CN101695016B - Multi-user random access system based on rateless codes and coding and decoding method thereof - Google Patents

Multi-user random access system based on rateless codes and coding and decoding method thereof Download PDF

Info

Publication number
CN101695016B
CN101695016B CN 200910153394 CN200910153394A CN101695016B CN 101695016 B CN101695016 B CN 101695016B CN 200910153394 CN200910153394 CN 200910153394 CN 200910153394 A CN200910153394 A CN 200910153394A CN 101695016 B CN101695016 B CN 101695016B
Authority
CN
China
Prior art keywords
user
encoded packets
soft
decoding
mapping
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN 200910153394
Other languages
Chinese (zh)
Other versions
CN101695016A (en
Inventor
陈少磊
张朝阳
吴可镝
陈晓明
林泽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang University ZJU
Original Assignee
Zhejiang University ZJU
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang University ZJU filed Critical Zhejiang University ZJU
Priority to CN 200910153394 priority Critical patent/CN101695016B/en
Publication of CN101695016A publication Critical patent/CN101695016A/en
Application granted granted Critical
Publication of CN101695016B publication Critical patent/CN101695016B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Error Detection And Correction (AREA)

Abstract

The invention discloses a multi-user random access system based on rateless codes and a coding and decoding method thereof, which can adaptively adjust the respective transmission code rate by using the adaptive link adaptation characteristic of the rateless codes and the random characteristic when the rateless codes are coded under the conditions that each user transmitter needs not to know channel state information and no feedback retransmission mechanism is needed in the transmission process, and can effectively use the conflict overlapped information of multiple users to simultaneously transmit the information of the multiple users effectively and reliably and detect and separate the information of the multiple users correctly.

