sun krishna ii

18
18 1EEE TRANSACTIONS ON CIRCUITS AND SYSTEMS -11: ANALOG AN D DIGITAL SIGNAL PROCESSING. VOL. 39 . N O. I , JANUARY 1992 A Coding Theory Approach to Error Control in Redundan t Residue Number Systems - Part 11 : Multiple Error Detection and Correction Jenn-Dong Su n and Hari Krishna Abstract-In this work, we study and extend the coding theory approach to error control in redundant residue number systems (RRNS). We derive new computationally efficient algo- rithms for correcting multiple errors, single-burst error, and detecting multiple errors. These algorithms reduce the computa- tional complexity of the previously kno wn algorithms by at least an order of magnitude. Index terms: Algorithms, multiple errors detection and cor- rection, burst residue errors, redundant residue number systems, coding theory, mixed radix conversion. I. INTRODUCTION MONG the earliest researchers, Szabo and Tanaka [ I ] A ave briefly sketched a method for single-error detec- tion or single-error correction for use with a residue number system (RNS). However, the error correction procedure given in [l ] is computationally inefficient. Also, it appears to be quite complicated fo r implementation. Watson and Hastings [2] have constructed a redundant residue number system (RRNS) to detect or correct single errors. However, their method for error correction needs a correction table, which may require large memory space, thereby making it impracti- cal for the correction of more than single residue errors. Therefore, multiple-residue-error correction has not been investigated by them. Mandelbaum [3] showed how single- error correction can be accomplished in an RRNS code and established that two redundant moduli with redundancy less than the redundancy in [2] are necessary for single residue digit error correction. Later, necessary and sufficient condi- tions for minimal redundancy allowing the correction of the whole class of single residue errors were derived by Barsi and Maestrini [4], who also developed the concept of an RNS product code (31, a concept that was earlier suggested by Mandelbaum. Yau and Liu [6] designed two error-correction algorithms, one for single residue-error correction and the other for burst residue-error correction. Basically, the method of Yau and Liu is Watson’s method with the error-correcting Manuscript received December 4, 1990: revised July 3 1 , 1991. The work of J.-D. Su n was supported by a fellowahip from Chung-Shan Institute of Science and Technology, ROC. This paper was recommended by Associate Editor E. J. Coyle. The authors are with the Department of Electrical and Computer Engi- neering, Syracuse University, Syracuse, NY 13244.1240. IEEE Log Number 9104716. table replaced by appropriate computations. Consequently, their implementation needs a memory space that is much smaller than that required in [2]. Ramachandran [7] proposed a method to correct single errors that establishes a trade-off between computational complexity and extra redundant mod- uli. A number of papers by Jenkins and his associates [8]-[ 111 applied mixed radix conversion (MRC) to digital filters and residue number error checkers. Su and Lo [ 121 have used the redundant digits of MRC as the entries to construct a lookup table for single residue-error correction. In our previous paper [ 141, we developed a coding theory approach to error control in RRNS. The concepts of Ham- ming weight, minimum distance, weight distribution, and error detection and correction capabilities in RRNS were introduced. The necessary and sufficient conditions for the desired error control capability were derived from the mini- mum distance point of view. A special case generated the maximum distance separable (MDS) RRNS. A computation- ally efficient procedure was described for correcting single residue error. In this paper, we will extend the theory and present new procedures for simultaneously correcting single error and detecting multiple errors, and simultaneously correcting dou- ble errors and detecting multiple errors. In addition, we present a procedure for correcting a single-burst error. This paper consists of eight sections. In Section 1 1 , we cover the definitions and basic coding theory for RRNS. In Section 111, we generalize the property of consistency check- ing for RRNS. Three computationally efficient procedures for i ) simultaneously correcting single error and detecting m ulti- ple errors, ii ) simultaneously correcting double errors and detecting multiple errors, and iii) correcting single-burst er- ror, are presented in Sections IV. V, and VI, respectively. In Section VII, we extend the previous algorithms in [4] and [9] for multiple-error correction and detection. Finally, we dis- cuss and compare the various results in Section VIII. For reasons explained in 1141, we focus exclusively on MDS- RRNS in this paper. 11. DEFINITIONS N D BASIC CODINGHEORY OR RRNS Le t { r n , mz,. . , m k } be a set of k positive relatively prime integers called nonredundant moduli and let their 1057-7130,9?$03.00 1992 IEEE

Upload: avik-sengupta

Post on 08-Apr-2018

218 views

Category:

Documents


0 download

TRANSCRIPT

8/6/2019 Sun Krishna II

http://slidepdf.com/reader/full/sun-krishna-ii 1/17

18 1EEE TRANSACTIONS O N CIRCUITS AND SYSTEMS -11: ANALOG AN D DIGITAL SIGNAL PROCESSING. VOL. 39 . N O. I , JANUARY 1992

A Coding Theory Approach to Error Control

in Redundant Residue Number Systems-

Part 11: Multiple Error Detection

and CorrectionJenn-Dong Sun a n d H a r i K r i s h n a

Abstract-In this work, we study and extend the codingtheory approach to error control in redundant residue numbersystems (RRNS). We derive new computationally efficient algo-rithms for correcting multiple errors, single-burst error, anddetecting multiple errors. These algorithms reduce the computa-tional complexity of the previously kno wn algorithms by at leastan order of magnitude.

Index terms: Algorithms, multiple errors detection and cor-rection, burst residue errors, redundant residue number systems,coding theory, mixed radix conversion.

I. INTRODUCTION

MONG the earliest researchers, Szabo and Tanaka [ I ]A ave briefly sketched a method for single-error detec-

tion or single-error correction for use with a residue number

system (RNS). However, the error correction procedure given

in [ l ] is computationally inefficient. A lso, it appears to be

quite complicated fo r implementation. Watson and Hastings

[2] have constructed a redundant residue number system

(RRNS) to detect or correct single errors. However, their

method for error correction needs a correction table, which

may require large memory space, thereby making it impracti-

cal for the correction of more than single residue errors.

Therefore, multiple-residue-error correction has not been

investigated by them. Mandelbaum [3] showed how single-error correction can be accomplished in an RRNS code and

established that two redundant moduli with redundancy less

than the redundancy in [2] are necessary for single residue

digit error correction. Later, necessary and sufficient condi-

tions for minimal redundancy allowing the correction of the

whole class of single residue errors were derived by Barsi

and Maestrini [4], who a lso developed the concept of an RN S

product code (31, a concept that was earlier suggested by

Mandelbaum. Yau and Liu [6] designed two error-correction

algorithms, one for single residue-error correction and the

other for burst residue-error correction . Basically, the method

of Yau and Liu is Watson’s method with the error-correcting

Manuscript received December 4, 1990: revised July 3 1 , 1991. The work

of J . - D . Su n was supported by a fellowahip from Chung-Shan Insti tute ofScience and Technology, ROC. This paper was recommended by AssociateEditor E. J. Coyle.

The authors are with the Department of Electrical and Computer Engi-neering, Syracuse University, Syracuse, NY 13244.1240.

IEEE Log Number 9104716.

table replaced by appropriate computations. Consequently,

their implementation needs a memory space that is much

smaller than that required in [2]. Ramachandran [7] proposed

a method to correct single errors that establishes a trade-off

between computational complexity and extra redundant mod-

uli. A number of papers by Jenkins and his associates [8]-[ 111

applied mixed radix conversion (MRC) to digital filters and

residue number error checkers. Su and Lo [ 121 have used the

redundant digits of MRC as the entries to construct a lookup

table for single residue-error correction.In our previous paper [ 141, we developed a coding theory

approach to error control in RRNS. The concepts of Ham-

ming weight, minimum distance, weight distribution, and

error detection and correction capabilities in RRNS were

introduced. The necessary and sufficient conditions for the

desired error control capability were derived from the mini-

mum distance point of view. A special case generated the

maximum distance separable (MDS) RRNS. A computation-

ally efficient procedure was described for correcting single

residue error.

In this paper, we will extend the theory and present new

procedures for simultaneously correcting single error and

detecting multiple errors, and simultaneously correcting dou-

ble errors and detecting multiple errors. In addition, wepresent a procedure for correcting a single-burst error.

This paper consists of eight sections. In Section 11, we

cover the definitions and basic coding theory for RRNS. In

Section 111, we generalize the property of consistency check-

ing for RR NS. T hree computationally efficient procedures for

i ) simultaneously correcting single error and detecting m ulti-

ple errors, ii ) simultaneously correcting double errors and

detecting multiple errors, and i i i ) correcting single-burst er-

ror, are presented in Sections IV. V, and VI, respectively. In

Section VII, we extend the previous algorithms in [4] and [9]

for multiple-error correction and detection. Finally, we dis-

cuss and compare the various results in Section VIII. For

reasons explained in 1141, we focus exclusively on MDS-

RRNS in this paper.

11. D E F I N I T I O N SN D BASICC O D I N GHEORYOR RRNS

Let { r n , m z , . ., m k } be a set of k positive relatively

prime integers called nonredundant moduli and let their

1057-7130,9?$03.00 1992 IEEE

8/6/2019 Sun Krishna II

http://slidepdf.com/reader/full/sun-krishna-ii 2/17

SUN AND KRISHNA: CODING THEORY APPROACH-PAKT 11 19

product be

Any integer X n the range [0, M ) can be uniquely repre-

sented by a k-tuple x = [x,, 2,. , x,],where

x,= X m o d m , ) .( 2 )

The integer x,, alled the ith residue digit, is the least

non-negative remainder obtained upon dividing X by m , .

The set of k-tuples and the interpretation function assigning

to each k-tuple an integer in the range [0, M ) , and vice

versa, define the residue number system (R NS) of moduli

m,, 2 , a , m k . From the Chinese remainder theorem

(CRT), for any given k-tuple [x,, 2,. ., x,]. where 0 5

x,< m,, there exists one and only one integer X such that

0 5 X < M and x,3 X mod m,). The numerical value of

X s computed using

k

I = I(3)= n x ,7 ' ,M, (mod M )

whereM

m iM, = - (4)

7 ; M i = 1 ( mo d m i ) . ( 5 )

For erro r control (both correction and d etection are included),

we are concerned with the redundant residue number system

(RRNS) obtained by appending n - k additional moduli,

m k f , , m k + Z , * m,, called the redundant moduli, to theRNS to form an RRNS of n positive pairwise relatively

prime moduli. The product n:= ,+ ,m, s denoted by M,. An

integer X in the range [0, M ) s represented as an n-tuple.

x = [x,, 2; . , x k , xk+ * ., x,], orresponding to nmoduli. The integers in the range [0, M ) n the RRNS are

called legitimate integers and the corresponding n-tuples arecalled legitimate, while the n-tuples associated with the

integers in the range [ M , MM,) are called illegitimate. The

integers in the range [ M , MM,) are defined as the illegiti-

mate numbers. In [14], we define the RRNS as an ( n , )semilinear code L?, as its codevectors satisfy the property of

linearity under certain appropriately predefined conditions.

