WO2020220920A1 - 一种编码方法及通信设备 - Google Patents
一种编码方法及通信设备 Download PDFInfo
- Publication number
- WO2020220920A1 WO2020220920A1 PCT/CN2020/082846 CN2020082846W WO2020220920A1 WO 2020220920 A1 WO2020220920 A1 WO 2020220920A1 CN 2020082846 W CN2020082846 W CN 2020082846W WO 2020220920 A1 WO2020220920 A1 WO 2020220920A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- code
- bit
- information
- bits
- sequence
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H03—ELECTRONIC CIRCUITRY
- H03M—CODING; DECODING; CODE CONVERSION IN GENERAL
- H03M13/00—Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
- H03M13/29—Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes combining two or more codes or code structures, e.g. product codes, generalised product codes, concatenated codes, inner and outer codes
- H03M13/2906—Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes combining two or more codes or code structures, e.g. product codes, generalised product codes, concatenated codes, inner and outer codes using block codes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/004—Arrangements for detecting or preventing errors in the information received by using forward error control
- H04L1/0056—Systems characterized by the type of code used
- H04L1/0057—Block codes
-
- H—ELECTRICITY
- H03—ELECTRONIC CIRCUITRY
- H03M—CODING; DECODING; CODE CONVERSION IN GENERAL
- H03M13/00—Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
- H03M13/03—Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words
- H03M13/05—Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words using block codes, i.e. a predetermined number of check bits joined to a predetermined number of information bits
- H03M13/13—Linear codes
-
- H—ELECTRICITY
- H03—ELECTRONIC CIRCUITRY
- H03M—CODING; DECODING; CODE CONVERSION IN GENERAL
- H03M13/00—Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
- H03M13/37—Decoding methods or techniques, not specific to the particular type of coding provided for in groups H03M13/03 - H03M13/35
-
- H—ELECTRICITY
- H03—ELECTRONIC CIRCUITRY
- H03M—CODING; DECODING; CODE CONVERSION IN GENERAL
- H03M13/00—Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
- H03M13/65—Purpose and implementation aspects
- H03M13/6561—Parallelized implementations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/004—Arrangements for detecting or preventing errors in the information received by using forward error control
- H04L1/0041—Arrangements at the transmitter end
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/004—Arrangements for detecting or preventing errors in the information received by using forward error control
- H04L1/0045—Arrangements at the receiver end
- H04L1/0052—Realisations of complexity reduction techniques, e.g. pipelining or use of look-up tables
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/004—Arrangements for detecting or preventing errors in the information received by using forward error control
- H04L1/0056—Systems characterized by the type of code used
Definitions
- This application relates to the field of communication technology, and in particular to an encoding method and communication equipment.
- the rapid evolution of wireless communication indicates that the future 5G communication system will show some new characteristics.
- the three most typical communication scenarios include Enhanced Mobile Broadband (eMBB) and Massive Machine Type Communication (mMTC).
- eMBB Enhanced Mobile Broadband
- mMTC Massive Machine Type Communication
- URLLC Ultra Reliable Low Latency Communication
- Polar Codes is a coding method proposed based on channel polarization.
- the polarization code sequence is the first and only known channel coding method that can be strictly proven to "reach" the channel capacity.
- the embodiments of the present application provide an encoding method and communication equipment, which are beneficial to reducing decoding delay.
- an embodiment of the present application provides an encoding method.
- Encoding is performed by the encoding method described in the first aspect, and
- Kronecker product operation can be performed on P 2 and P 3 to obtain P 1 .
- the first code can be constructed from two codes with the same code length and the number of information bits, which is convenient for implementation.
- n 2 n 3
- k 2 k 3
- P 2 is equal to P 3 .
- the second code and the third code can be understood as the same code. Therefore, the first code can be constructed based on one code, which is convenient for implementation.
- k 1 k 4
- k 4 is the length of the information bit sequence to be encoded.
- a first code whose number of information bits is equal to the length of the information bit sequence to be encoded can be constructed. After the first code is constructed, the information bits of the first code can be directly filled with the information in the information bit sequence to be encoded, and the frozen bits of the first code are filled with a fixed value, and then the bit vector obtained after the bit value is filled coding.
- k 4 is the length of the information bit sequence to be encoded.
- a first code whose number of information bits is greater than the length of the information bit sequence to be encoded can be constructed, and then the information bit sequence to be encoded is encoded according to P 1 of the first code.
- the specific implementation manner of encoding the information bit sequence to be encoded according to the binary vector P 1 of the first code is: determining the binary vector P 4 corresponding to the fourth code according to P 1 , and P 4 indicates the first code.
- the fourth code can be constructed according to the first code, and then the information bit sequence to be coded is coded according to P 4 of the fourth code.
- the set S 2 is a set of subsets S 1
- S 1 is at the set of 1-bit information indicating the P bits set
- S 2 P 4 is information indicating a set of bit information bits .
- P 4 can be obtained by changing part of the information bits indicated by P 1 to frozen bits.
- the specific implementation manner of determining the binary vector P 4 corresponding to the fourth code according to P 1 is: determining the set S 3 from the set S 1 , and modifying the information bits included in the set S 3 to frozen bits
- the first encoding process at least one information bit of the first inner code can be changed into a frozen bit; the first information bit is determined from the set S 3 ; the first information bit in P 1 is modified to a frozen bit to obtain a binary vector P 5; binary vectors to obtain a first code based on the binary vector P 4 P 5.
- the fourth code constructed based on this optional implementation manner is beneficial to reduce the code rate of the inner code.
- the set S 3 comprises a plurality of information bits, the first set of information bits as compared to the other information bits S 3, the first information bit is modified freeze bit, a first inner code becomes Information bits for frozen bits are ranked the lowest in reliability.
- the fourth code constructed based on this optional implementation manner is beneficial to reduce the code rate of the inner code and improve the transmission reliability.
- the binary vector P. 5 in accordance with a first code to obtain a binary vector P is 4 DETAILED DESCRIPTION: determining a set S 4, S 4 bits set information included in the information bits. 5 indicated by P
- at least one information bit of the second inner code in the second encoding process can be changed into a frozen bit
- the first inner code is the outer code in the second encoding process
- the second inner code is the first encoding
- the outer code in the process determine the second information bit from the set S 4 ; modify the second information bit in P 5 to a frozen bit to obtain a binary vector P 6 ; obtain the binary vector P of the first code according to the binary vector P 6 4 .
- the fourth code constructed based on this optional implementation manner is beneficial to reduce the code rate of the inner code.
- the set S 4 comprises a plurality of information bits, second information bit in comparison to other collection of information bits 4 S, a second information bit is modified freeze bit, the second inner code becomes Information bits for frozen bits are ranked the lowest in reliability.
- the fourth code constructed based on this optional implementation manner is beneficial to reduce the code rate of the inner code and improve the transmission reliability.
- n 1 , n 2 and n 3 are integer powers of 2.
- the encoded information bit sequence to be encoded according to a first binary code vector P 1 acquires the encoded bit sequences DETAILED DESCRIPTION: determining a first binary code in accordance with a first vector P
- the seven-code binary vector P 7 indicates the information bits, frozen bits, and non-send bits of the seventh code.
- the code length of the seventh code is n 7
- the number of information bits of the seventh code is k 7 .
- the number of free-to-send bits of the code is n 1 -n 7 , k 7 is equal to the length of the information bit sequence to be encoded, and n 7 is an integer greater than k 7 , k 1 is greater than or equal to k 7 ; encode the information bit sequence to be coded according to the binary vector P 7 of the seventh code to obtain the encoded first bit sequence of length n 1 ; the non-send bits in the first bit sequence After removal, the second bit sequence with a length of n 7 is obtained; the specific implementation of outputting the encoded bit sequence is: outputting the second bit sequence. Based on this optional implementation manner, a code of any code length can be constructed.
- the specific implementation manner of determining the binary vector P 7 of the seventh code according to the binary vector P 1 of the first code is: according to the first preset The rule sequentially changes the elements indicating information bits in P 1 to the elements indicating non-sending bits until the number of elements indicating non-sending bits in P 1 is equal to n 1 -n 7 , and the binary vector P 7 is obtained , the value of the non-sending bits The value of the information bit independent of the seventh code. Based on the P 7 determined by the optional implementation manner, the second bit sequence obtained after encoding may not lack the content corresponding to the information bit, which is beneficial to ensure the integrity of the information.
- the elements indicating information bits in P 1 may be sequentially modified to the elements indicating non-sending bits until P 1
- the number of elements indicating the non-sending bits is equal to n 1 -n 7
- the binary vector P 7 is obtained .
- the first binary sequence includes the binary sequence numbers of the elements in P 1 arranged in descending order or descending order.
- Second binary sequence also comprises a binary number P 1 of the element. The first binary sequence and the second binary sequence are interleaved. Based on this alternative embodiment, P 7 can be accurately determined.
- an embodiment of the present application provides an encoding method, which includes: obtaining a sequence of information bits to be encoded; encoding the sequence of information bits to be encoded according to the binary vector P 1 of the first code, and obtaining the encoded bits sequence; wherein, P 1 indicates the information bits of the code bits of the first and freezing, P 1 is determined according to a target sequence and the number of information bits of the first code k, the number of information bits of the first code is equal to k information bit sequence to be coded 1
- the length of the first code is n 1
- the target sequence is a sequence of sequence numbers less than or equal to n 1 extracted from the stored sequence of length M.
- the sequence of length M includes M bits The sequence number corresponding to each bit of, M is greater than or equal to n 1 ; output the encoded bit sequence.
- Encoding is performed by the encoding method described in the second aspect, and parallel decoding can be performed during the decoding process, which is beneficial to reduce the decoding delay.
- the set S 1 is determined from the information bits of the second binary code is indicated by the vector P 2, S 1 set information bits included in the bit modification is frozen, a first encoding process can be made At least one information bit of the first inner code becomes a frozen bit; the first information bit is determined from the set S 1 ; the first information bit in P 2 is modified to a frozen bit, and the binary vector P 3 of the third code is obtained.
