mirror of
https://github.com/saitohirga/WSJT-X.git
synced 2025-06-24 22:25:17 -04:00
A few (last-minute?) edits and corrections.
git-svn-id: svn+ssh://svn.code.sf.net/p/wsjt/wsjt/branches/wsjtx@6444 ab8295b8-cf94-4d9e-aec4-7959e3be5d79
This commit is contained in:
parent
a232d9da9d
commit
c00c0d1921
@ -163,8 +163,8 @@ JT65 uses timed transmitting and receiving sequences one minute long.
|
|||||||
Messages are short and structured so as to streamline minimal exchanges
|
Messages are short and structured so as to streamline minimal exchanges
|
||||||
between two amateur operators over potentially difficult radio paths.
|
between two amateur operators over potentially difficult radio paths.
|
||||||
Most messages contain two callsigns and a grid locator, signal report,
|
Most messages contain two callsigns and a grid locator, signal report,
|
||||||
acknowledgment, or sign-off; one of the tokens ``CQ'', ``QRZ'', or ``DE''
|
acknowledgment, or sign-off; one of the tokens CQ, QRZ, or DE may be substitute
|
||||||
may be substituted for the first callsign.
|
d for the first callsign.
|
||||||
Alternatively, a message may contain up to 13 Latin characters of arbitrary
|
Alternatively, a message may contain up to 13 Latin characters of arbitrary
|
||||||
text.
|
text.
|
||||||
All messages are efficiently compressed into exactly 72 bits of digital
|
All messages are efficiently compressed into exactly 72 bits of digital
|
||||||
@ -182,7 +182,11 @@ key "jt65_protocol"
|
|||||||
|
|
||||||
.
|
.
|
||||||
For a concise description of the overall process of transmitting and receiving
|
For a concise description of the overall process of transmitting and receiving
|
||||||
a JT65 message, see the accompanying sidebar.
|
a JT65 message, see the accompanying sidebar
|
||||||
|
\series bold
|
||||||
|
JT65 Message Processing
|
||||||
|
\series default
|
||||||
|
.
|
||||||
\end_layout
|
\end_layout
|
||||||
|
|
||||||
\begin_layout Standard
|
\begin_layout Standard
|
||||||
@ -211,7 +215,8 @@ ly.
|
|||||||
The JT65 code is properly described as a short block-length, low-rate Reed-Solo
|
The JT65 code is properly described as a short block-length, low-rate Reed-Solo
|
||||||
mon code based on a 64-symbol
|
mon code based on a 64-symbol
|
||||||
\emph on
|
\emph on
|
||||||
alphabet
|
alphabet.
|
||||||
|
|
||||||
\emph default
|
\emph default
|
||||||
|
|
||||||
\begin_inset CommandInset nomenclature
|
\begin_inset CommandInset nomenclature
|
||||||
@ -221,7 +226,6 @@ description "A sequence of possible symbol values used for signaling. JT65 uses
|
|||||||
|
|
||||||
\end_inset
|
\end_inset
|
||||||
|
|
||||||
.
|
|
||||||
Characters in this alphabet are mapped onto 64 different frequencies for
|
Characters in this alphabet are mapped onto 64 different frequencies for
|
||||||
transmission.
|
transmission.
|
||||||
|
|
||||||
@ -230,8 +234,8 @@ description "A sequence of possible symbol values used for signaling. JT65 uses
|
|||||||
\begin_layout Standard
|
\begin_layout Standard
|
||||||
Reed Solomon codes are widely used to ensure reliability in data transmission
|
Reed Solomon codes are widely used to ensure reliability in data transmission
|
||||||
and storage.
|
and storage.
|
||||||
In hardware implementations, decoding is generally accomplished with an
|
In hardware implementations, decoding is generally accomplished with a
|
||||||
algorithm such as the Berlekamp-Massey (BM) algorithm, based on
|
procedure such as the Berlekamp-Massey (BM) algorithm, based on
|
||||||
\emph on
|
\emph on
|
||||||
hard decisions
|
hard decisions
|
||||||
\emph default
|
\emph default
|
||||||
@ -299,7 +303,7 @@ MAP65
|
|||||||
WSJT-X
|
WSJT-X
|
||||||
\emph default
|
\emph default
|
||||||
, widely used for amateur weak-signal communication using JT65 and other
|
, widely used for amateur weak-signal communication using JT65 and other
|
||||||
specialized digital modes.
|
specialized digital protocols.
|
||||||
These programs are open-source, freely available
|
These programs are open-source, freely available
|
||||||
\begin_inset CommandInset citation
|
\begin_inset CommandInset citation
|
||||||
LatexCommand cite
|
LatexCommand cite
|
||||||
@ -313,13 +317,13 @@ key "wsjt"
|
|||||||
\begin_layout Standard
|
\begin_layout Standard
|
||||||
The JT65 protocol specifies transmissions that start one second into a UTC
|
The JT65 protocol specifies transmissions that start one second into a UTC
|
||||||
minute and last for 46.8 seconds.