All the legitimate numbers are valid, and the corresponding

residue vectors ar e said to constitute the k-dimensional code

space. Note that all the n-tuple residue representations form

an n-dimensional vector space. Every residue representation

in the code space is a codevector that can be divided into two

parts; the first k residue digits corresponding to the k

nonredundant moduli are called the information digits, and

the remaining n - k residue digits corresponding to the

n - k redundant moduli are called the parity digits.Some definitions and coding theorems in the RRNS [I41

will now be given in order to make this paper self-contained.

Definit ion 1: The Ha mm ing weight o fa vector x , wt( ) .

in an RNS is defined as the number of nonzero components

of x.

Definition 2: The H am min g dis tanc e between two code-

vectors xi and x i , d ( x , , x i) s the number of places in

which x i an d xi differ.

Definit ion 3: The mi n i mum d i s t ance d of the RRNS is

defined as

d = m i n { d ( x , , x i ) : x i , x j € L ? ,x i # x i } . (6)

For an RRNS code, the minimum distance d is the same asthe Hamming weight of the codevector in fl having the

smallest positive Hamming weight,

d = m i n { w t ( x ) : X E Q , x # O } . (7 )

Theorem I : The minimum distance of an RRNS code is d

if and only if the product of redundant moduli satisfies thefollowing relation:

For MDS-RRNS, d - 1 = n - k , and the moduli satisfy

M , = max{HYL, 'm, ,}, where 1I,I.Theorem 2: The error detecting capability, I , of an RRNS

Q is d - 1.

Theorem 3: The error correcting capability, t , of an

RRNS Q i s [ ( d - 1/2)], where [a ] denotes the largest

integer less than or equal to a .

Theorem 4: An RRNS is capable of correcting h or fewer

errors and simultaneously detecting /3 (/ 3 > h) or fewer

errors if , d 2 h + p + 1.

It will be seen that for an (n , k ) MDS-RRNS code, any

single or double-residue errors can be corrected, and /3 or

fewe r errors can be d etected if the RR NS satisfies the follow-

ing two conditions: 1) (Theorem 4 ) d - 1 = n - k = h + /3where h = 1 or 2 and /3 > A; nd 2 )

min {m, . ,mr ,} > m ax { 2 m , , m , , - m , , - mi l }

where k < r l , rzI an d 1 5 i , , i , 5 k. It is worthwhile

t o note here that the condition in 2) above is a sufficientcondition.

111.CONSISTENCYHECKINGOR RRNS

For an ( n , k ) MDS-RRNS code. assume that there are can d g errors (c + g 5 p ) in the information and parity

digits, respectively. Then the received residue vector can be

represented as

y u y = [ Y l , Y ? " " ? Yh-9 y,+[,'*',Yn]

y , = x,, r i s n , i # i a , jz,, = l , , . . . , c ,

v = 1 , 2 ; . . , g

Y .? = x,,, e , ,, (mod mi , , ) , 0 < e,,b< m,,??

l ~ i ~ ~ s k , a =. 2 . .. c

y,,, = xJ, ej l (mod m,&,),< e J J m,", + 1 I uI ,

(9)= I , 2 ; . . , g

where i , , i2 ; . ., ,. are the positions of errors in the infor-

mation digits, the corresponding error values being e,,,

8/6/2019 Sun Krishna II

http://slidepdf.com/reader/full/sun-krishna-ii 3/17

20 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS-11: ANALOG AN D DIGITAL SIGNAL PROCESSING, VOL.. 39, N O . I , JANUARY 1992

e;*, a , eic espectively; and j , , j , , . . . , are the positionsof errors in the parity, the corresponding error values being

number Y can be represented as

and

c

(mod mk+,.), + r # j ,,,, e,*,-. . . ejs, respectively. The altered information A , =

o , . . . , ~ , lc , , . . . , ~ ] (11) where r = 1 , 2 ; . * , n - k , an d v = 1, 2 ; * * ,g.

A fundamental property of the syndrome digits is stated in

where the following theorem.

Theorem 5: Under the assumption that no more than 0residues are in error, for the RRNS with d = h + /3 + 1

( h< 0) one of the following four cases occurs.

Case I : If all the syndromes A I , . , A n - are zero, then

no residue is in error, and vice versa,

For the following cases, let p be the number of nonzero

syndromes.

X - [ X I , X , , " ' > Xk]

E tf [ O ; * e , 0, e,, , 0; * * ,0, e , > ,0 ; * a , 0 , elc, , . . 0 ] .

Since E = 0 (mod m,)or all i # i,, Q! = 1, 2; * a , c, it is

a

an d m,'. herefore, E is an integer of the type

Of all information except m,l , m ~ z , ''

M

mi,miz mjcE = e'

Case 2: If p I , then exactly p corresponding parity

Case 3: If X + 1 I 5 0, then more than h residue

digits are in error, and all other residue digits are correct.

( 12 ) digits are in error .3 ia(mod mi=)

Case 4: If p + 1 I I - k , then at least one of the

w h e r e 0 < e' < m ;,mi2 . . . m ; Based on [ y l , information digits is in error.

y,, . . , yk ], and the base extension (BEX) operation [2], the

purpose of which is to avoid processing large valued inte-

gers, the parity digits are recomputed to get

J ' L + r = Y(mod m k + r ) 3 = 3 2 * * * 3 n - k . ( I 3 )

proof: The Proofs of Cases 1, 2, and 4 are given in [61

and [141. Therefore, they are omitted here. For Case 3, since

k correct information residues uniquely determine the correct

redundant residues, it is clear that if h + 1 I 5 3 and all

the information residues are correct, then more than X parity-

residues are in error. Now, suppose that c information

residues are in error. We have c 2 1, i.e., at least onee define the test quantities A, called the synd romes as

A,. = yi+,. - y,+,.(mod mk+,), = 1 , 2 ; . . , n - k . information residue is in error. Define A> = yi+,. -

(14)

Since both X an d E in (10) are less than M , we consider

x,+,.(mod mk+,).Then, f rom (9) and ( l l ) , we have

X t t [ X I > ~ , ' ' ' ~k ? k + l ' " ' ? X n J

rtt Y , , ' 2 , " ' , Y k , Y ; + , ~ ' . * > Y ~ J

the following two cases.i) X + E < M . In this case, F - x ~ [ o ; . . , o , ~ , , , o ; . . , o , ~ , ~ , o ; . . , o ,- M e l C , 0 , - . . , 0 ,',, A ; ; . . , A ' , - , ] .

Y = X + E = X + e ' v (15) It is obvious that if the received redundant residue digiLyk+,.

is erroneous, i .e. , y k + ,# x k + , . , hen A > # A r . For Y > X

(the case for r < X can be analyzed in an analogous man-

ner), since M > r - X , from (7) we know that at least

(16) d - c = X + P + l - c o f A ' , , A ' , ; * . , A ' , - , a r e n o n z e r o .Therefore, we have the following three assertions.

1) If at most /3 - c redundant residues are in error, then

at least h + /3 + 1 - c - ( p - e ) = h + 1 syndromes

are nonzero.

2) If at most h + 1 - c redundant residues are in error,

then at least /3 syndromes are nonzero.

3) If at most h - c redundant residues are in error, thenat least + 1 syndromes are nonzero.

na=lm,,

an d

M

L l m r ,

M

A,. e- c (mod m k + r ) , + # j y

A,. e'- - e,+,.(mod rnk + , . ) 7 k + r = J , (17)%= 1 m, ,

where r = 1 , 2 ; * * , n - k , an d Y = 1, 2 ; * * , g .

ii) M 5 X + E < 2 M . In this case,

- MY = X + E - M = X + ? - M

k = l m f n Now, for Case 3, if h + 1 to p syndromes are nonzero

contradiction with the assertion 3). This gives the proof for

Case 3. This proves the theorem.

c and no more than h residue digits are in error, then there is a

(18)' - n m , ,

8/6/2019 Sun Krishna II

http://slidepdf.com/reader/full/sun-krishna-ii 4/17

S U N A N D KRISHNA: CODING THEORY AP P ROACH- P ART 11 21

If Case 2 of Theorem 5 takes place, the new parity digit

y i + r s the correct value of the erroneous parity digit y k + r .

If Case 4 of Theorem 5 takes place, a procedure to determine

error locations and error values for singleldouble errors is

described in the following sections. This procedure is based

on an efficient search and computation of the error location

and

M

m j

A , E (e?,.) - m,) -(mod rnk+ ' ) , r = 1 , 2 , . . , n - k

( 2 6 )

and their values from the given set of syndromes for the

specified error correction/detection capability of the code.This procedure will give rise to a unique solution if and only

if there is a one-to-one correspondence between the errors

that take place and the associated syndromes. In this regard,

necessary and sufficient conditions (as well as simplified

sufficient conditions) are described, which the moduli consti-

tuting the RRNS must satisfy for this procedure to work. In

the following sections, these conditions are described for the

specific case being analyzed. One of the reviewers presented

a proof of the sufficient condition for the above mentioned

to obtain the values e:"" and where r = 1 , 2 , . ., n

- k . Compare to check if the solutions to ( 2 5 ) or (26) ar e

,:2.2) = . . = ,!,n - k l . If either of the two conditions is

satisfied, for J = I, then the Ith information digit is declared

to be in error, the value of the error e, = e ( M / m , ) ( m o d

e, , , a n de = ,I) if e(2.1) = ( 2 . 2 ) = . . . = e f . n - k ) . The correct

value of the Ith residue digit is ( y ,- e,) mod m, , and y is

decoded to the codevector f , where

e(I.1)= (1.21 = . . . = e y l r e(2.11 =e, J

m,), where e = , if e:l.l) = (1.2) = . . = e ( 1 3 n - k ) .

J el

-,

x, = y J , = 1 , 2 ; . . , n , j # 1 (27)

(28)

one-to-one correspondence for the general case of h random

error co rrection and /3 random error detection in the review.

This proof is included in Appendix A. -,x,= y, - e , (mod m, ) .

