, k) linear code over a field with q elements will have (Note: an (n, k) linear code over a field with q elements will have |v * c| = q^( n- k) rows |v * c| = q^( n- k) rows 1 st column is called the coset leaders 1 st column is called the coset leaders

Example Consider (6,3) binary linear code C = {000000, , , , , , , }

Theorem 31.4 Coset Decoding Is Nearest-Neighbor Decoding In coset decoding, a received word w is decoded as a code word c such that d( w, c) is a minimum In coset decoding, a received word w is decoded as a code word c such that d( w, c) is a minimum

Definition If an (n, k) linear code over F has a parity-check matrix H, then, for any vector u in F^n, the vector uH is called the syndrome of u. Theorem Let C be an (n, k,) linear code over F with a parity-check matrix H. Then, two vectors of F^ n are in the same coset of C iff they have the same syndrome. We can use syndromes for decoding any received word w: Calculate wH (syndrome) Calculate wH (syndrome) Find coset leader v such that wH = vH Find coset leader v such that wH = vH Assume vector sent was w - v Assume vector sent was w - v

Example 11 H = H = Coset leaders Coset leaders Syndromes Syndromes For v = , vH = 100. Since the coset leader has 100 as its syndrome, v = was sent. For v = , vH = 100. Since the coset leader has 100 as its syndrome, v = was sent