This application is based on and claims priority under 35 U.S.C. § 119 to Korean Patent Application No. 10-2023-0155389, filed on Nov. 10, 2023, in the Korean Intellectual Property Office, the disclosure of which is herein incorporated by reference in its entirety.
The disclosure relates to a communication method and apparatus using a polar code in a wireless communication system.
Considering the development of wireless communication from generation to generation, the technologies have been developed mainly for services targeting humans, such as voice calls, multimedia services, and data services. Following the commercialization of 5G (5th-generation) communication systems, it is expected that the number of connected devices will exponentially grow. Increasingly, these will be connected to communication networks. Examples of connected things may include vehicles, robots, drones, home appliances, displays, smart sensors connected to various infrastructures, construction machines, and factory equipment. Mobile devices are expected to evolve in various form-factors, such as augmented reality glasses, virtual reality headsets, and hologram devices. In order to provide various services by connecting hundreds of billions of devices and things in the 6G (6th-generation) era, there have been ongoing efforts to develop improved 6G communication systems. For these reasons, 6G communication systems are referred to as beyond-5G systems.
6G communication systems, which are expected to be commercialized around 2030, will have a peak data rate of tera (1,000 giga)-level bps and a radio latency less than 100 sec, and thus will be 50 times as fast as 5G communication systems and have the 1/10 radio latency thereof.
In order to accomplish such a high data rate and an ultra-low latency, it has been considered to implement 6G communication systems in a terahertz band (for example, 95 GHz to 3THz bands). It is expected that, due to severer path loss and atmospheric absorption in the terahertz bands than those in mmWave bands introduced in 5G, technologies capable of securing the signal transmission distance (that is, coverage) will become more crucial. It is necessary to develop, as major technologies for securing the coverage, radio frequency (RF) elements, antennas, novel waveforms having a better coverage than orthogonal frequency division multiplexing (OFDM), beamforming and massive multiple input multiple output (MIMO), full dimensional MIMO (FD-MIMO), array antennas, and multiantenna transmission technologies such as large-scale antennas. In addition, there has been ongoing discussion on new technologies for improving the coverage of terahertz-band signals, such as metamaterial-based lenses and antennas, orbital angular momentum (OAM), and reconfigurable intelligent surface (RIS).
Moreover, in order to improve the spectral efficiency and the overall network performances, the following technologies have been developed for 6G communication systems: a full-duplex technology for enabling an uplink transmission and a downlink transmission to simultaneously use the same frequency resource at the same time; a network technology for utilizing satellites, high-altitude platform stations (HAPS), and the like in an integrated manner; an improved network structure for supporting mobile base stations and the like and enabling network operation optimization and automation and the like; a dynamic spectrum sharing technology via collison avoidance based on a prediction of spectrum usage; an use of artificial intelligence (AI) in wireless communication for improvement of overall network operation by utilizing AI from a designing phase for developing 6G and internalizing end-to-end AI support functions; and a next-generation distributed computing technology for overcoming the limit of UE computing ability through reachable super-high-performance communication and computing resources (such as mobile edge computing (MEC), clouds, and the like) over the network. In addition, through designing new protocols to be used in 6G communication systems, developing mechanisms for implementing a hardware-based security environment and safe use of data, and developing technologies for maintaining privacy, attempts to strengthen the connectivity between devices, optimize the network, promote softwarization of network entities, and increase the openness of wireless communications are continuing.
It is expected that research and development of 6G communication systems in hyper-connectivity, including person to machine (P2M) as well as machine to machine (M2M), will allow the next hyper-connected experience. Particularly, it is expected that services such as truly immersive extended reality (XR), high-fidelity mobile hologram, and digital replica could be provided through 6G communication systems. In addition, services such as remote surgery for security and reliability enhancement, industrial automation, and emergency response will be provided through the 6G communication system such that the technologies could be applied in various fields such as industry, medical care, automobiles, and home appliances.
Channel coding is a technology that transmits a message with high reliability by using redundancy bits to transmit data, and the use of an error correction code is necessary for the technology. Claude Shannon defined a maximum amount of information transmission that can be used for reliability communication as “channel capacity,” and since then research on many error correction codes for accessing the channel capability of Shannon has been made. Starting with classic codes such as Hamming, Bose-Chaudhuri-Hocquenghem (BCH), and Reed-Solomon (RS) codes, various modern codes such as turbo codes, low-density parity-check (LDPC) codes, and polar codes have been newly proposed, and the LDPC code is known as a representative channel capacity-approaching code.
Among then, the polar code is an error correction code first proposed by Arikan in 2009 and corresponds to the first code that was theoretically proven to asymptotically achieve channel capacity with low decoding complexity as the code length increases in various types of binary-input discrete memoryless channels (BI-DMC). When the proposed successive cancellation (SC) decoding is performed, there is no advantage in terms of decoding performance compared to the existing LDPC code or the turbo code, but the decoding performance is greatly improved when SC-list (SCL) decoding and SCI decoding using a cyclic redundancy check (CRC) code/parity-check (PC) code are used. Particularly, through the 3rd generation partnership project (3GPP) 5G standardization process, excellent performance was secured by simultaneously utilizing the CRC code and the PC code, and based on this, they were adopted as error correction codes for the ultra-wideband communication (enhanced mobile broadband (eMBB)) control channel. Furthermore, the polar code is considered as a channel code candidate for beyond 5G (B5G) and 6G communication based on strong decoding performance at short lengths.