IV. A PROCEDUREOR SINGLE-ERRORORRECTI ONND

MULTIPLE-ERRORETECTIONd = h + + 1 , h = 1 ,P > A)

By Theorem 4, the RRNS with d = h + /3 + 1 , h = 1 ,

an d fi > h can simultaneously correct single residue error

and detect P ( P = d - 2 ) errors. Assume that only the pth

information digit is in error; then ( 1 5 ) - ( 2 0 ) become the

following.

i) X + E < M . In this case,

- MY = X + e'-

m,

and

M

mPA e'-( m o d m , + , ) , r = 1 , 2 ; - . , n - k . (22)

ii ) M 5 X + E < 2 M . In this case,

It is clear from (21), ( 2 2 ) , and (25) that if one error takes

place in the pth information digit such that X + E < M ,

and I = p. Similarly, if one error takes place in the pth

information digit such that M I + E < 2 M , then for

e,from (23), (24), and ( 2 6 ) . However , it remains to be shown

that if the following two cases occur: 1) only one error takes

place in the pth information digit and j # p ; and 2 ) more

than one but less than d - 1 errors take place, then at leasttwo of {e:'.r); = 1, 2 ; - . , - k } and at least two of

{ r = 1, 2 ; * . n - k } are unequal, i .e. , (25) and (26)do not give consistent solutions. Under an additional con-

straint on the form of the moduli, the result is established in

the following theorem.

Theorem 6: If the moduli of an ( n , k ) RRNS code, are

such that there do not exist integers n,, n,; 0 I , < m,,

0 I c < M , = n:= m, e , 1 I , 5 k , 1 5 c 5 3 that sat-

isfy

then for ; p , e = e' = e ( l . l ) - (1,2)- . . . = e:l .n-klJ -

j ~ p , e = e' = = (2.21 = . . . = e ? , n - k ) and I =

c+ I

i = I(23) n,Mc + n,m, = n , , k < r, 5 n , 1 5 I (29)

and then for either of two cases, that is, Case 1 , only the pthinformation digit is received in error and J # p ; and Case 2 ,

more than one (I 6 ) esidue digits are received in error, the

solutions to ( 2 5 ) and ( 2 6 ) are inconsistent.

Proof: Case 1: fo r X + E < M , an d J # p , i f the

M

m,A r ( e ' - m )-( m o d m k + r ) , r = 1 , 2 ; . . , n - k

(24) solutions to ( 2 5 ) are consistent, i.e., e: '. ') -

(21)-(24) a procedure to correct single error and detect the

('a . . --

e Y k ) e, then comparing (25) to ( 2 2 ) , we obtainwhere 0 < e' < mp. Given A I , A 2 ; . . , A n - k , based on

presence of up to d - 2 errors can be outlined as follows. - (em , - e'm,) = 0 mo d n k + r

that is, em p - e'm, is a multiple of IIFIFmk+r.This is not

( r = t

M

For J = 1, 2 , . . , k , solve the cong ruences m P m J

M

A,e(1-r)- ( m o d m k + r ) , r = 1 , 2 ; - . , n - k ( 2 5 ) possible as 1 emp - e'm, 1 < II;::mk+r. Similarly, for

J+ E < M , and J # p, if = (2.2) = . - =J

8/6/2019 Sun Krishna II

http://slidepdf.com/reader/full/sun-krishna-ii 5/17

22 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS-11: ANALOG AN D DIGITAL SIGNAL PROCESSING. VO L 39. NO . I . JANUARY 1992

ey , n -k )= e, then comparing (26) to (22) we obtain

This is not possible as (e'm, + (m , - e)m,,) < 2mpm, <n,=, k+,. The case for M I + E < 2 M , can be ana -

lyzed in an analogous manner.Case 2 : fo r X + E < M ,

e Y k J e, then comparing ( 2 5 ) to ( I 6) we obtain

n - k

if e:'." = e:'.') = . . -

where k < r ,I , v = 1 , 2 , . . g. This congruence cannot

ho l d as l e I I ~ = , m I m e 'm, I < m , I I : ~ = , m , ~ y

m , . For example, assume that the pth information

digit and the first g parity digits are in error, and 0 c + g ,

where c = 1 , then the above congruence is

n8+1 g,= ,

M- ( emp - e'm,) = O(mod m,- ,m, , )

mJmP

This is not possible as 1 emp - elm, I < m n - m n . n other

words, at least two of { e:'.r); r = 1 , . . . n - k ) are un-equal. Similarly, for X + E < M , if e:2." = = . . .= e;2.n-k) = e, compar ing ( 2 6 ) to (16), we obtain

n - k - g

where k < r ,I , v = 1 , 2;. e , g. The above congruence

cannot hold as ( e l m j + ( m i - e)13',=,mi,t)< 2 m j

n : = l m i < v< Elf=+l'-grnr,,or c + g < 0; nd (29) for c + g

= 0. he case for M 5 X + E < 2 M ca n also be analyzed

in an analogous manner. This proves the theorem.

Lemma I : If the moduli of RRNS satisfy the condition

min (m, ,mr2}> max { 2 m i , m i 2 m i , - m, , ] ( 3 0 )

where k < r l , r 2 I n and 1 5 i , , i , 5 k , then for either of

the two cases, that is, Case 1 , only the pth information digit

is received in error and j # p ; and Case 2 , more than one

residue digit is received in error, the solutions of either (25)

or (26) are inconsistent.

Proof: The condition is sufficient since, if the moduli

satisfy (30), he n (29) is satisfied trivially. This com pletes the

proof.

It is interesting to note that this sufficient condition on the

moduli for single error correction and multiple error detec-

tion is the same as the sufficient condition on the moduli for

single error correction [14]. Based on the concept developed

above, and under the assumption that the moduli rnl, i = 1 ,

2 , . * , n , satisfy the condition in Theorem 6 or Lemma 1, the

algorithm to correct a single error and simultaneously detect

presence of multiple error in RRNS can be described asfollows.

Step I :

Step 2:

Step 3:

Step 4:

Step 5:

Step 6:

According to the received vector, we compute the

syndromes.

Check how many syndromes are zeros:

1) If all the syndromes are zero, then no erroroccurs. Stop.

2 ) If only one syndrome is nonzero, then only

one error in corresponding parity. Correct i t

and stop.

3 ) If d - 3 to 1 syndromes are zero, then go to

Step 6.

4) If all the syndromes are nonzero, then go to

Step 3.

Le t j = 1.

Perform single-error consistency-checking for the

nonredundant moduli m,. Check the consistency

of the solutions. If it is consistent, then go to Step

5 ; if it is in consistent, then j = j + 1. Go to step

4 fo r j I . Fo r j = k + 1 , go to Step 6.Only one error in the j t h position. Correct it and

stop.

Declare more than one error detected and stop.

A flowchart for this algorithm is given in Fig. 1.

Example I : Consider a (10, 6) RRNS code based on the

moduli m, 23 ,  m2 = 25,  m3 = 27 ,  m4 = 29 ,  ms = 31, 

m6 = 3 2 , m, = 67, m8 = 71 . m, = 73, m,, = 79, where

m,, m8. ,, and m,, are the redundant moduli. Clearly,

m,m8 > 2m,m, - m5 - m,, therefore, the condition in

Theorem 6 and Lemma 1 is satisfied. M = n;=,n , = 446 ,

623, 200. Le t X = 400, 000, 000. then x = [8, 0, 22,  13,

2.5, 0, 17, 58, 4 , 1 I ] . Since 0 I < M , x is a codevector.

Assume that one error takes place in the first residue digit,

and the received vector is [O , 0, 22 , 13 , 25 , 0, 17, 58, 4 , 1 I ] .

Based on the information part [O , 0, 22,  13, 2.5, 01 and BEX

operation, we compute the syndrome digits A , E 14(mod

67) , A , E 48(mod 71) , A 3 = 50(mod 73) , A 4 = 17(mod

79). Following the decoding algorithm, we check the consis-

tency for j = 1 , 2 , . . k . k = 6 in this example. Based on

computing e:"'" and r = 1 , 2 , 3 , 4, it is seen that

consistent solution to (26). So, declare that one error oc-curred in the first residue digit, the value of the error being

e , = e(M/m,)(mod m , ) = 15 . From (28),  the estimated

value of the erroneous digit is given by jc? = 8.

Now, assume that two errors take place in the first and

third residue digits, and the received vector is [O , 0, 23,  13 ,

25 , 0, 17, 58, 4, 111. Based on the information part [O , 0,23, 13, 25, 01 and BE X operation, we compute the syndrome

digits A , = 23(mod 67), A 2 = 50(mod 71), A 3 = 63(mod

73) , and A 4 = 6S(mod 79). Following the decoding algo-

rithm, we check the consistency for i = 1, 2;.., 6 , it is

found that there is no consistent solution, so declare more

than one error detected.

when j = 1 , e ( 2 . 1 ) - e ( 2 . 2 ) - e ( ? . 3 ) - = e = 14 is aI - -

8/6/2019 Sun Krishna II

http://slidepdf.com/reader/full/sun-krishna-ii 6/17

S U N A N D KRISHNA: CODING THEORY APPROACH-PART 11 23

A CCORDI NG TO THE

RE CE I V E D V E CTOR.

C O M P U T E T H E

S Y N D R O M E S

d = Atfi+l

d L 4 , h = l , P > h

Note Under the assumpt ion

I CONS I S TE NCY -CHE CK 1 NG

A T T H E N O N R E D U N D A N T

MODULUS ml

CHE CK HOW M A N Y OF

A N D S T O P

A RE DE TE CTE DS T O P

Fig. 1. A decoder flowchart for single-error correction an d multiple-errordetection.

V . A PROCEDUREOR DOUBLE- ERRORORRECTI ONVD

M ULTI PLE- ERRORETECTIONd = h + 0 1, h = 2 ,

P > A)

If Case 4 of Theorem 5 happens, i .e. , exactly two residue

digits are received in error, there are two possible cases; that

is, Case a): both errors in information part; Case b): one

error in information part and the other in parity part. By

Theorem 4, the RRNS wi th d = h + 0 + 1, h = 2 , and

P > h can simultaneously correct two errors and detect Perrors. N ote that for correcting two errors o nly, i .e . , for

d = 5 , the analysis of the error correcting procedure is the

same as in this section.Consider Case a): if the p th and qth information digits are

received in error, (15)-(20) become the following.

i) X + E < M . In this case,

- MY = X + E = X + e-

mPm4(31)

and

ii) M 5 X + < 2 M . In this case,

- M MY = X + e- - M = X + (e ' - m P m q) _-

mPm4 mPmQ(33)

M

A , = (e ' - m,m,)-mod m k + r ) ,

mPm4

where 0 < e' < mPm4.Similar to the analysis in Section

IV, given A , , A , ; . . , A n P k , based on (31)-(34) a proce-

dure to determine error locations and error values can be

outlined as follows.

