You are on page 1of 5

1766 IEEE COMMUNICATIONS LETTERS, VOL. 25, NO.

6, JUNE 2021

An Efficient BCH Decoder for WBAN Applications


Huang-Chang Lee

Abstract— In this work, a Bose-Chaudhuri-Hocquenghem syndrome can be termed the ‘final syndrome’. A non-zero
(BCH) code decoder based on the Meggitt algorithm is imple- final syndrome indicates that the decoding result is incorrect,
mented for wireless body area network (WBAN) applications. however, checking the final syndrome is not an intrinsic
Compared to other implementations based on the popular
Peterson algorithm, the proposed decoder has the extra capability feature of the Peterson algorithm. In the proposed decoder, the
of checking the syndrome for the decoding result, and is able to syndromes corresponding to a predetermined set of correctable
detect 20 times more failed decoding results without introducing error patterns are stored in the decoder, and the errors are
additional complexity. When the proposed decoder is used as sequentially corrected by cyclically shifting the received vector
the hard-decision decoder (HDD) core of a Chase-2 decoder, the stored in a first-in-first-out (FIFO) buffer. The final syndrome
bit-error rate (BER) performance can be improved by about
0.3 dB because of the reduction in undetectable errors. Based is derived once all the cyclically shifted versions of the
on a comparison of the indices for corrected bits and those of received vector are processed. Notification of a failed decoding
the flipping bits, a test pattern reduction technique is proposed attempt is given if the final syndrome is non-zero. By using the
for the Chase-2 decoder that does not sacrifice the error-rate proposed decoder based on the Meggitt algorithm, the number
performance. The synthesis results show that the hardware of detectable failed decoding attempts increases by more than
complexity for the HDD core can be reduced by more than 50%
using a 90 nm standard cell technology. 20 times.
Based on the Chase-2 decoder [9], many BCH decoders
Index Terms— BCH code, wireless body area network for WBAN applications are able to provide a soft-decision
(WBAN), cyclic code, Chase-2 decoder.
decoder (SDD) result [3], [4], and their hard-decision decoder
I. I NTRODUCTION (HDD) cores are based on the Peterson algorithm. It is possible
that a candidate that has a non-zero final syndrome is selected
T HE IEEE 802.15.6 standard is planned for wireless body
area network (WBAN) applications [1], and adopts the
(63,51) Bose-Chaudhuri-Hocquenghem (BCH) code [2] and
as the decoding result from the Chase-2 decoder. When the
HDD core is replaced with the proposed decoder based on the
its shortened (31,19) code in order to enhance the reliability Meggitt algorithm, an invalid candidate can be rejected when
of data transmission. Many decoders have been implemented it is detected as a failed decoding attempt. The simulation
for WBAN applications [3], [4] [5], and most are based on the results show that the bit-error rate (BER) performance can be
Peterson algorithm [6]. The syndrome corresponding to the improved by about 0.3 dB with the assistance of the reduction
received vector, which is termed the ‘initial syndrome’ in this in undetectable errors. In addition, a test pattern reduction
letter, is first computed by the decoder, then the coefficients technique is proposed for the Chase-2 decoder. By comparing
for the error location polynomial (ELP) are derived based the indices of the bits corrected in the first decoding attempt
on the syndrome. The roots of the ELP that indicate the with those of the flipping bits, the number of test pattern can
locations of the error bits can be found using the Chien search be reduced and the error-rate performance can be maintained.
process. A failed decoding attempt occurs when the received The HDD core is realized using 90 nm CMOS standard cell
vector contains more errors than the correction capability. If a technology. The synthesis result shows that the total area of
failed decoding attempt is detected, a re-transmission can be the design is about 2100 μm2 , which is equivalent to about
requested and there may be a better opportunity for the correct 750 2-input NAND gates. Compared to the implementation
data to be successfully received. For decoders based on the based on the Peterson algorithm, which occupies about 5200
Peterson algorithm, a failed decoding attempt is detected when μm2 when using the same technology, the proposed decoder
an ELP that has valid roots cannot be derived from the initial only requires a hardware complexity of about 41%.
syndrome [3], [5], [7].
Thanks to the fact that BCH codes are also cyclic codes, II. BCH C ODES AND THE P ETERSON A LGORITHM
the decoder implementated in this work is based on the A BCH code is a subclass of a cyclic linear block code. For
Meggitt algorithm [8], which allows a more reliable detection an (N, K) cyclic code, a length-K information sequence u is
for the failed decoding attempt that is achieved by checking encoded to a length-N codeword v, which can be respectively
the syndrome corresponding to the decoding results. This represented as polynomials of degrees N and K, The encoding
process can be represented as v(X) = u(X)g(X), where
Manuscript received January 27, 2021; revised February 23, 2021; accepted g(X) is the generator polynomial for the code, and X N + 1 =
March 9, 2021. Date of publication March 17, 2021; date of current version
June 10, 2021. The associate editor coordinating the review of this letter and h(X)g(X), then all cyclically shifted versions of v(X) are
approving it for publication was X. Jiang. also codewords.
The author is with the Department of Electrical Engineering, Chang Gung The (63, 51) BCH code is constructed from GF(26 ), and the
University, Taoyuan 33302, Taiwan, and also with Chang Gung Memorial
Hospital, Taoyuan 33302, Taiwan (e-mail: akula.lee@gmail.com). code length is equal to N = 26 − 1. Its generator polynomial
Digital Object Identifier 10.1109/LCOMM.2021.3066246 g(X) is the LCM of the two minimum polynomials, Φ1 (X)
1558-2558 © 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.

Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY SILCHAR. Downloaded on November 09,2022 at 08:06:03 UTC from IEEE Xplore. Restrictions apply.
LEE: EFFICIENT BCH DECODER FOR WBAN APPLICATIONS 1767

and Φ3 (X). When the Peterson algorithm is applied to decod- A. Decoding Algorithm for the Proposed HDD Core
ing the BCH code, the first step is to compute the syndrome. Based on the Meggitt algorithm, the BCH code is decoded
The received vector r can be denoted as r(X) = v(X)+e(X), as a cyclic code. The received vector stored in a FIFO
where e(X) is the error pattern. Divide r(X) by Φ1 (X) buffer is cyclically shifted, and the error patterns are shifted
and Φ3 (X), the syndrome components corresponding to the at the same time. Since all cyclically shifted versions of a
remainders s1 (X) and s3 (X). These are combined as the codeword are also codewords, the decoder is designed to
syndrome s = [s1 , s3 ]. Since all codewords are multiples of identify any error located in the final register of the FIFO
g(x), they must also be multiples of both Φ1 (X) and Φ3 (X). buffer, i.e., X N −1 , for the stored vector. This means that only
A non-zero syndrome indicates that the received vector is not those syndromes corresponding to the patterns that have an
a codeword. The second step is identifying the coefficients of error located at X N −1 need to be recorded in the decoder,
the ELP based on the syndrome. The (63, 51) BCH code is and all the correctable patterns can be detected when one of
designed to correct two errors, and its ELP is represented as their errors is shifted to X N −1 .
a degree-2 polynomial: After the initial syndrome is derived, the syndromes cor-
δ(X) = 1 + δ1 X + δ2 X 2 , (1) responding to the cyclically shifted versions of the received
vector can be obtained. For instance, let r(1) (X) denote the
where δ1 = s1 and δ2 = (s31 + s3 )/s1 . The final step is one digit cyclic shift right version on the received vector r(X),
(1)
to identify the roots of the ELP by substituting all GF(26 ) and s1 (X) denotes the remainder after dividing r(1) (X) by
(1)
elements into (1), where the substitution process is known as Φ1 (X). The following equations show that s1 (X) can be
the Chien search. Each root of the ELP is corresponds to a derived from s1 (X):
single error bit index. It can be observed that when
r(1) (X) = rN −1 + r0 X + · · · + rN −2 X N −1
s1 = 0, s3 = 0, (2) = rN −1 + r0 X + · · · + rN −2 X N −1
the coefficient δ2 cannot be derived, and consequently the roots +rN −1 X N + rN −1 X N
of the ELP presented in (1) cannot be evaluated. In this case, = rN −1 + Xr(X) + rN −1 X N
the decoding process should be aborted, and a failed decoding = rN −1 (X N + 1) + Xr(X)
is altered [2].
= rN −1 Φ1 (X)h(X) + X(Φ1 (X)a(X) + s1 (X))
= rN −1 Φ1 (X)h(X) + XΦ1 (X)a(X) + Xs1 (X)
III. T HE P ROPOSED M EGGITT-BASED D ECODING
= Φ1 (X)(rN −1 h(X) + Xa(X))
Although the constraint from (2) is popular in many (1)
+Φ1 (X)a(X) + s1 (X). (3)
decoders based on the Peterson algorithm, it is only able to
detect a small number of the total failed decoding attempts. The last two rows of the previous equation show that