Rate-matching technologies such as puncturing, shortening, and repletion are considered for polar code transmission of various code lengths. At this time, in the case of a punctured polar code, information bits are generated for which the capacity of a split-bit-channel becomes 0 due to puncturing bits, which are called incapable bits. In addition, bits that have relatively greatly decreases in reliability are generated. In 5G-NR, performance degradation is prevented by including the bits in a frozen bit set through an extra-freezing (EF) method.
The disclosure provides a method and an apparatus for selecting bits to be adaptively extra-frozen according to a message length to use a polar code in a wireless communication system.
According to an embodiment of the disclosure, a method of encoding a channel in a wireless communication system includes determining a length of a mother code, based on a length of at least one information bit to be transmitted and a target code rate, determining at least one frozen bit not to transmit information among first bits included in an input source vector corresponding to the mother code, based on the length of the at least one information bit, allocating the at least one information bit to at least one second bit except for the determined at least one frozen bit among the first bits included in the input source vector, and generating a codeword by encoding, into a predetermined polar code, the input source vector to which the at least one information bit is allocated.
An apparatus for encoding a channel in a wireless communication system includes a transceiver and at least one processor, wherein the at least one processor is configured to determine a length of a mother code, based on a length of at least one information bit to be transmitted and a target code rate, determine at least one frozen bit not to transmit information among first bits included in an input source vector corresponding to the mother code, based on the length of the at least one information bit, allocate the at least one information bit to at least one second bit except for the determined at least one frozen bit among the first bits included in the input source vector, and generate a codeword by encoding, into a predetermined polar code, the input source vector to which the at least one information bit is allocated.
The disclosure provides a rate-matching method and apparatus of polar codes, thereby improving the system performance of the existing polar codes.
As the disclosure provides a rate-matching method and apparatus of polar codes, a performance gain is particularly significant in a low-code rate area, and thus it is expected to be effective mainly in a control channel in which data transmission at a low-code rate is considered.
Before undertaking the DETAILED DESCRIPTION below, it may be advantageous to set forth definitions of certain words and phrases used throughout this patent document: the terms “include” and “comprise,” as well as derivatives thereof, mean inclusion without limitation; the term “or,” is inclusive, meaning and/or; the phrases “associated with” and “associated therewith,” as well as derivatives thereof, may mean to include, be included within, interconnect with, contain, be contained within, connect to or with, couple to or with, be communicable with, cooperate with, interleave, juxtapose, be proximate to, be bound to or with, have, have a property of, or the like; and the term “controller” means any device, system or part thereof that controls at least one operation, such a device may be implemented in hardware, firmware or software, or some combination of at least two of the same. It should be noted that the functionality associated with any particular controller may be centralized or distributed, whether locally or remotely.
Moreover, various functions described below can be implemented or supported by one or more computer programs, each of which is formed from computer readable program code and embodied in a computer readable medium. The terms “application” and “program” refer to one or more computer programs, software components, sets of instructions, procedures, functions, objects, classes, instances, related data, or a portion thereof adapted for implementation in a suitable computer readable program code. The phrase “computer readable program code” includes any type of computer code, including source code, object code, and executable code. The phrase “computer readable medium” includes any type of medium capable of being accessed by a computer, such as read only memory (ROM), random access memory (RAM), a hard disk drive, a compact disc (CD), a digital video disc (DVD), or any other type of memory. A “non−transitory” computer readable medium excludes wired, wireless, optical, or other communication links that transport transitory electrical or other signals. A non−transitory computer readable medium includes media where data can be permanently stored and media where data can be stored and later overwritten, such as a rewritable optical disc or an erasable memory device.
Definitions for certain words and phrases are provided throughout this patent document, those of ordinary skill in the art should understand that in many, if not most instances, such definitions apply to prior, as well as future uses of such defined words and phrases.
The above and other aspects, features, and advantages of the disclosure will be more apparent from the following detailed description taken in conjunction with the accompanying drawings, in which:
Hereinafter, the operation principle of the disclosure will be described in detail in conjunction with the accompanying drawings. In describing the disclosure below, a detailed description of known functions or configurations incorporated herein will be omitted when it is determined that the description may make the subject matter of the disclosure unnecessarily unclear. The terms which will be described below are terms defined in consideration of the functions in the disclosure, and may be different according to users, intentions of the users, or customs. Therefore, the definitions of the terms should be made based on the contents throughout the specification.
For the same reason, in the accompanying drawings, some elements may be exaggerated, omitted, or schematically illustrated. Furthermore, the size of each element does not completely reflect the actual size. In the respective drawings, the same or corresponding elements are assigned the same reference numerals.
The advantages and features of the disclosure and ways to achieve them will be apparent by making reference to embodiments as described below in detail in conjunction with the accompanying drawings. However, the disclosure is not limited to the embodiments set forth below, but may be implemented in various different forms. Various embodiments are provided to completely disclose the disclosure and inform those skilled in the art of the scope of the disclosure, and the disclosure is defined only by the scope of the appended claims. Throughout the specification, the same or like reference signs indicate the same or like elements.
Herein, it will be understood that each block of the flowchart illustrations, and combinations of blocks in the flowchart illustrations, can be implemented by computer program instructions. These computer program instructions can be provided to a processor of a general-purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart block or blocks. These computer program instructions may also be stored in a computer usable or computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer usable or computer-readable memory produce an article of manufacture including instruction means that implement the function specified in the flowchart block or blocks. The computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions that execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart block or blocks.
Furthermore, each block in the flowchart illustrations may represent a module, segment, or portion of code, which includes one or more executable instructions for implementing the specified logical function(s). It should also be noted that in some alternative implementations, the functions noted in the blocks may occur out of the order. For example, two blocks shown in succession may in fact be executed substantially concurrently or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved.