- the code length of the second code is M, the number of information bits of the second code is K, the code length of the third code is M, and the number of information bits of the third code is K-1; determine that the sequence number corresponding to the first information bit is K ; Traverse K from M to 1, and determine the sequence number corresponding to each bit in the sequence of length M. Based on the M-length sequence generated by this optional implementation manner, encoding is performed according to the M-length sequence, which is beneficial to reduce the inner code rate.
- the set S 1 includes a plurality of information bits
- the first information bit is compared with other information bits in the set S 1 , and when the first information bit is modified to a frozen bit, the first inner code changes Information bits for frozen bits are ranked the lowest in reliability.
- encoding is performed according to the sequence of length M, which is beneficial to reduce the inner code rate and improve the transmission reliability.
- a communication device which can execute the method of any one of the foregoing first aspect, second aspect, optional implementation manner of the first aspect, and optional implementation manner of the second aspect.
- This function can be realized by hardware, or by hardware executing corresponding software.
- the hardware or software includes one or more units corresponding to the above-mentioned functions.
- the unit can be software and/or hardware.
- a communication device in a fourth aspect, includes: a processor, a memory, and a communication interface; the processor, the communication interface and the memory are connected; wherein the communication interface may be a transceiver.
- the communication interface is used to realize communication with other network elements.
- one or more programs are stored in the memory, and the processor calls the programs stored in the memory to implement the first aspect, the second aspect, the optional implementation manners of the first aspect, and the possibilities of the second aspect.
- the implementation manners and beneficial effects of the network device to solve the problem can be found in the foregoing first aspect, second aspect, optional implementation manners of the first aspect, and optional second aspect
- the method and beneficial effects of any one of the embodiments will not be repeated here.
- a computer program product which when running on a computer, causes the computer to execute the above-mentioned first aspect, second aspect, optional implementation of the first aspect, and optional implementation of the second aspect Any one of the methods.
- a chip product that executes the method of any one of the foregoing first aspect, second aspect, optional implementation manner of the first aspect, and optional implementation manner of the second aspect.
- a computer-readable storage medium stores instructions that, when run on a computer, cause the computer to execute the first, second, and first aspects above.
- Figure 1 is a schematic diagram of an existing communication process
- Figure 2 is a schematic diagram of a fence diagram provided by an embodiment of the present application.
- FIG. 3 is a schematic flowchart of an encoding method provided by an embodiment of the present application.
- FIG. 4 is a schematic diagram of another fence diagram provided by an embodiment of the present application.
- FIG. 5 is a schematic diagram of another fence diagram provided by an embodiment of the present application.
- FIG. 6 is a schematic structural diagram of a communication device provided by an embodiment of the present application.
- FIG. 7 is a schematic structural diagram of a communication device provided by an embodiment of the present application.
- FIG. 8 is a schematic flowchart of another encoding method provided by an embodiment of the present application.
- FIG. 9 is a schematic diagram of a first binary sequence and a second binary sequence provided by an embodiment of the present application.
- FIG. 10 is a schematic diagram of another fence diagram provided by an embodiment of the present application.
- Fig. 11 is a schematic diagram of another fence diagram provided by an embodiment of the present application.
- the embodiments of the present application provide an encoding method and communication equipment, which are beneficial to reducing decoding delay.
- 5G communication system Global System of Mobile communication (“GSM”) system, Code Division Multiple Access (“CDMA”) system, Wideband Code Division Multiple Access (Wideband Code Division Multiple) Access (“WCDMA”) system, General Packet Radio Service (“GPRS”), Long Term Evolution (“LTE”) system, LTE Frequency Division Duplex (“Frequency Division Duplex”) "FDD”) system, LTE Time Division Duplex (Time Division Duplex, "TDD”), Universal Mobile Telecommunication System (Universal Mobile Telecommunication System, "UMTS”), etc.
- GSM Global System of Mobile communication
- CDMA Code Division Multiple Access
- WCDMA Wideband Code Division Multiple Access
- GPRS General Packet Radio Service
- LTE Long Term Evolution
- LTE Frequency Division Duplex Frequency Division Duplex
- TDD Time Division Duplex
- TDD Universal Mobile Telecommunication System
- UMTS Universal Mobile Telecommunication System
- Figure 1 is the basic flow of communication using wireless technology.
- a communication device before sending information, a communication device needs to perform source coding on the information to be sent, then channel coding the source-coded information, and then send the channel-coded information.
- the receiving end After receiving the channel-encoded information, the receiving end first performs channel decoding on the channel-encoded information, and then performs source decoding on the channel-decoded information, and finally obtains the information sent by the transmitting end.
- channel coding plays a vital role in the reliability of information transmission in the entire communication system.
- u N (u 1 , u 2 ,..., u N ) is a binary row vector
- u N is the bit vector to be encoded
- the length is N (ie, the code length).
- F N is an N ⁇ N matrix, and Here Defined as the Kronecker product of log 2 N matrices F 2 , Is the operator of Kronecker product.
- the addition and multiplication operations mentioned above are all addition and multiplication operations on the binary galois field.
- a part of the bits in u N are used to carry information and are called information bits.
- the other part of the bits is used to carry a fixed value pre-appointed by the transceiver, and is called a fixed bit, or called a frozen bit.
- the frozen bit is used for description in the rest of this application.
- the frozen bit usually carries a value of 0.
- u N determined for the information-carrying bit information, i.e., determining which positions in the u N bits are used to carry information.
- the process of determining the information bits used to carry information in u N is called code construction.
- FIG. 2 is a fence diagram for representing the channel coding process.
- u 16 (u 1 , u 2 ,..., u 16 ) in the fence diagram.
- c 16 (c 1 , c 2 ,..., c 16 ).
- u 6 , u 7 , u 8 , u 10 , u 11 , u 12 , u 14 , u 15 , u 16 are information bits, Used to fill in information.
- u 1 to u 5 , u 9 and u 13 are frozen bits, which are used to fill a fixed value pre-appointed by the transceiver end, such as 0. That is, in Figure 2, the solid nodes corresponding to u 1 to u 16 represent information bits, and the hollow nodes represent frozen bits.
- determination information bits and the need to freeze the bits u 16, u 16 that is need to confirm the information bits and frozen bits are filled with the information in the received information bit sequence to be encoded, and the frozen bits in u 16 are filled with a fixed value pre-appointed by the transceiver end, such as 0.
- the communication device encodes the padding information and the fixed value u 16 , and finally obtains the encoded bit sequence c 16 .
- the foregoing communication device may be an access network device or a terminal device, or the foregoing communication device may be other devices that need to perform channel coding, which is not limited in the embodiment of the present application.
- the access network device can provide communication coverage for a specific geographic area, and can communicate with terminal devices located in the coverage area, and the access network device can support communication protocols of different standards, or can support different communication modes .
- the access network equipment may be an evolved base station (evolutional node B, eNB or eNodeB) in an LTE system, or a radio network controller in a cloud radio access network (cloud radio access network, CRAN), or may be
- the access network equipment in the 5G network such as gNB, may be a small station, a micro station, or a transmission reception point (TRP), or a relay station, an access point, or a public land mobile network that will evolve in the future.
- Land mobile network (PLMN) access network equipment, or various types of equipment that undertake base station functions in the future.
- terminal equipment can refer to access terminals, user equipment (UE), user units, user stations, mobile stations, mobile stations, remote stations, remote terminals, mobile terminals, user terminals, terminals, wireless communication equipment, users Agent or user device.
- the access terminal can be a cellular phone, a cordless phone, a session initiation protocol (SIP) phone, a wireless local loop (WLL) station, a personal digital assistant (PDA), with wireless communication Functional handheld devices, computing devices or other processing devices connected to wireless modems, in-vehicle devices, wearable devices, terminal devices in the Internet of Things, virtual reality devices, terminal devices in 5G networks or future communication networks, or future public evolution Terminal equipment in public land mobile network (PLMN), etc.
- SIP session initiation protocol
- WLL wireless local loop
- PDA personal digital assistant
- FIG. 3 is a schematic flowchart of an encoding method provided by an embodiment of the present application.
- the encoding method includes the following steps 301 to 303, where:
- the communication device obtains an information bit sequence to be encoded.
- the communication device encodes the information bit sequence to be encoded according to the binary vector P 1 of the first code, and obtains the encoded bit sequence.
- P 1 2 and the third code binary vectors The binary vectors P 3 P determines the second code, the information bits indicating P. 1 and freezing the first code bit, P 2 indicate information bits and second code bits freezing, P 3 indicates the information bits and freeze bits of the third code.
- the code length of the first code is n 1
- the number of information bits of the first code is k 1
- the code length of the second code is n 2
- the number of information bits of the second code is k 2
- the code length of the third code is n 3
- the number of information bits of the third code is k 3 .
- n 1 n 2 *n 3
- k 1 k 2 *k 3 .
- P 1 can be expressed as P 2 can be expressed as P 3 can be expressed as
- p 1,z 1, it means that the z-th bit of the first code is an information bit.
- p 2,z 0, it means that the z-th bit of the second code is a frozen bit.
- p 2,z 1, it means that the z-th bit of the second code is an information bit.
- p 3,z 0, it means that the z-th bit of the third code is a frozen bit.
- the first code is a (32, 4) code, that is, the code length n 1 of the first code is 32, and the number of information bits k 1 is 4.
- P 1 [0000000000000000000000110011].
- P 1 indicates that the first bit to the 26th bit, the 29th bit and the 30th bit of the first code are frozen bits, and the 27th, 28th, 31st and 32nd bits are Information bits.
- the second code is a (8, 2) code, that is, the code length n 2 of the second code is 8, and the number of information bits k 2 is 2.
- P 2 [00000011].
- P 2 indicates that the first to sixth bits of the second code are frozen bits, and the seventh and eighth bits are information bits.
