mirror of
https://github.com/saitohirga/WSJT-X.git
synced 2024-11-08 18:16:02 -05:00
d736187107
git-svn-id: svn+ssh://svn.code.sf.net/p/wsjt/wsjt/branches/wsjtx@6448 ab8295b8-cf94-4d9e-aec4-7959e3be5d79
3290 lines
72 KiB
Plaintext
3290 lines
72 KiB
Plaintext
#LyX 2.1 created this file. For more info see http://www.lyx.org/
|
|
\lyxformat 474
|
|
\begin_document
|
|
\begin_header
|
|
\textclass paper
|
|
\begin_preamble
|
|
\usepackage{ragged2e}
|
|
\exhyphenpenalty=10000\hyphenpenalty=10000
|
|
|
|
\fancyhf{}
|
|
\fancyhead[L]{Franke \& Taylor: {\it Open Source Soft-Decision Decoder \ldots}}
|
|
\fancyhead[R]{\thepage}
|
|
\makeatletter
|
|
\let\ps@plain\ps@fancy % Plain page style = fancy page style
|
|
\makeatother
|
|
|
|
\usepackage{nomencl}
|
|
\usepackage{overcite}
|
|
|
|
\renewcommand{\nomname}{Sidebar: Glossary of Specialized Terms}
|
|
\end_preamble
|
|
\use_default_options true
|
|
\begin_modules
|
|
boxedfloat
|
|
\end_modules
|
|
\maintain_unincluded_children false
|
|
\language english
|
|
\language_package default
|
|
\inputencoding auto
|
|
\fontencoding global
|
|
\font_roman lmodern
|
|
\font_sans lmss
|
|
\font_typewriter lmtt
|
|
\font_math auto
|
|
\font_default_family default
|
|
\use_non_tex_fonts false
|
|
\font_sc false
|
|
\font_osf false
|
|
\font_sf_scale 100
|
|
\font_tt_scale 100
|
|
\graphics default
|
|
\default_output_format default
|
|
\output_sync 0
|
|
\bibtex_command default
|
|
\index_command default
|
|
\float_placement H
|
|
\paperfontsize 12
|
|
\spacing onehalf
|
|
\use_hyperref false
|
|
\papersize default
|
|
\use_geometry true
|
|
\use_package amsmath 1
|
|
\use_package amssymb 1
|
|
\use_package cancel 1
|
|
\use_package esint 1
|
|
\use_package mathdots 1
|
|
\use_package mathtools 1
|
|
\use_package mhchem 1
|
|
\use_package stackrel 1
|
|
\use_package stmaryrd 1
|
|
\use_package undertilde 1
|
|
\cite_engine basic
|
|
\cite_engine_type default
|
|
\biblio_style plain
|
|
\use_bibtopic false
|
|
\use_indices false
|
|
\paperorientation portrait
|
|
\suppress_date false
|
|
\justification false
|
|
\use_refstyle 1
|
|
\index Index
|
|
\shortcut idx
|
|
\color #008000
|
|
\end_index
|
|
\leftmargin 1in
|
|
\topmargin 1in
|
|
\rightmargin 1in
|
|
\bottommargin 1in
|
|
\secnumdepth 3
|
|
\tocdepth 3
|
|
\paragraph_separation skip
|
|
\defskip bigskip
|
|
\quotes_language english
|
|
\papercolumns 1
|
|
\papersides 1
|
|
\paperpagestyle fancy
|
|
\tracking_changes false
|
|
\output_changes false
|
|
\html_math_output 0
|
|
\html_css_as_file 0
|
|
\html_be_strict false
|
|
\end_header
|
|
|
|
\begin_body
|
|
|
|
\begin_layout Title
|
|
Open Source Soft-Decision Decoder for the JT65 (63,12) Reed-Solomon Code
|
|
\end_layout
|
|
|
|
\begin_layout SubTitle
|
|
|
|
\emph on
|
|
Under-the-hood description of the JT65 decoding procedure, including a wholly
|
|
new algorithm for its powerful error-correcting code.
|
|
\end_layout
|
|
|
|
\begin_layout Author
|
|
Steven J.
|
|
Franke, K9AN and Joseph H.
|
|
Taylor, K1JT
|
|
\end_layout
|
|
|
|
\begin_layout Section
|
|
\begin_inset CommandInset label
|
|
LatexCommand label
|
|
name "sec:Introduction-and-Motivation"
|
|
|
|
\end_inset
|
|
|
|
Background and Motivation
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
\begin_inset ERT
|
|
status open
|
|
|
|
\begin_layout Plain Layout
|
|
|
|
|
|
\backslash
|
|
RaggedRight
|
|
\end_layout
|
|
|
|
\end_inset
|
|
|
|
The JT65 protocol has revolutionized amateur-radio weak-signal communication
|
|
by enabling operators with small or compromise antennas and relatively
|
|
low-power transmitters to communicate over propagation paths not usable
|
|
with traditional technologies.
|
|
The protocol was developed in 2003 for Earth-Moon-Earth (EME, or
|
|
\begin_inset Quotes eld
|
|
\end_inset
|
|
|
|
moonbounce
|
|
\begin_inset Quotes erd
|
|
\end_inset
|
|
|
|
) communication
|
|
\begin_inset CommandInset citation
|
|
LatexCommand cite
|
|
key "jt65_protocol"
|
|
|
|
\end_inset
|
|
|
|
, where the scattered return signals are always weak.
|
|
It was soon found that JT65 also enables worldwide communication on the
|
|
HF bands with low power, modest antennas, and efficient spectral usage.
|
|
Thousands of amateurs now use JT65 on a regular basis, making contacts
|
|
on all bands from 160 meters through microwaves.
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
JT65 uses timed transmitting and receiving sequences one minute long.
|
|
Messages are short and structured so as to streamline minimal exchanges
|
|
between two amateur operators over potentially difficult radio paths.
|
|
Most messages contain two callsigns and a grid locator, signal report,
|
|
acknowledgment, or sign-off; one of the tokens CQ, QRZ, or DE may be substitute
|
|
d for the first callsign.
|
|
Alternatively, a message may contain up to 13 Latin characters of arbitrary
|
|
text.
|
|
All messages are efficiently compressed into exactly 72 bits of digital
|
|
information.
|
|
It should be obvious that the JT65 protocol is intended for the basic purpose
|
|
of completing legitimate, documented two-way contacts, but not for extended
|
|
conversations.
|
|
Full details of the message structure and encoding procedure were presented
|
|
in an earlier publication
|
|
\begin_inset CommandInset citation
|
|
LatexCommand cite
|
|
key "jt65_protocol"
|
|
|
|
\end_inset
|
|
|
|
.
|
|
For a concise description of the overall process of transmitting and receiving
|
|
a JT65 message, see the accompanying sidebar
|
|
\series bold
|
|
JT65 Message Processing
|
|
\series default
|
|
.
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
A major reason for the success and popularity of JT65 is its use of a strong
|
|
error-correction code.
|
|
Before transmission, each 72-bit message is divided into 12 six-bit
|
|
\emph on
|
|
symbols
|
|
\begin_inset CommandInset nomenclature
|
|
LatexCommand nomenclature
|
|
symbol "{\\bf Symbol: }"
|
|
description "The information carried in one signalling interval, usually an integral number of bits. JT65 uses 6-bit symbols."
|
|
|
|
\end_inset
|
|
|
|
|
|
\emph default
|
|
and augmented with 51 additional symbols of error-correcting information.
|
|
These 51
|
|
\emph on
|
|
parity symbols
|
|
\emph default
|
|
are computed according to information-theory rules that maximize the probabilit
|
|
y of correctly decoding the message, even if many symbols are received incorrect
|
|
ly.
|
|
The JT65 code is properly described as a short block-length, low-rate Reed-Solo
|
|
mon code based on a 64-symbol
|
|
\emph on
|
|
alphabet.
|
|
|
|
\emph default
|
|
|
|
\begin_inset CommandInset nomenclature
|
|
LatexCommand nomenclature
|
|
symbol "{\\bf Alphabet: }"
|
|
description "A sequence of possible symbol values used for signaling. JT65 uses a 64-character alphabet, values in the range 0 to 63."
|
|
|
|
\end_inset
|
|
|
|
Characters in this alphabet are mapped onto 64 different frequencies for
|
|
transmission.
|
|
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
Reed Solomon codes are widely used to ensure reliability in data transmission
|
|
and storage.
|
|
In hardware implementations, decoding is generally accomplished with a
|
|
procedure such as the Berlekamp-Massey (BM) algorithm, based on
|
|
\emph on
|
|
hard decisions
|
|
\emph default
|
|
|
|
\begin_inset CommandInset nomenclature
|
|
LatexCommand nomenclature
|
|
symbol "{\\bf Hard decision: }"
|
|
description "Received symbols are assigned definite values by the demodulator."
|
|
|
|
\end_inset
|
|
|
|
for each of the symbol values received.
|
|
|
|
\emph on
|
|
Soft decisions
|
|
\begin_inset CommandInset nomenclature
|
|
LatexCommand nomenclature
|
|
symbol "{\\bf Soft decision: }"
|
|
description "Received symbols are assigned tentative values (most probable, second most probable, etc.) and quality indicators."
|
|
|
|
\end_inset
|
|
|
|
|
|
\emph default
|
|
are potentially more powerful, however.
|
|
For each received JT65 symbol we can estimate not only the value most likely
|
|
to be correct, but also the second, third, etc., most likely.
|
|
Most importantly, we can also estimate the probability that each of those
|
|
possible values is the correct one.
|
|
Decoders that make use of such information are called
|
|
\emph on
|
|
soft-decision decoders.
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
Until now, nearly all programs implementing JT65 have used the patented
|
|
Kötter-Vardy (KV) algebraic soft-decision decoder
|
|
\begin_inset CommandInset citation
|
|
LatexCommand cite
|
|
key "kv2001"
|
|
|
|
\end_inset
|
|
|
|
, licensed to and implemented by K1JT as a closed-source executable for
|
|
use only in amateur radio applications.
|
|
Since 2001 the KV decoder has been considered the best available soft-decision
|
|
decoder for Reed Solomon codes.
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
We describe here a new open-source alternative called the Franke-Taylor
|
|
(FT, or K9AN-K1JT) soft-decision decoding algorithm.
|
|
It is conceptually simple, built on top of the BM hard-decision decoder,
|
|
and in this application it performs even better than the KV decoder.
|
|
The FT algorithm is implemented in the popular programs
|
|
\emph on
|
|
WSJT
|
|
\emph default
|
|
,
|
|
\emph on
|
|
MAP65
|
|
\emph default
|
|
, and
|
|
\emph on
|
|
WSJT-X
|
|
\emph default
|
|
, widely used for amateur weak-signal communication using JT65 and other
|
|
specialized digital protocols.
|
|
These programs are open-source, freely available
|
|
\begin_inset CommandInset citation
|
|
LatexCommand cite
|
|
key "wsjt"
|
|
|
|
\end_inset
|
|
|
|
, and licensed under the GNU General Public License.
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
The JT65 protocol specifies transmissions that start one second into a UTC
|
|
minute and last for 46.8 seconds.
|
|
Receiving software therefore has as much as ten seconds to decode a message
|
|
before the start of the next minute, when the operator will send a reply.
|
|
With today's personal computers, this relatively long time encourages experimen
|
|
tation with decoders of high computational complexity.
|
|
With time to spare, the FT algorithm lowers the decoding threshold on a
|
|
typical fading channel by many dB over the hard-decision BM decoder, and
|
|
by a meaningful amount over the KV decoder.
|
|
In addition to its excellent performance, the new algorithm has other desirable
|
|
properties, not least of which is its conceptual simplicity.
|
|
Decoding performance and computational complexity scale in a convenient
|
|
way, providing steadily increasing soft-decision decoding gain as a tunable
|
|
parameter is increased over more than five orders of magnitude.
|
|
Appreciable gain is available from our decoder even on very simple (and
|
|
relatively slow) computers.
|
|
On the other hand, because the algorithm benefits from a large number of
|
|
independent decoding trials, further performance gains should be achievable
|
|
through parallelization on high-performance computers.