|
minute and last for 46.8 seconds.
|
||||||
Receiving software therefore has up to several seconds to decode a message
|
Receiving software therefore has as much as ten seconds to decode a message
|
||||||
before the start of the next minute, when the operator sends a reply.
|
before the start of the next minute, when the operator will send a reply.
|
||||||
With today's personal computers, this relatively long available time encourages
|
With today's personal computers, this relatively long time encourages experimen
|
||||||
experimentation with decoders of high computational complexity.
|
tation with decoders of high computational complexity.
|
||||||
As a result, the FT algorithm can extend the decoding threshold on a typical
|
With time to spare, the FT algorithm lowers the decoding threshold on a
|
||||||
fading channel by many dB over the hard-decision BM decoder, and by a meaningfu
|
typical fading channel by many dB over the hard-decision BM decoder, and
|
||||||
l amount over the KV decoder.
|
by a meaningful amount over the KV decoder.
|
||||||
In addition to its excellent performance, the new algorithm has other desirable
|
In addition to its excellent performance, the new algorithm has other desirable
|
||||||
properties, not least of which is its conceptual simplicity.
|
properties, not least of which is its conceptual simplicity.
|
||||||
Decoding performance and computational complexity scale in a convenient
|
Decoding performance and computational complexity scale in a convenient
|
||||||
@ -339,13 +343,13 @@ The remainder of this paper is organized as follows.
|
|||||||
Section 3 provides statistical motivation for the FT algorithm, and Section
|
Section 3 provides statistical motivation for the FT algorithm, and Section
|
||||||
4 describes the algorithm in full detail.
|
4 describes the algorithm in full detail.
|
||||||
Material in these two sections is important because it documents our approach
|
Material in these two sections is important because it documents our approach
|
||||||
and underlines its fundamental technical contribution.
|
and underlines its fundamental technical contributions.
|
||||||
It is heavier in formal mathematics than common in
|
These sections are heavier in formal mathematics than common in
|
||||||
\emph on
|
\emph on
|
||||||
QEX
|
QEX
|
||||||
\emph default
|
\emph default
|
||||||
; for this reason, some readers may choose to skip or skim sections 3 and
|
; for this reason, some readers may choose to skip or skim them and proceed
|
||||||
4 and proceed more quickly to the results.
|
more quickly to the results.
|
||||||
Most readers will benefit by reviewing the original paper on the JT65 protocol
|
Most readers will benefit by reviewing the original paper on the JT65 protocol
|
||||||
|
|
||||||
\begin_inset CommandInset citation
|
\begin_inset CommandInset citation
|
||||||
@ -377,8 +381,11 @@ WSJT-X
|
|||||||
\emph default
|
\emph default
|
||||||
.
|
.
|
||||||
Section 7 summarizes some on-the-air experiences with the new decoder.
|
Section 7 summarizes some on-the-air experiences with the new decoder.
|
||||||
You may Refer to the sidebar Glossary for brief definitions of some specialized
|
Refer to the sidebar
|
||||||
terms.
|
\series bold
|
||||||
|
Glossary
|
||||||
|
\series default
|
||||||
|
for brief definitions of some specialized terms.
|
||||||
\end_layout
|
\end_layout
|
||||||
|
|
||||||
\begin_layout Section
|
\begin_layout Section
|
||||||
@ -427,7 +434,7 @@ description "For the JT65 code, a vector of 63 symbol values each in the range 0
|
|||||||
\end_inset
|
\end_inset
|
||||||
|
|
||||||
, the number of message symbols conveyed by the codeword; and the transmission
|
, the number of message symbols conveyed by the codeword; and the transmission
|
||||||
alphabet or number of possible values for each symbol in the codewords.
|
alphabet, or number of possible values for each symbol in the codewords.
|
||||||
The codeword length and the number of message symbols are specified with
|
The codeword length and the number of message symbols are specified with
|
||||||
the notation
|
the notation
|
||||||
\begin_inset Formula $(n,k)$
|
\begin_inset Formula $(n,k)$
|
||||||
@ -474,8 +481,8 @@ description "The Hamming distance between two codewords, or between a received w
|
|||||||
|
|
||||||
\end_inset
|
\end_inset
|
||||||
|
|
||||||
is used as a measure of the lack of agreement between different codewords,
|
is used as a measure of disagreement between different codewords, or between
|
||||||
or between a received word
|
a received word
|
||||||
\begin_inset CommandInset nomenclature
|
\begin_inset CommandInset nomenclature
|
||||||
LatexCommand nomenclature
|
LatexCommand nomenclature
|
||||||
symbol "{\\bf Received word: }"
|
symbol "{\\bf Received word: }"
|
||||||
@ -486,7 +493,7 @@ description "A vector of symbol values, possibly accompanied by soft information
|
|||||||
and a codeword.
|
and a codeword.
|
||||||
Hamming distance is the number of code symbols that differ in two words
|
Hamming distance is the number of code symbols that differ in two words
|
||||||
being compared.