Description

Multi-user random access system and coding and decoding method thereof based on no-rate codes
Technical field
The present invention relates to wireless communication field, relate in particular to a kind of multi-user random access system based on no-rate codes and coding and decoding method thereof.
Background technology
In modern mobile radio system, must adopt good multi-user's transmission means to guarantee that a plurality of users transmit information simultaneously effectively reliably.Though traditional ALOHA technology can realize the transmission under multi-user's single channel condition, can not utilize a plurality of user's conflicts or overlapping information, efficient is not high.And traditional CDMA (Code-Division Multiple-Access) transmission means is the information of distinguishing different user by different frequency expansion sequences, to finish the access transmission of multi-user information.IDMA (Interleave-Division Multiple-Access) transmission means that Li Ping proposes (is seen " Interleave DivisionMultiple-Access ", IEEE Trans.Wireless Commun., vol.5, no.4, pp.938-947, Apr.2006.), then be that different user is by using different interleavers, effectively utilize the information of user's aliasing, realize that the signal of different user separates, to finish the access transmission of multi-user information.But no matter be CDMA or IDMA, in the system each user employed be the fixing coded system of traditional code check, before the information of carrying out transmission, need estimate channel parameter according to channel condition information usually, be fixed as the channel error correction coding of R according to code check of channel parameter design.When estimated channel parameter during greater than the channel parameter of reality, though can realize reliable transmission, caused the waste of transmission, because can use the channel error correction coding of higher code check this moment; When estimated channel parameter during less than the channel parameter of reality, then can not realize reliable transmission.In order to make state information that transmitting terminal learns channel with the fixing coded system of design code check, and in transmission course the packet of retransmission of lost, often need to adopt certain feedback mechanism, for example ARQ (AutoRepeat-Request) etc.
Summary of the invention
The objective of the invention is at the deficiencies in the prior art, a kind of multi-user random access system based on no-rate codes and coding and decoding method thereof are provided, need not to know channel condition information at each user's transmitter, and in transmission course, need not under the condition of any feedback retransmission mechanism, can adjust transmission code rate separately adaptively, and can effectively utilize a plurality of users overlapping information of conflicting, realize that the transmission effectively reliably simultaneously of a plurality of user profile and correct detection separate.
The objective of the invention is to be achieved through the following technical solutions: a kind of multi-user random access system based on no-rate codes, formed by transmitting terminal and receiving terminal.Wherein transmitting terminal comprises the transmitter of the individual single channel input of K (K is any positive integer), single channel output, and receiving terminal comprises the receiver of a single channel input, the output of K road.This system runs on the communication two ends.At transmitting terminal, each user has a transmitter, and the structure of each transmitter is all identical.For user k (k=1,2 ..., K), its transmitter comprises encoder-k connected in series, mapper-k and access controller-k:
Encoder-k is used for the message packets of user k is compiled the Rateless Code encoded packets that produces for continually, the data flow of its input termination outer message data bag, and its output is connected to the input of mapper-k;
Mapper-k is used for finishing by the mapping of encoded packets data bit to the encoded packets transmission symbol, and available common linear modulation mapper is realized, the output of its input termination encoder-k, and its output is connected to the input of access controller-k;
Access controller-k mainly finishes the transmission of encoded packets control, determines at random whether present encoding to be wrapped in namely that access channel sends in the current time slots by pre-determined probability, the output of its input termination mapper-k, and its output is connected to channel;
K user's the transmitter access channel that walks abreast is formed the transmitting terminal of system.
At receiving terminal, the receiver of the input of its single channel, the output of K road is divided into parallel K road in inside, and each user correspondence is wherein corresponding one the tunnel, and has identical structure.For user k (k=1,2 ..., K), its corresponding that line structure comprises solution connected in series mapping and soft decoding information estimator-k and judgement decoder-k:
Separate mapping and soft decoding information estimator-k, being used for finishing each subscriber signal according to the aliasing encoded packets of coming self-channel that receives separates, and finish estimation to the soft information of encoded packets bit Log likelihood ratio of user k by separating mapping, it imports the input that comes from channel of termination receiver and all the other respectively adjudicate the soft information output of decoder except judgement decoder-k, and its output is connected to the input of judgement decoder-k;
Judgement decoder-k, be used for finishing the decoding to user k encoded packets, the output of its input termination solution mapping and soft decoding information estimator-k, its court verdict output output decode results, as one tunnel output of receiver, its soft information output be connected to except understanding mapping and soft decoding information estimator-k all the other each separate and shine upon and the input of soft decoding information estimator;
The parallel formation of K line structure receiver, the receiving terminal of composition system.
We abbreviate this multi-user random access system based on no-rate codes as RMA (RatelessMultiple-Access) system.
A kind of coding and decoding method of above-mentioned multi-user random access system based on no-rate codes comprises coding method and interpretation method.At transmitting terminal, the coding of finishing each user according to coding method inserts, and each user's encoded packets access channel is sent; At receiving terminal, according to interpretation method, according to the aliasing encoded packets that receives, the detection of finishing each subscriber-coded bag separates and decoding;
Coding method is as follows: the transmitter of establishing each user all needs to send m message packets, and each message packets is made up of b data bit, comprising a cyclic redundancy check (CRC) code, is used for decoder and judges that whether decoding is successful, uses d k(i) expression message packets, wherein i be message packets numbering (i=1,2 ..., m), subscript k be the user numbering (k=1,2 ..., K);
Consider wherein k user (k=1,2 ..., K), according to the following steps access of encoding:
1) utilize encoder-k to encode;
With message packets d k(i) send into encoder-k, by Rateless coded system (as LT Code, RaptorCode etc.), the encoded packets sequence that is produced continually and the Tanner of this sign indicating number figure use v k(s) encoded packets of presentation code gained, wherein s be encoded packets numbering (s=1,2 ...), subscript k be the user numbering (k=1,2 ..., K);
Each user independently finishes the cataloged procedure of oneself, use the random number generator that is different from other users during coding, to obtain different with other users, separate Tanner figure, can guarantee the irrelevance of each subscriber signal like this, each user's signal separates during for decoding provides feasibility;
2) utilize mapper-k, carry out by the mapping of encoded packets data bit to the encoded packets transmission symbol;
The encoded packets v that will be obtained by encoder-k k(s) send into mapper-k, mapping mode can adopt common linear modulation mode (as BPSK, QPSK etc.), finishes by the mapping of encoded packets data bit to the encoded packets transmission symbol: v k(s) → w k(s), wherein s be encoded packets numbering (s=1,2 ...), subscript k be the user numbering (k=1,2 ..., K);
3) utilize access controller-k, carry out the transmission control to encoded packets;
The process mapped coding bag w that will be obtained by mapper-k k(s) send into access controller-k, any time slot j (j=1,2 ...), user k is with Probability p kOrder is with w k(s) access channel sends: use x k(j) expression user k is at the symbol of time slot j channel transmission, if determine at current time slots j encoded packets w k(s) access channel is then at encoded packets w k(s) packet header increases user's beacon information of K bit, k position 1 wherein, and transmission encoded packets w is formed in all the other each positions 0 k' (s), make x k(j)=w k' (s), judge whether w at next time slot k(s+1) access channel; Otherwise make x k(j)=0, next time slot continues to judge whether w k(s) access channel;
Because what adopt is the Rateless coded system, so through the sequence after coding and the mapping w k={ w k(1), w k(2) ..., w k(s) ... } produce continually, so the sequence that channel sends x k={ x k(1), x k(2) ..., x k(j) ... } also be endlessly, length is not what fix, x kEach length corresponding corresponding code check all;
Each user's transmitter produces encoded packets and access channel endlessly according to above rule, informs that until receiving terminal it stops to send.
Interpretation method is as follows:
Receiver receives self-channel, endlessly, the mutual aliasing of each user and added the encoded packets of noise, each user's signal separates and decoding is carried out simultaneously, for user k (k=1,2, ..., K), its judgement decoder-k adopts the random number generator identical with encoder-k, so the Tanner of this sign indicating number of reconstruct schemes accurately, carry out signal separation and decoding according to following steps:
1) receiver at first receives N=m the aliasing encoded packets of coming self-channel;
2) receiver receives Δ N aliasing encoded packets again, makes N=N+ Δ N, and the code check of this moment is R = m N ;
3) encoded packets that receives is sent into solution mapping and soft decoding information estimator-k, adopt " based on the soft decoding information method of estimation of the multi-user random access system of no-rate codes ", under current code check R, carry out computing, the soft information of output (being 0 during initialization) of utilization judgement decoder of all the other each users except judgement decoder-k is upgraded and is estimated soft information;
