WO2022028672A1 - Encoding and decoding scheme using symbol soft values - Google Patents

Encoding and decoding scheme using symbol soft values Download PDF

Info

Publication number
WO2022028672A1
WO2022028672A1 PCT/EP2020/071854 EP2020071854W WO2022028672A1 WO 2022028672 A1 WO2022028672 A1 WO 2022028672A1 EP 2020071854 W EP2020071854 W EP 2020071854W WO 2022028672 A1 WO2022028672 A1 WO 2022028672A1
Authority
WO
WIPO (PCT)
Prior art keywords
communication device
symbol
bits
modulated symbols
soft values
Prior art date
Application number
PCT/EP2020/071854
Other languages
French (fr)
Inventor
Yi Qin
Branislav M POPOVIC
Original Assignee
Huawei Technologies Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co., Ltd. filed Critical Huawei Technologies Co., Ltd.
Priority to CN202080104743.7A priority Critical patent/CN116134735A/en
Priority to PCT/EP2020/071854 priority patent/WO2022028672A1/en
Publication of WO2022028672A1 publication Critical patent/WO2022028672A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0056Systems characterized by the type of code used
    • H04L1/0057Block codes
    • H04L1/0058Block-coded modulation
    • HELECTRICITY
    • H03ELECTRONIC CIRCUITRY
    • H03MCODING; DECODING; CODE CONVERSION IN GENERAL
    • H03M13/00Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
    • H03M13/03Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words
    • H03M13/05Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words using block codes, i.e. a predetermined number of check bits joined to a predetermined number of information bits
    • H03M13/13Linear codes
    • HELECTRICITY
    • H03ELECTRONIC CIRCUITRY
    • H03MCODING; DECODING; CODE CONVERSION IN GENERAL
    • H03M13/00Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
    • H03M13/25Error detection or forward error correction by signal space coding, i.e. adding redundancy in the signal constellation, e.g. Trellis Coded Modulation [TCM]
    • H03M13/251Error detection or forward error correction by signal space coding, i.e. adding redundancy in the signal constellation, e.g. Trellis Coded Modulation [TCM] with block coding
    • HELECTRICITY
    • H03ELECTRONIC CIRCUITRY
    • H03MCODING; DECODING; CODE CONVERSION IN GENERAL
    • H03M13/00Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
    • H03M13/37Decoding methods or techniques, not specific to the particular type of coding provided for in groups H03M13/03 - H03M13/35
    • H03M13/45Soft decoding, i.e. using symbol reliability information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0045Arrangements at the receiver end
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0056Systems characterized by the type of code used
    • H04L1/0071Use of interleaving

Definitions

  • the disclosure relates to polar an encoding and decoding scheme using symbol soft values for improved coding performance.
  • Polar code is a linear block error correcting code that is proven to achieve channel capacity for binary-input discrete memoryless channels (B-DMCs) with low encoding and decoding complexity. Due to these advantages, polar codes are utilized for transmission of uplink and downlink control signals for enhanced mobile broadband (eMBB) control channels in 3GPP New Radio (NR) system. However, if high order modulations, e.g., 16QAM, are used, the channels are no longer B-DMCs, and therefore polar code may not achieve the channel capacity.
  • B-DMCs binary-input discrete memoryless channels
  • NR 3GPP New Radio
  • An objective of examples of the disclosure is to provide a solution which mitigates or solves the drawbacks and problems of conventional solutions.
  • a first communication device for a wireless communication system, the first communication device being configured to obtain a set of uncoded bits comprising M o bits, wherein the set of uncoded bits comprises information bits; obtain a set of coded bits by a linear transformation of the set of uncoded bits based on a coding matrix G, wherein the coding matrix G is a Kronecker product of two binary matrices
  • G1 and G2 where G1 is a n-th Kronecker power of matrix and G2 is a K x K full rank binary matrix, where K is the modulation order of a modulation symbol constellation and K > 1, and where M o is a multiple of K obtain a set of modulated symbols by modulating the set of coded bits based on the modulation symbol constellation; and transmit the set of modulated symbols to a second communication device.
  • a modulation order of a modulation symbol constellation can be understood as the number of bits carried in one modulation symbol. For example, if there are 2 K modulation symbols in the modulation symbol constellation, the modulation order is K.
  • a set of coded bits may be understood as to employ a polar code on a set of uncoded bits.
  • polar codes are used for encoding.
  • An advantage of the first communication device is that a polar-like code among every length-Zf bit segments is guaranteed. Thereby, the symbol soft values of every length- ⁇ bit segments can be used for decoding at the receiver.
  • An advantage of this implementation form is that it supports length M o uncoded bits and guarantees that the number of coded bits is M o .
  • K is a power of 2 when G2 is a log 2 K-th Kronecker power of matrix
  • G is a log 2 M 0 -th Kronecker power of matrix
  • obtaining the set of modulated symbols comprises obtain a subset of the set of coded bits, wherein the subset of the set of coded bits consists of entire segments of the set of coded bits; and obtain the set of modulated symbols by modulating the subset of the set of coded bits.
  • An advantage of this implementation form is that it guarantees that each entire bit segment is modulated or not, and therefore avoids modulate only a part of a bit segment.
  • obtaining the set of modulated symbols comprises obtain an extended set of coded bits, wherein the extended set of coded bits comprises the set of coded bits and one or more segments of the set of coded bits; and obtain the set of modulated symbols by modulating the extended set of coded bits.
  • An advantage of this implementation form is that it guarantees that each entire bit segment is modulated or not, and therefore avoids only modulate a part of a bit segment.
  • obtaining the set of modulated symbols comprises interleave the set of coded bits by interleaving entire segments of the set of coded bits; and obtain the set of modulated symbols by modulating the interleaved set of coded bits.
  • An advantage of this implementation form is that it guarantees that each entire bit segment is modulated to one modulation symbol, and therefore avoids modulate only a part of a bit segment.
  • An advantage of this implementation form is that a feasible bit segmentation solution is provided.
  • a second communication device for a wireless communication system, the second communication device being configured to receive a set of modulated symbols from a first communication device, wherein the set of received modulated symbols are associated with a set of coded bits and a modulation symbol constellation; obtain a set of symbol soft values based on the set of received modulated symbols and symbols of the modulation symbol constellation; and obtain a set of decoded bits associated with the set of coded bits based on the set of received modulated symbols and the set of symbol soft values.
  • An advantage of the second communication device according to the second aspect is that the decoding is based on symbol soft values instead of bit LLRs. Thereby, improved performance is provided, e.g. in terms of lower error rate such as BLER.
  • the set of coded bits are obtained from a linear transformation of a set of uncoded bits based on a coding matrix G, wherein the coding matrix G is a Kronecker product of two binary matrices G1 and G2, where G1 is a n-th Kronecker power of matrix and G2 is a K x K full rank binary matrix, where K is the modulation order of the modulation symbol constellation and K > 1, and where M o is a multiple of K.
  • An advantage with this implementation form is that it guarantees a polar-like code among every length- ⁇ bit segments. Thereby, the symbol soft values of every length- ⁇ bit segments can be used for decoding at the receiver.
  • An advantage with this implementation form is that it supports length-M 0 uncoded bit and guarantees that the number of coded bits is M o .
  • each symbol soft value in the set of symbol soft values are obtained based on an inner product between a received modulated symbol in the set of received modulated symbols and a symbol of the modulation symbol constellation when the properties of channel is unknown to the second communication device.
  • the channel here denotes the channel in which the set of modulated symbols are received. Hence, this is the case when the second communication device don't know the properties of the channel. For example, there is no reference or pilot signals for channel estimation or demodulation.
  • An advantage with this implementation form is to define the symbol soft value for the case channel is unknown, which is related to the correlation between received symbol and modulation symbols in the constellation.
  • the inner product between a received modulated symbol in the set of received modulated symbols and a symbol of the modulation symbol constellation is obtained according to
  • An advantage with this implementation form is that
  • YX H can be used for the case that channels of different transmitted modulation symbols are similar.
  • 2 can be used for all cases.
  • each symbol soft value in the set of symbol soft values is obtained based a difference between a received modulated symbol in the set of received modulated symbols and a symbol of the modulation symbol constellation when the properties of a channel is known to the second communication device.
  • the channel here denotes the channel in which the set of modulated symbols are received. Hence, this is the case when the second communication device knows the properties of the channel.
  • An advantage with this implementation form is to define the symbol soft value for the case channel is known, which is related to the difference between received symbol and modulation symbols in the constellation.
