You are on page 1of 10

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 40, NO.

I, JANUARY 1994 2m

ACKNOWLEDGMENT two Mannheim errors. The gain of the codes on a Gaussian channel
is also investigated.
The authors wish to thank Prof. E, F, Assmus for his careful and
patient reading which improved the quality of the paper,
II. CODES OVER GAUSSIAN INTEGERS
REFERENCES Gaussian integers are a subset of complex numbers which have

[1] D. Augot, P. Charpin, and N. Sendrier, "Studying the locator polynomi­


als of minimum weight codewords of BCH codes," IEEE Trans. Infonn.
=
integers as real and imaginary parts. Fermat's well-known and famous
two square theorem tells us that primes of the form p 1 mod4 can
be written in essentially one way as a sum of two squares (see, e.g.,
Theory, vol. 38, pp. 960-973, May 1992.
[2] F. J. MacWilliams and N. J. A. Sloane, The Theory of Error Correcting [3, Theorem 251)). Hence such primes p are the product of two
Codes. Amsterdam: North-Holland, 1977. conjugate complex Gaussian integers:
[3] W. W. Peterson and E. J. Weldon, Jr., Error-Correcting Codes. Cam­
bridge, MA: M.LT. Press, 1972. (1)
[41 J. H. van Lint and R. M. Wilson, "On the minimum distance of cyclic
codes," IEEE Trans. Inform. Theory, vol. IT-32, pp. 23-40, Jan. 1986. where 1r = a + i · b and the conjugate of 1r is rr• a - i · b.
The properties of Gaussian integers as relevant for this paper are
Codes Over Gaussian Integers listed in Appendix E, for further details see, e.g., [3, pp. 182-187],
a fast algorithm to compute a and b for a given p can be found in
Klaus Huber Appendix F. Let Q be the Gaussian Integers and Q,,. the residue class
of Q modulo 1r, where the modulo functionµ: (} -+ Q,, is defined
according to
Abstract-In this contribution it is shown bow block codes over Gauss­
ian integers Cllll be used for coding over two-dimensional signal space. E rr•
We introduce a two-dimensional modular distance called Mannheim µ(O=Emod1r=ry=E- [ -- ] •rr. (2)
1r • 1r*
distance and propose using codes designed for this distance. Some simple
constmctions of such codes are given, among them icyclic codes which [·] denotes rounding of complex numbers which is defined in Ap­
belong to the class of constacyclic codes. As a special case icyclic codes
include perfect one Mannheim error correcting codes. For most of the 1/
pendix E such that the norm of is as small as possible (i.e., the
codes considered efficient decoders are given and their performance on energy of the corresponding signal point is as small as possible). In
the Gaussian channel is investigated. Figs. 1-6 the sets(},,. obtained from the primes p = 5, 13, 17, 29, 37,
Index Terms- Block codes, Gaussian integers, sum of two squares, and 41 are displayed as points in the complex plane. Having coding
Manhattan distance, Mannheim distance, QAM signal constellations. for communication channels in mind we call these two-dimensional
visualisations of (},,. by the communication term signal constellation.
Similarly, as for ordinary integers, we can employ the extended
I. INTRODUCTION Euclidean algorithm for Gaussian integers to compute u and v which
It is well known that the beautiful algebraic theory of block fulfill
codes over finite fields does have severe problems with coding for
two-dimensional signal constellations such as quadrature amplitude l=u•1r+v·1r•. (3)
modulation (QAM). This is mainly due to the fact that in two (or
higher) dimensions the usual Hamming distance is inappropriate. For Table VIII gives rr, u, and v for the primes p = 1 mod 4 and p ::;: 113.
phase shift keyed (PSK) signals block codes using the Lee distance The modulo functionµ. defines a bijective mapping from GF(p) into
provide a good solution, whereas neither Hamming nor Lee distance two-dimensional signal spaceµ: GF(p) -+ (},,
are adequate for handling QAM signals.
To improve the situation in the two-dimensional case we introduce µ(g)=gmod1r=;=g- - -] •1r.
[g. 1r*
(4)
the Mannheim distance which is the Manhattan distance modulo a P
two-dimensional grid. Using (3) we immediately get the inverse mapping µ.-1 as
Then we propose block codes over Gaussian integers designed
for the Mannheim distance which are suited for QAM signals. The
main class of codes considered are icyclic codes which belong to
the class of constacyclic codes ([l, p. 303]). We show the power of for if g is an integer of GF(p) then g = K • 1r + 1 and g = g* =

=
these codes when used with the Mannheim metric. First decoders are ,,,• · 1r* + ,•, hence, 'Y • ( vrr*) + ,• • (u1r) = (g- K1T) • (vrr*) + (g-
developed which are able to correct Mannheim errors of weight one 1,,*rr*) · (u1r) g · (vrr* + u1r)modp which equals g by (3).
and two. These decoders work in a similar way as the decoders for Clearly,µ defines an isomorphism, namely,µ(g1 +g2) =µ(g1) +
negacyclic codes for the Lee distance given by Berlekamp in ([l, pp. µ(g2) and JL(g1 · g2) = µ(g1) · µ(92), Although GF(p) and (],,.
207-217]). Then codes are considered which can correct more than are equivalent mathematically, we will see in the following sections
that the field GF(p) when represented as 9,,. offers significant
Manuscript received May 21, 1992. This work was presented in part at CDS- technical advantages for coding over two-dimensional signal space.
92 Conference, Kaliningrad (K()nigsberg), Russia, September 7-11, 1992, and We therefore use g,,. to stress this fact.
at the IEEE Symposium on Information Theory, San Antonio, TX, January We now define a block code C of length n over the Gaussian
17-22, 1993.
The author is with Deutsche Btindespost Tulekom, Research Institute integers g,,. as a set of codewords c = ( eo, c1, • .. , Cn -d with
FZ123a, 64276 Darmstadt, Gennany. coefficients c; E g,.. In the following, we will mainly consider linear
IEEE Log Number 9215213. codes.