|
being compared.
|
||||||
Reed-Solomon codes have minimum Hamming distance
|
Reed-Solomon codes have guaranteed minimum Hamming distance
|
||||||
\begin_inset Formula $d$
|
\begin_inset Formula $d$
|
||||||
\end_inset
|
\end_inset
|
||||||
|
|
||||||
@ -513,7 +520,7 @@ With
|
|||||||
.
|
.
|
||||||
With 72 information bits in each message, JT65 can transmit any one of
|
With 72 information bits in each message, JT65 can transmit any one of
|
||||||
|
|
||||||
\begin_inset Formula $2^{72}$
|
\begin_inset Formula $2^{72}\approx4.7\times10^{21}$
|
||||||
\end_inset
|
\end_inset
|
||||||
|
|
||||||
possible messages.
|
possible messages.
|
||||||
@ -522,8 +529,12 @@ With
|
|||||||
\end_layout
|
\end_layout
|
||||||
|
|
||||||
\begin_layout Standard
|
\begin_layout Standard
|
||||||
A received word containing some incorrect symbols (errors) can be decoded
|
A received word containing some
|
||||||
into the correct codeword using a deterministic
|
\emph on
|
||||||
|
errors
|
||||||
|
\emph default
|
||||||
|
(incorrect symbols) can be decoded into the correct codeword using a determinis
|
||||||
|
tic,
|
||||||
\begin_inset CommandInset nomenclature
|
\begin_inset CommandInset nomenclature
|
||||||
LatexCommand nomenclature
|
LatexCommand nomenclature
|
||||||
symbol "{\\bf Deterministic algorithm: }"
|
symbol "{\\bf Deterministic algorithm: }"
|
||||||
@ -531,7 +542,7 @@ description "A series of computational steps that for the same input always prod
|
|||||||
|
|
||||||
\end_inset
|
\end_inset
|
||||||
|
|
||||||
, algebraic algorithm provided that no more than
|
algebraic algorithm provided that no more than
|
||||||
\begin_inset Formula $t$
|
\begin_inset Formula $t$
|
||||||
\end_inset
|
\end_inset
|
||||||
|
|
||||||
@ -561,7 +572,7 @@ For the JT65 code
|
|||||||
\end_inset
|
\end_inset
|
||||||
|
|
||||||
errors.
|
errors.
|
||||||
In the unlikely event that the location of every error is known and if
|
In the unlikely event that the location of every error is known, and if
|
||||||
no correct symbols are accidentally labeled as errors, the BM algorithm
|
no correct symbols are accidentally labeled as errors, the BM algorithm
|
||||||
can correct up to
|
can correct up to
|
||||||
\begin_inset Formula $d-1=n-k$
|
\begin_inset Formula $d-1=n-k$
|
||||||
@ -801,9 +812,9 @@ GNU Octave
|
|||||||
\emph default
|
\emph default
|
||||||
as function
|
as function
|
||||||
\family typewriter
|
\family typewriter
|
||||||
hygepdf
|
hygepdf(x,N,X,s)
|
||||||
\family default
|
\family default
|
||||||
(x,N,X,s).
|
.
|
||||||
The cumulative probability that at least
|
The cumulative probability that at least
|
||||||
\begin_inset Formula $\epsilon$
|
\begin_inset Formula $\epsilon$
|
||||||
\end_inset
|
\end_inset
|
||||||
@ -979,7 +990,7 @@ Examples 1 and 2 show that a random strategy for selecting symbols to erase
|
|||||||
\begin_inset Formula $N=53$
|
\begin_inset Formula $N=53$
|
||||||
\end_inset
|
\end_inset
|
||||||
|
|
||||||
less reliable symbols.
|
less reliable ones.
|
||||||
If
|
If
|
||||||
\begin_inset Formula $s=45$
|
\begin_inset Formula $s=45$
|
||||||
\end_inset
|
\end_inset
|
||||||
@ -1075,8 +1086,8 @@ Example 3 shows how statistical information about symbol quality should
|
|||||||
Once erasure probabilities have been assigned to each of the 63 received
|
Once erasure probabilities have been assigned to each of the 63 received
|
||||||
symbols, the FT algorithm uses a random number generator to decide whether
|
symbols, the FT algorithm uses a random number generator to decide whether
|
||||||
or not to erase each symbol, according to its assigned erasure probability.
|
or not to erase each symbol, according to its assigned erasure probability.
|
||||||
The list of erased symbols is then submitted to the BM decoder which either
|
The list of erased symbols is then submitted to the BM decoder, which produces
|
||||||
produces a codeword or fails to decode.
|
either a codeword or a flag indicating failure to decode.
|
||||||
|
|
||||||
\end_layout
|
\end_layout
|
||||||
|
|
||||||
@ -1091,20 +1102,16 @@ candidate
|
|||||||
\emph default
|
\emph default
|
||||||
.
|
.
|
||||||
Our next task is to find a metric that can reliably select one of many
|
Our next task is to find a metric that can reliably select one of many
|
||||||
proffered candidates as the codeword actually transmitted.