(1)
Let αj of GF(26 ) denote the value of the syndrome component Xs1 (X) = Φ1 (X)a(X) + s(1) (X), then s1 (X) can also be
s1 (X) corresponding to the error occuring at the j-th bit of derived as the remainder of Xs1 (X) being divided by Φ1 (X),
the receiver. When a vector containing three errors occurs at where multiplying X by s1 (X) is equal to shifting s1 (X) by
the positions of j1 , j2 and j3 is received, s1 (X) = 0 only (1)
one digit. Similarly, the syndrome s3 (X) corresponding to
happens if αj1 +αj2 +αj3 = 0, i.e., αj3 = αj1 +αj2 . However, Φ3 (X) can be derived from s3 (X).
consider that j1 and j2 are fixed, for the other 60 j3 values, this Then, it can be expected that if s is the syndrome cor-
uncorrectable vector cannot be detected by (2). In other words, responding to a correctable error pattern e, then the syn-
Eq. (2) can only detect about 1/61 = 0.0164 uncorrectable dromes s(1) , s(2) , · · · , s(N −1) corresponding to all the N − 1
vectors. The simulation results show that the constraint from cyclic shift versions of e can be derived from s, where
(2) is only able to detect less than 2% of the total number of (n) (n)
s(n) = [s1 , s3 ], n = 1, 2, · · · , N − 1. This means that,
failed decoding attempts. as long as s is stored in the decoder, all error patterns
It can be expected that, if the final syndrome correspond- e(1) , e(2) , · · · , e(N −1) can be detected by cyclically shifting
ing to the decoding result is derived, more failed decoding the received vector stored in the FIFO buffer.
attempts will be detected. According to our experiments, a
non-zero final syndrome can be used to detect more than 50%
of the failed decoding attempts. According to our experiment B. Chase-2 Decoding Based on the Proposed HDD Core
for those received vectors containing three error bits, the final The frame error rate (FER) performance for both the (63,51)
syndrome cannot detect the failed decoding attempts when and (31,19) codes are presented in Fig. 1, where BPSK
only the received vectors decoded as the other codewords are modulation is used and the signal is transmitted through
different to the transmitted codewords. the AWGN channel. The rates of undetectable errors are
Since deriving the final syndrome is not an intrinsic feature also demonstrated. Because less than 2% of the total failed
of the Peterson decoder, the proposed decoder presented decoding attempts can be detected using the constraint in
in this work is based on the Meggitt algorithm, which is (2), the undetectable error rate is almost identical to the
suitable for short cyclic codes that have a small correction FER. For detections using the final syndrome, more than 50%
capability. of the failed decoding attempts can be identified, then the

Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY SILCHAR. Downloaded on November 09,2022 at 08:06:03 UTC from IEEE Xplore. Restrictions apply.
1768 IEEE COMMUNICATIONS LETTERS, VOL. 25, NO. 6, JUNE 2021

Fig. 1. FER and undetectable error rates for a (63, 51) BCH code and its Fig. 2. BER performance for the (63, 51) BCH code and its (31, 19) shortened
(31, 19) shortened code. code.