For i = 1 , 2 ; * . , k - 1, j = i + 1, i + 2 ; * * , , solve

the congruences

and

r = 1 , 2 ; . . , n - k (36)

to get the values

(37)

where r = 1, 2 , 3, 4. Based on {e". ' ) , e ( i ~ 2 ) } n d { e ( 2 3 ' ) ,

and by the CRT, we can write

where

Then check if the following two conditions are satisfied: i)

el:) < m,m, and (35) holds by substituting el;.) f o r e ( ' , r ) ,

i.e., the solutions to (35) are consistent, and the consistent

solution is e!)); ii) e;:) < mim, and (36) holds by substitut-

and the consistent solution is e$). Note that { e ( ' *3 ) ,e(',4)}

and { e",')} will be used for obtain ing the consiste nt

solution for Case b). Let us say either of the two conditions is

satisfied for i = f an d j = h. Then the fth and hth informa-

tion digits are declared to be in error, the value of errors

being

ing e::) fo r e"," , i.e., the solutions to (36) are consistent,

M

e = e-(mod m f ) (43)m J m h

.f -

Meh = e-(mod m h )

m f m h

(44)

= 2 7 ' ' 9 - (34) where e = e:;), if e:).' is the consistent solution to (35);

8/6/2019 Sun Krishna II

http://slidepdf.com/reader/full/sun-krishna-ii 7/17

24 IEEE TRANS ACTION S ON CIRCUITS AND SYSTEMS-11: ANALOG AN D DIGITAL SIGNAL PROCESSING, VOL. 39, NO . 1 , JANUARY 1992

e = e!;), f ej;) is the consistent solution to (36). Note that if

e = O(mod m,) o r e E O(mod m,), then only the hth or ft h

information digit is in error. The correct values of the fth

and hth residue digits are yf - ef(m od m,) and y , -

e,(mod m,), respectively, and y is decoded to the codevec-

to r x, where

/,

x j = y ,, j = 1 , 2 ; . . , n , j f f , h

x, = y , - ef (mod m,)

(45)

(46)

(47)

A

Ax h = y h - e , (mod m, ) .

It is clear from (31), ( 3 2 ) , and (35) that if two errors take

place in the p th and 9t h information digits such that X + E

< M , hen for i = p and j = q , e = e' = e:;),f = p , and

h = q . Similarly, if two errors take place in the p th and qth

information digits such that M I X + E < 2 M , th en f o r

i = p an d j = q, e = e' = e!;), f = p , and h = q from

(33), (34), and (36). However, it remains to be shown that

the solutions to (35) and (36) cannot be consistent, if any one

of the following cases occurs: 1) only one error takes place in

th e p t h ( p # i, j ) nformation digit, 2) exactly two errorstake place in the p th and qt h information digits, where

p # i, j and / o r q # i, j , 3) exactly two erro rs occur: o ne in

the information part and the other in the parity part, 4) more

than two (less than 0 1) errors occur. Under an additional

constraint on the form of the moduli, the result is established

in the following theorem.

Theorem 7: If the moduli of an ( n , k) RRNS code are

such that there do not exist integers n,,, n,; 0 5 n,, <m , m , , 0 I n, < M e = II:=,rnlu, 1 I , I k , 1I I ;

that satisfy

C f 2

i = 1

nijMe + n , m i m j = n m , , k < ri I n , 1 I , j I k

(48)

then for any one of the following three cases: 1) only one

error takes p lace in the p th ( p # i, j ) nformation digit, 2)

exactly two errors take place in the pth and qth digits,

where p # i, j and/or q # i, j , 3) more than two (less than

0 1) errors occur, the solutions to (35) and (36) are

inconsistent.

The proof of this theorem is similar to the proof of

Theorem 6, and therefore, is omitted here. The sufficient

condition for Th eorem 7 can be shown to be exactly the same

as the sufficient condition stated in Lemma 1.

Now, consider Case b): assume that one error takes place

in the pth information digit and the other takes place in the

( k + u)th digit (the uth parity digit); then (15)-(20) become

the following.i) For X + E < M , r = 1 , 2 ; - . , n - k , and 1 5 U I

n - k ,

- MY = X + E = X + e'-

m P(49)

an d

M

mPA = e'-( m od m k + r ) , r # U

ii) For M r X + E < 2 M , r = 1 , 2 ; . . , n - k , an d

I s u r n - k ,

and

M

mPA , = ( e' - m p ) - - ek +u (mo d mk +u ) (54)

where 0 < e' < m p, and m 4 can be any one of the informa-

tion moduli. Based on (49)-(54), the procedure to determine

error locations and error values is the same as that for Case

a), except that when no consistent solution is found in Case

a), then we check if any n - k - 1 congruences in either

(35) or (36) have a consistent solution, say e, which satisfies

e < m i m j a nd e E O(mod m,) or (mod mj). Note that this

consistent solution may be obtained from the combination

{ or { e(2 ,3) ,e(2,4)),ince one error may occur inthe ( k + 1)th or ( k + 2)th digit. Let us say the above

condition is satisfied for i = f and j = h, and the only

inconsistent congruence is corresponding to the ( k + s)thresidue digit, then the fth (if e = O(mod m,)) and ( k + s)th

residue digits are declared to be in error. The correct value

of the fth and hth residue digit can be obtained from (43)

and (44), and the correct value of the ( k + s)th residue digit

is as follows:

/-.. Mx k + s E k + $ + A s - m k + s ) (")

m f m h

if n - k - 1 congruences in ( 3 5 ) have a consistent solution

e ; and

if n - k - 1 congruences in (36) have a consistent solution

e. It is clear from (49)-(51) and (35) that if one error takes

place in the pth information digit and the other takes place in

the ( k + u)th digit such that X + E < M , then for i or

j = p , say i = p , e = = e 'm, = O(mod m,), f = p ,

8/6/2019 Sun Krishna II

http://slidepdf.com/reader/full/sun-krishna-ii 8/17

SUN AND KRISHNA: CODING THEORY APPROACH-PART 11 2s

an d s = U , where r = 1, 2 ; . . , n - k , an d r # U . Simi-

larly, from (52)-(54) and (36) if one erro r takes place in the

pth information digit and the other takes place in the ( k +u)th digit such that M I + E < 2 M , t he n f or i or j = p ,

say i = p , e = e(2")= elmj = O(mod mi), f = p , an d s

= U , where r = 1 , 2 ; - . , n - k , an d r # U . However, it

remains to be shown that neither (35) nor (36) has exactly

n - k - 1 consistent solutions that are equivalent to zero

mod mi or mod m j , if any one of the following cases

occurs: i) only one error takes place in the pth ( p # i , j )

information digit, ii) exactly two errors take place in the pth

and qth information digit ( p # i , j , a n d/ or q # i , j ) , ii)

exactly two errors take place in the pth and ( k + u)th digit

( p # i , j ) , iv) more than two (I /3) errors take place.Under the same constraint on the form of the moduli as stated

in Theorem 7, the above result is established in the following

it is consistent, then go to Step 6; if it is inconsis-

tent, then go to Step 7.

Step 6: If the consistent solution e = O(mod mi ) or e =O(mod m j ) ) , hen only one error in the jth (or

ith) position; otherwise, exactly two errors in the

ith and jth positions. Correct them and stop.

Step 7 If exactly d - 2 solutions are consistent and the

consistent solution e = O(mod m,) (o r e = O(mod

m j ) ) , hen exactly two errors: one in the jth (orith) position and the other in the parity for which

the solution is inconsistent. Correct them and

stop. Otherwise, go to Step 8.

Step 8: j = j + , go to Step 5 fo r j I . For j > ,i = i + 1 go to Step 4 for i 5 k - 1. For i = k ,

go to Step 9.

Step 9: Declare more than two errors detected and stop.

theorem.

Theorem 8: If the moduli of an ( n , k ) RRNS code a re

such that there do not exist integers n i j , n,; 0 5 n i j <mimj , 0 I , < M , = I I :=,rnjm, 1 I , i k , 1 I I 3that satisfy

A flowchart for this algorithm is given in Fig. 2 .

Example 2: Consider the same RRNS as in Example 1,

based on the moduli m , = 23 , m2 = 25, m3 = 27 , m4 =

29, ms = 31, m6 = 32, m7 = 67, m, = 7 1 , m, = 7 3 , m,,

= 79, where m7, ma, mQ, nd m, , are the redundant, ._

c +2 moduli. Clearly, m7m, > 2m,m6 - m 5 - m,; therefore,

the condition in Theorems 7 and 8 is satisfied. M = rI ;=,rn,= 446, 623, 200. Let X = 400, 000, 000, then x = [8, 0,

22, 13, 25, 0, 17, 58, 4, 111. Since 0 5 X < M , x is a

n l J M c+ n,m,m, = n m , , k < T I 5 n , 1 5 i , j II = 1

(57)

then when (35) or (36) has exactly n - k - 1 consistent

solutions equivalent to zero mod m j or mod mi , he ith or

jth information digit and the parity digit corresponding to the

only inconsistent solution are received in error.

The proof of this theorem is similar to the proof of

Theorem 6, and therefore is omitted here.

Based on the concept developed above, and under the

assumption that the moduli of MDS-RRNS satisfy the neces-

sary and sufficient condition in Theorem 7 or 8, or the

sufficient condition in Lemma 1, the algorithm to correct

double-error and simultaneously detect multiple errors can be

described as follows.

Step 1: According to the received vector, we compute the

Step 2: Check how many syndromes are zero:

syndromes.

1) If all the syndromes are zero, then no error

occurs . Stop.

2) If only one syndrome is nonzero, then only

one error in corresponding parity. Correct it

and s top.

3) If two syndromes are nonzero, then two errors

in parity. Correct them and stop.

4) If d - 4 to 2 syndromes are zero, then go to

Step 9.5) If none or one syndrome is zero, then go to

Step 3.

Step 3: i = 1.

Step 4: j = i + 1.