As used in various embodiments of the disclosure, the term “unit” refers to a software element or a hardware element, and the “unit” performs certain functions. However, the “unit” does not always have a meaning limited to software or hardware. The “unit” may be constructed either to be stored in an addressable storage medium or to execute one or more processors. Therefore, the “unit” includes, for example, software elements, object-oriented software elements, class elements or task elements, processes, functions, properties, procedures, sub-routines, segments of a program code, drivers, firmware, micro-codes, circuits, data, database, data structures, tables, arrays, and parameters. The elements and functions provided by the “unit” may be either combined into a smaller number of elements, or a “unit,” or divided into a larger number of elements, or a “unit.” Moreover, the elements and “units” may be implemented to reproduce one or more CPUs within a device or a security multimedia card. Furthermore, the “unit” in various embodiments of the disclosure may include one or more processors.
As used herein, each of such phrases as “A and/or B,” “A or B,” “at least one of A and B,” “at least one of A or B,” “A, B, or C,” “at least one of A, B, and C,” and “at least one of A, B, or C,” may include all possible combinations of the items enumerated together in a corresponding one of the phrases. Such terms as “a first,” “a second,” “the first,” and “the second” may be used to simply distinguish a corresponding element from another, and does not limit the elements in other aspect (e.g., importance or order).
In the disclosure, a user equipment (UE) may be referred to as a terminal, a mobile station (MS), a cellular phone, a smartphone, a computer, or various types of electronic devices capable of performing communication functions. In the following description, a base station is an entity that allocates resources to terminals, and may be at least one of a Node B, an eNode B (eNB), a gNode B (gNB), a wireless access unit, a base station controller, and a node on a network.
Furthermore, the embodiments of the disclosure as described below may also be applied to other communication systems having similar technical backgrounds or channel types to the embodiments of the disclosure. In addition, based on determinations by those skilled in the art, various embodiments of the disclosure may also be applied to other communication systems through some modifications without significantly departing from the scope of the disclosure.
In the detailed description of various embodiments of the disclosure, a communication system may use a wireless communication system, and may use, for example, a 5G communication system on the 5G communication standard (new RAN (NR)) proposed by the 3rd generation partnership project long term evolution (3GPP LTE) that is a wireless communication standardization group. In addition, based on determinations by those skilled in the art, the disclosure may be applied to other communication systems having similar backgrounds or channel types through some modifications without significantly departing from the scope of the disclosure. In the following description, some of terms and names defined in the 3GPP standards may be used for the sake of descriptive convenience. However, the disclosure is not limited by these terms and names, and may be applied in the same way to systems that conform other standards.
In order to help understanding of embodiments of the disclosure, the polar code is first described.
Polar codes are codes that theoretically achieve channel capacity, and obtain polarized channels through channel combining and channel splitting, select high-quality channels suitable for communication, and transmit data. Referring to
The codeword vector is modulated, passes through an independent and identically distributed (i.i.d) channel in units of symbols, and becomes a reception signal vector r. At this time, one large combined channel WN that connects the vector u and the reception signal vector r may be defined, which is called channel combining. Channel splitting refers to a process for obtaining virtual split channels WN(i) (i being split channel index) experienced by respective source bits from WN. The split channel is defined by a transition probability WN(i)(r, u0i−1|ui) having ui as an input and r, u0i-1(=u0, u1, . . . , ui−1) as an output. As known from a transition probability equation, the reliability and capacity of split channels are sequentially evaluated based on the assumption that results of all source bits u0i-1 that have been previously estimated are correct (that is genie-aided and the reliability and capacity of each split channel are evaluated) (genie-aided SC decoding).
At this time, indexes may be arranged in the order from the lowest-quality split channels to the highest-quality split channel, based on the reliability of WN(i), which is called a polar code sequence. Bits located ahead of the code sequence due to small WN(i) are transmitted with fixed values, and bits located behind the code sequence due to large WN(i) are used for data transmission. In order to design the code sequence, various methods such as a Bhattacharyya parameter update, density evolution, Gaussian approximation, and a polarization weight may be used.
Among them, the density evolution (DE) is representative. First, based on transmission of a zero-codeword (CW) (u=0), a probability density function (pdf) of a reception signal log-likelihood ratio (LLR) message obtained from the channel output is determined, and then the pdf of the LLR message in a phased polarization process is acquired and the LLR pdf of split channels of each source bit ui is acquired. Accordingly, it is a method of evaluating the reliability and capacity of each split channel and designing the code by using the same.
That is, a bit error rate (BER) of each bit may be calculated based on the LLR pdf acquired by upgrade (VN operation) and downgrade (CN operation) of each bit through n=log2 N polarization steps.
In 5G-NR, one code sequence is defined and used to reflect the fixed dominance relation between the bit channels in order to avoid the code design varying depending on the channel and to make the code design that is close to the optimal design for various code parameters and is fixed possible.
When data is transmitted to high-reliable split channels by the evaluation of the quality of polarized split channels through channel combining and splitting, a transmitted message is estimated through an appropriate decoding method based on a reception signal r=(r0, r1, . . . , rN-1) acquired by passing through the channel.
In the decoding method, it is possible to significantly improve the error detection/correction capability of the code by using a cyclic redundancy check (CRC) code or a parity-check (PC) code together, and 5G-NR considers other concatenated codes according to the message length.
