Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
A METHOD FOR DECODING A CODEWORD ENCODED USING A NON-BINARY CODE, CORRESPONDING DEVICE AND COMPUTER PROGRAM
Document Type and Number:
WIPO Patent Application WO/2023/025960
Kind Code:
A1
Abstract:
A method for decoding a codeword encoded using a non-binary code, corresponding device and computer program. The invention relates to a method for decoding a codeword, obtained by implementing a code comprising at least one non-binary constraint node C, wherein said decoding method implements, for at least one connection between a non-binary variable node V j and the non-binary constraint node C, at least one decoding iteration comprising sending (221) a message from the non-binary constraint node C to the non- binary variable node V j , said message comprising: - nR measures of reliability obtained fornR candidate symbols selected by the non-binary variable node V j or by a first compression block implemented between the non-binary variable node V j and the non- binary constraint node C, - nB measures of reliability obtained for nB candidate symbols selected by the non-binary constraint node C or by a second compression block implemented between the non-binary constraint node C and the non-binary variable node V j , with 1 ≤ nB ≤ q, 1 ≤ nR ≤ q and nR + nB < q.

Inventors:
BOUTILLON EMMANUEL (FR)
JABOUR JOSEPH (LB)
MARCHAND CÉDRIC (FR)
Application Number:
PCT/EP2022/073851
Publication Date:
March 02, 2023
Filing Date:
August 26, 2022
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
UNIV BRETAGNE SUD (FR)
International Classes:
H03M13/11; H03M13/13; H03M13/29
Foreign References:
EP3316486A12018-05-02
EP3637622A12020-04-15
Other References:
JABOUR JOSEPH ET AL: "The Best, The Requested, and The Default Non-Binary LDPC Decoding Algorithm", 30 August 2021 (2021-08-30), pages 1 - 5, XP055879824, ISBN: 978-1-6654-0943-8, Retrieved from the Internet [retrieved on 20220117], DOI: 10.1109/ISTC49272.2021.9594148
B. SHAMSD. DECLERCQV. HEINRICH: "Non-binary split LDPC codes defined over finite groups", 6TH INTERNATIONAL SYMPOSIUM ON WIRELESS COMMUNICATION SYSTEMS, SIENA, ITALY, 2009, pages 493 - 497
D. DECLERCQM. FOSSORIER: "Decoding Algorithms for Non-Binary LDPC Codes Over GF(q", IEEE TRANSACTIONS ON COMMUNICATIONS, vol. 55, no. 4, 2007, pages 633 - 643
E. LIF. GARCIA-HERREROD. DECLERCQK. GUNNAMJ. O. LACRUZJ. VALLS: "Low LatencyT-EMS Decoder for Non-Binary LDPC codes", ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS, 2013, pages 831 - 835, XP032593119, DOI: 10.1109/ACSSC.2013.6810404
J. TIANS. SONGJ. LINZ. WANG: "Efficient T-EMS Based Decoding Algorithms for High-Order LDPC Codes", IEEE ACCESS, vol. 7, 2019, pages 980 - 992
"Min-Max decoding for non binary LDPC codes", IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2008, pages 960 - 964
L. BARNAULTD. DECLERCQ: "Fast Decoding Algorithm for LDPC over GF(2q", THE PROC. 2003 INFORM. THEORY WORKSHOP, PARIS, FRANCE, March 2003 (2003-03-01), pages 70 - 73, XP010647845, DOI: 10.1109/ITW.2003.1216697
E. BOUTILLONL. CONDE-CANENCIA: "Simplified check node processing in nonbinary LDPC decoders", 2010 6TH INTERNATIONAL SYMPOSIUM ON TURBO CODES ITERATIVE INFORMATION PROCESSING, 2010, pages 201 - 205, XP031783800
C. MARCHANDE. BOUTILLONH. HARBL. CONDE-CANENCIAGHOUWAYEL: "Hybrid Check Node Architectures for NB-LDPC Decoders", IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I: REGULAR PAPERS, vol. 66, no. 2, 2019, pages 869 - 880, XP011706648, DOI: 10.1109/TCSI.2018.2866882
R. KLAIMIC. ABDEL NOURC. DOUILLARDJ. FARAH: "Design of Low-Complexity Convolutional Codes over GF(q", 2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), ABU DHABI, UNITED ARAB EMIRATES, 2018, pages 1 - 7
Attorney, Agent or Firm:
VIDON BREVETS & STRATÉGIE (FR)
Download PDF:
Claims:
CLAIMS

1. A method for decoding a codeword, said codeword being obtained by implementing a code comprising at least one non-binary constraint node C over a set S' of cardinality q > 2 defined from a parity check matrix HC of the non-binary constraint node C by the equation Hc. (p1(V1), p2 (V2), ... , Pdc(Vdc)) = 0, where V1, V2, ... , Vdc are a sub-set of non- binary variable nodes of the codeword implied in the non-binary constraint node C, with dc > 2 the degree of connectivity of the non-binary constraint node C and p1, P2, ... Pdc are permutations over the set S, wherein said decoding method implements, for at least one connection between the non-binary variable node Vj, 1 ≤ j ≤ dc, and the non-binary constraint node C, at least one decoding iteration comprising sending (221) a message from the non-binary constraint node C to the non-binary variable node Vj, said message comprising: nR measures of reliability obtained for nR candidate symbols selected by the non-binary variable node Vj or by a first compression block implemented between the non-binary variable node Vj and the non- binary constraint node C, said nR candidate symbols being denoted nR requested symbols, nB measures of reliability obtained for nB candidate symbols selected by the non-binary constraint node C or by a second compression block implemented between the non-binary constraint node C and the non-binary variable node Vj, said nB candidate symbols being denoted nB best symbols, with 1 ≤ nB < q, 1 ≤ nR < q and nR + nB < q.

2. The method according to claim 1, wherein said nR requested symbols are selected as the nR most reliable symbols from at least one of: an intrinsic message obtained from the channel observation, an a posteriori probability message, a message from the non-binary variable node Vj to the non-binary constraint node C.

3. The method according to any one of claims 1 or 2, wherein said nB best symbols are selected as the nB most reliable symbols from an extrinsic message issued by the non-binary constraint node C.

4. The method according to any one of claims 1 to 3, wherein said message sent from the non-binary constraint node C to the non-binary variable node Vj also comprises the nB best symbols.

5. The method according to any one of claims 1 to 4, wherein said at least one decoding iteration further comprises transmitting a message from the non-binary variable node Vj to the non-binary constraint node C, comprising: generating a message Mv j2c comprising measures of reliability obtained for the q candidate symbols of the set S, selecting from the message MV j2C, by the first compression block Ω, nvc candidate symbols and generating a message Ω (MV j2C) comprising the nvc symbols and the measures of reliability obtained for said nvc symbols, selecting, by the first compression block Ω, the nR requested symbols from the message MV j2C, and sending a message to a second decompression block г-1, comprising the nR requested symbols, permuting the nvc symbols of the message delivering a message and the nR requested symbols, delivering a message reconstructing, by a first decompression block fl-1, a message comprising the nvc symbols, the measures of reliability obtained for said nvc symbols, remaining q — nvc symbols, and measures of reliability set to a default value for the remaining q — nvc symbols, transmitting to the second compression block r the message comprising the nR requested symbols after permutation.