Step 5: Perform double-error consistency-checking for all

the combination of the nonredundant moduli mi

an d mj. Check the consistency of the solutions. If

codevector. Assume that two errors take place in the first and

third residue digits, and the received vector is [0, 0, 23 , 13 ,25, 0, 17 , 58, 4 , 111. Based on the information part [0, 0,

23, 13 , 25 , 01 and BEX operation, we compute the syndrome

digits A , = 23(mod 67), A , = 50(mod 71), A 3 = 63(mod

73), and A 4 = 65(mod 79). Following the decoding algo-

rithm , we check the consistency for i = 1, 2; * a , 5 , j = i +1 , i + 2 , ,6, based on computing {e".'), e(',,), e(13 3),

from (37) and (38) and

{el;) , l;)} rom (39) and (40). It shows that when i = 1 an d

j = 3, er:) = 217( < m l m 3= 621) is a consistent solution to

(36), and e!:) f O(mod 23) or (mod 27). So, declare twoerrors occur in the first and third residue digits, and from

(43)-(47) the estimated values of the erroneous digits are

{ e(*,'),

+.I = y , - e(2)-M (mod m , ) = 813 m l m 3

Now, assume that two errors take place in the first and

( k + 4)th residue digits, and the received vector is [0, 0, 22,

13, 25, 0, 17, 58, 4, 121. Based on the information part [0,

0, 22, 13, 25, 01 and BEX operation, we compute the

syndrome digits A , = 14(mod 67), A , = 48(mod 71), A 3 =

50(mod 73) , A 4 = 16(mod 79). Following the decoding algo-rithm, we check the consistency for i = 1 , 2 , . . . 5 , j = i +1 , i + 2 , . . . 6 , based on computing {e'' . '), e(',,), e(19 3),

from (37) and (38) and

{ell.), l:)} from (39) and (40). It shows that when i = 1 and

j = 2 , e!:) = 35 0 = O(mod m,) < m,m, is a consistent so-

lution to the first three congruences of (36), i.e., the only

{

8/6/2019 Sun Krishna II

http://slidepdf.com/reader/full/sun-krishna-ii 9/17

26 IEEE TRANSACTIONS ON CIRCUITS A N D SYSTEMS- U: A N A I . 0 G AND DIGITAL SIGNAL PROCESSING. VOL 39. NO. I . JANUARY 1992

d = A+P+I

ACCO RDING TO TH E d 25. A=2, P>h

R ~ ~ ~ ~ ~ ~ ~ f ~ ~ R ~ote Under the assumptionthat no more than d-3

res idues ar e i n e r r o rS Y N D R O M E S

T W O E R R O R SNO ERROR

STOPH E C K

HOW MANY

P E R F O R M T H E D O U B L E - E R R O R

CO NSISTEN CY- CHECKIN G FO R THE

COMBINATION OF mi AND m,C H EC K H O W M b N V S O L U T l O N S I R E

C O N S I S T E N T

EXACTL Y TW O

EXACTL Y TW O ERRO RS O NE

i t h A N D j t h it h POSlTlON

PO SIT IO N

C O R R E C T T H E MCO RRECT THEMTOP

STOP.

I , - , + I I

Denotee=O(mod m,) 1 = 1 + 1 4 Iy lelmi-o, where

e is the consistent ERRO RS A RE

MORE T H A N TWO

D E l E C T E D S T O Ps o l u t i o n

Fig. 2 . A decoder flowchart for double-error correction an d multiple-errordetection.

inconsistent congruence is corresponding to the modulus

ml0 .So, declare that two errors occur in the first and tenth

residue digits, the estimated values of erroneous digits being

given by (46) and (56), that is,

/\ Mx , E , - e!;)- (mod m , ) = 8

mlm2

,’\ Mx , ~y,, + A 4 + ( m , m ,- e!<’)-- (mod m,”) 11

mlm2

Note that i is always equal to 1 , if two errors occur in a wa y

that one error is in information part and one error is in parity

part.

V I . A P ROCEDURE F OR S INGLE-BURS T E R R O R

CORRECTION

A single-burst residue error vector of length b is defined

as an RNS vector whose nonzero residue digits are confined

to b consecutive digits, the first and last of which must be

nonzero. The decoding procedure for performing burst-error

correction depend s on the criterion of performance. If residue

errors occur in burst such that

P(burst error of length a ) < P(burst error of length b )

a > b, and the criterion of performance is to minimize the

probability of decoding error (maximum likelihood decoding

(MLD)), then the decoding procedure can be summarized as

follows. Decode y to a codevector x for which the length of

burst-error vector e, e = y - f , s minimum. We will use

this decoding procedure in our subsequent analysis. Here

P(A) denotes the probability of occurrence of event A. T he

proof of Theorem 9 is similar to the proof of lemma 3 in

[ 141, and therefore, is omitted here.

Theorem 9: For detecting all single-burst errors of length

b or less , an RRNS code must have d >_ b + 1.

Theorem IO : For correcting all single-burst errors of

length b or less, an RRNS code must have d 2 2 b

+1 .

Proof: Let x, be a codevector other than x in !d. The

Hamming distance among x , x , , and y satisfies the triangu-

lar inequality

d ( Y , x) + d (Y , x , ) 2 d ( x , X I ) .

Since d ( x , x, ) 2 d an d d ( y . x) = w t ( e )5 b , ( e = y -

X ) ,

d ( y , x ) 2 d - b .

If d 2 26 + 1 , then d ( y . x, ) 2 b + 1 . thereby implying

that the length of burst-error vector e is smaller than the

length of any other burst-error vector e , , e , = y - x,. On

the other hand, if the codevector x is such that wt( ) = d,

and the nonzero digits of x are confined to d consecutive

places (examples of two such codevectors are codevectors

corresponding to the integers X , = n:l,’m, an d X , =

2nf;=-,’ in, ,espectively), then for d 5 2 6 , we can show that

there exists at least one codevector x, such that d ( y , x ) =

w t ( e ) 2 w t ( e , ) . e , = y - x , . In this case, incorrect decod-

ing will take place. This proves the theorem.

The proof of‘ Theorem 11 is similar to the proof of

Theorem I O , and therefore. is omitted here.

Theorern 11: For correcting all single-burst errors of

length b or less and simultaneously detecting all burst errors

of length b’ ( b ’ z b) or less, an RRNS code must have

d r b + b ’ + l .

A fundamental property of the syndrome digits is stated in

the following theorem.

Theorem 12: For an MDS-RRNS ( n , k ) code, ( d = n -

k + 1 = b + b‘ + l ) , under the assumption that no morethan one single-burst residue error of length 5 b’ occurs,

on e of the following four cases occurs.

Case I : If al l the syndromes A , , A 2 , . , an^ are zero,

then no residue is in error, and vice versa.

For the following cases, let p be the number of nonzero

syndromes.

Case 2: If p 5 b syndromes are nonzero, then exactly p

corresponding parity digits are in error, and all other residue

digits are correct.

Case 3: If b + 1 5 p 5 6‘ yndromes are nonzero, then

more than b residue digits are in error .

Case 4: If 6‘ 1 5 p 5 n - k syndromes are nonzero,

then at least one of the information digits is in error, and all

the last b + 1 redundant residue digits are correct.

The proof of this theorem is similar to the proof ofTheorem 5 , and therefore. is omitted here. If Case 4 of

Theorcm 12 happens, and exactly one single-burst residue

error of length I occurs, there are two possible cases,

that is, Case a) : all the errors are in the information part;

Case b) : the errors are in both information and parity part.

8/6/2019 Sun Krishna II

http://slidepdf.com/reader/full/sun-krishna-ii 10/17

SUN AND KRISHNA: CODING THEORY APPROACH-PART I1 27

Consider Case a). Assume that a single-burst error of

length c (1 I I ) akes place between the ith and ( i + c

- 1)th information digits, i.e., in the position interval [ i ,

i + c - 11, then (15)-(20) becom e the followin g.

i) X + E < M . In this case,

M

Y = X + E = X + e ' ( 5 8 )ne= m;+a-

and

A r = e'M

(mod m k + r ) , = 1 , 2 ; * - , n - k .'= Imi+a- 1

(59)

ii) M I + E < 2M . In this case,

a consistent solution to (63). In other words, check if e:') <nfi=mi+a- and (62) holds by substituting e:') fo r or

e?) < IIZ=,m,+,- I , and (63) holds by substituting e?) fo r

e?,r). Let us say either of the two conditions is satisfied for

j = p. Then declare that a single-burst error of length Ioccurs in the position interval [ p , p + b - I]. The values

of the errors are

where e = e'') if e$') is the consistent solution to (62);

e = e? ) if e$) is the consistent solution to (63). The correctM values of the erroneous residue digits are ( y , - e,) mo d

m , , w h e r e q = p , p + l ; * * , p + b - l . T h e n y i s d e -

coded to the codevector x, here

x q = y q , q = 1 , 2 ; . . , n , q f p , p + l ; * * , p + b - 1A

(60)

-Y = X + E - M = X +

an d

A

x, = y q - e,(mod m , ) , q = p , p + l ; . . , p + b - 1.

(mod m k + r ) j

(70)

r = 1 , 2 ; . . , n - k (61)

where 0 < e' < n:= l m i + a- l .Given A , , A , ; . . , A n -k ,

based on (58)-(61) a proced ure to determine erro r locations

and error values can be outlined as follows.

For j = 1 , 2 , . . ., k - b + 1, solve the congruences

r = 1 , 2 ; * . , n - k (62)

r = 1 , 2 ; . - , n - k (63)

to get the values and e?,'). Using the last b digits of

{ ejl,r);= 1 , 2 , * e , n - k } and the last b digits of {

r = 1, 2; * * , n - k } , and by the CRT we compute the

following values:

n - k

r = n - k - b + 1

n - k

e:) = ey*r)7' 'Mi mod M i ) (64)

e?) e?.')T;M; (mod M i ) (65)r = n - k - b + 1

where

M iM ' = -

mk + r

T M ; = l ( m o d m k + r ) (68)

and then check if ejl:' is a consistent solution to (62) or is

Note that e , = O(mod m,) implies that no error occurs in

the qth digit. It is clear from (58), (59), and (62) that if a

single-burst error of length c ( c 5 b) takes place in the

position interval [i , i + c - 11 such that X + E < M , he n

fo r [ j , j + b - I] including [ i , i + c - 11, e' m = e:'),where m is the product of the moduli corresponding to the

position interval [ p , p + b - 13 exclusive of [ , i + c - 11.

Note that if c = b, then e' = e$')and p = i. Similarly, if a

single-burst error of length c ( cI ) takes place in the

position interval [ i , i + c - 11 such that M I + E <2 M , then for [ j , j + b - 11, including [ i , i + c - 11,

e'm = e?) from (60), (61), and (63). For this case, if

c = 6 , hen e' = e?) and p = i. However, it remains to be

shown that neither (62) nor (63) has a consistent solution, if a

single-burst error of length c (cI ' ) takes place in the

position interval [i , i + c - 11 which is not included in [ j ,

j + b - 11. Under an additional constraint on the form of the

moduli, the result is established in the following theorem.

