A connection between block and convolutional codes
Citation for published version (APA):
Solomon, G., & Tilborg, van, H. C. A. (1979). A connection between block and convolutional codes. SIAM Journal on Applied Mathematics, 37(2), 358-369. https://doi.org/10.1137/0137027
DOI:
10.1137/0137027
Document status and date: Published: 01/01/1979 Document Version:
Publisher’s PDF, also known as Version of Record (includes final page, issue and volume numbers) Please check the document version of this publication:
• A submitted manuscript is the version of the article upon submission and before peer-review. There can be important differences between the submitted version and the official published version of record. People interested in the research are advised to contact the author for the final version of the publication, or visit the DOI to the publisher's website.
• The final author version and the galley proof are versions of the publication after peer review.
• The final published version features the final layout of the paper including the volume, issue and page numbers.
Link to publication
General rights
Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain
• You may freely distribute the URL identifying the publication in the public portal.
If the publication is distributed under the terms of Article 25fa of the Dutch Copyright Act, indicated by the “Taverne” license above, please follow below link for the End User Agreement:
www.tue.nl/taverne Take down policy
If you believe that this document breaches copyright please contact us at: openaccess@tue.nl
providing details and we will investigate your claim.
Vol.37,No.2,October1979 0036-1399/79/3702-0014$01.00/0
A
CONNECTION
BETWEEN
BLOCK
AND
CONVOLUTIONAL
CODES*
G. SOLOMON" AND H. C. A. VAN TILBORG$Abstract. Convolutional codes of any rate and any constraint length give rise to a sequence of
quasi-cyclic codes. Conversely,anyquasi-cycliccode may be convolutionally encoded.Amongthe quasi-cyclic codes are the quadratic residuecodes, Reed-Solomon codesand optimalBCHcodes.The constraint
lengthKforthe convolutional encoding ofmanyof thesecodes (Golay, (48, 24) QR, etc.)turns outtobe surprisingly small. Thus usingthe softdecoding techniques for convolutionaldecodingwenowhave anew maximumlikelihood decoding algorithm formanyblock codes.Converselyan optimal quasi-cyclic code will yieldaconvolutional encoding with optimal local properties and therefore withgoodinfinite convolutional
codingproperties.
Introduction. Thispaperisdivided into3sections.
In
the first section we establish arelation between quasi-cycliccodes and convolutional codes.Let
io, il," ",in-1
be the first n informationsymbols ofa rate21-
convolutionalcode with constraintlengthK.
Ifwe stipulate that the next
(K-
1)
informationsymbolscoincide with the first(K- 1)
informationsymbols (i.e. i0," ", iK-2), then the resulting 2n output symbolsform a
quasi-cyclic code. Conversely a quasi-cyclic code is shown to be convolutionally
encodable.
Our
main thrusthere is to minimize the constraintlengthK.
We
end the section by observing that the preceding results apply to any ratekin
convolutional(resp.
quasi-cyclic)code.In
{} 2 we extend the notion of quasi-cyclic codes and obtain a modified con-volutionalencoding, allowingus to include alargerclassofcodes.It
alsoallowsus to obtain asmall constraintlengthK.
Among
thecodesin thiscategoryarethe quadratic residuecodes,
theReed-Solomoncodes,
optimalBCH
codes andmany extended cyclic codes.One
obviousadvantage
of this is a tew maximum likelihood(soft
and harddecision) decodingofthese codesusingconvolutional decoding techniques.
We
illus-trate the above by giving various examples, most notably a 4-stage convolutionalencodingof the binary
Golay
(24, 12)
code.Finally in{} 3,we presenttablesofrate
,
1/2
and32-
blockcodes and their convolutionalencoding.
One
can use{} 6inChap. 16of[4]
as a startingreferencetoquasi-cycliccodes andreferences
[3]
and[6]
to convolutionalcodes andtheirdecoding.1.
From
convolutional to quasi-cyclic codes and back.Let
us consider a con-volutionalcode (binary ornonbinary) of rate with constraintlengthK.
The taps are describedbythepolynomialsK-1 K-1
p(x)
pix andq(x)--
,
qixi,
=0 =0
where
(po, q0)
#(0,
0)
and(pc-1, qr-1)
#(0,
0). (See
Fig.1.) Let
n be an integer.We
shallonlyconsiderinput sequences of theform i-+x, ",i-1, i0, ix," ",in-x, where
i_j
in-.,
for1 -<_/’-<K
1, i.e., sequencesoflength n+
K
1, in which the firstK
1symbols arerepeatedattheend.
*Receivedby theeditorsAugust2,1977 and in final revised form October24,1978. Thispaperpresents theresults of onephase of research carriedoutattheJet Propulsion Laboratory,California Institute of
Technology, supported bythe National Aeronautics andSpaceAdministration underContract NAS7-100.