0018-9448/94$04.00@ 1994 IEEE


208 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 40,NO. 1, JANUARY 1994

III. ONE MA"HEIM ERRORCORRECTING CODES tables of some small fields, and in Table VIII a primitive element cy

We first introduce the Mannheim distance. Let a, p E 9, and and L a x for the primes p E 1mod 4 with p 5 113 are given.
y = 0 - a modx, and let the Mannheim weight of y be defined as we now consider a simp1e
+
Example I: Let p = 13, R = 3 i . 2 and cy = 1 i, then +
= IRe(T>I + IIm('Y)I,
WM(Y)
a = (1, 1+ i, 2i)
then the Mannheim distance dn/r between cy and p is defined as
dM(a, p) = W M ( ' Y ) . (6)
Let us assume that at the receiving end we get the vector t =
Note that for a E 8, the Mannheim distance d M ( a , 0) equals the
so-called Manhattan distance. Fig. 8 shows the difference between
+
(1 i, i , -1 + i), then s = H . r T = -2 = cy", and we
Manhattan and Mannheim distance modulo T = 4 i. Fig. 9 + find that at position 2 = 11mod3 we have an error value of
s. cy-' +
= i + e = (0, 0, i), + c = r - e = (1 i, i, -1).
motivates the naming chosen. As can be seen in Fig. 9 Mannheim
The codes defined by the parity check matrix of (8) can be
like Manhattan has a very regular rectangular street map. It is
generalized to the lengths n = (p' - 1)/4 called primitive lengths
also much smaller than Manhattan which symbolizes the modulo
in analogy to BCH and Berlekamp's negacyclic codes. The parity
operation, and finally the beginning of the names Mannheim and
Manhattan coincide. The Mannheim weight of the vector z = check matrix is then given by
(20, x l , - . . , z n - l ) over Q, is given by a = @, &, a',. .. ,JpV-1)/4)-1 1 (10)
where cy E 8,. is an element of order p' - 1. 8,. denotes the field
isomorphic to GF(p'). Similar to the usual Hamming distance codes
we characterize linear Mannheim error correcting codes by the triple
and the Mannheim distance of z and y by w ~ ( - y z). The [n, k , d ~ where
] n is the length, k the dimension, and
Mannheim distance like the Manhattan distance defines a metric,
as d ( z , y) = d ( y , z),d ( z , y) 2 0 with equality if z = y, and dM = min{WM(C)lC # 0, c E c} (11)
+
d ( z , z ) 5 d ( z , y) d ( y , z ) . The parameter d,,, defined as
the minimum Mannheim distance of the code.
dmax = max{dn/r(y, 0)ly E E,}, (7) To summarize, see the following.
DeJinition I: [n,n - T , 31 OMEC codes are block codes over
gives the maximum Mannheim distance which two elements of 4,
E, defined by the H matrix of (10) having length n = (p' - 1)/4,
can have. We get
dimension k = n - T and minimum Mannheim distance dM = 3
d,,, = max {a, b } - 1. for primes p 1mod 4.
To illustrate the construction in the extension field 9,. we consider
To see this, first note that for any x E B, we have [ x r * / p ]= 0, another example.
which leads to d,,, 5 "{a, b } - 1. Without loss of generality +
Example 2: Let p = 5, R = 2 i, and T = 2. To construct Q,z
assumea > b 2 O,thensettingx= (a-b-1)/2+i(a+b-1)/2 E we use the primitive polynomial p ( z ) = 'x +z - i. Then by (10)
E, we get equality (recall that as p is odd either a is even and b odd the parity check matrix
or a is odd and b even). In Table VIII d,,, is given for all primes
p = l m o d 4 and p 5 113. 0, 1, -1, 1+ i , 1 - i, -1
We start with the design of one Mannheim error correction = (1, 0, i, 4, -1+i, 1 +i). (12)
(OMEC) codes of length n = ( p - 1)/4 which are able to correct leads to a [6, 4, 31 OMEC code. To decode the received vector
errors of Mannheim weight one. A Mannheim error of weight one
takes on one of the four values f l , f i at position l(0 5 I 5 n - 1).
+
t = (1, 0, 1 i, 0, 0, 0) we compute

Let a E 9, be an element of order p - 1. Now OMEC codes can be


constructed by the following parity-check matrix E:

H = al, a', ... cy(P-1)/4)-1 1. (8) Thus, s = (-1 - i , i) = a15 (see Table VII), i.e., at position
3 = 15mod6 we have an error with value a'' = -1 and the closest
Codewords are all vectors c = (CO,c l , . - . , c n - l ) over E, which
give E . cT = 0. The corresponding generator matrix G is given by
+
codeword is c = (1, 0, 1 i, 1, 0, 0).

.=(
By sphere-packing we get
-a1, 1, 0, ...
-a2, 0 , 1 , - . .. 5.) (9)
p"-'-(4n+1)=pn-'*p'

Hence, the'OMEC codes defined by (10) are perfect.


=pn.