Theorem 13: If the moduli of an ( n , k ) RRNS code a re

such that there do not exist integers n B , n,; 0 I B < M B

1I I '; that satisfy

- nR=lm,e, o I , < M , = n z = l m i a , s j a , i, < k ,

c+ b

I = 1

nBMc + ncMB = n mr, ,k < r ,I (71)

then for [ i , i + c - 11 not included in [ j , j + b - 11,neither (64) or (65) has a consistent solution, where a

single-burst error of length c (1 I I ' ) occurs in the

position interval [i, i + c - 11 .

Proof: Consider the extrem e case, that is, [ , i + c - 11

an d [ j , + b - 11 do not overlap and c = b' . For X + E

< M , if (62) has a consistent solution e$' ) , hen comparing

8/6/2019 Sun Krishna II

http://slidepdf.com/reader/full/sun-krishna-ii 11/17

28 IEEE TRANSACT IONS ON CIRCUITS AND SYSTEMS-11: ANALOG AND DIGITAL SIGNAL PROCESSING, VOL. 39, NO . I , JANUARY 1992

(62) to (59) we get

b b'

e' II m j + , - l - el1)IIi a = 1 a = l

where e' < II%= , m i + , - This cannot hold due tob b'

e' II m j + a - l- e;.')II m i + a - li a = l a =

b 6' n - k

a = a = 1 r = I< n m j + o l - l m r + u - l < II m k + r .

Similarly, for X + E < M , f (63) has a consistent solution

e?), then comparing (63) to (59) we get

b'where e' < n a = , m i + a - l .his cannot hold due to (71). The

case for M I + E < 2M , can also be analyzed in an

analogous man ner. This proves the theorem.

A sufficient condition for T heorem 13 can be shown

to be exactly the same as the sufficient condition stated in

Lemma 1.

Now, consider Case b): In Case a), when j = k - b + 1

if we do not find the consistent solution, it implies that a

burst error of length > b occurs or a burst error of length

5 b occurs in both the information and parity digits. Assume

that a single-burst error of length c (1 I I ) akes place

in the position interval [ k - c 1 + 1 , k + c2] ,where c l ,

c22 1 and c1 + c2 5 b, then (15)-(20) beco me the follow-

ing.

i) X + E < M . In this case,

an d

M

A e' (mod m k + r ) ,:= k - ,+ i

r = c2 + I ; . . , n - k . (74)

ii) M 5 X + E < 2 M . In this case ,

F = X + E - M= X

r = c2 + l ; . . , n - k (77)

where e' < II:= k - c l + m . A procedure to determine error

locations and error values is described in the following.

For j = k - b + 1, check if there exists the largest num-

ber c, in the range [I, b ) such that either of the following

two conditions is satisfied.

Condition 1): Th e last (b ' + c,) consecutive congruences

of ( 6 2 ) have a consistent solution, i.e..

and

Condition 2 ) : The last (b ' + c3) consecutive congruences

of (63) have a consistent solution, i.e.,

an d

Le t us say there exists a number c , such that either of the

above two conditions is satisfied; then declare that a single-

burst error of length I takes place in the position interval

[ k - c3 + 1, k + b - c 3 ] .The estimated values of the er-

rors and erroneous information digits can be obtained by (69)

an d (70) fo r p = k - b + 1. The inconsistent congruences

correspond to the erroneous parity digits, y k + s , s = 1,

2 , . . , b - c 3 , he estimated values of erroneo us parity digits

being:

8/6/2019 Sun Krishna II

http://slidepdf.com/reader/full/sun-krishna-ii 12/17

S U N AN D KRISHNA: CODING THEORY APPROACH-PART I1 29

if e:’) is the consistent solution to ( 6 2 ) ;an d

M

(mod (79)‘:=lmk-b+a

if e?’ is the consistent solution to ( 6 3 ) .

It is clear from (72)-(74) and ( 6 2 ) that if a single-bursterror of length c (1 5 c 5 6) takes place in the position

interval [ k - c, + 1 , k + c,] uch that X + E < M , where

c , , c2 L 1 an d c , + c2 = c , then for j = k - b + 1 , ( 6 2 )

ha s 6’ + b - c, solutions, which are consistent and equiva-

len t to ze ro mod m k - b + o i , i . e . , = e$’’ =

e n , = , m k - b + a , w h er e CY = 1, 2 ; * e , b - C , . r = c, + 1,

c, + 2 ; * * , n - k , b - c2 = c 3 , an d c, = c4. Similarly,

from (75)-(77) and ( 6 3 ) , if a single-burst error of length c

(1 5 c I ) akes place in the position interval [k - cl + 1 ,

k + c,] such that M I X + E < 2 M , where c , , c2 2 1

an d C , + c, = c , then for j = k - b + 1, ( 6 3 ) ha s b’ + b

- c, solutions, which are consistent and equivalent to zero

m od m k - b + a , i .e ., e?..) = e?’ = e n , = , m k - b + a , w he re

c2 = c 3 , and c , = c4. However, it remains to be shown thatno c3 and c, exist to satisfy Condition 1) and 2 ) , if a

single-burst error of length > b (but I ’) occurs or asingle-burst error of length I occurs not in the position

interval [k - b + 2 , k + b - 11. The result is established

in the following theorem.

Theorem 14: If the moduli of ( n , k ) RRNS code are such

that there do not exist integers n B , n,; 0 I B < M B =

I I t z I r n j m ,0 5 n , < M , = H:=lmicy , 1 I a , i , < k , 1 Ic I ’; that satisfy

b - c ,

b - c ,

CY = 1 , 2 ; - * , b - c,, r = c2 + 1 , c, + 2 ; * . , n - k , b -

c + b

;= I

n B M c + ncMB = n , , k < r ,I (80)

then when a single-burst error of length > b (but I ’)

occurs or a single-burst error of length I occurs not in the

position interval [ k - b + 2, k + b - 11, c3 an d c4 do not

exist to satisfy Conditions 1) an d 2 ) .

The proof of this theorem is similar to the proof of

Theorem 13, and therefore, is omitted here. Based on the

concept developed above and under the assumption that the

moduli satisfy the condition in Theorem 13 or the sufficient

condition in Lemma 1, the algorithm to correct single-burst

error of length b or less and simultaneously detect the

presence of single-burst error of length b’(b’ > b) in RRNS

can be described as follows.

Step 1: According to the received vector, we compute the

Step 2: Check how many syndromes are zero.

syndromes.

1) If all the syndromes are zero, then no error

occurs . Stop.

2 ) If p (1 I 5 b ) syndromes are nonzero, then

exactly p corresponding parity digits are in

error. Correct them and stop.

3) If b + 1 to b‘ syndromes are nonzero, then go

to Step 8.

Step 3:Step 4:

Step 5:

Step 6:

Step 7:

Step 8:

4) If 6’ + I to all syndromes are nonzero, then

Let j = I .

Perform b-error consistency-checking for the

combination of the nonredundant moduli m,,m j+ , . . . m j s b - ,. Check the consistency of the

solutions. If it is consistent, then go to Step 5; if

it is inconsistent, then for j < k - b + 1 go toStep 6 , go to Step 7 for j = k - b + 1.

A single-burst error in the position interval [ j ,

j + b - 11, correct it and stop.

j = j + 1, go to Step 4.

If the last b’ + c consecutive congruences of ( 6 2 )

o r ( 6 3 )have a consistent solution which is equiva-

lent to zero mod rIi:C mk- b+a, then a single-

burst error exists in the position interval [ k - c

+ 1 , k + b - c]. Correct it and stop. Otherwise

go to Step 8.

Declare that a burst-error of length > b is de-

tected. Stop.

go to Step 3.

A flowchart for this algorithm is given in Fig. 3 .

VII. E XT E NS IONSF PREVIOUSLGORITHMS

In [4] and [8]-[lo], the algorithms for locating a single

residue digit error are based on the properties of modulus

projection and MRC. MRC is an operation to represent the

integer X in the form

fl 1 - 1

I = ] r = lx = a , r I m r (81)

w h e r e O I a , < m , , I = 1 , 2 ; . . , n , a n d n ; = , m , = 1 . In

an ( n , k ) RRNS code, the first k mixed radix digits a,,

a 2 , a , ak are called the nonredundant mixed radix digits,

and the rest ak+ a k + , , . . , a, will be called the redundant

mixed radix digits. It is obvious that if the redundant mixed

radix digits are all zero, the number X is a legitimatenumber; otherwise, X is an illegitimate number. T he modu-

lus m, - projection of X in an ( n , k ) RRNS code, denoted

by X , , is defined as

X , = X [mod- M m T ]

that is, X , can be represented as [x, , Z;’ , xi-,,

x,, , a , x,] which is the residue representation of X in areduced RRNS with the ith residue digit xi eleted. The

mixed radix representation of Xi s

fl 1 - 1

r = lxi = aln m r

I # ; r # i

where the new first k mixed radix digits are still called the

nonredundant mixed radix digits and the rest are called the

redundant mixed radix digits , e .g. , if i 5 k , a , ,

a 2 , . ai- , ai+ ,. . a k , ak+ , are the nonredundant

mixed radix d igi ts , and a k+ * , a k f 3 , - ., a, are the redun-

dant mixed radix digits. It is obvious that if X, s a legiti-

8/6/2019 Sun Krishna II

http://slidepdf.com/reader/full/sun-krishna-ii 13/17

30 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS-11: ANALOG AN D DIGITAL SIGNAL PROCESSING, VOL. 39, NO . 1 , JANUARY 1992

i . e . ,=b+b tb ,bccording to the

received vectorcompute the k + c

r = I

Note Under the assumption hatno more than one single-

< b occursburst residue error of length M' = n ,, i , 5 k + c , i,,, > k + c , i , I

r@

k

r = 1 (86)' = M = n m,, i, > k .

It is obvious that M' 2 M . M' is also the smallest nonzero

number represented by (85) with all the nonredundant mixedradix digits zero. It follows from (84) that the MA-projection

of any legitimate number X in RRNS is still a legitimate

number in [0, M ) , that is XA= X . The proof of the

following theorem has been given in [4], and therefore, is

fo r the combinationof the nonredundant

Check how m a n y o f

.L

Y $? +IA burst residue error 1of length >btk-b+l

I s detected Stop IYL

9 7 Denote e=0 (mod mj ) by leimr=O.where e is the consistent solution

Fig. 3 . A decoder flowchart for single-burst erro r correction.

mate number, the redundant mixed radix digits are all zero.