|
proffered candidates as the codeword that was actually transmitted.
|
||||||
|
|
||||||
\end_layout
|
\end_layout
|
||||||
|
|
||||||
\begin_layout Standard
|
\begin_layout Standard
|
||||||
The FT algorithm uses quality indices made available by a noncoherent 64-FSK
|
The FT algorithm uses quality indices made available by a noncoherent 64-FSK
|
||||||
demodulator (see the sidebar
|
demodulator (see the sidebar
|
||||||
\begin_inset Quotes eld
|
\series bold
|
||||||
\end_inset
|
JT65 Message Processing
|
||||||
|
\series default
|
||||||
JT65 Information Processing
|
|
||||||
\begin_inset Quotes erd
|
|
||||||
\end_inset
|
|
||||||
|
|
||||||
).
|
).
|
||||||
The demodulator computes binned power spectra for each signaling interval;
|
The demodulator computes binned power spectra for each signaling interval;
|
||||||
the result is a two-dimensional array
|
the result is a two-dimensional array
|
||||||
@ -1149,7 +1156,7 @@ JT65 Information Processing
|
|||||||
\begin_inset Formula $p_{1}$
|
\begin_inset Formula $p_{1}$
|
||||||
\end_inset
|
\end_inset
|
||||||
|
|
||||||
-rank, the rank
|
-rank (the rank
|
||||||
\begin_inset Formula $\{1,2,\ldots,63\}$
|
\begin_inset Formula $\{1,2,\ldots,63\}$
|
||||||
\end_inset
|
\end_inset
|
||||||
|
|
||||||
@ -1161,13 +1168,14 @@ JT65 Information Processing
|
|||||||
\begin_inset Formula $p_{1}$
|
\begin_inset Formula $p_{1}$
|
||||||
\end_inset
|
\end_inset
|
||||||
|
|
||||||
values, and the ratio
|
values) and the ratio
|
||||||
\begin_inset Formula $p_{2}/p_{1}$
|
\begin_inset Formula $p_{2}/p_{1}$
|
||||||
\end_inset
|
\end_inset
|
||||||
|
|
||||||
.
|
.
|
||||||
Note that high ranking symbols have larger signal-to-noise ratio than those
|
High ranking symbols have larger signal-to-noise ratio than those with
|
||||||
with lower rank; and when
|
lower rank.
|
||||||
|
When
|
||||||
\begin_inset Formula $p_{2}/p_{1}$
|
\begin_inset Formula $p_{2}/p_{1}$
|
||||||
\end_inset
|
\end_inset
|
||||||
|
|
||||||
@ -1176,13 +1184,21 @@ JT65 Information Processing
|
|||||||
\end_layout
|
\end_layout
|
||||||
|
|
||||||
\begin_layout Standard
|
\begin_layout Standard
|
||||||
We use 3-bit quantization of these two metrics to index the entries in an
|
We use 3-bit quantization of the metrics
|
||||||
|
\begin_inset Formula $p_{1}$
|
||||||
|
\end_inset
|
||||||
|
|
||||||
|
-rank and
|
||||||
|
\begin_inset Formula $p_{2}/p_{1}$
|
||||||
|
\end_inset
|
||||||
|
|
||||||
|
to index the entries in an
|
||||||
\begin_inset Formula $8\times8$
|
\begin_inset Formula $8\times8$
|
||||||
\end_inset
|
\end_inset
|
||||||
|
|
||||||
table of symbol error probabilities derived empirically from a large data
|
table of symbol error probabilities.
|
||||||
set of received words that were successfully decoded.
|
The probabilities were derived empirically from a large data set of received
|
||||||
|
words that were successfully decoded.
|
||||||
The table provides an estimate of the
|
The table provides an estimate of the
|
||||||
\emph on
|
\emph on
|
||||||
a priori
|
a priori
|
||||||
@ -1196,7 +1212,7 @@ a priori
|
|||||||
\end_inset
|
\end_inset
|
||||||
|
|
||||||
.
|
.
|
||||||
This table is a key element of the algorithm, as it will define which symbols
|
This table is a key element of the algorithm, as it determines which symbols
|
||||||
are effectively protected from erasure.
|
are effectively protected from erasure.
|
||||||
The
|
The
|
||||||
\emph on
|
\emph on
|
||||||
@ -1296,8 +1312,8 @@ In practice we find that
|
|||||||
\begin_inset Formula $u$
|
\begin_inset Formula $u$
|
||||||
\end_inset
|
\end_inset
|
||||||
|
|
||||||
, the average signal-plus-noise power in all symbols according to a candidate
|
, the average signal-plus-noise power in all received symbols according
|
||||||
codeword's symbol values:
|
to a candidate codeword's symbol values:
|
||||||
\end_layout
|
\end_layout
|
||||||
|
|
||||||
\begin_layout Standard
|
\begin_layout Standard
|
||||||
@ -1345,7 +1361,7 @@ The correct JT65 codeword produces a value for
|
|||||||
\end_inset
|
\end_inset
|
||||||
|
|
||||||
for the correct codeword has expectation value (average over many random
|
for the correct codeword has expectation value (average over many random
|
||||||
realizations)
|
realizations) given by
|
||||||
\end_layout
|
\end_layout
|
||||||
|
|
||||||
\begin_layout Standard
|
\begin_layout Standard
|
||||||
@ -1422,11 +1438,7 @@ i.e.