Referring to
In 2), and the sub-block interleaver splits the codeword vector into 32 sub-blocks and then interleaves the same in units of blocks. The output sequence y having the length of N becomes the input of a circular buffer, and the circular buffer selects one mode that meets a condition from among three modes (puncturing, shortening, and repetition) and outputs a codeword e that matches the length E. For example, the puncturing is applied in the case of K/E≤7/16 and transmits only the last E bits of the circular buffer (first U=N−E bits are not transmitted), the shortening is used for K/E>7/16 and transmits first E bits (last U=N−E bits are not transmitted), and the repetition additionally transmits first E−N bits in the case of E>N. Thereafter, bits are rearranged once again through channel interleaving corresponding to bit unit interleaving, and the output g becomes the input of a modulator.
At this time, the vector g(g=f when there is no split) is binary data after the encoding process. The modulator considers binary phase shift keying (BPSK) modulation unless specifically mentioned, but the disclosure includes the application of high order modulation such as quadrature phase shift keying (QPSK) and quadrature amplitude modulation (QAM), and the used modulation methods are not limited thereto. A modulated vector x becomes the reception signal vector r by passing through the channel. The channel is basically assumed as an additive white Gaussian noise (AWGN) channel. However, without exclusion of the assumption of a fading channel, a superchannel for wideband modulation and demodulation such as orthogonal frequency division multiplexing (OFDM) may be included.
Hereinafter, the operation included in the encoding chain of the polar code is described in detail.
The input is a vector a having the size of A, and the output is a vector a′ having the size of A′. In downlink (DL), segmentation is not performed. (Iseg=0 (inactivated)), in uplink (UL), segmentation is conditionally performed only for sufficiently long uplink control information (UCI) (Iseg=1 (activated) for UL (conditionally)). A condition equation of parameters A, E in which code block segmentation is performed is as shown in [Equation 1].
In the segmentation step, the information block is segmented into two sub-blocks, an independent encoding process is performed for each sub-block, and then two vectors are concatenated before modulation. In an example of the disclosure, the case (A′=A) of a single block is mainly assumed.
Based on the transmission message length A′ (A′=A when there is no message segmentation and A′=┌A/2┐ when there is segmentation) and the target code rate, the actual transmission codeword length E=A/R is determined. At this time, the length E is adjusted to the mother code having the length of N=2n, based on a rate-matching technology such as puncturing, shortening, and repetition.T may be expressed as shown in [Equation 2] below.
nmax is 10 (UL), 9 (DL), and nmin is 5 (both UL, DL). Further, n1=┌log2 E┐, n2=┌log2(8K)┐(K=A+L; L being the number of CRC bits). However, in order to prevent the application of excessive puncturing or shortening, n1=└log2 E┘ is determined in the case of {log2(E)}<0.17 ({x}=x−└x┘).
For example, in the case of a code of (E, A)=(70,30), ≈log2(70)−└log2(70)┘<<0.17, and thus n1=6. When this is substituted into [Equation 2], n=max(min(6┌log2(240)┐, 10), 5)=6. That is, the length of the mother code 26=64. 58 bits from the mother polar code having the length of 128 are not punctured (or shortened), and 6 bits from the mother polar code having the length of 64 are repeatedly transmitted. If the length of the mother polar code is N>E, the mother code is punctured (or shortened) for transmission of the codeword having the length of E. The puncturing is performed when K/E≤≤7/16 and the shortening is performed when K/E>7/16.
For both the puncturing and the shortening, some of the codeword bits are not transmitted. At this time, a pattern of the bits to be not transmitted is determined by a sub-vector for an output vector of the sub-block interleaver. In the case of puncturing, there is no information on codeword bits that were not transmitted when a receiver performs decoding, and thus the LLR of the corresponding bits is configured as 0 and the decoding is performed. The trend of channel polarization is changed by the punctured bits, and becomes capacity-0 in the u domain, and thus bits meaningless to data transmission are generated. At this time, an index set of the punctured bits is a puncturing pattern, and an index set of source bits of capacity-0 is an incapable pattern. As described below, when the number of punctured bits is U, the puncturing pattern is a sub vector including first U bits of the output vector of the sub-block interleaver.
In 5G-NR, the bits are preferentially selected as frozen bits, and a set of the bits is frozen bits. For example, signal transmission through a binary erasure channel (BEC) of the polar code of p={1,3} having the length of 8 is assumed (that is, {ε0, ε1, ε0, ε1, ε0, ε0, ε0, ε0} where ε0=0.5 and ε1=1, an erasure probability (ε1) of the channel corresponding to the punctured bits=1, and an erasure probability (ε0) of the remaining channels is configured as 0.5). At this time, channel capacities of respective split channels are {0, 0.063, 0, 0.438, 0.141, 0.672, 0.703, 0.984}. Since channel capacities corresponding to u0 and u2 are 0,
p={0,2} (in which case|
p|=|
p| or
p≠
p). In general, |
p|=|
p| is always satisfied for a random puncturing pattern, and
p=
p is satisfied in the case of P determined by the sub-block interleaver of 5G-NR.
p={0, 1, 2, 4}. A puncturing pattern (
p) defined in an x domain and an incapable pattern (
p) in a u domain are the same like
p=
p={0, 1, 2, 4}.
{circle around (3)} CRC encoding (both UL, DL)
The input is a vector A′ having the size of a′, and the output is a vector K(=A′+L) having the size of c. L is the length of the CRC code. CRC encoding may be performed in UL and DL, and uses different CRC parity lengths according to the message length (A). As an embodiment, the CRC encoding may be omitted during the procedure of
The input is a vector c having the length of K(=A′+L), and the output is a vector c′ having the length of K(=A′+L). CRC bits may be distributed through the bit interleaving, and early decoding failure is determined by some of the forward deployed CRC bits, and thus decoding complexity may be reduced. The interleaver is applied only to the DL (IIL=1 for DL), and is not used for the UL. Unlike a base station having a high calculation processing capability in the case of UL, it is necessary to reduce complexity obtained by early decoding termination due to the distributed CRC in the DL because calculation throughput of mobile devices is low in the DL.