6. The method according to claim 5, wherein said message sent from the non-binary constraint node C to the non-binary variable node Vj is sent when the non-binary constraint node C has received messages from all the non-binary variable nodes connected to the non-binary constraint node C, and is obtained from: generating, from the received messages, k ≠ j, a message comprising measures of reliability obtained for the q candidate symbols of the set S, selecting from the message by the second compression block r, nB best symbols and generating a message comprising the nB best symbols and the measures of reliability obtained for said nB best symbols, obtaining, from the message the measures of reliability of the nR requested symbols after permutation received by the second compression block r in the message generating a message comprising the message and the measures of reliability of the nR requested symbols after permutation, inversely permuting the nB best symbols of the message delivering a message reconstructing, by the second decompression block г-1, a message comprising the nB best symbols, the measures of reliability obtained for said nB best symbols, the nR requested symbols, the measures of reliability obtained for said nR requested symbols, nD remaining symbols and measures of reliability obtained for said nD remaining symbols set to a default value SD.

7. The method according to any one of claims 1 to 6, wherein the measure of reliability obtained for at least one of said nR requested symbols is set to a default value SR when said measure of reliability is above a threshold.

8. The method according to any one of claims 1 to 7 , wherein said non-binary constraint node implements a decoding function belonging to the group comprising: a Min-Max function, an Extended MinSum function, a Trellis-Extended MinSum function, a threshold-based truncation decoding function, a Belief Propagation function, a Fourier domain implementation of a Belief Propagation function, a Forward/Backward function.

9. The method according to any one of claims 1 to 8, wherein the non-binary constraint node is a parity check node with a degree of connectivity dv given as over the set S.

10. The method according to any one of claims 1 to 8, wherein the non-binary constraint node is a convolutional code.

11. The method according to any one of claims 1 to 10, wherein the code belongs to the group comprising: a LDPC code, a polar code, a turbo-code.

12. The method according to any one of claims 1 to 11, wherein the message sent from the non- binary constraint node C to the non-binary variable node Vj comprises a default symbol reliability associated with nD remaining symbols that do not belong to the set of nB best symbols nor to the set of nR requested symbols.

13. The method according to any one of claims 1 to 12, wherein the message sent from the non- binary constraint node C to the non-binary variable node Vj comprises at most nB + nR + 1 measures of reliabilities.

14. A device for decoding a codeword, said codeword being obtained by implementing a code comprising at least one non-binary constraint node C over a set S' of cardinality q > 2 defined from a parity check matrix Hc of the non-binary constraint node C by the equation are a sub-set of non- binary variable nodes of the codeword implied in the non-binary constraint node C, with dc > 2 the degree of connectivity of the non-binary constraint node C and p1, P2, ... Pdc are permutations over the set S, wherein said decoding device comprises at least one processor configured to implement, for at least one connection between the non-binary variable node Vj, 1 ≤ j ≤ dc, and the non-binary constraint node C, at least one decoding iteration comprising sending a message from the non-binary constraint node C to the non-binary variable node Vj, said message comprising: nR measures of reliability obtained for nR candidate symbols selected by the non-binary variable node Vj or by a first compression block implemented between the non-binary variable node Vj and the non- binary constraint node C, said nR candidate symbols being denoted nR requested symbols, nB measures of reliability obtained for nB candidate symbols selected by the non-binary constraint node C or by a second compression block implemented between the non-binary constraint node C and the non-binary variable node Vj, said nB candidate symbols being denoted nB best symbols, with 1 ≤ nB < q, 1 ≤ nR < q and nR + nB < q.

15. A computer program including instructions for implementing a method according to claim 1 when this program is executed by a processor.

Description:
A method for decoding a codeword encoded using a non-binary code, corresponding device and computer program.

1. Field of the disclosure

The field of the disclosure is that of decoding of error correction code.

In particular, the disclosure provides a new technique for decoding a codeword obtained by implementing a non-binary error correction code.

The invention finds applications for instance in the field of wireless (DAB, DVB-T, WLAN, unguided optics, etc.) or wired (xDSL, PLC, optics, etc.) communications and memory storage.

2. Background

The error correcting codes conventionally used in digital communication systems are binary. In other words, the information symbols at the input of the encoder, and the redundancy symbols obtained at the output of the encoder, are binary elements, belonging to the Galois field GF(2).

In some cases, error correcting codes can also be non-binary, i.e. defined on a Galois field with a cardinal q greater than 2, GF(q).

For example, Non-Binary Low-Density Parity Check (NB-LDPC) codes are an extension of the Binary LDPC codes that were proposed by R. Gallager in 1963. NB-LDPC are defined by a set of parity check equations on GF(q = 2 p ) with p > 1. NB-LDPC codes outperform LDPC codes when short frames are used, since they have higher coding gain and lower error floor.

Non binary codes also include code over a set S with a group structure, as proposed for example by B. Shams, D. Declercq and V. Heinrich in "Non-binary split LDPC codes defined over finite groups" (6th International Symposium on Wireless Communication Systems, Siena, Italy, 2009, pp. 493-497).

In the background section below, we focus on code over GF(q).

NB-LDPC code designed on GF(q) is a linear block code defined by a sparse parity check matrix H. It has a block length of N symbols (number of codeword symbols) and an information length of K symbols (number of information symbols) on GF(q) with a coding rate r = K/N. The number of redundant symbols added by the encoder is thus M = N - K.

The connections between the check nodes (CNs) and the variable nodes (VNs) are specified by the parity check matrix H which consists of N — K rows and N columns representing the total number of CNs and VNs respectively, where its element in row / and column j is denoted as H(i,j) = h i,j

Figures 1A and IB illustrate an example of Tanner Graph representation of a NB-LDPC code with the corresponding parity check matrix H. Figure 1C illustrate the connection or edge between a variable node V J: and a check node C i .

Let x = (x 1 , x 2 , ... , x N ) be a codeword verifying Hx = 0 transmitted through a noisy channel.

For each transmitted GF symbol Xj, the receiver computes Ij, the Log-Likelihood Ratio (LLR) intrinsic vector defined as / j (a) = log ( P(x j = â)/P(x j = a) ) ∈ G GF(q), with â = argmax{p(x j = a)}. Note that by construction, / j (â) = 0 and / j (a) ≥ 0.