JetPropulsionLaboratory,California Institute ofTechnology,Pasadena, California91125.
tDepartmentof Mathematics, Technological University of Eindhoven, Eindhoven, theNetherlands.
aj p(x) +x+x
b.
q(x)=1AI-X3-X4K=5. FIG.1. Binary convolutional code withK 5.
The twooutput sequences
depend
onthe inputsequence inthefollowingway:K-1 ai
Y.
plii-t, 0<-j<=
n 1, /=0 K-1bi
Z
qtii-,, 0<-j <-n 1. /=0This is a trelliscode with the same initial and final encoder states taking onany possible
value
(as
opposedtotheall zerostate)!
Thisfact isusedtogreateffect indecoding(see
the end of this section). Turning back to our notations we see that in terms of polynomials,wehave,writing
n--1 i(x)=
Z
il
Xl,
/=0 the relations(1.1)
n-1 n-1a(x)=
alx andb(x)=
blX
l,
=0 =0
a(x)
=--
i(x)p(x)(mod
x"
1),
b(x)
=-
i(x)q(x)(mod
x"
1).
In
vectornotation,this comesdownto(io,ix,’’ ",
i,,-x)(P Q)
(ao,
ax,’",an-l,bo, bl,’" ",bn-1),
where
P
and Q aren n circulants with toprow(po,
pl,,
p,-1, 0,,
0),
respec-tively
(q0,
ql,""", qk-1,0,""",0).
From
the observations above itfollowsthatthe codewords fromour convolutionalcodearethe codewordsin the linearcode generated by the matrix
G=(PIQ).
Codes of this form are called quasi-cyclic codes. The rank of this matrix is easily
determinedbythefollowingtheorem,well knownfromthetheory of algebra.
THEOREM 1.1.
Let
p(x)
andq(x)
betwopolynomialsof
degreeat most n 1 andP
and Q theassociated circulants. Then
rank
(P[
Q)
n degreeof
g.c.d.(p
(x),
q(x),
x"
1).
n--1Proof.
Let
f(x)
g.c.d.(p
(x),
q(x),
x1). Moreover
let(x)
Y./=o
ilx.
Then(1.2)
(io,’.’,
i-I)(PIQ)=(0,’",010,’",0)
iff
i(x)p(x)=-i(x)q(x)=-O(mod
xn-1),
i.e.,iffi(x)
isdivisibleby(x
-
1)/f(x).
So
the dimension of thesubspace ofvectors(i0,,
i,-1) satisfying(1.2)
equalsthedegree ofSOLOMON AND H. C. A. VAN TILBORG
Example 1.2. The binary code with n 7,
p(x)
1+
x+
x3q(x)
1+
x2-at-x3Singleg.c.d.
(p(x),
q(x),
x7-1)
1,onehas rank(P[
O)
7.Ofspecificinterest are quasi-cycliccodes with generator matrix
where
I
is the nxn identity matrix andF
a circulant with top row(f0,""
",fn-1)
n-1
fixi
(associated with thepolynomial
f(x)=
Yi=o
).
Obviously such a code is systematic onthe first n positions.THEOREM1.3.
Letp(x)
andq(x)
betwopolynomialsof
degreeat most n 1 andletP
and Q be theassociated circulants. Then the codeC
generated by(PIQ)
can also begenerated by
(IIF),
whereF
is a circulant,iff
(p(x),xn-1)
1.In
this caseq(x)=
fix)p
(x) (mod
x 1).
Proof.
(1If(x))
is in the code iff there is a polynomial i(x) such that(i(x)p(x), i(x)q(x))
(1,
f(x))(mod
x1),
i.e., iffp(x)
has an inverse(mod
x1),
i.e., iff g.c.d.(p(x),x n-l)=
1. Clearly in this case i(x)=(p(x))-1 andq(x)--p(x)f(x) (mod
x"-
1).
Remark.
From
q(x)=-f(x)p(x)(modxn-1)
and(1.1)
it follows thatb(x)=-f(x)a
(x)(mod
x1).
Example 1.4.
p(x)
1+
x+
x2,
q(x)
1+
x2 n 7In
thiscase(p(x),
xv-
1)
1One
can findf(x)
by the Euclidean algorithm.It
turns out thatf(x)
x+
x3+
x4+
x6.
From
aconvolutionalcoding pointof view one wants theencoding registertohave few stages.In
otherwords,the maximumdegreeofp(x)
andq(x)
should be small.So
we now look at the reverse problem. Oiven a codeC
generated by(I
IF)
whereF
is a circulant associated with apolynomialf(x),
findpolynomialsp(x)=
i=o pix,q(x)=
K-1
i=0
qix,(P0,
q0)
(0, 0),
(PK-1,
qK-1)
(01.0)
such that(P[
Q) generates the same code C(where P
and Q arethe circulants associated withp(x)
andq(x)). For
this werephrase atheorem that can befoundin
J. J.
Bussgang
[2].