corresponding undetectable error rate is significantly lower TABLE I


than the FER. R EDUCTION IN T EST PATTERNS
Many of the BCH decoders proposed for WBAN appli-
cations are able to provide an SDD performance using the
Chase-2 algorithm [3], [4]. The proposed decoder based on
the Meggitt algorithm can also be used as the HDD core and
can be embedded in a Chase-2 decoder. In a Chase-2 decoder,
the t least reliable bits (LRB) for the received vector r are
identified. All flipping combinations for these t LRB bits are
collected as the total number of 2t test patterns. The HDD
decoder is applied to all 2t test patterns, and the results are
the decoding candidates. The decoding candidate that has the
shortest Euclidean distance to the received signal y is selected
as the decoding result, where the received vector r is the hard- by flipping two least reliable bits in the received vector r.
decision result of y. In most case, multiple test patterns may be decoded as the
It is possible that the decoding candidate that has the same codes, and the number of test patterns required to be
shortest Euclidean distance has a non-zero final syndrome. evaluated can be reduced by comparing the indices of the
This candidate will be selected as the decoding result for corrected bits and the flipping bits, and, hence, reducing the
the Chase-2 decoder containing an HDD core based on the complexity of the Chase-2 decoder.
Peterson algorithm even it is not a codeword. This fault can Let Im1 and Im2 denote the indices of the flipping bits.
be avoided if the HDD core is replaced with the proposed The original hard decision vector r is denoted as the test
decoder based on the Meggitt algorithm. A stricter constraint pattern T00 , and the corresponding decoding result is v̂00 .
for the Chase-2 decoder can be introduced by selecting the The test pattern T01 and T10 are generated by individually
candidate that has the shortest Euclidean distance as well as a flipping the bits located at Im1 and Im2 . When both bits are
zero final syndrome. If the final syndromes for all candidates flipped, the corresponding test pattern is T11 The decoding
are non-zero, then the candidate that has the shortest Euclidean results corresponding to T01 , T10 , and T11 are denoted as
distance is selected. v̂01 , v̂10 , and v̂11 , respectively. Following the first decoding
The improvement achieved by using the stricter constraint attempt, the test patterns for the Chase-2 decoder can be
is shown in Fig. 2. The BER performance for the Chase-2 reduced by comparing the indices of the corrected bits and
decoder when using different HDD cores is compared. The the flipping bits. The details of the test pattern reduction are
results from [3] are referred to for the HDD core based on shown in Table I.
the Peterson algorithm. With the assistance of the stricter The first row of Table I shows that when there is no bit
constraint, the Chase-2 decoder using the proposed HDD core needed to be corrected in r, i.e., both s1 and s3 are all-zero
based on the Meggitt algorithm is able to provide an additional vectors, the decoding process can be immediately terminated,
coding gain of 0.3 dB for both the (63,51) and (31,19) codes and there is no requirement to decode any test patterns.
when the BER is close to 10−5 . When a non-zero s1 or s3 is detected, the first decoding
attempt is applied to T00 . In the case that a single error bit is
C. Modified Chase-2 Decoding for Test Pattern Reduction corrected, the decoding result v̂00 is derived by flipping the
Since the BCH code adopted in the WBAN standard has the bit located at the Ic1 of r. If Ic1 is equal to Im1 or Im2 , there
correction capability of t = 2, when the Chase-2 decoder is is no need to evaluate any additional test patterns. Because the
considered, there are a total of 22 = 4 test patterns generated Hamming distances between v̂00 and all the remaining three

Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY SILCHAR. Downloaded on November 09,2022 at 08:06:03 UTC from IEEE Xplore. Restrictions apply.
LEE: EFFICIENT BCH DECODER FOR WBAN APPLICATIONS 1769