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
The remainder of this paper is organized as follows.
|
|
Section 2 presents a brief overview of the nature of Reed Solomon codes
|
|
and their error-correcting capabilities.
|
|
Section 3 provides statistical motivation for the FT algorithm, and Section
|
|
4 describes the algorithm in full detail.
|
|
Material in these two sections is important because it documents our approach
|
|
and underlines its fundamental technical contributions.
|
|
These sections are heavier in formal mathematics than common in
|
|
\emph on
|
|
QEX
|
|
\emph default
|
|
; for this reason, some readers may choose to skip or skim them and proceed
|
|
more quickly to the results.
|
|
Most readers will benefit by reviewing the original paper on the JT65 protocol
|
|
|
|
\begin_inset CommandInset citation
|
|
LatexCommand cite
|
|
key "jt65_protocol"
|
|
|
|
\end_inset
|
|
|
|
.
|
|
A procedure for
|
|
\emph on
|
|
hinted decoding
|
|
\emph default
|
|
--- determining which one, if any, of a list of likely messages matches
|
|
the one that was received --- is outlined in Section 5.
|
|
Finally, in Section 6 we present performance measurements of the FT and
|
|
hinted decoding algorithms and make explicit comparisons to the BM and
|
|
KV decoders familiar to users of older versions of
|
|
\emph on
|
|
WSJT
|
|
\emph default
|
|
,
|
|
\emph on
|
|
MAP65
|
|
\emph default
|
|
and
|
|
\emph on
|
|
WSJT-X
|
|
\emph default
|
|
.
|
|
Section 7 summarizes some on-the-air experiences with the new decoder.
|
|
Refer to the sidebar
|
|
\series bold
|
|
Glossary of Specialized Terms
|
|
\series default
|
|
for brief definitions of some potentially unfamiliar language.
|
|
\end_layout
|
|
|
|
\begin_layout Section
|
|
\begin_inset CommandInset label
|
|
LatexCommand label
|
|
name "sec:JT65-messages-and"
|
|
|
|
\end_inset
|
|
|
|
JT65 Messages and Reed Solomon Codes
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
The JT65 message frame consists of a short, compressed 72-bit message encoded
|
|
for transmission with a Reed-Solomon code.
|
|
Reed-Solomon codes are
|
|
\emph on
|
|
block codes
|
|
\emph default
|
|
|
|
\begin_inset CommandInset nomenclature
|
|
LatexCommand nomenclature
|
|
symbol "{\\bf Block code: }"
|
|
description "An error-correcting code that treats data in blocks of fixed size."
|
|
|
|
\end_inset
|
|
|
|
characterized by
|
|
\begin_inset Formula $n$
|
|
\end_inset
|
|
|
|
, the length of their
|
|
\emph on
|
|
codewords
|
|
\emph default
|
|
;
|
|
\begin_inset CommandInset nomenclature
|
|
LatexCommand nomenclature
|
|
symbol "{\\bf Codeword:}"
|
|
description "For the JT65 code, a vector of 63 symbol values each in the range 0 to 63."
|
|
|
|
\end_inset
|
|
|
|
|
|
\begin_inset Formula $k$
|
|
\end_inset
|
|
|
|
, the number of message symbols conveyed by the codeword; and the transmission
|
|
alphabet, or number of possible values for each symbol in a codeword.
|
|
The codeword length and the number of message symbols are specified with
|
|
the notation
|
|
\begin_inset Formula $(n,k)$
|
|
\end_inset
|
|
|
|
.
|
|
JT65 uses a (63,12) Reed-Solomon code with an alphabet of 64 possible values
|
|
for each symbol.
|
|
Each of the 12 message symbols represents
|
|
\begin_inset Formula $\log_{2}64=6$
|
|
\end_inset
|
|
|
|
message bits.
|
|
The source-encoded
|
|
\begin_inset CommandInset nomenclature
|
|
LatexCommand nomenclature
|
|
symbol "{\\bf Source encoding: }"
|
|
description "Compression of a message to use a minimum number or bits. JT65 source-encodes all messages to 72 bits."
|
|
|
|
\end_inset
|
|
|
|
message conveyed by a 63-symbol JT65 frame thus consists of 72 information
|
|
bits.
|
|
The JT65 code is
|
|
\emph on
|
|
systematic
|
|
\emph default
|
|
, which means that the 12 message symbols are embedded in the codeword without
|
|
modification and another 51 parity symbols derived from the message symbols
|
|
are added to form a codeword of 63 symbols.
|
|
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
In coding theory the concept of
|
|
\emph on
|
|
Hamming distance
|
|
\emph default
|
|
|
|
\begin_inset CommandInset nomenclature
|
|
LatexCommand nomenclature
|
|
symbol "{\\bf Hamming distance: }"
|
|
description "The Hamming distance between two codewords, or between a received word and a codeword, is equal to the number of symbol positions in which they differ."
|
|
|
|
\end_inset
|
|
|
|
is used as a measure of disagreement between different codewords, or between
|
|
a received word
|
|
\begin_inset CommandInset nomenclature
|
|
LatexCommand nomenclature
|
|
symbol "{\\bf Received word: }"
|
|
description "A vector of symbol values, possibly accompanied by soft information on individual reliabilities."
|
|
|
|
\end_inset
|
|
|
|
and a codeword.
|
|
Hamming distance is the number of code symbols that differ in two words
|
|
being compared.
|
|
Reed-Solomon codes have guaranteed minimum Hamming distance
|
|
\begin_inset Formula $d$
|
|
\end_inset
|
|
|
|
, where
|
|
\begin_inset Formula
|
|
\begin{equation}
|
|
d=n-k+1.\label{eq:minimum_distance}
|
|
\end{equation}
|
|
|
|
\end_inset
|
|
|
|
With
|
|
\begin_inset Formula $n=63$
|
|
\end_inset
|
|
|
|
and
|
|
\begin_inset Formula $k=12$
|
|
\end_inset
|
|
|
|
the minimum Hamming distance of the JT65 code is
|
|
\begin_inset Formula $d=52$
|
|
\end_inset
|
|
|
|
.
|
|
With 72 information bits in each message, JT65 can transmit any one of
|
|
|
|
\begin_inset Formula $2^{72}\approx4.7\times10^{21}$
|
|
\end_inset
|
|
|
|
possible messages.
|
|
The codeword for any message differs from every other codeword in at least
|
|
52 of the 63 symbol positions.
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
A received word containing some
|
|
\emph on
|
|
errors
|
|
\emph default
|
|
(incorrect symbols) can be decoded into the correct codeword using a determinis
|
|
tic,
|
|
\begin_inset CommandInset nomenclature
|
|
LatexCommand nomenclature
|
|
symbol "{\\bf Deterministic algorithm: }"
|
|
description "A series of computational steps that for the same input always produces the same output."
|
|
|
|
\end_inset
|
|
|
|
algebraic algorithm provided that no more than
|
|
\begin_inset Formula $t$
|
|
\end_inset
|
|
|
|
symbols were received incorrectly, where
|
|
\begin_inset Formula
|
|
\begin{equation}
|
|
t=\left\lfloor \frac{n-k}{2}\right\rfloor .\label{eq:t}
|
|
\end{equation}
|
|
|
|
\end_inset
|
|
|
|
For the JT65 code
|
|
\begin_inset Formula $t=25$
|
|
\end_inset
|
|
|
|
, so it is always possible to decode a received word having 25 or fewer
|
|
symbol errors.
|
|
Any one of several well-known algebraic algorithms, such as the BM algorithm,
|
|
can carry out this hard-decision decoding.
|
|
Two steps are necessarily involved in this process.
|
|
We must (1) determine which symbols were received incorrectly, and (2)
|
|
find the correct value of the incorrect symbols.
|
|
If we somehow know that certain symbols are incorrect, that information
|
|
can be used to reduce the work involved in step 1 and allow step 2 to correct
|
|
more than
|
|
\begin_inset Formula $t$
|
|
\end_inset
|
|
|
|
errors.
|
|
In the unlikely event that the location of every error is known, and if
|
|
no correct symbols are accidentally labeled as errors, the BM algorithm
|
|
can correct up to
|
|
\begin_inset Formula $d-1=n-k$
|
|
\end_inset
|
|
|
|
errors.
|
|
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
The FT algorithm creates lists of symbols suspected of being incorrect and
|
|
sends them to the BM decoder.
|
|
Symbols flagged in this way are called
|
|
\emph on
|
|
erasures
|
|
\emph default
|
|
|
|
\begin_inset CommandInset nomenclature
|
|
LatexCommand nomenclature
|
|
symbol "{\\bf Erasure: }"
|
|
description "A received symbol may be ``erased'' when confidence in its value is so low that it is unlikely to provide useful information. "
|
|
|
|
\end_inset
|
|
|
|
.
|
|
With perfect erasure information up to
|
|
\begin_inset Formula $n-k=51$
|
|
\end_inset
|
|
|
|
incorrect symbols can be corrected for the JT65 code.
|
|
Imperfect erasure information means that some erased symbols may be correct,
|
|
and some other symbols in error.
|
|
If
|
|
\begin_inset Formula $s$
|
|
\end_inset
|
|
|
|
symbols are erased and the remaining
|
|
\begin_inset Formula $n-s$
|
|
\end_inset
|
|
|
|
symbols contain
|
|
\begin_inset Formula $e$
|
|
\end_inset
|
|
|
|
errors, the BM algorithm can find the correct codeword as long as
|
|
\begin_inset Formula
|
|
\begin{equation}
|
|
s+2e\le d-1.\label{eq:erasures_and_errors}
|
|
\end{equation}
|
|
|
|
\end_inset
|
|
|
|
If
|
|
\begin_inset Formula $s=0$
|
|
\end_inset
|
|
|
|
, the decoder is said to be an
|
|
\emph on
|
|
errors-only
|
|
\emph default
|
|
decoder.
|
|
If
|
|
\begin_inset Formula $0<s\le d-1$
|
|
\end_inset
|
|
|
|
, the decoder is called an
|
|
\emph on
|
|
errors-and-erasures
|
|
\emph default
|
|
decoder.
|
|
The possibility of doing errors-and-erasures decoding lies at the heart
|
|
of the FT algorithm.
|
|
On that foundation we have built a capability for using soft information
|
|
on the reliability of individual symbol values, thereby producing a soft-decisi
|
|
on decoder.
|
|
\end_layout
|
|
|
|
\begin_layout Section
|
|
\begin_inset CommandInset label
|
|
LatexCommand label
|
|
name "sec:Statistical Framework"
|
|
|
|
\end_inset
|
|
|
|
Statistical Framework
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
The FT algorithm uses the estimated quality of received symbols to generate
|
|
lists of symbols considered likely to be in error, thus enabling decoding
|
|
of received words with more than 25 errors.
|
|
Algorithms of this type are generally called
|
|
\emph on
|
|
reliability-based
|
|
\emph default
|
|
or
|
|
\emph on
|
|
probabilistic
|
|
\emph default
|
|
decoding methods
|
|
\begin_inset CommandInset citation
|
|
LatexCommand cite
|
|
key "lc2004"
|
|
|
|
\end_inset
|
|
|
|
.
|
|
Such algorithms involve some amount of educating guessing about which received
|
|
symbols are in error or, alternatively, about which received symbols are
|
|
correct.
|
|
The guesses are informed by quality metrics associated with the received
|
|
symbols.
|
|
To illustrate why it is absolutely essential to use such soft-symbol informatio
|
|
n in these algorithms it helps to consider what would happen if we tried
|
|
to use completely random guesses, ignoring any available soft-symbol informatio
|
|
n.