Let M Vj 2c i be a message sent from VN j to CN i . The message vector is permuted by h i,j before being processed by the CN, and denoted as

The CN generates a message sent from Q to Vj. The message is inversely permuted and inputted to the VN as M

Lastly, the notations N (i) and M (j) represent the indices of the VN/CN connected to the i th / j th CN/VN respectively.

The horizontal layered decoding scheduling according to an example of decoding algorithm is presented in Annex 1.

In this example, the degree d v of the variable node is assumed to be equal to 2. In the sequel, the check node index i of C i is omitted, since using d v = 2 suppresses the ambiguity on the check node index during the decoding process.

The decoding process starts with an initialization stage (line 3). Then, each decoding iteration is composed of the serial processing of the CN of the matrix (line 6). Each CN processing implies edge permutations and inverse edge permutations (lines 8 and 10). The CN processing (line 9) is presented by the Ф function that processes the d c incoming M V j2c , j ∈ N(i), messages, to generate d c M C2V j messages.

The function Ф could be any of the different algorithms used for CN processing. After the CN processing, all VNs connected to the CN (line 12) are updated (lines 13, 14, 15, and 16). The third stage is the decision stage (line 20) which computes the tentative codeword and checks if the decoded message is a codeword (all parity constraints are satisfied).

Decoding NB-LDPC is thus significantly more complex than decoding binary LDPC.

In order to reduce the complexity of the NB-LDPC decoding, different approaches and schemes has been proposed and implemented, mainly focused on Check Nodes complexity reduction.

For example, the Extended Min-Sum (EMS) introduced by D. Declercq and M. Fossorier in "Decoding Algorithms for Non-Binary LDPC Codes Over GF(q)" (IEEE Transactions on Communications, vol. 55, no. 4, pp. 633-643, 2007) truncates the message vector between the Variable Nodes and the Check Nodes from q down to n m , where n m « q, to reduce the computational load in the CN unit and hence reduces the hardware complexity.

Trellis Extended Min-Sum (T-EMS) decoders, described for example by E. Li, F. Garcia-Herrero, D.

Declercq, K. Gunnam, J. O. Lacruz, and J. Valls, in "Low Latency T-EMS Decoder for Non-Binary LDPC codes" (Asilomar Conference on Signals, Systems and Computers, 2013, pp. 831-835), are based on the trellis representation of the input messages which allows high parallelism between the CN and VN. In "Efficient T-EMS Based Decoding Algorithms for High-Order LDPC Codes" (IEEE Access, vol. 7 , pp. 50 980-50 992, 2019), J. Tian, S. Song, J. Lin, and Z. Wang present a threshold-based truncation decoding scheme (TS-TEC-TEMS) where two thresholds are used to truncate the incoming messages of the CN M V2C and the outgoing messages from the CN to the VN M C2v .

V. Savin also proposes a Min-Max decoding algorithm in "Min-Max decoding for non binary LDPC codes" (IEEE International Symposium on Information Theory, 2008, pp. 960- 964.

The function Ф used in the decoding algorithm illustrated in Annex 1 could be any of the different algorithms used for CN processing, such as the above-mentioned Min-Max, Extended Min- Sum or Trellis- EMS algorithm.

Although the above-mentioned algorithms allow reducing the complexity of the decoding, there is still a need for further reducing the decoding complexity, or for improving the performance of the decoder.

3. Summary of the invention

According to at least one embodiment, the disclosure thus provides a method for decoding a codeword, said codeword being obtained by implementing a code comprising at least one non-binary constraint node C over a set S' of cardinality q > 2 defined from a parity check matrix H c of the non- binary constraint node C by the equation are a sub-set of non-binary variable nodes of the codeword implied in the non-binary constraint node C, with d c > 2 the degree of connectivity of the non-binary constraint node C and p 1( p 2 , ... p dc are permutations over the set S, wherein the decoding method implements, for at least one connection between the non-binary variable node V and the non-binary constraint node C, at least one decoding iteration comprising sending a message from the non-binary constraint node C to the non- binary variable node Vj, said message comprising: n R measures of reliability obtained for n R candidate symbols selected by the non-binary variable node Vj or by a first compression block implemented between the non-binary variable node Vj and the non- binary constraint node C, said n R candidate symbols being denoted n R requested symbols, n B measures of reliability obtained for n B candidate symbols selected by the non-binary constraint node C or by a second compression block implemented between the non-binary constraint node C and the non-binary variable node Vj, said n B candidate symbols being denoted n B best symbols, with

According to such embodiment, the message sent by the non-binary constraint node to the variable node comprises both measures of reliability obtained for the n B best symbols, that are selected by the non-binary constraint node (where the non-binary constraint node can be for example a parity check node, or a sub-code, for example a convolutional code), and measures of reliability obtained for the n R requested symbols, that are requested by the variable node.

The proposed algorithm is thus based on requesting measures of reliability associated with relevant symbols from the non-binary constraint node such that the measures of reliability associated with the requested symbols (for example LLR) can be concatenated with the measures of reliability associated with the n B best symbols, and sent back to the variable node.

In this way, the proposed algorithm can reduce complexity of the non-binary error correction code by reducing the communication load between the variable nodes and the non-binary constraint nodes. It indeed allows a variable node to request the reliability associated with specific symbols to be included in the extrinsic message sent by the non-binary constraint node. It can be noted that the proposed algorithm is independent of the non-binary constraint node / variable node processing.

In particular, reducing the communication load can reduce at least one of the memory resources allocated for the messages exchanged between the variable nodes and the non-binary constraint nodes, the sorting process, the permutation / inverse permutation processes, and/or other hardware requirements.

According at least one embodiment, the proposed algorithm allows decreasing the size of the exchanged messages, which reduces the complexity and latency of the decoder, without significant performance degradation. In addition, decreasing the message size allows increasing the throughput in serial architectures and reduces the routing congestion in highly parallel architectures.

In particular, the requested candidates can enhance code convergence, with lower candidates propagating to/from a variable node, by increasing the probability that the symbol reliability of the j th transmitted symbol belongs effectively to the message sent from the non-binary constraint node C to the variable node Vj.

According to at least one embodiment, said n R requested symbols are selected as the n R most reliable symbols from at least one of: an intrinsic message obtained from the channel observation, an a posteriori probability message, a message from the variable node Vj to the non-binary constraint node C.

In this way, the variable node can request a new measure of reliability of a symbol (the reliability being determined by the non-binary constraint node) for a symbol which is for example already considered by the variable node as reliable. The proposed method can thus increase the convergence of the code by increasing the probability that the transmitted symbol belongs to the set of the most reliable candidates. In particular, one symbol of the n R requested symbol can be obtained from the intrinsic message, another symbol can be obtained from the a posteriori probability message, yet another symbol can be obtained from the message from the variable node Vj to the non-binary constraint node, etc.

As an alternative, all the n R requested symbols are obtained from the same message.

According to at least one embodiment, said n B best symbols are selected as the n B most reliable symbols from an extrinsic message issued by the non-binary constraint node.