However, if the redundant mixed radix digits are all zero,

then mathematically, X i could still be an illegitimate num-

ber. In [8], it was shown that an illegitimate projection

resulting from a single error cannot be smaller than the

smallest nonzero number represented by (83) with all the

nonredundant mixed radix digits zero. Therefore, Jenkins's

algor ithm [SI-[lo] for locating a single residue digit erro r

consists in checking whether the redundant mixed radix digits

are all zero for each modulus m,-projection, i = 1, 2 , . n.

In the following analysis, we will show, from the coding

theory point of view, that their algorithm can be extended for

detecting and correcting multiple residue digit errors. The

MA-pro jection of X , denoted by X,,, is defined by

XA= X mod-i 21 (84)

where M A = r Ik= ,mIm, = { i , , i2; . ., ,, . . , i,; i , < i,

< . . . < i ,< < i h } , an d hr - k = d - 1. X,

can also be represented as a reduced residue representation of

X with the residue digits x j l , i 2 , . , xi, deleted. Then, the

mixed radix representation of X , is

n 1 - 1

The legitimate and illegitimate range of the reduced RRNS

are [0, M ' ) an d [M', MM, /MA ) , espectively, where M'

is the product of the first k moduli of the reduced RRNS,

omitted here .

Theorem 15: Le t x be a number in RRNS and TA e

the MA-projection of 2, where MA = IIk=,mIu.f TA#

x,he residue representation of x, uniquely differs from xin on e or more of the residue digits corresponding to the

moduli mi , ,m,?; . , mlA.

Before considering the range of the MA-projection 2, f

any illegitimate number x n RRNS, we give the following

theorems. Theorem 16 is based on the fact that all codevec-

tors differ in at least d places in an RRNS with minimumdistance d.

Theorem 16: If X is a legitimate number in the RRNS

having minimum distance d, then any integer x difiering

from X in at least one and no more than d - 1 residue

digits is an illegitimate number.

Theorem 17: Le t 2 be an illegitimate number in the

RRNS. If there exists a legitimate number X differing from

x in the i,th, i,th; * e , i,th residue digits, then the M A -projection X, is a legitimate number, where MA=

Proof: Since 2 differs from X in the i , th,

., , th residue digits, x an be expressed as follows:

n L l m I u .

i , th,

where 0 < e' < nL=,mjm.y definition,

= x, < M .

Therefore, FA s a legitimate number. This proves the

theorem.

Theorem 18 : Let x be an illegitimate number in the

RRNS having minimum distance d. If the MA-projection

TA,M A = I I ~ = , m l u ,I < d ) , is a legitimate number,

than there exists only one legitimate number X differing

from x n one or more of the residue digits corresponding to

the moduli m,,, m r 2 , a , m,,.

8/6/2019 Sun Krishna II

http://slidepdf.com/reader/full/sun-krishna-ii 14/17

SU N AND KRISHNA: CODING THEORY APPROACH-PART I1 31

Proof: Since x # x,,t is obvious from Theorem 15

that the legitimate number X = x, s a solution to the

problem. Now assume that there exist two different legitimate

numbers X nd X ' , both differing from 2 n on e or more

of the residue digits corresponding to the moduli m ,,,

is affected by p or fewer errors corresponding to the moduli

m,,, ,? , . . . m],,.rom the definition of the reduced RRNS,

i . e . , (86). x., can be expressed as follows:

MMRd

,, X,, e' .

m i z , - . . , T h e n , ~ m = , ~ l , , ~ c y = l m , , ,

where 0 5 e, e' < n:=lm, ,x . Since 0 5 X, ' < M , 0IX , = X ' , < M , a n d M M R / I l k ; l m , ~ x M , it follows that

e = e' = 0 an d X = X' . This contradicts the original as-

sumption X # X' . This proves the theorem.

Theorem 19: In an RRNS with minimum distance d = h

+ p + 1, an illegitimate number x is originated from a

legitimate number X affected by h errors corresponding to

the moduli m,,, m, , , . a , m lA , f an only if the M.,-pl_qjection

FAs a legitimate number and the M,-projection X, s an

illegitimate number, where M A = FIk= l m l , , i M , =n : = l mj o , 1 5 P 5 3, a n d g c d ( M p . M.,) f n c y = l m l , t

Proof: By The orem 17, the M,-projection J7', is-

legitimate number. Since gcd(M,, M,) # n k = l m l , r ,X,

can be treated as a number originating from X, affected by

h or fewer errors corresponding to the moduli m , , ,m i Z ; ~ ~ ,,,, that is,

M*.I

where 0 < e' < r I : = l m, cx . By Theor em 1, M , 2

FI:=lmjar12= lm ,c y, t follows that xp s an illegitimate

number. This proves the necessity. The sufficiency is proved

by contradiction. Since FAs a legitimate number, by Theo-rem 18 there exists only one legitimate number X differing

from x n one or more of residue digits corresponding to the

moduli m, , , m,?,. Lm,A. How ever, if the legitimate num -

be r X differs from X in less than X residue digits (say p

( p < A) residue digits corres pon ding to the moduli mL,m,,; a , mjp ) then, by T heorem 17, the Mp-projection X,

is a legitimate number, where M p = r Im l c z nd gcd( M,,

M,) # M,,. This contradicts the original assumption. This

proves the theorem.

The range of the illegitimate projection Fa, f any illegiti-

mate number x s given in the following theorem.

Theorem 20: Under the assumption that no more than /3

residue errors occur, for an RRNS with d = h + + 1 an d

P_> h, if the M,,-pojection x,, f any illegitimate number

X is illegitimate, X, will be in the range [ M', MM, /M.,),where M A = r I k z l m , , x , 1 I , 5 n , an d MI is the lower

bound of the illegitimate range of the reduced RRNS.

Proof: The illegitimate projection x, an be treated as

a number originating from X,,n the reduced RRNS which

' gc d ( a , b ) denotes the greatest common divisor of a an d b

. mod where e '< n mi,,a = I

MR

where i,. 5 k + c , i,.,, > k + c.

By Theorem 1 , M R 2 ~ ~ _ , m , + m n k = c + l m , ~ ~ n , = l m , , ~ ,i t follows that

x,X ,

+M' 2 M' . This proves the

theorem.

Therefore, by checking only the redundant mixed radix

digits, it can be determined whether or not the projection is

legitimate. If all the redundant mixed radix digits are zero,

the projection is legitimate; otherwise, it is illegitimate.

Based on the above analysis, a procedure for correcting

double errors and detecting multiple errors can be outlined as

follows.

Step 1: Based on the received residue vector, compute the

mixed radix digits and check if all the redundant

mixed radix digits are zero. If yes, then declare

no error and stop. O therwise, go to next step.

Step 2: Compute the mixed radix digits of the m,mj-

projection for i = 1 , 2 ; . ., n , j = 1 , 2; e . , n ,an d i # j . Check if all the redundant m ixed radix

digits are zero. If yes, then declare the ith and

j t h residue digits are received in error, correct

them by base extension, and stop. Otherwise, go

to next step.

S t e p 3: Declare more than two errors detected. Stop.

VIII . DISCUSSION

The present-day practical algorithms for residue-error c or-

rection and detection mostly focus on single-error correction

because of the considerations of large memory space require-

ment or computational inefficiency fo r multiple error correc-

tion. Our algorithms developed above do not require large

memory space as required for table lookup. They also seem

to be much superior to the algorithms in [6] an d [9] f rom acomputational efficiency point of view, i.e., the requirement

of multiplications ( MU LT ) and additions (AD D) [13]. The

comparison of our algorithms derived in Sections IV and V

with those in [6] an d 191 in terms of the requirement of ADD

and MULT is shown in Table I. We should point out that for

double-error correction the expression in column 2 of Table I

8/6/2019 Sun Krishna II

http://slidepdf.com/reader/full/sun-krishna-ii 15/17

32 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS-11: ANALOG AND DIGITAL SIGNAL PROCESSING, VOL. 39, NO . 1, JANUARY 1992

TABLE I

T H ER E Q U I R E M E N TF M U L T OR A D D FO R S I N G L E / D O U B L ER R O R S O R R E C T I O N~ ~ ~ ~~~~~~~~~

# Error Yau and Liu’s Jenluns’s NewCorrect ion Algori thm [6 ] Algorithm [9] Algori thm

1

d = 3

2

d = 5

$ k 3 + $ k 2 + ik - 2 ( M U L T )

$k3+ f k 2+ + k ( A D D )

i k 3 + : k 2 + 2 k ( M U L T )

$ k 3+ t k z + 2 k ( A D D )

$ k 4+ $ k 3 + Yk’ + T k + 8 ( M U L T )

ak4 + T k 3 + T k 2 + T k + 8(ADD)

i k ’ + j k - I ( M U L T )

i k 2 + i k + ] (ADD)

F k 2 + T k - 2(MULT)

$ k 2 - y k + 2(ADD)

No t applicable

is obtained by extending Jenkins’s algorithm [9] as described

in the previous section. For single-burst error correction, our

method only needs to find n - k syndromes, whereas Yau

and Liu’s method has to find n syndromes. The comparison

is shown in Table 11. Mandelbaum proposed a decoding

procedure for multiple-error correction based on continued

fraction expansion and Euclid’s algorithm [151- 171. Since

this procedure needs to process large valued integers and use

an iterative process, it appears to be more suitable for a

general purpose computer. Also, it is difficult to compare

Mandelbaum’s algorithms to the algorithms presented in this

paper as the approaches are entirely different.

APPENDIXPROOF F GENERALAULT-DETECTION,

FAULT-CORRECTIONASE

In this Appendix we give an alternate proof of conditions

that allow detection of up to ,6 faults and correction of up to

h faults in a maximally redundant RRNS. We follow this

with the general procedure for finding and correcting these

faults.

., , be the actual locations of the faults in the

information digits, and let j , . , , be the locations of the

faults in the parity digits, where c + g I . Le t I; be the

reconstruction of the value modulo M using only the infor-

mation digits, but let us define the error E differently than in

Section 111. In particular, define

Le t i, ,

E = F - X .

The value E can take one of M possible values. Without

computing F or X directly, however, we can definitely state

that E is confined to the range

-M < E < M .

Now let e, = E ( m o d m;).Clearly all the digits e , are zero

except for digits i = i , * e , i,. We can therefore state that E

can be written in the form:

M

where

Let us define syndromes in the sa me way as b efore. Then

it is easy to show that

(arbi t rary , e l se .