  • the difference between the received modulated symbol in the set of received modulated symbols and the symbol of the modulation symbol constellation is obtained according to where Y is the received modulated symbol in the set of received modulated symbols, X is the symbol of the modulation symbol constellation, and p is the signal-to-noise ratio of the received modulated symbol in the set of received modulated symbols.
  • obtaining the set of decoded bits comprises obtain the set of decoded bits based on soft values of decoded bit segments, wherein soft values of each decoded bit segment are determined based on soft values of at least one intermediate bit segment, and wherein soft values of each intermediate bit segment are determined based on soft values of two basic bit segments, wherein the sum of the two basic bit segments in Galois Field of two elements is equal to the intermediate bit segment, and wherein the soft values of the two bit segments are obtained based on the set of symbol soft values.
  • An advantage with this implementation form is that the decoder can calculate the soft values of decoded bit segments with low complexity.
  • obtaining the set of decoded bits comprises obtain the set of decoded bits based on soft values of decoded bit segments, wherein soft values of each decoded bit segment are determined based on soft values of at least one intermediate bit segment, and wherein soft values of each intermediate bit segment are determined based on initial soft values of the intermediate bit segment, soft values of one basic bit segment, and at least one decoded bit, and wherein the initial soft values of the intermediate bit segment are obtained based on the set of symbol soft values.
  • An advantage with this implementation form is that the decoder can calculate the soft values of decoded bit segments with low complexity by using this implementation.
  • the above mentioned and other objectives are achieved with a method for a first communication device, the method comprises obtaining a set of uncoded bits comprising M o bits, wherein the set of uncoded bits comprises information bits; obtaining a set of coded bits by a linear transformation of the set of uncoded bits based on a coding matrix G, wherein the coding matrix G is a Kronecker product of two binary matrices G1 and G2, where G1 is a n-th Kronecker power of matrix and G2 is a K x K full rank binary matrix, where K is the modulation order of a modulation symbol constellation and K > 1, and where M o is a multiple of K ⁇ obtaining a set of modulated symbols by modulating the set of coded bits based on the modulation symbol constellation; and transmitting the set of modulated symbols to a second communication device.
  • the coding matrix G is a Kronecker product of two binary matrices G1 and G2, where G1 is a n-th Kronecker power
  • an implementation form of the method comprises the feature(s) of the corresponding implementation form of the first communication device.
  • the above mentioned and other objectives are achieved with a method for a second communication device, the method comprises receiving a set of modulated symbols from a first communication device, wherein the set of received modulated symbols are associated with a set of coded bits and a modulation symbol constellation; obtaining a set of symbol soft values based on the set of received modulated symbols and symbols of the modulation symbol constellation; and obtaining a set of decoded bits associated with the set of coded bits based on the set of received modulated symbols and the set of symbol soft values.
  • an implementation form of the method comprises the feature(s) of the corresponding implementation form of the second communication device.
  • the disclosure also relates to a computer program, characterized in program code, which when run by at least one processor causes said at least one processor to execute any method according to examples of the invention. Further, the disclosure also relates to a computer program product comprising a computer readable medium and said mentioned computer program, wherein said computer program is included in the computer readable medium, and comprises of one or more from the group: ROM (Read-Only Memory), PROM (Programmable ROM), EPROM (Erasable PROM), Flash memory, EEPROM (Electrically EPROM) and hard disk drive.
  • ROM Read-Only Memory
  • PROM Programmable ROM
  • EPROM Erasable PROM
  • Flash memory Flash memory
  • EEPROM Electrically EPROM
  • FIG. 1 shows a first communication device according to an example of the disclosure
  • FIG. 2 shows a method for a first communication device according to an example of the disclosure
  • FIG. 3 shows a second communication device according to an example of the disclosure
  • - Fig. 4 shows a method for a second communication device according to an example of the disclosure
  • - Fig. 5 shows a wireless communication system according to an example of the disclosure
  • FIG. 6 shows more in detail the encoding and decoding schemes according to examples of the disclosure
  • Fig. 7 shows details of a polar decoder of a second communication device according to an example of the disclosure
  • - Fig. 8 shows a butterfly-based decoder according to an example of the disclosure.
  • a transmitter employing polar code generally comprises at least three blocks: a polar encoder block, a bit segmentation block and a modulation block.
  • the polar encoder block includes a mapper which is used to map N information bits and M o - N frozen bits and parity check bits (if any, generated based on information bits and predefined parity check functions) to a bit vector B of size 1 x M 0 , where the vector length is M o .
  • the bit segmentation block separates the coded bits into M/K bit segments and there are K bits in each bit segment. K is the number of bits conveyed by one modulation symbol.
  • the modulation block maps every K bits to a modulation symbol. If the modulation symbol contains more than one complex number, the modulation is called multi-dimensional modulation. Otherwise, the modulation is called single-dimensional modulation.
  • the bit segmentation block and modulation block can also be considered as one combined block to generate modulation symbols based on coded bits.
  • a polar code receiver generally comprises two blocks: a demodulation block and a polar decoder block.
  • the demodulation block demodulates each received modulation symbol to estimate the Log- Likelihood Ratio (LLR) of each bit of the K modulated bits based on the received modulation symbol. If the channel is known at the receiver, the received modulation symbol is the symbol after equalization of the received signal. Otherwise, the received modulation symbol is the received signal.
  • the first step of demodulation is to calculate the symbol soft-value of the demodulated symbol, which is defined as log probability of each constellation point, 2 K constellation points in total, being transmitted based on the received modulation symbol, i.e., as given in Eq. (1) where X is a modulation symbol in the constellation, and Y is the received modulation symbol.
  • the 2 K symbol soft values of each received modulation symbol are converted to bit soft value of each modulation bit, i.e., LLR value defined as in Eq. (2) where b is a modulation bit.
  • LLR value defined as in Eq. (2) where b is a modulation bit.
  • the method to obtain LLR(b) by LL(X) is introduced in Eq. (4).
  • equivalent methods can be used to obtain LLR(b) based on X and Y.
  • the first step of the polar decoder is to estimate B, bit by bit, based on the M o LLR values from demodulation block by using the successive cancellation (SC) polar decoding.
  • the estimated bits of B are called decoded bits B.
  • SC polar decoding The principle of SC polar decoding to estimate the j-th bit
  • If is a frozen bit, 0; If is a parity check bit, its value is obtained according to the previously decoded bits and parity check function;
  • the SC polar decoding can be efficiently performed in a recursive manner by using a data flow graph with structure named a butterflybased decoder.
  • f function calculate the LLR of the sum of two bits by: with
  • List decoding can be applied in this step to improve the decoding performance.
  • the vector B is estimated bit by bit to obtain B.
  • the decoding algorithm determines a list of estimation of the first i bits. Each entry in the list contains a feasible estimate of the first i bits and the corresponding probability of this estimate. Comparing with unique decoding, which only outputs the most possible value of each bits, list decoding has a higher chance to achieve global optimal estimation.
  • the maximum list size should be limited for complexity reason, e.g., no larger than L max .
  • the polar decoder gets the estimated information bits from B using a demapper which corresponds to the mapper at the transmitter. It can be found that the input of polar decoder are the M o LLR values of bits, but the received signals are M o /K modulation symbols and each corresponds to 2 K symbol soft values. How to fully utilize these symbol soft values to decode becomes an important issue.
  • the method in conventional solutions is to convert 2 K symbol soft values of each received modulation symbol to K LLR values by calculating the probability of each bit being a “0” or “1”.
  • the symbol soft value defined in Eq. (1) can be represented by ln?(x /
  • the LLR values can be directly used in a conventional polar decoder.
  • Each information bit can be expressed as a linear combination of coded bits in GF(2): at the polar encoder, the information bits are inserted to a length-M 0 binary vector B (size 1 x M o ) together with frozen bits and parity check bits, if any. Then the coded bits vector C (size 1 x M o ) of the same length-M 0 are obtained by a linear mapping as
  • B is the vector composed by information bits and frozen bits, (size M o x M 0 ) is the log 2 M 0 -th Kronecker power of the matrix
  • each information bit in B can be expressed as a linear combination of coded bits C in GF(2) with coefficients “0” or “1” in a column of G.
  • the LLR of information bit bt can be expressed as
  • a conventional polar decoder decomposes Eq. (7) into an expression consisting of LLR values of each coded bit.
  • the LLR of the sum of two statistically independent random binary variables U 1 and U 2 can be expressed as If we assume are statistically independent from each other, where
  • a 16QAM symbol can be generated by 4 bits. Without loss of generality, we consider a 16QAM symbol generated by four bits [a lt a 2 , a 3 , a 4 ] as
  • the first and second 4 bits in C are modulated into two 16QAM symbols, and according to Eq. (13), respectively.
  • the channel is AWGN channel.