It can be noted that some symbols can be both selected as requested symbols and best symbols.

According to at least one embodiment, said message sent from the non-binary constraint node C to the variable node Vj also comprises the n B best symbols.

In this way, the message sent by the non-binary constraint node to the variable node comprises measures of reliability associated with the n B best symbols, selected by the non-binary constraint node, measures of reliability associated with the n R requested symbols, requested by the variable node, as well as the n B best symbols. There is no need to send the n R requested symbols to the variable node V j , as they are already known by the variable node V j .

According to at least one embodiment, said at least one decoding iteration further comprises transmitting a message from the variable node V j to the non-binary constraint node C, comprising: generating a message M V .2C comprising measures of reliability obtained for the q candidate symbols of the set S' (for example a Galois Field GF(q)), selecting from the message M V .2C , by a first compression block candidate symbols (for example the most reliable) and generating a message comprising the n vc symbols and the measures of reliability obtained for said n vc symbols, selecting, by the first compression block Ω, the n R requested symbols from the message M V .2C , and sending a message to a second decompression block comprising the n R requested symbols, permuting the n vc symbols of the message Ω (M v.2 c), delivering a message and the n R requested symbols, delivering a message reconstructing, by a first decompression block a message comprising the n vc symbols, the measures of reliability obtained for said n vc symbols, remaining q — n vc symbols, and measures of reliability set to a default value for the remaining q — n vc symbols, transmitting to a second compression block T the message comprising the n R requested symbols after permutation.

Such embodiment can be implemented when the compression / decompression of the message is not directly implemented by the variable node / non-binary constraint node. According to at least one embodiment, said message sent from the non-binary constraint node C to the variable node Vj is sent when the non-binary constraint node C has received messages from all the variable nodes connected to the non-binary constraint node C, and is obtained from: generating, from the received messages, k ≠ j, a message comprising measures of reliability obtained for the q candidate symbols of the set S, selecting from the message by the second compression block г, n B best symbols (for example the most reliable) and generating a message comprising the n B best symbols and the measures of reliability obtained for said n B best symbols, obtaining, from the message M the measures of reliability of the n R requested symbols after permutation received by the second compression block r in the message M generating a message г comprising the message and the measures of reliability of the n R requested symbols after permutation, inversely permuting the n B best symbols of the message delivering a message reconstructing, by the second decompression block a message comprising the n B best symbols, the measures of reliability obtained for said n B best symbols, the n R requested symbols, the measures of reliability obtained for said n R requested symbols, n D remaining symbols and measures of reliability obtained for said n D remaining symbols set to a default value S D .

Such embodiment can be implemented when the compression / decompression of the message is not directly implemented by the non-binary constraint node / variable node.

In particular, the measure of reliability associated with at least one of said n R requested symbols can be set to a default value S R when said measure of reliability is above a threshold.

According to at least one embodiment, said at least one non-binary constraint node implements a decoding function belonging to the group comprising: a Min-Max function, an Extended MinSum (EMS) function, a Trellis-Extended MinSum (T-EMS) function, a threshold-based truncation decoding (TS-TEC-TEMS) function, a Belief Propagation (BP) function, a Fourier domain implementation of a BP function, such as for example disclosed in "Fast Decoding Algorithm for LDPC over GF(2q)", L. Barnault and D. Declercq (The Proc. 2003 Inform. Theory Workshop, Paris, France, pp. 70-73, Mar. 2003), a Forward/Backward function, etc. The proposed algorithm can thus be used with any of the different algorithms used for CN processing, such as those disclosed in the background section for example. In particular, it can be used with sub-optimal algorithm, such as the EMS, or with optimal algorithm, such as the BP.

Decoding functions such as those cited above can be used by a parity check node, when the code is for example a LDPC or a polar code.

Decoding functions such as BP, Fourier domain implementation of a BP, Forward/Backward can be used by a sub-code, when the code is for example a turbo-code.

It can also be used with any variable/non-binary constraint node degree of connectivity d v and d c respectively.

According to at least one embodiment, the code belongs to the group comprising: a LDPC code, a polar code, a turbo-code.

For example, the non-binary constraint node is a parity check node with a degree of connectivity d v given as p1(V1) + p2(V2) + — +" P dc (V dc ) = 0 over the set S' when the code is a LDPC or a polar code, or a convolutional code when the code is a turbo code.

According to at least one embodiment, the message sent from the non-binary constraint node C to the variable node V j comprises a default symbol reliability associated with n D remaining symbols that do not belong to the set of n B best symbols nor to the set of n R requested symbols.

In this way, the message sent by the non-binary constraint node to the variable node comprises measures of reliability obtained for the n B best symbols, which are selected by the non-binary constraint node, measures of reliability obtained for the n R requested symbols, which are requested by the variable node, and measures of reliability obtained for the n D remaining symbols, that can be set to a default value S D . There is no need to send the n D remaining symbols to the variable node V j , as they can be deduced by the variable node V j .

For example, the default value can be computed in the decompression block of the message sent from the non-binary constraint node to the variable node using the n R measures of reliability and n B measures of reliability.

In particular, at least one measure of reliability obtained for one of said n R requested symbols and/or at least one measure of reliability obtained for one of said n D remaining symbols can be set to a default value.

According to at least one embodiment, the message sent from the non-binary constraint node C to the variable node Vj comprises at most n B + n R + 1 measures of reliabilities.

The disclosure also relates to a corresponding device for decoding a codeword. Such a device for decoding a codeword is in particular adapted to implement the decoding method described above. It is, for example, a non-binary LDPC decoder, turbo-decoder, or polar code decoder. This device could of course include the various features relating to the decoding method according to the invention, which can be combined or taken in isolation. Thus, the features and advantages of this device are the same as those of the method described above. Therefore, they are not further detailed.

The invention also relates to one or more computer programs including instructions for the implementation of a method for decoding a codeword as described above when this or these programs are executed by at least one processor.

The invention also relates to an information medium readable by a computer, and including instructions of a computer program as mentioned above.

4. List of figures

Other features and advantages of the invention will emerge more clearly upon reading the following description of a particular embodiment, given by way of simple illustrative and non-limiting example, and the appended drawings, among which:

Figures 1A and IB illustrate an example of Tanner Graph representation of a NB-LDPC code;

Figure 1C illustrate the connection or edge between a variable node and a check node;

Figure 2A illustrates an example high-level block diagram of a non-binary error-correcting system, in accordance with at least one embodiment of the present disclosure;

Figure 2B illustrates the main step implemented by a method for decoding a codeword according to at least one embodiment;

Figures 3A and 3B illustrate an embodiment of the "BRD" algorithm according to the disclosure, where the compression / decompression functions are not implemented by the variable/check nodes;

Figure 4 gives an example of an Elementary Check Node architecture for the EMS-based BRD decoder;

Figure 5 illustrates how to find the requested symbols in a n m x n m matrix;

Figure 6 illustrates the probability P (x j ∈ M C2V ) that the transmitted symbol Xj belongs effectively to the message M C2V j for different decoding algorithms;

Figure 7 shows the impact of the decoder parameters on the Frame Error Rate (FER) for different decoding algorithms;

Figure 8 shows simulation results for different sizes of code and for different decoding algorithms;

Figure 9 illustrates a non-binary turbo-code represented as a bipartite graph;

Figure 10 illustrates the kernel of a polar code; Figure 11 shows the simplified structure of a device for decoding a codeword according to one embodiment of the invention

5. Description of at least one embodiment

5.1 General principle

The disclosure is based on the idea of identifying at least one symbol, denoted as requested symbol, for which a variable node (VN) wishes to obtain a measure of reliability from a non-binary constraint node (CN).