-1
fix
there existTHEOREM 1.5.
For
every integer n and polynomialf(x)=i=o
K-1EK-1
polynomials p(x)
/=o
pixq(x)
/=o qix such thatq(x)=-f(x)p(x) (mod (x
1)),
K
<-[(n
+
1)/2],
(po, qo)
#(0,
0)
and (p/_l,qK-1)
#(0,
0).
Proof.
Lookat thecoefficientspias variables. Since wewantthe coefficient ofx inq(x)=-f(x)p(x)(mod
x-
1)
to be zero for l>=K,we need a nontrivial solution oftheequations n--1 X
Pofn-X
+
Plfn-2
+"+
PK-1fn-K
0 n-2 x Pof-2
+
Pf-3
+"+
PK-lf-K-
0(1.2)
K XPOfK+PlfK-I+’"
"+PK-lfl
=0.For
K
[(n
+
1)/2]
one has more unknowns than relations, which guarantees a nontrivial solutionp(x). One
computesq(x)
fromq(x)=-f(x)p(x)(mod
x-
1).
The condition(p0, q0) (0, 0)
can be met by repeatedly dividingp(x)
andq(x)
by x ifnecessary. If
(PK’+I,
qK’-l)(PK,
qK)
(0,
0)
for someK’ <
K
inthis solution and(PK’,
qK’)
(0, 0),
then we have toreplaceK
byK’.
I-1One
should realize however that the polynomialsp(x)
andq(x)
obtained from Theorem 1.5do notnecessarilyhavetheproperty g.c.d.(p(x), q(x),
x"
1)
1.On
the other hand each solution(p(x), q(x))
with max degree(p(x), q(x))<-
(n-
1)/2]
is a solution of(1.2)
and can be obtained fromTheorem 1.5.However
if one accepts equivalent codes, one may possibly find small degree polynomialsp(x)
andq(x),
withg.c.d.(p(x), q(x),
x1)
1, by applying Theorem 1.5tothecodesobtainedfrom thefollowingtheorem.
THEOREM 1.6.
Let
Ca
andC2
betwoquasi-cyclic codesof
length 2n, generated by(1,
fx(X)),
respectively(1,
f2(x)).
ThenC1
andC2
have thesameweightenumeratorif
anyof
the followingrelationsholds:(i)
f2(x)=-xlfl(x)
(mod
(xn-1)),
O<-l<-n-1, (ii)f2(x)fi (x),
where(fl(x),
x1)=
1, (iii)f2(x)=fx(x)(mod
x"
1),
where(l,
n)=
1.Proof.
Let
w(a(x),b(x))
denote the sum of the weights of the vectors(ao,’’’,
a-l)
and(bo,"’’, b,,-1)
associated witha(x)
andb(x).
(i) w(i(x),
i(x)f2(X))=
w(i(x),i(x)xlfa(X))=
w(i(x),i(X)fl(X)).
(ii) Since
(1,
fx)= fl(f2,
1)
and(f2,
1)=
f2(1, fl)
thecodes generated by(1,
fl)
and(fz,
1)
arethe same.So
(ii) followsfromtheobviousequivalenceof thecodes generated by(1,/2)
and(/2,
1).
(iii) Since
(l,
n)=
1,for each i(x)there exists apolynomialf(x)
such thatf(x
)
i(x)(mod
x"
1).
Moreover
multiplying by modn gives apermutationof the integers0, 1,.,
n-1.So
w(i(x),
i(x)f2(X))= w(i(x),
i(X)fl(xl))=
W(f(xl),
y(xl)fl(XI))
w(j(x), j(x)fx(x)).
By
means of Theorems 1.5 and 1.6 one can try in individual cases to find codegeneratorswith small constraintlength.
In
generalwe cannotsayanything about the minimum valueofK,
but for certain classes of codes we can and shall do this(in2).
Table 1
(see
3)
givesa list ofcode generatorsp(x)
andq(x)
(and
f(x))
for n<-21. The number d stands for the minimumdistance"
andK
for the constraint length. Of coursethere is no reason to restrict ourself to(2n,
n)
quasi-cyclic codes.A
ratekin
convolutional encoder with input sequences (ix,
,
ik), wherei.
(ij,-K+X,"
", ij.-x,t’.o,
i,,"
",i,n-x),
l<=j<-
k, corresponds toa linear code(nm, km)
code with constraintlengthK
andgeneratormatrix:Pll
P12
G--P,
P
P,
where
Pii
is a m m circulant.In
generalit remains aproblemtogobeyond theexisting bounds ontheminimum distance ofsuch a code.Tables 2 and3list some rate1/2
and codes, bythepolynomialspii(x)
associated withPii.