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
As a specific example, consider a received JT65 word with 23 correct symbols
|
|
and 40 errors.
|
|
We do not know which symbols are in error.
|
|
Suppose that the decoder randomly selects
|
|
\begin_inset Formula $s=40$
|
|
\end_inset
|
|
|
|
symbols for erasure, leaving 23 unerased symbols.
|
|
According to Eq.
|
|
(
|
|
\begin_inset CommandInset ref
|
|
LatexCommand ref
|
|
reference "eq:erasures_and_errors"
|
|
|
|
\end_inset
|
|
|
|
), the BM decoder can successfully decode this word as long as
|
|
\begin_inset Formula $e$
|
|
\end_inset
|
|
|
|
, the number of errors present in the 23 unerased symbols, is 5 or less.
|
|
The number of errors captured in the set of 40 erased symbols must therefore
|
|
be at least 35.
|
|
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
The probability of selecting some particular number of incorrect symbols
|
|
in a randomly selected subset of received symbols is governed by the hypergeome
|
|
tric probability distribution.
|
|
Let us define
|
|
\begin_inset Formula $N$
|
|
\end_inset
|
|
|
|
as the number of symbols from which erasures will be selected,
|
|
\begin_inset Formula $X$
|
|
\end_inset
|
|
|
|
as the number of incorrect symbols in the set of
|
|
\begin_inset Formula $N$
|
|
\end_inset
|
|
|
|
symbols, and
|
|
\begin_inset Formula $x$
|
|
\end_inset
|
|
|
|
as the number of errors in the symbols actually erased.
|
|
In an ensemble of many received words
|
|
\begin_inset Formula $X$
|
|
\end_inset
|
|
|
|
and
|
|
\begin_inset Formula $x$
|
|
\end_inset
|
|
|
|
will be random variables, but for this example we will assume that
|
|
\begin_inset Formula $X$
|
|
\end_inset
|
|
|
|
is known and that only
|
|
\begin_inset Formula $x$
|
|
\end_inset
|
|
|
|
is random.
|
|
The conditional probability mass function for
|
|
\begin_inset Formula $x$
|
|
\end_inset
|
|
|
|
with stated values of
|
|
\begin_inset Formula $N$
|
|
\end_inset
|
|
|
|
,
|
|
\begin_inset Formula $X$
|
|
\end_inset
|
|
|
|
, and
|
|
\begin_inset Formula $s$
|
|
\end_inset
|
|
|
|
may be written as
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
\begin_inset Formula
|
|
\begin{equation}
|
|
P(x=\epsilon|N,X,s)=\frac{\binom{X}{\epsilon}\binom{N-X}{s-\epsilon}}{\binom{N}{s}}\label{eq:hypergeometric_pdf}
|
|
\end{equation}
|
|
|
|
\end_inset
|
|
|
|
where
|
|
\begin_inset Formula $\binom{n}{k}=\frac{n!}{k!(n-k)!}$
|
|
\end_inset
|
|
|
|
is the binomial coefficient.
|
|
The binomial coefficient can be calculated using the function
|
|
\family typewriter
|
|
nchoosek(n,k)
|
|
\family default
|
|
in the numerical computing language
|
|
\emph on
|
|
GNU Octave
|
|
\emph default
|
|
, or with one of many free online calculators.
|
|
The hypergeometric probability mass function defined in Eq.
|
|
(
|
|
\begin_inset CommandInset ref
|
|
LatexCommand ref
|
|
reference "eq:hypergeometric_pdf"
|
|
|
|
\end_inset
|
|
|
|
) is available in
|
|
\emph on
|
|
GNU Octave
|
|
\emph default
|
|
as function
|
|
\family typewriter
|
|
hygepdf(x,N,X,s)
|
|
\family default
|
|
.
|
|
The cumulative probability that at least
|
|
\begin_inset Formula $\epsilon$
|
|
\end_inset
|
|
|
|
errors are captured in a subset of
|
|
\begin_inset Formula $s$
|
|
\end_inset
|
|
|
|
erased symbols selected from a group of
|
|
\begin_inset Formula $N$
|
|
\end_inset
|
|
|
|
symbols containing
|
|
\begin_inset Formula $X$
|
|
\end_inset
|
|
|
|
errors is
|
|
\begin_inset Formula
|
|
\begin{equation}
|
|
P(x\ge\epsilon|N,X,s)=\sum_{j=\epsilon}^{s}P(x=j|N,X,s).\label{eq:cumulative_prob}
|
|
\end{equation}
|
|
|
|
\end_inset
|
|
|
|
|
|
\end_layout
|
|
|
|
\begin_layout Paragraph
|
|
Example 1:
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
Suppose a received word contains
|
|
\begin_inset Formula $X=40$
|
|
\end_inset
|
|
|
|
incorrect symbols.
|
|
In an attempt to decode using an errors-and-erasures decoder,
|
|
\begin_inset Formula $s=40$
|
|
\end_inset
|
|
|
|
symbols are randomly selected for erasure from the full set of
|
|
\begin_inset Formula $N=n=63$
|
|
\end_inset
|
|
|
|
symbols.
|
|
The probability that
|
|
\begin_inset Formula $x=35$
|
|
\end_inset
|
|
|
|
of the erased symbols are actually incorrect is then
|
|
\begin_inset Formula
|
|
\[
|
|
P(x=35)=\frac{\binom{40}{35}\binom{63-40}{40-35}}{\binom{63}{40}}\simeq2.4\times10^{-7}.
|
|
\]
|
|
|
|
\end_inset
|
|
|
|
Similarly, the probability that
|
|
\begin_inset Formula $x=36$
|
|
\end_inset
|
|
|
|
of the erased symbols are incorrect is
|
|
\begin_inset Formula
|
|
\[
|
|
P(x=36)\simeq8.6\times10^{-9}.
|
|
\]
|
|
|
|
\end_inset
|
|
|
|
Since the probability of erasing 36 errors is so much smaller than that
|
|
for erasing 35 errors, we may safely conclude that the probability of randomly
|
|
choosing an erasure vector that can decode the received word is approximately
|
|
|
|
\begin_inset Formula $P(x=35)\simeq2.4\times10^{-7}$
|
|
\end_inset
|
|
|
|
.
|
|
The odds of producing a valid codeword on the first try are very poor,
|
|
about 1 in 4 million.
|
|
\end_layout
|
|
|
|
\begin_layout Paragraph
|
|
Example 2:
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
How might we best choose the number of symbols to erase, in order to maximize
|
|
the probability of successful decoding? By exhaustive search over all possible
|
|
values up to
|
|
\begin_inset Formula $s=51$
|
|
\end_inset
|
|
|
|
, it turns out that for
|
|
\begin_inset Formula $X=40$
|
|
\end_inset
|
|
|
|
the best strategy is to erase
|
|
\begin_inset Formula $s=45$
|
|
\end_inset
|
|
|
|
symbols.
|
|
According to equation
|
|
\begin_inset CommandInset ref
|
|
LatexCommand ref
|
|
reference "eq:erasures_and_errors"
|
|
|
|
\end_inset
|
|
|
|
, with
|
|
\begin_inset Formula $s=45$
|
|
\end_inset
|
|
|
|
and
|
|
\begin_inset Formula $d=52$
|
|
\end_inset
|
|
|
|
then
|
|
\begin_inset Formula $e$
|
|
\end_inset
|
|
|
|
must be 3 or less.
|
|
Decoding will be assured if the set of erased symbols contains at least
|
|
|
|
\begin_inset Formula $40-3=37$
|
|
\end_inset
|
|
|
|
errors.
|
|
With
|
|
\begin_inset Formula $N=63$
|
|
\end_inset
|
|
|
|
,
|
|
\begin_inset Formula $X=40$
|
|
\end_inset
|
|
|
|
, and
|
|
\begin_inset Formula $s=45$
|
|
\end_inset
|
|
|
|
, the probability of successful decode in a single try is
|
|
\begin_inset Formula
|
|
\[
|
|
P(x\ge37)\simeq1.9\times10^{-6}.
|
|
\]
|
|
|
|
\end_inset
|
|
|
|
This probability is about 8 times higher than the probability of success
|
|
when only 40 symbols were erased.
|
|
Nevertheless, the odds of successfully decoding on the first try are still
|
|
only about 1 in 500,000.
|
|
|
|
\end_layout
|
|
|
|
\begin_layout Paragraph
|
|
Example 3:
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
Examples 1 and 2 show that a random strategy for selecting symbols to erase
|
|
is unlikely to be successful unless we are prepared to wait a long time
|
|
for an answer.
|
|
So let's modify the strategy to tip the odds in our favor.
|
|
Let the received word contain
|
|
\begin_inset Formula $X=40$
|
|
\end_inset
|
|
|
|
incorrect symbols, as before, but suppose we know that 10 received symbols
|
|
are significantly more reliable than the other 53.
|
|
We might therefore protect the 10 most reliable symbols and select erasures
|
|
from the smaller set of
|
|
\begin_inset Formula $N=53$
|
|
\end_inset
|
|
|
|
less reliable ones.
|
|
If
|
|
\begin_inset Formula $s=45$
|
|
\end_inset
|
|
|
|
symbols are chosen randomly for erasure in this way, it is still necessary
|
|
for the erased symbols to include at least 37 errors, as in Example 2.
|
|
However, the probabilities are now much more favorable: with
|
|
\begin_inset Formula $N=53$
|
|
\end_inset
|
|
|
|
,
|
|
\begin_inset Formula $X=40$
|
|
\end_inset
|
|
|
|
, and
|
|
\begin_inset Formula $s=45$
|
|
\end_inset
|
|
|
|
, Eq.
|
|
(
|
|
\begin_inset CommandInset ref
|
|
LatexCommand ref
|
|
reference "eq:cumulative_prob"
|
|
|
|
\end_inset
|
|
|
|
) yields
|
|
\begin_inset ERT
|
|
status open
|
|
|
|
\begin_layout Plain Layout
|
|
|
|
|
|
\backslash
|
|
linebreak
|
|
\end_layout
|
|
|
|
\end_inset
|
|
|
|
|
|
\begin_inset Formula $\mbox{\ensuremath{P(x\geq37)=0.016.}}$
|
|
\end_inset
|
|
|
|
Even better odds are obtained by choosing
|
|
\begin_inset Formula $s=47$
|
|
\end_inset
|
|
|
|
, which requires
|
|
\begin_inset Formula $x\ge38$
|
|
\end_inset
|
|
|
|
.
|
|
With
|
|
\begin_inset Formula $N=53$
|
|
\end_inset
|
|
|
|
,
|
|
\begin_inset Formula $X=40$
|
|
\end_inset
|
|
|
|
, and
|
|
\begin_inset Formula $s=47$
|
|
\end_inset
|
|
|
|
,
|
|
\begin_inset Formula $P(x\ge38)=0.027$
|
|
\end_inset
|
|
|
|
.
|
|
The odds for producing a codeword on the first try are now about 1 in 38.
|
|
A few hundred independently randomized tries would be enough to all-but-guarant
|
|
ee production of a valid codeword by the BM decoder.
|
|
\end_layout
|
|
|
|
\begin_layout Section
|
|
\begin_inset CommandInset label
|
|
LatexCommand label
|
|
name "sec:The-decoding-algorithm"
|
|
|
|
\end_inset
|
|
|
|
The Franke-Taylor Decoding Algorithm
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
Example 3 shows how statistical information about symbol quality should
|
|
make it possible to decode received frames having a large number of errors.
|
|
In practice the number of errors in the received word is unknown, so our
|
|
algorithm simply assigns a high erasure probability to low-quality symbols
|
|
and relatively low probability to high-quality symbols.
|
|
As illustrated by Example 3, a good choice of erasure probabilities can
|
|
increase the chance of producing a codeword by many orders of magnitude.
|
|
Once erasure probabilities have been assigned to each of the 63 received
|
|
symbols, the FT algorithm uses a random number generator to decide whether
|
|
or not to erase each symbol, according to its assigned erasure probability.
|
|
The list of erased symbols is then submitted to the BM decoder, which produces
|
|
either a codeword or a flag indicating failure to decode.
|
|
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
The process of selecting the list of symbols to erase and calling the BM
|
|
decoder comprises one cycle of the FT algorithm.
|
|
The next cycle proceeds with a new selection of erased symbols.
|
|
At this stage we must treat any codeword obtained by errors-and-erasures
|
|
decoding as no more than a
|
|
\emph on
|
|
candidate
|
|
\emph default
|
|
.
|
|
Our next task is to find a metric that can reliably select one of many
|
|
proffered candidates as the codeword that was actually transmitted.
|
|
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
The FT algorithm uses quality indices made available by a noncoherent 64-FSK
|
|
demodulator (see the sidebar
|
|
\series bold
|
|
JT65 Message Processing
|
|
\series default
|
|
).
|
|
The demodulator computes binned power spectra for each signaling interval;
|
|
the result is a two-dimensional array
|
|
\begin_inset Formula $S(i,j)$
|
|
\end_inset
|
|
|
|
, where the frequency index
|
|
\begin_inset Formula $i$
|
|
\end_inset
|
|
|
|
assumes values 0 to 63 and the symbol index
|
|
\begin_inset Formula $j$
|
|
\end_inset
|
|
|
|
has values 1 to 63.
|
|
The most likely value for each symbol is taken as the frequency bin with
|
|
largest signal-plus-noise power over all values of
|
|
\begin_inset Formula $i$
|
|
\end_inset
|
|
|
|
.
|
|
The fractions of total power in the two bins containing the largest and
|
|
second-largest powers, denoted respectively by
|
|
\begin_inset Formula $p_{1}$
|
|
\end_inset
|
|
|
|
and
|
|
\begin_inset Formula $p_{2}$
|
|
\end_inset
|
|
|
|
, are computed for each symbol and passed from demodulator to decoder as
|
|
soft-symbol information.
|
|
The FT decoder derives two metrics from
|
|
\begin_inset Formula $p_{1}$
|
|
\end_inset
|
|
|
|
and
|
|
\begin_inset Formula $p_{2}$
|
|
\end_inset
|
|
|
|
, namely
|
|
\begin_inset Formula $p_{1}$
|
|
\end_inset
|
|
|
|
-rank (the rank
|
|
\begin_inset Formula $\{1,2,\ldots,63\}$
|
|
\end_inset
|
|
|
|
of the symbol's fractional power
|
|
\begin_inset Formula $p_{1,\, j}$
|
|
\end_inset
|
|
|
|
in a sorted list of
|
|
\begin_inset Formula $p_{1}$
|
|
\end_inset
|
|
|
|
values) and the ratio
|
|
\begin_inset Formula $p_{2}/p_{1}$
|
|
\end_inset
|
|
|
|
.
|
|
High ranking symbols have larger signal-to-noise ratio than those with
|
|
lower rank.
|
|
When
|
|
\begin_inset Formula $p_{2}/p_{1}$
|
|
\end_inset
|
|
|
|
is close to 1, the most likely symbol value is only slightly more reliable
|
|
than the second most likely one.