Le t 9 an d 9’ be any (possibly overlapping) sets of indicesin the range 1,. . .,k . Suppose 9 ha s c elements and 9’ ha s

c’ elements. Let = n a’ be the intersection, with

C” I in ( c , c’) elements. Let 9’ = CP - be the ele-

ments of that are not in a’, and let a * = a’ - a’,* e the

elements of 9’ that are not in a . Now we assume that

2 1 1 m , n m , I I m k - n m , - n m k < I I m , .E @ ’ ’ JEQ’ kc@’ J E Q ’ kcQ r e t

(A . 3 )

where \E is any subset of at least c + c’ of the redundant

moduli k + 1, * , n . Note that this assumption is trivially

satisfied if

2m,m, < m,ms (A . 4 )

for any 1 I , j 5 k an d k + 1 5 r , s 5 n .Now for the main result. Assume (A.3) holds, and assume

the RRNS is maximally redundant. Now hypothesize that the

syndromes we observe might have been caused by some

alternative “different” combination of up to 0 igit failures

in information digit positions i; , . , ‘,,, and parity digit

positions j ; , .,f,!, here c’ + g’ 5 0, and h + ,6 = n -

k . (“Diffe rent” implies that at least one error informationdigit in the alternative hypothesis is assumed to have a

different value than in the correct set of error information

digits.) We show by contradiction that the syndromes of this

alternative hypothesis cannot equal those from the correct

hypothesis. U nder the alternative assumption, we hypothesize

an error - M < E’ < M , and can write this error in the

form:

ME =e’-

n:=lm,;

where

Le t @ = { i , , - * , i,] be the set of information digits thatactually failed. Let CP‘ = { i ; , . i;,} be the set of informa-

tion digits assumed to have failed in the alternative hypothe-

sis. Let 9 = { j , , . . , } be the set of parity digits that have

actually failed. Let P’ { j ; , * a , jb.}e the set of parity

digits assumed to have failed in the alternative hypothesis.

8/6/2019 Sun Krishna II

http://slidepdf.com/reader/full/sun-krishna-ii 16/17

SUN AND KRISHNA: CODING THEORY A PPROACH-PART I1 33

TABLE I1

T H ER E Q U I R E M E N TF M U L T OR A D D FOR SINGLE B U R S T RROR ORRECTION

Yau and Liu’s Algorithm [6] New Algorithm

k 2 + ( 4 b 2 - 3 b ) k - 4 b 2

k 2 + ( 4 b ’ - b ) k ( A D D )

k - (5b’ - 4 b ) ( M U L T )

1 1 2 b - 5- k 2 + ~ k - (46’ - 7 6 + 2 ) ( A D D )

2 1 2 2

k = 8 2 268 (MULT)b = 4 2 2 9 4 ( A D D )

188 (MULT)166 (ADD)

k = 12

b = 4 2 648 (ADD)

2 616 (MULT) 338 (MULT)292 (ADD)

k = 16 2 1280 (MULT)b = 8 2 1336 (ADD)

728 (MULT)

654 (ADD)

Le t e; = E’(mod m,) e the error digits in the alternative

hypothesis, with e: # 0 for all i E W . Note that this implies

that e’(mod mi)+ 0 fo r i E a’. Define

a n a‘I.2 =

@ I 7 @ - $’ J

a2 = @I’@ 1 , 2

9’ lp - q 1 . 2

9 2 = 9‘ q 1 . 2 .

= @ I 9 2 + @ I

@’ = @ I 9 2 + r p

= 9 1 . 2 + l p l

9‘ = 9 1 . 2 + 9 2 .

9 1 . 2 = 9 n 9’

Note that

Now if the alternative hypothesis could indeed explain the

observed syndromes, then we would have

Equating this with the actual value of the syndromes (A.2) in

terms of e, and using our index set definitions, we get

which implies that

1[(enmi - e’n m i )EO 2 re@’ n €* I * mn €* I min €* 2 m,

(mod n m,) = 0 .

r e { k+ 1;. , } ‘?I - I - q 2

But since the moduli are relatively prime, this implies that

(en m i - e’n m,) 6 n mrI€ @ i €@l r€ {k + 1 ; . n } - k’ ’-*I - q 2

for some integer 6. Multiply both sides by the product of th e

redundant moduli in index sets

e n m, - e ’ n m i )

9’,nd q 2 o get

n rn , = 6MR. ( A . 6 )ic@’ re*‘ . ’ +I‘ k2

No w

e n m , - e’ n m ,i€@ I

= 2 n m , - n m , - n m,., € @ I + @ * + @ i€** I€*’

Suppose set @’,’ has e” elements, where c” 5 min ( e , e ’ ),and suppose set has g ” elements , where g ” I in ( g ,

g ’ ) . By our assumption (A.3), the expression above is guar-

anteed to be less than the product of any set of c + e‘ or

more redundant moduli. Note that the set + 9 ’ 9*

ha s g + g’ - g ” redundant moduli in it, which leaves X + p- ( g + g’ - g ” ) 2 c + e’ + g” redundant moduli not in

that set. Choose any c

+e’ of these, and call this set

q.Then

en m, - e’n mi mi-

< n m , I R .

Combining this with (A.6) shows that the constant 6 = 0,

and we have

re% + I. ’+ +q 2

en m, - e ‘ n m , ( A . 7 )i€ @

But this is only possible if

e = t?n , , e‘ = m ,i€ Q ic*’

which would imply that

Also, this implies that e, = 0 for all i E @ ’ , and that e; = 0

for all i E a 2 .

8/6/2019 Sun Krishna II

http://slidepdf.com/reader/full/sun-krishna-ii 17/17

34 IEEE TRANSACTIONS O N CIRCUITS AND SYSTtMS-I1 ANALOG AND DIGITAI. SIGNAL PRO CI-SI NG. VOL 39. NO. I . JANUARY 1992

Now, we originally assumed that there were nonzero er-

rors in all the index positions in the set +, including those in

the set 9 ' .We m ust conclude that 9 ' must be a null set. and

so 9 = Our alternative hypothesis assumed that there

were nonzero errors in all the index positions in the set +',including those in the set + I . We must conclude that if the

syndromes match, then 9' is a null set, and so a ' =

Putting this together, 9 = a', and so if the syndromes match

then the alternative hypothesis must have correctly identifiedthe faulty information digits. Also note that (A.7) implies that

if 9 ' an d (P2 are null, then e = e' an d E = E' . Thus the

error information digits e, an d e ; must also match, and the

alternative hypothesis exactly matches the actual errors. We

conclude that with Assumption (A.3) and with up to X faults.

the syndromes uniquely specify the erroneous information

error digits.

A procedure to correct up to X rrors is as follows: Check

the number of nonzero syndromes. If there are none, then no

errors occu rred. If there are fewer than A, hen all errors are

in the parity digits. If there are greater than X but fewer than

/3 errors, then m ore than X rrors occurred. If there are 0 r

more nonzero syndromes, then consider all possible sets of

zero up toX

errors in information digits. For each hypothe-sis, try to solve ( A .2 ) fo r a consistent value e in the range

(A.1) . At most one of these combinations can yield a consis-

tent solution e (either positive or negative) which would

explain the non-faulty syndromes. If none yield a consistent

solution e, there must be more than X faults. Total complex-

ity is the time required to compute the base extension, plus

the time to evaluate every possible hypothesis involving X

failures.

ACKNOWLEDGMENT

The authors wish to express their thanks and appreciation

towards the reviewers for their thoughtfulness, thoroughness,

and for providing constructive criticism and insight into

many aspects of the error control problem in R R N S . W e

have a greatly improved and complete paper due to theirefforts and time. The associate editor is also to be thanked for

his assistance and guidance during the review process. The

proof in Appendix A is taken from the review of one of the

reviewers.

REFERENCES

N . S. Szabo and R. I. Tanaka. Residue Arithmetic and i ts Applica-t ion to Computer Technology.

R . W. Watson and C. W. Hastings. "Self-checked computation using

residue arithmetic." Proc. IEEE. pp . 1920- 1931, Dec. 1966.

D . Mandelbaum. "Error correction in residue arithmetic," IEEETrans . Cornput . , pp. 538-545, June 1972.

F. Barsi and P. Maeutrini , "Error correcting properties of redundantresidue number system$." IEEE Trans . Cornput.. pp. 307-315.Mar. 1973.

-. "Error detection and correction by product codes in residuenumber system." I € € € Tr a ns . Co m p u t . . vol. C-23 , pp , 915-924 ,Sept. 1974.

S . S- S Yau and Y-C Liu. "Error correction in redundant residuenumber systems." I E E E Trans . Cornput . . vol. C-22. pp. 5- 1 I , Jan.1973.

V . Ramachandran. "Single residue error correction in residue numbersystems." IE€€ Trans. Cornput.. pp . 504-507. May 1983.

M . H . Etzel and W . K . Jenkins. "Redundant residue number systemsfor error detection and correction in digital filters," I € € € Trans.Acousi .. Speech. Signal Processing, pp . 538-544, Oct. 1980.

W . K . Jenkins and E. J. Altman. "Self-checking properties of residue

number error checkers based on mixed radix conversion." I E E ETrans. Circuits Sysr . . pp . 159-167. Feb. 1988.

W . K . Jenkins. "The design of error checkers for self-checkingresidue number arithmetic." / E € € Trans. Conipui.. pp. 388-396.Apr. 1983.

M. J . Bell , Jr. and W . K . Jcnkin,. "A residue to mixed radix

convener and error checker for a five-moduli residue number system."in Proc. IE€€ I n t . Conf. A S S P . vol. 3 . 1984.

C:C. Su and H.-Y. Lo . "A n algorithm for scaling and single reaidueerror correction in residue number systems." IEEE Trans . Conzpu t ..

A. P . Shenoy and R. Kumaresan. "Fast base extension using aredundant modulus in RNS." I€€E Trans . Cornput . , pp. 292-297,Feb . 1989.

H . Krishna. K. Y. Lin. and J L D . S un. "A coding theory approach toerror control in redundant residue number systems-Part I : Theoryand \ingle error correction." pp. 8- 17. this issue.

D. M. Mandelhaum. "On a class ot' arithmetic codes and a decodingalgorithm." / € € E 7rans . In form Theory . vol. IT-22, pp. 85-88.Jan. 1976.

-. "Further results o n decoding arithmetic residue codes." I€€€

Trans In form. Theory . vo l . IT-24. pp. 643-644. Sept. 1978.

-. "A n approach to an arithmetic analog of Berlekamp's algo-ri thm." / E € € Trans. Inforr??. Theor y. vol . IT-30, pp . 758-762,

Sept. 1984.

New York: McCraw-Hill , 1967.

pp. 1053-1064. Aug 1990.

Jenn-Dong Sun. for a photograph and biogra phy, please se e page 17 of thisi \ w e .

Hari Kriahna. for a photogrdph and biography. please see page 17 of thisi \ \ue