4) will upgrade the soft information of estimation that obtains as the input of judgement decoder-k by separating mapping and soft decoding information estimator-k, Tanner figure under the current code check R of reconstruct moves BP (Belief-Propagation) decoding algorithm, finish one and take turns the iterative decoding computing, and upgrade output court verdict information and the soft information of output of judgement decoder-k;
5) utilize the output court verdict information of judgement decoder-k to judge whether decode results satisfies the verification relation that check-node limits among the Tanner figure, perhaps iterations has reached the maximum times that limits, if satisfy one of above-mentioned two conditions, then change step 6) over to; Otherwise change step 3) over to;
6) utilize the cyclic redundancy check (CRC) code judgment data bag in each bag whether all to decipher correctly, if all correct, change step 7) over to; Otherwise change step 2 over to);
7) decoding finishes, and receiver sends a signal and informs that the transmitter of user k stops to send.
The soft decoding information method of estimation of described multi-user random access system based on no-rate codes is as follows:
We establish receiver and receive self-channel, endlessly, each user's aliasing and added that the encoded packets sequence of noise is y={y (1), y (2) ..., y (j) ... }:
y ( j ) = Σ i = 1 K h i · x i ( j ) + n ( j ) , ( j = 1,2 , . . . )
Wherein j is the time slot label, subscript i be the user numbering (i=1,2 ... K), x i={ x i(1), x i(2) ..., x i(j) ... } be the sequence endlessly that i user's channel sends, h is channel parameter, n=n (1), n (2) ..., n (j) ... } for average is 0, variance is σ 2The white Gauss noise sequence;
At receiver, user's beacon information in the encoded packets packet header that we receive according to arbitrary time slot j, the channel of judging each user of this time slot inserts situation and (a K bit in packet header is made hard decision, k (k=1,2 ..., K) position bit decision result is that k user of 1 expression inserted channel, be that k user of 0 expression do not have access channel), remove user's beacon information then; Use J kExpression user k (k=1,2 ..., the set of encoded packets access slot K):
J k={j|x k(j)≠0,j=1,2,...}={J k(1),J k(2),...,J k(q k),...}
Q wherein kBe set J kNumbering (the q of middle element k=1,2 ...), subscript k be the user numbering (k=1,2 ..., K);
For each user, we will receive the encoded packets sequence of different length at receiver yThe time, namely under different code check R, calculate its output of separating mapping and soft decoding information estimator and estimate soft information, to user k, establish receiver and received N encoded packets y=y (1), y (2) ..., y (N) }, then current code check is R=m/N;
For its access slot set J kIn each time slot J k(q k), the aliasing encoded packets y (J that it receives k(q k)), can write:
y ( J k ( q k ) ) = h k · x k ( J k ( q k ) ) + Σ i ≠ k , J k ( q k ) ∈ J i , J k ( q k ) = J i ( q i ) h i · x i ( J i ( q i ) ) + n ( J k ( q k ) )
= h k · x k ( J k ( q k ) ) + ζ k ( J k ( q k ) ) , ( q k = 1,2 , . . . | J k | )
ζ wherein k(J k(q k)) be at time slot J k(q k), other subscriber signals of non-zero and white Gaussian noise sum, we are referred to as to merge noise and be similar to and regard it as Gaussian random variable, and average is designated as E[ζ k(J k(q k))], variance is designated as Var[ζ k(J k(q k))], so can be with received code bag y (J k(q k)) also regard as and meet Gaussian characteristics:
y(J k(q k))~N(h k·x k(J k(q k))+E[ζ k(J k(q k))],Var[ζ k(J k(q k))]),
Wherein E [ ζ k ( J k ( q k ) ) ] = Σ i ≠ k , J k ( q k ) ∈ J i , J k ( q k ) = J i ( q i ) h i · E [ x i ( J i ( q i ) ) ]
Var [ ζ k ( J k ( q k ) ) ] = Σ i ≠ k , J k ( q k ) ∈ J i , J k ( q k ) = J i ( q i ) h i 2 · Var [ x i ( J i ( q i ) ) ] + σ 2
In separating mapping and soft decoding information estimator-k, at first according to the corresponding average operation rule of selected mapping mode Γ EWith variance operation rule Γ Var, by the soft information of bit log likelihood ratio of all the other each subscriber-coded bags, calculate average and the variance of the mapping symbols of all the other each subscriber-coded bags; Then according to the corresponding solution mapping ruler of selected mapping mode F, average and variance by the mapping symbols of the aliasing encoded packets that receives and all the other each subscriber-coded bags of having calculated, according to the Gaussian characteristics that the received code bag meets, estimate the soft information of bit log likelihood ratio of user k encoded packets.
When a time iteration, according to " estimating soft information updating expression formula "
LLR k a ( v ( q k ) ) = F ( y ( J k ( q k ) ) , E [ ζ k ( J k ( q k ) ) ] , Var [ ζ k ( J k ( q k ) ) ] )
= F ( y ( J k ( q k ) ) , Σ i ≠ k , J k ( q k ) ∈ J i , J k ( q k ) = J i ( q i ) h i · E [ x i ( J i ( q i ) ) ] ,
Σ i ≠ k , J k ( q k ) ∈ J i , J k ( q k ) = J i ( q i ) h i 2 · Var [ x i ( J i ( q i ) ) ] + σ 2 )
= F ( y ( J k ( q k ) ) , Σ i ≠ k , J k ( q k ) ∈ J i , J k ( q k ) = J i ( q i ) h i · Γ E ( L i a - 1 ( v ( q i ) ) ) ,
Σ i ≠ k , J k ( q k ) ∈ J i , J k ( q k ) = J i ( q i ) h i 2 · Γ Var ( L i a - 1 ( v ( q i ) ) ) + σ 2 )
(q k=1,2,...|J k|)
Upgrade and estimate soft information, LLR in the formula k a(v (qk)) for a time iterative decoding of user k required by the q that separate to shine upon and soft decoding information estimator-k estimates kThe soft dope vector of bit log likelihood ratio of individual encoded packets, L i A-1(v (q i)) be the q behind the a-1 time iterative decoding of user i iThe soft dope vector of bit log likelihood ratio of individual encoded packets (during initialization a=1, L i 0 ( v ( q i ) ) = 0 );
If mapping mode adopts BPSK, with concrete average operation rule Γ E, BPSK, variance operation rule Γ Var, BPSKAnd solution mapping ruler F BPSKSubstitution " is estimated soft information updating expression formula ", can obtain its concrete expression-form:
LLR k a ( v ( q k ) ( c ) ) = 2 h k · y ( J k ( q k ) ) ( c ) - Σ i ≠ k , J k ( q k ) ∈ J i , J k ( q k ) = J i ( q i ) h i · ( 1 - 2 e L i a - 1 ( v ( q i ) ( c ) ) + 1 ) Σ i ≠ k , J k ( q k ) ∈ J i , J k ( q k ) = J i ( q i ) 4 h i 2 · e L i a - 1 ( v ( q i ) ( c ) ) ( e L i a - 1 ( v ( q i ) ( c ) ) + 1 ) 2 + σ 2
(q k=1,2,...|J k|c=1,2,...,b)
Y (J wherein k(q k)) (c)Be illustrated in time slot J k(q k) c symbol among the aliasing encoded packets y that receives, LLR k a(v (q k) (c)) for a time iterative decoding of user k required by the q that separate to shine upon and soft decoding information estimator-k estimates kThe soft information of log likelihood ratio of c bit of individual encoded packets, L i A-1(v (q i) (c)) be the q behind the a-1 time iterative decoding of user i iThe soft information of log likelihood ratio of c bit of individual encoded packets.
If mapping mode adopts QPSK, then with concrete average operation rule Γ E, QPSK, variance operation rule Γ Var, QPSKAnd solution mapping ruler F QPSKSubstitution " is estimated soft information updating expression formula ", can obtain its concrete expression-form:
LLR k a ( v ( q k ) ( 2 c - 1 ) ) = 2 h k · Re [ y ( J k ( q k ) ) ( c ) ] - Σ i ≠ k , J k ( q k ) ∈ J i , J k ( q k ) = J i ( q i ) h i · ( 1 - 2 e L i a - 1 ( v ( q i ) ( 2 c - 1 ) ) + 1 ) Σ i ≠ k , J k ( q k ) ∈ J i , J k ( q k ) = J i ( q i ) 4 h i 2 · e L i a - 1 ( v ( q i ) ( 2 c - 1 ) ) ( e L i a - 1 ( v ( q i ) ( 2 c - 1 ) ) + 1 ) 2 + σ 2
LLR k a ( v ( q k ) ( 2 c ) ) = 2 h k · Im [ y ( J k ( q k ) ) ( c ) ] - Σ i ≠ k , J k ( q k ) ∈ J i , J k ( q k ) = J i ( q i ) h i · ( 1 - 2 e L i a - 1 ( v ( q i ) ( 2 c ) ) + 1 ) Σ i ≠ k , J k ( q k ) ∈ J i , J k ( q k ) = J i ( q i ) 4 h i 2 · e L i a - 1 ( v ( q i ) ( 2 c ) ) ( e L i a - 1 ( v ( q i ) ( 2 c ) ) + 1 ) 2 + σ 2
(q k=1,2,...|J k|c=1,2,...,b/2)
Wherein, y (J k(q k)) (c)Be illustrated in time slot J k(q k) c symbol among the aliasing encoded packets y that receives, LLR k a(v (q k) (2c-1)), LLR k a(v (q k) (2c)) for a time iterative decoding of user k required by the q that separate to shine upon and soft decoding information estimator-k estimates kThe soft information of log likelihood ratio of the odd bits of individual encoded packets and even bit bit, L i A-1(v (q i) (2c-1)), L i A-1(v (q i) (2c)) be the q behind the a-1 time iterative decoding of user i iThe soft information of log likelihood ratio of the odd bits of individual encoded packets and even bit bit, Re[.] expression gets real part computing, Im[.] expression gets imaginary-part operation;
To estimate soft dope vector LLR then k a(v (q k)) as the soft dope vector L of input that adjudicates decoder-k k In, a(q k), even L k in , a ( q k ) = LLR k a ( v ( q k ) ) , Send into the iterative decoding that judgement decoder-k carries out a time; All the other each users are also by this same operation, and each user's decoding is carried out simultaneously; After finishing a time iteration, for user k, obtain the soft dope vector L of output of its judgement decoder-k k Out, a(q k), order L k a ( v ( q k ) ) = L k out , a ( q k ) , All the other users are also by this same operation, then will be worth substitution accordingly and " estimate soft information updating expression formula ", beginning is the iteration of (the a+1 time) newly once, by that analogy, satisfy verification relation or the iterations that check-node limits among the Tanner figure until the decode results of adjudicating decoder-k and reach the maximum times that limits;
The soft information that can finish like this under the code check R=m/N is estimated, because the Rateless attribute of coded system, its encoded packets sequence length N constantly changes, we can be under different received code packet lengths, be under each code check, move each self-corresponding computing, thereby finish the soft information estimation under each code check, and then finish signal separation and decoding.
The invention has the beneficial effects as follows: the present invention takes full advantage of the adaptive link fit characteristics of no-rate codes, with and when coding stochastic behaviour---the no-rate codes encoded packets of different user generates at random according to certain way, mutual incoherent this characteristic, need not to know channel condition information at each user's transmitter, and in transmission course, need not under the condition of any feedback retransmission mechanism, can adaptive adjustment transmission code rate separately, and can effectively utilize a plurality of users overlapping information of conflicting, realize that the transmission effectively reliably simultaneously of a plurality of user profile and correct detection separate.