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
We use 3-bit quantization of the metrics
|
|
\begin_inset Formula $p_{1}$
|
|
\end_inset
|
|
|
|
-rank and
|
|
\begin_inset Formula $p_{2}/p_{1}$
|
|
\end_inset
|
|
|
|
to index the entries in an
|
|
\begin_inset Formula $8\times8$
|
|
\end_inset
|
|
|
|
table of symbol error probabilities.
|
|
The probabilities were derived empirically from a large data set of received
|
|
words that were successfully decoded.
|
|
The table provides an estimate of the
|
|
\emph on
|
|
a priori
|
|
\emph default
|
|
probability of symbol error based on the metrics
|
|
\begin_inset Formula $p_{1}$
|
|
\end_inset
|
|
|
|
-rank and
|
|
\begin_inset Formula $p_{2}/p_{1}$
|
|
\end_inset
|
|
|
|
.
|
|
This table is a key element of the algorithm, as it determines which symbols
|
|
are effectively protected from erasure.
|
|
The
|
|
\emph on
|
|
a priori
|
|
\emph default
|
|
symbol error probabilities are close to 1 for low-quality symbols and close
|
|
to 0 for high-quality symbols.
|
|
Recall from Examples 2 and 3 that candidate codewords are produced with
|
|
higher probability when the number of erased symbols is larger than the
|
|
number of incorrect symbols.
|
|
Correspondingly, the FT algorithm works best when the probability of erasing
|
|
a symbol is somewhat larger than the probability that the symbol is incorrect.
|
|
For the JT65 code we found empirically that good decoding performance is
|
|
obtained when the symbol erasure probability is about 1.3 times the symbol
|
|
error probability.
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
The FT algorithm tries successively to decode the received word using independen
|
|
t educated guesses to select symbols for erasure.
|
|
For each iteration a stochastic erasure vector is generated based on the
|
|
symbol erasure probabilities.
|
|
The erasure vector is sent to the BM decoder along with the full set of
|
|
63 hard-decision symbol values.
|
|
When the BM decoder finds a candidate codeword it is assigned a quality
|
|
metric
|
|
\begin_inset Formula $d_{s}$
|
|
\end_inset
|
|
|
|
, the
|
|
\emph on
|
|
soft distance
|
|
\begin_inset CommandInset nomenclature
|
|
LatexCommand nomenclature
|
|
symbol "{\\bf Soft distance: }"
|
|
description "The soft distance between a received word and a codeword is a measure of how greatly they differ, taking into account available soft information on symbol values."
|
|
|
|
\end_inset
|
|
|
|
|
|
\emph default
|
|
between the received word and the codeword:
|
|
\begin_inset Formula
|
|
\begin{equation}
|
|
d_{s}=\sum_{j=1}^{n}\alpha_{j}\,(1+p_{1,\, j}).\label{eq:soft_distance}
|
|
\end{equation}
|
|
|
|
\end_inset
|
|
|
|
Here
|
|
\begin_inset Formula $\alpha_{j}=0$
|
|
\end_inset
|
|
|
|
if received symbol
|
|
\begin_inset Formula $j$
|
|
\end_inset
|
|
|
|
is the same as the corresponding symbol in the codeword,
|
|
\begin_inset Formula $\alpha_{j}=1$
|
|
\end_inset
|
|
|
|
if the received symbol and codeword symbol are different, and
|
|
\begin_inset Formula $p_{1,\, j}$
|
|
\end_inset
|
|
|
|
is the fractional power associated with received symbol
|
|
\begin_inset Formula $j$
|
|
\end_inset
|
|
|
|
.
|
|
Think of the soft distance as made up of two terms: the first is the Hamming
|
|
distance between the received word and the codeword, and the second ensures
|
|
that if two candidate codewords have the same Hamming distance from the
|
|
received word, a smaller soft distance will be assigned to the one where
|
|
differences occur in symbols of lower estimated reliability.
|
|
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
In practice we find that
|
|
\begin_inset Formula $d_{s}$
|
|
\end_inset
|
|
|
|
can reliably identify the correct codeword if the signal-to-noise ratio
|
|
for individual symbols is greater than about 4 in linear power units.
|
|
We also find that significantly weaker signals can be decoded by using
|
|
soft-symbol information beyond that contained in
|
|
\begin_inset Formula $p_{1}$
|
|
\end_inset
|
|
|
|
and
|
|
\begin_inset Formula $p_{2}$
|
|
\end_inset
|
|
|
|
.
|
|
To this end we define an additional metric
|
|
\begin_inset Formula $u$
|
|
\end_inset
|
|
|
|
, the average signal-plus-noise power in all received symbols according
|
|
to a candidate codeword's symbol values:
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
\begin_inset Formula
|
|
\begin{equation}
|
|
u=\frac{1}{n}\sum_{j=1}^{n}S(c_{j},\, j).\label{eq:u-metric}
|
|
\end{equation}
|
|
|
|
\end_inset
|
|
|
|
Here the
|
|
\begin_inset Formula $c_{j}$
|
|
\end_inset
|
|
|
|
's are the symbol values for the candidate codeword being tested.
|
|
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
The correct JT65 codeword produces a value for
|
|
\begin_inset Formula $u$
|
|
\end_inset
|
|
|
|
equal to the average of
|
|
\begin_inset Formula $n=63$
|
|
\end_inset
|
|
|
|
bins containing both signal and noise power.
|
|
Incorrect codewords have at most
|
|
\begin_inset Formula $k-1=11$
|
|
\end_inset
|
|
|
|
such bins and at least
|
|
\begin_inset Formula $n-k+1=52$
|
|
\end_inset
|
|
|
|
bins containing noise only.
|
|
Thus, if the spectral array
|
|
\begin_inset Formula $S(i,\, j)$
|
|
\end_inset
|
|
|
|
has been normalized so that the average value of the noise-only bins is
|
|
unity,
|
|
\begin_inset Formula $u$
|
|
\end_inset
|
|
|
|
for the correct codeword has expectation value (average over many random
|
|
realizations) given by
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
\begin_inset Formula
|
|
\begin{equation}
|
|
\bar{u}_{c}=1+y,\label{eq:u1-exp}
|
|
\end{equation}
|
|
|
|
\end_inset
|
|
|
|
where
|
|
\begin_inset Formula $y$
|
|
\end_inset
|
|
|
|
is the signal-to-noise ratio in linear power units.
|
|
If we assume Gaussian statistics and a large number of trials, the standard
|
|
deviation of measured values of
|
|
\begin_inset Formula $u$
|
|
\end_inset
|
|
|
|
is
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
\begin_inset Formula
|
|
\begin{equation}
|
|
\sigma_{c}=\left(\frac{1+2y}{n}\right)^{1/2}.\label{eq:sigma1}
|
|
\end{equation}
|
|
|
|
\end_inset
|
|
|
|
In contrast, the expected value and standard deviation of the
|
|
\begin_inset Formula $u$
|
|
\end_inset
|
|
|
|
-metric for an incorrect codeword (randomly selected from a population of
|
|
all
|
|
\begin_inset Quotes eld
|
|
\end_inset
|
|
|
|
worst case
|
|
\begin_inset Quotes erd
|
|
\end_inset
|
|
|
|
codewords,
|
|
\emph on
|
|
i.e.
|
|
\emph default
|
|
, those with
|
|
\begin_inset Formula $k-1$
|
|
\end_inset
|
|
|
|
symbols identical to corresponding ones in the correct word) are given
|
|
by
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
\begin_inset Formula
|
|
\begin{equation}
|
|
\bar{u}_{i}=1+\left(\frac{k-1}{n}\right)y,\label{eq:u2-exp}
|
|
\end{equation}
|
|
|
|
\end_inset
|
|
|
|
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
\begin_inset Formula
|
|
\begin{equation}
|
|
\sigma_{i}=\frac{1}{n}\left[n+2y(k-1)\right]^{1/2},\label{eq:sigma2}
|
|
\end{equation}
|
|
|
|
\end_inset
|
|
|
|
where the subscript
|
|
\begin_inset Formula $i$
|
|
\end_inset
|
|
|
|
is an abbreviation for
|
|
\begin_inset Quotes eld
|
|
\end_inset
|
|
|
|
incorrect
|
|
\begin_inset Quotes erd
|
|
\end_inset
|
|
|
|
.
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
If
|
|
\begin_inset Formula $u$
|
|
\end_inset
|
|
|
|
is evaluated for a large number of candidate codewords, one of which is
|
|
correct, we should expect the largest value
|
|
\begin_inset Formula $u_{1}$
|
|
\end_inset
|
|
|
|
to be drawn from a population with statistics described by
|
|
\begin_inset Formula $\bar{u}_{c}$
|
|
\end_inset
|
|
|
|
and
|
|
\begin_inset Formula $\sigma_{c}.$
|
|
\end_inset
|
|
|
|
If no tested codeword is correct,
|
|
\begin_inset Formula $u_{1}$
|
|
\end_inset
|
|
|
|
is likely to come from the
|
|
\begin_inset Formula $(\bar{u}_{i},\,\sigma_{i})$
|
|
\end_inset
|
|
|
|
population and to be several standard deviations above the mean.
|
|
In either case the second-largest value,
|
|
\begin_inset Formula $u_{2},$
|
|
\end_inset
|
|
|
|
will likely come from the
|
|
\begin_inset Formula $(\bar{u}_{i},\,\sigma_{i})$
|
|
\end_inset
|
|
|
|
population, again several standard deviations above the mean.
|
|
If the signal-to-noise ratio
|
|
\begin_inset Formula $y$
|
|
\end_inset
|
|
|
|
is too small for decoding to be possible or the correct codeword is never
|
|
presented as a candidate, the ratio
|
|
\begin_inset Formula $r=u_{2}/u_{1}$
|
|
\end_inset
|
|
|
|
will likely be close to 1.
|
|
On the other hand, correctly identified codewords will produce
|
|
\begin_inset Formula $u_{1}$
|
|
\end_inset
|
|
|
|
significantly larger than
|
|
\begin_inset Formula $u_{2}$
|
|
\end_inset
|
|
|
|
and thus smaller values of
|
|
\begin_inset Formula $r$
|
|
\end_inset
|
|
|
|
.
|
|
We therefore apply a ratio threshold test, say
|
|
\begin_inset Formula $r<R_{1}$
|
|
\end_inset
|
|
|
|
, to identify codewords with high probability of being correct.
|
|
As described in Section
|
|
\begin_inset CommandInset ref
|
|
LatexCommand ref
|
|
reference "sec:Theory,-Simulation,-and"
|
|
|
|
\end_inset
|
|
|
|
, we use simulations to set an empirical acceptance threshold
|
|
\begin_inset Formula $R_{1}$
|
|
\end_inset
|
|
|
|
that maximizes the probability of correct decodes while ensuring a low
|
|
rate of false positives.
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
As with all decoding algorithms that generate a list of possible codewords,
|
|
a stopping criterion is necessary.
|
|
FT accepts a codeword unconditionally if the Hamming distance
|
|
\begin_inset Formula $X$
|
|
\end_inset
|
|
|
|
and soft distance
|
|
\begin_inset Formula $d_{s}$
|
|
\end_inset
|
|
|
|
obey specified criteria
|
|
\begin_inset Formula $X<X_{0}$
|
|
\end_inset
|
|
|
|
and
|
|
\begin_inset Formula $d_{s}<D_{0}$
|
|
\end_inset
|
|
|
|
.
|
|
Secondary acceptance criteria
|
|
\begin_inset Formula $d_{s}<D_{1}$
|
|
\end_inset
|
|
|
|
and
|
|
\begin_inset Formula $r<R_{1}$
|
|
\end_inset
|
|
|
|
are used to validate additional codewords that fail the first test.
|
|
A timeout is used to limit execution time if no acceptable codeword is
|
|
found in a reasonable number of trials,
|
|
\begin_inset Formula $T$
|
|
\end_inset
|
|
|
|
.
|
|
Today's personal computers are fast enough that
|
|
\begin_inset Formula $T$
|
|
\end_inset
|
|
|
|
can be set as large as
|
|
\begin_inset Formula $10^{5},$
|
|
\end_inset
|
|
|
|
or even higher.
|
|
Pseudo-code for the FT algorithm is presented in an accompanying box,
|
|
\series bold
|
|
Algorithm 1
|
|
\series default
|
|
.