|
|||||||
\end_inset
|
\end_inset
|
||||||
|
|
||||||
where the subscript
|
where the subscript
|
||||||
\begin_inset Quotes eld
|
\begin_inset Formula $i$
|
||||||
\end_inset
|
|
||||||
|
|
||||||
i
|
|
||||||
\begin_inset Quotes erd
|
|
||||||
\end_inset
|
\end_inset
|
||||||
|
|
||||||
is an abbreviation for
|
is an abbreviation for
|
||||||
@ -1480,7 +1492,7 @@ If
|
|||||||
\begin_inset Formula $y$
|
\begin_inset Formula $y$
|
||||||
\end_inset
|
\end_inset
|
||||||
|
|
||||||
is too small for decoding to be possible, or the correct codeword is never
|
is too small for decoding to be possible or the correct codeword is never
|
||||||
presented as a candidate, the ratio
|
presented as a candidate, the ratio
|
||||||
\begin_inset Formula $r=u_{2}/u_{1}$
|
\begin_inset Formula $r=u_{2}/u_{1}$
|
||||||
\end_inset
|
\end_inset
|
||||||
@ -1547,9 +1559,9 @@ As with all decoding algorithms that generate a list of possible codewords,
|
|||||||
\begin_inset Formula $r<R_{1}$
|
\begin_inset Formula $r<R_{1}$
|
||||||
\end_inset
|
\end_inset
|
||||||
|
|
||||||
are used to validate additional codewords that did not pass the first test.
|
are used to validate additional codewords that fail the first test.
|
||||||
A timeout is used to limit the algorithm's execution time if no acceptable
|
A timeout is used to limit execution time if no acceptable codeword is
|
||||||
codeword is found in a reasonable number of trials,
|
found in a reasonable number of trials,
|
||||||
\begin_inset Formula $T$
|
\begin_inset Formula $T$
|
||||||
\end_inset
|
\end_inset
|
||||||
|
|
||||||
@ -1563,8 +1575,11 @@ As with all decoding algorithms that generate a list of possible codewords,
|
|||||||
\end_inset
|
\end_inset
|
||||||
|
|
||||||
or even higher.
|
or even higher.
|
||||||
Pseudo-code for the FT algorithm is presented in an accompanying box as
|
Pseudo-code for the FT algorithm is presented in an accompanying box,
|
||||||
Algorithm 1.
|
\series bold
|
||||||
|
Algorithm 1
|
||||||
|
\series default
|
||||||
|
.
|
||||||
\end_layout
|
\end_layout
|
||||||
|
|
||||||
\begin_layout Standard
|
\begin_layout Standard
|
||||||
@ -1661,7 +1676,7 @@ If
|
|||||||
\begin_inset Formula $d_{1}=d_{s},$
|
\begin_inset Formula $d_{1}=d_{s},$
|
||||||
\end_inset
|
\end_inset
|
||||||
|
|
||||||
and
|
|
||||||
\begin_inset Formula $X_{1}=X,$
|
\begin_inset Formula $X_{1}=X,$
|
||||||
\end_inset
|
\end_inset
|
||||||
|
|
||||||
@ -1744,15 +1759,8 @@ key "lc2004"
|
|||||||
|
|
||||||
.
|
.
|
||||||
After developing this algorithm, we became aware that our approach is conceptua
|
After developing this algorithm, we became aware that our approach is conceptua
|
||||||
lly similar to a
|
lly similar to the stochastic, erasures-only list decoding algorithm described
|
||||||
\begin_inset Quotes eld
|
in reference
|
||||||
\end_inset
|
|
||||||
|
|
||||||
stochastic erasures-only list decoding algorithm
|
|
||||||
\begin_inset Quotes erd
|
|
||||||
\end_inset
|
|
||||||
|
|
||||||
described in reference
|
|
||||||
\begin_inset CommandInset citation
|
\begin_inset CommandInset citation
|
||||||
LatexCommand cite
|
LatexCommand cite
|
||||||
key "ls2009"
|
key "ls2009"
|
||||||
@ -1767,11 +1775,11 @@ key "ls2009"
|
|||||||
|
|
||||||
\end_inset
|
\end_inset
|
||||||
|
|
||||||
is applied to higher-rate Reed-Solomon codes on a symmetric channel with
|
is applied to higher-rate Reed-Solomon codes on a symmetric channel using
|
||||||
binary phase-shift keying (BPSK).
|
binary phase-shift keying (BPSK).