The non-binary constraint node thus has a knowledge of the information requested by the variable node, and does not select "blindly" the symbols and associated measures of reliability that have to be sent to the variable node.

In other words, the requested symbols are the symbols sent by the VN to the CN such that their measures of reliability (LLRs for example) are obtained by the CN (using any CN processing algorithm) and sent to the VN.

Figure 2A illustrates a non-binary error-correcting system, in accordance with at least one embodiment of the present disclosure. As illustrated, a non-binary encoder 21 receives information symbols that represent data to be transmitted, and outputs codewords. Such codewords can be transmitted through a transmission channel and/or stored in a storage device for later use. Upon reception of a transmitted codeword, which can include errors, a non-binary decoder 22 can perform decoding operations to retrieve decoded symbols.

Figure 2B illustrates the main steps implemented by a method for decoding a codeword according to at least one embodiment. Such steps can be implemented by a non-binary decoder (for example the non-binary decoder 22) to improve decoding operations. Indeed, as explained below, the communication load between the variable nodes and the constraint nodes can be reduced through at least one embodiment of the disclosure, which helps, for example, reducing the decoding complexity, reducing the memory resources allocated for the exchange of messages between the variable nodes and the constraint nodes, reducing the sorting process complexity, reducing the permutation / inverse permutation processes complexity, etc).

We thus consider a codeword generated by a non-binary encoder (for example the non-binary encoder 21) from a non-binary error correction code comprising at least one non-binary constraint node C over a set S' of cardinality q > 2 defined from a parity check matrix H c of the non-binary constraint node C by the equation = 0, where V 1, V 2 , ... V dc are a sub-set of non- binary variable nodes representing at least one symbol of the codeword implied in the non-binary constraint node C, with d c > 2 the degree of connectivity of the non-binary constraint node C and P 1 , p 2 , ••• P dc are permutations over the set S. Such codeword can be received, and then decoded, by the non-binary decoder 22.

For at least one connection between a non-binary variable node Vj from the set of variable nodes and the non-binary constraint node C said method implements at least one decoding iteration comprising sending (221) a message from the non-binary constraint node C to the variable node V j , said message comprising: n R measures of reliability obtained for n R candidate symbols selected by the variable node V j or by a first compression block implemented between the variable node Vj and the non-binary constraint node C, said n R candidate symbols being denoted n R requested symbols, n B measures of reliability obtained for n B candidate symbols selected by the non-binary constraint node C or by a second compression block implemented between the non-binary constraint node C and the variable node Vj, said n B candidate symbols being denoted n B best symbols, with

For example, the n R requested symbols (for which a measure of reliability is requested by the variable node) are the n R most reliable symbols among the q symbols of the set (for example GF(q)) of the variable node to the non-binary constraint node message M V2C , since it achieved the best performance in terms of Frame Error Rate (FER). The requested symbols can, as an alternative, be obtained from the intrinsic information I j (a) or the "a posteriori probability" APP j [a],

The n R requested symbols can thus be some of the n R most reliable intrinsic symbols and/or some of the n R most reliable symbols of the APP message and/or some of the n R most reliable symbols of the message M V2C .

Once the n R requested symbols have been selected, the non-binary constraint node is informed and can determine the measures of reliability associated with said n R requested symbols, using any techniques classically used for CN processing, such as those disclosed in the background section for example. For example, the measures of reliability are Log-Likelihood Ratio.

The variable node can thus obtain, from the non-binary constraint node, measures of reliability associated with said n R requested symbols.

The non-binary constraint node can also select n B best symbols of the set, for example the n B most reliable symbols among the q symbols of the set, from the extrinsic information. The number of requested symbols n R and of best symbols n B is independent. As a consequence, the number of requested symbols n R can be less than, greater than, or equal to the number of best symbols n B . If a symbol appears twice, one as a requested symbol and one as a best symbol, the measure of reliability associated with this symbol can only be transmitted once to the variable node.

The variable node can thus obtain, from the non-binary constraint node, measures of reliability associated with said n B best symbols. According to at least one embodiment, the message can also comprise at least one remaining symbol reliability obtained for the n D remaining symbols that do not belong to the set of n B best symbols nor to the set of n R requested symbols.

A default value can be set to the measures of reliability associated with the remaining symbols.

For example, the default value can be determined by the non-binary constraint node and send explicitly within the message from the non-binary constraint node C to the variable node Vj. The default value can also be determined from the n R measures of reliability and n B measures of reliability. Other methods can be proposed to determine the default value.

The variable node can thus obtain information for all the q symbols of the set. For example, the set can be a Galois field GF(q).

The proposed algorithm can be called the Best, the Requested and the Default, or BRD algorithm.

At least one iteration of decoding can be implemented. At each iteration, the set of n R requested symbols / n B best symbols can be changed. The number n R of requested symbols / n B of best symbols can also change at each iteration.

5.2 Non-binary LDPC

We describe hereafter an example of a method for decoding a non-binary LDPC according to at least one embodiment. In this case, the non-binary constraint nodes are parity check nodes. However, as already mentioned, the disclosure is not limited to this kind of error correction code, and the proposed method can be implemented for the decoding of other error correction codes, such as turbo codes or polar codes for example.

In the example below, we also consider a non-binary error correction code designed on a Galois Field GF(q), with q > 2. However, the proposed method could also be extended from a NB-LDPC code on a Galois Field to any NB-LDPC code on a group, like the one proposed in the previously cited document "Non-binary split LDPC codes defined over finite groups".

The edge permutation can also be generalized from a permutation defined by a constant GF multiplication to any permutation.

As already mentioned, the proposed algorithm is a generic decoding algorithm used with any check node processing algorithm, such as for example the EMS algorithm, the T-EMS algorithm, the TS- TEC-TEMS algorithm, the Min-Max algorithm. It can also be used for any variable/check node degree of connectivity d v and d c respectively. The algorithm allows the variable node to request the reliability associated with specific symbols such that the symbols' reliability are sent back by the check node.

