HIGH - RATE BINOMIAL CONVOLUTIONAL CODES by Ph . PIRET
نویسنده
چکیده
A construction is described of high-rate RS-like convolutional codes, and a lower bound is given on their free distance. These codes can be used to construct asymptotically good binary convolutional codes. 1. Introduetion I~ a preceding report 4), a class of RS-like convolutional codes was introduced. These codes were obtained only for length n, rate R = kln and constraint length 'll related by the inequality \ Rn 'V~ n + I, (1) and their free distance was lower-bounded as follows: df~'V(n-k+I). (2) Our aim in this paper will be to obtain codes with a slightly weaker bound on df, but for which n, k and 'Vwould no more be so drastically bounded as in (I). After recalling the formalism used to represent the RS-like codes, and some useful arguments for computing df> we shall present in sec. 3 a construction of high-rate RS-like convolutional codes, and a lower bound on their free distance. These codes are then used to obtain long, asymptotically good, binary convolutional codes, of arbitrary rate, by use of some arguments developed by Justesen 3). 2. Representation of the RS-like codes Let q be a power of 2, and consider a linear convolutional code of length n, rate kln and constraint length 'Von GF(q). lts generator matrix can be given the form (3) where we suppose that all G, generate cyclic RS block codes 2). We shall consider an n-tuple with polynomial representation xn_ 1 gr(X)= ---, r = 0, 1, ... , n-I, X(/.r (4) where oe,primitive of order n, is in GF(q) but in no proper subfield. The k HIGH-RATE BINOMIAL CqNVOLUTIONAL CODES 447 n-tuples of each Gj are chosen in this set so that each G, can be represented by a column of k integers referring to the indices of the chosen n-tuples. 'using this convention, we represent the generator matrix G by a rectangular array of integers gij (0 ~ i ::::;; k I, 0 ~ j ~ v I). The space of the admitted sequences is then generated by the rows of a matrix r that we now describe. Consider therefore the matrix G, represented by v columns of gij, and the , operator T" that shifts G, s columns to the right. The matrix T', is then given by ,
منابع مشابه
Addendum to "Generalized Permutations in Convolutional Codes"
where 7/denotes the set of integers. Obviously F(D) has the structure of a field. An (n, h) convolutional code C of memory span m over F, is the F(D) row space m of a k × n polynomial matrix G(D) = ~i=0 Gi Di, where each G i (0 ~ i ~ m) is a k × n matrix overF. The rank of G(D) overF(D) must be k. Recently (Piret, 1978) binary (6, 2) codes were obtained as an application of convolutional operat...
متن کاملConvolutional Codes Derived From Group Character Codes
Constructions of (classical) convolutional codes and their corresponding properties have been presented in the literature [1, 3–8, 12, 15–20]. In [3], the author constructed an algebraic structure for convolutional codes. Addressing the construction of maximum-distance-separable (MDS) convolutional codes (in the sense that the codes attain the generalized Singleton bound introduced in [18, Theo...
متن کاملCodes between Bch and Rs Codes
The codes obtained as the shortened binary image of linear codes over GF(2m) are studied in detail. Their dimension is computed and it is shown that they may be used as unequal error proteetion codes.
متن کاملOn interleaved, differentially encoded convolutional codes
We study a serially interleaved concatenated code construction, where the outer code is a standard convolutional code, and the inner code is a recursive convolutional code of rate 1. Focus is put on the ubiquitous inner differential encoder (used in particular to resolve phase ambiguities), double differential encoder (used to resolve both phase and frequency ambiguities), and another rate 1 re...
متن کاملBLIND PARAMETER ESTIMATION OF A RATE k/n CONVOLUTIONAL CODE IN NOISELESS CASE
This paper concerns to blind identification of a convolutional code with desired rate in a noiseless transmission scenario. To the best of our knowledge, blind estimation of convolutional code based on only the received bitstream doesn’t lead to a unique solution. Hence, without loss of generality, we will assume that the transmitter employs a non-catastrophic encoder. Moreover, we consider a c...
متن کامل