-cy (P- 1)/4)-1 , 0, 0, a.., 1 We finish this section by showing how the OMEC codes perform
on the Gaussian channel. OMEC codes have dM = 3, hence the
That the code C defined by the above matrix H is able to smallest Euclidean distance dE between two codewords is bounded
correct any Mannheim error of weight one is immediate as by dE 2 & which results in an asymptotic coding gain of
{ a " , a'", cy3n, a4"}= { f l ,&i}. Hence, any single error from
(1, -1, i , - i } will produce a different syndrome. Decoding is G = lOlog,, (- n - T .3 ) d B
straightforward. Take the received vector r = c e and compute the+ < G,, = lOlog,, ( 3 ) dB M 4.77 dB.
syndrome (s) = HotT,the location of an error having wM(e) = 1is
then given by I = log, s mod n and its value by s.cy-'. Note that the Asymptotic coding gain means for high signal-to-noise ratio (see, e.g.,
OMEC codes are very efficient, as only one check symbol is needed [2, p. 2381 for further details). G,, gives the asymptotic coding gain
to correct a Mannheim error of weight one. In Tables I-VII exponent for very long codes where the code rate R = ( n - ~ ) / tends
n to unity.
~

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 40, NO. 1, JANUARY 1994 209

Iv. MANNHEIMERRORCORRECTING CODES HAVING d M 23 with E to be determined from the syndromes. We call U(.) error
We are interested in constructing codes which are able to correct determinator polynomial rather than error locator polynomial, as
errors of Mannheim weight greater than one. Therefore, we consider knowledge of pL1 determines both the locations 21,2 = L 1 , 2 mod n
the code C defined by the following parity check matrix E: and the values pL1*2--11, of the errors. From s1 = p L 1 +pLz, s5 =
+
p5L1 p 5 L 2 ,and E = pL1+Lzwe get

Let p E G,c be an element of order 4n and p" = i.Using (4t+l)th


powers of ,# in the rows of the parity check matrix means that if E E
{fl, fi} then t4t+1= E. If c = (CO, c l , . . . , c n - l ) is a codeword
of c then-written as a polynomial c = c(z) = cjzj-we get

~ ( p ~ ~="0,) for k = 0, 1,...,t.


from which we obtain the quadratic
Thus, we see that c(z) is multiple of a generator polynomial g(z)
which divides zn - i . Hence, C is an icyclic code, i.e., if

Thus,

Thus, multiplying c(z) by z modulo Z" - i means the following.


Shifting the codeword by one position as for cyclic codes.
The highest coefficient cn-l is rotated by 90" in the complex Putting this into the error determinator polynomial leads to either
plane and becomes CO.
Remark: If p" = -i we get nega-icyclic codes.
The check polynomial h ( z ) is defined by

z" - i = g(z). h(z). (14)


or
Definition 2: Icyclic (nega-icyclic) codes over 8,. are codes
whose codewords are multiples of a generator polynomial g(z) which 2*
z1,2=% .)-j*l(
+
divides z" - i (resp., zn i). Thus, icyclic codes belong to the class
of constacyclic codes.
To determine the true minimum Mannheim distance of icyclic Hence, there is an ambiguity which indicates that the code defined
codes (or nega-icyclic codes) defined above seems to be a difficult by the parity check matrix of (15) in general cannot correct errors of
problem, we therefore consider only the most simple cases. t = 0 Mannheim weight two. However, examples of codes which can be
gives OMEC codes, so let us treat the case t = 1 in more detail and decoded by the above formulas are contained in Table X (the codes
consider whether the following parity-check matrix E can handle with d M 2 5). The above formuhs are also useful for softdecision
Mannheim errors of weight two. decoders (see, e.g., [2, p. 2371). As the OMEC codes of the previous
section contain the above codes we clearly have d M 2 3. In fact, the
minimum distance can be as low as three as the following example
shows.
+
Example 3: Let p = 13, T = 1, n = 3, a = 1 i then using
Table II we get
Let r = c+e be a received vector. First we compute the syndrome 8:
g(z) = (z - a)* (z - 2 )= z2 + i . z - 1.
Hence, we see that d M = 3 and g(z) defines a [3,1, 31 code.
We now consider cases where (15) leads to higher Mannheim
distance. The first is given by the following theorem.
Suppose that at positions 11,2 we have Mannheim errors with Theorem 1: Forp 5 mod 12 and n = (p-1)/4 the code defined
values pL1,2-'1,2 E {fl, =ti}, then we try to compute the error by (15) has d M 2 4.
determinator polynomial (r ( z ). Proof: We show that the decoder can distinguish single and
double errors. Assume that an error of Mannheim weight one did
occur. Then sf = s5 # 0 and we get either