The input is a vector c (or c′) having the length of K, and the output is a vector u having the length of N. nPC parity-check (PC) bits are inserted into K(=A+L) messages and CRC bits (K′=nPC), and the remaining (N−K′) bits are frozen to 0. Specifically, in 5G-NR, a frozen bit set
5G-NR corresponding to a polar code sequence Q01023 that arranges bit indexes in the ascending order of reliability for the polar code having the length of Nmax=1024, and 0≤QiN
A code sequence Q0N−1 having the length of N(32≤N≤1024) is Q0N−1={Q0N, Q0N, . . . , QN−1N}. Q0N−1 is a sub-sequence of Q0N
Bits in the u domain of which capacities become 0 by bits punctured in the x domain are called incapable bits, and thus it is preferable to first freeze the bits. An index set of the bits is a pre-freezing set and is expressed as S1. It is the same as the incapable pattern p in “{circle around (2)} mother code configuration (both UL, DL)” (S1=
p). Since the error always occurs even though data is transmitted to the bits, a value fixed to 0 is transmitted (not used for data transmission). Meanwhile, u bits that are not capacity-0 by the punctured bits but are relatively weaker are generated. For puncturing of the bits, all of the u bits having indexes equal to or smaller than T are additionally frozen according to the number of punctured bits. A configuration condition of the set S2 is described below:
(heavy puncturing); and
(light puncturing).
S1 and S2 may or may not have the inclusion relationship according to a level of puncturing. For example, with respect to the size |S1-S2| of a difference set varying depending on the number U of punctured bits in the case of N=256, S1⊂S2 is always satisfied up to U=N/4 (light puncturing) but (heavy puncturing) S1−S2≠Ø when the number of punctured bits increases more than U. In a reliability freezing step, except for indexes of S1 ∪S2, the first (N−K′−|S1∪S2|) bits of Q0N−1 are additionally frozen, and an index set thereof is 3. Accordingly,
Referring to
are additionally frozen. In case of this example, S1ØS2. Subsequently, the first (N−K′−|S1 ∪S2|)=20 bits of Q063 are additionally frozen (reliability freezing; S3={32, 33, 20, 34, 24, 36, 40, 48, 21, 35, 26, 37, 25, 22, 38, 41, 28, 42, 49, 44}). Data is carried on 24 bits except for
At this time, indexes of u bits corresponding to points highlighted in gray are 63, 62, 61, and 59. They always have indexes smaller than T (T=75, 79, 83, and 87 when U=24, 32, 40, and 48) obtained through [Equation 3] above and thus are extra-frozen. That is, in 5G-NR, performance deterioration of the bits having a relatively large channel capacity degradation ratio according to puncturing is prevented through extra-freezing.
The reason why extra-freezing is performed is described from a perspective of the density evolution. In the case of (N, U)=(128, 20), for an evolved (or polarized) BER for a u-bit index under an input SNR=−2 dB, the smaller the BER of ui, the better the bit. In the case of (N, U)=(128, 20), T=41, and thus source bits having indexes S2={0, 1, . . . , 41} are all extra-frozen. In this case, for the evolved BER for the u-bit index, bits having indexes S2={0, 1, . . . , 41} generally have a higher BER compared to bits having indexes S2c={42, . . . , 127} and are weak at puncturing. In summary, bits weak at puncturing are extra-frozen from a perspective of the quality (channel capacity or BER) for each bit or row weight (or minimum distance of the code) of source bits in 5G-NR.
The input is a vector u having the length of N, and the output is a vector d having the length of N. The relation between the vectors u and d is defined by a generator matrix GN, and
The input is a vector d having the length of N, and the output is a vector y having the length of N. N encoded bits are interleaved in units of sub-blocks before rate-matching. Specifically, the vector is interleaved by [Equation 5] below after being segmented into B=N/32 sub-blocks (integer of B≥1 because Nmin=32). At this time, J(·) is a sub-block interleaver sequence, and the interleaver sequence is (0, 1, 2, 4, 3, 5, 6, 7, 8, 16, 9, 17, 10, 18, 11, 19, 12, 20, 13, 21, 14, 22, 15, 23, 24, 25, 26, 28, 27, 29, 30, 31).
The input is a vector Y having the length of N, and the output is a vector e having the length of E(=N−U). The rate-matching is performed by the circular buffer and the rate-matching technologies are considered in 5G-NR. Since the bits to be transmitted are determined through rate-matching, the rate-matching is also called bit-selection, and one of the operations such as puncturing, shortening, and repetition is performed through bit-selection.
The input is a vector e having the length of E, and the output is a vector f having the length of E. The vector e is interleaved in units of bits before modulation is performed and becomes the vector f. The channel interleaver has a right isosceles triangular structure. The interleaver is applied to improve the error rate performance of high order modulation (ex. 16QAM or 64QAM) and is used only for the UL.
For reference, the summary of values of all code parameters defined by the 5G UL is as shown in [Table 1] below.