- the third code is a (4, 2) code, that is, the code length n 3 of the third code is 4, and the number of information bits k 3 is 2.
- P 3 [0011].
- P 3 indicates that the first bit and the second bit of the third code are frozen bits, and the third bit and the fourth bit are information bits.
- P 1 indicates that the first bit to the 26th bit, the 29th bit and the 30th bit of the first code are frozen bits, and the 27th, 28th, 31st and 32nd bits are Information bits.
- P 2 indicates that the first to sixth bits of the second code are frozen bits, and the seventh and eighth bits are information bits.
- P 3 indicates that the first bit and the second bit of the third code are frozen bits, and the third bit and the fourth bit are information bits.
- P 1 , P 2 , P 3 , P 4 , P 5 , P 6 and P 7 indicate information bits and freeze bits are all described using the first method as an example. That is, 0 indicates that the corresponding bit is a frozen bit, and 1 indicates that the corresponding bit is an information bit.
- n 1 , n 2 , and n 3 are integer powers of 2.
- n 1 is 16, n 2 is 8, and n 3 is 2.
- n 1 is 32, n 2 is 8, and n 3 is 4.
- n 1 is 64, n 2 is 16, and n 3 is 4.
- n 1 , n 2 , and n 3 may not be an integer power of 2.
- n 1 is 72, n 2 is 12, and n 3 is 6.
- n 1 is 60, n 2 is 10, and n 3 is 6.
- n 2 is different from n 3
- k 2 is different from k 3
- the first code may be a (32, 8) code, that is, the code length n 1 of the first code is 32, and the number of information bits k 1 is 8.
- the second code may be a (8, 4) code, that is, the code length n 2 of the second code is 8, and the number of information bits k 2 is 4.
- the third code may be a (4, 2) code, that is, the code length n 3 of the third code is 4, and the number of information bits k 3 is 2.
- n 2 and n 3 are the same, and k 2 and k 3 are different.
- the first code may be a (64, 8) code, that is, the code length n 1 of the first code is 64, and the number of information bits k 1 is 8.
- the second code may be a (8, 4) code, that is, the code length n 2 of the second code is 8, and the number of information bits k 2 is 4.
- the third code may be a (8, 2) code, that is, the code length n 3 of the third code is 8, and the number of information bits k 3 is 2.
- n 2 is different from n 3
- k 2 is the same as k 3
- the first code may be a (128, 16) code, that is, the code length n 1 of the first code is 128, and the number of information bits k 1 is 16.
- the second code may be a (8, 4) code, that is, the code length n 2 of the second code is 8, and the number of information bits k 2 is 4.
- the third code may be a (16, 4) code, that is, the code length n 3 of the third code is 16, and the number of information bits k 3 is 4.
- n 2 is the same as n 3
- k 2 is the same as k 3
- the first code may be a (64, 16) code, that is, the code length n 1 of the first code is 64, and the number of information bits k 1 is 16.
- the second code may be a (8, 4) code, that is, the code length n 2 of the second code is 8, and the number of information bits k 2 is 4.
- the third code may be a (8, 4) code, that is, the code length n 3 of the third code is 8, and the number of information bits k 3 is 4.
- the communication device determines the code length n 2 and the number of information bits of the second code according to the code length n 1 of the first code and the number of information bits k 1 k 2 , and determine the code length n 3 of the third code and the number of information bits k 3 .
- the communication device determines the code length of the second code n 2 and the number of information bits k 2 and the code length of the third code n 3 and the number of information bits k 3 , it determines the binary vector P 2 of the second code and the binary vector of the third code. P 3 . Then determine P 1 according to P 2 and P 3 .
- the communication device can encode the information bit sequence to be encoded according to P 1 to obtain the encoded bit sequence.
- the code length and the number of information bits of the second code and the third code may also be preset.
- the communication device After the communication device receives the information bit sequence to be encoded, there is no need to determine the code length n 2 of the second code and the number of information bits k 2 according to the code length n 1 of the first code and the number of information bits k 1 , and determine the code of the third code Length n 3 and the number of information bits k 3 .
- the communication device After the communication device receives the information bit sequence to be encoded, it can directly determine P 2 of the second code and P 3 of the third code, then determine P 1 according to P 2 and P 3 , and then perform processing according to P 1 for the information bit sequence to be encoded Encoding to obtain the encoded bit sequence.
- the second code and the third code may be Polar codes
- the existing Polar code construction method may be used to determine P 2 of the second code and P 3 of the third code.
- methods such as Gaussian approximation (GA), density evolution (DE), PW, or NR can be used to determine P 2 of the second code and P 3 of the third code.
- the principle of determining P 3 of the third code is the same, and will not be repeated here.
- the communication device samples the positions of sequence elements less than or equal to 8 from PW, NR or other pre-stored sequences to obtain a sequence of length 8 [8 7 6 4 5 3 twenty one]. This sequence represents the order of the sub-channel reliability corresponding to each bit of the second code.
- the reliability of the sub-channel corresponding to the first bit of the second code ranks 8th; the reliability of the sub-channel corresponding to the second bit of the second code ranks 7; the sub-channel corresponding to the third bit of the second code The reliability ranks 6th; the subchannel reliability corresponding to the 4th bit of the second code ranks 4th; the subchannel reliability corresponding to the 5th bit of the second code ranks 5th; the 6th bit of the second code
- the communication device can determine the bit with higher reliability of the corresponding subchannel of the second code as the information bit.
- the principle of determining the P3 of the third code is the same, and will not be repeated here.
- the communication device After the communication device determines P 2 and P 3 , it can perform Kronecker product operation on P 2 and P 3 to obtain the binary vector P 1 of the first code.
- the first code is (16, 9) code
- the second code is (4, 3) code
- the third code is (4, 3) code.
- P 2 may not be equal to P 3 .
- P 3 the same length P 2 and P 3
- P 2 and P 3 the same length
- k 1 k 4 , or k 4 ⁇ k 1 .
- the k 4 is the length of the information bit sequence to be encoded.
- the number of information bits of the first code is equal to the length of the information bit sequence to be encoded.
- the communication device determines P 1 of the first code, it can directly fill the information in the information bit sequence to be encoded into the information bits of the first code, and fill the frozen bits of the first code with a fixed value, such as 0.
- the communication device fills in the information and fixed value in the first code, it gets Then right Code to get
- the communication device receives a sequence of information bits to be encoded.
- the length k 4 of the information bit sequence to be encoded is 4.
- the communication device determines that the number of information bits k 1 of the first code is 4 according to the information bit sequence to be encoded.
- the code length n 1 of the first code may be preset, such as 32.
- the number of information bits k 1 and the code length n 1 of the first code are preset, and the number of information bits k 1 of the first code is 4 and the code length n 1 is 32.
- the communication device factorizes the code length n 1 of the first code (32, 4) and the number of information bits k 1 to obtain the code length n 2 of the second code and the number of information bits k 2 , and the code length of the third code n 3 and the number of information bits k 3 .
- n 2 is 8
- k 2 is 2
- n 3 4
- k 3 is 2. That is, the second code is (8, 2) code
- the third code is (4, 2) code.
- the communication device receives a sequence of information bits to be encoded.
- the length k 4 of the information bit sequence to be encoded is 9.
- the communication device determines that the number of information bits k 1 of the first code is 9 according to the information bit sequence to be encoded.
- the code length n 1 of the first code may be preset, such as 16.
- the number of information bits k 1 and the code length n 1 of the first code are preset, the number of information bits k 1 of the first code is 9, and the code length n 1 is 16.
- the communication device factorizes the code length n 1 of the first code (16, 9) and the number of information bits k 1 to obtain the code length n 2 of the second code and the number of information bits k 2 , and the code length of the third code n 3 and the number of information bits k 3 .
- n 2 is 4, k 2 is 3, n 3 is 4, and k 3 is 3. That is, the second code is (4, 3) code, and the third code is (4, 3) code.
- the communication device fills the first to fifth, ninth, and 13th bits of the first code with a fixed value, such as 0.
- the communication device fills the bit value in the information bit sequence to be encoded in the 6th to 8th bits of the first code, the 10th to 12th bits as information bits, and the 14th to 16th bits. .
- u 16 is obtained.
- k 4 is the length of the information bit sequence to be encoded.
- k 4 is equal to 3 and k 1 is equal to 4.
- k 4 is equal to 5 and k 1 is equal to 9.
- the communication device may first determine the number of information bits of the fourth code.
- the number of information bits of the fourth code is equal to the length of the information bit sequence to be encoded.
- the code length and the number of information bits of the first code are determined according to the code length and the number of information bits of the fourth code.
- the code length of the fourth code may be preset.
- the code length and the number of information bits of the second code and the third code are determined according to the code length and the number of information bits of the first code.
- the communication device After determining the code length of the second code and the third code and the number of information bits, the communication device determines P 2 of the second code and P 3 of the third code, and then determines P 1 according to P 2 and P 3 . After the communications device determines P 1, 4, and then encoded according to P 4 information bit sequence to be encoded according to P 1 P determined.
- the communication device receives a sequence of information bits to be encoded.
- the length k 4 of the information bit sequence to be encoded is 6.
- the communication device determines that the number of information bits of the fourth code is k 4 , that is, 6 according to the length of the information bit sequence to be encoded.
- the communication device determines the code length n 1 and the number of information bits k 1 of the first code according to the code length n 4 of the fourth code and the number of information bits k 4 .
- the code length of the fourth code may be preset, for example, n 4 may be 16. Therefore, the fourth code is (16, 6) code. Since n 4 is equal to n 1 , Therefore, the code length n 1 of the first code is equal to 16, and the number of information bits k 1 of the first code is equal to 9. That is, the first code is (16, 9) code.
- P 4 indicates that the first to sixth, eighth, ninth, thirteenth and fourteenth bits of the fourth code are frozen bits, and the seventh and fourth bits of the fourth code 10 bits to 12th bit, 15th bit and 16th bit are information bits.
