| Comments on “Document B08” 
 
 Background Every method of communication suffers degraded 
      performance when the signal-to-noise ratio (SNR) is low. This is true for 
      all forms of amateur radio voice communication, for “ear-and-brain” CW, 
      and for computer-assisted “digital modes.” Whatever the form of coding and 
      modulation, if the SNR is high enough then copy can be perfect, or nearly 
      so. When SNR is low the rate of information transfer decreases, 
      approaching zero at the threshold of signal detectability. 
 Modern communication technologies use structured redundancies that are much more powerful than simple repetition. The JT65 protocol uses a Reed-Solomon code optimized for the needs of amateur radio weak signal communication, together with a form of modulation (multi-tone frequency shift keying) known to be much more efficient than simple On-Off keying. JT65 has been implemented in a computer program called WSJT, of which I am the principal author. Standard JT65 transmissions convey exactly 72 bits of arbitrary “user information.” As a consequence, any one of 272 4.7 × 1021 distinct messages can be conveyed in a single transmission. The 72 user bits are augmented with an additional 306 bits of mathematically encoded redundancy; the redundant symbols are created in such a way that the exact transmitted message can be decoded, with extremely small probability of error, even if many symbols are corrupted or lost in the noise during transmission. Rather than being transmitted character-by-character, as in Morse code, message information is mathematically spread throughout a whole transmission. Signal dropouts do not cause the loss of isolated portions of a message; JT65 messages are copied in their entirety, or not at all. If enough channel symbols are received with adequate SNR, copy is complete and error-free, with very high confidence. If not, the decoder produces no result and a repeat transmission is required. 
 Prior information and the JT65 decoder Experienced weak-signal operators know that with 
      marginal signals it is much easier to recognize and copy one’s own 
      callsign (or a familiar one) than unknown calls or random characters. 
      Exactly analogous distinctions apply for the JT65 decoder implemented in 
      WSJT. A fully general algorithm reliably decodes any JT65 message down to 
      an SNR limit (1) of about −24 dB. In addition, WSJT offers a secondary 
      decoder that yields reliable copy of some signals about 4 dB weaker. This 
      “deep search” decoder is not sensitive to the full range of 272 
      possible messages; instead, it is programmed to determine specifically 
      whether one of a large number of hypothetical messages was the exact 
      message transmitted. Hypothetical messages are generated with the help of 
      a callsign database maintained by the user: calls found there are combined 
      with “CQ”, with the receiving station’s own callsign, and with optional 
      numerical signal reports. With the default database of more than 4800 
      callsigns known to have been active in VHF weak-signal communication, this 
      procedure yields more than 14,400 hypothetical messages. If one of the 
      hypothetical messages matches the transmitted one in every detail, that 
      message can be decoded with high confidence down to about −28 dB SNR. The 
      slightest difference between hypothetical and received messages — for 
      example, a single-character having been changed or omitted — will cause 
      the deep-search decoder to reject the hypothesis and produce no result. 
      Again, it should be emphasized that the fully general decoder will decode 
      any JT65 message whenever the SNR is adequate. Slightly weaker signals can 
      be decoded if the computer is given some information about the most 
      plausible and interesting message contents. The situation is really no 
      different than with human decoding of traditional-mode signals.  