|
||||||
Our 64-ary input channel with 64-FSK modulation required us to develop
|
Our 64-ary input channel with 64-FSK modulation required us to develop
|
||||||
unique methods for assigning erasure probabilities and for defining acceptance
|
unique methods for assigning erasure probabilities and for defining acceptance
|
||||||
criteria to select the best codeword from the list of candidates.
|
criteria to select the best codeword from the list of tested candidates.
|
||||||
|
|
||||||
\end_layout
|
\end_layout
|
||||||
|
|
||||||
@ -1870,11 +1878,11 @@ not
|
|||||||
\end_inset
|
\end_inset
|
||||||
|
|
||||||
possible messages.
|
possible messages.
|
||||||
\end_layout
|
Pseudo-code for the hinted-decoding algorithm is presented as
|
||||||
|
\series bold
|
||||||
\begin_layout Standard
|
Algorithm 2
|
||||||
Pseudo-code for the hinted decode or Deep Search algorithm is presented
|
\series default
|
||||||
as Algorithm 2.
|
.
|
||||||
\end_layout
|
\end_layout
|
||||||
|
|
||||||
\begin_layout Standard
|
\begin_layout Standard
|
||||||
@ -1958,18 +1966,17 @@ Otherwise, declare decoding failure and exit.
|
|||||||
\end_layout
|
\end_layout
|
||||||
|
|
||||||
\begin_layout Enumerate
|
\begin_layout Enumerate
|
||||||
An acceptable hinted decode has been found.
|
An acceptable codeword has been found.
|
||||||
Declare a successful result and return the saved codeword and the value
|
Declare a successful result and return the codeword and the value
|
||||||
|
|
||||||
\begin_inset Formula $q=100\,(u_{1}-bu_{2})$
|
\begin_inset Formula $q=100\,(u_{1}-bu_{2})$
|
||||||
\end_inset
|
\end_inset
|
||||||
|
|
||||||
as a confidence indicator.
|
as a confidence indicator.
|
||||||
By default we use the value
|
(By default we use the value
|
||||||
\begin_inset Formula $b=1.12$
|
\begin_inset Formula $b=1.12$
|
||||||
\end_inset
|
\end_inset
|
||||||
|
|
||||||
for submode JT65A.
|
for submode JT65A.)
|
||||||
\end_layout
|
\end_layout
|
||||||
|
|
||||||
\end_inset
|
\end_inset
|
||||||
@ -2095,16 +2102,16 @@ sync losses
|
|||||||
\end_layout
|
\end_layout
|
||||||
|
|
||||||
\begin_layout Standard
|
\begin_layout Standard
|
||||||
As expected, the soft-decision algorithms FT and KV are about 2 dB better
|
As expected, on the AWGN channel the soft-decision algorithms FT and KV
|
||||||
than the hard-decision BM algorithm on the AWGN channel.
|
are about 2 dB better than the hard-decision BM algorithm.
|
||||||
In addition, FT has an edge over KV that increases from about 0.2 dB at
|
In addition, FT has an edge over KV that increases from about 0.2 dB at
|
||||||
higher SNRs to nearly 0.5 dB at low SNR.
|
higher SNRs to nearly 0.5 dB at low SNR.
|
||||||
Execution time for FT with timeout parameter
|
With timeout parameter
|
||||||
\begin_inset Formula $T=10^{5}$
|
\begin_inset Formula $T=10^{5}$
|
||||||
\end_inset
|
\end_inset
|
||||||
|
|
||||||
is longer than that for the KV algorithm, but still small enough to be
|
execution time for FT is longer than that for the KV algorithm, but still
|
||||||
practical on today's home computers.
|
small enough to be fully practical on today's home computers.
|
||||||
|
|
||||||
\end_layout
|
\end_layout
|
||||||
|
|
||||||
@ -2197,7 +2204,7 @@ reference "fig:WER2"
|
|||||||
|
|
||||||
\end_inset
|
\end_inset
|
||||||
|
|
||||||
shows the FT and KV results from Figure
|
replots the FT and KV results from Figure
|
||||||
\begin_inset CommandInset ref
|
\begin_inset CommandInset ref
|
||||||
LatexCommand ref
|
LatexCommand ref
|
||||||
reference "fig:bodide"
|
reference "fig:bodide"
|
||||||
@ -2235,8 +2242,12 @@ reference "fig:bodide"
|
|||||||
\end_inset
|
\end_inset
|
||||||
|
|
||||||
dB gain over KV at low SNR.
|
dB gain over KV at low SNR.
|
||||||
It also provides very significant gains over the hard-decision BM decoder
|
It also provides very significant gains over the hard-decision BM decoder,
|
||||||
even when limited to very small numbers of trials.
|
even when limited to very small
|
||||||
|
\begin_inset Formula $T$
|
||||||
|
\end_inset
|
||||||
|
|
||||||
|
.
