Beruflich Dokumente
Kultur Dokumente
Abstract-In this work, we study and extend the coding table replaced by appropriate computations. Consequently,
theory approach to error control in redundant residue number their implementation needs a memory space that is much
systems (RRNS). We derive new computationally efficient algo-
rithms for correcting multiple errors, single-burst error, and smaller than that required in [2]. Ramachandran [7] proposed
detecting multiple errors. These algorithms reduce the computa- a method to correct single errors that establishes a trade-off
tional complexity of the previously known algorithms by at least between computational complexity and extra redundant mod-
an order of magnitude. uli. A number of papers by Jenkins and his associates [8]-[ 111
Index terms: Algorithms, multiple errors detection and cor- applied mixed radix conversion (MRC) to digital filters and
rection, burst residue errors, redundant residue number systems,
coding theory, mixed radix conversion. residue number error checkers. Su and Lo [ 121 have used the
redundant digits of MRC as the entries to construct a lookup
table for single residue-error correction.
I. INTRODUCTION In our previous paper [ 141, we developed a coding theory
approach to error control in RRNS. The concepts of Ham-
A MONG the earliest researchers, Szabo and Tanaka [ I ]
have briefly sketched a method for single-error detec-
tion or single-error correction for use with a residue number
ming weight, minimum distance, weight distribution, and
error detection and correction capabilities in RRNS were
introduced. The necessary and sufficient conditions for the
system (RNS). However, the error correction procedure given
desired error control capability were derived from the mini-
in [ l ] is computationally inefficient. Also, it appears to be
mum distance point of view. A special case generated the
quite complicated for implementation. Watson and Hastings
maximum distance separable (MDS) RRNS. A computation-
[2] have constructed a redundant residue number system
ally efficient procedure was described for correcting single
(RRNS) to detect or correct single errors. However, their
residue error.
method for error correction needs a correction table, which
In this paper, we will extend the theory and present new
may require large memory space, thereby making it impracti-
procedures for simultaneously correcting single error and
cal for the correction of more than single residue errors.
detecting multiple errors, and simultaneously correcting dou-
Therefore, multiple-residue-error correction has not been
ble errors and detecting multiple errors. In addition, we
investigated by them. Mandelbaum [3] showed how single-
present a procedure for correcting a single-burst error.
error correction can be accomplished in an RRNS code and
This paper consists of eight sections. In Section 11, we
established that two redundant moduli with redundancy less
cover the definitions and basic coding theory for RRNS. In
than the redundancy in [2] are necessary for single residue
Section 111, we generalize the property of consistency check-
digit error correction. Later, necessary and sufficient condi-
ing for RRNS. Three computationally efficient procedures for
tions for minimal redundancy allowing the correction of the
i) simultaneously correcting single error and detecting multi-
whole class of single residue errors were derived by Barsi
ple errors, ii) simultaneously correcting double errors and
and Maestrini [4], who also developed the concept of an RNS
detecting multiple errors, and iii) correcting single-burst er-
product code (31, a concept that was earlier suggested by
ror, are presented in Sections IV. V, and VI, respectively. In
Mandelbaum. Yau and Liu [6] designed two error-correction
Section VII, we extend the previous algorithms in [4] and [9]
algorithms, one for single residue-error correction and the
for multiple-error correction and detection. Finally, we dis-
other for burst residue-error correction. Basically, the method
cuss and compare the various results in Section VIII. For
of Yau and Liu is Watson’s method with the error-correcting
reasons explained in 1141, we focus exclusively on MDS-
Manuscript received December 4, 1990: revised July 31, 1991. The work RRNS in this paper.
of J.-D. Sun was supported by a fellowahip from Chung-Shan Institute of
Science and Technology, ROC. This paper was recommended by Associate
A N D BASICCODING
11. DEFINITIONS THEORY
FOR RRNS
Editor E. J . Coyle.