  • Bit-LLR based decoder is adopted at the receiver: when bit-LLR based decoder (i.e. the conventional polar decoder) is adopted, the LLR of each information bit is calculated by Eq. (13). By using the received signal in Eq. (21), the computed by Eq. (11) are as follow 0
  • the symbol soft value is defined in Eq. (1).
  • the symbol soft value of modulation symbol ⁇ forr the t-th received modulation symbol can be written as where is one modulation symbol generated by 4 bits [ ⁇ 1 ⁇ 2 , ⁇ 3 , ⁇ 4 ] as in Eq. (12),
  • the LL(x [ai.a2.a3.a4] , t) in Eq. (22) can be mapped to the probability of the values of the 4 bits [ ⁇ 4 , ⁇ 2 , ⁇ 3 , ⁇ 4 ], which can be used in Eq. (12) to compute LLR(bt).
  • list decoding is not discussed. If list decoding is applied, decoding processes based on each entry in the list are the same as in the examples above. Therefore, the same problem exists for list decoding and the same solution can be applied.
  • Polar codes can achieve channel capacity for binary-input discrete memoryless channels (B- DMCs). However, if high order modulations, e.g., 16QAM, are used, the channels are no longer B-DMCs, and therefore polar codes may not achieve the channel capacity. By using the proposed encoder and decoder scheme herein disclosed, higher throughput can be achieved compared to bit-based decoder because the channel is DMC with symbol-input.
  • B- DMCs binary-input discrete memoryless channels
  • an information bit can be expressed as the sum of at least two correlated bits.
  • LDPC low-density parity-check
  • the two coded bits are correlated to each other due to modulation, e.g., 16QAM in the example in IDF, the same problem can be found.
  • Non-binary decoder is also considered for turbo code when non-binary turbo encoder is used, i.e., duo-binary turbo convolution code.
  • duo-binary turbo convolution code the input of encoder is quaternary or with higher order.
  • a polar encoder Comparing with a duo-binary turbo convolution encoder, a polar encoder is binary encoder and not based on convolution. At the decoder, SC polar decoding can be efficiently performed in a recursive manner by a butterfly-based decoder, which is different from the iteration based duo-binary turbo convolution decoder. Due to the different structures of encoder and decoder, the functions in duo-binary turbo convolution code cannot be used for polar code. Therefore, a symbol soft value based polar decoder and corresponding encoder are desired.
  • first communication device 100 and a second communication device 300 are herein disclosed according to examples of the invention.
  • the first communication device 100 act as a transmitter and the second communication device 300 act as a receiver in the herein given examples but are not limited thereto.
  • Fig. 1 shows a first communication device 100 according to an example of the invention.
  • the first communication device 100 comprises a processor 102, a transceiver 104 and a memory 106.
  • the processor 102 may be coupled to the transceiver 104 and the memory 106 by communication means 108 known in the art.
  • the first communication device 100 may further comprise an antenna or antenna array 110 coupled to the transceiver 104, which means that the first communication device 100 may be configured for wireless communications in a wireless communication system. That the first communication device 100 may be configured to perform certain actions can in this disclosure be understood to mean that the first communication device 100 comprises suitable means, such as e.g. the processor 102 and the transceiver 104, configured to perform said actions.
  • the processor 102 of the first communication device 100 may be referred to as one or more general-purpose central processing units (CPUs), one or more digital signal processors (DSPs), one or more application-specific integrated circuits (ASICs), one or more field programmable gate arrays (FPGAs), one or more programmable logic devices, one or more discrete gates, one or more transistor logic devices, one or more discrete hardware components, and one or more chipsets.
  • CPUs general-purpose central processing units
  • DSPs digital signal processors
  • ASICs application-specific integrated circuits
  • FPGAs field programmable gate arrays
  • programmable logic devices one or more discrete gates, one or more transistor logic devices, one or more discrete hardware components, and one or more chipsets.
  • the memory 106 of the first communication device 100 may be a read-only memory, a random access memory, or a non-volatile random access memory (NVRAM).
  • NVRAM non-volatile random access memory
  • the transceiver 104 of the first communication device 100 may be a transceiver circuit, a power controller, an antenna, or an interface which communicates with other modules or devices.
  • the transceiver 104 of the first communication device 100 may be a separate chipset or being integrated with the processor 102 in one chipset. While in some examples, the processor 102, the transceiver 104, and the memory 106 of the first communication device 100 are integrated in one chipset.
  • the first communication device 100 is configured to obtain a set of uncoded bits comprising M o bits, wherein the set of uncoded bits comprises information bits.
  • the first communication device 100 is further configured to obtain a set of coded bits by a linear transformation of the set of uncoded bits based on a coding matrix G.
  • the coding matrix G is a Kronecker product of two binary matrices G1 and G2, where G1 is a n-th
  • the first communication device 100 is further configured to obtain a set of modulated symbols by modulating the set of coded bits based on the modulation symbol constellation.
  • the first communication device 100 is further configured to transmit the set of modulated symbols to a second communication device 300.
  • a Kronecker product of a first matrix A and a second matrix B of size M x N is to generate a third matrix C, where the element in the (M(d 1 - 1) + d 2 )-th row and (/V(d 3 - 1) + d 4 )-th column of C is equal to the product of the element in the c ⁇ -th row and d 2 -th column of A and the element in the d 3 -th row and d 4 -th column of B.
  • a n-th Kronecker power of matrix is the result of Kronecker producted by itself for n - 1 times.
  • Fig. 2 shows a flow chart of a corresponding method 200 which may be executed in a first communication device 100, such as the one shown in Fig. 1.
  • the method 200 comprises obtaining 202 a set of uncoded bits comprising M o bits, wherein the set of uncoded bits comprises information bits.
  • the method 200 further comprises obtain 204 a set of coded bits by a linear transformation of the set of uncoded bits based on a coding matrix G, wherein the coding matrix G is a Kronecker product of two binary matrices G1 and G2, where G1 is a n-th
  • the method 200 further comprises obtaining 206 a set of modulated symbols by modulating the set of coded bits based on the modulation symbol constellation.
  • the method 200 further comprises transmitting 208 the set of modulated symbols to a second communication device 300.
  • the coding matrix G may equal to a Kronecker product of the two binary matrices G1 and G2.
  • integer n is given by the formula:
  • K is a power of 2 when G2 is a log 2 -th Kronecker power of matrix
  • Fig. 3 shows a second communication device 300 according to an example of the invention.
  • the second communication device 300 comprises a processor 302, a transceiver 304 and a memory 306.
  • the processor 302 is coupled to the transceiver 304 and the memory 306 by communication means 308 known in the art.
  • the second communication device 300 may be configured for both wireless and wired communications in wireless and wired communication systems, respectively.
  • the wireless communication capability is provided with an antenna or antenna array 310 coupled to the transceiver 304, while the wired communication capability is provided with a wired communication interface 312 coupled to the transceiver 304. That the second communication device 300 is configured to perform certain actions can in this disclosure be understood to mean that the second communication device 300 comprises suitable means, such as e.g. the processor 302 and the transceiver 304, configured to perform said actions.
  • the processor 302 of the second communication device 300 may be referred to as one or more general-purpose CPUs, one or more DSPs, one or more ASICs, one or more FPGAs, one or more programmable logic devices, one or more discrete gates, one or more transistor logic devices, one or more discrete hardware components, and one or more chipsets.
  • the memory 306 of the second communication device 300 may be a read-only memory, a random access memory, or a NVRAM.
  • the transceiver 304 of the second communication device 300 may be a transceiver circuit, a power controller, an antenna, or an interface which communicates with other modules or devices.
  • the transceiver 304 of the second communication device 300 may be a separate chipset or being integrated with the processor 302 in one chipset. While in some examples, the processor 302, the transceiver 304, and the memory 306 of the second communication device 300 are integrated in one chipset.
  • the second communication device 300 is configured to receive a set of modulated symbols from a first communication device 100. The set of received modulated symbols are associated with a set of coded bits and a modulation symbol constellation. The second communication device 300 is further configured to obtain a set of symbol soft values based on the set of received modulated symbols and symbols of the modulation symbol constellation. The second communication device 300 is further configured to obtain a set of decoded bits associated with the set of coded bits based on the set of received modulated symbols and the set of symbol soft values.
  • Fig. 4 shows a flow chart of a corresponding method 400 which may be executed in a second communication device 300, such as the one shown in Fig. 3.
  • the method 400 comprises receiving 402 a set of modulated symbols from a first communication device 100.
  • the set of received modulated symbols are associated with a set of coded bits and a modulation symbol constellation.
  • the method 400 further comprises obtaining 404 a set of symbol soft values based on the set of received modulated symbols and symbols of the modulation symbol constellation.