|
||||||
\end_layout
|
\end_layout
|
||||||
|
|
||||||
\begin_layout Standard
|
\begin_layout Standard
|
||||||
@ -2312,7 +2323,7 @@ reference "fig:N_vs_X"
|
|||||||
\end_inset
|
\end_inset
|
||||||
|
|
||||||
shows the number of stochastic erasure trials required to find the correct
|
shows the number of stochastic erasure trials required to find the correct
|
||||||
codeword as a function of
|
codeword plotted as a function of
|
||||||
\begin_inset Formula $X,$
|
\begin_inset Formula $X,$
|
||||||
\end_inset
|
\end_inset
|
||||||
|
|
||||||
@ -2440,13 +2451,26 @@ reference "fig:Psuccess"
|
|||||||
Hz.
|
Hz.
|
||||||
These simulated Doppler spreads are comparable to those encountered on
|
These simulated Doppler spreads are comparable to those encountered on
|
||||||
HF ionospheric paths and also for EME at VHF and the lower UHF bands.
|
HF ionospheric paths and also for EME at VHF and the lower UHF bands.
|
||||||
For comparison we note that the JT65 symbol rate is about 2.7 Hz.
|
For comparison we note that the JT65 symbol rate is about
|
||||||
|
\begin_inset ERT
|
||||||
|
status open
|
||||||
|
|
||||||
|
\begin_layout Plain Layout
|
||||||
|
|
||||||
|
|
||||||
|
\backslash
|
||||||
|
linebreak
|
||||||
|
\end_layout
|
||||||
|
|
||||||
|
\end_inset
|
||||||
|
|
||||||
|
2.7 Hz.
|
||||||
It is interesting to note that while Rayleigh fading severely degrades
|
It is interesting to note that while Rayleigh fading severely degrades
|
||||||
the success rate of the BM decoder, the penalties are much smaller with
|
the success rate of the BM decoder, the penalties are much smaller with
|
||||||
both FT and Deep Search (DS) decoding.
|
both FT and Deep Search (DS) decoding.
|
||||||
Simulated Doppler spreads of 0.2 Hz actually increased the FT decoding rate
|
Simulated Doppler spreads of 0.2 Hz actually increased the FT decoding rate
|
||||||
slightly at SNRs close to the decoding threshold, presumably because with
|
slightly at SNRs close to the decoding threshold, presumably because with
|
||||||
the low-rate JT65 code signal peaks provide the information needed for
|
the low-rate JT65 code, signal peaks provide the information needed for
|
||||||
good copy.
|
good copy.
|
||||||
\end_layout
|
\end_layout
|
||||||
|
|
||||||
@ -2486,10 +2510,10 @@ Percentage of JT65 messages successfully decoded as a function of
|
|||||||
Franke-Taylor (FT) decoding algorithms.
|
Franke-Taylor (FT) decoding algorithms.
|
||||||
Curves labeled DS correspond to the hinted-decode (Deep Search) algorithm
|
Curves labeled DS correspond to the hinted-decode (Deep Search) algorithm
|
||||||
with a codeword list of length
|
with a codeword list of length
|
||||||
\begin_inset Formula $L=5850$
|
\begin_inset Formula $L\,$
|
||||||
\end_inset
|
\end_inset
|
||||||
|
|
||||||
.
|
= 5850.
|
||||||
Numbers adjacent to the curves are simulated Doppler spreads in Hz.
|
Numbers adjacent to the curves are simulated Doppler spreads in Hz.
|
||||||
In the current version of
|
In the current version of
|
||||||
\emph on
|
\emph on
|
||||||
@ -2523,12 +2547,16 @@ The JT65 protocol has proven remarkably versatile.
|
|||||||
Today the mode is used by thousands of amateurs around the world, communicating
|
Today the mode is used by thousands of amateurs around the world, communicating
|
||||||
over terrestrial paths on the MF and HF bands and over terrestrial as well
|
over terrestrial paths on the MF and HF bands and over terrestrial as well
|
||||||
as EME paths from 50 MHz through 10 GHz.
|
as EME paths from 50 MHz through 10 GHz.
|
||||||
Three submodes are in use, together accommodating a wide range of Doppler
|
Three
|
||||||
spreads and potential instrumental instabilities.
|
\emph on
|
||||||
|
submodes
|
||||||
|
\emph default
|
||||||
|
are in use, together accommodating a wide range of Doppler spreads and
|
||||||
|
potential instrumental instabilities.
|
||||||
All three submodes transmit the 63 data symbols interspersed with 63 synchroniz
|
All three submodes transmit the 63 data symbols interspersed with 63 synchroniz
|
||||||
ation symbols at keying rate 11025/4096 = 2.69 baud.
|
ation symbols at keying rate 11025/4096 = 2.69 baud.
|
||||||
Submode JT65A uses tone spacing equal to the symbol rate, so its total
|
Submode JT65A uses tone spacing equal to the symbol rate; its total occupied
|
||||||
occupied bandwidth is
|
bandwidth is
|
||||||
\begin_inset Formula $66\times2.69=177.6$
|
\begin_inset Formula $66\times2.69=177.6$
|
||||||
\end_inset
|
\end_inset
|
||||||
|
|
||||||
@ -2602,7 +2630,7 @@ name "fig:JT65B_EME"
|
|||||||
|
|
||||||
Examples of JT65B EME signals recorded at K1JT.