- the communication device fills the first to sixth bits, the eighth bit, the ninth bit, the 13th bit, and the 14th bit of the fourth code with a fixed value, such as 0.
- the communication device fills the bit values in the information bit sequence to be encoded in the 7th bit, 10th bit to 12th bit, 15th bit and 16th bit of the fourth code.
- u 16 is obtained.
- the set S 2 is a set of subsets S 1, S 1 is at the set of 1-bit information indicating the P bits set, S 2 P 4 is information indicating a set of bit information bits .
- the specific implementation manner of the communication device determining the binary vector P 4 corresponding to the fourth code according to P 1 is: determining the set S 3 from the set S 1 , and modifying the information bits included in the set S 3 to freeze bit, it allows the first inner code encoding process, the first bit of the at least one information bit becomes frozen; S 3 is determined from a first set of information bits; P 1 in the first information bit modifications as frozen bits, to obtain binary vectors P 5; P 4 binary vectors to obtain a first code based on the binary vector P 5.
- the communication device receives a sequence of information bits to be encoded.
- the length k 4 of the information bit sequence to be encoded is 6.
- the fourth code is (16,6) code.
- the first code is (16, 9) code.
- the following description is supplemented by the corresponding fence diagram.
- the corresponding fence graph has a total of log 2 (n 1 ) layers.
- place it before The first-order operation is used as the first outer code.
- the operation of the order is the first inner code. Since n 1 is equal to 16, for the fence diagram shown in FIG. 4, the first two-level operations are regarded as the first outer code, and the latter two-level operations are regarded as the first inner code.
- the coding process represented by the fence diagram shown in FIG. 4 is the first coding process.
- the bits of the first code [u 5 , u 6 , u 7 , u 8 , u 9 , u 10 , u 11 , u 12 , u 13 , u 14 , u 15 , u 16 ] correspond to the
- the codeword bits of an outer code are respectively [x 5 , x 6 , x 7 , x 8 , x 9 , x 10 , x 11 , x 12 , x 13 , x 14 , x 15 , x 16 ].
- the codeword bits of the first outer code [x 5 , x 6 , x 7 , x 8 ] satisfy the following relationship:
- the information bit u 8 is modified to a frozen bit
- the information bit x 8 of the first inner code will also become a frozen bit
- the information bit x 8 of the first inner code will become a frozen bit to reduce the code rate of the inner code.
- the relationship satisfied by x 9 , x 10 , x 11 , x 12 , x 13 , x 14 , x 15 , and x 16 is the same, and will not be repeated here.
- This application only uses the code word bit of the first outer code [x 5 , x 6 , x 7 , x 8 ] are taken as an example for description.
- information may be sequentially traverse bit set S 1, determining a modified bit is frozen, it is possible to make the information bits of the first inner code becomes frozen bits of information bits S 1 of the.
- the first information bit is modified freeze bit
- a first inner code becomes frozen information bits
- the fourth code is (16, 8) code
- the first code is (16, 9) code.
- P 5 [0000011001110111].
- the number of information bits in P 5 is equal to the number of information bits of the fourth code k 4 .
- the communication device can directly determine P 5 as P 4 , and then encode the information bit sequence to be encoded according to P 4 .
- the communication device obtains the binary vector P 4 of the first code according to the binary vector P 5 as follows: determine the set S 4 from the information bits indicated by P 5 , and when the information bits included in the set S 4 are modified to frozen bits , Can make at least one information bit of the second inner code in the second encoding process become frozen bits, the first inner code is the outer code in the second encoding process, and the second inner code is the outer code in the first encoding process; S 4 is determined from a second set of information bits; P 5 the second information bits in a frozen modified bits to obtain binary vectors P 6; P 6 binary vectors obtained according to a first binary code vector P 4.
- the information bits indicated by P 5 include [u 6 , u 7 , u 10 , u 11 , u 12 , u 14 , u 15 , u 16 ].
- the coding process represented by the fence diagram shown in FIG. 5 is the second coding process.
- the first outer code of the fence diagram shown in FIG. 4 is the second inner code of the fence diagram shown in FIG. 5.
- the first inner code of the fence diagram shown in FIG. 4 is the second outer code of the fence diagram shown in FIG. 5.
- the principle of determining the set S 4 from the information bits indicated by P 5 is similar to the principle of determining the set S 3 from the information bits indicated by P 1 .
- second information bit may be any one of a set of information bits S 4.
- S 4 [u 14 , u 15 , u 16 ]
- the second information bit may be u 14 , u 15 or u 16 .
- the second bits of information may be compared to the set S 4 additional information bits, the second information bit is modified freeze bit, a second bit inner code becomes frozen
- the reliability of x 14 is less than the reliability of x 15 , and the reliability of x 15 is less than the reliability of x 16 . Therefore, the communication device determines u 14 as the second information bit. When a set S 4 only one bit of information, the information bits of the second information bit.
- the communication device outputs the encoded bit sequence.
- the communication device encodes the information bit sequence to be encoded according to the binary vector P 1 of the first code, and after obtaining the encoded bit sequence, outputs the encoded bit sequence. After the communication device outputs the coded bit sequence, it can send the coded bit sequence.
- the communication device can encode the information bit sequence to be encoded according to the binary vector P 1 of the first code, obtain the encoded bit sequence, and output The encoded bit sequence. It can be seen that the method described in FIG. 3 provides a new encoding method. When encoding is performed by this encoding method, parallel decoding can be performed during the decoding process, which is beneficial to reduce the decoding delay.
- FIG. 8 is a schematic flowchart of another encoding method provided by an embodiment of the present application.
- the encoding method includes the following steps 801-805.
- step 801 refer to the description of step 301, which is not repeated here.
- steps 802 to 804 are a specific implementation manner in which the communication device encodes the information bit sequence to be encoded according to the binary vector P 1 of the first code, and obtains the encoded bit sequence.
- Step 805 is a specific implementation of step 303. among them:
- the communication device obtains an information bit sequence to be encoded.
- the communication device determines the binary vector P 7 of the seventh code according to the binary vector P 1 of the first code.
- first code vector P described and first binary code to determine the binary vector P 1 of the first embodiment may refer to the above description of FIG. 3 corresponding to the respective embodiments, and are not repeated herein.
- the binary vector P 7 indicates the information bits, freeze bits and non-send bits of the seventh code.
- the code length of the seventh code is n 7
- the number of information bits of the seventh code is k 7
- the number of non-send bits of the seventh code is n 1 -n 7
- k 7 is equal to the length of the information bit sequence to be encoded
- k 1 is greater than or equal to k 7 .
- k 1 k 7 +n 1 -n 7 .
- the seventh code is a (13, 6) code
- the first code may be a (16, 9) code or a (16, 6) code.
- the seventh code is a (50, 2) code
- the first code can be a (64, 16) code or a (64, 2) code.
- a preset value can be used to indicate the non-sending bit. For example, take the default value of 2 as an example.
- the preset value can be 3, 4, or 5 or other values.
- the communication device sequentially modifies the elements indicating information bits in P 1 to the elements indicating non-sending bits according to the first preset rule, until the number of elements indicating non-sending bits in P 1 is equal to n 1 -n 7 , and the binary vector P is obtained 7.
- the value of this exemption bit is independent of the value of the information bit of the seventh code.
- the second bit sequence obtained after encoding may not lack the content corresponding to the information bit, which is beneficial to ensure the integrity of the information.
- the transmission-free bits may also be referred to as shortened bits.
- the communication device is specifically based on the first binary sequence and the second binary sequence, and according to the first preset rule, sequentially modify the element indicating the information bit in P 1 to the element indicating the non-sending bit until P 1
- the number of elements indicating the non-sending bits in is equal to n 1 -n 7 , and the binary vector P 7 is obtained .
- the first binary sequence includes the binary sequence numbers of the elements in P 1 arranged in descending order or descending order.
- Second binary sequence also comprises a binary number P 1 of the element. The first binary sequence and the second binary sequence are interleaved.
- the communication device may first determine the number of information bits of the seventh code.
- the number of information bits of the seventh code is equal to the length of the information bit sequence to be encoded.
- the communication device determines the code length n 1 and the number of information bits k 1 of the first code according to the code length and the number of information bits of the seventh code.
- the communication device determines that the code length n 1 of the first code is 16, and the number of information bits k 1 is 9. After that, the communication device determines the code length and the number of information bits of the second code and the third code according to the code length n 1 of the first code and the number of information bits k 1 . After determining the code length of the second code and the third code and the number of information bits, the communication device determines P 2 of the second code and P 3 of the third code, and then determines P 1 according to P 2 and P 3 .
- the left frame of Figure 9 represents the first binary sequence
- the first binary sequence includes the binary sequence numbers of the elements in P 1
- the binary sequence numbers in the left frame follow the sequence numbers from top to bottom Arranged in increasing order.
- No. 0,0001 0000 denotes a first element P 1 of the second number represents the element P 1 of the 1, ..., and so on
- Serial No. 16 1111 denotes P 1 of the element 15.
- the right frame of FIG. 9 represents the second binary sequence, and the binary sequence number in the right frame of FIG. 9 is interleaved with the binary sequence number in the left frame.
- the communication device may determine the transmission bit is used to indicate an element-free until the P 1 for instructing transmission of a first binary sequence from the Free and second binary sequences in order from bottom to top
- the number of bit elements is equal to 3. Take the element value 2 to indicate that the bit is not sent as an example.
- the communication device determines the element corresponding to 1111 from the first binary sequence to indicate the non-send bit. Therefore, the communication device modifies the value of the 16th element in P 1 to 2.
- the communication device determines the element corresponding to 1011 from the second binary sequence for the second time to indicate the non-sending bit. Therefore, the communication device modifies the value of the 12th element in P 1 to 2.