According to at least one embodiment, the measure of reliability of the requested symbols, for example LLR values, are concatenated with the most reliable extrinsic elements obtained at the check node and sent all together to the variable node. The M C2V message can thus be considered as a union of three subsets: a first set which comprises n B measures of reliability obtained for n B candidate symbols, for example the n B best candidates generated by the check node (the n B candidate symbols being denoted best symbols). Such n B best symbols and/or measures of reliability can be obtained, for example, using the classical EMS algorithm; a second set which comprises n R measures of reliability obtained for n R candidate symbols that are requested by the variable node (the n R candidate symbols being denoted requested symbols); eventually a third set which comprises a measure of reliability associated with the remaining candidate symbols (i.e. the candidate symbols that are neither best symbols, nor requested symbols). The measure of reliability of the remaining symbols can be set to a default value S D .

This concatenation contributes to increasing the probability of the correct symbol Xj being propagating from/to the CN, hence, increasing the decoding performance of the decoder.

In the sequel, an exponent A + indicates the LLR values, and indicates the values of the symbols (for example GF values) of the set A.

Figures 3A and 3B illustrate an embodiment of the BRD algorithm, where the compression / decompression functions are not implemented by the variable/check nodes. In other words, a message M V2C output by the variable node is a vector of size q, and a message M C2V output by the check node is a vector of size q.

Figure 3A shows the size of the messages in brackets, with the first element corresponding to the number of measures of reliability and the second element corresponding to the number of candidate symbols. Figure 3B shows an example on GF(8).

For a variable node V j , the intrinsic message I j comprises q values of LLR. In the example illustrated in Figure 3B, the intrinsic message I j is given as I j = [7,1,12,4,18,9,0,9],

In a first step, a message M Vj2ci comprising measures of reliability associated with the q candidate symbols of GF(q) is generated. For the first iteration, the message M Vj2ci is set to If. M Vj2ci = I j . The position of each LLR values gives implicitly the associated candidate symbol value.

A. Compression and Decompression of M V .2C . message

A first compression block Ω generates a message from the message M Vj2c , i by selecting n vc candidate symbols of GF(q). For example, the first compression block Ω selects the n vc smallest LLRs and their associated GF value. The message thus comprises the n vc symbols and the measures of reliability associated with said n vc symbols. Since after normalization, the smallest LLR is always equal to 0, the message is composed of LLR and GF values, respectively.

In the example illustrated in Figure 3B, with n vc = 3, the first compression block Ω extracts the three smallest LLR of the message M v .2ci to generate the message comprising three pairs: After normalization, since the LLR of the first pair is always equal to 0, it could be omitted. The message thus contains two LLR and three GF symbols.

The first compression block Ω also selects n R requested symbols, from the message M v j2Cl , and sends a message to a second decompression block comprising the n R requested symbols, for example the GF values of the first n R pairs of the message

In the example illustrated in Figure 3B, with n R = 2, the first compression block Ω extracts the two GF symbols of the most reliable candidates to generate the message comprising two GF symbols: (α 5 , α 0 ).

The n vc symbols of the message and the n R requested symbols are then permuted. For example, the edge multiplicative factor h i,j is applied to each GF element of the message to generate a message and the edge multiplicative factor is applied to each

GF element of the message to generate a message

In the example illustrated in Figure 3B, with h i,j = α 1 , the GF values of the message are multiplied by h i,j = α 1 , generating a message The GF values of the message are also multiplied by h i,j = α 1 , generating a message

A first decompression block Ω -1 then decompresses the message back to a message of size q, by setting the n vc GF values of with their corresponding LLRs and by setting a default value (for example a very high value, denoted infinity) to the remaining GF values. A message comprising the n vc symbols, the measures of reliability associated with said n vc symbols, remaining q — n vc symbols, and measures of reliability set to a default value for the remaining q — n vc symbols.

In the example illustrated in Figure 3B, the first decompression block Ω -1 generates the input check node by assigning the LLRs 0, 1 and 4 in positions α 6 , α 1 , α 3 respectively, and infinite values otherwise.

Moreover, the first decompression block Ω - 1 can also transmit to a second compression block г the message comprising the n R requested symbols after permutation. It is for example composed of the n R most reliable GF symbols in

In the example illustrated in Figure 3B, the first decompression block fl -1 transmit to the second compression block r the two requested symbols, in the message It could be noted that when the EMS algorithm is used for the check node processing, the first compression block Ω and the first decompression block Ωl -1 can be bypassed, since EMS, by construction, used truncated messages.

The proposed compression of exchange messages is however fully compatible with the EMS message representation.

B. Compression and Decompression of message

When the check node C i has received messages from all the variable nodes connected to the check node C i , the check node processes the using any processing algorithm, such as for example EMS or T-EMS.

The check node can thus generate, from the received messages, k ≠ j, a message comprising measures of reliability associated with the q candidate symbols of GF(q).

In the example illustrated in Figure 3B, the check node generates the message [12,9,4,2,4,10,0,8],

The message can be truncated by the second compression block г in two steps.

Firstly, the second compression block T selects, from the message best symbols of

GF(q) and generates a message comprising the n B best symbols and the measures of reliability associated with said n B best symbols. For example, the second compression block г selects the n B most reliable candidates to generate the message of size

Secondly, the measures of reliability of the n R requested symbols after permutation, received by the second compression block T in the message are obtained from the message M . For example, the LLR of the n R requested symbols of the message are extracted from

A message comprising the message and the measures of reliability of the n R requested symbols after permutation can thus be generated, for example by concatenating the message and the LLR of the n R requested symbols of the message The size of the message

In the example illustrated in Figure 3B, with n B = 2, the second compression block T selects the most reliable n B = 2 candidates from the message and it concatenates the LLR of the n R requested candidates of the message Thus

The n B best symbols of the message г are then inversely permuted by delivering a message and sent to the second decompression block г -1 .

After the inverse permutation process, the message is received by the second decompression block г -1 and expanded back to q (for example q =8 in the example illustrated in Figure 3B). The second decompression block T 1 thus reconstructs the full-set q message T 1 1 T ( M C.2V , ] ).

This reconstruction can be based on a three steps process.

First, the LLRs of the n B best candidates are placed into their corresponding GF positions. Then, the LLR of the n R requested symbols are also set into their corresponding GF positions. Finally, the remaining positions are filled with the default LLR value S D .

More specifically, the measure of reliability (LLR) associated with at least one of said n R requested symbols can be set to a default value S R when said measure of reliability is above a threshold. Such saturation process prevents high values from entering the variable node.

In summary, for a given GF value a E GF(q):

The saturation values of S R and S D can impact the decoder performance. given as a linear where the values of (y B , y R , O R , O D ) depend on the code rate.