|
Examples of JT65B EME signals recorded at K1JT.
|
||||||
Numbers above the spectrogram are audio frequencies in Hz, and the spectrogram'
|
Numbers above the spectrogram are audio frequencies in Hz, and the spectrogram'
|
||||||
s vertical direction is one minute of time.
|
s vertical span is one minute of time.
|
||||||
The horizontal green bar on the frequency axis indicates the bandwidth
|
The horizontal green bar on the frequency axis indicates the bandwidth
|
||||||
occupied by the second decoded signal, a reply from SP6GWB.
|
occupied by the second decoded signal, a reply from SP6GWB.
|
||||||
See text for additional details.
|
See text for additional details.
|
||||||
@ -2629,7 +2657,7 @@ reference "fig:spectrogram"
|
|||||||
shows activity in submode JT65A during a single minute on the 20 m amateur
|
shows activity in submode JT65A during a single minute on the 20 m amateur
|
||||||
band.
|
band.
|
||||||
At this time the band was crowded with overlapping signals.
|
At this time the band was crowded with overlapping signals.
|
||||||
You can probably count at least 19 distinct synchronizing tones (the speckled
|
With care you can count at least 19 distinct synchronizing tones (the speckled
|
||||||
vertical lines in the figure), and can see that in some places as many
|
vertical lines in the figure), and can see that in some places as many
|
||||||
as four signals overlap.
|
as four signals overlap.
|
||||||
After signal processing to demodulate the signals and produce soft-symbol
|
After signal processing to demodulate the signals and produce soft-symbol
|
||||||
@ -2679,8 +2707,12 @@ name "fig:spectrogram"
|
|||||||
|
|
||||||
\end_inset
|
\end_inset
|
||||||
|
|
||||||
Spectrogram showing one minute of data collected under crowded band conditions
|
Spectrogram from
|
||||||
on the 20 m band.
|
\emph on
|
||||||
|
WSJT-X
|
||||||
|
\emph default
|
||||||
|
showing one minute of data collected under crowded band conditions on the
|
||||||
|
20 m band.
|
||||||
Numbers on the scale are frequencies (in Hz) above 14.076 MHz.
|
Numbers on the scale are frequencies (in Hz) above 14.076 MHz.
|
||||||
|
|
||||||
\end_layout
|
\end_layout
|
||||||
@ -2849,7 +2881,7 @@ key "lhmg2010"
|
|||||||
|
|
||||||
\end_inset
|
\end_inset
|
||||||
|
|
||||||
"Stochastic Chase Decoding of Reed-Solomon Codes", Camille Leroux, Saied
|
``Stochastic Chase Decoding of Reed-Solomon Codes'', Camille Leroux, Saied
|
||||||
Hemati, Shie Mannor, Warren J.
|
Hemati, Shie Mannor, Warren J.
|
||||||
Gross,
|
Gross,
|
||||||
\emph on
|
\emph on
|
||||||
@ -2868,8 +2900,8 @@ key "lk2008"
|
|||||||
|
|
||||||
\end_inset
|
\end_inset
|
||||||
|
|
||||||
"Soft-Decision Decoding of Reed-Solomon Codes Using Successive Error-and-Erasure
|
``Soft-Decision Decoding of Reed-Solomon Codes Using Successive Error-and-Erasur
|
||||||
Decoding," Soo-Woong Lee and B.
|
e Decoding,'' Soo-Woong Lee and B.
|
||||||
V.
|
V.
|
||||||
K.
|
K.
|
||||||
Vijaya Kumar,
|
Vijaya Kumar,
|
||||||
@ -2893,11 +2925,7 @@ key "ls2009"
|
|||||||
|
|
||||||
\end_inset
|
\end_inset
|
||||||
|
|
||||||
|
``Stochastic Erasure-Only List Decoding Algorithms for Reed-Solomon Codes,
|
||||||
\begin_inset Quotes erd
|
|
||||||
\end_inset
|
|
||||||
|
|
||||||
Stochastic Erasure-Only List Decoding Algorithms for Reed-Solomon Codes,
|
|
||||||
\begin_inset Quotes erd
|
\begin_inset Quotes erd
|
||||||
\end_inset
|
\end_inset
|
||||||
|
|
||||||
@ -3122,7 +3150,9 @@ height_special "totalheight"
|
|||||||
status open
|
status open
|
||||||
|
|
||||||
\begin_layout Paragraph
|
\begin_layout Paragraph
|
||||||
Sidebar: JT65 Information Processing
|
|
||||||
|
\size large
|
||||||
|
Sidebar: JT65 Message Processing
|
||||||
\end_layout
|
\end_layout
|
||||||
|
|
||||||
\begin_layout Enumerate
|
\begin_layout Enumerate
|
||||||
|
Loading…
x
Reference in New Issue
Block a user