  • the method 400 further comprises obtaining 406 a set of decoded bits associated with the set of coded bits based on the set of received modulated symbols and the set of symbol soft values.
  • the second communication device 300 obtains the set of coded bits from a linear transformation of a set of uncoded bits based on a coding matrix G.
  • the coding matrix G is a Kronecker product of two binary matrices G1 and G2, where G1 is a n-th Kronecker power of matrix and G2 is a K x K full rank binary matrix.
  • K is the modulation order of the modulation symbol constellation and K > 1, and M o is a multiple of K.
  • integer n is given by the formula:
  • Fig. 5 shows a communication system 500 according to an example of the invention.
  • the wireless communication system 500 comprises a first communication device 100 and a second communication device 300 configured to operate in the communication system 500.
  • the communication system 500 shown in Fig. 5 only comprises one first communication device 100 and one second communication device 300.
  • the communication system 500 may comprise any number of first communication devices 100 and any number of second communication devices 300 without deviating from the scope of the invention.
  • the first communication device 100 act as a transmitter and the second communication device 300 act as a receiver. In other examples, the reverse case is possible. It is illustrated in Fig. 5 that the first communication device 100 transmits a set of modulated symbols to the second communication device 300 over a radio channel 510. Upon reception of a set of modulated symbols from the first communication device 100, the second communication device 300 obtains a set of symbol soft values and further obtain a set of decoded bits associated based on the set of received modulated symbols and the set of symbol soft values. It is further noted from Fig. 5 that the first communication device 100 is illustrated as a network access node, such as a base station; and the second communication device 300 is illustrated as a client device, such as a User Equipment. However, examples of the disclosure are not limited thereto.
  • the first objective is to provide for polar code an efficient method to calculate in the decoder of the second communication device 300 correct LLR values for each information bit, using the output signal of the demodulator of the transmitted modulation symbols.
  • the second objective is to guarantee that the proposed decoder can be efficiently performed in a recursive manner by using a data flow graph with butterfly-based decoder structure, and therefore low decoding complexity can be achieved.
  • bit segment used in this disclosure may be defined as a segment of continuous bits in a bit stream, e.g., coded bits.
  • Y) is the probability that a a 0 given that Y was received. If the bit segment is used to generate a modulation symbol X a , we have
  • the following points may be made for the second communication device 300 with general polar decoder based on symbol soft value.
  • the input of the decoder of the second communication device 300 is symbol soft value.
  • the symbol soft value is related to
  • R2 The LLR of an information bit in the decoder of a codeword generated by a polar encoder, is calculated by using a corresponding set of soft values of modulation symbols used to transmit coded bits whose linear combination produces in the first communication device 100 the observed information bit.
  • i the i -th information bit b L is a linear combination of a set of coded bits c z , z e Z L as defined in (6), i can be calculated as where
  • the following novel f function and g function may be applied in a recursive manner at the second communication device 300 which is different from the f and g functions used in conventional decoders as previously described.
  • R3 The LLR of b t in Eq. (25) can be calculated based on the following novel f function and g function: Definition of f function: calculate the soft values of the sum of two independent bit segments in GF(2) by: with
  • the first communication device 100 needs to guarantee the recursive structure of coding matrix for coded bit segments correspond to each transmitted modulation symbol.
  • the following points may be made for the second communication device 300.
  • the number of coded bits and K is the modulation order
  • G 2 is a full rank binary matrix of size K
  • the interleaving should be bit-segment-level instead of bit-level, i.e., only change the order of each entire bit segment (length K). This is also explained more in detail in the following disclosure.
  • interleaving may be considered as part of rate matching.
  • the rate matching includes at least two steps: a first step which is to select or remove or add some bits for repetition; and a second step which is interleaving.
  • point T2 above is designed for the first step, and point T3 is for the second step.
  • Fig. 6 which illustrates further examples of the disclosure will hereby be described and explained.
  • the terminology, expressions, systems design, etc. according to 3GPP NR may be used but is not limited thereto.
  • the second communication device 300 includes a demodulation block 320 coupled to a polar decoder block 322. If there are interleaving and/or rate matching performed at the first communication device 100, conventional de-interleaving and/or inverse operation of rate matching may be applied correspondingly at the second communication device 300 but are not illustrated in Fig. 6.
  • Demodulation block 320 the input of demodulation block 320 is a set of received modulation symbols which has been transmitted by the first communication device 100 over a radio channel 510.
  • the probability of each symbol is calculated, which is equivalent to a symbol soft value of the symbol.
  • the output of the demodulation block 320 that is provided to the polar decoder block 322 are symbol soft values instead of bit LLRs as in conventional solutions.
  • a symbol soft value corresponds to a modulation symbol X in constellation and the received modulation symbol Y. It represents or relates to the probability that modulation symbol X was transmitted from the first communication device 100.
  • the probability may be calculated based on XY H or
  • the reason is that the logarithmic value of probability that X was transmitted given received symbol Y is proportional to
  • lf XY H is used as symbol soft value, the phase information of the channel 510 is also considered.
  • the soft value of the sum of two bit segments (corresponding to two symbols) we assume the phase information of the channel 510 of the two symbols are the same, i.e. , calculated by vector addition.
  • 2 may be used and phase information of the channel 510 is not considered, and therefore there is no restriction on channel phase, i.e., the soft value of the sum is calculated by scalar addition.
  • 2 can be replaced by
  • symbols X and Y are matrixes, which means that there are multiple transmission antennas at the first communication device 100, the
  • each symbol soft value in the set of symbol soft values are obtained based on an inner product between a received modulated symbol in the set of received modulated symbols and a symbol of the modulation symbol constellation when the properties of the channel 510 is unknown to the second communication device 300.
  • the inner product between a received modulated symbol in the set of received modulated symbols and a symbol of the modulation symbol constellation may be obtained according to
  • the symbol soft value can be p
  • p is the SNR of the channel 510.
  • the logarithmic value of probability that X was transmitted given received Y is proportional to p
  • 2 can be replaced by Jp
  • each symbol soft value in the set of symbol soft values is obtained based a difference between a received modulated symbol in the set of received modulated symbols and a symbol of the modulation symbol constellation when the properties of the channel 510 is known to the second communication device 300.
  • the difference between the received modulated symbol in the set of received modulated symbols and the symbol of the modulation symbol constellation may be obtained according to p
  • SNR signal-to-noise ratio
  • the relative value of the symbol soft value can also be used by the second communication device 300.
  • the relative value can be
  • each received modulation symbol will generate 2 K corresponding symbol soft values which are provided to the polar decoder 322.
  • Polar decoder 322 the polar decoder block 322 of the second communication device 300 includes two subblocks, i.e. a decoding block 330 and a de-mapper block 332 which corresponds to two steps, i.e.:
  • the second step which corresponds to the de-mapper 332 of the polar decoder 322 is the same as in a conventional polar decoder. Hence, we only focus on the first step and therefore the decoding block 330.
  • Fig. 7 illustrates an exemplary solution which may be performed in the decoding block 330 and comprises three steps l-lll.
  • step I in Fig. 7 the second communication device 300 obtains symbol soft values of each modulation symbols, which are the soft values of corresponding coded bit segments.
  • step II in Fig. 7 the second communication device 300 calculates the probability of the q-th decoded bit segment according to the formula
  • An idea of the first step is to estimate each bit segment of B in turn based on a bit segment level successive cancellation (SC) polar decoding algorithm: where P
  • the feasible values of bit segment should guarantee that the frozen bit is 0 and the parity check bit is correct.
  • the LLR of the i-th bits b i in B can be calculated by Eq. (25).
  • Eq. (25) it can be expressed as in Eq. (11) as ⁇ ( ⁇ ⁇ ) Similar to Eq.
  • the decoder when making decision of the q-th decoded bit segment by Eq. (26), the decoder should output all feasible estimation of to the list in descending order of P If the list length exceeds the maximum length L max after estimating the q-th bit segment, then keep L max estimations of with the largest probability. Finally, after decoding all the bit segments of B, output the most possible estimation.
  • a f function and a g function may be used in the butterfly-based decoder which is shown Fig. 8.
  • the f function may be formulated as: obtaining the set of decoded bits comprises obtain the set of decoded bits based on soft values of decoded bit segments.
  • the soft values of each decoded bit segment are determined based on soft values of at least one intermediate bit segment (e.g., c in Eq. (29) and (30)), and the soft values of each intermediate bit segment are determined based on soft values of two basic bit segments(e.g., bit segments a and b in Eq. (29) and (30)).