)
indicates data missing or illegible when filed
As described above, in the polar code split channel allocation step of the 5G-NR system, locations of the information bit/frozen bit/parity bit are determined. A frozen bit pattern (
However, when the extra-freezing set is determined according to the number U of punctured bits, the existing extra-freezing set and the code rate are independent from each other when the number U of punctured bits is given. In the case of polar code in which the code is designed based on the quality of actually channel-polarized bit channels, a set of bits relatively weak at puncturing may vary depending on the number (A) of message bits or the code rate (A/E) For example, W(QN−1−(K+1)N)<(QN−1−KN) is satisfied in the polar code that is not punctured (that is, the reliability of a bit having a reliability index K is higher than the reliability of a bit having a reliability index (K+1), but W(QN−1−(K+1)N)>W(QN−1−KN) in the punctured polar code. Particularly, since the number of message bits is small when the code rate is low, relatively more weak bits by puncturing are included in the information set, thereby significantly deteriorating the decoding performance. Accordingly, an “additional extra-freezing (AEF) set” (notation: S2A) design rule considering the source bits is needed.
In summary, when only bits having indexes smaller than T are extra-frozen, weak bits having indexes larger than T are used as the information set at a relatively low code rate, and there is a limitation that it becomes a factor in performance deterioration.
The disclosure defines an additional extra-freezing (AEF) set which may vary depending on a puncturing degree and a message length (or a code rate) to improve a design method in order to secure the stable performance according to polar code puncturing and provides exclusion from selection of the information set. Alternatively, an extended extra-freezing (EEF) set including the extra-freezing set and the additional extra-freezing set as a union may be designed. This may be based on the design of an adaptive AEF set according to the message length (or code rate). For example, when A (K=A+L when the CRC bit is also included) is small, weak bits having a relatively low channel capacity may be additionally frozen. When A becomes larger, a bit excluded from the AEF set may be used again as the information bit by reducing the size of the AEF set. As described above, it is possible to improve the bit interleaved coded modulation (BICM) system performance of 5G-NR by adding a simple conditional statement about A as well as N, P. Particularly, it is possible to improve the performance at a low code rate through the design of the AEF (or EEF) set.
When the quality of split channels of the polar code is evaluated, a BER evaluation method using the channel capacity in the binary erasure channel and the density evolution method in the AWGN channel may be used. The channel capacity or the BER of the split channels of the punctured polar code are generally deteriorated. The decoding performance is prevented from deteriorating by determining that bits having bit indexes equal to or smaller than T are significantly deteriorated and thus extra-freezing the bits.
In the disclosure, it is possible to additionally define an AEF set S2 A and extra-freeze members corresponding to an EEF set S2E (=S2 ∪S2 A) which is a union of the EF set S2 and the AEF set S2A. S2 A has a variable size according to A (or A/E). The size of the AEF set is the largest when A (or A/E) is smaller than a minimum threshold, and the size of the AEF set is 0 when A (or A/E) exceeds a maximum threshold. That is, when A increases to exceed the minimum threshold, the released bit may be used again as the information bit by reducing the size of the AEF set one by one.
In SC decoding of the polar code, a block error rate (BLER) is a sum of error rates of all information bits, and an upper bound is determined. Events in which the block error occurs may be expressed as a union as shown in [Equation 6] below corresponding to mutually exclusive events {i} in which a first error occurs in an ith bit.
i satisfies i⊆{u0N−1, r, c0N−1|hi(r, û0 i-1)≠ui)}=:
i. That is, the BLER has
P(
i) as the upper bound. Accordingly, for the good performance, bits having a low BER obtained through density evolution evaluation may be selected and data thereon may be transmitted.
However, in the arrangement in the reverse order of the code sequence of 5G-NR (that is, in the order from the highest reliability to the lowest reliability), it can be known that specific bits having high BERs have smaller reliability indexes. Referring to
.
For a bit index i=(in−1 . . . i1i0), location indexes corresponding to the most significant bit (MSB) and the least significant bit (LSB) are n−1 and 0. The number of 1 (or hamming weight of i) in the binary representation of i is expressed as dH (i). Binary expansion of the index i in the polar code shows a polarization process of the source bit ui in a multistage polarization process. The multistage polarization process is indicated in the order of bit indexes of the binary representation from n −1 to 0, and a value of 1 denotes experience of a channel upgrade and a value of 0 denotes experience of a downgrade. For example, in the case of) (1000), it means experience of the upgrade in a first polarization step and experience of three downgrades thereafter. Through analysis of the polarization process of the source bits, candidates to belong to the additional extra-freezing set are determined. To this end, the set S including location indexes corresponding to it=0 is first defined as a “downgrade pattern.” For example, a bit having an index of 5=(0101) in 16, and thus has a downgrade pattern of (3,1). Further, a k-bit downgrade pattern means a location index sequence corresponding to k bits having it=0 in the binary representation of i. At this time, bit indexes having the k-bit downgrade pattern are Σi∈[0:n−1]\{j1, . . . , jk}2i being location indexes of it=0). For example, in
16, a 2-bit downgrade pattern is {(3,2), (3, 1), (3,0), (2, 1), (2,0), (1,0)} and bit indexes are 3, 5, 6, 9, 10, and 12.
In 5G-NR, bits having indexes smaller than N/4 are always extra-frozen even when the number of punctured bits is 0, which corresponds to extra-freezing of all bits corresponding to in−1=in−2=0. That is, (n−1) and (n−2) are always included in the downgrade pattern. Particularly, among all the 2-bit downgrade patterns, only (n−1, n−2) are included (that is, uN/4−1). However, among all of
2-bit downgrade patterns, there may be bits weak at puncturing as well as (n−1, n−2). For example, indexes and binary representation of bits weak at puncturing in
They commonly experience at least one downgrade in first two polarization steps. For example, bits having index values of 126, 125, 123, 119, 111, and 95 shown in [Table 2] experience the downgrade in the first polarization step and additionally experience one downgrade in the remaining polarization steps. Bits having indexes of 159 and 175 in [Table 1] experience the downgrade in the second polarization step and additionally experience one downgrade in the following polarization step.