Description of drawings
Fig. 1 is the concrete structure block diagram of RMA system;
When Fig. 2 is the employing LT Code of RMA system coding, the Tanner figure of its LT Code
When Fig. 3 was the employing Raptor Code of RMA system coding, the Tanner of the LDPC Code of its outer sign indicating number part schemed;
When Fig. 4 is the employing Raptor Code of RMA system coding, the Tanner figure of the LT Code of its ISN part;
When Fig. 5 is the employing Raptor Code of RMA system coding, the whole Tanner figure of its Raptor Code;
Fig. 6 is the RMA system (each inserts with probability 1, during code check R=1/16 with adopting the BPSK modulation system per family) that adopts Raptor Code and (each the user R of IDMA system that adopts Zigzag Code Zigzag=1/2,8 times of spread spectrums, code check R=1/16) the bit error rate comparison diagram under each signal to noise ratio, number of users K=2;
Fig. 7 is the RMA system (each inserts with probability 1, during code check R=1/16 with adopting the BPSK modulation system per family) that adopts Raptor Code and (each the user R of IDMA system that adopts Zigzag Code Zigzag=1/2,8 times of spread spectrums, code check R=1/16) the bit error rate comparison diagram under each signal to noise ratio, number of users K=4.
Embodiment
Followingly with reference to accompanying drawing the present invention is further described, it is more obvious that purpose of the present invention and effect will become.
No-rate codes (Rateless Code) is a kind of novel channel coding method with adaptive link fit characteristics.It is that with the fixing coded system maximum of traditional code check different it does not set cbr (constant bit rate) at transmitting terminal, and the number of its encoded packets is hard-core.Transmitting terminal can produce encoded packets endlessly at random and sends according to certain way.Receiving terminal then can be after receiving these encoded packets trial and error decoding.From the statistical significance, each encoded packets is comprising the identical amount of information about message packets, receiving terminal also is indifferent to the reception condition of concrete some encoded packets, but is concerned about the total quantity of the encoded packets that receives, and therefore need not the mechanism of feeding back and retransmitting in transmission course.As long as receiving terminal receives abundant encoded packets, just can decoding success; If decoding failure, receiving terminal some encoded packets that receive again continues trial and error decoding then.Receiving terminal will repeat this process up to successfully decoded always.In case successfully decoded, receiving terminal only need send a very simple signal and inform that transmitting terminal stops transmission and gets final product, and has so just finished whole transmission course.At this moment, the code check of actual transmissions depends on the encoded packets number of actual transmission, and the actual encoded packets number that sends depends on channel conditions at that time.This shows, adopt the no-rate codes coded system, can not know any channel condition information at transmitting terminal, and need not to adjust transmission code rate adaptively under the condition of any feedback retransmission mechanism in transmission course, guarantee information is transmission effectively reliably.
With reference to Fig. 1, a RMA system that comprises the individual user of K (K is any positive integer) is made of transmitting terminal and receiving terminal.Wherein transmitting terminal comprises the transmitter of K single channel input, single channel output, and receiving terminal comprises the receiver of 1 single channel input, the output of K road.This system runs on the communication two ends.At transmitting terminal, each user has a transmitter, and the structure of each transmitter is all identical.For user k (k=1,2 ..., K), its transmitter comprises encoder-k connected in series, mapper-k and access controller-k:
Encoder-k is used for the message packets of user k is compiled the Rateless Code encoded packets that produces for continually, the data flow of its input termination outer message data bag, and its output is connected to the input of mapper-k;
Mapper-k is used for finishing by the mapping of encoded packets data bit to the encoded packets transmission symbol, and available common linear modulation mapper is realized, the output of its input termination encoder-k, and its output is connected to the input of access controller-k;
Access controller-k mainly finishes the transmission of encoded packets control, determines at random whether present encoding to be wrapped in namely that access channel sends in the current time slots by pre-determined probability, the output of its input termination mapper-k, and its output is connected to channel;
K user's the transmitter access channel that walks abreast is formed the transmitting terminal of system.
At receiving terminal, the receiver of the input of its single channel, the output of K road is divided into parallel K road in inside, and each user correspondence is wherein corresponding one the tunnel, and has identical structure.For user k (k=1,2 ..., K), its corresponding that line structure comprises solution connected in series mapping and soft decoding information estimator-k and judgement decoder-k:
Separate mapping and soft decoding information estimator-k, being used for finishing each subscriber signal according to the aliasing encoded packets of coming self-channel that receives separates, and finish estimation to the soft information of encoded packets bit Log likelihood ratio of user k by separating mapping, it imports the input that comes from channel of termination receiver and all the other respectively adjudicate the soft information output of decoder except judgement decoder-k, and its output is connected to the input of judgement decoder-k;
Judgement decoder-k, be used for finishing the decoding to user k encoded packets, the output of its input termination solution mapping and soft decoding information estimator-k, its court verdict output output decode results, as one tunnel output of receiver, its soft information output be connected to except understanding mapping and soft decoding information estimator-k all the other each separate and shine upon and the input of soft decoding information estimator;
The parallel formation of K line structure receiver, the receiving terminal of composition system.
The coding and decoding method of above-mentioned multi-user random access system based on no-rate codes comprises coding method and interpretation method.At transmitting terminal, the coding of finishing each user according to coding method inserts, and each user's encoded packets access channel is sent; At receiving terminal, according to interpretation method, according to the aliasing encoded packets that receives, the detection of finishing each subscriber-coded bag separates and decoding.
Coding method is as follows: the transmitter of establishing each user all needs to send m=1024 message packets, each message packets is made up of b=128 data bit, comprising a cyclic redundancy check (CRC) code, this cyclic redundancy check (CRC) code adopts CRC16, be used for decoder and judge that whether decoding is successful, uses d k(i) expression message packets, wherein i be message packets numbering (i=1,2 ..., 1024), subscript k be the user numbering (k=1,2 ..., K);
Consider wherein k user (k=1,2 ..., K), according to the following steps access of encoding:
1) utilize encoder-k to encode;
With message packets d k(i) send into encoder-k, by Rateless coded system (as LT Code, RaptorCode etc.), the encoded packets sequence that is produced continually and the Tanner of this sign indicating number figure.Use v k(s) encoded packets of presentation code gained, wherein s be encoded packets numbering (s=1,2 ...), subscript k be the user numbering (k=1,2 ..., K).
Embodiment 1: when coding adopts LT Code, encode in the following manner:
M=1024 message packets carried out the LT coding, generate the Tanner figure of LT Code, and the encoded packets of the LT Code that is generated continually.Use v k(s) encoded packets of expression LT Code, wherein s be encoded packets numbering (s=1,2 ...), subscript k be the user numbering (k=1,2 ..., K), coding method is: produce LT Code encoded packets v k(s), at first (each parameter of this distribution is as shown in table 1, wherein Ω according to number of degrees distribution Ω (x) iThe shared ratio of expression number of degrees i), produce number of degrees deg with random number generator for it k(s); Produce one 1024 dimension two element field vector with random number generator then { G k is } ( i = 1,2 , . . . , 1024 ) , Element
Figure G2009101533943D00092
Value be " 0 " or " 1 ", wherein the number of element " 1 " is deg k(s).Element
Figure G2009101533943D00101
For " 1 " expression corresponding be numbered i message packets d k(i) selected, the message packets that these are selected is done mould 2 summations by bit, namely obtains the value of the encoded packets of LT Code:
v k ( s ) = [ Σ i = 1 1024 G k is d k ( i ) ] mod 2 , ( s = 1,2 , . . . )
Ω 1 Ω 2 Ω 3 Ω 4 Ω 5 Ω 8
0.007969 0.493570 0.166220 0.072646 0.082558 0.056058
Ω 9 Ω 19 Ω 65 Ω 66 All the other parameters
0.037229 0.0055590 0.025023 0.003135 0
Table 1
The Tanner figure of LT Code as shown in Figure 2.Two category nodes are arranged among the figure, and circle is represented variable node (variable node), and variable node is divided into two classes again, above a behavior information node (information node), total m=1024, note is made V K, 1, V K, 2..., V K, m, the corresponding message packets d of difference k(1), d k(2) ..., d k(m), below a behavior coding nodes (parity node), note is made P K, 1, P K, 2..., P K, s..., the encoded packets v of the corresponding LT Code of difference k(1), v k(2) ..., v k(s) ...; Box indicating check-node (check node), note is made C respectively K, 1, C K, 2..., C K, s..., the verification of each node that links to each other with each check-node and be 0.Therefore, using random number generator in cataloged procedure is the encoded packets v of each LT Code k(s) select deg k(s) individual message packets is done mould 2 summations, just is presented as to be check-node C in Tanner figure K, sSelect deg k(s) individual information node links to each other.And check-node C K, sWith coding nodes P K, sAnnexation fix C K, sAlways with P K, sLink to each other one to one.Because LTCode is a kind of Rateless coding, its encoded packets number is along with cataloged procedure increases endlessly, so new LT Code encoded packets v of every generation k(s), will increase a new check-node C among the figure K, sWith a new coding nodes P K, s, along with encoded packets increases endlessly, Tanner figure can be increasing.