  • the sum of the two basic bit segments in Galois Field (GF) of two elements is equal to the intermediate bit segment, and the soft values of the two bit segments are obtained based on the set of symbol soft values.
  • GF Galois Field
  • the g function may be formulated as: obtaining the set of decoded bits comprises obtain the set of decoded bits based on soft values of decoded bit segments.
  • the soft values of each decoded bit segment are determined based on soft values of at least one intermediate bit segment (e.g., a in Eq. (31) and (32)), and the soft values of each intermediate bit segment on the left side of Eq. (32)) are determined based on initial soft values of the intermediate bit segment (e.g., soft value on the right side of Eq. (32)), soft values of one basic bit segment (e.g., basic bit segment is b in Eq. (31) and (32)), and at least one decoded bit (e.g., decoded bits in c 0 in Eq. (31) and (32)).
  • the initial soft values of the intermediate bit segment are obtained based on the set of symbol soft values.
  • the first communication device 100 comprises a polar encoder block 120 coupled to a bit segmentation block 122 which in turn is coupled to a modulation block 124.
  • Polar encoder block 120 the polar encoder block 120 includes two subblocks, i.e., a mapper block 130 and a linear transformation block 132.
  • the mapper block 130 obtains N bits and outputs a bit vector B with M o uncoded bits which are provided to the linear transformation block 132.
  • a conventional polar coding matrix G can be used here, where M o is the number of coded bits.
  • the bit vector C is provided to the bit segmentation block 122.
  • a set of coding matrices can also be used here as extension of the coding matrix used in linear transformation block 132.
  • K is the modulation order.
  • the coding matrix to generate C from B can be expressed as which is a block coding matrix.
  • the decoding is based on the structure of G b(ocfe and rl oi® independent from transformation matrix j log2 between
  • G 2 any full rank binary transformation matrix of size K x K.
  • the coded bits are generated based on a block coding matrix G b(ocfe in Eq. (33) with recursive structure, and G 2 is a linear operation from bit segment
  • G b(ocfe in Eq. (33) with recursive structure
  • G 2 is a linear operation from bit segment
  • Bit segmentation block 122 the soft values of each coded bit segment are needed at the polar decoder. In order to obtain the soft value for the bit segment at the second communication device 300, the same bit segmentation will be used at the first communication device 100, and each bit segment will be used to generate one modulation symbol. Therefore, the bit segmentation is in the bit segmentation block 122: the q-th coded bit segment includes the [K(q - 1) + l]-th to [Kq]-th bits in the vector C obtain from the linear transformation block 132.
  • the output of the bit segmentation block 122 is parallel bits segments with K number of bits each which are provided to the modulation block 124.
  • Modulation block 124 modulation is a mapping from the bit segments provided by the bit segmentation block 122 to modulation symbols in the modulation block 124.
  • a difference from conventional modulation is that the modulation order K herein is power of 2 if * . This is because that the transformation matrix between and needs log 2 K to be an integer, i.e., K is power of 2.
  • Interleaving is generally to change order of coded bits in order to make the transmission more robust.
  • the second communication device 300 needs to get the soft values of each entire original (before interleaving) coded bit segment.
  • the interleaving should be bit-segment-level instead of bit-level, i.e., interleaving is to change order of entire bit segments.
  • the first communication device 100 obtains the set of modulated symbols based on interleave the set of coded bits by interleaving entire segments of the set of coded bits; and obtain the set of modulated symbols by modulating the interleaved set of coded bits.
  • Rate matching is to change the length of coded bits to satisfy the scheduled resources. Assume the number of needed coded bits is M according to the scheduled resources and modulation order, it may not equal to M o . In particular, if M ⁇ M o , M bits can be selected from M o coded bits at the transmitter. If M > M o , repetition of coded bits can be used to generate M bits at the first communication device 100. The requirement of rate matching is that entire coded bit segment should be kept, removed or repeated in the rate matched bits. The reason is that selecting, removing or repeating half bit segment will make it impossible for the second communication device 300 to obtain the soft value of the whole bit segment.
  • the first communication device 100 obtains the set of modulated symbols based on obtain a subset of the set of coded bits.
  • the subset of the set of coded bits consists of entire segments of the set of coded bits.
  • the first communication device 100 further obtains the set of modulated symbols by modulating the subset of the set of coded bits.
  • the first communication device 100 obtains the set of modulated symbols based on obtain an extended set of coded bits.
  • the extended set of coded bits comprises the set of coded bits and one or more segments of the set of coded bits.
  • the first communication device 100 further obtains the set of modulated symbols by modulating the extended set of coded bits.
  • the second communication device 300 there are two main cases at the second communication device 300 which have implications for the decoding procedure, i.e. the case when the second communication device 300 knows the properties of the channel 510 and the case when the second communication device 300 does not know the properties of the channel 510 which has previously been discussed.
  • Knowledge of the channel 510 may e.g. relate to knowledge of the SNR, SNIR, phase rotation, or other relevant channel properties. These channel properties may be estimated based on reception of reference or pilot signals. However, information about the channel properties may also be received from other communication devices, e.g. in control signaling. Firstly, the case when the second communication device 300 do not know the properties of the channel 510 will be described further and thereafter the case when the second communication device 300 knows the properties of the channel 510.
  • the following aspects are when the properties of the channel 510 are unknown to the second communication device 300.
  • multi-dimensional modulation in this case, multi-dimensional modulation can be used due to unknown channel at the second communication device 300.
  • Each multi-dimensional modulation symbol contains multiple elements, i.e., as a vector x.
  • Demodulation the received symbol vector on the time-frequency (T-F) resources for mapping the t-th modulation symbol is y t .
  • T-F time-frequency
  • the output of demodulation is
  • the demodulator can output
  • the output can be a value computed based on
  • Option 2 the output of demodulation where x ⁇ is the f-th symbol vector in the constellation.
  • the demodulator can output some y t x * for some x f with large value.
  • the second option can be applied only when the channel of some modulation symbols can be considered to be the same or similar to each other.
  • a base station/network access node may need to send control signal to a UE to indicate the time and/or frequency resource size(s) that can be considered as using the same beam/precoder or considered as the same channel. Otherwise, the resource size can be preconfigured or decided by receiver.
  • Polar decoder symbol soft value based list polar decode to estimate B: the LLR of each bit in B can be estimated by Eq. (25) or by a recursive polar decoder.
  • a butterfly-based decoder can be used as shown in Fig. 8 to estimate B .
  • the butterfly-based decoder may be part of the decoder block 330 of the second communication device 300 in examples of the invention.
  • the butterfly-based decoder obtains 2 K symbol soft values of each received modulation symbol from the demodulation block 320.
  • the estimation of B in the butterfly-based decoder includes stages as shown in Fig. 8, and each stage includes operations. Denote the u-th operation of the v-th stage as The input of operation ' s the output of operation O ⁇ . There is no operation at stage 0. For other stages:
  • the decision blocks in Fig. 8 need to output probabilities of all feasible decoded bit segments, which are represented by path metric (PM) values.
  • output B whose bit segments are generated by multiplying by bit segments with the largest PM values from the decision operations.
  • G-L can be multiplied by the binary indices of the input soft values, and therefore the indices of the input soft values are changed.
  • Appendix 3 the butterfly-based structure of proposed recursive decoder in Fig. 8 with symbol soft value input is the same as conventional SC polar decoder. Since the complexity of conventional SC polar decoder is 0(M 0 logM 0 ), the propose recursive decoder is also with the complexity of order of O(M 0 logM 0 ).
  • the channel 510 is known at the second communication device 300.
  • the channel 510 may e.g. be estimated based on detection of pilot symbols or reference symbols transmitted together with data symbols from the first communication device 100 to the second communication device 300 which is illustrated in Fig. 5.
  • equalization is necessary before demodulation. Therefore, the set of received modulation symbol used in the demodulation block is a set of modulation symbols after equalization. The following aspects are special for this case.
  • the only difference compared to the embodiment when the channel is unknown is that one modulation symbol may be one complex value or a vector of complex values.
  • the demodulation block is different from the example when the channel is unknown.
  • the symbol on the T-F resources for mapping the t-th modulation symbol is y t .
  • the output of demodulation are is the /-th symbol in the constellation, p is the SNR at the receiver.
  • the demodulation may output p ⁇ y t - Xy
  • the output can be a value computed based on pIy t - x f I 2 , for example, exp (p ⁇ y t - Xy
  • Polar Decoder at the second communication device 300, the f function in polar decoder is different from the example when the channel is unknown since the output of demodulation is different.