Decoding.
A
quasi-cycliccodemaybeencoded convolutionally. Consequentlyitmaybedecoded byconvolutional decodingtechniques.The usual convolutionalcodeis a trelliscodewithzeros in the first and last
(K- 1)
positionsoftheencoder.Thetrelliscodeshere beginand endwiththesame binary
(K
1)
tuplewhich is notnecessarilyzero.Thus any hardorsoft decoding algorithm, e.g.,Viterbi,
Fano
sequen-tial,etc.,
may
beadaptedtodecodethe block codes here.In
particularif one knew the initial(K-1)
entries, then the technique would be identical in complexity.For
each possible(K- 1)
tuple,one can performa decoding, and then choose the most likelycandidateunder the decoding criterionused.
A
Viterbi decoding forconstraint length 4was applied 8 times in the maximum likelihooddecoding of theGolay(24,
12;8)
code byBooth,Herro
andSolomon[1].
362 G. SOLOMON AND H. C. A. VAN TILBORG
structure.
Now
2K-1 decodings forlargeK
isprohibitive. Possible research areasfor soft decoding would be in the sequential decoding techniques tailored for the finitelengthsconsidered.
Anothertechnique wouldbe to continuouslyrecyclethe received word anddecode
it as a long convolutional codeword. When the decoded word exhibits the correct
periodicity
(say,
overlength 3K or4K)
weacceptthedecoding.Thewayisopenforsimplifiedmaximum likelihooddecodingofmany block codes. 2. Cyclic codes through convolution.
In
1 we related convolutional codes toquasi-cycliccodes anddemonstrated theinherentdualitybetweenthem.
A
quasi-cyclic code may be encoded and consequently decoded convolutionally.In
this section, we treat several families of cyclic codes and look for a quasi-cyclic structure.We
first extend ourconceptofquasi-cyclic codes.DEFINITION 2.1.
(I)
The pure quasi-cyclic codesof theform(PI
Q)
willbe called oftype
Ao.
(ii) Ifoneadjoinsanoverallparitybit on
P
and/or
Q thecode willbeoftypeA1.
(iii) Ifone increasesthedimensionof atype
A1
codeby adjoiningone row to itsgeneratormatrixwe will call it a codeoftype
A2.
We
findthat many important codes fitneatlyinto this"messy"
characterization.Theresults are asfollows:
I.
Allextended quadraticresiduecodesareof typeA2
(as
well asA1).
The binaryGolay
code is encodable bya convolutionalencoder with constraintlength4.II.
Thereexist aclassofReed-Solomonand optimal nonbinaryBCH
codesoftype
A0.
Thep(x),
q(x),
andK
developedwhen used forpure convolutional coding guaranteeoptimalityforK
andthe fieldused,K
d/2
for rate21-.
III.
Almostallgood binarycodesofsmalllength,with various rates are seen tobe ofoneofthe typesabove.See
Tables 1, 2 and 3.2.1. Quadratic residue codes.
THEOREM2.2.
Let U
betheextensionbyanoverallparity bitof
the(2n
+
1,n+
1)
binary quadratic residue code generated by
fQR(X)=HiQR
(X
/Og),
where QR={j2(mod
2n+
1)
11
_-<j-<2n}
and 2n+
1 is a primeof
theform
81+1. ThenU
isof
typeA2.
Furthermorethe(2n
+
1,n)
codegenerated byfCR(X)(X
+
1)
isOf
typeA1
and the shortened(2n,
n)
code obtainedby eliminating thefirst
digitisof
typeA0.
Remark.
In
fact, by choosing the proper(2n
/1,n)
subcode orU,
one cansometimes find a type
A0
code with smallerK (e.g.,
Golay(24,
12), QR(32, 16),
QR(48,
24) code).
Thistechniqueof constructionmaybeappliedto othercyclic codesto see if they areof anyof the types Ai, and thus amenable to maximum likelihood convolutionaldecoding techniques.
Note. In
the book byF.
J.
MacWilliams andN. J. A.
Sloane[4,
Chap.16,
6]
it isshown thatall
(2n
/2,n+
1)
extended quadraticresiduecodesareoftypeA0.
So
byour earlier results they have a convolutional encoding.However,
the convolution foundwith our methods gives rise to a smaller
K
and uniformdegrees
ofp(x)
andq(x),
makingthese codes suitable forstandard convolutionalencoding and decoding. Thus
the maximum likelihood decoding properties are predictable by analogy with the
simulatedresults ofconvolutionalcodeswiththeseconstraints.
Proof
of
Theorem 2.2. Consider the(2n
+
1,
n+
1)
extended quadratic residuecode
U. We
have2n+1
x
+
1(x
+
1)fC)R(X)fNC)R(X)
where
f,(x
II
(x
+
),
iNQR
NQR
{1
-_< j -<2n[/"
QR}.