Similarly, in N=512, bits having index values of 254, 253, 251, 247, 239, 223, and 191 experience the downgrade in the first polarization step and additionally experience one downgrade in the remaining polarization steps. Bits having indexes of 319 and 351 in [Table 3] experience the downgrade in the second polarization step and additionally experience one downgrade in the following polarization step. These are bits of which 1) the downgrade pattern satisfies (n−1, t) t ∈ [n−2:0], and 2) the downgrade pattern satisfies (n−2, n−3) or (n−2, n−4).
The disclosure performs additional extra-freezing (AEF) conditionally for source bits having the more generalized 2-bit downgrade pattern in addition to consideration of only (n−1, n−2) in the 2-bit downgrade patterns. That is, in the disclosure, bits additionally extra-frozen (that is, AEF bits) may be determined according to several threshold conditions of the message length. Specifically, when the message length is smaller than a specific threshold, the AEF set includes all of (n+1) bits that satisfy the above two conditions. However, when the message length increases, the size of the AEF set is reduced, and when the message length is larger than the maximum threshold, the size of the AEF set becomes 0. This means that the released bit in the AEF set is used again as the information bit.
First, an index set of bits particularly weak at puncturing is defined. The size of the set
is |
|=Nw, and may be expressed as W1N
(or W1N
(or W1N
(or W1N
(or W1N
At this time, a threshold τ1, τ2, . . . , τN including all weak bits of [Table 2] above is configured, and Nw=9 may be determined when the set
including all weak bits of [Table 3] is configured. [Table 4] below shows a method of designing the additional extra-freezing set S2A, based on
.
(ordered sequence W1N
E ≥ 3N/4,
-1. K < τ1: S2A = W1N
-2. τ1 ≤ K < τ2: S2A = W1N
-3. τ2 ≤ K < τ3: S2A = W1N
-(Nw). τN
-(Nw + 1). τN
E < 3N/4,
-1. S2A and S2E which are the same as those in a sub-process of
are configured.
[Table 5] below shows an example of designing the additional extra-freezing set S2A when Nw=4. At this time, (or the ordered sequence W14=(w1, w2, w3, w4) includes indexes of bits when the indexes are expressed in binary (a bit having the location of (n−1, n−3) as 0 and the remaining values of 1, a bit having the location of (n−1, n−4) as 0 and the remaining values of 1, a bit having the location of (n−2, n−3) as 0 and the remaining values of 1, and a bit having the location of (n−2, n−4) as 0 and the remaining values of 1). As an embodiment, S2A (or S2E) may be determined according to K based on W14. That is, the example of Nw=4 is an example of designing the additional extra-freezing set for bits that 1) experience one downgrade in the first or second step, 2) experience a total of two downgrades, and 3) all experience the upgrade in the remaining steps within first four polarization steps.
E ≥ 3N/4,
-5. τ4 ≤ K: S2E = S2 (or S2A = Ø)
E < 3N/4,
-1. S2A which are the same as that in 1-3 of
is configured.
When K (or R) is smaller than a first threshold τ1, S2A may include all weak bits (4 bits). Bits having downgrade patterns (n−1, n−3), (n−1, n−4), (n−2, n−3), and (n−2, n−4) may be included (S2A=W14). When K (or R) is larger than or equal to the first threshold τ1 and smaller than a second threshold τ2, the size of S2 A is reduced by one (S2A=W13). Specifically, the bit having the downgrade pattern (n−2, n−4) is excluded. When K (or R) is larger than or equal to the second threshold τ2 and smaller than a third threshold τ3, the size of S2A is reduced by one by excluding the bit having the downgrade pattern (n−2, n−3) (S2A=W12). When K (or R) is larger than or equal to the third threshold τ3 and smaller than a fourth threshold τ4 the size of S2A is reduced by one by excluding the bit having the downgrade pattern (n−1, n−4) (S2A=W11). Last, when K (or R) is larger than the fourth threshold τ4, S2A has the EF set which is the same as that in the prior art by excluding the bit having the downgrade pattern (n−1, n−3) (S2A=Ø or S2E=S2). The first, second, third, and fourth thresholds τ1, τ2, τ3, τ4(τ1≤τ2≤τ3≤τ4) may be determined through various methods. For example, when thresholds for K are defined,
τ1=└T2×0.795┘-1, τ3=└T2×1.1┘−1, and └τ2×1.32 ┘−1 may be determined. Alternatively, thresholds for determining the AEF may be predefined for every code length, which is as shown in [Table 6].
Example of first, second, third, and fourth thresholds determined for AEF release (thresholds for K)
In the disclosure, bits having the downgrade patterns (n−1, n−3) and (n−2, n−3) may be included in the weak bit set . That is, in the configuration of
(or W1N
may be differently designed depending on a channel state and, for example, the weak bit set may be differently configured according to a target error rate range under density evolution.
More specifically, highlighted bit indexes in reference numeral 1010 of
As shown in part (b) of
and thus indexes of S2={0,1, . . . , 25} are extra-frozen (S1≠S2 in heavy puncturing). Accordingly, first N−K−|S1 ∪S2|=64−16−30=18 bits of Q063 except for indexes of S1 ∪S2={0, . . . , 25, 32, 33, 34, 35} are reliability-frozen and data is transmitted to the remaining 16 bits. When the message length is not considered, elements of S2 are not included in A=16, and thus the performance which is the same as that when extra-freezing is not performed is obtained. Unlike this, as shown in part (b) of
As provided in the disclosure, when the additional extra-freezing set is applied in consideration of the message length, there is an effect of improving the decoding performance compared to the case where the additional extra-freezing set is not applied. More specifically, in the case of the decoding performance according to the modulation order and the decoding performance according to the code length, it is possible to acquire an additional performance gain by adaptively freezing relatively weak bits at a low coding rate through the application of the additional extra-freezing set in consideration of the message length.