The authors are with the Department of Electrical and Computer Engi-
neering, Syracuse University, Syracuse, NY 13244.1240. Let { rn,, m z , .. . , m k } be a set of k positive relatively
IEEE Log Number 9104716. prime integers called nonredundant moduli and let their
moduli. The integers in the range [0, M ) in the RRNS are where k < r l , rz I n and 1 5 i , , i , 5 k. It is worthwhile
called legitimate integers and the corresponding n-tuples are t o note here that the condition in 2) above is a sufficient
called legitimate, while the n-tuples associated with the condition.
integers in the range [ M , MM,) are called illegitimate. The
integers in the range [ M , MM,) are defined as the illegiti- 111. CONSISTENCY
CHECKING
FOR RRNS
mate numbers. In [14], we define the RRNS as an ( n , k ) For an ( n , k ) MDS-RRNS code. assume that there are c
semilinear code L?, as its codevectors satisfy the property of and g errors (c + g 5 p ) in the information and parity
linearity under certain appropriately predefined conditions. digits, respectively. Then the received residue vector can be
All the legitimate numbers are valid, and the corresponding represented as
residue vectors are said to constitute the k-dimensional code
yuy = [Yl,Y?""? Yh-9 y,+[,'*',Yn]
space. Note that all the n-tuple residue representations form
an n-dimensional vector space. Every residue representation y , = x,,I r i s n , i # i a , jz,,
a = l ,2 , . . . , c ,
in the code space is a codevector that can be divided into two
v=1,2;.., g
parts; the first k residue digits corresponding to the k
nonredundant moduli are called the information digits, and Y.,,? + e,,,(mod mi,,), 0 < e,,b < m,,??
= x,,,
the remaining n - k residue digits corresponding to the l ~ i ~ ~ s k 1,. 2a;...= c
n - k redundant moduli are called the parity digits.
Some definitions and coding theorems in the RRNS [I41 + 0 < eJJ
y,,, = xJ, ejl(mod m,&,), m,",k + 1 Ij uIn ,
will now be given in order to make this paper self-contained.
v = I , 2;.., g (9)
Definition 1: The Hamming weight o f a vector x , wt(x ) .
in an RNS is defined as the number of nonzero components where i , , i2; . ., i,. are the positions of errors in the infor-
of x. mation digits, the corresponding error values being e,,,
20 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS-11: ANALOG AND DIGITAL SIGNAL PROCESSING, VOL.. 39, NO. I , JANUARY 1992
o , . . . , ~ elc,
, o,...,~] (11) where r = 1, 2;.*, n - k , and v = 1, 2 ; * * , g.
A fundamental property of the syndrome digits is stated in
where the following theorem.
Theorem 5: Under the assumption that no more than 0
X - [XI, X,,"'> Xk]
residues are in error, for the RRNS with d = h /3 1 + +
E tf [O; * e , 0, e,, , 0 ; * * , 0, e,>,0 ; * a , 0 , elc,0 , . . . , 0 ] . ( h < 0) one of the following four cases occurs.
e,
information digit is in error; then (15)-(20) become the from (23), (24), and (26). However, it remains to be shown
following. that if the following two cases occur: 1) only one error takes
i) X +
E < M . In this case, place in the pth information digit and j # p ; and 2 ) more
than one but less than d - 1 errors take place, then at least
-
Y = X + e'-M two of {e:'.r);r = 1, 2 ; - . , n - k } and at least two of
m, { r = 1, 2 ; * . , n - k } are unequal, i.e., (25) and (26)
do not give consistent solutions. Under an additional con-
and straint on the form of the moduli, the result is established in
the following theorem.