Each user independently finishes the LT Code cataloged procedure of oneself, use the random number generator that is different from other users during coding, to obtain different with other users, separate Tanner figure, can guarantee the irrelevance of each subscriber signal like this, each user's signal separates during for decoding provides feasibility;
Embodiment 2: when coding adopts Raptor Code (it is made up of the LT Code cascade of the high code check LDPC Code of outer sign indicating number part and ISN part), encode in the following manner:
The coding first step, (see " Regular and IrregularProgressive Edge-Growth Tanner Graphs " according to Linear-Time PEG Encoding algorithm, IEEE Transactions On InformationTheory, Vol.51, No.1, January 2005), m=1024 message packets carried out the LDPC coding, generate the Tanner figure of LDPC Code, and then obtain the encoded packets of n=1072 LDPC Code.Use t k(l) encoded packets of expression LDPC Code, wherein l be encoded packets numbering (l=1,2 ..., 1072), subscript k be the user numbering (k=1,2 ..., K).
The Tanner figure of the LDPC Code of the outer sign indicating number part of Raptor Code has two category nodes as shown in Figure 3 among the figure, circle is represented variable node (variable node), and total n=1072, note is made V K, 1, V K, 2..., V K, n, the encoded packets t of the corresponding LDPC Code of difference k(1), t k(2) ..., t k(n); Box indicating check-node (check node), total n-m=1072-1024=48, note is made C ' respectively K, 1, C ' K, 2..., C ' K, n-m, the connected mode of itself and variable node is generated by Linear-Time PEG Encoding algorithm, the verification of each node that links to each other with each check-node and be 0.Among we the definition of T anner figure, be connected to the number of degrees that add up to this node on the limit of certain node.In the variable node of we fixed L DPC Code, the number of degrees of preceding 5 nodes are 1, and the number of degrees of all the other nodes are 4, for the annexation of each variable node selection with check-node, constitute Tanner figure according to Linear-Time PEG Encoding algorithm.The Tanner that is obtained by this algorithm schemes corresponding check matrix H, has following character: H=[H p, H d], the H of right-hand component dBe 48 * 1024 matrixes, the H of left-hand component pBe 48 * 48 upper triangular matrixs:
Figure G2009101533943D00112
Then the value of the encoded packets of LDPC Code can be tried to achieve by following formula:
t k ( l ) = [ &Sigma; i = l + 1 48 h l , i p &CenterDot; t k ( i ) + &Sigma; i = 1 1024 h l , i d &CenterDot; d k ( i ) ] mod 2 1 &le; l &le; 48 d k ( l - 48 ) 48 < l &le; 1072
As seen, the LDPC Code that is obtained by this algorithm is systematic code, and in its 1072 encoded packets, back 1024 is exactly message packets.
Second step of coding, the encoded packets of n=1072 LDPC Code is carried out the LT coding, generate the Tanner figure of LT Code, and the encoded packets of the LT Code that is generated continually.Use v k(s) encoded packets (encoded packets of whole Raptor Code just) of expression LT Code, wherein s be encoded packets numbering (s=1,2 ...), subscript k be the user numbering (k=1,2 ..., K), coding method is: produce LT Code encoded packets v k(s), at first according to the number of degrees distribution Ω (x) shown in the table 1, produce number of degrees deg with random number generator for it k(s); Produce one 1072 dimension two element field vector with random number generator then { G k is } ( l = 1,2 . . . , 1072 ) , Element
Figure G2009101533943D00115
Value be " 0 " or " 1 ", wherein the number of element " 1 " is deg k(s).Element
Figure G2009101533943D00116
Be the corresponding LDPC Code encoded packets t that is numbered l of " 1 " expression k(l) selected, the LDPC Code encoded packets that these are selected is done mould 2 summations by bit, namely obtains the value of the encoded packets of LT Code:
v k ( s ) = [ &Sigma; l = 1 1072 G k is t k ( l ) ] mod 2 , ( s = 1,2 , . . . )
The Tanner figure of the LT Code of Raptor Code ISN part as shown in Figure 4.Two category nodes are arranged among the figure, and circle is represented variable node (variable node), and variable node is divided into two classes again, above a behavior information node (information node), total n=1072, note is made V K, 1, V K, 2..., V K, n, the packet of corresponding LT Code (is the encoded packets t of LDPC Code this moment respectively k(1), t k(2) ..., t k(n)), below a behavior coding nodes (parity node), note is made P K, 1, P K, 2..., P K, s..., the encoded packets v of the corresponding LT Code of difference k(1), v k(2) ..., v k(s) ...; Box indicating check-node (check node), note is made C respectively K, 1, C K, 2..., C K, s..., the verification of each node that links to each other with each check-node and be 0.Therefore, using random number generator in cataloged procedure is the encoded packets v of each LT Code k(s) select deg k(s) encoded packets of individual LDPC Code is done mould 2 summations, just is presented as to be check-node C in Tanner figure K, sSelect deg k(s) individual information node links to each other.And check-node C K, sWith coding nodes P K, sAnnexation fix C K, sAlways with P K, sLink to each other one to one.Because LT Code is a kind of Rateless coding, its encoded packets number is along with cataloged procedure increases endlessly, so new LT Code encoded packets v of every generation k(s), will increase a new check-node C among the figure K, sWith a new coding nodes P K, s, along with encoded packets increases endlessly, Tanner figure can be increasing.The Tanner of whole Raptor Code figure as shown in Figure 5, it is made up of the Tanner figure cascade merging of the Tanner figure of LDPC Code and LT Code.
Each user independently finishes the Raptor Code cataloged procedure of oneself, use the random number generator that is different from other users during coding, to obtain different with other users, separate Tanner figure, can guarantee the irrelevance of each subscriber signal like this, each user's signal separates during for decoding provides feasibility;
2) utilize mapper-k, carry out by the mapping of encoded packets data bit to the encoded packets transmission symbol;
The encoded packets v that will be obtained by encoder-k k(s) send into mapper-k, mapping mode can adopt common linear modulation mode (as BPSK, QPSK etc.), finishes by the mapping of encoded packets data bit to the encoded packets transmission symbol: v k(s) → w k(s), wherein s be encoded packets numbering (s=1,2 ...), subscript k be the user numbering (k=1,2 ..., K);
Embodiment 3: when mapping mode is BPSK, and v k(s) each bit is mapped as w in k(s) symbol in, mapping mode is: " 0 →+1,1 →-1 " obtains through mapped coding bag w k(s).
Embodiment 4: when mapping mode is QPSK, and v k(s) per two bits are mapped as w in k(s) symbol in, mapping mode is: " 00 →+1+j, 01 →+1-j, 10 →-1+j, 11 →-1-j ", obtain through mapped coding bag w k(s).
3) utilize access controller-k, carry out the transmission control to encoded packets;
The process mapped coding bag w that will be obtained by mapper-k k(s) send into access controller-k, any time slot j (j=1,2 ...), user k is with Probability p kOrder is with w k(s) access channel sends: use x k(j) expression user k is at the symbol of time slot j channel transmission, if determine at current time slots j encoded packets w k(s) access channel is then at encoded packets w k(s) packet header increases user's beacon information of K bit, k position 1 wherein, and transmission encoded packets w is formed in all the other each positions 0 k' (s), make x k(j)=w k' (s), judge whether w at next time slot k(s+1) access channel; Otherwise make x k(j)=0, next time slot continues to judge whether w k(s) access channel;
Because what adopt is the Rateless coded system, so through the sequence after Rateless coding and the mapping w k={ w k(1), w k(2) ..., w k(s) ... } produce continually, so the sequence that channel sends x k={ x k(1), x k(2) ..., x k(j) ... } also be endlessly, length is not what fix, x kEach length corresponding corresponding code check all;
Each user's transmitter produces encoded packets and access channel endlessly according to above rule, informs that until receiving terminal it stops to send.
Interpretation method is as follows:
Receiver receives self-channel, endlessly, the mutual aliasing of each user and added the encoded packets of noise, each user's signal separates and decoding is carried out simultaneously, for user k (k=1,2, ..., K), its judgement decoder-k adopts the random number generator identical with encoder-k, so the Tanner of this sign indicating number of reconstruct schemes accurately, carry out signal separation and decoding according to following steps:
1) receiver at first receives N=1024 the aliasing encoded packets of coming self-channel;
2) receiver receives Δ N=256 aliasing encoded packets again, makes N=N+ Δ N, and the code check of this moment is
R = m N = 1024 N ;
3) encoded packets that receives is sent into solution mapping and soft decoding information estimator-k, employing is based on the soft decoding information method of estimation of the multi-user random access system of no-rate codes, under current code check R, carry out computing, the soft information of output (being 0 during initialization) of utilization judgement decoder of all the other each users except judgement decoder-k is upgraded and is estimated soft information;
4) will upgrade the soft information of estimation that obtains as the input of judgement decoder-k by separating mapping and soft decoding information estimator-k, Tanner figure under the current code check R of reconstruct moves BP (Belief-Propagation) decoding algorithm, finish one and take turns the iterative decoding computing, and upgrade output court verdict information and the soft information of output of judgement decoder-k;
5) utilize the output court verdict information of judgement decoder-k to judge whether decode results satisfies the verification relation that check-node limits among the Tanner figure, perhaps iterations has reached the maximum times (being made as 150 times) that limits, if satisfy one of above-mentioned two conditions, then change step 6) over to;
Otherwise change step 3) over to;
6) utilize the cyclic redundancy check (CRC) code judgment data bag in each bag whether all to decipher correctly, if all correct, change step 7) over to; Otherwise change step 2 over to);
7) decoding finishes, and receiver sends a signal and informs that the transmitter of user k stops to send.