- the communication device determines the element corresponding to 1110 from the first binary sequence for the third time to indicate the non-sending bit. Therefore, the communication device modifies the value of the 15th element in P 1 to 2.
- P 7 [0000011101120122].
- the value of the non-send bit is independent of the value of the information bit of the seventh code.
- the description is supplemented by the corresponding fence diagram.
- the first outer code of the fence diagram shown in FIG. 10 is the second inner code of the fence diagram shown in FIG. 11.
- the first inner code of the fence diagram shown in FIG. 10 is the second outer code of the fence diagram shown in FIG. 11.
- the communication device can perform encoding through the encoding process of the fence diagram shown in FIG. 10 or FIG. 11.
- u 6 , u 7 , u 8 , u 10 , u 11 , u 14 are information bits, u 1 , u 2 , u 3 , u 4 , u 5 , u 9 , u 13
- c 12 , c 15 , and c 16 are non-send bits
- u 12 , u 15 , and u 16 are bits before coding corresponding to the non-send bits. It can be seen from FIG. 10 and FIG. 11 that the value of the non-send bit c 16 is determined based on the value of u 16 .
- the value of the non-send bit c 12 is determined based on the values of u 12 and u 16 .
- the value of the non-send bit c 15 is determined based on the values of u 15 and u 16 .
- the sending-free bits c 16 , c 16 and c 16 have no relation to the value of the information bit. Therefore, even if c 16 , c 16 and c 16 are removed, the content corresponding to the information bit will not be missing in the second bit sequence, which is beneficial to ensure the integrity of the information.
- the communication device can start from the first binary sequence and the second binary sequence in the order from top to bottom.
- the element used to indicate the non-send bit is determined in the sequence.
- the specific implementation principle and the communication device determine the element used to indicate the non-send bit from the first binary sequence and the second binary sequence in a bottom-up order. The principle is the same and will not be repeated here.
- the communication device sequentially modifies the elements indicating frozen bits in P 1 to the elements indicating non-sending bits until the number of elements indicating non-sending bits in P 1 is equal to n 1 -n 7 , and the binary vector P is obtained 7 .
- the transmission-free bits can be reasonably determined.
- the non-send bits may also be referred to as puncture bits.
- the communication device is specifically based on the first binary sequence and the second binary sequence, and in accordance with the second preset rule, sequentially modify the element indicating the frozen bit in P 1 to the element indicating the no-sending bit until P 1
- the number of elements indicating the non-sending bits in is equal to n 1 -n 7 , and the binary vector P 7 is obtained .
- the first binary sequence includes the binary sequence numbers of the elements in P 1 arranged from largest to bottom or from smallest to largest.
- Second binary sequence also comprises a binary number P 1 of the element. The first binary sequence and the second binary sequence are interleaved.
- the code length of the seventh code is 13 as n 7 and the number of information bits k 7 of the seventh code is equal to 6 as an example.
- the communication equipment is determined based on the same principle in the above example
- the communication device determines the first binary sequence and the second binary sequence. For the description of the first binary sequence and the second binary sequence, please refer to the above description.
- the communication device may be in order from the bottom from a first binary sequence and second binary
- the element used to indicate the non-send bit is determined in the sequence.
- the specific implementation principle and the communication device determine the element used to indicate the non-send bit from the first binary sequence and the second binary sequence in a bottom-up order. The principle is the same and will not be repeated here.
- the communication device encodes the information bit sequence to be encoded according to the binary vector P 7 of the seventh code, to obtain an encoded first bit sequence of length n 1 .
- the communication device outputs the second bit sequence.
- the value of the bit before encoding corresponding to the free-to-send bit is a value pre-appointed by the transceiver.
- u 6 , u 7 , u 8 , u 10 , u 11 , u 14 are information bits, u 1 , u 2 , u 3 , u 4 , u 5 , u 9 , u 13
- u 12 , u 15 , and u 16 are the bits before encoding corresponding to the non-sending bits.
- the communication device fills u 6 , u 7 , u 8 , u 10 , u 11 , u 14 with the information in the received information bit sequence to be encoded, and freezes the bits u 1 , u 2 , u 3 , u 4 , u 5 , U 9 , u 12 , u 13 , u 15 , u 16 are filled with a fixed value pre-appointed by the transceiver end, such as 0.
- the communication device fills u 12 , u 15 , and u 16 with the values pre-appointed by the transceiver.
- the value filled in the free-to-send bit of the communication device may be the same as or different from the fixed value filled in the frozen bit.
- the communication device After the communication device encodes u 1 to u 16 , the first bit sequence c 1 to c 16 is obtained .
- the communication device removes the sending-free bits c 16 , c 15 and c 12 , and the remaining bits c 1 to c 11 , c 13 and c 14 form a second bit sequence.
- the communication device outputs the second bit sequence.
- the communication device can construct a code of any code length.
- the embodiment of the present application also provides another encoding method, and the following continues to introduce another encoding method:
- the communication device After the communication device receives the information bit sequence to be encoded, the communication device encodes the information bit sequence to be encoded according to the binary vector P 1 of the first code to obtain the encoded bit sequence. After obtaining the coded bit sequence, the communication device outputs the coded bit sequence.
- P 1 indicates the information bits of the code bits of the first and freezing
- P 1 is determined according to a target sequence and the number of information bits of the first code k
- the number k of information bits of the first code length information bit sequence to be encoded is equal to 1
- the code length of the first code is n 1
- the target sequence is a sequence of sequence numbers less than or equal to n 1 extracted from the stored sequence of length M.
- the sequence of length M includes M bits The sequence number corresponding to each bit, M is greater than or equal to n 1 .
- M is 16.
- the communication device can store a sequence of length 16.
- the sequence [10 14 12 16 13 7 6 9 11 5 2 4 15 8 3 1].
- the sequence indicates that the sequence number corresponding to bit u 1 is 10.
- the sequence number corresponding to bit u 2 is 14.
- the sequence number corresponding to bit u 3 is 12.
- the sequence number corresponding to bit u 4 is 16.
- the sequence number corresponding to bit u 5 is 13.
- the sequence number corresponding to bit u 6 is 7.
- the sequence number corresponding to bit u 7 is 6.
- the sequence number corresponding to bit u 8 is 9.
- the sequence number corresponding to bit u 9 is 11.
- the sequence number corresponding to bit u 10 bits is 5.
- the sequence number corresponding to bit u 11 is 2.
- the sequence number corresponding to bit u 12 is 4.
- the sequence number corresponding to bit u 13 is 15.
- the sequence number corresponding to bit u 14 is 8.
- the sequence number corresponding to bit u 15 is 3.
- the communication device can determine that the number of information bits of the first code is 15.
- the code length of the first code may be preset, such as 16. That is, the first code is (16, 15) code.
- the communication device obtains the target sequence from the stored sequence of length 16 according to the code length of the first code.
- the communication device can determine that the number of information bits of the first code is 9.
- the code length of the first code may be preset, such as 16. That is, the first code is (16, 9) code.
- the communication device obtains the target sequence from the stored sequence of length 16 according to the code length of the first code.
- the communication device may also generate a sequence of length M in advance.
- Communications device generates the length of M sequences are particular embodiments: determining from information bits of the second binary code vector indicated by the set of P 2 S 1, S 1 set information bits included in the bit modification is frozen, can be made In the first encoding process, at least one information bit of the first inner code becomes a frozen bit; the first information bit is determined from the set S 1 ; the first information bit in P 2 is modified to a frozen bit to obtain the binary of the third code Vector P 3 , the code length of the second code is M, the number of information bits of the second code is K, the code length of the third code is M, and the number of information bits of the third code is K-1; determine that the first information bit corresponds to The sequence number of is K; traverse K from M to 1, and determine the sequence number corresponding to each bit in the sequence of length M.
- the set S 1 includes multiple information bits, the first information bit is compared with other information bits in the set S 1 , and when the first information bit is modified to a frozen bit, the first inner code becomes the information of the frozen bit The reliability of the bits is ranked the lowest.
- the first information bit may be any one of a collection of information bits in S 1.
- the second code and the third code are different from the second code and the third code in the embodiment described in FIG. 3 above.
- the code length of the second code is M
- the number of information bits of the second code is K
- the code length of the third code is M
- the number of information bits of the third code is K-1.
- a sequence of length 16 needs to be generated.
- K 16.
- the set S 1 can be determined from the information bits indicated by P 2 of the second code according to the same principle as the determination of the set S 3 in the foregoing method embodiment.
- the communication device determines that the sequence number corresponding to u 4 in the sequence of length 16 is 16.
- a sequence with an even power of 2 length can be constructed by the above sequence construction method provided in the embodiments of this application, or can be obtained from a longer sequence through the nesting feature (for example, a sequence with a length of 1024 can be obtained from the above-mentioned length of 4096 Read the serial number less than or equal to 1024 in the sequence of ).
- the sequence of even power of 2 constructed by the above sequence construction method may be the same or different from the sequence of even power of 2 obtained from a longer sequence through the nesting feature.
- the storage method of the sequence has nesting characteristics, which helps to reduce the required storage unit.
- the nesting feature makes it possible to use M-length sequences to construct arbitrary mother-code length sequences less than M length.
- a 2048-long sequence can be read from a 4096-length mother code sequence, and a 512-long sequence can be read from a 1024-long sequence.
- an example of reading the length of 2048 from the above 4096-long sequence is described, and the sequence number is shown in Table 3 below.
- the embodiment of the present invention may divide the device into functional modules according to the foregoing method examples.
- each functional module may be divided corresponding to each function, or two or more functions may be integrated into one module.
- the above-mentioned integrated modules can be implemented in the form of hardware or software functional modules. It should be noted that the division of modules in the embodiment of the present invention is illustrative, and is only a logical function division, and there may be other division methods in actual implementation.
- FIG. 6 shows a schematic structural diagram of a communication device according to an embodiment of the present application.