Let
a be aprimitive(2n
+
1)th
rootof unity. The codeword uU,
correspondingto2n
u(x)=
Yi=0
UgX whereu(x)
is divisible byfoe(x),
can also be described in terms ofMattson-Solomonpolynomials
[5]
g,,(z)
Co+
Y.
CiZi,
iQR
where
andforall
Co
GF(2),
CiGF(2
m)
for QR2
C2i Ci, here2i is taken
(mod
2n+
1),
and m is themultiplicativeorder of
2(mod
2n+
1).
Now
u (ug), 0, 1,,
2n,c,
is givenbyi=0, 1,...,2n,
We
canalsochooseNQRasthe index set for and obtain anequivalent code.Let
the integer/’
be a multiplicative generator of the quadratic residues of(2n
+
1),
i.e.,/’"
l(mod
2n+
1)
and{/’g}
runsthrough QR. Clearly,n mefor some e. ife 1, then 2canbe chosen
for/"
and
fOR(X)
isirreducible.One
mayalso writegu(z)
Co+
Tr
ciz’i.
i=0
m-1 2
Here
the traceTr
isdefinedbyTry
g=o
Y Thiscorrespondstothe factorization ofe-1
o(x)
FI
f,.,(x)
i=0
where
f., (x)
istheirreduciblepolynomialofdegreern withceii
as a root.By
the normal base theorem(see
[4,
Chap. 4,9])
we can choose cGF
(2’),
such that the set{c,c
2,c
4,...,c2m-1}
is a basis forGF(2").
Then Trc=l.Let
v=(Tr
cz" z=ai,
0<=
i-<2n). Recall that a is a primitive(2n
+
1)th
root of unity.For
convenience we choose a such that
Tra
1.Let
r be inNQR;
we may writeNQR {rj(mod2n
+
1)]j QR}.
Define the digits (pi)and(q)
byPi
Tr
cai’,
O,
1, n 1, qiTr
cari’O,
1,. n 1 n--1 p PiY’.
Tr
caii,
i=0 n-1 q qiTr
ca i=0-lce
i,1 thenpo Vo l’q
v
0, otherwisep v,qoo Vo.By
setting pi-pi-1, qi-qi-1, p -p, q qoo, we generate a new sequence which is acyclicshiftto therightofthe (pi), (qi) sequences.ThiscorrespondstoPl
=Tr
c(c")
-’,
qTr
c(arii)
i-orhavingtakenv’
(Tr
cz’lz=O,z=x,O<-i<=2n).
Thepermutationofthe coordinates z z
j-,
with orbits{oe},
{0},
QR andNQR, takesthe vector
(Tr cz)
into(Tr
czJ),
which isalso acodewordoftheQRcode as can be seen from the expression forg,,(z). We
label the code automorphism induced by the coordinatepermutation aboveT.
Similarly
T
kisthecodeautomorphism correspondingto thekthcyclic shift to the
rightof the (pi), (qi) sequences. The correspondingcoordinatepermutationis z
-
z-k.
We
nowshow that every codeword of the QR code withco
0 is obtainablebylinearcombinations of thecyclicshifts of the
(Pi),
(qi) sequences. Letc’
GF
(2m).
Since bothje
and2havemultiplicativeorder m(mod
2n+
1)
itfollowsthatthemapT
takesTr
cz intoTr
cz2 for somes. SimilarlyT
2etakes
Tr
cz intoTr
cz2s,
etc. Since{c
2’"10i
_--<m1}={c
2’10i
_--<m1}
m--1
2i-s
andthe latter forms a basisof
GF
(2m),
we can writeci=o
hic
hi
GF (2).
Define theoperator
=
2
hi
ri’e.
i=o
Then
v
is a linear combination of shifts of the (pi), (qi) sequences.We
see that7"v
{Tr c’z}.
SimilarlyTiv--Tr
c’z
for anyi.Thus thequasi-cycliccode(Pi,
qi)is oftypeA0
and(Pi,
qi,P,q)
is oftypeA1.
Adjoiningthe all-one vectorcorrespondingto Co 1 gives the entire QR code.
An
alternate choice for the(2n
+
1,n)
subcodeisettected by choosingadifferent u togeneratethe initial(Pi),
(qi) sequences. Choose c 0suchthatTr
c 0 and define u (ui) bythe ruleui 1
+
Tr
co 0< <2n,Let
d, d,
d4,
d:z- span the(m-
1)-dimensional subspace consiststing of the tracezeroelements ofGF (2
’n)
(take
forexample d c+
ce,
where{c
2’,
0< <m1}
spans
GF
(2")).