By above description to decode procedure as can be known, when the user found that the aliasing encoded packets that receives is not enough to correct decoding, receiver need receive 256 aliasing encoded packets again, carries out the iterative decoding of a new round.When receiver was received N encoded packets, corresponding code rate was:
R = m N = 1024 N
In order to represent that conveniently, we use the R reciprocal of code check -1Portray the variation of code check:
R - 1 = N m = N 1024
After N encoded packets of each many reception Δs, code check is changed to Δ R -1:
&Delta;R - 1 = &Delta;N m = &Delta;N 1024
Δ N is 256 herein, so Δ R -1Be 0.25.That is to say that each user is with Δ R -1=0.25 is stepping, moves iterative decoding under different code checks, until successfully decoded, send a signal and informs that transmitter stops to send.
Soft decoding information method of estimation based on the multi-user random access system of no-rate codes is as follows:
We establish receiver and receive self-channel, endlessly, each user's aliasing and added that the encoded packets sequence of noise is y={y (1), y (2) ..., y (j) ... }:
y ( j ) = &Sigma; i = 1 K h i &CenterDot; x i ( j ) + n ( j ) , ( j = 1,2 , . . . )
Wherein, j is the time slot label, subscript i be the user numbering (i=1,2 ... K), x i={ x i(1), x i(2) ..., x i(j) ... } be the sequence endlessly that i user's channel sends, h is channel parameter, n=n (1), n (2) ..., n (j) ... } for average is 0, variance is σ 2The white Gauss noise sequence;
At receiver, user's beacon information in the encoded packets packet header that we receive according to arbitrary time slot j, the channel of judging each user of this time slot inserts situation and (a K bit in packet header is made hard decision, k (k=1,2 ..., K) position bit decision result is that k user of 1 expression inserted channel, be that k user of 0 expression do not have access channel), remove user's beacon information then; Use J kExpression user k (k=1,2 ..., the set of encoded packets access slot K):
J k={j|x k(j)≠0,j=1,2,...}={J k(1),J k(2),...,J k(q k),...}
Q wherein kBe set J kNumbering (the q of middle element k=1,2 ...), subscript k be the user numbering (k=1,2 ..., K);
For each user, we will receive the encoded packets sequence of different length at receiver yThe time, namely under different code check R, calculate its output of separating mapping and soft decoding information estimator and estimate soft information, to user k, establish receiver and received N encoded packets y=y (1), y (2) ..., y (N) }, then current code check is R=m/N=1024/N;
For its access slot set J kIn each time slot J k(q k), the aliasing encoded packets y (J that it receives k(q k)), can write:
y ( J k ( q k ) ) = h k &CenterDot; x k ( J k ( q k ) ) + &Sigma; i &NotEqual; k , J k ( q k ) &Element; J i , J k ( q k ) = J i ( q i ) h i &CenterDot; x i ( J i ( q i ) ) + n ( J k ( q k ) )
= h k &CenterDot; x k ( J k ( q k ) ) + &zeta; k ( J k ( q k ) ) , ( q k = 1,2 , . . . | J k | )
ζ wherein k(J k(q k)) be at time slot J k(q k), other subscriber signals of non-zero and white Gaussian noise sum, we are referred to as to merge noise and be similar to and regard it as Gaussian random variable, and average is designated as E[ζ k(J k(q k))], variance is designated as Var[ζ k(J k(q k))], so can be with received code bag y (J k(q k)) also regard as and meet Gaussian characteristics:
y(J k(q k))~N(h k·x k(J k(q k))+E[ζ k(J k(q k))],Var[ζ k(J k(q k))]),
Wherein E [ &zeta; k ( J k ( q k ) ) ] = &Sigma; i &NotEqual; k , J k ( q k ) &Element; J i , J k ( q k ) = J i ( q i ) h i &CenterDot; E [ x i ( J i ( q i ) ) ]
Var [ &zeta; k ( J k ( q k ) ) ] = &Sigma; i &NotEqual; k , J k ( q k ) &Element; J i , J k ( q k ) = J i ( q i ) h i 2 &CenterDot; Var [ x i ( J i ( q i ) ) ] + &sigma; 2
In separating mapping and soft decoding information estimator-k, at first according to the corresponding average operation rule of selected mapping mode Γ EWith variance operation rule Γ Var, by the soft information of bit log likelihood ratio of all the other each subscriber-coded bags, calculate average and the variance of the mapping symbols of all the other each subscriber-coded bags; Then according to the corresponding solution mapping ruler of selected mapping mode F, average and variance by the mapping symbols of the aliasing encoded packets that receives and all the other each subscriber-coded bags of having calculated, according to the Gaussian characteristics that the received code bag meets, estimate the soft information of bit log likelihood ratio of user k encoded packets.
When a time iteration, according to " estimating soft information updating expression formula "
LLR k a ( v ( q k ) ) = F ( y ( J k ( q k ) ) , E [ &zeta; k ( J k ( q k ) ) ] , Var [ &zeta; k ( J k ( q k ) ) ] )
= F ( y ( J k ( q k ) ) , &Sigma; i &NotEqual; k , J k ( q k ) &Element; J i , J k ( q k ) = J i ( q i ) h i &CenterDot; E [ x i ( J i ( q i ) ) ] ,
&Sigma; i &NotEqual; k , J k ( q k ) &Element; J i , J k ( q k ) = J i ( q i ) h i 2 &CenterDot; Var [ x i ( J i ( q i ) ) ] + &sigma; 2 )
= F ( y ( J k ( q k ) ) , &Sigma; i &NotEqual; k , J k ( q k ) &Element; J i , J k ( q k ) = J i ( q i ) h i &CenterDot; &Gamma; E ( L i a - 1 ( v ( q i ) ) ) ,
&Sigma; i &NotEqual; k , J k ( q k ) &Element; J i , J k ( q k ) = J i ( q i ) h i 2 &CenterDot; &Gamma; Var ( L i a - 1 ( v ( q i ) ) ) + &sigma; 2 )
(q k=1,2,...|J k|)
Upgrade and estimate soft information, LLR in the formula k a(v (q k)) for a time iterative decoding of user k required by the q that separate to shine upon and soft decoding information estimator-k estimates kThe soft dope vector of bit log likelihood ratio of individual encoded packets, L i A-1(v (q i)) be the q behind the a-1 time iterative decoding of user i iThe soft dope vector of bit log likelihood ratio of individual encoded packets (during initialization a=1, L i 0 ( v ( q i ) ) = 0 );
If mapping mode adopts BPSK, with concrete average operation rule Γ E, BPSK, variance operation rule Γ Var, BPSKAnd solution mapping ruler F BPSKSubstitution " is estimated soft information updating expression formula ", can obtain its concrete expression-form:
LLR k a ( v ( q k ) ( c ) ) = 2 h k &CenterDot; y ( J k ( q k ) ) ( c ) - &Sigma; i &NotEqual; k , J k ( q k ) &Element; J i , J k ( q k ) = J i ( q i ) h i &CenterDot; ( 1 - 2 e L i a - 1 ( v ( q i ) ( c ) ) + 1 ) &Sigma; i &NotEqual; k , J k ( q k ) &Element; J i , J k ( q k ) = J i ( q i ) 4 h i 2 &CenterDot; e L i a - 1 ( v ( q i ) ( c ) ) ( e L i a - 1 ( v ( q i ) ( c ) ) + 1 ) 2 + &sigma; 2
(q k=1,2,...|J k|c=1,2,...,128)
Wherein, y (J k(q k)) (c)Be illustrated in time slot J k(q k) c symbol among the aliasing encoded packets y that receives, LLR k a(v (q k) (c)) for a time iterative decoding of user k required by the q that separate to shine upon and soft decoding information estimator-k estimates kThe soft information of log likelihood ratio of c bit of individual encoded packets, L i A-1(v (q i) (c)) be the q behind the a-1 time iterative decoding of user i iThe soft information of log likelihood ratio of c bit of individual encoded packets.
If mapping mode adopts QPSK, then with concrete average operation rule Γ E, QPSK, variance operation rule F Var, QPSKAnd solution mapping ruler F QPSKSubstitution " is estimated soft information updating expression formula ", can obtain its concrete expression-form:
LLR k a ( v ( q k ) ( 2 c - 1 ) ) = 2 h k &CenterDot; Re [ y ( J k ( q k ) ) ( c ) ] - &Sigma; i &NotEqual; k , J k ( q k ) &Element; J i , J k ( q k ) = J i ( q i ) h i &CenterDot; ( 1 - 2 e L i a - 1 ( v ( q i ) ( 2 c - 1 ) ) + 1 ) &Sigma; i &NotEqual; k , J k ( q k ) &Element; J i , J k ( q k ) = J i ( q i ) 4 h i 2 &CenterDot; e L i a - 1 ( v ( q i ) ( 2 c - 1 ) ) ( e L i a - 1 ( v ( q i ) ( 2 c - 1 ) ) + 1 ) 2 + &sigma; 2
LLR k a ( v ( q k ) ( 2 c ) ) = 2 h k &CenterDot; Im [ y ( J k ( q k ) ) ( c ) ] - &Sigma; i &NotEqual; k , J k ( q k ) &Element; J i , J k ( q k ) = J i ( q i ) h i &CenterDot; ( 1 - 2 e L i a - 1 ( v ( q i ) ( 2 c ) ) + 1 ) &Sigma; i &NotEqual; k , J k ( q k ) &Element; J i , J k ( q k ) = J i ( q i ) 4 h i 2 &CenterDot; e L i a - 1 ( v ( q i ) ( 2 c ) ) ( e L i a - 1 ( v ( q i ) ( 2 c ) ) + 1 ) 2 + &sigma; 2
(q k=1,2,...|J k|c=1,2,...,64)
Wherein, y (J k(q k)) (c)Be illustrated in time slot J k(q k) c symbol among the aliasing encoded packets y that receives, LLR k a(v (q k) (2c-1)), LLR k a(v (q k) (2c)) for a time iterative decoding of user k required by the q that separate to shine upon and soft decoding information estimator-k estimates kThe soft information of log likelihood ratio of the odd bits of individual encoded packets and even bit bit, L i A-1(v (q i) (2c-1)), L i A-1(v (q i) (2c)) be the q behind the a-1 time iterative decoding of user i iThe soft information of log likelihood ratio of the odd bits of individual encoded packets and even bit bit, Re[.] expression gets real part computing, Im[.] expression gets imaginary-part operation.
To estimate soft dope vector LLR then k a(v (q k)) as the soft dope vector L of input that adjudicates decoder-k k In, a(q k), even L k in , a ( q k ) = LLR k a ( v ( q k ) ) , Send into the iterative decoding that judgement decoder-k carries out a time; All the other each users are also by this same operation, and each user's decoding is carried out simultaneously; After finishing a time iteration, for user k, obtain the soft dope vector L of output of its judgement decoder-k k Out, a(q k), order L k a ( v ( q k ) ) = L k out , a ( q k ) , All the other users are also by this same operation, then will be worth substitution accordingly and " estimate soft information updating expression formula ", beginning is the iteration of (the a+1 time) newly once, by that analogy, satisfy verification relation or the iterations that check-node limits among the Tanner figure until the decode results of adjudicating decoder-k and reach the maximum times that limits;
The soft information that can finish like this under the code check R=m/N=1024/N is estimated, because the Rateless attribute of coded system, its encoded packets sequence length N constantly changes, we can be under different received code packet lengths, be under each code check, move each self-corresponding computing, thereby finish the soft information estimation under each code check, and then finish signal separation and decoding.
Fig. 6 and Fig. 7, be to adopt the RMA system of Raptor Code and adopt Zigzag Code (to see " Zigzagcodes and concatenated zigzag codes ", IEEE Trans.Inform.Theory special issue oncodes on graphs, vol., IT-47, no.2, pp., 800-807, IDMA system Feb.2001.), the performance comparison diagram when system user is counted K=2 and K=4.Can see, adopt the performance of the RMA system of Raptor Code to be better than the IDMA system that adopts Zigzag Code.