- the communication device shown in FIG. 6 may be used to perform part or all of the functions of the communication device in the method embodiment described in FIG. 3 above.
- the communication device shown in FIG. 6 may include a processing module 601 and a communication module 602. among them:
- P 2 is equal to P 3 .
- k 1 k 4
- k 4 is the length of the information bit sequence to be encoded.
- k 4 is the length of the information bit sequence to be encoded.
- the way that the processing module 601 encodes the information bit sequence to be encoded according to the binary vector P 1 of the first code is specifically: determining the binary vector P 4 corresponding to the fourth code according to P 1 , and P 4 indicates the value of the fourth code.
- the set S 2 is a set of subsets S 1, S 1 is a set P bit information indicating a bit set consisting of, S 2 P 4 as indicated by bit information consisting of the information bit set.
- the processing module 601 determines binary vectors P 1 P 4 corresponding to the code of the fourth embodiment is specifically by: determining when the set S 1 from the set S 3, S. 3 set information bits included in the bit modification is frozen, can be Make at least one information bit of the first inner code in the first encoding process a frozen bit; determine the first information bit from the set S 3 ; modify the first information bit in P 1 to a frozen bit to obtain a binary vector P 5 ; Obtain the binary vector P 4 of the first code according to the binary vector P 5 .
- the set S 3 comprises a plurality of information bits, the first set of information bits as compared to the other information bits 3 S, first information bit is modified freeze bit, a first inner code becomes frozen information bits The reliability of the bits is ranked the lowest.
- the processing module 601 to obtain binary vectors P of the first embodiment according to the binary code vector P 4. 5 specifically comprises: determining the information bits from the set S P. 5 indicated by 4, the information included in the set S 4 bits for the modified When the bit is frozen, at least one information bit of the second inner code in the second encoding process can be changed into a frozen bit.
- the first inner code is the outer code in the second encoding process
- the second inner code is the information bit in the first encoding process.
- Outer code determine the second information bit from the set S 4 ; modify the second information bit in P 5 to a frozen bit to obtain a binary vector P 6 ; obtain the binary vector P 4 of the first code according to the binary vector P 6 .
- the set S 4 includes a plurality of information bits
- the second information bit is compared with other information bits in the set S 4 , and when the second information bit is modified to a frozen bit, the second inner code becomes the information of the frozen bit
- the reliability of the bits is ranked the lowest.
- n 1 , n 2 and n 3 are integer powers of 2.
- FIG. 6 shows a schematic structural diagram of a communication device according to an embodiment of the present application.
- the communication device shown in FIG. 6 may be used to perform part or all of the functions of the communication device in the foregoing method embodiment.
- the communication device shown in FIG. 6 may include a processing module 601 and a communication module 602. among them:
- the communication module 602 is used to obtain the information bit sequence to be coded; the processing module 601 is used to code the information bit sequence to be coded according to the binary vector P 1 of the first code to obtain the coded bit sequence; where P 1 indicates information bits of the first bit code and freezing, P 1 is determined based on the number 1 and the target sequence of k information bits of the first code, the first number of information bits of the k code length information bit sequence to be encoded is equal to 1, the first code
- the code length is n 1
- the target sequence is a sequence composed of sequence numbers less than or equal to n 1 extracted from the stored sequence of length M.
- the sequence of length M includes the sequence corresponding to each of the M bits Number, M is greater than or equal to n 1 ; the processing module 601 is also used to output the encoded bit sequence.
- the processing module 601 is further configured to determine a set S 1, S 1 set information included in the information bits from the second binary code vector P 2 indicates the bits modified to freeze bit, allows the first coding In the process, at least one information bit of the first internal code becomes a frozen bit; the processing module 601 is also used to determine the first information bit from the set S 1 ; the processing module 601 is also used to change the first information bit in P 2 Modified to freeze bits to obtain the binary vector P 3 of the third code, the code length of the second code is M, the number of information bits of the second code is K, the code length of the third code is M, and the number of information bits of the third code The processing module 601 is also used to determine that the sequence number corresponding to the first information bit is K, and to traverse K from M to 1 to determine the sequence number corresponding to each bit in the sequence of length M.
- the set S 1 includes multiple information bits, the first information bit is compared with other information bits in the set S 1 , and when the first information bit is modified to a frozen bit, the first inner code becomes the information of the frozen bit The reliability of the bits is ranked the lowest.
- FIG. 7 is a schematic structural diagram of a communication device disclosed in an embodiment of the present application.
- the communication device includes a processor 701, a memory 702, and a communication interface 703. Among them, the processor 701, the memory 702 and the communication interface 703 are connected.
- the processor 701 may be a central processing unit (CPU), a general-purpose processor, a co-processor, a digital signal processor (digital signal processor, DSP), or an application-specific integrated circuit (ASIC). , Field Programmable Gate Array (FPGA) or other programmable logic devices, transistor logic devices, hardware components or any combination thereof.
- the processor 701 may also be a combination that implements computing functions, for example, it includes a combination of one or more microprocessors, a combination of a DSP and a microprocessor, and so on.
- the communication interface 703 is used to implement communication with other communication devices or other communication components in the same communication device.
- the processor 701 calls the program code stored in the memory 702 to execute the steps executed by the communication device in the foregoing method embodiment.
- the memory 702 is also used to store cache data during the execution of the above method.