With the mapT
defined as before, one can easily show that then=l
operator
T
Yi=0
eiT, with eiGF (2),
yielding a linear combination of thepermu-tatedvectors,gives rise to all vectors of the form
e--1
Co+
Tr
cizI’,
i=0
e-1
where
Tr
i=o
ci 0 andCo6GF (2).
e-1
Adjoiningavector
i=o
Tr
[x
i’ whereTr [i
i for each i, willgive usanyvector of the QR code.It
is this alternate construction we use to obtain a constraintlength ofK
=4 forthe(24,
12;8)
and(32,
18;8)
quadraticresiduecodes.We
now give a convolutional encoding of these two codes and follow with an immediatejustification.(24, 12; 8) Golay code.
Encoding. Information io, i, i2,’" ", a.
Consider io, and i, i2," ",
ia
separately, wherei_ i_i for1-<j-<3.
(See
Fig.2.)
il bo,b,"blo-+
p(x)= +x3+x il," Co,C,"’,co q(x)= l+x+x FIG. 2Then
aoo
io
+
il
+"+
ill
ai;
b
il
+
i2
+"+ill
bi.
We
obtain ao,bo,al,bl, alo,blo,a,b.
(32, 16; 8)
quadraticresiduecode. Encoding. Information io, il," ",i15.
Consider i15, and io, il,"
,
i14 separately.Run
i12, i13, i14, io, i,.. ",i14
intosameencoder(4-stage);
p(x)
1 t-X2"+"X3"
q(x)=
1+x
+x
"
asfortheGolay code. Encode and decodeexactlyas intheGolaycase.
We
shall nowjustify theseassertions.
For
the(24, 12; 8) Golay
code. The vector(10101110001100000000)
(ci)
is acodewordinthe
(23,
12;7)
Golay codewithgengratorpolynomial x1+
x+
x6+
x+
4 2
x
+x
+l.Let
Pi C2.16i, qi C5.16
p Co; q
c.
10 10
Let p(x)
Yi=o
pix,q(x)
]i=o
qx.Thisyields thep(x)
andq(x)
intheencoder.The vectorsobtainedbythisencodingareof form(do
+
Tr cz)
whereTr
c 0,do
GF (2).
A
cyclicshiftofthepi and qcorrespondstotheautomorphismT"
z z6of thecode.io
1 gives us theTr
z vector togivethetotal dimension 12.For
the(32, 16; 8)
QR code.Let
f(x)
(x
+
1)
1-I
(x
+
i)=
(X
-[-1)foR(X).
i6QR
Since QR
{1,
2, 4, 8, 16, 5, 10, 20, 9, 18,7,
14, 28, 25,19},
f
oa(x
(x
+
1)(x
+
x2+
1)(x
+
x4-t-x2.-1-x-I-1)(x
+
x3+
x2+
x+
1)
witha a root of x
+
x2+
1.T"
z-->z7gives rise to asequenceinpowers ofa1, 7, 18, 2, 14,
5,
4, 28, 10, 8, 25, 20, 16, 19, 9 andsends codewords366 G. SOLOMON AND H. C. A. VAN TILBORG into
Set
(do
+
Tr
(d8z
+
cz7+
eZz);
z ce 0--< --<30).
Pi C2.71, 0, 1,,
14, qi C-5.7’, 0, 1,,
14,poO"-Co, qoo
"--2
Ci,whereCo cl c2 c18 c21 c26 c27
coo
1 andCi 0forallotheri.This is a cyclic shiftofx6f(x-1)/(x
+
1)
which is awordinthecode. Thisleadsto thesamep(x)
andq(x)
as the binary Golay code and requires similarly one additional vector to getdimension 16.
A
soft-andhard-decision convolutionencoding/decoding
ofthese twoblock codes has been designed and simulated by Booth,
Herro
andSolomon
[1].
Another example
of
thistechniquegives a convolutionalencoding ofthe:(48,
24,12)
QR code.A
9 stageconvolutionalencoderwith n 23 andp(x):
1+
x+
X3
+
X4
+
X8,
q(x)
1+
X4+
X+
X7+
X8,
givesa
(46,
23;10)
code of typeA0.
We
adjoinpoo andqooasbeforeto obtainwordsof the formCo+
Tr
cz,Tr
c 0.To
obtainfulldimensionwe must add the all-one vector tothe a/-output (which
corresponds
to theTr
zvector). To
verify this, take the identificationrulesPi C21i, qi C-2.21i, 0< <22 and the codeword
(ci)
givenbyc=l
for 0,7,
8,16, 22, 27, 31, 33, 36, 39, 44,ci=0 otherwise.