z1,2 =
210 IEEE TRANSACTIONS ON INFORMATION THEORY,VOL. 40,NO. 1. JANUARY 1994

or Using the [2, 1, d,] codes together with a [ N , K , DH] Ham-


ming error correcting code over GF(p) we can easily construct
23,4 =q lf
2
a). [2N, K , DH . d,] Mannheim error correcting codes as follows. Let
CH = (CO, C~,*.*,CN-I) be a codeword of the [N, K , DH] code
The case z1 = 0 can be excluded and 22 = 31 leads to the correct then the construction
error. For p E 5mod12 Gauss's reciprocity law tells us that -3
is a quadratic non-residue of p, hence, 2 3 , 4 e
8,. Thus, we can CM = (CL(@), 6 . d C O ) , FL(Cl), 6./l(Cl),.",
distinguish between single and double errors and the theorem follows. * c L ( c N - ~6)*, CL(CN-I)) (16)
For illustration consider the following example.
Example 4: For p = 17, T = 1, n = 4, using a = 1 i the + clearly gives the codewords of a [2N, K , D H d,] code. -
generator polynomial g(z) = (z - cy) (z - c y 5 ) (see Table III) gives Example 6: Take the [40, 27, DH = 141 RS code over GF(41)
a [4, 2, 41 code having the following weight distribution: and the [2, 1, d, = 41 code from Table XI to get a [80, 27, dM = 561
code over C75+i4 which reaches a coding gain of G = 10. log,, (27.
A(z)= 1 + 1 6 . + 1 6 . + 3 2 . z6 + 6 4 . 2 '
t4 t5
+
14/40) 5.44 dB M 14.9 dB (this is a gain of about 7.8 dB over
BPSK, see Table XIV).
+ 8 0 . '2 + 64 .'2 + 1 6 . 2". In the same way [n, n - T, dM = 31 OMEC codes can be used
as'inner codes leading to [ N . n, K . (n - T), D H . d ~ Mannheim
]
The codewords of weight 4 are the icyclic shifts of the codeword error correcting codes.
c = (i, -1, 2, 0), and the codewords of weight 5 the icyclic shifts Example 7: Again take the [40, 27, DH = 141 RS code over
of (2i, -2, -i, 0). Hence, the coding gain of this code on a Gaussian GF(41) and the [lo, 9, 31 OMEC code over 8 5 + i 4 to get a
channel at high signal-to-noise ratio is [400, 243, 421 code over 85+i4 which leads to a coding gain of

G = 1 0 . log,, ( i ( 2 ' + 2 . 12)) M 4.77 dB. G = 1 0 . log,, (27 . 9 .42)


40 10
dB
M 14.07 dB (about 7 dB over BPSK see Table XIV)

Another simple way to get some good short [n, n - 2, dM > 41 To finish this section let us comment on a practical aspect. Usually
codes is by shortening codes generated by g(s) = (z - p)(z - p5). data are organized in bits and bytes, hence primes like p = 41 are not
Example 5: Let R = 5+2i, cy = 2 andg(z) = ( z - c y ) - ( z - - ( ~ ~ ) . paaicularly pleasing. There are two straightforward ways to handle
By Theorem 1, g(z) generates a [7, 5, 41 code. If we only consider this problem. The first is to group a convenient number of bits or
codewords c(z) = i ( z ). g(z) of degree smaller than five we get a bytes together such that the number representable by these bits is
[5, 3, 51 code which has the following weight distribution: close to a power of p. (For example, two bytes can be efficiently
represented by three symbols from GF(41) as 216/413 M 0.95 < 1).
+ + + +
A ( z ) = 1 28z5 100r6 264z7 5 4 8 . ~ ~10202' + Thus, the nonprimitive icyclic [5, 3, 61 code of Table X can be used
+ + + + +
1 7 1 6 ~ ~ ' 2 6 8 0 ~ " 3376z1* 3 6 8 4 . ~ ~3 ~5 9 2 ~ ~ to ~ encode two bytes of information. Note also that primes of the
+ +
form p = ( b 1)2 bZ give particularly nice square QAM signal
+ + +
3 1 2 8 ~ ' ~2 2 0 0 ~ ~1 ~2 4 0 ~ ~ +
5682''
~ constellations (the parameters of [2, 1, d,] codes for the first square
+ 2082,' + 362". QAM primes are given in Table XII).
Another way is to consider nonlinear subcodes of the codes
For further codes of this kind see Table X. Theorem 1 gives a bound presented. We will explain this by a small example. The signal
on dM which dues not depend on a particular primitive element a. constellation of 0 5 + % . 4(see Fig. 6) contains the 16 QAM signal con-
In general, however, the true minimum Mannheim distance depends stellation as a subset (namely, the points { f l ,f 3 , f i , f 3 i , f ( 1 f
+
very much on the chosen cy (or 4nth root p), e.g., taking a = 2 2i Zi), f ( 2 fi)}). w e now encode in a systematic way, i.e., the infor-
in the example above only leads to a [5, 3, 41 code. mation can be read directly in the codeword. Hence the coefficients
We now give a list of [2, 1, d,] codes found with the help of of the information part can now be chosen from the 16-QAM subset
a computer. The construction is as follows. Let m E 0, then the of !&+A. Doing this costs about -1Olog,, (4/log2 (41)) M 1.27 dB.
+
code C consists of all polynomials m (z a), i.e., the codewords For example the nonlinear subcode of Example 7 would give a coding
c = (m, 6 m) with 6 chosen such that the minimum Mannheim gain of about 12.8 dB. On the other hand using a nonlinear subcode
distance is as high as possible. Tables XI-XII give the parameters gives an extra error detection capability and can help in improving
of [2, 1, d,] codes constructed in this way. Note that the coding the decoding error probability. (In a concatenation scheme this can,
gain G = l0loglo(d%/2) of these codes is much higher than e.g., be used to set erasures.) In the same way 64 or 256 QAM
1olog,, (dM/2) because of the short length n = 2. (Among the constellations can be encoded. For illustration consider the following
possible 6's which give the highest Mannheim distance d,, 6 has example:
been selected such that the coding gain is maximal.) For d, >> 1 the Example 8: Take the [2, 1, 51 code of Table XI and a
gain G can be approximated by [112, 75, 381 RS code over GF(113). Using the 64 QAM
subset of 5 ~ + ~ .in7 the information part of the codeword leads to a
nonlinear code of length 224, having 26'75codewords and minimum
Mannheim distance 190. The coding gain of this code is about
1Olog,, (75*38/112)+ 7 . 4 + 1Olog,, (6/10gz 113) dB M 20.9 dB.
For comparison, the linear [224, 75, 1901 code over C7~8+~7would
Decoding of these codes is fairly straightforward. If r = c + give a gain of M 21.5 dB.
e = (TI, TZ) = (m + +
el, 6m ez) is received, simply compute Using small subsets of large fields 8, also gives an algebraic
+ + + +
(TI t , 6 . ( T I t ) )and/or (6-' ( T Z t), TZ t ) for all t of low approach for soft-decision block coding once efficient decoders of
Mannheim weight until the closest codeword is found. e Mannheim error correcting codes are available.
~