  • the f function is as follow:
  • Fig. 9 The evaluation results are shown in Fig. 9 in which the x-axis shows the SNR in dB and the y- axis error rate in BLER. It can be found from Fig. 9 that a 2.3dB SNR gain can be achieved by the proposed polar decoder (solid line in Fig. 9) compared to the conventional decoder (dashed line in Fig. 9).
  • a client device in this disclosure includes but is not limited to: a UE such as a smart phone, a cellular phone, a cordless phone, a session initiation protocol (SIP) phone, a wireless local loop (WLL) station, a personal digital assistant (PDA), a handheld device having a wireless communication function, a computing device or another processing device connected to a wireless modem, an in-vehicle device, a wearable device, an integrated access and backhaul node (IAB) such as mobile car or equipment installed in a car, a drone, a device-to-device (D2D) device, a wireless camera, a mobile station, an access terminal, an user unit, a wireless communication device, a station of wireless local access network (WLAN), a wireless enabled tablet computer, a laptop-embedded equipment, an universal serial bus (USB) dongle, a wireless customer-premises equipment (CPE), and/or a chipset.
  • IOT Internet of things
  • the client device may represent
  • the UE may further be referred to as a mobile telephone, a cellular telephone, a computer tablet or laptop with wireless capability.
  • the UE in this context may e.g. be portable, pocket- storable, hand-held, computer-comprised, or vehicle-mounted mobile device, enabled to communicate voice and/or data, via the radio access network, with another entity, such as another receiver or a server.
  • the UE can be a station (STA), which is any device that contains an IEEE 802.11 -conformant media access control (MAC) and physical layer (PHY) interface to the wireless medium (WM).
  • STA station
  • the UE may also be configured for communication in 3GPP related LTE and LTE-Advanced, in WiMAX and its evolution, and in fifth generation wireless technologies, such as NR.
  • a network access node in this disclosure includes but is not limited to: a NodeB in wideband code division multiple access (WCDMA) system, an evolutional Node B (eNB) or an evolved NodeB (eNodeB) in LTE systems, or a relay node or an access point, or an in-vehicle device, a wearable device, or a gNB in the fifth generation (5G) networks.
  • the network access node herein may be denoted as a radio network access node, an access network access node, an access point, or a base station, e.g.
  • radio base station which in some networks may be referred to as transmitter, “gNB”, “gNodeB”, “eNB”, “eNodeB”, “NodeB” or “B node”, depending on the technology and terminology used.
  • the radio network access nodes may be of different classes such as e.g. macro eNodeB, home eNodeB or pico base station, based on transmission power and thereby also cell size.
  • the radio network access node can be a station (STA), which is any device that contains an IEEE 802.11 -conformant MAC and PHY interface to the wireless medium.
  • the radio network access node may also be a base station corresponding to the 5G wireless systems.
  • any method according to examples of the disclosure may be implemented in a computer program, having code means, which when run by processing means causes the processing means to execute the steps of the method.
  • the computer program is included in a computer readable medium of a computer program product.
  • the computer readable medium may comprise essentially any memory, such as a ROM (Read-Only Memory), a PROM (Programmable Read-Only Memory), an EPROM (Erasable PROM), a Flash memory, an EEPROM (Electrically Erasable PROM), or a hard disk drive.
  • examples of the first communication device 100 and the second communication device 300 comprises the necessary communication capabilities in the form of e.g., functions, means, units, elements, etc., for performing the solution.
  • Examples of other such means, units, elements and functions are: processors, memory, buffers, control logic, encoders, decoders, rate matchers, de-rate matchers, mapping units, multipliers, decision units, selecting units, switches, interleavers, de-interleavers, modulators, demodulators, inputs, outputs, antennas, amplifiers, receiver units, transmitter units, DSPs, MSDs, TCM encoder, TCM decoder, power supply units, power feeders, communication interfaces, communication protocols, etc. which are suitably arranged together for performing the solution.
  • the processor(s) of the first communication device 100 and the second communication device 300 may comprise, e.g., one or more instances of a Central Processing Unit (CPU), a processing unit, a processing circuit, a processor, an Application Specific Integrated Circuit (ASIC), a microprocessor, or other processing logic that may interpret and execute instructions.
  • CPU Central Processing Unit
  • ASIC Application Specific Integrated Circuit
  • microprocessor may thus represent a processing circuitry comprising a plurality of processing circuits, such as, e.g., any, some or all of the ones mentioned above.
  • the processing circuitry may further perform data processing functions for inputting, outputting, and processing of data comprising data buffering and device control functions, such as call processing control, user interface control, or the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Probability & Statistics with Applications (AREA)
  • Theoretical Computer Science (AREA)
  • Digital Transmission Methods That Use Modulated Carrier Waves (AREA)
  • Compression, Expansion, Code Conversion, And Decoders (AREA)

Abstract

The disclosure relates to an encoding and decoding scheme using symbol soft values. A first communication device (100) transmits a set of modulated symbols. The set of modulated symbols have been obtained based on set of coded bits by a linear transformation of a set of uncoded bits based on a coding matrix G which is a Kronecker product of two binary matrices G1 and G2. G1 is a n-th Kronecker power of matrix (I) and G2 is a K x K full rank binary matrix, where K is the modulation order of a modulation symbol constellation and K > 1, and where M 0 is a multiple of K. A second communication device (300) receives the set of modulated symbols and obtains a set of decoded bits based on the set of received modulated symbols and a set of symbol soft values.

Description

ENCODING AND DECODING SCHEME USING SYMBOL SOFT VALUES
Technical Field
The disclosure relates to polar an encoding and decoding scheme using symbol soft values for improved coding performance.
Background
Polar code is a linear block error correcting code that is proven to achieve channel capacity for binary-input discrete memoryless channels (B-DMCs) with low encoding and decoding complexity. Due to these advantages, polar codes are utilized for transmission of uplink and downlink control signals for enhanced mobile broadband (eMBB) control channels in 3GPP New Radio (NR) system. However, if high order modulations, e.g., 16QAM, are used, the channels are no longer B-DMCs, and therefore polar code may not achieve the channel capacity.
Summary
An objective of examples of the disclosure is to provide a solution which mitigates or solves the drawbacks and problems of conventional solutions.
The above and further objectives are solved by the subject matter of the independent claims. Further advantageous examples of the disclosure can be found in the dependent claims.
According to a first aspect of the invention, the above mentioned and other objectives are achieved with a first communication device for a wireless communication system, the first communication device being configured to obtain a set of uncoded bits comprising Mo bits, wherein the set of uncoded bits comprises information bits; obtain a set of coded bits by a linear transformation of the set of uncoded bits based on a coding matrix G, wherein the coding matrix G is a Kronecker product of two binary matrices
G1 and G2, where G1 is a n-th Kronecker power of matrix and G2 is a K x K full rank
Figure imgf000003_0001
binary matrix, where K is the modulation order of a modulation symbol constellation and K > 1, and where Mo is a multiple of K obtain a set of modulated symbols by modulating the set of coded bits based on the modulation symbol constellation; and transmit the set of modulated symbols to a second communication device. A modulation order of a modulation symbol constellation can be understood as the number of bits carried in one modulation symbol. For example, if there are 2K modulation symbols in the modulation symbol constellation, the modulation order is K.
To obtain a set of coded bits may be understood as to employ a polar code on a set of uncoded bits. Hence, polar codes are used for encoding.
An advantage of the first communication device according to the first aspect is that a polar-like code among every length-Zf bit segments is guaranteed. Thereby, the symbol soft values of every length-^ bit segments can be used for decoding at the receiver.
In an implementation form of a first communication device according to the first aspect,
Figure imgf000004_0004
An advantage of this implementation form is that it supports length Mo uncoded bits and guarantees that the number of coded bits is Mo.
In an implementation form of a first communication device according to the first aspect, K is a power of 2 when G2 is a log2 K-th Kronecker power of matrix
Figure imgf000004_0001
In this case, G is a log2 M0 -th Kronecker power of matrix An advantage of this
Figure imgf000004_0002
implementation form is therefore that it guarantees a polar-like code among every length-^ bit segments for the special case that G is a log2 M0-th Kronecker power of matrix
Figure imgf000004_0003
In an implementation form of a first communication device according to the first aspect, obtaining the set of modulated symbols comprises obtain a subset of the set of coded bits, wherein the subset of the set of coded bits consists of entire segments of the set of coded bits; and obtain the set of modulated symbols by modulating the subset of the set of coded bits.
An advantage of this implementation form is that it guarantees that each entire bit segment is modulated or not, and therefore avoids modulate only a part of a bit segment.
In an implementation form of a first communication device according to the first aspect, obtaining the set of modulated symbols comprises obtain an extended set of coded bits, wherein the extended set of coded bits comprises the set of coded bits and one or more segments of the set of coded bits; and obtain the set of modulated symbols by modulating the extended set of coded bits.