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
\begin_inset Float algorithm
|
|
wide false
|
|
sideways false
|
|
status open
|
|
|
|
\begin_layout Plain Layout
|
|
\begin_inset Caption Standard
|
|
|
|
\begin_layout Plain Layout
|
|
Pseudo-code for the FT algorithm.
|
|
\end_layout
|
|
|
|
\end_inset
|
|
|
|
|
|
\end_layout
|
|
|
|
\begin_layout Enumerate
|
|
For each received symbol, define the erasure probability as 1.3 times the
|
|
|
|
\emph on
|
|
a priori
|
|
\emph default
|
|
symbol-error probability determined from soft-symbol information
|
|
\begin_inset Formula $\{p_{1}\textrm{-rank},\, p_{2}/p_{1}\}$
|
|
\end_inset
|
|
|
|
.
|
|
|
|
\end_layout
|
|
|
|
\begin_layout Enumerate
|
|
Make independent stochastic
|
|
\begin_inset CommandInset nomenclature
|
|
LatexCommand nomenclature
|
|
symbol "{\\bf Stochastic algorithm: }"
|
|
description "An algorithm involving chance or probability in determining the series of computational steps to be taken."
|
|
|
|
\end_inset
|
|
|
|
decisions about whether to erase each symbol by using the symbol's erasure
|
|
probability, allowing a maximum of 51 erasures.
|
|
\end_layout
|
|
|
|
\begin_layout Enumerate
|
|
Attempt errors-and-erasures decoding using the BM algorithm and the set
|
|
of erasures determined in step 2.
|
|
If the BM decoder produces a candidate codeword, go to step 5.
|
|
\end_layout
|
|
|
|
\begin_layout Enumerate
|
|
If BM decoding was not successful, go to step 2.
|
|
\end_layout
|
|
|
|
\begin_layout Enumerate
|
|
Calculate the hard-decision Hamming distance
|
|
\begin_inset Formula $X$
|
|
\end_inset
|
|
|
|
between the candidate codeword and the received symbols, along with the
|
|
corresponding soft distance
|
|
\begin_inset Formula $d_{s}$
|
|
\end_inset
|
|
|
|
and the quality metric
|
|
\begin_inset Formula $u$
|
|
\end_inset
|
|
|
|
.
|
|
|
|
\end_layout
|
|
|
|
\begin_layout Enumerate
|
|
If
|
|
\begin_inset Formula $u$
|
|
\end_inset
|
|
|
|
is the largest one encountered so far, preserve any previous value of
|
|
\begin_inset Formula $u_{1}$
|
|
\end_inset
|
|
|
|
by setting
|
|
\begin_inset Formula $u_{2}=u_{1}.$
|
|
\end_inset
|
|
|
|
Then set
|
|
\begin_inset Formula $u_{1}=u,$
|
|
\end_inset
|
|
|
|
|
|
\begin_inset Formula $d_{1}=d_{s},$
|
|
\end_inset
|
|
|
|
|
|
\begin_inset Formula $X_{1}=X,$
|
|
\end_inset
|
|
|
|
and save the codeword.
|
|
\end_layout
|
|
|
|
\begin_layout Enumerate
|
|
If
|
|
\begin_inset Formula $X_{1}<X_{0}$
|
|
\end_inset
|
|
|
|
and
|
|
\begin_inset Formula $d_{1}<D_{0}$
|
|
\end_inset
|
|
|
|
, go to step 11.
|
|
\end_layout
|
|
|
|
\begin_layout Enumerate
|
|
If the number of trials is less than the timeout limit
|
|
\begin_inset Formula $T,$
|
|
\end_inset
|
|
|
|
go to 2.
|
|
|
|
\begin_inset Formula $ $
|
|
\end_inset
|
|
|
|
|
|
\end_layout
|
|
|
|
\begin_layout Enumerate
|
|
If
|
|
\begin_inset Formula $d_{1}<D_{1}$
|
|
\end_inset
|
|
|
|
and
|
|
\begin_inset Formula $r=u_{2}/u_{1}<R_{1},$
|
|
\end_inset
|
|
|
|
go to step 11.
|
|
\end_layout
|
|
|
|
\begin_layout Enumerate
|
|
Otherwise, declare decoding failure and exit.
|
|
\end_layout
|
|
|
|
\begin_layout Enumerate
|
|
An acceptable codeword has been found.
|
|
Declare a successful decode and return the saved codeword.
|
|
\end_layout
|
|
|
|
\end_inset
|
|
|
|
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
Inspiration for the FT decoding algorithm came from a number of sources.
|
|
\begin_inset CommandInset citation
|
|
LatexCommand cite
|
|
key "lc2004"
|
|
|
|
\end_inset
|
|
|
|
|
|
\begin_inset ERT
|
|
status open
|
|
|
|
\begin_layout Plain Layout
|
|
|
|
|
|
\backslash
|
|
textsuperscript{,}
|
|
\end_layout
|
|
|
|
\end_inset
|
|
|
|
|
|
\begin_inset CommandInset citation
|
|
LatexCommand cite
|
|
key "lhmg2010"
|
|
|
|
\end_inset
|
|
|
|
|
|
\begin_inset ERT
|
|
status open
|
|
|
|
\begin_layout Plain Layout
|
|
|
|
|
|
\backslash
|
|
textsuperscript{,}
|
|
\end_layout
|
|
|
|
\end_inset
|
|
|
|
|
|
\begin_inset CommandInset citation
|
|
LatexCommand cite
|
|
key "lk2008"
|
|
|
|
\end_inset
|
|
|
|
After developing this algorithm, we became aware that our approach is conceptua
|
|
lly similar to a stochastic, erasures-only list decoding algorithm described
|
|
in another reference
|
|
\begin_inset CommandInset citation
|
|
LatexCommand cite
|
|
key "ls2009"
|
|
|
|
\end_inset
|
|
|
|
.
|
|
That algorithm is applied to higher-rate Reed-Solomon codes on a symmetric
|
|
channel using binary phase-shift keying (BPSK).
|
|
Our 64-ary input channel with 64-FSK modulation required us to develop
|
|
unique methods for assigning erasure probabilities and for defining acceptance
|
|
criteria to select the best codeword from the list of tested candidates.
|
|
|
|
\end_layout
|
|
|
|
\begin_layout Section
|
|
\begin_inset CommandInset label
|
|
LatexCommand label
|
|
name "sec:Hinted-Decoding"
|
|
|
|
\end_inset
|
|
|
|
Hinted Decoding
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
The FT algorithm is completely general.
|
|
With equal sensitivity it can recover any one of the
|
|
\begin_inset Formula $2^{72}\approx4.7\times10^{21}$
|
|
\end_inset
|
|
|
|
different messages that can be transmitted with the JT65 protocol.
|
|
In some circumstances it's easy to imagine a
|
|
\emph on
|
|
much
|
|
\emph default
|
|
smaller list of messages (say, a few thousand messages or less) that would
|
|
be among the most likely ones to be received.
|
|
One such favorable situation exists when making short ham-radio contacts
|
|
that exchange minimal information including callsigns, signal reports,
|
|
perhaps Maidenhead locators, and acknowledgments.
|
|
On the EME path or a VHF or UHF band with limited geographical coverage,
|
|
the most common received messages frequently originate from callsigns that
|
|
have been decoded before.
|
|
Saving a list of previously decoded callsigns and associated locators makes
|
|
it easy to generate a list of hypothetical messages and their corresponding
|
|
codewords at very little computational expense.
|
|
The resulting candidate codewords can be tested in almost the same way
|
|
as those generated by the probabilistic method described in Section
|
|
\begin_inset CommandInset ref
|
|
LatexCommand ref
|
|
reference "sec:The-decoding-algorithm"
|
|
|
|
\end_inset
|
|
|
|
.
|
|
We call this approach
|
|
\begin_inset Quotes eld
|
|
\end_inset
|
|
|
|
hinted decoding;
|
|
\begin_inset Quotes erd
|
|
\end_inset
|
|
|
|
it is sometimes referred to as the
|
|
\emph on
|
|
Deep Search
|
|
\emph default
|
|
algorithm.
|
|
In certain limited situations it can provide enhanced sensitivity for the
|
|
principal task of any decoder, namely to determine precisely what message
|
|
was sent.
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
For hinted decoding we again invoke a ratio threshold test, but in this
|
|
case we use it to answer a more limited question.
|
|
Over the full list of messages considered likely, we want to know whether
|
|
a suitable metric can distinguish with confidence between the one correct
|
|
codeword and all others in the generated list --- or, alternatively, to
|
|
determine that the correct codeword is
|
|
\emph on
|
|
not
|
|
\emph default
|
|
contained in the list.
|
|
We again find that the most effective metric involves a comparison of
|
|
\begin_inset Formula $u_{1}$
|
|
\end_inset
|
|
|
|
and
|
|
\begin_inset Formula $u_{2},$
|
|
\end_inset
|
|
|
|
the largest and second-largest values of total signal-plus-noise power
|
|
among all the tested codewords.
|
|
The criterion for comparison is chosen empirically to maximize the number
|
|
of correct decodes while ensuring that false decodes are rare.
|
|
Because tested candidate codewords are drawn from a list typically no longer
|
|
than a few thousand entries, rather than
|
|
\begin_inset Formula $2^{72},$
|
|
\end_inset
|
|
|
|
the limit can can be more relaxed than that used in the FT algorithm.
|
|
Thus, for the limited subset of messages suggested by previous experience
|
|
to be likely, hinted decodes can be obtained at lower signal levels than
|
|
required for the full universe of
|
|
\begin_inset Formula $2^{72}$
|
|
\end_inset
|
|
|
|
possible messages.
|
|
Pseudo-code for the hinted-decoding algorithm is presented as
|
|
\series bold
|
|
Algorithm 2
|
|
\series default
|
|
.
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
\begin_inset Float algorithm
|
|
wide false
|
|
sideways false
|
|
status open
|
|
|
|
\begin_layout Plain Layout
|
|
|
|
\end_layout
|
|
|
|
\begin_layout Plain Layout
|
|
\begin_inset Caption Standard
|
|
|
|
\begin_layout Plain Layout
|
|
Pseudo-code for hinted decoding
|
|
\end_layout
|
|
|
|
\end_inset
|
|
|
|
|
|
\end_layout
|
|
|
|
\begin_layout Enumerate
|
|
Generate a list of
|
|
\begin_inset Formula $L$
|
|
\end_inset
|
|
|
|
codewords considered likely to be received.
|
|
Set a pointer to the start of this list.
|
|
\end_layout
|
|
|
|
\begin_layout Enumerate
|
|
Fetch the next candidate codeword and calculate its metric
|
|
\begin_inset Formula $u.$
|
|
\end_inset
|
|
|
|
|
|
\end_layout
|
|
|
|
\begin_layout Enumerate
|
|
If
|
|
\begin_inset Formula $u$
|
|
\end_inset
|
|
|
|
is the largest metric encountered so far, preserve any previous value of
|
|
|
|
\begin_inset Formula $u_{1}$
|
|
\end_inset
|
|
|
|
by setting
|
|
\begin_inset Formula $u_{2}=u_{1}.$
|
|
\end_inset
|
|
|
|
Then set
|
|
\begin_inset Formula $u_{1}=u$
|
|
\end_inset
|
|
|
|
and save the codeword.
|
|
\end_layout
|
|
|
|
\begin_layout Enumerate
|
|
If the number of tested codewords is less than
|
|
\begin_inset Formula $L,$
|
|
\end_inset
|
|
|
|
go to step 2.
|
|
\end_layout
|
|
|
|
\begin_layout Enumerate
|
|
If
|
|
\begin_inset Formula $r=u_{2}/u_{1}<R_{2},$
|
|
\end_inset
|
|
|
|
go to step 7.
|
|
\end_layout
|
|
|
|
\begin_layout Enumerate
|
|
Otherwise, declare decoding failure and exit.
|
|
\end_layout
|
|
|
|
\begin_layout Enumerate
|
|
An acceptable codeword has been found.
|
|
Declare a successful result and return the codeword and the value
|
|
\begin_inset Formula $q=100\,(u_{1}-bu_{2})$
|
|
\end_inset
|
|
|
|
as a confidence indicator.
|
|
(By default we use the value
|
|
\begin_inset Formula $b=1.12$
|
|
\end_inset
|
|
|
|
for submode JT65A.)
|
|
\end_layout
|
|
|
|
\end_inset
|
|
|
|
|
|
\end_layout
|
|
|
|
\begin_layout Section
|
|
\begin_inset CommandInset label
|
|
LatexCommand label
|
|
name "sec:Theory,-Simulation,-and"
|
|
|
|
\end_inset
|
|
|
|
Decoder Performance Evaluation
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
Comparisons of decoding performance are usually presented in the professional
|
|
literature as plots of word error rate versus
|
|
\begin_inset Formula $E_{b}/N_{0}$
|
|
\end_inset
|
|
|
|
, the ratio of the energy collected per information bit to the one-sided
|
|
noise power spectral density.