We
will now apply these techniques to a rate1/2
code. The code chosen is the(30, 10; 11) shortened BCH
code. This code will be shown to be of typeA2;
i.e., it consistsofa direct sumofaquasi-cyclic code plusa(30, 1)
code.So
far,the besttypeAo
(30,
10)
code hasd 10.The
extended
(32,
10;12) BCH code
consists ofcodewordsofform(Tr (cz
+
dzS)
,z=a ,i=0, 1,..., 30andz0)
2where c, d6
GF
(25),
and a is the 31st root of unity defined by c c+
1.Let
us consider the(32,
9; 12)
subcode consisting of wordsoftheaboveformwiththe added condition thatTr (c
+
d)
0. The mapT"
z-->(z
+
1)2,
takes z 0into z 1 andvice versaandis apermutation of the remaining 30 positions.As
this(32,
9;12)
subcodeisalwayszero onthe positions z 0and z 1,wemayconsiderthe
(30, 9; 12)
code underthispermutationT.
T
takesTr (cz
+
dz5)
intoTr (c
16--[--d4
+
d16)z
+
dl6z
+
Tr (c
+
d)
Tr ((c
16+
d4+
dl6)z
+
d16zS).
Now
each orbit ofT
isof period 10,so wegetthree distinct orbits.Note
T2z
z4,
soTnz
216
T
6 2 8TlO
Thus we can find
(PI O
IR)
for the(30,
9;12)
code(see
Table2)
and one canencode convolutionally.To
obtain the full(30,
10;11)
codewe have to add the vectorTr
z.2.2. Cyclic codes of
type
Ao.
Thereis a setof cyclic codeswhichbyvirtue of their dimension tolengthratio are naturally quasi-cyclic. Theseinclude allReed-Solomoncodes,
optimalBCH
codes over nonbinary alphabets and other binary cyclic codes.From
these codes, new quasi-cyclic codes result and new possible convolutionalencodings.
For
example, if a cyclic code of distance d has an information ratekin
between
1/2
and 1 we can find a set of quasi-cyclic codes of ratei/(n
k+
i) 1<- <-k, with the same distance.Here k
and n arerelatively prime.THEOREM 2.3.
Let C
be a cyclic Reed-Solomon code overGF (2
’)
of
lengthIn
(2
’n-1)
anddimension Ik. ThenC
isquasi-cyclic with constraintlengthK;
moreprecisely
C
can be generated by a k n matrix with circulants pij, 1,..., k,f
1,..,
n, as entries, wherePie- 1for
1,..,
k
andPii=O
fori
j,f<-k.Pro@
There are n distinct orbits oflength
under the permutationT,
which is definedas a cyclicshift overn positions.We
maywriteanyRS
wordIn--1
a
(x)
Y
aix,
aieGF
(2m),
i=0
as asum
l-1 l--1 l-1
a
(x)
,
aniXni_1..X2
ani+lXni__...
_1_Xn-12
ani+n-lXhi,
i=0 =0 =0
i.e.,
a(x)
pl(x
n)
+
xp2(x
)
+.+
xn-lp,_l(X),
wherepi(x) has degreeat most l-1. Since the dimension of theRS
code iskl
we know that any kl coordinates areindependent.
So
wemay stipulate for any 1=<
-<k thatpj(x)
0for all 1-</’
k,/"
i. This accountsfor(k- 1)/zero
coordinates.We
maystillstipulate(l-
1)
coordinates to bezero,and a constant.So
there isexactlyone codewordi--1 k k+l n-1
X +X pi,
k+l(X
n)+x
Pi,k+2(X )+"
"+X Pi,n(Xn).
Applying
T
,
T1,
,
T
-1tothiscodeword givesriseto the n matrix
(0l...
10[II0l...
101P,,+l["""
[P,,),
1,... ,i-l,i,i+l,.
,k,k+l,.
,n,where
P0
isthex
circulantcorrespondingtopi(x),
k+
1<-]
<-_ n.Letting runfrom 1tok, oneobtains thegeneratormatrixasstatedinthetheorem. [3
Instead of stipulating that
p,(x)=
1 we may also stipulate that the highest[(/-1)/(n-k
+ 1)]
powers of x in pi,(x), pi.+(x),’",p,,(x)
be zero. This would leadtoa convolutionalencodingwith constraintlengthK
l-[(/-
1)/(n
k
+ 1)]
[d/(n
k
+ 1)].
For
rate(n
1)In
codes this givesK
[d/2]
(l
+
1)/2.
The question remains, however,is thedimension of thecodegeneratedthisway.It
isourconjecture thatwedo alwaysobtainthefulldimensionkl.
Thisconjectureissupported by examplesbelow.