Claims (4)

1. the multi-user random access system based on no-rate codes is characterized in that, it mainly is made of transmitting terminal and receiving terminal; Wherein, transmitting terminal is made up of the parallel access channel of the transmitter that K single channel imported, single channel is exported, and receiving terminal is made up of the receiver that a single channel is imported, export on the K road; Each transmitter is by encoder, and mapper and access controller be composition connected in series successively; Receiver is divided into parallel K road in inside, decoder is connected in series forms for the mapping of each route solution and soft decoding information estimator and judgement, and wherein, K is any positive integer;
Encoder-k is used for the message packets of user k is compiled the no-rate codes encoded packets that produces for continually, the data flow of its input termination outer message data bag, and its output is connected to the input of mapper-k;
Mapper-k is used for finishing by the mapping of encoded packets data bit to the encoded packets transmission symbol, realizes with common linear modulation mapper, and the output of its input termination encoder-k, its output is connected to the input of access controller-k;
Access controller-k mainly finishes the transmission of encoded packets control, determines at random whether present encoding to be wrapped in namely that access channel sends in the current time slots by pre-determined probability, the output of its input termination mapper-k, and its output is connected to channel;
Separate mapping and soft decoding information estimator-k, being used for finishing each subscriber signal according to the aliasing encoded packets of coming self-channel that receives separates, and finish estimation to the soft information of encoded packets bit Log likelihood ratio of user k by separating mapping, it imports the input that comes from channel of termination receiver and all the other respectively adjudicate the soft information output of decoder except judgement decoder-k, and its output is connected to the input of judgement decoder-k;
Judgement decoder-k, be used for finishing the decoding to user k encoded packets, the output of its input termination solution mapping and soft decoding information estimator-k, its court verdict output output decode results, as one tunnel output of receiver, its soft information output be connected to except understanding mapping and soft decoding information estimator-k all the other each separate and shine upon and the input of soft decoding information estimator;
k=1,2,...,K。
2. the coding method of the described connecting system of claim 1, the coding of finishing each user according to coding method at transmitting terminal inserts, each user's encoded packets access channel is sent, it is characterized in that, this coding method is as follows: establishing each transmitter all needs to send m message packets, and each message packets is made up of b data bit, comprising a cyclic redundancy check (CRC) code, be used for the judgement decoder and judge that whether decoding is successful, uses d k(i) expression message packets, wherein, i is the numbering of message packets, i=1,2 ..., m; Subscript k is user's numbering, k=1, and 2 ..., K; Consider k user wherein, k=1,2 ..., K; According to the following steps access of encoding:
(1) utilize encoder-k to encode: with message packets d k(i) send into encoder-k, by no rate coding mode, the encoded packets sequence that is produced continually and the Tanner of this sign indicating number figure use v k(s) encoded packets of presentation code gained, wherein s is the numbering of encoded packets, s=1,2 ...; Subscript k is user's numbering, k=1, and 2 ..., K; Each user independently finishes the cataloged procedure of oneself, use the random number generator that is different from other users during coding, to obtain different with other users, separate Tanner figure, can guarantee the irrelevance of each subscriber signal like this, each user's signal separates during for decoding provides feasibility;
(2) utilize mapper-k, carry out by the mapping of encoded packets data bit to the encoded packets transmission symbol: the encoded packets v that will be obtained by encoder-k k(s) send into mapper-k, mapping mode adopts common linear modulation mode, finishes by the mapping of encoded packets data bit to the encoded packets transmission symbol: v k(s) → w k(s), wherein s is the numbering of encoded packets, s=1, and 2 ...; Subscript k is user's numbering, k=1, and 2 ..., K;
(3) utilize access controller-k, carry out the transmission of encoded packets control: the process mapped coding bag w that will be obtained by mapper-k k(s) send into access controller-k, at any time slot j, j=1,2 ...; User k is with Probability p kOrder is with w k(s) access channel sends: use x k(j) expression user k is at the symbol of time slot j channel transmission, if determine at current time slots j encoded packets w k(s) access channel is then at encoded packets w k(s) packet header increases user's beacon information of K bit, k position 1 wherein, and transmission encoded packets w is formed in all the other each positions 0 k' (s), make x k(j)=w k' (s), judge whether w at next time slot k(s+1) access channel; Otherwise make x k(j)=0, next time slot continues to judge whether w k(s) access channel; Because what adopt is no rate coding mode, so through the sequence after coding and the mapping w k={ w k(1), w k(2) ..., w k(s) ... } produce continually, so the sequence that channel sends x k={ x k(1), x k(2) ..., x k(j) ... } also be endlessly, length is not what fix, x kEach length corresponding corresponding code check all; Each user's transmitter produces encoded packets and access channel endlessly according to above rule, informs that until receiving terminal it stops to send.
3. the interpretation method of the described connecting system of claim 1 according to the aliasing encoded packets that receives, is finished detection separation and the decoding of each subscriber-coded bag at receiving terminal; This interpretation method is as follows: receiver receives self-channel, endlessly, each user mutual aliasing and added the encoded packets of noise, each user's signal separates and decoding is carried out simultaneously; For user k, k=1,2 ..., K, its judgement decoder-k adopts the random number generator identical with encoder-k, so the Tanner of this sign indicating number of reconstruct schemes accurately, carries out signal separation and decoding according to following steps:
(A) receiver at first receives N=m the aliasing encoded packets of coming self-channel;
(B) receiver receives Δ N aliasing encoded packets again, makes N=N+ Δ N, and the code check of this moment is R = m n ;
(C) encoded packets that receives is sent into solution mapping and soft decoding information estimator-k, employing is based on the soft decoding information method of estimation of the multi-user random access system of no-rate codes, under current code check R, carry out computing, the soft information of output of utilization judgement decoder of all the other each users except judgement decoder-k, be 0 during initialization, upgrade and estimate soft information;
(D) will upgrade the soft information of estimation that obtains as the input of judgement decoder-k by separating mapping and soft decoding information estimator-k, Tanner figure operation BP decoding algorithm under the current code check R of reconstruct, finish one and take turns the iterative decoding computing, and upgrade output court verdict information and the soft information of output of judgement decoder-k;
(E) utilize the output court verdict information of judgement decoder-k to judge whether decode results satisfies the verification relation that check-node limits among the Tanner figure, perhaps iterations has reached the maximum times that limits, if satisfy one of above-mentioned two conditions, then change step F over to); Otherwise change step C over to);
(F) utilize the cyclic redundancy check (CRC) code judgment data bag in each bag whether all to decipher correctly, if all correct, change step G over to); Otherwise change step B over to);
(G) decoding finishes, and receiver sends a signal and informs that the transmitter of user k stops to send.
4. according to the described interpretation method of claim 3, it is characterized in that in the described step (C), the soft decoding information method of estimation of described multi-user random access system based on no-rate codes is specific as follows:
If receiver receives self-channel, endlessly, each user's aliasing and added the volume of noise
Wherein, j is the time slot label, and subscript i is user's numbering, i=1, and 2 ... K; x i={ x i(1), x i(2) ..., x i(j) ... } be the sequence endlessly that i user's channel sends, h is channel parameter, n=n (1), n (2) ..., n (j) ... } for average is 0, variance is σ 2The white Gauss noise sequence;
At receiver, user's beacon information in the encoded packets packet header that receives according to arbitrary time slot j, the channel of judging each user of this time slot inserts situation: a K bit in packet header is made hard decision, k position bit decision result is that k user of 1 expression inserted channel, be that k user of 0 expression do not have access channel, k=1,2, ..., K; Remove user's beacon information then; Use J kThe set of the encoded packets access slot of expression user k, k=1,2 ..., K:
J k={j|x k(j)≠0,j=1,2,...}={J k(1),J k(2),...,J k(q k),...};
Wherein, q kBe set J kThe numbering of middle element, q k=1,2 ...; Subscript k is user's numbering, k=1, and 2 ..., K; .
For each user, we will receive the encoded packets sequence of different length at receiver yThe time, namely under different code check R, calculate its output of separating mapping and soft decoding information estimator and estimate soft information, to user k, establish receiver and received N encoded packets y=y (1), y (2) ..., y (N) }, then current code check is R=m/N;
For its access slot set J kIn each time slot J k(q k), the aliasing encoded packets y (J that it receives k(q k)), can write:
y ( J k ( q k ) ) = h k &CenterDot; x k ( J k ( q k ) ) + &Sigma; i &NotEqual; k , J k ( q e ) &Element; J i , J k ( q k ) = J i ( q i ) h i &CenterDot; x i ( J j ( q i ) ) + n ( J k ( q k ) )
Figure FSB00001029014800042
q k=1,2,...,|J k|;
Wherein, ζ k(J k(q k)) be at time slot J k(q k), other subscriber signals of non-zero and white Gaussian noise sum, we are referred to as to merge noise and be similar to and regard it as Gaussian random variable, and average is designated as E[ζ k(J k(q k))], variance is designated as Var[ζ k(J k(q k))], so can be with received code bag y (J k(q k)) also regard as and meet Gaussian characteristics:
y(J k(q k))~N(j k·x k(J k(q k))+E[ζ k(J k(q k))],Var[ζ k(J k(q k))]),
Wherein, E [ &zeta; k ( J k ( q k ) ) ] = &Sigma; i &NotEqual; k , J k ( q k ) &Element; J i , J k ( q k ) = J i ( q i ) h i &CenterDot; E ( x i ( J i ( q i ) ) ]
Var [ &zeta; k ( J k ( q k ) ) ] = &Sigma; i &NotEqual; k , J k ( q k ) &Element; J i , J k ( q k ) = J i ( q i ) h i 2 &CenterDot; Var [ ( x i ( J i ( q i ) ) ] + &sigma; 2 ;
In separating mapping and soft decoding information estimator-k, at first according to the corresponding average operation rule of selected mapping mode Γ EWith variance operation rule Γ Var, by the soft information of bit log likelihood ratio of all the other each subscriber-coded bags, calculate average and the variance of the mapping symbols of all the other each subscriber-coded bags; Then according to the corresponding solution mapping ruler of selected mapping mode F, average and variance by the mapping symbols of the aliasing encoded packets that receives and all the other each subscriber-coded bags of having calculated, according to the Gaussian characteristics that the received code bag meets, estimate the soft information of bit log likelihood ratio of user k encoded packets;
When a time iteration, according to " estimating soft information updating expression formula "
LLR k a ( v ( q k ) ) = F ( y ( J k ( q k ) ) , E [ &zeta; k ( J k ( q k ) ) ] , Var [ &zeta; k ( J k ( q k ) ) ] )
= F ( y ( J k ( q k ) ) , &Sigma; i &NotEqual; k , J k ( q k ) &Element; J i , J k ( q k ) = J i ( q i ) h i &CenterDot; E [ x i ( J i ( q i ) ) ] ,
&Sigma; i &NotEqual; k , J k ( q k ) &Element; J i , J k ( q k ) = J i ( q i ) h i 2 &CenterDot; V ar [ x i ( J i ( q i ) ) ] + &sigma; 2 )
= F ( y ( J k ( q k ) ) , &Sigma; i &NotEqual; k , J k ( q k ) &Element; J i , J k ( q k ) = J i ( q i ) h i &CenterDot; &Gamma; E ( L i a - 1 ( v ( q i ) ) ) ,
&Sigma; i &NotEqual; k , J k ( q k ) &Element; J i , J k ( q k ) = J i ( q i ) h i 2 &CenterDot; &Gamma; Var ( L i a - 1 ( v ( q i ) ) ) + &sigma; 2 )
q k=1,2,...,|J k|;
Upgrade and estimate soft information, in the formula
Figure FSB000010290148000410
For a time iterative decoding of user k required by separating the q that mapping and soft decoding information estimator-k estimate kThe soft dope vector of bit log likelihood ratio of individual encoded packets,
Figure FSB000010290148000411
Be the q behind the a-1 time iterative decoding of user i iThe soft dope vector of bit log likelihood ratio of individual encoded packets; During initialization a=1,
Figure FSB000010290148000412
If mapping mode adopts BPSK, with concrete average operation rule Γ E, BPSK, variance operation rule Γ Var, BPSKAnd solution mapping ruler F BPSKSubstitution " is estimated soft information updating expression formula ", can obtain its concrete expression-form:
LLR k a ( v ( q k ) ( c ) ) = 2 h k &CenterDot; y ( J k ( q k ) ) ( c ) - &Sigma; i &NotEqual; k , J k ( q k ) &Element; J i , J k ( q k ) = J i ( q i ) h i &CenterDot; ( 1 - 2 e L i a - 1 ( v ( q i ) ( c ) ) + 1 ) &Sigma; i &NotEqual; k , J k ( q k ) &Element; J i , J k ( q k ) = J i ( q i ) 4 h i 2 &CenterDot; e L i a - 1 ( v ( q i ) ( c ) ) ( e L i a - 1 ( v ( q i ) ( c ) ) + 1 ) 2 + &sigma; 2
q k=1,2,...,|J k|,c=1,2,...,b,b=128;
Y (J wherein k(q k)) (c) be illustrated in time slot J k(q k) c symbol among the aliasing encoded packets y that receives,
Figure FSB00001029014800052
For a time iterative decoding of user k required by separating the q that mapping and soft decoding information estimator-k estimate kThe soft information of log likelihood ratio of c bit of individual encoded packets,
Figure FSB00001029014800053
Be the q behind the a-1 time iterative decoding of user i iThe soft information of log likelihood ratio of c bit of individual encoded packets;
If mapping mode adopts QPSK, then with concrete average operation rule Γ E, QPSK, variance operation rule Γ Var, QPSKAnd solution mapping ruler F QPSKSubstitution " is estimated soft information updating expression formula ", can obtain its concrete expression-form;
LLR k a ( v ( q k ) ( 2 c - 1 ) ) = 2 h k &CenterDot; Re [ y ( J k ( q k ) ) ( c ) ] - &Sigma; i &NotEqual; k , J k ( q k ) &Element; J i , J k ( q k ) = J i ( q i ) h i &CenterDot; ( 1 - 2 e L i a - 1 ( v ( q i ) ( 2 c - 1 ) ) + 1 ) &Sigma; i &NotEqual; k , J k ( q k ) &Element; J i , J k ( q k ) = J i ( q i ) 4 h i 2 &CenterDot; e L i a - 1 ( v ( q i ) ( 2 c - 1 ) ) ( e L i a - 1 ( v ( q i ) ( 2 c - 1 ) ) + 1 ) 2 + &sigma; 2
LLR k a ( v ( q k ) ( 2 c ) ) = 2 h k &CenterDot; Im [ y ( J k ( q k ) ) ( c ) ] - &Sigma; i &NotEqual; k , J k ( q k ) &Element; J i , J k ( q k ) = J i ( q i ) h i &CenterDot; ( 1 - 2 e L i a - 1 ( v ( q i ) ( 2 c ) ) + 1 ) &Sigma; i &NotEqual; k , J k ( q k ) &Element; J i , J k ( q k ) = J i ( q i ) 4 h i 2 &CenterDot; e L i a - 1 ( v ( q i ) ( 2 c ) ) ( e L i a - 1 ( v ( q i ) ( 2 c ) ) + 1 ) 2 + &sigma; 2
q k=1,2,...,|J k|,c=1,2,...,b/2,b=128;
Wherein, y (J k(q k)) (c)Be illustrated in time slot J k(q k) c symbol among the aliasing encoded packets y that receives,
Figure FSB00001029014800056
For a time iterative decoding of user k required by separating the q that mapping and soft decoding information estimator-k estimate kThe soft information of log likelihood ratio of the odd bits of individual encoded packets and even bit bit,
Figure FSB00001029014800057
Be the q behind the a-1 time iterative decoding of user i iThe soft information of log likelihood ratio of the odd bits of individual encoded packets and even bit bit, Re[.] expression gets real part computing, Im[.] expression gets imaginary-part operation;
To estimate soft dope vector then
Figure FSB00001029014800058
The soft dope vector of input as judgement decoder-k Even
Figure FSB000010290148000510
Send into the iterative decoding that judgement decoder-k carries out a time; All the other each users are also by this same operation, and each user's decoding is carried out simultaneously; After finishing a time iteration, for user k, obtain the soft dope vector of output of its judgement decoder-k
Figure FSB000010290148000511
Order
Figure FSB000010290148000512
All the other users also by this same operation, then will be worth substitution accordingly and " estimate soft information updating expression formula ", the new iteration once of beginning, i.e. the a+1 time iteration; By that analogy, satisfy verification relation or the iterations that check-node limits among the Tanner figure until the decode results of adjudicating decoder-k and reach the maximum times that limits;
The soft information that can finish like this under the code check R=m/N is estimated, because the no speed attribute of coded system, its encoded packets sequence length N constantly changes, we can be under different received code packet lengths, be under each code check, move each self-corresponding computing, thereby finish the soft information estimation under each code check, and then finish signal separation and decoding.
CN 200910153394 2009-10-22 2009-10-22 Multi-user random access system based on rateless codes and coding and decoding method thereof Active CN101695016B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200910153394 CN101695016B (en) 2009-10-22 2009-10-22 Multi-user random access system based on rateless codes and coding and decoding method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200910153394 CN101695016B (en) 2009-10-22 2009-10-22 Multi-user random access system based on rateless codes and coding and decoding method thereof