An advantage of this implementation form is that it guarantees that each entire bit segment is modulated or not, and therefore avoids only modulate a part of a bit segment.
In an implementation form of a first communication device according to the first aspect, obtaining the set of modulated symbols comprises interleave the set of coded bits by interleaving entire segments of the set of coded bits; and obtain the set of modulated symbols by modulating the interleaved set of coded bits.
An advantage of this implementation form is that it guarantees that each entire bit segment is modulated to one modulation symbol, and therefore avoids modulate only a part of a bit segment.
In an implementation form of a first communication device according to the first aspect, a segment of coded bits is obtained according to
Figure imgf000005_0001
where k = 1, 2, 3 ... is an index of a bit in the set of coded bits and ib = 1, 2, ... K.
An advantage of this implementation form is that a feasible bit segmentation solution is provided.
According to a second aspect of the invention, the above mentioned and other objectives are achieved with a second communication device for a wireless communication system, the second communication device being configured to receive a set of modulated symbols from a first communication device, wherein the set of received modulated symbols are associated with a set of coded bits and a modulation symbol constellation; obtain a set of symbol soft values based on the set of received modulated symbols and symbols of the modulation symbol constellation; and obtain a set of decoded bits associated with the set of coded bits based on the set of received modulated symbols and the set of symbol soft values. An advantage of the second communication device according to the second aspect is that the decoding is based on symbol soft values instead of bit LLRs. Thereby, improved performance is provided, e.g. in terms of lower error rate such as BLER.
In an implementation form of a second communication device according to the second aspect, the set of coded bits are obtained from a linear transformation of a set of uncoded bits based on a coding matrix G, wherein the coding matrix G is a Kronecker product of two binary matrices G1 and G2, where G1 is a n-th Kronecker power of matrix and G2 is a K x K
Figure imgf000006_0001
full rank binary matrix, where K is the modulation order of the modulation symbol constellation and K > 1, and where Mo is a multiple of K.
An advantage with this implementation form is that it guarantees a polar-like code among every length-^ bit segments. Thereby, the symbol soft values of every length-^ bit segments can be used for decoding at the receiver.
In an implementation form of a seco
Figure imgf000006_0002
nd communication device according to the second aspect,
Figure imgf000006_0003
An advantage with this implementation form is that it supports length-M0 uncoded bit and guarantees that the number of coded bits is Mo.
In an implementation form of a second communication device according to the second aspect, each symbol soft value in the set of symbol soft values are obtained based on an inner product between a received modulated symbol in the set of received modulated symbols and a symbol of the modulation symbol constellation when the properties of channel is unknown to the second communication device.
The channel here denotes the channel in which the set of modulated symbols are received. Hence, this is the case when the second communication device don't know the properties of the channel. For example, there is no reference or pilot signals for channel estimation or demodulation.
An advantage with this implementation form is to define the symbol soft value for the case channel is unknown, which is related to the correlation between received symbol and modulation symbols in the constellation. In an implementation form of a second communication device according to the second aspect, the inner product between a received modulated symbol in the set of received modulated symbols and a symbol of the modulation symbol constellation is obtained according to
|YXH | 2 or YXH where Y is the received modulated symbol in the set of received modulated symbols, X is the symbol of the modulation symbol constellation, and H is the conjugate transpose operator.
An advantage with this implementation form is that |YXH |2 is related to the probability that the transmitted signal is X if the received signal is Y, and YXH is related to the probability that the transmitted signal is X if the received signal is Y and the angle between X and Y. YXH can be used for the case that channels of different transmitted modulation symbols are similar. |YXH |2 can be used for all cases.
In an implementation form of a second communication device according to the second aspect, each symbol soft value in the set of symbol soft values is obtained based a difference between a received modulated symbol in the set of received modulated symbols and a symbol of the modulation symbol constellation when the properties of a channel is known to the second communication device.
The channel here denotes the channel in which the set of modulated symbols are received. Hence, this is the case when the second communication device knows the properties of the channel.
An advantage with this implementation form is to define the symbol soft value for the case channel is known, which is related to the difference between received symbol and modulation symbols in the constellation.
In an implementation form of a second communication device according to the second aspect, the difference between the received modulated symbol in the set of received modulated symbols and the symbol of the modulation symbol constellation is obtained according to
Figure imgf000007_0001
where Y is the received modulated symbol in the set of received modulated symbols, X is the symbol of the modulation symbol constellation, and p is the signal-to-noise ratio of the received modulated symbol in the set of received modulated symbols. An advantage with this implementation form is to provide a symbol soft value for the case when the channel is known. p|Y - X|2 is related to the difference between X and Y, where |Y — X|2 is also called Euclidean distance between X and Y or Frobenius norm of the difference between X and Y.
In an implementation form of a second communication device according to the second aspect, obtaining the set of decoded bits comprises obtain the set of decoded bits based on soft values of decoded bit segments, wherein soft values of each decoded bit segment are determined based on soft values of at least one intermediate bit segment, and wherein soft values of each intermediate bit segment are determined based on soft values of two basic bit segments, wherein the sum of the two basic bit segments in Galois Field of two elements is equal to the intermediate bit segment, and wherein the soft values of the two bit segments are obtained based on the set of symbol soft values.
An advantage with this implementation form is that the decoder can calculate the soft values of decoded bit segments with low complexity.
In an implementation form of a second communication device according to the second aspect, obtaining the set of decoded bits comprises obtain the set of decoded bits based on soft values of decoded bit segments, wherein soft values of each decoded bit segment are determined based on soft values of at least one intermediate bit segment, and wherein soft values of each intermediate bit segment are determined based on initial soft values of the intermediate bit segment, soft values of one basic bit segment, and at least one decoded bit, and wherein the initial soft values of the intermediate bit segment are obtained based on the set of symbol soft values.
An advantage with this implementation form is that the decoder can calculate the soft values of decoded bit segments with low complexity by using this implementation.
According to a third aspect of the invention, the above mentioned and other objectives are achieved with a method for a first communication device, the method comprises obtaining a set of uncoded bits comprising Mo bits, wherein the set of uncoded bits comprises information bits; obtaining a set of coded bits by a linear transformation of the set of uncoded bits based on a coding matrix G, wherein the coding matrix G is a Kronecker product of two binary matrices G1 and G2, where G1 is a n-th Kronecker power of matrix and G2 is a K x K
Figure imgf000008_0001
full rank binary matrix, where K is the modulation order of a modulation symbol constellation and K > 1, and where Mo is a multiple of K\ obtaining a set of modulated symbols by modulating the set of coded bits based on the modulation symbol constellation; and transmitting the set of modulated symbols to a second communication device.
The method according to the third aspect can be extended into implementation forms corresponding to the implementation forms of the first communication device according to the first aspect. Hence, an implementation form of the method comprises the feature(s) of the corresponding implementation form of the first communication device.
The advantages of the methods according to the third aspect are the same as those for the corresponding implementation forms of the first communication device according to the first aspect.
According to a fourth aspect of the invention, the above mentioned and other objectives are achieved with a method for a second communication device, the method comprises receiving a set of modulated symbols from a first communication device, wherein the set of received modulated symbols are associated with a set of coded bits and a modulation symbol constellation; obtaining a set of symbol soft values based on the set of received modulated symbols and symbols of the modulation symbol constellation; and obtaining a set of decoded bits associated with the set of coded bits based on the set of received modulated symbols and the set of symbol soft values.
The method according to the fourth aspect can be extended into implementation forms corresponding to the implementation forms of the second communication device according to the second aspect. Hence, an implementation form of the method comprises the feature(s) of the corresponding implementation form of the second communication device.
The advantages of the methods according to the fourth aspect are the same as those for the corresponding implementation forms of the second communication device according to the second aspect.
The disclosure also relates to a computer program, characterized in program code, which when run by at least one processor causes said at least one processor to execute any method according to examples of the invention. Further, the disclosure also relates to a computer program product comprising a computer readable medium and said mentioned computer program, wherein said computer program is included in the computer readable medium, and comprises of one or more from the group: ROM (Read-Only Memory), PROM (Programmable ROM), EPROM (Erasable PROM), Flash memory, EEPROM (Electrically EPROM) and hard disk drive.
Further applications and advantages of the examples of the disclosure will be apparent from the following detailed description.