|
|
For weak-signal amateur radio work, performance is more usefully presented
|
|
as the probability of successfully decoding a received word plotted against
|
|
|
|
\begin_inset Formula $\mathrm{SNR}{}_{2500}$
|
|
\end_inset
|
|
|
|
, the signal-to-noise ratio in a 2500 Hz reference bandwidth.
|
|
The relationship between
|
|
\begin_inset Formula $E_{b}/N_{0}$
|
|
\end_inset
|
|
|
|
and
|
|
\begin_inset Formula $\mathrm{SNR}{}_{2500}$
|
|
\end_inset
|
|
|
|
is described in Appendix
|
|
\begin_inset CommandInset ref
|
|
LatexCommand ref
|
|
reference "sec:Appendix:SNR"
|
|
|
|
\end_inset
|
|
|
|
.
|
|
Examples of both types of plot are included in the following discussion,
|
|
where we describe simulations carried out to compare performance of the
|
|
FT algorithm and hinted decoding with other algorithms and with theoretical
|
|
expectations.
|
|
We have also used simulations to establish suitable default values for
|
|
the acceptance parameters
|
|
\begin_inset Formula $X_{0},$
|
|
\end_inset
|
|
|
|
|
|
\begin_inset Formula $D_{0},$
|
|
\end_inset
|
|
|
|
|
|
\begin_inset Formula $D_{1},$
|
|
\end_inset
|
|
|
|
|
|
\begin_inset Formula $R_{1},$
|
|
\end_inset
|
|
|
|
and
|
|
\begin_inset Formula $R_{2}.$
|
|
\end_inset
|
|
|
|
|
|
\end_layout
|
|
|
|
\begin_layout Subsection
|
|
Simulated results on the AWGN channel
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
Results of simulations using the BM, KV, and FT decoding algorithms on the
|
|
JT65 code are presented in terms of word error rate versus
|
|
\begin_inset Formula $E_{b}/N_{0}$
|
|
\end_inset
|
|
|
|
in Figure
|
|
\begin_inset CommandInset ref
|
|
LatexCommand ref
|
|
reference "fig:bodide"
|
|
|
|
\end_inset
|
|
|
|
.
|
|
For these tests we generated at least 1000 signals at each signal-to-noise
|
|
ratio, assuming the additive white gaussian noise (AWGN) channel, and we
|
|
processed the data using each algorithm.
|
|
For word error rates less than 0.1 it was necessary to process 10,000 or
|
|
even 100,000 simulated signals in order to capture enough errors to make
|
|
the measurements statistically meaningful.
|
|
As a test of the fidelity of our numerical simulations, Figure
|
|
\begin_inset CommandInset ref
|
|
LatexCommand ref
|
|
reference "fig:bodide"
|
|
|
|
\end_inset
|
|
|
|
also shows results calculated from theoretical probability distributions
|
|
for comparison with the BM results.
|
|
The simulated BM results agree with theory to within about 0.1 dB.
|
|
The differences are caused by small errors in the estimates of time and
|
|
frequency offset of the received signal in the simulated data.
|
|
Such
|
|
\begin_inset Quotes eld
|
|
\end_inset
|
|
|
|
sync losses
|
|
\begin_inset Quotes erd
|
|
\end_inset
|
|
|
|
are not accounted for in the idealized theoretical results.
|
|
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
As expected, on the AWGN channel the soft-decision algorithms FT and KV
|
|
are about 2 dB better than the hard-decision BM algorithm.
|
|
In addition, FT has an edge over KV that increases from about 0.2 dB at
|
|
higher SNRs to nearly 0.5 dB at low SNR.
|
|
With timeout parameter
|
|
\begin_inset Formula $T=10^{5}$
|
|
\end_inset
|
|
|
|
execution time for FT is longer than that for the KV algorithm, but still
|
|
small enough to be fully practical on today's home computers.
|
|
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
\begin_inset Float figure
|
|
wide false
|
|
sideways false
|
|
status open
|
|
|
|
\begin_layout Plain Layout
|
|
\align center
|
|
\begin_inset Graphics
|
|
filename fig_bodide.pdf
|
|
|
|
\end_inset
|
|
|
|
|
|
\begin_inset Caption Standard
|
|
|
|
\begin_layout Plain Layout
|
|
\begin_inset CommandInset label
|
|
LatexCommand label
|
|
name "fig:bodide"
|
|
|
|
\end_inset
|
|
|
|
Word error rates as a function of
|
|
\begin_inset Formula $E_{b}/N_{0},$
|
|
\end_inset
|
|
|
|
the signal-to-noise ratio per information bit.
|
|
The curve labeled
|
|
\emph on
|
|
Theory
|
|
\emph default
|
|
shows a theoretical prediction for the hard-decision BM decoder.
|
|
Remaining curves represent simulation results on an AWGN channel for the
|
|
BM, KV, and FT decoders.
|
|
The KV algorithm was executed with complexity coefficient
|
|
\begin_inset Formula $\lambda=15$
|
|
\end_inset
|
|
|
|
, the most aggressive setting historically used in the
|
|
\emph on
|
|
WSJT
|
|
\emph default
|
|
programs.
|
|
The FT algorithm used timeout setting
|
|
\begin_inset Formula $T=10^{5}.$
|
|
\end_inset
|
|
|
|
|
|
\end_layout
|
|
|
|
\end_inset
|
|
|
|
|
|
\end_layout
|
|
|
|
\end_inset
|
|
|
|
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
Error-free transmission is important in commercial applications, so plots
|
|
like Figure
|
|
\begin_inset CommandInset ref
|
|
LatexCommand ref
|
|
reference "fig:bodide"
|
|
|
|
\end_inset
|
|
|
|
are often extended downward to error rates of
|
|
\begin_inset Formula $10^{-6}$
|
|
\end_inset
|
|
|
|
or even less.
|
|
The circumstances for minimal amateur-radio contacts are very different,
|
|
however.
|
|
Decoding failure rates of order 0.1 or higher may be perfectly acceptable:
|
|
they simply require repeat transmissions.
|
|
In such circumstances the essential information is more usefully presented
|
|
in a plot showing the percentage of transmissions copied correctly as a
|
|
function of signal-to-noise ratio.
|
|
Figure
|
|
\begin_inset CommandInset ref
|
|
LatexCommand ref
|
|
reference "fig:WER2"
|
|
|
|
\end_inset
|
|
|
|
shows the FT and KV results from Figure
|
|
\begin_inset CommandInset ref
|
|
LatexCommand ref
|
|
reference "fig:bodide"
|
|
|
|
\end_inset
|
|
|
|
in this format, along with additional FT results for
|
|
\begin_inset Formula $T=10^{4},\:10^{3},\:10^{2}$
|
|
\end_inset
|
|
|
|
and
|
|
\begin_inset Formula $10$
|
|
\end_inset
|
|
|
|
.
|
|
It's easy to see that the FT decoder produces more decodes than KV when
|
|
|
|
\begin_inset Formula $T\gtrsim3000$
|
|
\end_inset
|
|
|
|
.
|
|
As already noted in connection with Figure
|
|
\begin_inset CommandInset ref
|
|
LatexCommand ref
|
|
reference "fig:bodide"
|
|
|
|
\end_inset
|
|
|
|
, FT with
|
|
\begin_inset Formula $T=10^{5}$
|
|
\end_inset
|
|
|
|
has approximately
|
|
\begin_inset Formula $0.5$
|
|
\end_inset
|
|
|
|
dB gain over KV at low SNR.
|
|
It also provides very significant gains over the hard-decision BM decoder,
|
|
even when limited to very small
|
|
\begin_inset Formula $T$
|
|
\end_inset
|
|
|
|
.
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
\begin_inset Float figure
|
|
wide false
|
|
sideways false
|
|
status open
|
|
|
|
\begin_layout Plain Layout
|
|
\align center
|
|
\begin_inset Graphics
|
|
filename fig_wer2.pdf
|
|
lyxscale 120
|
|
|
|
\end_inset
|
|
|
|
|
|
\end_layout
|
|
|
|
\begin_layout Plain Layout
|
|
\begin_inset Caption Standard
|
|
|
|
\begin_layout Plain Layout
|
|
\begin_inset CommandInset label
|
|
LatexCommand label
|
|
name "fig:WER2"
|
|
|
|
\end_inset
|
|
|
|
Percent of JT65 messages copied as a function of
|
|
\begin_inset Formula $\mathrm{SNR}{}_{2500},$
|
|
\end_inset
|
|
|
|
assuming additive white gaussian noise and no fading.
|
|
Numbers adjacent to curves specify values of timeout parameter
|
|
\begin_inset Formula $T$
|
|
\end_inset
|
|
|
|
for the FT decoder.
|
|
Open circles and dotted line show results for the KV decoder with complexity
|
|
coefficient
|
|
\begin_inset Formula $\lambda=15$
|
|
\end_inset
|
|
|
|
.
|
|
Results for the BM algorithm are plotted with crosses and dashed line.
|
|
\end_layout
|
|
|
|
\end_inset
|
|
|
|
|
|
\end_layout
|
|
|
|
\end_inset
|
|
|
|
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
Parameter
|
|
\begin_inset Formula $T$
|
|
\end_inset
|
|
|
|
in the FT algorithm is the maximum number of symbol-erasure trials allowed
|
|
for a particular attempt at decoding a received word.
|
|
Most successful decodes take only a small fraction of the maximum allowed
|
|
number of trials.
|
|
Figure
|
|
\begin_inset CommandInset ref
|
|
LatexCommand ref
|
|
reference "fig:N_vs_X"
|
|
|
|
\end_inset
|
|
|
|
shows the number of stochastic erasure trials required to find the correct
|
|
codeword plotted as a function of
|
|
\begin_inset Formula $X,$
|
|
\end_inset
|
|
|
|
the number of hard-decision errors in the received word.
|
|
This test run used 1000 simulated transmissions at
|
|
\begin_inset Formula $\mathrm{SNR_{2500}}=-24$
|
|
\end_inset
|
|
|
|
dB, just slightly above the decoding threshold, with timeout parameter
|
|
|
|
\begin_inset Formula $T=10^{5}.$
|
|
\end_inset
|
|
|
|
No points are shown for
|
|
\begin_inset Formula $X\le25$
|
|
\end_inset
|
|
|
|
because all such words are successfully decoded by a single run of the
|
|
errors-only BM algorithm.
|
|
Figure
|
|
\begin_inset CommandInset ref
|
|
LatexCommand ref
|
|
reference "fig:N_vs_X"
|
|
|
|
\end_inset
|
|
|
|
shows that the FT algorithm decodes received words with as many as
|
|
\begin_inset Formula $X=43$
|
|
\end_inset
|
|
|
|
symbol errors.
|
|
It also shows that the average number of trials increases with the number
|
|
of errors in the received word.
|
|
The variability of decoding time also increases dramatically with the number
|
|
of errors in the received word.
|
|
These results provide insight into the mean and variance of execution time
|
|
for the FT algorithm, since execution time is roughly proportional to the
|
|
number of required erasure trials.