In the example illustrated in Figure 3B, if the saturation parameters (y B , y R , O R , O D ) are set to (2, 1/8, 1,2) respectively, then the saturation values of S R and S D are S R = 6 and S D = 7, with

S R = 5 + 1 = 6

S D = 5 + 2 = 7

In the full-set q message the n B best candidates are kept unchanged, the LLR on the requested symbol a 0 , which is equal to 4, is also kept unchanged, while the LLR on the requested on symbol a 5 , which is equal to 8, is saturated from 8 down to S R = 6. The remaining candidates are all assigned the value S D = 7. Thus T- [7, 4, 2, 7, 7, 0,6, 7] = M C.2V ..

The first decoding iteration is now finished.

At least one other decoding iteration can be implemented, based on a next message M V .2C . determined by the variable node processing, such as for example disclosed in lines 13, 14 and 15 of the LDBC non binary decoding algorithm described in Annex 1.

In the example illustrated in Figure 3B, for the second decoding iteration, the next message M V .2C .

C. EMS-based BRD Decoder As disclosed above, the proposed BRD algorithm can be well integrated with the Trellis Extended Min Sum (T-EMS) based decoders since, by construction, the CN unit of the T-EMS decoder obtains the reliability of the q candidates without any truncation.

According to at least one embodiment, when the proposed BRD algorithm is integrated with an EMS-based decoder, additional operations could be implemented to obtain the LLR of the requested symbols. Indeed, by construction, the size of the exchanged messages between the CN and the VN is truncated from q to n m in EMS-based decoder. The message truncation leads to losing the reliability of the requested candidates if those candidates are not in the set of the most reliable (n m ) candidates.

The EMS algorithm can be implemented using the Elementary Check Node (ECN) architecture. The ECN architecture is a semi-parallel architecture based on 3. (d c — 2) ECNs, where d c is the degree of connectivity of the CN, arranged in three layers (the forward layer, the backward layer and the merge), each having d c — 2. Such architecture is for example disclosed in "Simplified check node processing in nonbinary LDPC decoders" (E. Boutillon and L. Conde-Canencia, in 2010 6th International Symposium on Turbo Codes Iterative Information Processing, 2010, pp. 201-205).

Figure 4 gives an example of an ECN architecture for d c = 6.

According to at least one embodiment, the output ECNs (shaded in Figure 4) implement an additional process which is finding or approximating the reliability of the requested symbols.

As illustrated in Figure 5, the requested symbols can be found in a n m x n m matrix, by using two input values. Two values can be set: the index of the vertical value i v and the index of the horizontal value i h -

If we assume that the inputs of an output ECN (shaded ECN of figure 4) are two vectors of a (GF, LLR) pair each of size n m , resulting in matrices of size n m x n m respectively, the n R best candidates can be found by using the conventional bubble check presented in the above mentioned document "Simplified check node processing in nonbinary LDPC decoders".

In addition, the reliability of a requested symbol a can be found as the minimum value of three possible values: the first possible value is the value obtained from the minimum value such that the second value is the horizontal approximation value , the third value is the vertical approximation value where O H and O v are offset values, that can for example be obtained from simulation.

Once the reliability values of the requested symbols are found or approximated, the saturation process of the BRD decoder can determine the saturation value S D that can be used as a default value for the remaining symbols, as well as the saturation value S R that can be used for some of the requested symbols as previously described.

The remaining candidates in have a fixed reliability which is S D = Sat.

The requested candidates are saturated at S R =γx Sat if their LLR exceeds the threshold y x Sat:

D. Simulation results

In the prior art EMS algorithm, it is known that the size n m of the M C2V messages affects the performance of the decoder. However, the main criterion that affects the performance is not the size of the message in itself, but the probability P {xj ® ^Ci2Vj^ that the transmitted symbol Xj belongs effectively to the exchanged message.

As demonstrated below, the proposed BRD algorithm with requested candidates increase this probability significantly, thus leading to good decoding performance even with low message size.

D.l. Statistical Analysis

In this section, a Monte-Carlo estimation of P (x j ∈ M Ci2VJ ) is presented as a function of the message size for several decoding algorithms. The Monte-Carlo simulations are performed for a rate 5/6 (d v = 2, d c = 12) GF(64) NB- LDPC code of size N = 864 symbols. As d v = 2, the index i of the check node can be omitted.

The Signal-to-Noise Ratio (SNR) is set to 3 dB (beginning of the waterfall region) with a maximum of 30 decoding iterations. The probability P (x j ∈ M C2V ) is estimated in the whole decoding process as a function of the M C2V message length.

For the EMS algorithm, the message length is given by n m . The algorithm parameters are n op = n m + 5 and offset value equals to 0.3, such as for example detailed in the document "Decoding Algorithms for Non-Binary LDPC Codes Over GF(q)" cited in the background section.

For the BRD proposed algorithm, the message length is characterized by n cv = n B + n R . For this simulation, the CN process is for example based on the TEC-TEMS algorithm, with specific parameters given below.

Figure 6 illustrates the probability P (x j ∈ M C2V j ) for N = 864, K = 720 on GF(64), for different decoding algorithms: the EMS algorithm with n m = 20, the TEC-TEMS algorithm with n m = 64, the Truncated TEC-TEMS with n vc = 4 and n cv = 7, the BRD algorithm with n vc = 4 , n B = 6 and n R = 1, the BRD algorithm with n vc = 4 , n B = 5 and n R = 2, the BRD algorithm with n vc = 4 , n B = 4 and n R = 3, the BRD algorithm with n vc = 4 , n B = 4 and n R = 4, the BRD algorithm with n vc = 4 , n B = 4 and n R = 5.

It can be seen on Figure 6 that including the requested symbols greatly enhances the probability that the transmitted symbol Xj belongs to the propagated message M C2V , and hence becomes a possible candidate to be processed at both VN and CN.

The probability P (X j ∈ M C2Vj ) is around 85% in EMS with n m = 20. The probability P (x j ∈ M C2VJ ) in TEC-TEMS has a similar percentage (87%) to EMS. When truncating the size of considered candidates to n vc = 4 and n cv = 7 (i.e n B = 7 and n R = 0), the probability drops down to 59%. Including one requested symbol n B = 6 and n R = 1 enhances the overall probability from 59% to 89% with the same message size (n cv = 7). The proposed decoder with n B = 4 and n R = 3, achieves a probability of 96%.

Figure 7 shows the impact of the decoder parameters on the Frame Error Rate (FER), for the aforementioned analyzed schemes.

It can be seen on Figure 7 that the worst performance is for the truncated TEC-TEMS with n vc = 4 and n cv = 7. Moreover, it can be noted that increasing the number of requested symbols further does not enhance the decoding performance of the decoder.

D.2 Results

The number of the exchanged messages reflects the number of memory resources required for the decoding process to be performed. Reducing the number of messages exchanged reduces the latency/complexity of different processes of the decoder such as the sorting processes, the permutation and inverse permutation processes, the configuration sets builder, and the memory resources allocation which benefits both hardware-implemented and software-implemented decoders. The overhead complexity of the compression and decompression block depends on the CN processing algorithm used.