4
Example
2.4.Let
a be a primitive element inGF
(2
4)
satisfying a l+a.Considerthe
(15, 10;
6)
Reed-Solomoncodegenerated
by2
i)
X5 Of44
11 311X2
g(x)=
l-I
(x
+of+
+of x +Of-]-Of4X
"1-1.368 G. SOLOMON AND H. C. A. TILBORG
The codeword
8 2
llx3
11 4 6 7(l+ce
x+x
)g(x)=l+cex+ce
+ce
x+ce
x+x
11 2 5 11 2
canbe written as
p(x
3)
+
xq(x
3)
wherep(x)
1+
a x+
a x andq(x)
a+
a x+
xSinceg.c.d.
(p(x),
q(x),
x5-1)
1,we findthatthe matrix(P]
Q),
whereP
andQare the circulants associated withp(x)
andg(x),
generatesa(10, 5;
6)
quasi-cyclic codewith constraint length 3.Note.
By
a cyclic shift of theoriginal code,xp(x
3)
+
x2q(x
3)
isalso inthecode,thus leading to a rate quasi-cyclic code of length 15 and minimum distance 6. The generator matrix of this code is0
P
O"
Remark 2.5.
For
optimalBCH
codesoverGF (2
’n)
of lengthn(2
+
1)
which have rates(n
1)/n
and generatorsg(x)
(x-
1 i;1v(e-2/2(x
+
oi)(x
+
-),
d even,wei
havesimilarresults.
Example 2.6. The
(9,
6;4) BCH
code overGF (2
3)
with-1)7
6 3g(x)=(x+l)(x+c)(x+c
a+c
+1=0.Now
p(x)
1+
Ax,
q(x)=A+x,
correspond to the vector
(x+l)g(x)=p(x3)+xq(x3),
whereA=a+a-lGF(23),
A3=
A
+
1. This encoderresemblesthe Viterbidualcode ofrate1/2,
overGF
(23).
TABLE
Quasi-cycliccodes,rate
1/2.
p(x) n d K PoP1 2 2 2 3 3 2 4 4 3 5 4 3 6 4 3 7 4 3 8 5 4 1011 9 6 5 1011 10 6 5 11001 11 7 6 111 12 8 7 100010 13 7 6 110111 14 8 7 1101011 15 8 7 1100111 16 8 8 1110101 17 8 10 18 8 10 19 8 10 20 9 9 101 101 21 10 11 0 0 0 0 q(x) qoql 11 111 111 111 111 11 10101 1011 110101 11111 10111 11111 11001 11011001 1110110101 1110110101 1110110101 1100O0011 1101101 11 111 111 111 111 010111 01111001 000111101 00011101101 0110111101 0101011000011 01110000011101 10010101001101 000101101111 1110110101 1110110101 1110110101 0101111010011 1100101111011
Remark 2.7. Other quasi-cyclic codes may beconstructed from the
BCH
codes(33,
22;12)
overGF
(25),
(65,
52;14)
overGF
(26),
etc.3. Tables.
In
theTables 1, 2 and 3thereadercan findthepolynomialspii(X)
forsmall, rate
1/2, 1/2,
and32-
block codes. Surprisingly many good block codes (in the senseof largeminimumdistance)turn outtohave aquasi-cyclicstructureand are henceencodable byconvolutionaltechniques.
n d 3 2 4 2 3 4 2 4 6 3 11 5 7 4 111 6 8 5 111 7 8 5 101 8 8 6 1101 9 10 6 111O01 10 10 8 11001 TABLE2 Rate
,
p(x) 1. K p2(x) p3(x) 11 11 111 111 11101 11111 110101 101111 10111111 TABLE3 Rate-},
p(x)=p22(x)=1,plz(x)=pzl(x)=O. n d K Pl3(X) 2 2 2 3 2 4 3 3 11 5 4 4 111 6 4 4 111 7 4 4 111 8 4 4 111 9 4 4 111 10 5 10 11011 11 6 10 1011101 P23(X) 111 1101 1101 1101 1101 1101 101101 11110011 REFERENCES[1] R. W. D. BOOTH, M. A. HERRO AND G. SOLOMON, Convolutionalcoding techniquesforcertain quadratic residuecodes,International TelemeteringConference,(XI)Proceedings(SilverSprings,
Maryland),1975.
[2] J.J. BUSSGANG, Somepropertiesofbinaryconvolutionalcodegenerators,IEEE Trans.Inform.Theory,
IT-11 1965),
"pp.
90-100.[3] G. D.FORNEY,JR.,ConvolutionalcodesI:Algebraicstructure,Ibid.,IT-16(1970), pp.720-738.
[4] F.J. MACWILLIAMS ANDN.J. A. SLOANE, TheTheoryofErrorCorrectingCodes, North-Holland, Amsterdam,1977.
[5] H. F.MATTSONANDG.SOLOMON, Anew treatmentofBCH codes,J.Soc. Industr. Appl. Math.,9
(1961), pp. 654-669.
[6] A. J. VITERBI, Convolutionalcodes andtheirperformance in communicationsystems, IEEE Trans.