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 40, NO. 1, JANUARY 1994 21 1

v. EXTENSION
FOR PRIMES p E 3 mod 4
For primes p 3 mod 4 the number - 1 is a quadratic nonresidue
of p. Hence, we immediately get an isomorphism between G F ( p Z )
and G i p where

Gzp = {k + i. Elk, E E { - ( p - 1)/2,. - 1, 0, 1 , . * * ,

"'
* *

(P - 1)/2113

by constructing GF(pZ)using the irreducible polynomial '2 1. As +


an example the set GZ3 is visualised in Fig. 7. In this way the results
of the previous sections can be extended simply by replacing p + p z .
+
Example 9: Using 6 = 1 i, the c = (m, 5 m ) construction Fig. 2. &+*.z.
leads to a [2, 1, 31 code over GF(3') which is identical to the perfect
icyclic OMEC code. The gain of this code is G M 1.76 dB.
In the same way S = 2 + i . 2 leads to a [2, 1, 51 code over GF(7')
+ -
and S = 2 i 3 to a [2, 1, 61 code over GF(11') having gains of
6.53 dB and 8.13 dB, respectively.

VI. CONCLUSION AND SUGGESTIONS FOR FURTHER RESEARCH


It has been shown how a new two-dimensional modular distance
called Mannheim distance can be used for the construction of
efficient block codes for QAM signal constellations. The focus of
this paper has been on channel coding, although other applications are
conceivable. The Mannheim distance is much better suited for coding
over two dimensional signal space than the Hamming distance, as
it-in a sense-approximates the Euclidean distance, which means
that vectors which are close according to the Euclidean metric are
also close according to the Mannheim metric (ignoring quantization
effects). The Mannheim metric allows an algebraic approach in an
area which is nowadays mainly dominated by nonalgebraic convo-
lutional codes. Also the codes presented here are 90" rotationally
invariant, which is very useful in communications. This paper also
gives rise to many research problems including the following.
1) The determination of all perfect Mannheim error correcting
codes.
2) The development of tight bounds for Mannheim error correcting
codes.
3) The determination of the true minimum Mannheim distance of
icyclic Mannheim error correcting codes.
4) The development of ,an efficient decoding algorithm for e-
Mannheim error correcting icyclic codes, which will enable algebraic
soft decision decoding of block codes.
5) The determination of the minimum Mannheim distance of t-
error correcting BCH- and RS-codes (or other well-known classes
of codes).
6) The use of the Mannheim distance for sphere packing. 0 0 1) 0 0

APPENDIXA 0 0 0 4) 0 0
SIGNAL CONSTELLATIONS OBTAINED FROM p = 5, 13, 17, 29, 37, 41
- ..
+
W W W W

0 . 4) 0 0 0

-t-
t
0 0

0
4B 0 0

Fig. 1. &+;.
EEE TRANSACTIONS ON INFORMATION THEORY, VOL. 40, NO. 1. JANUARY 1994

41 0 .
0 0 0 0 0 0 0 0 0 0
0 . . B 0 .
0 0 0 0 2 0 o o o o
-
0 . . 4 0 . o eA o o 0 0 0 0 0 0

-
-
- - - ..
a a
w
A
w
0
-
0 0 0 0 0 0 0 0 0

0 0 0 0 0 0 0 0 0 0
0 . 41 0 . 0
0 0 0 0 0 0 0 0 0 0

0 . 4) 0 . 0 0 0 0 1 0 0 0 0 0 0 0

Fig. 8. The Manhattan distance between A = -2 +


and B = 1 +
2i
0 . +
equds 4. The Mannheim distance mod4 i between A and E equals 1, as
-2 + a E 2 +
2imod4 +
z.

MannhelmIm18.Jahrhundert

-* t

Fig. 7. Gi3. Fig. 9. Street map of Mannheim.


1
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 40,NO. 1, JANUARY 1994

APPENDIXB
EXPONENT TABLESOF Grr FOR SOME SMALL FIELDS

TABLE I
h + i

s as s as s as s as
0 1 1 i 2 - 1 3 - i

S as s as s as S as
0 1 4 i 8 -1 12 -i
1 l+i 5 -l+i 9 -1-i 13 1-2
2 i'2 6 -2 10 -i*2 14 2
3 -1-i.2 7 2-i 11 l + i . 2 15 - 2 + i

TABLE IV
G5+E.2

S as S as
14 -1 21 i
15 - 2 - i - 2 22 -2+i-2
16 3-i 23 -1-2.3
17 -2 24 i.2
4 -l+i.2 2+i 18 1 - i . 2 25 -2-i
1-i 12 -1-i 19 -l+i 26 l+i
6 -1-i.2 13 -2+i 20 l + i * 2 27 2-i

TABLE V
&+i
214 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 40,NO. 1, JANUARY 1994