Table I below shows the size of exchanged messages per edge (a connection between a VN and a CN) for different schemes based on GF(64). The message size is characterized by the number of GF values (coded on log 2 (64) = 6 bits) and the number of LLR values (also coded on 6 bits). The last column sums the number of GF and LLR elements exchanged per edge and per iteration.

Table I

For a code on GF(64) with r = 5/6 and a CN degree of connectivity d c = 12, the lowest number of the exchanged elements among the studied scheme is 48, achieved by the hybrid EMS decoder (disclosed for example by C. Marchand, E. Boutillon, H. Harb, L. Conde-Canencia, and A. Al Ghouwayel, in "Hybrid Check Node Architectures for NB-LDPC Decoders" (IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 66, no. 2, pp. 869-880, 2019)), whereas the total number of exchanged elements per edge in the proposed BRD decoder is 17. Furthermore, the number of the memory resources reserved is greatly reduced from d c x q down to d c x 7 for M V2C messages, and from d c x q down to d c x 10 for M C2V messages.

For a code rate r = 0.5 with a degree of connectivity d c = 4, the number of exchanged messages is set to n vc = 5 , n B = 6 and n R = 3. The factors γ R and γ B are for example 0.127 and 2.24 respectively, and can be optimized to 0.125 and 2 such that the multiplication is simplified to a shifting operation.

The simulation is done for NB-LDPC codes of size (in bits) (96,48), (864,720) and (1260,1134) on GF(64). The simulated decoder is based on the layered scheduling and a maximum of 10 decoding iterations.

Simulation results for different sizes of code are illustrated in Figure 8.

As shown in Figure 8, the proposed BRD scheme has a performance similar to that of the EMS (with n m = 20 and n op = 25) and TEC-TEMS. The performance is simulated down to a FER of 10 -5 and no significant performance degradation is experienced.

The parameters used for simulating the BRD decoder for r > 5/6 are n vc = 4, n B = 4, n R = 3, γ R = 0,125, γ B — 2, O D — 0.4, O R = 0.2 and a compensation factor (TEC-TEMS) = 0.8.

For a code of size N = 96, K — 48 with d c — 4, the BRD decoder showed similar performance to EMS with a lower number of exchanged messages (n vc = 5, n B = 6, and n R = 3, instead of n m = 20 and n op = 25). The parameters used for this simulation are γ R = 0,125, γ B — 2, O D — 0.2, O R = 0.1 and a compensation factor (TEC-TEMS) = 0.8.

As compared to a binary LDPC code, it can be noticed that a binary LDPC code sends two messages per edge per iteration. For a d v = 3 LDPC code, each binary VN exchanges 6 messages per iteration. Thus, 6 binary VNs (equivalent to 1 VN in GF(64)) sends 36 messages per iteration. Considering a rate r ≥ 5/6 and d v = 2 in GF(64)-LDPC code, only 17 x d v = 34 messages are exchanged. Therefore, the BRD decoder requires less communication load than a binary decoder.

5.3 Other codes As already mentioned, the scope of the invention is not limited to the NB-LDPC codes, nor to the use of parity check. In fact, any code represented by a graph with several "non-binary constraint nodes" (or "sub-codes") and "variable nodes" (each sub-codes constraint a sub-set of variables) can implement the disclosure.

We present below two examples with different codes, one considering a turbo-code, the other one considering a polar code.

Document "Design of Low-Complexity Convolutional Codes over GF(q)" from R. Klaimi, C. Abdel Nour, C. Douillard and J. Farah (2018 IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates, 2018, pp. 1-7) gives an example of non-binary convolutional encoder used in a non- binary Turbo-code.

A non-binary turbo-code can be viewed as a bipartite graph, such as illustrated in Figure 9. For example, the set of k information symbols I = {I(1), I(2), ... , I(k )} and of k redundancy symbols R1 = {R 1(1), R 1(2), ... R1 (k )} participate to a first non-binary convolutional code Cl, while the set of a permuted version of the information symbols P(I) and of k redundancy R2 = {R2 (1), R 2 (2), ... R2 (kc)} participate to a second non-binary convolutional code C2.

The turbo-decoding algorithm is also an instance of the Belief Propagation algorithm in this Tanner graph. This mean that symbol reliabilities are exchanged among the branches of the graph, between the convolutional decoder C1 or C2 ("non-binary constraint nodes") and the information or redundancy symbols ("variable nodes").

Using known principle of the extrinsic information, the message M C12I(j) send for example from the convolutional decoder C1 to the j th information symbol I(j) is a function of the symbol reliabilities of I \ I(j) (i.e. vector I with the symbol I(j) excluded) and R1.

In this context, reducing the size of the message M C12I(j) as proposed in the disclosure, as a union of the set of the n B best symbol reliabilities, the n R requested symbol reliabilities (the n R best symbols of the M I(j)2C1 message for example) and a default value, is a natural extension of what has been presented in the NB-LDPC context.

We now consider a polar code; the so-called kernel of a polar code is presented in Figure 10. The "+" box 101 represents a parity check of degree 3 over GF(q), while the "=" box represents an identity constraint of degree 3, which is similar in processing to a variable node.

Many polar code decoding algorithms (such as "Successive Cancellation", or iterative decoder) process the parity check node of degree 3 to generate an output message that is used in a following kernel or in a decision unit. For example, from messages D, B it is possible to generate a message E, then from messages E and A, it is possible to generate an output message C by a classical non-binary check node processing. The size of the message C sent by the check node 101 to a "variable node" of a following kernel or a decision unit can be reduced by applying the same Best/Requested/Default mechanisms than described for the NB-LDPC code or Turbo-Code.

More generally, the method can be applied to any non-binary code that can be decoded as an instance of a message passing algorithm.

5.4 Structure

Finally, in relation to Figure 11, the simplified structure of a non-binary decoder according to at least one embodiment described above is presented.

Such a decoder comprises at least one memory 111 comprising a buffer memory, at least one processing unit 112, equipped for example with a programmable computing machine or with a dedicated computing machine, for example a processor P, and controlled by the computer program 113, implementing steps of the method for decoding a codeword according to at least one embodiment of the invention.

Upon initialisation, the code instructions of the computer program 113 are for example loaded into a RAM memory before being executed by the processor of the processing unit 112.

The processor of the processing unit 112 implements steps of the method for decoding a codeword described above, according to the instructions of the computer program 113, to send a message from the non-binary constraint node to the non-binary variable node Vj, said message comprising: n R measures of reliability obtained for n R candidate symbols selected by the variable node Vj or by a first compression block implemented between the non-binary variable node Vj and the non-binary constraint node C, n B measures of reliability obtained for n B candidate symbols selected by the non-binary constraint node C or by a second compression block implemented between the non-binary constraint node C and the variable node Vj, with 1 ≤ n B < q, 1 ≤ n R < q and n R + n B < q.

ANNEX 1

2