 False assertion. Proposal B08 asserts that the JT65 decoding process: “. . . is comparing fragments of information, matching this with known calls and locators from a database, reconstructing and then printing the full information on the screen as if it had been received via the airwaves.” This statement is false, as can be easily confirmed in 
      a number of ways. Perhaps most fundamentally, the source code for WSJT is 
      openly available.2 Anyone can examine the code, compile it for him- or 
      herself, and test it — as many interested amateurs have done.The deep 
      search algorithm is wholly contained in 155 lines of straightforward, 
      easy-to-read code. It contains no “comparing” or “matching” of “fragments 
      of information.” Instead, 
 Demonstrated proof of integrity A live demonstration of the JT65 decoder was provided at the August 2006 EME Conference in W¨urzburg, Germany. JT65 signals could be transmitted at any chosen SNR, with any desired message content, and sent to a receiving computer running the standard WSJT program. Conference participants were invited to explore the operation of the decoder at different SNR levels, perhaps by selecting callsigns included (or not included) in the decoding computer’s database. Many tests were also made with completely arbitrary messages, including random cipher groups. Participants were especially invited to try to “trick” the receiving computer into decoding a message that had not been sent: for example, by transmitting at very low SNR a message different in only one character from one that would surely be tested by the deep-search decoder. The JT65 decoders made zero mistakes during all of these tests: they either produced the correct result, or no result at all. It was also plainly demonstrated that even with “stranger” callsigns or random cipher groups, correct decoding was always achievable (down to about −29 dB SNR) by using WSJT’s ability to average several successive transmissions. Everyone who bserved and participated in the demonstration was persuaded of the full integrity of the WSJT decoding process. (2 Note: See URL
      
      http://developer.berlios.de/projects/wsjt/ ) Minimal valid QSOs For many years it has been accepted by weak-signal 
      amateur VHF/UHF operators worldwide that a minimum valid QSO requires each 
      station to copy both callsigns, a signal report or some other piece of 
      previously unknown information, and an acknowledgment of complete copy. 
      This easy-to-understand guideline wisely leaves other details concerning 
      the validity of a contact up to the integrity of individual operators. For 
      example, what does it mean to have copied both callsigns during a 
      scheduled QSO attempt, when all of the necessary information is known in 
      advance to both operators? Personal integrity requires that even if the 
      information is already known, it must still be copied over the air, with 
      confidence. Why is it commonly understood that completing a scheduled QSO 
      has a 3 or 4 dB advantage over a contact with an unknown station answering 
      one’s CQ? The answer, of course, is that it is “several dB easier” to be 
      sure that you copied something correctly, if you know in advance what to 
      expect. The sensitivity advantage of the WSJT deep-search decoder is the 
      computer equivalent of this well-known fact for human operators. The 
      principal difference is that the computer can be quantitative about how 
      many dB the advantage amounts to — and what it means to be “sure” that 
      information has been copied correctly. Pages 14–16 of Document B08 reveal 
      a fundamental lack of understanding of how JT65 works in practice, and 
      about modern coding techniques in general. The document fails to recognize 
      that state-of-the-art design of coding and modulation methods can be as 
      important to a reliable I do not consider it worthwhile to devote space here to detailed corrections of a number of additional misleading or false assertions in the text of Document B08. Instead, I will simply call the Committee’s attention to the need (if they should consider proposal worthy of any further consideration) to solicit input from individuals who actually use the techniques that the document attempts to criticize. (3 Note:J. Taylor, K1JT, “The JT65 Communications Protocol”, QEX, September-October 2005, pp. 3–12) 
  I believe it is self-evident to nearly everyone 
      that the basic guidelines for minimal valid QSOs should be independent of 
      operating mode. The fact is that our long-established guidelines are 
      sound, and JT65 QSOs meet them every bit as well as QSOs using traditional 
      modes. Indeed, under the most marginal SNR circumstances the reliability, 
      accuracy, and information content of JT65 QSOs far exceeds that of many CW 
      QSOs. In writing that statement I am not questioning the integrity of any 
      CW operator or the validity of any CW QSO; I am simply emphasizing the 
      fact that forward error correction makes the decoded content of JT65 
      messages much more reliable than the best achievable under marginal CW 
      conditions. Joe Taylor, K1JT (4 Note:“Open Source WSJT: Status, Capabilities, and Future Evolution.” J. Taylor, K1JT, in Proceedings of the 12th International EME Conference, W¨urzburg, August 25–27, 2006.) (5 Note: See URL http://pulsar.princeton.edu/~joe/K1JT/Documentation.htm ) 
 |