TABLE VI
G5+1.4
- -
S as S as -S as
-
0 1 10 i 20 -i 1
1 -1 - i . 3 11 3-i 21 -3+i
2 -is4 12 4 22 -4.
3 1-i-2 13 2+i 23 -2 - i
4 2-i.2 14 2 + i . 2 24 -2-i.2
5 -3 15 -is3 25 35 i-3
6
7
8
2
-l+i.3
l+i
16
17
18
i-2
-3-i
-l+i
26
27 1 --2i . 3
28
/I 37
36
-i e2
3+i
1-i
9 -2+i 19 - 1 - i . 2 29 l+i-2
- -
TABLE VII
G(2+i)2 CONSTRUCTED IS ROOT OF p ( z ) = x 2 + x - z
USINGa WHICH

S I as
12 (0, - 1)
13 (-170)
14 (1, -2)
15 (-1 - i,i)
+
16 (-1 i , l - i)
17 (1, -1 - i)
-
APPENDIXC correcting codes. Clearly, for any p we have Euclidean distance
TABLEOF p, n, a , d,,, U AND v FOR p 5 113 d E 2 &, hence G,, z 1 0 . log,, ( d M ) dB.

TABLE VI11
TABLEOF p , n, A p ~ h l m cy, a, u AND TABLE M
V (WHERE 1 = U . 7r + 2 , . T * ) FOR p 5 113 CODINGGAINFOR MANNHEIM
ASYMFTOTIC ERROR
C o m m c CODES
- 3 4 5 6 7 8
dnr 9 1 0 1 1 1 2 1 3
p 7r a 4“ U, 2,
dE> J3 d4 d5 d6 d7 d8 d9 JlO dll dl2 413
5 2+i -a 1 -1, l+i G,.,/dB 4.77 6.02 6.99 7.78 8.45 9.03 9.54 10.0 10.4 10.8 11.1
13 3 + i2 2 2 -2, 1+i2
17 4+i -1-i 3 -2, 2+i Note, that for short length 7~ the true minimum Euclidean distance
29 5 + i2 2 4 -2+i2, 3 d E of the codes can be higher than &, leading to a higher coding
37 6+i 2 5 -3, 3+i gain. The following table gives the gain G = 10 log,, (R . d:) for
41 5 + i4 -3+i 4 -4, l+i4 some short codes. Among them are codes which have d E > 6.
The column “primitive” indicates whether the root p1 of g ( s ) is a
53 7 + i2 2 6 -4-i, 3+i3 primitive element of 9,. The roots of g ( s ) = (z- p1) . ( s - p:)
61 6 + i5 2 5 i6 , 6-i are given in the column of PI, pz.
73 8 + i3 -3 - i3 7 -3+i4, 5-i The following table lists the few [2, 1, d,] codes which have lower
89 8 + i5 3 7 -3+i4, 54-i minimum Mannheim distance, but give higher coding gain than the
corresponding codes of Tables XI and X I .
97 9 + i4 5 8 -4+i3, 5+i To be able to compare the coding gain of the codes given with
101 10+ i 2 9 -5, 5+i the common BPSK or QPSK modulation, Table XIV gives some
109 10 i3 + -4 - i3 9 -3+i8, 7-i5 data about the signal energy per symbol E,, the energy per bit
113 8 + i7 3 7 i8 , 8-i Et, = E,/log,p and the BPSWQPSK reference 10 . log,, (4Eb).
- This value must be subtracted from the coding gain to obtain the
improvement over BPSK or QPSK (see Examples 6, 7).

APPENDIXD APPENDIXE
PERFORMANCE OF CERTAIN MANNHEIM ERROR PROPERTIES OF GAUSSIAN
hTEGERS
CORRECTING CODES For convenience well-known properties of Gaussian integers as
Table IX gives G,,,, the maximum asymptotic coding gain for needed for this paper are given. For proofs and details see, e.g.,
code rate R + 1 on a Gaussian channel by using Mannheim error [3]. The Gaussian integers are those complex numbers which have
IEEE TRANSACTIONS ON INFORMATION THEORY,VOL. 40,NO. 1, JANUARY 1994 215

TABLE X TABLE XII


GAINFOR SOME COD= GENERATED BY g(x) = (x - h ) ( z
CODING - p:) TABLEOFSQUAREQAM[~,
1, ~ , ] C ~ D E S ~ C O N S T R U C T I O N C6.m)
(na, =
-
- - -
- G 01 02 -
P U 6 a G
E -i -i 5
13
2+i
+
3 i2
-i
2 3
0.00 dB
1.76 dB
4.77 dB l+i -l+i
e l+i -l+i 41 +
5 i4 i3 4 5.44 dB
4.56 dB 2 -2-i2 61 +
6 i5 4 5 5.44 dB
4.26 dB 2 -2-i2 113 8+i7 +
-3 i2 5 7.40 dB
4.77 dB 2 -2-i2 181 +
10 i9 +
-1 i4 6 8.75 dB
3.98 dB 2 -2-i2 313 +
13 i12 -9 - i 7 10.21 dB
-1-2; -3+i 421 +
15 i14 +
-2 i5 8 10.61 dB
4.93 dB 2 l+i 613 +
18 i17 +
6 i2 9 11.76 dB
4.77 dB 2 l+i 761 +
20 i19 -
-6 i13 9 11.90 dB
4.56 dB 2 l t i 1013 23 + i22 -
-9 i6 10 12.90 dB
4.26 dB 2 l+i 1201 +
25 i24 -20 - i2 11 13.22 dB
4.77 dB 2 l+i 1301 26 + i25 21 + i2 11 13.12 dB
3.98 dB 2 l+i 1741 +
30 i29 +
2 i21 12 13.98 dB
E 2 l+i 1861 +
31 i30 -24 - i6 12 14.23 dB
4.81 dB -1-3i -3 2113 +
33 i32 12 - i 13 14.23 dB
5.05 dB -1-3i -3 2381
- +
35 i34 -
-19 i13 -
13 14.91 dB
5.56 dB -4; i
5.56 dB -1-3; -3 TABLE XIII
4.77 dB -4; i TABLE OF [2 1, d,] CODESWTIH 6 SELECTED G mG
FOR MAXIMAL
5.44 dB 1 - 21 -3i
3.68 dB -1-3; -3
e
- -4; i 61
157
6+i5
11+ i 6
3
i4
4
5
6.53dB
8.75 dB