- the memory 702 is also used to store the sequence in Table 1 or similar sequences.
- the memory 702 and the processor 701 are coupled with each other, and optionally, may also be integrated together.
- the embodiment of the present invention also provides a computer-readable storage medium, where instructions are stored in the computer-readable storage medium, and when it runs on a processor, the method flow of the foregoing method embodiment is realized.
- the embodiment of the present invention also provides a computer program product.
- the computer program product runs on a processor, the method flow of the above method embodiment is realized.
- the embodiment of the present application also provides a chip system, which includes a processor, which is used to support a communication device to realize the functions involved in the above-mentioned embodiments, for example, to generate or process data and/or information involved in the above-mentioned methods. .
- the chip system may further include a memory, which is used to store necessary program instructions and data.
- the chip system can be composed of chips, or include chips and other discrete devices.
- the communication device provided in the embodiment of the present application has a principle of solving the problem similar to the principle of the access network device or the first node in the method embodiment of the present application. Therefore, the implementation of each device can refer to the implementation of the method. For concise description, I won't repeat it here.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- Probability & Statistics with Applications (AREA)
- Theoretical Computer Science (AREA)
- Compression, Expansion, Code Conversion, And Decoders (AREA)
- Dc Digital Transmission (AREA)
Abstract
Description
Claims (41)
- 一种编码方法,其特征在于,所述方法包括:获取待编码的信息比特序列;根据第一码的二进制矢量P 1对所述待编码的信息比特序列进行编码,获取编码后的比特序列;其中,所述P 1根据第二码的二进制矢量P 2和第三码的二进制矢量P 3确定,所述P 1指示所述第一码的信息比特和冻结比特,所述P 2指示所述第二码的信息比特和冻结比特,所述P 3指示所述第三码的信息比特和冻结比特,所述第一码的码长为n 1,所述第一码的信息比特数量为k 1,所述第二码的码长为n 2,所述第二码的信息比特数量为k 2,所述第三码的码长为n 3,所述第三码的信息比特数量为k 3,n 1=n 2*n 3,k 1=k 2*k 3;输出所述编码后的比特序列。
- 根据权利要求1或2所述的方法,其特征在于,n 2=n 3,k 2=k 3。
- 根据权利要求3所述的方法,其特征在于,所述P 2等于所述P 3。
- 根据权利要求1~4中任意一项所述的方法,其特征在于,k 1=k 4,所述k 4为所述待编码的信息比特序列的长度。
- 根据权利要求6所述的方法,其特征在于,所述根据第一码的二进制矢量P 1对所述待编码的信息比特序列进行编码,包括:根据所述P 1确定第四码对应的二进制矢量P 4,所述P 4指示所述第四码的信息比特和冻结比特,所述第四码的码长为n 4,所述第四码的信息比特数量为k 4,n 4=n 1;根据所述P 4对所述待编码的信息比特序列进行编码。
- 根据权利要求7所述的方法,其特征在于,集合S 2为集合S 1的子集,所述集合S 1为所述P 1指示的信息比特组成的信息比特集合,所述S 2为所述P 4指示的信息比特组成的信息比特集合。
- 根据权利要求8所述的方法,其特征在于,所述根据所述P 1确定所述第四码对应的二进制矢量P 4,包括:从所述集合S 1中确定集合S 3,所述集合S 3中包括的信息比特修改为冻结比特时,能 够使第一编码过程中第一内码的至少一个信息比特变为冻结比特;从所述集合S 3中确定第一信息比特;将所述P 1中的第一信息比特修改为冻结比特,得到二进制矢量P 5;根据所述二进制矢量P 5得到所述第一码的二进制矢量P 4。
- 根据权利要求9所述的方法,其特征在于,所述集合S 3中包括多个信息比特,所述第一信息比特相较于所述集合S 3中的其他信息比特,所述第一信息比特修改为冻结比特时,第一内码变为冻结比特的信息比特的可靠度排序最低。
- 根据权利要求9或10所述的方法,其特征在于,所述根据所述二进制矢量P 5得到所述第一码的二进制矢量P 4,包括:从所述P 5指示的信息比特中确定集合S 4,所述集合S 4中包括的信息比特为修改为冻结比特时,能够使第二编码过程中第二内码的至少一个信息比特变为冻结比特,所述第一内码为第二编码过程中的外码,所述第二内码为第一编码过程中的外码;从所述集合S 4中确定第二信息比特;将所述P 5中的第二信息比特修改为冻结比特,得到二进制矢量P 6;根据所述二进制矢量P 6得到所述第一码的二进制矢量P 4。
- 根据权利要求11所述的方法,其特征在于,所述集合S 4中包括多个信息比特,所述第二信息比特相较于所述集合S 4中的其他信息比特,所述第二信息比特修改为冻结比特时,第二内码变为冻结比特的信息比特的可靠度排序最低。
- 根据权利要求1~12中任意一项所述的方法,其特征在于,所述n 1、所述n 2和所述n 3为2的整数次方。
- 根据权利要求1~5中任意一项所述的方法,其特征在于,所述根据第一码的二进制矢量P 1对所述待编码的信息比特序列进行编码,获取编码后的比特序列,包括:根据第一码的二进制矢量P 1确定第七码的二进制矢量P 7,所述二进制矢量P 7指示所述第七码的信息比特、冻结比特和免发送比特,所述第七码的码长为n 7,所述第七码的信息比特数量为k 7,所述第七码的免发送比特数量为n 1-n 7,所述k 7等于所述待编码的信息比特序列的长度,所述n 7为大于所述k 7的整数, 所述k 1大于或等于k 7;根据所述第七码的二进制矢量P 7对所述待编码的信息比特序列进行编码,得到长度为n 1的编码后的第一比特序列;将所述第一比特序列中的所述免发送比特去除,得到长度为n 7的第二比特序列;所述输出所述编码后的比特序列,包括:输出所述第二比特序列。
- 根据权利要求14所述的方法,其特征在于,所述k 7=k 1+n 1-n 7,所述根据第一码的二进制矢量P 1确定第七码的二进制矢量P 7,包括:按照第一预设规则依次将P 1中指示信息比特的元素修改为指示免发送比特的元素,直到所述P 1中指示免发送比特的元素的数量等于n 1-n 7,得到二进制向量P 7,所述免发送比特的值独立于所述第七码的信息比特的值。
- 一种编码方法,其特征在于,该方法包括:获取待编码的信息比特序列;根据第一码的二进制矢量P 1对所述待编码的信息比特序列进行编码,获取编码后的比特序列;其中,所述P 1指示所述第一码的信息比特和冻结比特,所述P 1根据目标序列和所述第一码的信息比特数量k 1确定,所述第一码的信息比特数量k 1等于待编码的信息比特序列的长度,所述第一码的码长为n 1,所述目标序列为从存储的长度为M的序列中提取的小于或等于n 1的顺序号组成的序列,所述长度为M的序列中包括所述M个比特中的每个比特对应的顺序号,所述M大于或等于所述n 1;输出编码后的比特序列。
- 根据权利要求16所述的方法,其特征在于,所述方法还包括:从第二码的二进制矢量P 2指示的信息比特中确定集合S 1,所述集合S 1中包括的信息比特为修改为冻结比特时,能够使第一编码过程中第一内码的至少一个信息比特变为冻结比特;从所述集合S 1中确定第一信息比特;将所述P 2中的所述第一信息比特修改为冻结比特,得到第三码的二进制矢量P 3,所述第二码的码长为M,所述第二码的信息比特数量为K,所述第三码的码长为M,所述第三码的信息比特数量为K-1;确定所述第一信息比特对应的顺序号为K;将所述K从所述M到1进行遍历,确定长度为所述M的序列中每个比特对应的顺序号。
- 根据权利要求17所述的方法,其特征在于,所述集合S 1中包括多个信息比特,所述第一信息比特相较于集合S 1中的其他信息比特,所述第一信息比特修改为冻结比特时,所述第一内码变为冻结比特的信息比特的可靠度排序最低。
- 根据权利要求16~18中任意一项所述的方法,其特征在于,所述M为4096时,所述长度为M的序列如表1所示,和/或,所述M为1024时,所述长度为M的序列如表2所示,和/或,所述M为2048时,所述长度为M的序列如表3所示。
- 一种通信设备,其特征在于,所述通信设备包括:通信模块,用于获取待编码的信息比特序列;处理模块,用于根据第一码的二进制矢量P 1对所述待编码的信息比特序列进行编码, 获取编码后的比特序列;其中,所述P 1根据第二码的二进制矢量P 2和第三码的二进制矢量P 3确定,所述P 1指示所述第一码的信息比特和冻结比特,所述P 2指示所述第二码的信息比特和冻结比特,所述P 3指示所述第三码的信息比特和冻结比特,所述第一码的码长为n 1,所述第一码的信息比特数量为k 1,所述第二码的码长为n 2,所述第二码的信息比特数量为k 2,所述第三码的码长为n 3,所述第三码的信息比特数量为k 3,n 1=n 2*n 3,k 1=k 2*k 3;所述处理模块,还用于输出所述编码后的比特序列。
- 根据权利要求20或21所述的通信设备,其特征在于,n 2=n 3,k 2=k 3。
- 根据权利要求22所述的通信设备,其特征在于,所述P 2等于所述P 3。
- 根据权利要求20~23中任意一项所述的通信设备,其特征在于,k 1=k 4,所述k 4为所述待编码的信息比特序列的长度。
- 根据权利要求25所述的通信设备,其特征在于,所述处理模块根据第一码的二进制矢量P 1对所述待编码的信息比特序列进行编码的方式具体为:根据所述P 1确定第四码对应的二进制矢量P 4,所述P 4指示所述第四码的信息比特和冻结比特,所述第四码的码长为n 4,所述第四码的信息比特数量为k 4,n 4=n 1;根据所述P 4对所述待编码的信息比特序列进行编码。
- 根据权利要求26所述的通信设备,其特征在于,集合S 2为集合S 1的子集,所述集合S 1为所述P 1指示的信息比特组成的信息比特集合,所述S 2为所述P 4指示的信息比特组成的信息比特集合。
- 根据权利要求27所述的通信设备,其特征在于,所述处理模块根据所述P 1确定所述第四码对应的二进制矢量P 4的方式具体为:从所述集合S 1中确定集合S 3,所述集合S 3中包括的信息比特修改为冻结比特时,能够使第一编码过程中第一内码的至少一个信息比特变为冻结比特;从所述集合S 3中确定第一信息比特;将所述P 1中的第一信息比特修改为冻结比特,得到二进制矢量P 5;根据所述二进制矢量P 5得到所述第一码的二进制矢量P 4。
- 根据权利要求28所述的通信设备,其特征在于,所述集合S 3中包括多个信息比特,所述第一信息比特相较于所述集合S 3中的其他信息比特,所述第一信息比特修改为冻结比特时,第一内码变为冻结比特的信息比特的可靠度排序最低。
- 根据权利要求28或29所述的通信设备,其特征在于,所述处理模块根据所述二进制矢量P 5得到所述第一码的二进制矢量P 4的方式具体为:从所述P 5指示的信息比特中确定集合S 4,所述集合S 4中包括的信息比特为修改为冻结比特时,能够使第二编码过程中第二内码的至少一个信息比特变为冻结比特,所述第一内码为第二编码过程中的外码,所述第二内码为第一编码过程中的外码;从所述集合S 4中确定第二信息比特;将所述P 5中的第二信息比特修改为冻结比特,得到二进制矢量P 6;根据所述二进制矢量P 6得到所述第一码的二进制矢量P 4。
- 根据权利要求30所述的通信设备,其特征在于,所述集合S 4中包括多个信息比特,所述第二信息比特相较于所述集合S 4中的其他信息比特,所述第二信息比特修改为冻结比特时,第二内码变为冻结比特的信息比特的可靠度排序最低。
- 根据权利要求20~31中任意一项所述的通信设备,其特征在于,所述n 1、所述n 2和所述n 3为2的整数次方。
- 根据权利要求20~24中任意一项所述的通信设备,其特征在于,所述处理模块根据第一码的二进制矢量P 1对所述待编码的信息比特序列进行编码,获取编码后的比特序列的方式具体为:根据第一码的二进制矢量P 1确定第七码的二进制矢量P 7,所述二进制矢量P 7指示所述第七码的信息比特、冻结比特和免发送比特,所述第七码的码长为n 7,所述第七码的信息比特数量为k 7,所述第七码的免发送比特数量为n 1-n 7,所述k 7等于所述待编码的信息比特序列的长度,所述n 7为大于所述k 7的整数, 所述k 1大于或等于k 7;根据所述第七码的二进制矢量P 7对所述待编码的信息比特序列进行编码,得到长度为n 1的编码后的第一比特序列;将所述第一比特序列中的所述免发送比特去除,得到长度为n 7的第二比特序列;所述处理模块输出所述编码后的比特序列的方式具体为:输出所述第二比特序列。
- 根据权利要求33所述的通信设备,其特征在于,所述k 7=k 1+n 1-n 7,所述处理模块根据第一码的二进制矢量P 1确定第七码的二进制矢量P 7的方式具体为:按照第一预设规则依次将P 1中指示信息比特的元素修改为指示免发送比特的元素,直到所述P 1中指示免发送比特的元素的数量等于n 1-n 7,得到二进制向量P 7,所述免发送比特 的值独立于所述第七码的信息比特的值。
- 一种通信设备,其特征在于,所述通信设备包括:通信模块,用于获取待编码的信息比特序列;处理模块,用于根据第一码的二进制矢量P 1对所述待编码的信息比特序列进行编码,获取编码后的比特序列;其中,所述P 1指示所述第一码的信息比特和冻结比特,所述P 1根据目标序列和所述第一码的信息比特数量k 1确定,所述第一码的信息比特数量k 1等于待编码的信息比特序列的长度,所述第一码的码长为n 1,所述目标序列为从存储的长度为M的序列中提取的小于或等于n 1的顺序号组成的序列,所述长度为M的序列中包括所述M个比特中的每个比特对应的顺序号,所述M大于或等于所述n 1;所述处理模块,还用于输出编码后的比特序列。