M
A e'-( m o d m , + , ) , r = 1 , 2 ; - . , n - k . (22) Theorem 6: If the moduli of an ( n , k ) RRNS code, are
mP such that there do not exist integers n,, n,; 0 In, < m,,
0 Inc < M , = n:=
m,e, 1 Ii , 5 k , 1 5 c 5 /3 that sat-
ii) M 5 X + E < 2 M . In this case, isfy
c+ I
(23) n,Mc + n,m, = n m , , k < r,
i= I
5 n,1 5j Ik (29)
and then for either of two cases, that is, Case 1, only the p t h
information digit is received in error and J # p; and Case 2 ,
M more than one (I 6 ) residue digits are received in error, the
Ar ( e ' - m )-( mod m k + r ) , r = 1 , 2 ; . . , n - k
solutions to (25) and (26) are inconsistent.
m,
Proof: Case 1: for X +
E < M , and J # p , if the
(24) solutions to (25) are consistent, i.e., e:'.') - ('a= . . -
-
e Y k ) = e, then comparing (25) to (22), we obtain
where 0 < e' < mp. Given A I , A 2 ; . . , A n - k , based on
(21)-(24) a procedure to correct single error and detect the M
presence of up to d - 2 errors can be outlined as follows.
For J = 1, 2 , . . k , solve the congruences
a ,
-(em,
mPmJ
- e'm,) = 0 mod
( n r=t
mk+r
e y , n - k )= e, then comparing (26) to (22) we obtain algorithm to correct a single error and simultaneously detect
presence of multiple error in RRNS can be described as
follows.
ACCORDING TO THE d = Atfi+l where 0 < e' < m P m 4 . Similar to the analysis in Section
RECEIVED VECTOR. dL4,h=l,P>h
COMPUTE THE
Note Under the assumption
IV, given A , , A , ; . . , A n P k , based on (31)-(34) a proce-
SYNDROMES
dure to determine error locations and error values can be
outlined as follows.
For i = 1, 2 ; * . , k - 1, j = i + 1, i + 2 ; * * , k , solve
the congruences
and
I CONSISTE NCY-CHECK1 NG
AT THE NONREDUNDANT
MODULUS ml
CHECK HOW MANY OF
r = 1,2;..,n-k (36)
to get the values
AND STOP
ARE DETECTED
STOP (37)
M M
A, = (e' - m,m,) -(mod mk+r), eh = e-(mod mh) (44)
mPm4 mfmh
= 2 7* ' ' 9 - (34) where e = e:;), if e:).' is the consistent solution to (35);
24 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS-11: ANALOG AND DIGITAL SIGNAL PROCESSING, VOL. 39, NO. 1 , JANUARY 1992
d = A+P+I
ACCORDING TO THE d 25. A=2, P>h this decoding procedure in our subsequent analysis. Here
R ~ ~ Note
~ Under
~ the~ assumption
~ ~ f P(A)~ denotes
~ R the ~probability of occurrence of event A. The
SYNDROMES
that no more than d-3
residues a r e i n e r r o r proof of Theorem 9 is similar to the proof of lemma 3 in
NO ERROR
TWO ERRORS [ 141, and therefore, is omitted here.
CHECK STOP
Theorem 9: For detecting all single-burst errors of length
HOW MANY
b or less, an RRNS code must have d >_ b + 1.
Theorem IO: For correcting all single-burst errors of
length b or less, an RRNS code must have d 2 2 b + 1.
Proof: Let x, be a codevector other than x in !d. The
Hamming distance among x , x,, and y satisfies the triangu-
lar inequality
PERFORM THE DOUBLE-ERROR
CONSISTENCY-CHECKING FOR THE
COMBINATION OF mi AND m,
CHECK HOW MbNV S O L U T l O N S I R E
d ( Y , x) + d(Y, x,) 2 d ( x , X I ) .
CONSISTENT
EXACTLY TWO
Since d ( x , x,) 2 d and d ( y . x ) = w t ( e ) 5 b , ( e = y -
EXACTLY TWO ERRORS ONE
X),
ithANDjth i t h POSlTlON
POSIT ION d ( y , x) 2 d - b.
CORRECT T H E M
STOP
I ,-,+I I
CORRECT THEM
STOP
.. If d 2 2 6 + 1 , then d ( y . x,) 2 b +
1. thereby implying
that the length of burst-error vector e is smaller than the
length of any other burst-error vector e , , e, = y - x,. On
Denotee=O(mod m,)
by lelmi-o, where
e i s the consistent
1=1+1 4
MORE THAN TWO
ERRORS A R E
I the other hand, if the codevector x is such that wt(x) = d ,
and the nonzero digits of x are confined to d consecutive
places (examples of two such codevectors are codevectors
solution DElECTED STOP corresponding to the integers X , = n:l,’m, and X , =
2nf;=-,’in,, respectively), then for d 5 2 6 , we can show that
Fig. 2. A decoder flowchart for double-error correction and multiple-error there exists at least one codevector x, such that d ( y , x ) =
detection. w t ( e ) 2 w t ( e , ) . e , = y - x,. In this case, incorrect decod-
ing will take place. This proves the theorem.
inconsistent congruence is corresponding to the modulus The proof of‘ Theorem 11 is similar to the proof of
m l 0 .So, declare that two errors occur in the first and tenth Theorem IO, and therefore. is omitted here.
residue digits, the estimated values of erroneous digits being Theorern 11: For correcting all single-burst errors of
given by (46) and (56), that is, length b or less and simultaneously detecting all burst errors
of length b’ ( b ’ z b ) or less, an RRNS code must have
/\ M drb+b’+l.
x, E y , - e!;)- (mod m , ) = 8
mlm2 A fundamental property of the syndrome digits is stated in
the following theorem.
,’\ M
x , =~ y,, + A 4 + ( m , m , - e!<’)-- (mod m,”) 11
k +
Theorem 12: For an MDS-RRNS ( n , k ) code, ( d = n -
1=b + + b‘ l), under the assumption that no more
mlm2
than one single-burst residue error of length 5 b’ occurs,
Note that i is always equal to 1, if two errors occur in a way one of the following four cases occurs.
that one error is in information part and one error is in parity
part.
,
Case I : If all the syndromes A , A 2 , * . an^ are zero,
a ,
Consider Case a). Assume that a single-burst error of a consistent solution to (63). In other words, check if e:') <
length c (1 Ic I6 ) takes place between the ith and ( i c + nfi=Imi+a- and (62) holds by substituting e:') for or
- 1)th information digits, i.e., in the position interval [i, e?) < IIZ=,m,+,- I , and (63) holds by substituting e?) for
+
i c - 11, then (15)-(20) become the following. e?,r). Let us say either of the two conditions is satisfied for
+
i) X E < M . In this case, j = p. Then declare that a single-burst error of length Ib
M +
occurs in the position interval [ p , p b - I]. The values
Y=X+E=X+e' (58) of the errors are
ne=1m;+a- I
and
M
Ar = e' (mod m k + r ) ,r = 1, 2 ; * - , n - k.
=
:' Imi+a- 1
(59)
where e = e'') if e$') is the consistent solution to (62);
ii) M IX + E < 2 M . In this case, e = e?) if e$) is the consistent solution to (63). The correct
- M values of the erroneous residue digits are ( y , - e,) mod
Y=X+E-M=X+ m,,whereq=p, p + l ; * * , p + b - l . T h e n yisde-
coded to the codevector x,where
(60)
and
A
xq = y q , q = 1,2;.., + l;**,p + b - 1
n, q f p , p
M m , ) , q = p , p + l ; . . , p + b 1.
A
x, = y q - e,(mod -
(mod mk+r)j
(70)
r = 1,2;..,n-k (61)
Note that e , = O(mod m,) implies that no error occurs in
where 0 < e' < n : = l m i + a - l . Given A , , A , ; . . , A n - k ,
the qth digit. It is clear from (58), (59), and (62) that if a
based on (58)-(61) a procedure to determine error locations single-burst error of length c ( c 5 b) takes place in the
and error values can be outlined as follows.
For j = 1, 2,. . . , k - b + position interval [i, i c - 11 such that X +
E < M , then +
1, solve the congruences for [ j , j +
b - I] including [i, i c - 11, e'm = e:'), +
where m is the product of the moduli corresponding to the
position interval [ p, p b - 13 exclusive of [ i, i c - 11.+ +
Note that if c = b, then e' = e$') and p = i. Similarly, if a
r = 1 , 2 ; * . , n - k (62) single-burst error of length c ( c Ib ) takes place in the
position interval [i, i c - 11 such that M IX E < + +
2 M , then for [ j , j +
b - 11, including [i, i c - 11, +
e'm = e?) from (60), (61), and (63). For this case, if
c = 6 , then e' = e?) and p = i. However, it remains to be
r = 1 , 2 ; . - , n - k (63)
shown that neither (62) nor (63) has a consistent solution, if a
to get the values and e?,'). Using the last b digits of single-burst error of length c (c Ib') takes place in the
r = 1, 2, * * n - k } and the last b digits of {
{ ejl,r); e , +
position interval [i, i c - 11 which is not included in [ j ,
r = 1, 2; * * , n - k } , and by the CRT we compute the j +
b - 11. Under an additional constraint on the form of the
following values: moduli, the result is established in the following theorem.
n-k
Theorem 13: If the moduli of an ( n , k ) RRNS code are
e:) = ey*r)7''Mi (mod M i ) (64) such that there do not exist integers n B , n,; 0 In B < M B
- nR=lm,e, o In , < M , = n z = l m i a ,1 s j a , i, < k ,
r=n-k-b+ 1
n-k 1 Ic Ib'; that satisfy
e?) e?.')T;M; (mod M i ) (65)
r=n-k-b+ 1 c+ b
where
n B M c + ncMB = n m r , ,k < r,
I= 1
In (71)
+
then for [i, i c - 11 not included in [ j , j +
b - 11,
neither (64) nor (65) has a consistent solution, where a
M ' = - Mi single-burst error of length c (1 Ic I6') occurs in the
mk+r +
position interval [ i , i c - 11.
T M ; = l(mod m k + r )
Proof: Consider the extreme case, that is, [ i, i c - 11 +
(68) and [ j , j +
b - 11 do not overlap and c = b'. For X E +
and then check if ejl:' is a consistent solution to (62) or is < M , if (62) has a consistent solution e$'),then comparing
28 IEEE TRANSACTIONS ON CIRCUITS A N D SYSTEMS-11: ANALOG A N D DIGITAL SIGNAL PROCESSING, VOL. 39, NO. I , JANUARY 1992
i
b b'
e' II m j + , - l - el1)aII
a=1 =l
i II
b b'
e' m j + a - l - e;.')II m i + a - l where e' < II:= k - cl + I m ;. A procedure to determine error
a=l a= 1 locations and error values is described in the following.
b 6' n-k For j = k - b + 1, check if there exists the largest num-
< n
a= I
mj+ol-l
a= 1
mr+u-l < II m k + r .
r= I
ber c, in the range [I, b ) such that either of the following
two conditions is satisfied.
Similarly, for X +
E < M , if (63) has a consistent solution +
Condition 1): The last (b' c,) consecutive congruences
e?), then comparing (63) to (59) we get of (62) have a consistent solution, i.e..
and and
+ E - M= X being:
SUN AND KRISHNA: CODING THEORY APPROACH-PART I1 29
that there do not exist integers n B , n,; 0 In B < M B = x = IC= ]a , rr =Il m r (81)
IItzIrnjm,0 5 n , < M , = H:=lmicy, 1 Ij a , i, < k , 1 I
c Ib’; that satisfy w h e r e O I a , < m , , I = 1, 2 ; . . , n , a n d n ; = , m , = 1. In
c+ b
an ( n , k ) RRNS code, the first k mixed radix digits a , ,
nBMc + ncMB = n m , , k < r,
;= I
In (80) a 2 ,* ak are called the nonredundant mixed radix digits,
a ,
can be described as follows. reduced RRNS with the ith residue digit xi deleted. The
mixed radix representation of Xiis
Step 1: According to the received vector, we compute the
fl 1-1
syndromes.
Step 2: Check how many syndromes are zero.
xi = aln mr
r=l
I#; r#i
1) If all the syndromes are zero, then no error
occurs. Stop. where the new first k mixed radix digits are still called the
2 ) If p (1 Ip 5 b ) syndromes are nonzero, then nonredundant mixed radix digits and the rest are called the
exactly p corresponding parity digits are in redundant mixed radix digits, e.g., if i 5 k , a , ,
error. Correct them and stop. ,
a 2 , . . , ai- , ai+,,. . . , a k , ak ,
are the nonredundant
+
+
3) If b 1 to b‘ syndromes are nonzero, then go -
mixed radix digits, and a k + * , a k f 3 , . , a, are the redun-
to Step 8. dant mixed radix digits. It is obvious that if X,is a legiti-
30 IEEE TRANSACTIONS O N CIRCUITS A N D SYSTEMS-11: ANALOG A N D DIGITAL SIGNAL PROCESSING, VOL. 39, NO. 1 , JANUARY 1992
d=b+brt
According to the b ,b i.e.,
received vector
compute the Note Under the assumptionthat k+c
no more than one single-
burst residue error of length
< b occurs
M' = n m,, i ,
r= I
5 k + c , i,,, >k + c , i , Ik
r@
k
M' = M = n m,, i, > k .
r= 1
(86)
I
Y .L
Before considering the range of the MA-projection 2, of
any illegitimate number x
in RRNS, we give the following
9 7 Denote e= 0 (mod mj ) by leimr=O.
where e is the consistent solution theorems. Theorem 16 is based on the fact that all codevec-
tors differ in at least d places in an RRNS with minimum
Fig. 3 . A decoder flowchart for single-burst error correction.
distance d.
Theorem 16: If X is a legitimate number in the RRNS
mate number, the redundant mixed radix digits are all zero. having minimum distance d , then any integer difiering x
However, if the redundant mixed radix digits are all zero, from X in at least one and no more than d - 1 residue
then mathematically, X i could still be an illegitimate num- digits is an illegitimate number.
ber. In [8], it was shown that an illegitimate projection Theorem 17: Let 2 be an illegitimate number in the
resulting from a single error cannot be smaller than the RRNS. If there exists a legitimate number X differing from
smallest nonzero number represented by (83) with all the x in the i,th, i,th; * i,th residue digits, then the MA-
e ,
nonredundant mixed radix digits zero. Therefore, Jenkins's projection X, is a legitimate number, where MA =
algorithm [SI-[lo] for locating a single residue digit error nLlmIu.
consists in checking whether the redundant mixed radix digits Proof: Since 2 differs from X in the i,th,
are all zero for each modulus m,-projection, i = 1, 2, * ., n. i,th, . , i,th residue digits, x
can be expressed as follows:
In the following analysis, we will show, from the coding
theory point of view, that their algorithm can be extended for
detecting and correcting multiple residue digit errors. The
MA-projection of X , denoted by X,,, is defined by where 0 < e' < n L = , m j mBy
. definition,
XA= X
i 21mod- (84)
Proof: Since # x
that the legitimate number X =
x,, x,
it is obvious from Theorem 15
is a solution to the
is affected by
m,,,
p or fewer errors corresponding to the moduli
m,?, . . . , m],,.
From the definition of the reduced RRNS,
problem. Now assume that there exist two different legitimate
numbers X and X ' , both differing from 2 in one or more
i.e., (86).x., can be expressed as follows:
- MMR
of the residue digits corresponding to the moduli m,,, X,,= X,,+ e' .
d
miz,-.., Then, ~m=,~l,,~cy=lm,,,
rem 18 there exists only one legitimate number X differing and i # j . Check if all the redundant mixed radix
from x in one or more of residue digits corresponding to the digits are zero. If yes, then declare the ith and
j t h residue digits are received in error, correct
moduli m,,, m,?, . . . Lm,A. However, if the legitimate num-
ber X differs from X in less than X residue digits (say p them by base extension, and stop. Otherwise, go
( p < A) residue digits corresponding to the moduli mL, to next step.
m,,; mjp) then, by Theorem 17, the Mp-projection X,
a ,
Step 3: Declare more than two errors detected. Stop.
is a legitimate number, where M p = rI:- I mlczand gcd( M,, VIII. DISCUSSION
M,) # M,,. This contradicts the original assumption. This
proves the theorem. The present-day practical algorithms for residue-error cor-
The range of the illegitimate projection Fa,of any illegiti- rection and detection mostly focus on single-error correction
mate number x
is given in the following theorem. because of the considerations of large memory space require-
ment or computational inefficiency for multiple error correc-
Theorem 20: Under the assumption that no more than /3
residue errors occur, for an RRNS with d = h + 1 and + tion. Our algorithms developed above do not require large
P_> h, if the M,,-pojection x,,
of any illegitimate number memory space as required for table lookup. They also seem
to be much superior to the algorithms in [6] and [9] from a
X is illegitimate, X, will be in the range [ M ' , M M , /M.,),
where MA = rIkzlm,,x, 1 Ii, 5 n , and is the lower
MI
computational efficiency point of view, i.e., the requirement
bound of the illegitimate range of the reduced RRNS. of multiplications (MULT) and additions (ADD) [13]. The
Proof: The illegitimate projection x,
can be treated as
a number originating from X,,in the reduced RRNS which
comparison of our algorithms derived in Sections IV and V
with those in [6] and 191 in terms of the requirement of ADD
and MULT is shown in Table I. We should point out that for
' gcd ( a , b ) denotes the greatest common divisor of a and b double-error correction the expression in column 2 of Table I
32 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS-11: ANALOG AND DIGITAL SIGNAL PROCESSING, VOL. 39, NO. 1, JANUARY 1992
TABLE I
THEREQUIREMENT
OF MULT OR ADD FOR SINGLE/DOUBLE
ERRORS
CORRECTION
~ ~ ~ ~~~~~~~~~
1 +
$k3 $ k 2 + ik - 2(MULT) ik3 + : k 2 + 2k(MULT) ik’ + j k - I(MULT)
d = 3 +
$k3 f k 2 + +k(ADD) $k3 + t k z + 2k(ADD) ik2+ i k + ](ADD)
2 Not applicable $ k 4 + $ k 3 + Yk’ + T k + 8(MULT) +
F k 2 T k - 2(MULT)
d=5 ak4 + T k 3 + T k 2 + T k + 8(ADD) $k2 - yk 2(ADD)+
In this Appendix we give an alternate proof of conditions where \E is any subset of at least c c’ of the redundant +
that allow detection of up to ,6 faults and correction of up to moduli k +
1, * , n. Note that this assumption is trivially
h faults in a maximally redundant RRNS. We follow this satisfied if
with the general procedure for finding and correcting these 2m,m, < m,ms (A.4)
faults.
for any 1 Ii , j 5 k and k + 1 5 r , s 5 n.
Let i,, . , i, be the actual locations of the faults in the
Now for the main result. Assume (A.3) holds, and assume
-
information digits, and let j , ,. . ,j , be the locations of the
the RRNS is maximally redundant. Now hypothesize that the
+
faults in the parity digits, where c g IA. Let I; be the
syndromes we observe might have been caused by some
reconstruction of the value modulo M using only the infor-
alternative “different” combination of up to 0 digit failures
mation digits, but let us define the error E differently than in
in information digit positions i;, . , i‘,,, and parity digit
Section 111. In particular, define
+
positions j ; ,. . , f,!,where c’ g’ 5 0, and h ,6 = n - +
k . (“Different” implies that at least one error information
E = F-X.
digit in the alternative hypothesis is assumed to have a
The value E can take one of M possible values. Without different value than in the correct set of error information
computing F or X directly, however, we can definitely state digits.) We show by contradiction that the syndromes of this
that E is confined to the range alternative hypothesis cannot equal those from the correct
hypothesis. Under the alternative assumption, we hypothesize
-M < E < M . an error - M < E’ < M , and can write this error in the
form:
Now let e, = E(mod m;). Clearly all the digits e, are zero M
except for digits i = i ,, * i,. We can therefore state that E
e ,
E =e’-
can be written in the form: n:=lm,;
where
M
where -
Let @ = { i , , * , i,] be the set of information digits that
actually failed. Let CP‘ = { i ; , . * . , i;,} be the set of informa-
tion digits assumed to have failed in the alternative hypothe-
sis. Let 9 = { j , , . . . , j , } be the set of parity digits that have
actually failed. Let P’= { j ; , * * j b . be } the set of parity
a ,
Let us define syndromes in the same way as before. Then digits assumed to have failed in the alternative hypothesis.
SUN AND KRISHNA: CODING THEORY APPROACH-PART I1 33
TABLE I1
THEREQUIREMENT
OF MULT OR CORRECTION
ADD FOR SINGLE BURSTERROR
Yau and Liu’s Algorithm [6] New Algorithm
2
k2 + (4b’ -
1
b ) k (ADD)
1
-k2
2
+ ~
12b-5
2
k - (46’ - 76 + 2)(ADD)
k = 8 2 268 (MULT) 188 (MULT)
b = 4 2 294 (ADD) 166 (ADD)
k = 12 2 616 (MULT) 338 (MULT)
b = 4 2 648 (ADD) 292 (ADD)
k = 16 2 1280 (MULT) 728 (MULT)
b = 8 2 1336 (ADD) 654 (ADD)
Let e; = E’(mod m,)be the error digits in the alternative redundant moduli in index sets and q 2to get
9’,
hypothesis, with e: # 0 for all i E W . Note that this implies
+
that e’(mod m i ) 0 for i E a’. Define e n m, - e ’ n mi)
ic@’ re*‘.’
n+ I‘+ ‘k2
rn, = 6 M R . (A.6)
aI.2 =
a n a‘ Now
@I @ -
n m , - e’ n m ,
7 f$’J
a2 = @I’ - @1,2
e
i€@ I
91.2 = 9 n 9’
9’= lp - q1.2
9 2 = 9‘- q1.2.
Note that
= @I92 + @I
= 2
+ @ * +@
,€@I
m, - n
i€**
m, -
I€*’
m,. n n
@’ = @ I 9 2 +r p Suppose set @’,’ has e” elements, where c” 5 min ( e , e’),
= 91.2 + lpl
and suppose set has g ” elements, where g ” Imin ( g ,
g ’ ) . By our assumption (A.3), the expression above is guar-
9‘ = 91.2 +9 2 .
anteed to be less than the product of any set of c e‘ or +
Now if the alternative hypothesis could indeed explain the more redundant moduli. Note that the set 9’ 9* + +
observed syndromes, then we would have +
has g g’ - g ” redundant moduli in it, which leaves X p +
- (g + g’ - g ” ) 2 c + e’ + g” redundant moduli not in
that set. Choose any c + e’ of these, and call this set q.
Then
Equating this with the actual value of the syndromes (A.2) in en m , - e’n mi mi-
terms of e, and using our index set definitions, we get
<
re%
n
+ *I.’+ +q2
m, IM R .
(mod
r e { k + 1;.
n
, n} -‘?I -*I- q2
m,) = 0 .
e =
i€QI
e‘ =
ic*’
m,