- -- -
P
-
5
-
r 6
-
2+i
!!
-i
G
0.00 dB
13 +
3 i2 2 3 1.76 dB
17 4+i i2 3 3.98 dB TABLE XIV
29 5 + i2 -1 - i2 4 4.77 dB
37 6+i -2 -i 4 4.77 dB
TABLE OF E,, Et, AND IO loglo (4&)
41 + 4 - - --
53
5 i4
7 + i2
i3
-3 - i2 5
5.44 dB
5.44 dB -P - r E. E b 10 log 4Es
5 2+i 0.800 0.345 1.393 dB
61 +
6 i5 4 5 5.44 dB 13 3 + i2 2.154 0.582 3.670 dB
73 +
8 i3 -2 - i2 5 6.53 dB 17 4+i 2.824 0.691 4.414 dB
89 +
8 i5 3+i 5 7.40 dB 29 5 + i2 4.828 0.994 5.993 dB
97 +
9 i4 -2 i3 + 5 8.13 dB 37 6+i 6.162 1.183 6.750 dB
101 10+ i -3-i 5 7.40 dB 41 5 + i4 6.829 1.275 7.075 dB
109 +
10 i3 -2 i3 + 5 7.40 dB 53 7 + i2 8.830 1.542 7.900 dB
113 8 + i7 -3 i2 + 5 7.40 dB 61 6 + i5 10.164 1.714 8.360 dB
137 +
11 i4 -4 - i5 6 8.13 dB 73 8 + i3 12.164 1.965 8.955 dB
149 +
10 i7 -2 i6 + 6 8.45 dB 89 8 + i5 14.831 2.290 9.620 dB
157 +
11 i6 -2 - i3 6 8.45 dB 97 9 + i4 16.165 2.449 9.911 dB
173 13 + i2 -5 i5+ 7 8.75 dB 101 1 O + i 16.832 2.528 10.048 dB
181 +
10 i9 -1 + i4 6 8.75 dB 109 LO + i3 18.165 2.684 10.308 dB
193 12 + i7 -8 7 9.29 dB 113 8 + i7 18.832 2.761 10.432 dB
197 14 t i 4 - i2 7 9.54 dB 137 11 + i4 22.832 3.217 11.095 dB
229 15+ i2 -7 - i3 7 9.54 dB 149 LO + i7 24.832 3.440 11.386 dB
233 13+ i8 +
1 i8 7 9.78 dB 157 11 + i6 26.166 3.587 11.568 dB
241 15+ i4 -i8 7 10.21 dB 173 13 + i2 28.832 3.878 11.907dB
257 16+i +
2 i8 7 9.54 dB 181 LO + i9 30.166 4.022 12.065 dB
269 +
L3 i10 -3 - i3 7 9.78 dB 193 12 t i7 32.166 4.237 12.291 dB
277 +
14 i9 -3 - i8 7 10.21 dB 197 14 + i 32.832 4.308 12.363 dB
281 +
16 i5 -2 i4 + 7 10.21 dB 229 15 + i2 38.166 4.869 12.895 dB
293 17+i2 8 - i5 7 9.78 dB 233 13 + i8 38.833 4.938 12.956 dB
313 +
L3 i12 - 9 - i 7 10.21 dB 241 15 + i4 40.166 5.076 13.076 dB
317 +
L4 ill 2 i9 + 7 10.21 dB 257 16 + i 42.833 5.350 13.304 dB
337 16 + i9 -7 + i3 8 9.54 dB 269 3 + i10 44.833 5.554 13.467 dB
349 +
18 i5 -6 i8 + 8 10.41 dB 277 14 + i9 46.166 5.690 13.572 dB
353 17+ i8 - 7 - i 8 10.21 dB 281 16 + i5 46.833 5.757 13.623 dB
373 +
18 i7 4+i7 8 10.61 dB 293 17 + i2 4M33 5.959 13.772 dB
389 +
17 i10 -2 i5 + 8 11.14 dB 313 3 + i12 52.166 6.293 14.009 dB
397 19 + i6 -
- 5-i4 8
- 10.41 dB 317 4 t i l l 52.833 6.359 14.054 dB
337 16 + i9 56.166 6.689 14.274 dB
349 18 + i5 58.166 6.886 14.400 dB
integers as real and imaginary parts. Let 0 be the set of all Gaussian 353 17+ i8 58.833 6.951 14.441 dB
+
integers. If y = g1 igz E 0 where i2 = -1, then y* = g1 - ig2
373
389
18+ i7
+
7 i10
62.166 7.277
54.833 7.536
14.640 dB
14.792 dB
is called the conjugate of y. The norm of a Gaussian integer 397 L9+i6 56.166 7.664 14.865 dB
y = g1 + ig2 is defined by N ( y ) = g: +
g; = y . y*. There
are 4 unities, i.e., elements of 0 which have norm 1, namely f l , f i . a product of Gaussian primes is unique, apart from the order of the
The elements fy, f iy are called the associates of y. The Gaussian
e primes, the presence of unities, and ambiguities between associated
+
primes are i) 1 i and its associates, ii) the rational primes p with primes. Given any two integers y, 71, of which y1 # 0, there is
p 3 mod 4 and their associates, and iii) the factors a ib of the + +
an integer n such that y = nyl 7 2 , with N(y2) < N(y1). This
rational primes p with p 3 1mod4. The expression of an integer as permits an analogue of Euclid's algorithm for Gaussian integers.
216 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 40,NO. 1, JANUARY 1994