Publications (2)

Publication Number Publication Date
CN101695016A CN101695016A (en) 2010-04-14
CN101695016B true CN101695016B (en) 2013-07-10

Family

ID=42093959

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200910153394 Active CN101695016B (en) 2009-10-22 2009-10-22 Multi-user random access system based on rateless codes and coding and decoding method thereof

Country Status (1)

Country Link
CN (1) CN101695016B (en)

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9237580B2 (en) 2010-07-19 2016-01-12 Lg Electronics Inc. Method and device for transmitting control information in wireless communication system
CN102684824B (en) * 2011-03-17 2015-08-12 中兴通讯股份有限公司 A kind of data transmission method and system
JP5793067B2 (en) * 2011-11-24 2015-10-14 シャープ株式会社 Mobile station apparatus, base station apparatus, radio communication system, radio communication method, and integrated circuit
CN103078712B (en) * 2013-01-10 2015-09-02 浙江大学 Be applicable to dynamic long delay transmission without rate coding forward error control method
CN103248458A (en) * 2013-05-11 2013-08-14 哈尔滨工业大学深圳研究生院 Physical layer network coding system and method based on FQPSK modulation
CN103457704B (en) * 2013-09-17 2017-02-01 桂林电子科技大学 Method and system for synchronous recurring control of degree distribution random number sequence
CN106465422B (en) * 2014-11-04 2020-03-20 华为技术有限公司 Communication method, base station and terminal equipment
CN104579576B (en) * 2015-01-27 2018-02-09 清华大学 Code modulating method and system
CN104935411B (en) * 2015-06-18 2018-03-06 浙江大学 A kind of no-rate codes joint number of degrees dynamic decoding method based on diversity
US10009152B2 (en) * 2016-03-04 2018-06-26 Huawei Technologies Co., Ltd. System and method for rate-less multiple access
CN107517433A (en) * 2016-06-17 2017-12-26 中兴通讯股份有限公司 Accidental access response RAR receiving handling method and device
CN107995692B (en) * 2017-10-30 2021-06-25 浙江工业大学 Uplink no-rate transmission mechanism of cloud access network
CN109472138B (en) * 2017-12-01 2022-07-01 北京安天网络安全技术有限公司 Method, device and storage medium for detecting snort rule conflict
CN108880747B (en) * 2018-05-25 2020-11-03 中国人民解放军战略支援部队航天工程大学 Low 4-ring number communication method suitable for short non-rate codes
CN108738152A (en) * 2018-06-01 2018-11-02 南京航空航天大学 Random multi-access channel method based on fountain coding
CN111404556A (en) * 2020-03-13 2020-07-10 深圳市航天华拓科技有限公司 Encoding method, decoding method, device and storage medium
CN115189803B (en) * 2021-04-01 2024-03-08 大唐移动通信设备有限公司 Multi-user signal detection method, device, equipment and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101179279A (en) * 2007-11-27 2008-05-14 浙江大学 Non-rate code coding/decoding method fit for additive white Gaussian noise channel
CN101848023A (en) * 2009-11-26 2010-09-29 浙江大学 Multiuser MIMO downlink transmission mode selection method based on rateless code

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101179279A (en) * 2007-11-27 2008-05-14 浙江大学 Non-rate code coding/decoding method fit for additive white Gaussian noise channel
CN101848023A (en) * 2009-11-26 2010-09-29 浙江大学 Multiuser MIMO downlink transmission mode selection method based on rateless code

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Kedi Wu 等.Rateless Multiple Access Over Noisy Channel.《Proceeding of IWCMC 2010》.2011, *
U. Niesen 等.Rateless codes for the Gaussian multiple-access channel.《Proceeding of IEEE GLOBECOM 2006》.2006, *

Also Published As

Publication number Publication date
CN101695016A (en) 2010-04-14

Similar Documents

Publication Publication Date Title
CN101695016B (en) Multi-user random access system based on rateless codes and coding and decoding method thereof
CN105515719B (en) A kind of data transmission method and device
CN102355341B (en) Network coding method of hybrid automatic request retransmission for long-term evolution system
CN101425871B (en) Multi-element error correcting code transmitting and receiving apparatus, data communication system and related method
CN101485132A (en) System and method for variable forward error correction (FEC) protection
CN103490866B (en) HARQ transmission method based on network code in star ground transmission network
CN105634504A (en) Data check method and device
CN102742201B (en) Method for transmitting a digital signal for a semi-orthogonal frame system having half-duplex relay, and corresponding program product and relay device
CN101615913B (en) Fast convergence decoding algorithm for LDPC codes
CN102324998A (en) Raptor Codes encoding/decoding method suitable for medium/short code lengths of additive white Gaussian noise channel
CN102957511B (en) Adaptive deceleration method of data transmission
CN105991227A (en) Data encoding method and apparatus
CN102244922B (en) Power control method applicable to Raptor Codes under additive white Gaussian noise channel
CN103973314A (en) Signal coding and decoding method based on LDPC, receiving end and sending end
CN102064917B (en) Demodulation decoding method for LDPC (Low Density Parity Code) modulation system
CN110061808A (en) A kind of underwater anti-jamming transmission method to be interweaved based on prime codes and spinal cord code encodes
CN101019388A (en) Metrics calculations utilising pre-stored values
CN106254030B (en) Two-way coding and decoding method without rate Spinal code
CN105162552A (en) Ka frequency range deep space communication method and system of q-LDPC-LT cascade fountain code
CN109428670A (en) A kind of data error method of calibration and device, computer storage medium
CN102891737B (en) Method and system for coding and decoding binary rateless codes
CN102045072A (en) Low-complexity method for decoding low density parity check (LDPC) code
CN103152652A (en) Video frame data network transmission method based on Cauchy reed-solomon (RS) code
CN103746772A (en) Optimization method of demodulator output soft information for LDPC (Low Density Parity Code) code modulation system
CN102355330A (en) Distributed cascade-based channel coding system and method thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant