Professional Documents
Culture Documents
I, JANUARY 1994 2m
ACKNOWLEDGMENT two Mannheim errors. The gain of the codes on a Gaussian channel
is also investigated.
The authors wish to thank Prof. E, F, Assmus for his careful and
patient reading which improved the quality of the paper,
II. CODES OVER GAUSSIAN INTEGERS
REFERENCES Gaussian integers are a subset of complex numbers which have
=
these codes when used with the Mannheim metric. First decoders are ,,,• · 1r* + ,•, hence, 'Y • ( vrr*) + ,• • (u1r) = (g- K1T) • (vrr*) + (g-
developed which are able to correct Mannheim errors of weight one 1,,*rr*) · (u1r) g · (vrr* + u1r)modp which equals g by (3).
and two. These decoders work in a similar way as the decoders for Clearly,µ defines an isomorphism, namely,µ(g1 +g2) =µ(g1) +
negacyclic codes for the Lee distance given by Berlekamp in ([l, pp. µ(g2) and JL(g1 · g2) = µ(g1) · µ(92), Although GF(p) and (],,.
207-217]). Then codes are considered which can correct more than are equivalent mathematically, we will see in the following sections
that the field GF(p) when represented as 9,,. offers significant
Manuscript received May 21, 1992. This work was presented in part at CDS- technical advantages for coding over two-dimensional signal space.
92 Conference, Kaliningrad (K()nigsberg), Russia, September 7-11, 1992, and We therefore use g,,. to stress this fact.
at the IEEE Symposium on Information Theory, San Antonio, TX, January We now define a block code C of length n over the Gaussian
17-22, 1993.
The author is with Deutsche Btindespost Tulekom, Research Institute integers g,,. as a set of codewords c = ( eo, c1, • .. , Cn -d with
FZ123a, 64276 Darmstadt, Gennany. coefficients c; E g,.. In the following, we will mainly consider linear
IEEE Log Number 9215213. codes.
III. ONE MA"HEIM ERRORCORRECTING CODES tables of some small fields, and in Table VIII a primitive element cy
We first introduce the Mannheim distance. Let a, p E 9, and and L a x for the primes p E 1mod 4 with p 5 113 are given.
y = 0 - a modx, and let the Mannheim weight of y be defined as we now consider a simp1e
+
Example I: Let p = 13, R = 3 i . 2 and cy = 1 i, then +
= IRe(T>I + IIm('Y)I,
WM(Y)
a = (1, 1+ i, 2i)
then the Mannheim distance dn/r between cy and p is defined as
dM(a, p) = W M ( ' Y ) . (6)
Let us assume that at the receiving end we get the vector t =
Note that for a E 8, the Mannheim distance d M ( a , 0) equals the
so-called Manhattan distance. Fig. 8 shows the difference between
+
(1 i, i , -1 + i), then s = H . r T = -2 = cy", and we
Manhattan and Mannheim distance modulo T = 4 i. Fig. 9 + find that at position 2 = 11mod3 we have an error value of
s. cy-' +
= i + e = (0, 0, i), + c = r - e = (1 i, i, -1).
motivates the naming chosen. As can be seen in Fig. 9 Mannheim
The codes defined by the parity check matrix of (8) can be
like Manhattan has a very regular rectangular street map. It is
generalized to the lengths n = (p' - 1)/4 called primitive lengths
also much smaller than Manhattan which symbolizes the modulo
in analogy to BCH and Berlekamp's negacyclic codes. The parity
operation, and finally the beginning of the names Mannheim and
Manhattan coincide. The Mannheim weight of the vector z = check matrix is then given by
(20, x l , - . . , z n - l ) over Q, is given by a = @, &, a',. .. ,JpV-1)/4)-1 1 (10)
where cy E 8,. is an element of order p' - 1. 8,. denotes the field
isomorphic to GF(p'). Similar to the usual Hamming distance codes
we characterize linear Mannheim error correcting codes by the triple
and the Mannheim distance of z and y by w ~ ( - y z). The [n, k , d ~ where
] n is the length, k the dimension, and
Mannheim distance like the Manhattan distance defines a metric,
as d ( z , y) = d ( y , z),d ( z , y) 2 0 with equality if z = y, and dM = min{WM(C)lC # 0, c E c} (11)
+
d ( z , z ) 5 d ( z , y) d ( y , z ) . The parameter d,,, defined as
the minimum Mannheim distance of the code.
dmax = max{dn/r(y, 0)ly E E,}, (7) To summarize, see the following.
DeJinition I: [n,n - T , 31 OMEC codes are block codes over
gives the maximum Mannheim distance which two elements of 4,
E, defined by the H matrix of (10) having length n = (p' - 1)/4,
can have. We get
dimension k = n - T and minimum Mannheim distance dM = 3
d,,, = max {a, b } - 1. for primes p 1mod 4.
To illustrate the construction in the extension field 9,. we consider
To see this, first note that for any x E B, we have [ x r * / p ]= 0, another example.
which leads to d,,, 5 "{a, b } - 1. Without loss of generality +
Example 2: Let p = 5, R = 2 i, and T = 2. To construct Q,z
assumea > b 2 O,thensettingx= (a-b-1)/2+i(a+b-1)/2 E we use the primitive polynomial p ( z ) = 'x +z - i. Then by (10)
E, we get equality (recall that as p is odd either a is even and b odd the parity check matrix
or a is odd and b even). In Table VIII d,,, is given for all primes
p = l m o d 4 and p 5 113. 0, 1, -1, 1+ i , 1 - i, -1
We start with the design of one Mannheim error correction = (1, 0, i, 4, -1+i, 1 +i). (12)
(OMEC) codes of length n = ( p - 1)/4 which are able to correct leads to a [6, 4, 31 OMEC code. To decode the received vector
errors of Mannheim weight one. A Mannheim error of weight one
takes on one of the four values f l , f i at position l(0 5 I 5 n - 1).
+
t = (1, 0, 1 i, 0, 0, 0) we compute
H = al, a', ... cy(P-1)/4)-1 1. (8) Thus, s = (-1 - i , i) = a15 (see Table VII), i.e., at position
3 = 15mod6 we have an error with value a'' = -1 and the closest
Codewords are all vectors c = (CO,c l , . - . , c n - l ) over E, which
give E . cT = 0. The corresponding generator matrix G is given by
+
codeword is c = (1, 0, 1 i, 1, 0, 0).
.=(
By sphere-packing we get
-a1, 1, 0, ...
-a2, 0 , 1 , - . .. 5.) (9)
p"-'-(4n+1)=pn-'*p'
-cy (P- 1)/4)-1 , 0, 0, a.., 1 We finish this section by showing how the OMEC codes perform
on the Gaussian channel. OMEC codes have dM = 3, hence the
That the code C defined by the above matrix H is able to smallest Euclidean distance dE between two codewords is bounded
correct any Mannheim error of weight one is immediate as by dE 2 & which results in an asymptotic coding gain of
{ a " , a'", cy3n, a4"}= { f l ,&i}. Hence, any single error from
(1, -1, i , - i } will produce a different syndrome. Decoding is G = lOlog,, (- n - T .3 ) d B
straightforward. Take the received vector r = c e and compute the+ < G,, = lOlog,, ( 3 ) dB M 4.77 dB.
syndrome (s) = HotT,the location of an error having wM(e) = 1is
then given by I = log, s mod n and its value by s.cy-'. Note that the Asymptotic coding gain means for high signal-to-noise ratio (see, e.g.,
OMEC codes are very efficient, as only one check symbol is needed [2, p. 2381 for further details). G,, gives the asymptotic coding gain
to correct a Mannheim error of weight one. In Tables I-VII exponent for very long codes where the code rate R = ( n - ~ ) / tends
n to unity.
~
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 40, NO. 1, JANUARY 1994 209
Iv. MANNHEIMERRORCORRECTING CODES HAVING d M 23 with E to be determined from the syndromes. We call U(.) error
We are interested in constructing codes which are able to correct determinator polynomial rather than error locator polynomial, as
errors of Mannheim weight greater than one. Therefore, we consider knowledge of pL1 determines both the locations 21,2 = L 1 , 2 mod n
the code C defined by the following parity check matrix E: and the values pL1*2--11, of the errors. From s1 = p L 1 +pLz, s5 =
+
p5L1 p 5 L 2 ,and E = pL1+Lzwe get
Thus,
z1,2 =
210 IEEE TRANSACTIONS ON INFORMATION THEORY,VOL. 40,NO. 1. JANUARY 1994
Another simple way to get some good short [n, n - 2, dM > 41 To finish this section let us comment on a practical aspect. Usually
codes is by shortening codes generated by g(s) = (z - p)(z - p5). data are organized in bits and bytes, hence primes like p = 41 are not
Example 5: Let R = 5+2i, cy = 2 andg(z) = ( z - c y ) - ( z - - ( ~ ~ ) . paaicularly pleasing. There are two straightforward ways to handle
By Theorem 1, g(z) generates a [7, 5, 41 code. If we only consider this problem. The first is to group a convenient number of bits or
codewords c(z) = i ( z ). g(z) of degree smaller than five we get a bytes together such that the number representable by these bits is
[5, 3, 51 code which has the following weight distribution: close to a power of p. (For example, two bytes can be efficiently
represented by three symbols from GF(41) as 216/413 M 0.95 < 1).
+ + + +
A ( z ) = 1 28z5 100r6 264z7 5 4 8 . ~ ~10202' + Thus, the nonprimitive icyclic [5, 3, 61 code of Table X can be used
+ + + + +
1 7 1 6 ~ ~ ' 2 6 8 0 ~ " 3376z1* 3 6 8 4 . ~ ~3 ~5 9 2 ~ ~ to ~ encode two bytes of information. Note also that primes of the
+ +
form p = ( b 1)2 bZ give particularly nice square QAM signal
+ + +
3 1 2 8 ~ ' ~2 2 0 0 ~ ~1 ~2 4 0 ~ ~ +
5682''
~ constellations (the parameters of [2, 1, d,] codes for the first square
+ 2082,' + 362". QAM primes are given in Table XII).
Another way is to consider nonlinear subcodes of the codes
For further codes of this kind see Table X. Theorem 1 gives a bound presented. We will explain this by a small example. The signal
on dM which dues not depend on a particular primitive element a. constellation of 0 5 + % . 4(see Fig. 6) contains the 16 QAM signal con-
In general, however, the true minimum Mannheim distance depends stellation as a subset (namely, the points { f l ,f 3 , f i , f 3 i , f ( 1 f
+
very much on the chosen cy (or 4nth root p), e.g., taking a = 2 2i Zi), f ( 2 fi)}). w e now encode in a systematic way, i.e., the infor-
in the example above only leads to a [5, 3, 41 code. mation can be read directly in the codeword. Hence the coefficients
We now give a list of [2, 1, d,] codes found with the help of of the information part can now be chosen from the 16-QAM subset
a computer. The construction is as follows. Let m E 0, then the of !&+A. Doing this costs about -1Olog,, (4/log2 (41)) M 1.27 dB.
+
code C consists of all polynomials m (z a), i.e., the codewords For example the nonlinear subcode of Example 7 would give a coding
c = (m, 6 m) with 6 chosen such that the minimum Mannheim gain of about 12.8 dB. On the other hand using a nonlinear subcode
distance is as high as possible. Tables XI-XII give the parameters gives an extra error detection capability and can help in improving
of [2, 1, d,] codes constructed in this way. Note that the coding the decoding error probability. (In a concatenation scheme this can,
gain G = l0loglo(d%/2) of these codes is much higher than e.g., be used to set erasures.) In the same way 64 or 256 QAM
1olog,, (dM/2) because of the short length n = 2. (Among the constellations can be encoded. For illustration consider the following
possible 6's which give the highest Mannheim distance d,, 6 has example:
been selected such that the coding gain is maximal.) For d, >> 1 the Example 8: Take the [2, 1, 51 code of Table XI and a
gain G can be approximated by [112, 75, 381 RS code over GF(113). Using the 64 QAM
subset of 5 ~ + ~ .in7 the information part of the codeword leads to a
nonlinear code of length 224, having 26'75codewords and minimum
Mannheim distance 190. The coding gain of this code is about
1Olog,, (75*38/112)+ 7 . 4 + 1Olog,, (6/10gz 113) dB M 20.9 dB.
For comparison, the linear [224, 75, 1901 code over C7~8+~7would
Decoding of these codes is fairly straightforward. If r = c + give a gain of M 21.5 dB.
e = (TI, TZ) = (m + +
el, 6m ez) is received, simply compute Using small subsets of large fields 8, also gives an algebraic
+ + + +
(TI t , 6 . ( T I t ) )and/or (6-' ( T Z t), TZ t ) for all t of low approach for soft-decision block coding once efficient decoders of
Mannheim weight until the closest codeword is found. e Mannheim error correcting codes are available.
~
v. EXTENSION
FOR PRIMES p E 3 mod 4
For primes p 3 mod 4 the number - 1 is a quadratic nonresidue
of p. Hence, we immediately get an isomorphism between G F ( p Z )
and G i p where
"'
* *
(P - 1)/2113
APPENDIXA 0 0 0 4) 0 0
SIGNAL CONSTELLATIONS OBTAINED FROM p = 5, 13, 17, 29, 37, 41
- ..
+
W W W W
0 . 4) 0 0 0
-t-
t
0 0
0
4B 0 0
Fig. 1. &+;.
EEE TRANSACTIONS ON INFORMATION THEORY, VOL. 40, NO. 1. JANUARY 1994
41 0 .
0 0 0 0 0 0 0 0 0 0
0 . . B 0 .
0 0 0 0 2 0 o o o o
-
0 . . 4 0 . o eA o o 0 0 0 0 0 0
-
-
- - - ..
a a
w
A
w
0
-
0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0
0 . 41 0 . 0
0 0 0 0 0 0 0 0 0 0
0 . 4) 0 . 0 0 0 0 1 0 0 0 0 0 0 0
MannhelmIm18.Jahrhundert
-* t
APPENDIXB
EXPONENT TABLESOF Grr FOR SOME SMALL FIELDS
TABLE I
h + i
s as s as s as s as
0 1 1 i 2 - 1 3 - i
S as s as s as S as
0 1 4 i 8 -1 12 -i
1 l+i 5 -l+i 9 -1-i 13 1-2
2 i'2 6 -2 10 -i*2 14 2
3 -1-i.2 7 2-i 11 l + i . 2 15 - 2 + i
TABLE IV
G5+E.2
S as S as
14 -1 21 i
15 - 2 - i - 2 22 -2+i-2
16 3-i 23 -1-2.3
17 -2 24 i.2
4 -l+i.2 2+i 18 1 - i . 2 25 -2-i
1-i 12 -1-i 19 -l+i 26 l+i
6 -1-i.2 13 -2+i 20 l + i * 2 27 2-i
TABLE V
&+i
214 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 40,NO. 1, JANUARY 1994
TABLE VI
G5+1.4
- -
S as S as -S as
-
0 1 10 i 20 -i 1
1 -1 - i . 3 11 3-i 21 -3+i
2 -is4 12 4 22 -4.
3 1-i-2 13 2+i 23 -2 - i
4 2-i.2 14 2 + i . 2 24 -2-i.2
5 -3 15 -is3 25 35 i-3
6
7
8
2
-l+i.3
l+i
16
17
18
i-2
-3-i
-l+i
26
27 1 --2i . 3
28
/I 37
36
-i e2
3+i
1-i
9 -2+i 19 - 1 - i . 2 29 l+i-2
- -
TABLE VII
G(2+i)2 CONSTRUCTED IS ROOT OF p ( z ) = x 2 + x - z
USINGa WHICH
S I as
12 (0, - 1)
13 (-170)
14 (1, -2)
15 (-1 - i,i)
+
16 (-1 i , l - i)
17 (1, -1 - i)
-
APPENDIXC correcting codes. Clearly, for any p we have Euclidean distance
TABLEOF p, n, a , d,,, U AND v FOR p 5 113 d E 2 &, hence G,, z 1 0 . log,, ( d M ) dB.
TABLE VI11
TABLEOF p , n, A p ~ h l m cy, a, u AND TABLE M
V (WHERE 1 = U . 7r + 2 , . T * ) FOR p 5 113 CODINGGAINFOR MANNHEIM
ASYMFTOTIC ERROR
C o m m c CODES
- 3 4 5 6 7 8
dnr 9 1 0 1 1 1 2 1 3
p 7r a 4“ U, 2,
dE> J3 d4 d5 d6 d7 d8 d9 JlO dll dl2 413
5 2+i -a 1 -1, l+i G,.,/dB 4.77 6.02 6.99 7.78 8.45 9.03 9.54 10.0 10.4 10.8 11.1
13 3 + i2 2 2 -2, 1+i2
17 4+i -1-i 3 -2, 2+i Note, that for short length 7~ the true minimum Euclidean distance
29 5 + i2 2 4 -2+i2, 3 d E of the codes can be higher than &, leading to a higher coding
37 6+i 2 5 -3, 3+i gain. The following table gives the gain G = 10 log,, (R . d:) for
41 5 + i4 -3+i 4 -4, l+i4 some short codes. Among them are codes which have d E > 6.
The column “primitive” indicates whether the root p1 of g ( s ) is a
53 7 + i2 2 6 -4-i, 3+i3 primitive element of 9,. The roots of g ( s ) = (z- p1) . ( s - p:)
61 6 + i5 2 5 i6 , 6-i are given in the column of PI, pz.
73 8 + i3 -3 - i3 7 -3+i4, 5-i The following table lists the few [2, 1, d,] codes which have lower
89 8 + i5 3 7 -3+i4, 54-i minimum Mannheim distance, but give higher coding gain than the
corresponding codes of Tables XI and X I .
97 9 + i4 5 8 -4+i3, 5+i To be able to compare the coding gain of the codes given with
101 10+ i 2 9 -5, 5+i the common BPSK or QPSK modulation, Table XIV gives some
109 10 i3 + -4 - i3 9 -3+i8, 7-i5 data about the signal energy per symbol E,, the energy per bit
113 8 + i7 3 7 i8 , 8-i Et, = E,/log,p and the BPSWQPSK reference 10 . log,, (4Eb).
- This value must be subtracted from the coding gain to obtain the
improvement over BPSK or QPSK (see Examples 6, 7).
APPENDIXD APPENDIXE
PERFORMANCE OF CERTAIN MANNHEIM ERROR PROPERTIES OF GAUSSIAN
hTEGERS
CORRECTING CODES For convenience well-known properties of Gaussian integers as
Table IX gives G,,,, the maximum asymptotic coding gain for needed for this paper are given. For proofs and details see, e.g.,
code rate R + 1 on a Gaussian channel by using Mannheim error [3]. The Gaussian integers are those complex numbers which have
IEEE TRANSACTIONS ON INFORMATION THEORY,VOL. 40,NO. 1, JANUARY 1994 215
- -- -
P
-
5
-
r 6
-
2+i
!!
-i
G
0.00 dB
13 +
3 i2 2 3 1.76 dB
17 4+i i2 3 3.98 dB TABLE XIV
29 5 + i2 -1 - i2 4 4.77 dB
37 6+i -2 -i 4 4.77 dB
TABLE OF E,, Et, AND IO loglo (4&)
41 + 4 - - --
53
5 i4
7 + i2
i3
-3 - i2 5
5.44 dB
5.44 dB -P - r E. E b 10 log 4Es
5 2+i 0.800 0.345 1.393 dB
61 +
6 i5 4 5 5.44 dB 13 3 + i2 2.154 0.582 3.670 dB
73 +
8 i3 -2 - i2 5 6.53 dB 17 4+i 2.824 0.691 4.414 dB
89 +
8 i5 3+i 5 7.40 dB 29 5 + i2 4.828 0.994 5.993 dB
97 +
9 i4 -2 i3 + 5 8.13 dB 37 6+i 6.162 1.183 6.750 dB
101 10+ i -3-i 5 7.40 dB 41 5 + i4 6.829 1.275 7.075 dB
109 +
10 i3 -2 i3 + 5 7.40 dB 53 7 + i2 8.830 1.542 7.900 dB
113 8 + i7 -3 i2 + 5 7.40 dB 61 6 + i5 10.164 1.714 8.360 dB
137 +
11 i4 -4 - i5 6 8.13 dB 73 8 + i3 12.164 1.965 8.955 dB
149 +
10 i7 -2 i6 + 6 8.45 dB 89 8 + i5 14.831 2.290 9.620 dB
157 +
11 i6 -2 - i3 6 8.45 dB 97 9 + i4 16.165 2.449 9.911 dB
173 13 + i2 -5 i5+ 7 8.75 dB 101 1 O + i 16.832 2.528 10.048 dB
181 +
10 i9 -1 + i4 6 8.75 dB 109 LO + i3 18.165 2.684 10.308 dB
193 12 + i7 -8 7 9.29 dB 113 8 + i7 18.832 2.761 10.432 dB
197 14 t i 4 - i2 7 9.54 dB 137 11 + i4 22.832 3.217 11.095 dB
229 15+ i2 -7 - i3 7 9.54 dB 149 LO + i7 24.832 3.440 11.386 dB
233 13+ i8 +
1 i8 7 9.78 dB 157 11 + i6 26.166 3.587 11.568 dB
241 15+ i4 -i8 7 10.21 dB 173 13 + i2 28.832 3.878 11.907dB
257 16+i +
2 i8 7 9.54 dB 181 LO + i9 30.166 4.022 12.065 dB
269 +
L3 i10 -3 - i3 7 9.78 dB 193 12 t i7 32.166 4.237 12.291 dB
277 +
14 i9 -3 - i8 7 10.21 dB 197 14 + i 32.832 4.308 12.363 dB
281 +
16 i5 -2 i4 + 7 10.21 dB 229 15 + i2 38.166 4.869 12.895 dB
293 17+i2 8 - i5 7 9.78 dB 233 13 + i8 38.833 4.938 12.956 dB
313 +
L3 i12 - 9 - i 7 10.21 dB 241 15 + i4 40.166 5.076 13.076 dB
317 +
L4 ill 2 i9 + 7 10.21 dB 257 16 + i 42.833 5.350 13.304 dB
337 16 + i9 -7 + i3 8 9.54 dB 269 3 + i10 44.833 5.554 13.467 dB
349 +
18 i5 -6 i8 + 8 10.41 dB 277 14 + i9 46.166 5.690 13.572 dB
353 17+ i8 - 7 - i 8 10.21 dB 281 16 + i5 46.833 5.757 13.623 dB
373 +
18 i7 4+i7 8 10.61 dB 293 17 + i2 4M33 5.959 13.772 dB
389 +
17 i10 -2 i5 + 8 11.14 dB 313 3 + i12 52.166 6.293 14.009 dB
397 19 + i6 -
- 5-i4 8
- 10.41 dB 317 4 t i l l 52.833 6.359 14.054 dB
337 16 + i9 56.166 6.689 14.274 dB
349 18 + i5 58.166 6.886 14.400 dB
integers as real and imaginary parts. Let 0 be the set of all Gaussian 353 17+ i8 58.833 6.951 14.441 dB
+
integers. If y = g1 igz E 0 where i2 = -1, then y* = g1 - ig2
373
389
18+ i7
+
7 i10
62.166 7.277
54.833 7.536
14.640 dB
14.792 dB
is called the conjugate of y. The norm of a Gaussian integer 397 L9+i6 56.166 7.664 14.865 dB
y = g1 + ig2 is defined by N ( y ) = g: +
g; = y . y*. There
are 4 unities, i.e., elements of 0 which have norm 1, namely f l , f i . a product of Gaussian primes is unique, apart from the order of the
The elements fy, f iy are called the associates of y. The Gaussian
e primes, the presence of unities, and ambiguities between associated
+
primes are i) 1 i and its associates, ii) the rational primes p with primes. Given any two integers y, 71, of which y1 # 0, there is
p 3 mod 4 and their associates, and iii) the factors a ib of the + +
an integer n such that y = nyl 7 2 , with N(y2) < N(y1). This
rational primes p with p 3 1mod4. The expression of an integer as permits an analogue of Euclid's algorithm for Gaussian integers.