Performing the Euclidean algorithm with Gaussian integers is A Finite Group of Complex Integers and Its Application
almost as simple as with ordinary integers. For ordinary integers to Differentially Coherent Detection of QAM Signals
- +
a version of the basic Euclidean sequence is a = q b T where
q = [a/b]and denotes rounding to the closest integer. For Gaussian
[e] Robert G. Egri and Frank A. Homgan
integers we can define a rounding operation as follows:
+ +
Rounding of Gaussian Integers: [a i . b] = [a] i . [b]. Thus, we
+
get a Euclidean sequence a = A . p y where X = (a.p*/(Pp*)] Absfract-A finite multiplicative group of complex integers is con-
and N(y) < N ( P ) which permits the computation of the greatest structed and its application to differential detection of 16 QAM signals
common divisor between two Gaussian integers. Also similarly as is given. In this group the algebraic properties of regular complex
multiplication, such as commutativity, associativity, and conjugation are
for ordinary integers the extended Euclidean algorithm for computing preserved. The challenge in finding such a group lies in the requirements
+
gcd(P, y) = T .p s y works for Gaussian integers. for the existence of multiplicative inverses for numbers that have mag-
nitudes different from 1, and for maintaining associativity. The group
properties are used to demodulate 16 QAM signals in a differentially
coherent way.
APPENDIXF
A FASTALGORITHM POR FINDING p = a’ + b2 Index Tennrdlgebraic groups, differentially coherentdetection, QAM
signals.
For completeness we give a known algorithm to find the rep-
resentation of a prime p = 1mod4 as sum of two squares. A
detailed exposition of this algorithm can be found in [4]. To represent I. INTRODUCTION
p +
l m o d 4 as sum of two squares (p = u2 b’), the algorithm Differentially coherent detection of phase shift keyed (PSK)signals
is as follows. is a widely used technique based on delaying the received symbol
1) Find z such that z2 = -1modp. (If qnp is a quadratic and multiplying its complex conjugate with the current symbol. This
nonresidue of p then z q k 1 ) ’ 4 modp.) operation effectively provides a carrier phase reference as long as
2) Apply the Euclidean algorithm to p and z; the first two the phase variation is negligible over the duration of a few symbols
remainders less than 4 are a and b. [l]. It thereby obviates coherent carrier phase recovery, although
For further details see, e.g., Wagons paper. with performance penalty. Differentially coherent detection of phase
shift keyed signals can be represented as the product of two unit
ACKNOWLEDG~NT magnitude complex numbers, each corresponding to a symbol. The
product is a member of the signal set and represents some other
I would like to thank Dr.M. Dietrich, Dr. W. Henkel, and Dr.K. symbol. In other words, the symbol multiplications in the abstract
H. Hofmann for helpful comments. Also thanks go to one referee signal space corresponds to multiplications of complex numbers.
for helpful criticism. The detailed treatment of Gaussian integers in Of course, these complex numbers are all of unit magnitudes, and
Appendix E has been supplied at the request of a referee and the multiplication does not lead out of the signal set if the phases form
coeditor. an tgithmetic progression, with one phase being fixed to zero. In
algebraic language, the PSK symbols form a group with a one-to-one
mapping to the complex roots of unity.
REFERENCES In contrast with phase shift keyed signals nonconstant amplitude
QAM waveforms are always demodulated using phase coherent
E. R. Berlekamp, Algebmic Coding Theory. Aegean Park Press, 1984.
R. E. Blahut, Digital Transmission of Information Reading, MA: techniques. All coherent carrier phase recovery techniques suffer from
Addison-Wesley, 1990. phase ambiguities that are resolved by either a special encoding of
G. H. Hardy and E. M. Wright, An Inrroducrion to the Theory of the data symbols, or by recovering the absolute phase of the carrier
Numbers. Oxford, 1979, 5th ed. through a unique word following the carrier acquisition. While it
S. Wagon, “The Euclidean algorithm strikes again,” h e r . Marhemar. causes some loss in performance the former method is normally
Monrhly, vol. 97, no. 2. pp. 125-129, 1990.
preferred for its simplicity. In fact, certain trellis codes are designed
[5] to be rotationally invariant to remove the phase ambiguity of
the recovered carrier. In either case, the carrier recovery complicates
the hardware, and a differentially coherent demodulation would be an
attractive alternative if its reduced noise immunity could be tolerated.
Differentially coherent detection can be generalized to amplitude
modulated signals if a mapping and a group over a finite set
of complex numbers can be found such that the properties of
multiplication over the numbers is preserved as a group operation.
The challenge in finding such group lies in the requirements for the
existence of multiplicative inverses for numbers that have magnitudes
different from 1, and for maintaining associativity. Below we will

Manuscript received April 9, 1992; revised October 11, 1992.


R. G. Egri is with MA-COM Inc., Lowell, MA 01853.
F. A. Homgan is with Raytheon Research, Lexington, MA 02173.
IEEE Log Number 9215197.

0018-9448/94$04.00 0 1994 IEEE

You might also like