Further, as provided in the disclosure, when the additional extra-freezing set is applied in consideration of the message length under successive cancellation list (SCL) decoding, there is an effect of improving the block error rate (BER) performance compared to the case where the additional extra-freezing set is not applied. In addition, as provided in the disclosure, even when the additional extra-freezing set is applied in consideration of the message length in a fading channel, there is an effect of improving the decoding performance.
A channel encoding device according to an embodiment of the disclosure may determine an additional extra-freezing (AEF) set S2A from an index set of weak bits.
As an embodiment, the set (or the ordered sequence W1N
in consideration of a BER for each bit considering puncturing in an SNR that achieves BLER=0.1%). Alternatively, the set
may be determined based on a 2-bit downgrade pattern obtained through a polarization process. For example, in the case of Nw=4, bits that 1) experience one downgrade in the first or second polarization step, 2) experience a total of two downgrades, and 3) experience the upgrade in the remaining steps. At this time, bits having downgrade patterns (n−1, n−3) and (n−2, n−3) may be included in
.
As an embodiment, a set S2A having a variable size may be determined according to K (or A, A/E) from the determined set . Specifically, thresholds (τ1, τ2, . . . , τN
(or the ordered sequence W1N
Part (a) of
are extra-frozen, and when E is smaller, all bits having indexes equal to or smaller than
are extra-frozen.
Part (b) of
Referring to
The transceiver 1402 may transmit and receive signals to and from another electronic device (for example, a receiver). The memory 1403 may store at least one piece of information related to the transceiver 1402 and information transmitted and received through the transceiver 1402. Further, the memory 1403 may store sequence information for polar coding to which the disclosure is applied.
The processor 1401 may control the operation of the encoding device, and may overall control the encoding device to perform operations related to the encoding device in each of the embodiments described above.
According to an embodiment of the disclosure, the memory 1403 may store a basic program, an application program, and data such as configuration information for the operation of the electronic device. Particularly, the memory 1403 provides the stored data according to a request from the processor 1401. The memory 1403 may be configured by storage media such as ROM, RAM, hard disc, CD-ROM, and DVD, or a combination of the storage media. The number of memories 1403 may be plural. The processor 1401 may implement the above-described embodiments, based on a program for implementing the embodiments of the disclosure stored in the memory 1403 and may include at least one processor.
According to an embodiment of the disclosure, the processor 1401 may determine the length of a mother code, based on the length of at least one information bit to be transmitted and a target coding rate. The processor 1401 may determine at least one frozen bit to not transmit information among first bits included in an input source vector corresponding to the mother code, based on the length of at least one information bit to be transmitted. The processor 1401 may allocate at least one information bit to be transmitted to at least one second bit except for at least one determined frozen bit among the first bits included in the input source vector. The processor 1401 may generate a codeword by encoding the input source vector to which at least one information bit to be transmitted is allocated into a predetermined polar code.
As an embodiment, at least one frozen bit may be determined by puncturing. As an embodiment, at least one frozen bit may be determined by a parameter indicating a state of a channel for transmitting the transmission bit. As an embodiment, at least one frozen bit may be determined in consideration of bit indexes in binary representation indicating a polarization process for bits included in the input source vector corresponding to the mother code, and when the number of bit indexes in the binary representation is n, at least one frozen bit may include a bit having a bit index of “0” between (n−1, n−3) and (n−2,n−3).
As an embodiment, the number of at least one frozen bit may be determined by a first threshold and a second threshold for the length of the information bits to be transmitted, and the number of at least one frozen bit may be maximum when the length of the information bits to be transmitted is shorter than the first threshold and the number of at least one frozen bits may be minimum when the length of the information bits to be transmitted is longer than the second threshold.
As an embodiment, when the length of the bits to be transmitted is longer than or equal to the first threshold and equal to or shorter than the second threshold, the number of at least one frozen bits may be reduced to the number corresponding to an increase in the length of the information bits to be transmitted. As an embodiment, at least one frozen bit may include frozen bits determined by a pre-freezing set, an extra-freezing set, and a reliability freezing set. As an embodiment, the processor 1401 may allocate at least one information bit to be transmitted to at least one second bit in the order of bits having high channel reliability among at least one second bit.
In the above-described detailed embodiments of the disclosure, an element included in the disclosure is expressed in the singular or the plural according to presented detailed embodiments. However, the singular form or plural form is selected appropriately to the presented situation for the convenience of description, and the disclosure is not limited by elements expressed in the singular or the plural. Therefore, either an element expressed in the plural may also include a single element or an element expressed in the singular may also include multiple elements.
Although specific embodiments have been described in the detailed description of the disclosure, it will be apparent that various modifications and changes may be made thereto without departing from the scope of the disclosure. Therefore, the scope of the disclosure should not be defined as being limited to the embodiments set forth herein, but should be defined by the appended claims and equivalents thereof.
Although the present disclosure has been described with various embodiments, various changes and modifications may be suggested to one skilled in the art. It is intended that the present disclosure encompass such changes and modifications as fall within the scope of the appended claims.
Number | Date | Country | Kind |
---|---|---|---|
10-2023-0155389 | Nov 2023 | KR | national |