216 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 40,NO. 1, JANUARY 1994
Performing the Euclidean algorithm with Gaussian integers is A Finite Group of Complex Integers and Its Application
almost as simple as with ordinary integers. For ordinary integers to Differentially Coherent Detection of QAM Signals
- +
a version of the basic Euclidean sequence is a = q b T where
q = [a/b]and denotes rounding to the closest integer. For Gaussian
[e] Robert G. Egri and Frank A. Homgan
integers we can define a rounding operation as follows:
+ +
Rounding of Gaussian Integers: [a i . b] = [a] i . [b]. Thus, we
+
get a Euclidean sequence a = A . p y where X = (a.p*/(Pp*)] Absfract-A finite multiplicative group of complex integers is con-
and N(y) < N ( P ) which permits the computation of the greatest structed and its application to differential detection of 16 QAM signals
common divisor between two Gaussian integers. Also similarly as is given. In this group the algebraic properties of regular complex
multiplication, such as commutativity, associativity, and conjugation are
for ordinary integers the extended Euclidean algorithm for computing preserved. The challenge in finding such a group lies in the requirements
+
gcd(P, y) = T .p s y works for Gaussian integers. for the existence of multiplicative inverses for numbers that have mag-
nitudes different from 1, and for maintaining associativity. The group
properties are used to demodulate 16 QAM signals in a differentially
coherent way.
APPENDIXF
A FASTALGORITHM POR FINDING p = a’ + b2 Index Tennrdlgebraic groups, differentially coherentdetection, QAM
signals.
For completeness we give a known algorithm to find the rep-
resentation of a prime p = 1mod4 as sum of two squares. A
detailed exposition of this algorithm can be found in [4]. To represent I. INTRODUCTION
p +
l m o d 4 as sum of two squares (p = u2 b’), the algorithm Differentially coherent detection of phase shift keyed (PSK)signals
is as follows. is a widely used technique based on delaying the received symbol
1) Find z such that z2 = -1modp. (If qnp is a quadratic and multiplying its complex conjugate with the current symbol. This
nonresidue of p then z q k 1 ) ’ 4 modp.) operation effectively provides a carrier phase reference as long as
2) Apply the Euclidean algorithm to p and z; the first two the phase variation is negligible over the duration of a few symbols
remainders less than 4 are a and b. [l]. It thereby obviates coherent carrier phase recovery, although
For further details see, e.g., Wagons paper. with performance penalty. Differentially coherent detection of phase
shift keyed signals can be represented as the product of two unit
ACKNOWLEDG~NT magnitude complex numbers, each corresponding to a symbol. The
product is a member of the signal set and represents some other
I would like to thank Dr.M. Dietrich, Dr. W. Henkel, and Dr.K. symbol. In other words, the symbol multiplications in the abstract
H. Hofmann for helpful comments. Also thanks go to one referee signal space corresponds to multiplications of complex numbers.
for helpful criticism. The detailed treatment of Gaussian integers in Of course, these complex numbers are all of unit magnitudes, and
Appendix E has been supplied at the request of a referee and the multiplication does not lead out of the signal set if the phases form
coeditor. an tgithmetic progression, with one phase being fixed to zero. In
algebraic language, the PSK symbols form a group with a one-to-one
mapping to the complex roots of unity.
REFERENCES In contrast with phase shift keyed signals nonconstant amplitude
QAM waveforms are always demodulated using phase coherent
E. R. Berlekamp, Algebmic Coding Theory. Aegean Park Press, 1984.
R. E. Blahut, Digital Transmission of Information Reading, MA: techniques. All coherent carrier phase recovery techniques suffer from
Addison-Wesley, 1990. phase ambiguities that are resolved by either a special encoding of
G. H. Hardy and E. M. Wright, An Inrroducrion to the Theory of the data symbols, or by recovering the absolute phase of the carrier
Numbers. Oxford, 1979, 5th ed. through a unique word following the carrier acquisition. While it
S. Wagon, “The Euclidean algorithm strikes again,” h e r . Marhemar. causes some loss in performance the former method is normally
Monrhly, vol. 97, no. 2. pp. 125-129, 1990.
preferred for its simplicity. In fact, certain trellis codes are designed
[5] to be rotationally invariant to remove the phase ambiguity of
the recovered carrier. In either case, the carrier recovery complicates
the hardware, and a differentially coherent demodulation would be an
attractive alternative if its reduced noise immunity could be tolerated.
Differentially coherent detection can be generalized to amplitude
modulated signals if a mapping and a group over a finite set
of complex numbers can be found such that the properties of
multiplication over the numbers is preserved as a group operation.
The challenge in finding such group lies in the requirements for the
existence of multiplicative inverses for numbers that have magnitudes
different from 1, and for maintaining associativity. Below we will