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
\begin_inset Float figure
|
|
wide false
|
|
sideways false
|
|
status open
|
|
|
|
\begin_layout Plain Layout
|
|
\align center
|
|
\begin_inset Graphics
|
|
filename fig_ntrials_vs_nhard.pdf
|
|
lyxscale 120
|
|
|
|
\end_inset
|
|
|
|
|
|
\end_layout
|
|
|
|
\begin_layout Plain Layout
|
|
\begin_inset Caption Standard
|
|
|
|
\begin_layout Plain Layout
|
|
\begin_inset CommandInset label
|
|
LatexCommand label
|
|
name "fig:N_vs_X"
|
|
|
|
\end_inset
|
|
|
|
Number of trials needed to decode a received word
|
|
\emph on
|
|
vs.
|
|
|
|
\emph default
|
|
Hamming distance
|
|
\begin_inset Formula $X$
|
|
\end_inset
|
|
|
|
between received word and decoded codeword.
|
|
We used 1000 simulated transmissions on an AWGN channel with no fading.
|
|
The signal-to-noise ratio was
|
|
\begin_inset Formula $\mathrm{SNR}{}_{2500}=-24$
|
|
\end_inset
|
|
|
|
dB, or
|
|
\begin_inset Formula $E_{b}/N_{o}=5.1$
|
|
\end_inset
|
|
|
|
dB.
|
|
|
|
\end_layout
|
|
|
|
\end_inset
|
|
|
|
|
|
\end_layout
|
|
|
|
\end_inset
|
|
|
|
|
|
\end_layout
|
|
|
|
\begin_layout Subsection
|
|
Simulated results for Rayleigh fading and hinted decoding
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
Figure
|
|
\begin_inset CommandInset ref
|
|
LatexCommand ref
|
|
reference "fig:Psuccess"
|
|
|
|
\end_inset
|
|
|
|
presents the results of simulations for signal-to-noise ratios ranging
|
|
from
|
|
\begin_inset Formula $-18$
|
|
\end_inset
|
|
|
|
to
|
|
\begin_inset Formula $-30$
|
|
\end_inset
|
|
|
|
dB, again using 1000 simulated signals for each plotted point.
|
|
We include three curves for each decoding algorithm: one for the AWGN channel
|
|
and no fading, and two more for simulated Doppler spreads of 0.2 and 1.0
|
|
Hz.
|
|
These simulated Doppler spreads are comparable to those encountered on
|
|
HF ionospheric paths and also for EME at VHF and the lower UHF bands.
|
|
For comparison we note that the JT65 symbol rate is about
|
|
\begin_inset ERT
|
|
status open
|
|
|
|
\begin_layout Plain Layout
|
|
|
|
|
|
\backslash
|
|
linebreak
|
|
\end_layout
|
|
|
|
\end_inset
|
|
|
|
2.7 Hz.
|
|
It is interesting to note that while Rayleigh fading severely degrades
|
|
the success rate of the BM decoder, the penalties are much smaller with
|
|
both FT and Deep Search (DS) decoding.
|
|
Simulated Doppler spreads of 0.2 Hz actually increased the FT decoding rate
|
|
slightly at SNRs close to the decoding threshold, presumably because with
|
|
the low-rate JT65 code, signal peaks provide the information needed for
|
|
good copy.
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
\begin_inset Float figure
|
|
wide false
|
|
sideways false
|
|
status open
|
|
|
|
\begin_layout Plain Layout
|
|
\align center
|
|
\begin_inset Graphics
|
|
filename fig_psuccess.pdf
|
|
lyxscale 90
|
|
|
|
\end_inset
|
|
|
|
|
|
\end_layout
|
|
|
|
\begin_layout Plain Layout
|
|
\begin_inset Caption Standard
|
|
|
|
\begin_layout Plain Layout
|
|
\begin_inset CommandInset label
|
|
LatexCommand label
|
|
name "fig:Psuccess"
|
|
|
|
\end_inset
|
|
|
|
Percentage of JT65 messages successfully decoded as a function of
|
|
\begin_inset Formula $\mathrm{SNR}{}_{2500}$
|
|
\end_inset
|
|
|
|
.
|
|
Results are shown for the hard-decision Berlekamp-Massey (BM) and soft-decision
|
|
Franke-Taylor (FT) decoding algorithms.
|
|
Curves labeled DS correspond to the hinted-decode (Deep Search) algorithm
|
|
with a codeword list of length
|
|
\begin_inset Formula $L\,$
|
|
\end_inset
|
|
|
|
= 5850.
|
|
Numbers adjacent to the curves are simulated Doppler spreads in Hz.
|
|
In the current version of
|
|
\emph on
|
|
WSJT-X
|
|
\emph default
|
|
the performance of the DS algorithm is limited by synchronization failures
|
|
when
|
|
\begin_inset Formula $SNR\lesssim-28\,\textrm{dB}$
|
|
\end_inset
|
|
|
|
.
|
|
|
|
\end_layout
|
|
|
|
\end_inset
|
|
|
|
|
|
\end_layout
|
|
|
|
\end_inset
|
|
|
|
|
|
\end_layout
|
|
|
|
\begin_layout Section
|
|
On-the-air Experience
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
The JT65 protocol has proven remarkably versatile.
|
|
Today the mode is used by thousands of amateurs around the world, communicating
|
|
over terrestrial paths on the MF and HF bands and over terrestrial as well
|
|
as EME paths from 50 MHz through 10 GHz.
|
|
Three
|
|
\emph on
|
|
submodes
|
|
\emph default
|
|
are in use, together accommodating a wide range of Doppler spreads and
|
|
potential instrumental instabilities.
|
|
All three submodes transmit the 63 data symbols interspersed with 63 synchroniz
|
|
ation symbols at keying rate 11025/4096 = 2.69 baud.
|
|
Submode JT65A uses tone spacing equal to the symbol rate; its total occupied
|
|
bandwidth is
|
|
\begin_inset Formula $66\times2.69=177.6$
|
|
\end_inset
|
|
|
|
Hz.
|
|
Submodes B and C have tone spacings and occupied bandwidths 2 and 4 times
|
|
larger.
|
|
In practice JT65A is generally used at 50 MHz and below, JT65B on 144 through
|
|
432 MHz, and JT65C at 1296 MHz and above.
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
Figure
|
|
\begin_inset CommandInset ref
|
|
LatexCommand ref
|
|
reference "fig:JT65B_EME"
|
|
|
|
\end_inset
|
|
|
|
shows portions of the main window and spectrogram displays from program
|
|
|
|
\emph on
|
|
WSJT-X,
|
|
\emph default
|
|
illustrating replies to a CQ from K1JT on 144.118 MHz using submode JT65B
|
|
on the EME path.
|
|
Speckled vertical lines on the waterfall at 1494 and 1515 Hz are the synchroniz
|
|
ing tones of signals from DL7UAE and SP6GWB.
|
|
Other visible speckles (barely above the noise) up to about 1870 Hz are
|
|
some of the data tones from these two stations.
|
|
Two lines of decoded text show that the estimated average signal strengths
|
|
were
|
|
\begin_inset Formula $\mathrm{SNR}{}_{2500}=-23$
|
|
\end_inset
|
|
|
|
and
|
|
\begin_inset Formula $-24$
|
|
\end_inset
|
|
|
|
dB, respectively, just one or two dB above decoding threshold for the FT
|
|
decoder.
|
|
Note that the two signals overlap throughout more than 90% of their occupied
|
|
bandwidths, yet both are decoded cleanly and without errors.
|
|
Such behavior is typical of the JT65 protocol.
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
\begin_inset Float figure
|
|
wide false
|
|
sideways false
|
|
status open
|
|
|
|
\begin_layout Plain Layout
|
|
\align center
|
|
\begin_inset Graphics
|
|
filename JT65B_EME.png
|
|
|
|
\end_inset
|
|
|
|
|
|
\end_layout
|
|
|
|
\begin_layout Plain Layout
|
|
\begin_inset Caption Standard
|
|
|
|
\begin_layout Plain Layout
|
|
\begin_inset CommandInset label
|
|
LatexCommand label
|
|
name "fig:JT65B_EME"
|
|
|
|
\end_inset
|
|
|
|
Examples of JT65B EME signals recorded at K1JT.
|
|
Numbers above the spectrogram are audio frequencies in Hz, and the spectrogram'
|
|
s vertical span is one minute of time.
|
|
The horizontal green bar on the frequency axis indicates the bandwidth
|
|
occupied by the second decoded signal, a reply from SP6GWB.
|
|
See text for additional details.
|
|
\end_layout
|
|
|
|
\end_inset
|
|
|
|
|
|
\end_layout
|
|
|
|
\end_inset
|
|
|
|
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
As another example, Figure
|
|
\begin_inset CommandInset ref
|
|
LatexCommand ref
|
|
reference "fig:spectrogram"
|
|
|
|
\end_inset
|
|
|
|
shows activity in submode JT65A during a single minute on the 20 m amateur
|
|
band.
|
|
At this time the band was crowded with overlapping signals.
|
|
With care you can count at least 19 distinct synchronizing tones (the speckled
|
|
vertical lines in the figure), and can see as many as four signals overlapping
|
|
in some places.
|
|
After signal processing to demodulate the signals and produce soft-symbol
|
|
data for the FT decoder, program
|
|
\emph on
|
|
WSJT-X
|
|
\emph default
|
|
extracts and decodes 21 error-free messages from this recorded data segment.
|
|
This result is achieved with a relatively small timeout parameter,
|
|
\begin_inset Formula $T=1000.$
|
|
\end_inset
|
|
|
|
For these results the decoder uses two successive sweeps over the spectrum.
|
|
The strongest signals (12 in this example) are sequentially decoded and
|
|
subtracted from the raw data after the first pass.
|
|
Another 9 signals are decoded in the second pass.
|
|
For comparison, the hard-decision BM decoder decodes only 12 messages from
|
|
this recording (9 in the first pass and 3 more in a second).
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
\begin_inset Float figure
|
|
wide false
|
|
sideways false
|
|
status open
|
|
|
|
\begin_layout Plain Layout
|
|
\align center
|
|
\begin_inset Graphics
|
|
filename fig_waterfall.png
|
|
scale 60
|
|
BoundingBox 0bp 0bp 1124bp 200bp
|
|
clip
|
|
|
|
\end_inset
|
|
|
|
|
|
\end_layout
|
|
|
|
\begin_layout Plain Layout
|
|
\begin_inset Caption Standard
|
|
|
|
\begin_layout Plain Layout
|
|
\begin_inset CommandInset label
|
|
LatexCommand label
|
|
name "fig:spectrogram"
|
|
|
|
\end_inset
|
|
|
|
Spectrogram from
|
|
\emph on
|
|
WSJT-X
|
|
\emph default
|
|
showing one minute of data collected under crowded band conditions on the
|
|
20 m band.
|
|
Numbers on the scale are frequencies (in Hz) above 14.076 MHz.
|
|
|
|
\end_layout
|
|
|
|
\end_inset
|
|
|
|
|
|
\end_layout
|
|
|
|
\begin_layout Plain Layout
|
|
|
|
\end_layout
|
|
|
|
\end_inset
|
|
|
|
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
Our implementation of the FT decoder, written in a combination of FORTRAN
|
|
and C, is freely available as open-source code
|
|
\begin_inset CommandInset citation
|
|
LatexCommand cite
|
|
key "wsjt_sourceforge"
|
|
|
|
\end_inset
|
|
|
|
.
|
|
For the Berlekamp-Massey part of the algorithm we use routines written
|
|
by Phil Karn, KA9Q
|
|
\begin_inset CommandInset citation
|
|
LatexCommand cite
|
|
key "karn"
|
|
|
|
\end_inset
|
|
|
|
, modified slightly so that the Reed-Solomon syndromes are computed only
|
|
once in our most time-consuming loop (steps 2 through 8,
|
|
\series bold
|
|
Algorithm 1
|
|
\series default
|
|
).
|
|
The FT algorithm has become an integral part of programs
|
|
\emph on
|
|
WSJT,
|
|
\emph default
|
|
|
|
\emph on
|
|
MAP65,
|
|
\emph default
|
|
and
|
|
\emph on
|
|
WSJT-X
|
|
\emph default
|
|
.
|
|
Improvement in sensitivity over the Kötter-Vardy decoder is small, only
|
|
a few tenths of a dB, but especially on the EME path such small advantages
|
|
are sometimes very important.
|
|
Perhaps even more essential, programs in the
|
|
\emph on
|
|
WSJT
|
|
\emph default
|
|
family are now entirely open source.
|
|
We no longer need to use the patented KV algorithm or the specially licensed
|
|
executable program
|
|
\family typewriter
|
|
kvasd[.exe]
|
|
\family default
|
|
.
|
|
\end_layout
|
|
|
|
\begin_layout Section
|
|
Acknowledgments
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
We thank G3WDG, G4WJS, KD9DSW, PY2SDR, SM5BSZ, VK7MO, and W3SZ for helpful
|
|
comments on an earlier version of this paper.
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
\begin_inset ERT
|
|
status open
|
|
|
|
\begin_layout Plain Layout
|
|
|
|
|
|
\backslash
|
|
newpage
|
|
\end_layout
|
|
|
|
\end_inset
|
|
|
|
|
|
\end_layout
|
|
|
|
\begin_layout Bibliography
|
|
\begin_inset CommandInset bibitem
|
|
LatexCommand bibitem
|
|
label "1"
|
|
key "jt65_protocol"
|
|
|
|
\end_inset
|
|
|
|
“The JT65 Communications Protocol”, J.
|
|
Taylor, K1JT,
|
|
\emph on
|
|
QEX
|
|
\emph default
|
|
, September-October 2005, pp.
|
|
3-12.
|
|
Available also at http://physics.princeton.edu/pulsar/K1JT/JT65.pdf.
|
|
\end_layout
|
|
|
|
\begin_layout Bibliography
|
|
\begin_inset CommandInset bibitem
|
|
LatexCommand bibitem
|
|
label "2"
|
|
key "kv2001"
|
|
|
|
\end_inset
|
|
|
|
“Algebraic soft-decision decoding of Reed-Solomon codes,” R.
|
|
Kötter and A.
|
|
Vardy,
|
|
\emph on
|
|
IEEE Transactions on Information Theory
|
|
\emph default
|
|
, Vol.
|
|
49, pp.
|
|
2809-2825, 2003.
|
|
\end_layout
|
|
|
|
\begin_layout Bibliography
|
|
\begin_inset CommandInset bibitem
|
|
LatexCommand bibitem
|
|
label "3"
|
|
key "wsjt"
|
|
|
|
\end_inset
|
|
|
|
|
|
\emph on
|
|
WSJT Home Page
|
|
\emph default
|
|
: http://www.physics.princeton.edu/pulsar/K1JT/.
|
|
\end_layout
|
|
|
|
\begin_layout Bibliography
|
|
\begin_inset CommandInset bibitem
|
|
LatexCommand bibitem
|
|
label "4"
|
|
key "lc2004"
|
|
|
|
\end_inset
|
|
|
|
|
|
\emph on
|
|
Error Control Coding, 2nd Edition
|
|
\emph default
|
|
, Shu Lin and Daniel J.
|
|
Costello, Pearson-Prentice Hall, 2004.
|
|
\end_layout
|
|
|
|
\begin_layout Bibliography
|
|
\begin_inset CommandInset bibitem
|
|
LatexCommand bibitem
|
|
label "5"
|
|
key "lhmg2010"
|
|
|
|
\end_inset
|
|
|
|
``Stochastic Chase Decoding of Reed-Solomon Codes'', Camille Leroux, Saied
|
|
Hemati, Shie Mannor, Warren J.
|
|
Gross,
|
|
\emph on
|
|
IEEE Communications Letters
|
|
\emph default
|
|
, Vol.
|
|
14, No.
|
|
9, pp.
|
|
863-865, 2010.
|
|
\end_layout
|
|
|
|
\begin_layout Bibliography
|
|
\begin_inset CommandInset bibitem
|
|
LatexCommand bibitem
|
|
label "6"
|
|
key "lk2008"
|
|
|
|
\end_inset
|
|
|
|
``Soft-Decision Decoding of Reed-Solomon Codes Using Successive Error-and-Erasur
|
|
e Decoding,'' Soo-Woong Lee and B.
|
|
V.
|
|
K.
|
|
Vijaya Kumar,
|
|
\emph on
|
|
IEEE
|
|
\begin_inset Quotes eld
|
|
\end_inset
|
|
|
|
GLOBECOM
|
|
\begin_inset Quotes erd
|
|
\end_inset
|
|
|
|
Proceedings,
|
|
\emph default
|
|
2008
|
|
\emph on
|
|
.
|
|
\end_layout
|
|
|
|
\begin_layout Bibliography
|
|
\begin_inset CommandInset bibitem
|
|
LatexCommand bibitem
|
|
label "7"
|
|
key "ls2009"
|
|
|
|
\end_inset
|
|
|
|
``Stochastic Erasure-Only List Decoding Algorithms for Reed-Solomon Codes,
|
|
\begin_inset Quotes erd
|
|
\end_inset
|
|
|
|
Chang-Ming Lee and Yu T.
|
|
Su,
|
|
\emph on
|
|
IEEE Signal Processing Letters,
|
|
\emph default
|
|
Vol.
|
|
16, pp.
|
|
691-694, 2009.
|
|
\end_layout
|
|
|
|
\begin_layout Bibliography
|
|
\begin_inset CommandInset bibitem
|
|
LatexCommand bibitem
|
|
label "8"
|
|
key "wsjt_sourceforge"
|
|
|
|
\end_inset
|
|
|
|
Source code for all programs in the
|
|
\emph on
|
|
WSJT
|
|
\emph default
|
|
project is stored in a Subversion repository at Sourceforge: https://sourceforg
|
|
e.net/projects/wsjt/
|
|
\end_layout
|
|
|
|
\begin_layout Bibliography
|
|
\begin_inset CommandInset bibitem
|
|
LatexCommand bibitem
|
|
label "9"
|
|
key "karn"
|
|
|
|
\end_inset
|
|
|
|
Errors-and erasures decoder for the Berlekamp-Massey algorithm written by
|
|
Phil Karn, KA9Q: http://www.ka9q.net/code/fec/
|
|
\begin_inset ERT
|
|
status open
|
|
|
|
\begin_layout Plain Layout
|
|
|
|
|
|
\backslash
|
|
newpage
|
|
\end_layout
|
|
|
|
\end_inset
|
|
|
|
|
|
\end_layout
|
|
|
|
\begin_layout Section
|
|
\start_of_appendix
|
|
\begin_inset CommandInset label
|
|
LatexCommand label
|
|
name "sec:Appendix:SNR"
|
|
|
|
\end_inset
|
|
|
|
Appendix: Signal to Noise Ratios
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
The signal to noise ratio in a bandwidth,
|
|
\begin_inset Formula $B$
|
|
\end_inset
|
|
|
|
, that is at least as large as the bandwidth occupied by the signal is:
|
|
\begin_inset Formula
|
|
\begin{equation}
|
|
\mathrm{SNR}_{B}=\frac{P_{s}}{N_{0}B}\label{eq:SNR}
|
|
\end{equation}
|
|
|
|
\end_inset
|
|
|
|
where
|
|
\begin_inset Formula $P_{s}$
|
|
\end_inset
|
|
|
|
is the average signal power (W),
|
|
\begin_inset Formula $N_{0}$
|
|
\end_inset
|
|
|
|
is one-sided noise power spectral density (W/Hz), and
|
|
\begin_inset Formula $B$
|
|
\end_inset
|
|
|
|
is the bandwidth in Hz.
|
|
In amateur radio applications, digital modes are often compared based on
|
|
the SNR defined in a 2.5 kHz reference bandwidth,
|
|
\begin_inset Formula $\mathrm{SNR}_{2500}$
|
|
\end_inset
|
|
|
|
.
|
|
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
In the professional literature, decoder performance is characterized in
|
|
terms of
|
|
\begin_inset Formula $E_{b}/N_{0}$
|
|
\end_inset
|
|
|
|
, the ratio of the energy collected per information bit,
|
|
\begin_inset Formula $E_{b}$
|
|
\end_inset
|
|
|
|
, to the one-sided noise power spectral density,
|
|
\begin_inset Formula $N_{0}$
|
|
\end_inset
|
|
|
|
.
|
|
Denote the duration of a channel symbol by
|
|
\begin_inset Formula $\tau_{s}$
|
|
\end_inset
|
|
|
|
(for JT65,
|
|
\begin_inset Formula $\tau_{s}=0.3715\,\mathrm{s}$
|
|
\end_inset
|
|
|
|
).
|
|
JT65 signals have constant envelope, so the average signal power is related
|
|
to the energy per symbol,
|
|
\begin_inset Formula $E_{s}$
|
|
\end_inset
|
|
|
|
, by
|
|
\begin_inset Formula
|
|
\begin{equation}
|
|
P_{s}=E_{s}/\tau_{s}.\label{eq:signal_power}
|
|
\end{equation}
|
|
|
|
\end_inset
|
|
|
|
The total energy in a received JT65 message consisting of
|
|
\begin_inset Formula $n=63$
|
|
\end_inset
|
|
|
|
channel symbols is
|
|
\begin_inset Formula $63E_{s}$
|
|
\end_inset
|
|
|
|
.
|
|
The energy collected for each of the 72 bits of information conveyed by
|
|
the message is then
|
|
\begin_inset Formula
|
|
\begin{equation}
|
|
E_{b}=\frac{63E_{s}}{72}=0.875E_{s.}\label{eq:Eb_Es}
|
|
\end{equation}
|
|
|
|
\end_inset
|
|
|
|
Using equations (
|
|
\begin_inset CommandInset ref
|
|
LatexCommand ref
|
|
reference "eq:SNR"
|
|
|
|
\end_inset
|
|
|
|
)-(
|
|
\begin_inset CommandInset ref
|
|
LatexCommand ref
|
|
reference "eq:Eb_Es"
|
|
|
|
\end_inset
|
|
|
|
),
|
|
\begin_inset Formula $\mathrm{SNR}_{2500}$
|
|
\end_inset
|
|
|
|
can be written in terms of
|
|
\begin_inset Formula $E_{b}/N_{o}$
|
|
\end_inset
|
|
|
|
:
|
|
\begin_inset Formula
|
|
\begin{equation}
|
|
\mathrm{SNR}_{2500}=1.23\times10^{-3}\frac{E_{b}}{N_{0}}.\label{eq:SNR2500}
|
|
\end{equation}
|
|
|
|
\end_inset
|
|
|
|
If all quantities are expressed in dB, then:
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
\begin_inset Formula
|
|
\begin{equation}
|
|
\mathrm{SNR}_{2500}=(E_{b}/N_{0})_{\mathrm{dB}}-29.1\,\mathrm{dB}=(E_{s}/N_{0})_{\mathrm{dB}}-29.7\,\mathrm{dB}.\label{eq:SNR_all_types}
|
|
\end{equation}
|
|
|
|
\end_inset
|
|
|
|
|
|
\begin_inset ERT
|
|
status open
|
|
|
|
\begin_layout Plain Layout
|
|
|
|
|
|
\backslash
|
|
newpage
|
|
\end_layout
|
|
|
|
\end_inset
|
|
|
|
|
|
\begin_inset Box Doublebox
|
|
position "t"
|
|
hor_pos "c"
|
|
has_inner_box 1
|
|
inner_pos "t"
|
|
use_parbox 0
|
|
use_makebox 0
|
|
width "100col%"
|
|
special "none"
|
|
height "1in"
|
|
height_special "totalheight"
|
|
status open
|
|
|
|
\begin_layout Paragraph
|
|
|
|
\size large
|
|
Sidebar: JT65 Message Processing
|
|
\end_layout
|
|
|
|
\begin_layout Enumerate
|
|
User A enters or selects message consistent with formatting rules of JT65.
|
|
\end_layout
|
|
|
|
\begin_layout Enumerate
|
|
Transmitting software at A: compress message into 12 six-bit symbols, then
|
|
add 51 six-bit parity symbols.
|
|
\end_layout
|
|
|
|
\begin_layout Enumerate
|
|
Intersperse 63 synchronizing symbols among the 63 information-carrying symbols.
|
|
\end_layout
|
|
|
|
\begin_layout Enumerate
|
|
Start transmission 1 s into a UTC minute.
|
|
Transmit each symbol value at a distinct frequency.
|
|
\end_layout
|
|
|
|
\begin_layout Enumerate
|
|
Signal propagates from A to B, arriving much weaker and corrupted by noise,
|
|
fading, and Doppler spread.
|
|
\end_layout
|
|
|
|
\begin_layout Enumerate
|
|
Receiving software at B: remove impulsive noise; detect synchronizing signal,
|
|
measure its frequency and time offset.
|
|
|
|
\end_layout
|
|
|
|
\begin_layout Enumerate
|
|
Shift spectrum to put sync tone at zero frequency, correcting for any measured
|
|
drift.
|
|
\end_layout
|
|
|
|
\begin_layout Enumerate
|
|
Compute binned power spectra
|
|
\begin_inset Formula $S(i,j)$
|
|
\end_inset
|
|
|
|
for all information symbols.
|
|
(Index
|
|
\begin_inset Formula $i$
|
|
\end_inset
|
|
|
|
runs over 64 possible symbol values, index
|
|
\begin_inset Formula $j$
|
|
\end_inset
|
|
|
|
over 63 symbol numbers.)
|
|
\end_layout
|
|
|
|
\begin_layout Enumerate
|
|
Remove any possible spurs (signal appearing at same
|
|
\begin_inset Formula $i$
|
|
\end_inset
|
|
|
|
for all
|
|
\begin_inset Formula $j$
|
|
\end_inset
|
|
|
|
).
|
|
\end_layout
|
|
|
|
\begin_layout Enumerate
|
|
Apply Algorithm 1, the FT algorithm.
|
|
|
|
\end_layout
|
|
|
|
\begin_layout Enumerate
|
|
Optional: if FT decoding was unsuccessful apply Algorithm 2, hinted decoding.
|
|
\end_layout
|
|
|
|
\begin_layout Enumerate
|
|
Display decoded message for User B.
|
|
\end_layout
|
|
|
|
\end_inset
|
|
|
|
|
|
\begin_inset ERT
|
|
status open
|
|
|
|
\begin_layout Plain Layout
|
|
|
|
|
|
\backslash
|
|
newpage
|
|
\end_layout
|
|
|
|
\end_inset
|
|
|
|
|
|
\end_layout
|
|
|
|
\begin_layout Standard
|
|
\begin_inset CommandInset nomencl_print
|
|
LatexCommand printnomenclature
|
|
set_width "auto"
|
|
|
|
\end_inset
|
|
|
|
|
|
\end_layout
|
|
|
|
\end_body
|
|
\end_document
|