- 根据权利要求35所述的通信设备,其特征在于,所述处理模块,还用于从第二码的二进制矢量P 2指示的信息比特中确定集合S 1,所述集合S 1中包括的信息比特为修改为冻结比特时,能够使第一编码过程中第一内码的至少一个信息比特变为冻结比特;从所述集合S 1中确定第一信息比特;所述处理模块,还用于将所述P 2中的所述第一信息比特修改为冻结比特,得到第三码的二进制矢量P 3,所述第二码的码长为M,所述第二码的信息比特数量为K,所述第三码的码长为M,所述第三码的信息比特数量为K-1;所述处理模块,还用于确定所述第一信息比特对应的顺序号为K;所述处理模块,还用于将所述K从所述M到1进行遍历,确定长度为所述M的序列中每个比特对应的顺序号。
- 根据权利要求36所述的通信设备,其特征在于,所述集合S 1中包括多个信息比特,所述第一信息比特相较于集合S 1中的其他信息比特,所述第一信息比特修改为冻结比特时,所述第一内码变为冻结比特的信息比特的可靠度排序最低。
- 根据权利要求35~37中任意一项所述的通信设备,其特征在于,所述M为4096时,所述长度为M的序列如表1所示,和/或,所述M为1024时,所述长度为M的序列如表2所示,和/或,所述M为2048时,所述长度为M的序列如表3所示。
- 一种计算机可读存储介质,其特征在于,计算机可读存储介质中存储有指令,当其在计算机上运行时,使得上述权利要求1~15中任意一项所述的方法被执行或上述权利要求16~19中任意一项所述的方法被执行。
- 一种芯片系统,其特征在于,所述芯片系统包括处理器和接口电路,所述接口电路与所述处理器耦合,所述处理器用于执行计算机程序或指令,以实现上述权利要求1~15中任意一项所述的 方法或实现上述权利要求16~19中任意一项所述的方法;所述接口电路用于与所述芯片系统之外的其它模块进行通信。
- 一种通信设备,其特征在于,所述通信设备包括:存储器,所述存储器包括计算机可读指令;与所述存储器相连的处理器,所述处理器用于执行所述计算机可读指令,从而使得权利要求1-15中任一项所述的方法或权利要求16-19中任一项所述的方法被执行。
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP20799365.0A EP3952159A4 (en) | 2019-04-29 | 2020-04-01 | ENCODING METHOD AND COMMUNICATION DEVICE |
BR112021021861A BR112021021861A2 (pt) | 2019-04-29 | 2020-04-01 | Método de codificação e dispositivo de comunicações |
KR1020217038824A KR20220005540A (ko) | 2019-04-29 | 2020-04-01 | 인코딩 방법 및 통신 디바이스 |
US17/511,905 US11764812B2 (en) | 2019-04-29 | 2021-10-27 | Encoding method and communications device |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910357715 | 2019-04-29 | ||
CN201910357715.5 | 2019-04-29 | ||
CN202010075805.8A CN111865487B (zh) | 2019-04-29 | 2020-01-22 | 一种编码方法及通信设备 |
CN202010075805.8 | 2020-01-22 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/511,905 Continuation US11764812B2 (en) | 2019-04-29 | 2021-10-27 | Encoding method and communications device |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2020220920A1 true WO2020220920A1 (zh) | 2020-11-05 |
Family
ID=72984836
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/082846 WO2020220920A1 (zh) | 2019-04-29 | 2020-04-01 | 一种编码方法及通信设备 |
Country Status (6)
Country | Link |
---|---|
US (1) | US11764812B2 (zh) |
EP (1) | EP3952159A4 (zh) |
KR (1) | KR20220005540A (zh) |
CN (1) | CN111865487B (zh) |
BR (1) | BR112021021861A2 (zh) |
WO (1) | WO2020220920A1 (zh) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107800510A (zh) * | 2016-09-05 | 2018-03-13 | 华为技术有限公司 | 极化Polar码编码的方法及装置 |
CN108347301A (zh) * | 2017-01-25 | 2018-07-31 | 华为技术有限公司 | 数据的传输方法和装置 |
WO2018232562A1 (en) * | 2017-06-19 | 2018-12-27 | Qualcomm Incorporated | POLAR CODE PARITY BITS FOR EARLY STOP |
CN109155634A (zh) * | 2016-05-12 | 2019-01-04 | 华为技术有限公司 | 实施极化码的设备和方法 |
Family Cites Families (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106899311B (zh) | 2012-09-24 | 2023-11-03 | 华为技术有限公司 | 混合极性码的生成方法和生成装置 |
CN104124979B (zh) * | 2013-04-27 | 2018-04-17 | 华为技术有限公司 | 极性码的译码方法和译码装置 |
US9007241B2 (en) * | 2013-09-16 | 2015-04-14 | Seagate Technology Llc | Reduced polar codes |
GB2521828A (en) | 2013-12-23 | 2015-07-08 | Sony Corp | Data encoding and decoding |
US10461779B2 (en) * | 2015-08-12 | 2019-10-29 | Telefonaktiebolaget Lm Ericsson (Publ) | Rate-compatible polar codes |
CN108365850B (zh) * | 2017-01-26 | 2022-02-11 | 华为技术有限公司 | 编码方法、编码装置和通信装置 |
CN108574494B (zh) * | 2017-03-13 | 2020-08-25 | 华为技术有限公司 | 编译码方法及装置 |
US10651973B2 (en) * | 2017-03-22 | 2020-05-12 | Huawei Technologies Co., Ltd. | Method and apparatus for error-correction encoding using a polar code |
CN109412608B (zh) * | 2017-03-24 | 2019-11-05 | 华为技术有限公司 | Polar编码方法和编码装置、译码方法和译码装置 |
CN109150397B (zh) * | 2017-03-24 | 2019-08-27 | 华为技术有限公司 | 一种构造极化码序列的方法及装置 |
CN108631916B (zh) * | 2017-03-24 | 2020-03-31 | 华为技术有限公司 | 极化Polar码的速率匹配方法和装置、通信装置 |
CN108933643B (zh) * | 2017-05-24 | 2021-06-15 | 华为技术有限公司 | 编译码方法及装置 |
CN109039544B (zh) * | 2017-06-27 | 2019-11-19 | 华为技术有限公司 | 一种编码方法、无线设备和芯片 |
US10833705B2 (en) * | 2017-08-02 | 2020-11-10 | Qualcomm Incorporated | Information bit distribution design for polar codes |
CN109547034B (zh) * | 2017-09-22 | 2021-10-01 | 华为技术有限公司 | 译码方法及设备、译码器 |
CN109600194A (zh) * | 2017-09-30 | 2019-04-09 | 华为技术有限公司 | Ploar编码方法和编码装置、译码方法和译码装置 |
-
2020
- 2020-01-22 CN CN202010075805.8A patent/CN111865487B/zh active Active
- 2020-04-01 WO PCT/CN2020/082846 patent/WO2020220920A1/zh unknown
- 2020-04-01 EP EP20799365.0A patent/EP3952159A4/en active Pending
- 2020-04-01 BR BR112021021861A patent/BR112021021861A2/pt unknown
- 2020-04-01 KR KR1020217038824A patent/KR20220005540A/ko not_active Application Discontinuation
-
2021
- 2021-10-27 US US17/511,905 patent/US11764812B2/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109155634A (zh) * | 2016-05-12 | 2019-01-04 | 华为技术有限公司 | 实施极化码的设备和方法 |
CN107800510A (zh) * | 2016-09-05 | 2018-03-13 | 华为技术有限公司 | 极化Polar码编码的方法及装置 |
CN108347301A (zh) * | 2017-01-25 | 2018-07-31 | 华为技术有限公司 | 数据的传输方法和装置 |
WO2018232562A1 (en) * | 2017-06-19 | 2018-12-27 | Qualcomm Incorporated | POLAR CODE PARITY BITS FOR EARLY STOP |
Non-Patent Citations (1)
Title |
---|
HUAWEI ET AL.: "Details of the Polar Code Design", 3GPP TSG RAN WG1 MEETING #87 R1-1611254, 3 November 2016 (2016-11-03), XP051189033 * |
Also Published As
Publication number | Publication date |
---|---|
CN111865487A (zh) | 2020-10-30 |
EP3952159A1 (en) | 2022-02-09 |
US20220052711A1 (en) | 2022-02-17 |
CN111865487B (zh) | 2022-07-29 |
KR20220005540A (ko) | 2022-01-13 |
EP3952159A4 (en) | 2022-08-24 |
US11764812B2 (en) | 2023-09-19 |
BR112021021861A2 (pt) | 2022-01-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10581463B2 (en) | Communication method using polar code, and wireless device | |
WO2019158031A1 (zh) | 编码的方法、译码的方法、编码设备和译码设备 | |
US10924210B2 (en) | Method, apparatus, and device for determining polar code encoding and decoding | |
CN107800510B (zh) | 极化Polar码编码的方法及装置 | |
US20190260503A1 (en) | Channel coding method and apparatus in communication system | |
CN109391343B (zh) | 一种Polar码编码方法及装置 | |
US11502704B2 (en) | Polar coding method and apparatus | |
WO2020048537A1 (zh) | 级联编码的方法和装置 | |
WO2021254119A1 (zh) | 信道编译码方法和通信装置 | |
US11190213B2 (en) | Coding method, wireless device, and chip | |
WO2020220920A1 (zh) | 一种编码方法及通信设备 | |
WO2021254291A1 (zh) | 一种Polar码速率匹配方法及装置 | |
CN108390739A (zh) | 数据处理的方法和装置 | |
RU2796655C1 (ru) | Способ кодирования и устройство связи | |
WO2022007621A1 (zh) | 一种Polar码编解码方法及装置 | |
WO2024031285A1 (zh) | 一种数据处理方法、装置及设备 | |
WO2023221725A1 (zh) | 数据处理方法及电子设备、计算机可读存储介质 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20799365 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112021021861 Country of ref document: BR |
|
ENP | Entry into the national phase |
Ref document number: 2020799365 Country of ref document: EP Effective date: 20211105 |
|
ENP | Entry into the national phase |
Ref document number: 20217038824 Country of ref document: KR Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 112021021861 Country of ref document: BR Kind code of ref document: A2 Effective date: 20211029 |