Generator’, the ‘Error Detector’, and the ‘FIFO Buffer’. The


decoding process is executed sequentially and requires a
maximum of 2N clock cycles. The signal ‘Code Selection’ is
used to select N = 63 for the (63, 51) BCH code or N = 31
for the shortened (31, 19) code. Following the N -th clock
cycle, the received vector r(X) is totally loaded into the ‘FIFO
Buffer’ and the initial syndrome s = [s1 , s3 ] is simultaneously
generated by the ‘Syndrome Generator’. The signal ‘All Bits
Loaded’ then switches the MUXs. During the subsequent N
clock cycles, the cyclically shifted versions of the received
vector r(1) (X), r(2) (X), · · · , r(N −1) (X) are sequentially gen-
erated in the ‘FIFO Buffer’. At the same time, the correspond-
ing syndromes s(1) (X), s(2) (X), · · · , s(N −1) (X) are derived
by the ‘Syndrome Generator’.
Fig. 3. Average number of test patterns required for different reduction Since the (63, 51) code is expected to correct t = 2 error
strategies.
bits, the ‘Error Detector’ is a combinational logic block that
is designed to check whether any syndromes corresponding to
test patterns are less than the correction capability t = 2, the error patterns have errors equal to or less than 2. These pat-
and all the test patterns will be decoded to the same result. terns are collected in the set E = {(X 62 ), (X 0 + X 62 ), (X 1 +
However, if Ic1 is neither Im1 nor Im2 , then the distances X 62 ), · · · , (X 61 +X 62 )}. All the patterns contained in E have
between v̂00 and T10 and that between v̂00 and T10 are both an error located at X 62 . As long as a syndrome corresponding
2, and the distance between v̂00 and T11 is 3, meaning that, to any of the error patterns in E is generated by the ‘Syndrome
only T11 needs to be evaluated. Generator’, the signal ‘Error Detected’ is triggered by the
In the case where two errors are corrected, the decoding combinational logic of the ‘Error Detector’. The logic result
result v̂00 is derived by flipping the bits located at Ic1 and Ic2 ‘1’ is sent to flip the digit located at X 62 in the ‘FIFO Buffer’
of T00 . When the sets of the corrected bits and the flipping bits and update the corresponding syndrome. With the assistance
are exactly the same, i.e., v̂00 = T11 , the distances between of the cyclic shifting of the ‘FIFO Buffer’ and the ‘Syndrome
v̂00 and all the remaining three test patterns are less than 2, Generator’, the detection is able to cater for all correctable
and no additional test patterns need to be evaluated. If one of error patterns.
the corrected bits is not included in the set of flipping bits, then
an additional test pattern needs to be evaluated. For instance, B. Hardware Realization
when only one of Ic1 or Ic2 is equal to Im1 , but neither of A sequential decoder for the same (63, 51) BCH code
Ic1 or Ic2 is equal to Im2 , then the distance between v̂00 and that is implemented based on the Peterson algorithm is
T01 is 1, and the distance between v̂00 and T11 is 2. Only T10 shown in Fig. 6 in [5]. When compared to the proposed
generated by flipping the bit located at Im1 of r is required to implementation based on the Meggitt algorithm, as shown
be evaluated, where the distance between v̂00 and T10 is 3. in Fig. 4, the ‘FIFO Buffer’ and the ‘Syndrome Generator’
A similar case occurs when only one of Ic1 or Ic1 is equal to are essential for both decoders. The ‘Chain-Search’ and the
Im2 . In this case, the additional test pattern is T01 . These two ‘Key-Equation Solver’ blocks for the design presented in [5]
cases are listed in the fifth and the sixth rows of Table I. are replaced with the ‘Error Detector’ block in the proposed
Finally, when the sets of the corrected bits and the flip- decoder. The ‘Error Detector’ cooperates with the ‘FIFO
ping bits are non-overlapping, then all test patterns must be Buffer’ and the ‘Syndrome Generator’, and the cyclic-shift
evaluated. operation for the ‘FIFO Buffer’ in the Meggitt algorithm
The number of required test patterns for the Chase-2 corresponds to the substitution of the ‘Chain search’ in the
decoder being applied to the (63, 51) BCH code and the (31, Peterson algorithm. Additional sequential logic elements are
19) shortened BCH code are shown in Fig. 3. They are com- required for the ‘Chain-Search’. In contrast, ‘Error Detector’
pared to the results from [3], where the reduction technique is can be constructed using only combinational logic and com-
based on [7]. It can be observed that, for a practical SNR range pactly realized with the assistance of the synthesis tools. The
larger than 3-dB, the method listed in Table I is able to reduce ‘Error Detector’ block occupies about 525 μm2 when it is
more test patterns. The proposed method illustrated in Table I realized in 90 nm standard technology, which is equivalent to
is based on the minimum distance property of the code, and 187 2-input NAND gates.
is expected to reduce the test pattern for the Chase-2 decoder The synthesis results are shown in Table II, and the
without sacrificing the error-rate performance. comparisons with other studies are also provided. Since 2N
clock cycles are required in order to complete the decoding
IV. I MPLEMENTATION R ESULTS process without triggering early termination, then, in the
worst case, 126 clock cycles are required in order to provide
A. Decoder Structure 51 information bits when using the (63,51) BCH code. For
The implementation of the proposed decoder is shown the shortened (31,19) code, 62 clock cycles are required in
in Fig. 4 and contains three major parts: the ‘Syndrome order to provide 19 bits. To provide the 10 Mbps throughput

Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY SILCHAR. Downloaded on November 09,2022 at 08:06:03 UTC from IEEE Xplore. Restrictions apply.
1770 IEEE COMMUNICATIONS LETTERS, VOL. 25, NO. 6, JUNE 2021

Fig. 4. The proposed decoder for WBAN applications based on the Meggitt algorithm.

TABLE II to conventional decoders based on the Peterson algorithm.


H ARDWARE R EALIZATION C OMPARISON Since the final syndrome corresponding to the decoding result
is available, the proposed decoder is able to reduce the
number of undetectable errors by more than 50%. When the
Peterson algorithm is used to implement the HDD core for
the Chase-2 decoder, a candidate that has a non-zero final
syndrome is possibly being selected as the decoding result.
This type of error can be avoided if an HDD core based on
the Meggitt algorithm is used. Then the Chase-2 decoder has
the HDD core based on the proposed decoder can provide
an additional coding gain of 0.3 dB. Using the proposed
requirement specified in the IEEE 802.15.6 standard, sample test pattern reduction technique, the complexity of the Chase-
rates of 24.71 MHz and 32.63 MHz are respectively needed 2 decoder can be further reduced without sacrificing error-rate
for the (63,51) and the (31,19) codes. The proposed decoder is performance.
designed to operate at a clock frequency of 50 MHz. The area R EFERENCES
occupied and the power consumption are listed in Table II. [1] Information Technology—Telecommunications and Information
Compared to the decoder based on the Peterson algorithm Exchange Between Systems—Local and Metropolitan Area Networks—
presented in [5], the area occupied by the proposed design Part 15-6: Wireless Body Area Network, International Standard
ISO/IEC/IEEE 8802-15-6:2017(E), Oct. 2017. [Online]. Available:
based on the Meggitt algorithm is reduced to about 41%. http://www.ieee802.org/15/pub/TG6.html
Although the decoder described in [5] consumes less power, [2] S. B. Wicker, Error Control Systems for Digital Communication and
the value is measured at a clock rate of 487.5 kHz, which is too Storage. Englewood Cliffs, NJ, USA: Prentice-Hall, 1994.
[3] C.-H. Yang, T.-Y. Huang, M.-R. Li, and Y.-L. Ueng, “A 5.4 µW soft-
slow for WBAN applications, and will need to be increased by decision BCH decoder for wireless body area networks,” IEEE Trans.
15 times in order to support the required 10 Mbps throughput. Circuits Syst. I, Reg. Papers, vol. 61, no. 9, pp. 2721–2729, Sep. 2014.
In general cases, decoders based on the Peterson algorithm [4] B. Jung, T. Kim, and H. Lee, “Low-complexity non-iterative soft-
decision BCH decoder architecture for WBAN applications,” JSTS, J.
can be efficiently realized, since they are able to exploit the Semicond. Technol. Sci., vol. 16, no. 4, pp. 488–496, Aug. 2016.
advantage of the structure of the BCH codes constructed from [5] P. K. Manchi, R. Paily, and A. K. Gogoi, “Low-power digital baseband
the Galois field. However, the BCH codes adopted in the transceiver design for UWB physical layer of IEEE 802.15.6 standard,”
IEEE Trans. Ind. Informat., vol. 13, no. 5, pp. 2474–2483, Oct. 2017.
IEEE 802.15.6 standard have a maximum length of N = 63 [6] W. Peterson, “Encoding and error-correction procedures for the bose-
bits, and only t = 2 error bits are expected to be corrected, chaudhuri codes,” IEEE Trans. Inf. Theory, vol. IT-6, no. 4, pp. 459–470,
meaning that the Meggitt algorithm could be a more suitable Sep. 1960.
[7] G. Chen, L. Cao, L. Yu, and C. Chen, “Test-pattern-reduced decoding
option. for turbo product codes with multi-error-correcting eBCH codes,” IEEE
Trans. Commun., vol. 57, no. 2, pp. 307–310, Feb. 2009.
[8] J. Meggitt, “Error correcting codes and their implementation for data
V. C ONCLUSION transmission systems,” IEEE Trans. Inf. Theory, vol. IT-7, no. 4,
An efficient decoder based on the Meggitt algorithm is pp. 234–244, Oct. 1961.
[9] D. Chase, “A class of algorithms for decoding block codes with channel
designed for BCH codes intended for WBAN applications. measurement information,” IEEE Trans. Inf. Theory, vol. IT-18, no. 1,
A hardware complexity of only 41% is required compared pp. 170–182, Jan. 1972.

Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY SILCHAR. Downloaded on November 09,2022 at 08:06:03 UTC from IEEE Xplore. Restrictions apply.

You might also like