Abstract
In this paper, we present three novel burst error correcting algorithms for an (n,k,r = n - k) Reed-Solomon code. The algorithmic complexities are of the same order for erasure-and-error decoding, O(rn), moreover, their hardware implementation shares the elements of the Blahut erasure-and-error decoding. In contrast, all existing single-burst error correcting algorithms, which are equivalent to the proposed first algorithm, have cubic complexity, O(r <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</sup> n). The first algorithm corrects the shortest single-burst with length f <r. The algorithm follows the key characterization that the starting locations of all candidate bursts can be purely determined by the roots of a polynomial which is a linear function of syndromes, and moreover, the shortest burst is associated with the longest sequence of consecutive roots. The algorithmic miscorrection rate is bounded by nq <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">f-r</sup> , where q denotes the field size. The second algorithm extends the first one to correct the shortest burst with length f < r-2 with up to a random error. The algorithmic miscorrection rate is bounded by n <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</sup> q <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">f+1-r</sup> . The third algorithm aims to correct the shortest burst with length f < r -2¿ with up to ¿ random errors, where ¿ is a given small number. The algorithmic miscorrection rate is bounded by n <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">¿+1</sup> q <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">-(r-f-¿)</sup> while its defect rate is bounded by nq <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">-(r-2¿-f)¿</sup> (whereas no defect occurs to the proposed first and second algorithms).
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.