Brief Description of the Drawings
The appended drawings are intended to clarify and explain different examples of the invention, in which:
- Fig. 1 shows a first communication device according to an example of the disclosure;
- Fig. 2 shows a method for a first communication device according to an example of the disclosure;
- Fig. 3 shows a second communication device according to an example of the disclosure;
- Fig. 4 shows a method for a second communication device according to an example of the disclosure;
- Fig. 5 shows a wireless communication system according to an example of the disclosure;
- Fig. 6 shows more in detail the encoding and decoding schemes according to examples of the disclosure;
- Fig. 7 shows details of a polar decoder of a second communication device according to an example of the disclosure;
- Fig. 8 shows a butterfly-based decoder according to an example of the disclosure; and
- Fig. 9 shows performance results for an example of the disclosure.
Detailed Description
A transmitter employing polar code generally comprises at least three blocks: a polar encoder block, a bit segmentation block and a modulation block.
The polar encoder block includes a mapper which is used to map N information bits and Mo - N frozen bits and parity check bits (if any, generated based on information bits and predefined parity check functions) to a bit vector B of size 1 x M0, where the vector length is Mo. After that, a polar code is applied as linear mapping from B to vector of coded bits C of size 1 x M0, i.e. , C = BG in GF (2). G is a matrix with size Mo x Mo obtained by G = (G0log2 M° as the m0-th Kronecker power of matrix
Figure imgf000011_0001
The bit segmentation block separates the coded bits into M/K bit segments and there are K bits in each bit segment. K is the number of bits conveyed by one modulation symbol.
The modulation block maps every K bits to a modulation symbol. If the modulation symbol contains more than one complex number, the modulation is called multi-dimensional modulation. Otherwise, the modulation is called single-dimensional modulation. The bit segmentation block and modulation block can also be considered as one combined block to generate modulation symbols based on coded bits.
A polar code receiver generally comprises two blocks: a demodulation block and a polar decoder block.
The demodulation block demodulates each received modulation symbol to estimate the Log- Likelihood Ratio (LLR) of each bit of the K modulated bits based on the received modulation symbol. If the channel is known at the receiver, the received modulation symbol is the symbol after equalization of the received signal. Otherwise, the received modulation symbol is the received signal. The first step of demodulation is to calculate the symbol soft-value of the demodulated symbol, which is defined as log probability of each constellation point, 2K constellation points in total, being transmitted based on the received modulation symbol, i.e., as given in Eq. (1)
Figure imgf000011_0002
where X is a modulation symbol in the constellation, and Y is the received modulation symbol.
In the second step, the 2K symbol soft values of each received modulation symbol are converted to bit soft value of each modulation bit, i.e., LLR value defined as in Eq. (2)
Figure imgf000011_0003
where b is a modulation bit. The method to obtain LLR(b) by LL(X) is introduced in Eq. (4). Alternatively, equivalent methods can be used to obtain LLR(b) based on X and Y.
The first step of the polar decoder is to estimate B, bit by bit, based on the Mo LLR values from demodulation block by using the successive cancellation (SC) polar decoding. The estimated bits of B are called decoded bits B. The principle of SC polar decoding to estimate the j-th bit
Figure imgf000011_0004
If is a frozen bit, = 0; If is a parity check bit, its value is obtained according to the previously decoded bits and parity check function;
Figure imgf000012_0001
11, otherwise where
Figure imgf000012_0002
= ) is the probability that Y was received and the previously decoded bits are [S(1),S(2),
Figure imgf000012_0003
given the currently decoded bit is b.
Due to the recursive structure of the coding matrix, the SC polar decoding can be efficiently performed in a recursive manner by using a data flow graph with structure named a butterflybased decoder. In the recursive manner, the following f function and g function are used: f function: calculate the LLR of the sum of two bits by: with
Figure imgf000012_0004
• Input: LLR of bit a and b,
• Output: LLR of bit c = a ® b. g function: update the LLR of a bit based on its LLR and the LLR of another bit, and the sum of them is known:
Figure imgf000012_0005
with
• Input: estimated bit
Figure imgf000012_0006
• Output: updated LLR of bit α.
List decoding can be applied in this step to improve the decoding performance. By list decoding, the vector B is estimated bit by bit to obtain B. In particular, when the j-th bit (1 < i ≤ Mo) is estimated, the decoding algorithm determines a list of estimation of the first i bits. Each entry in the list contains a feasible estimate of the first i bits and the corresponding probability of this estimate. Comparing with unique decoding, which only outputs the most possible value of each bits, list decoding has a higher chance to achieve global optimal estimation. In addition, the maximum list size should be limited for complexity reason, e.g., no larger than Lmax. The value of Lmax is pre-defined, e.g., Lmax = 8.
In the second step, the polar decoder gets the estimated information bits from B using a demapper which corresponds to the mapper at the transmitter. It can be found that the input of polar decoder are the Mo LLR values of bits, but the received signals are Mo/K modulation symbols and each corresponds to 2K symbol soft values. How to fully utilize these symbol soft values to decode becomes an important issue.
Figure imgf000013_0001
The method in conventional solutions is to convert 2K symbol soft values of each received modulation symbol to K LLR values by calculating the probability of each bit being a “0” or “1”.
The symbol soft value defined in Eq. (1) can be represented by ln?(x/|Y), where Y is the received modulation, Xf is the f -th modulation symbol in the constellation and f e
Figure imgf000013_0002
where
• is the binary form of f, b^C^) is the jb-th bit in bf ,
• the numerator and denominator of Eq. (4) are probabilities that currently decoded bit is 1 and 0 given Y was received, respectively.
After this conversion, the LLR values can be directly used in a conventional polar decoder.
In the following disclosure it will however be demonstrated that the conventional calculation of LLR of each information bit, based on usage of coded-bits soft information under assumption of independent coded bits after demodulation, leads to erroneous LLR values of decoded bits if the codeword is generated by polar encoder for some modulation methods. It is also demonstrated that the same problem remains if the list decoding of a polar code is applied.
Each information bit can be expressed as a linear combination of coded bits in GF(2): at the polar encoder, the information bits are inserted to a length-M0 binary vector B (size 1 x Mo) together with frozen bits and parity check bits, if any. Then the coded bits vector C (size 1 x Mo) of the same length-M0 are obtained by a linear mapping as
C = BG (mod2) (5) where
C is the vector of coded bits,
B is the vector composed by information bits and frozen bits, (size Mo x M0) is the log2 M0-th Kronecker power of the matrix
Figure imgf000014_0001
Due to the fact tha for any full rank
Figure imgf000014_0002
square matrices E and D, we have in GF(2). Hence, B = CG(mod2). So,
Figure imgf000014_0003
each information bit in B can be expressed as a linear combination of coded bits C in GF(2) with coefficients “0” or “1” in a column of G.
The problem of computing LLR of information bits in conventional polar decoder: in Eq. (5) we assume there are N information bits and Mf frozen bits in B, the length of B is Mo = N + Mf and also equals to the length of coded bit vector C. Consider an information bit bL as the j-th bit in B, it is a linear combination of Mo coded bits in C with coefficients as the j-th column of G, which can be expressed as
Figure imgf000014_0004
in GF(2) where
Figure imgf000014_0007
We will compute the LLR of bt in Eq. (6), where the LLR is defined in Eq. (2). According to Eq.
(2) and (6), the LLR of information bit bt can be expressed as
(7)
Figure imgf000014_0005
In order to compute Eq. (7), a conventional polar decoder decomposes Eq. (7) into an expression consisting of LLR values of each coded bit. In particular, it is shown that the LLR of the sum of two statistically independent random binary variables U1 and U2 can be expressed as
Figure imgf000014_0006
If we assume
Figure imgf000015_0001
are statistically independent from each other, where
• zu is an arbitrary index in Zt,
• Zi\{zu] is the set of all indexes in Zj except for
Figure imgf000015_0007
u, t\( u} { i \ u) then LLR of bL can be expressed as (for brevity, we use U2 to represent cz as given
Figure imgf000015_0008
in Eq. (9))
Figure imgf000015_0002
In Eq. (10), we use
Figure imgf000015_0003
to represent the LLR of bt under the assumption:
Assumption 1 are statistically independent.
Figure imgf000015_0004
The problem of using Eq. (10) in a conventional polar decoder is that Assumption 1 may not always hold In order to show what will happen if Assumption 1 does not hold, we will compare the
Figure imgf000015_0005
By inserting Eq. (2) into (10), we obtain
Figure imgf000015_0006
not statistically independent.
To demonstrate that Ur and U2 might not be statistically independent, in the next section, we prove that it is the case for the 16QAM modulation. are not statistically independent at the receiver for 16QAM: in
Figure imgf000016_0005
this section, we first prove a general conclusion for 16QAM that two coded bits demodulated from the same 16QAM symbol are not statistically independent at the receiver Then based on this conclusion, we will give a corollary for 16QAM that are
Figure imgf000016_0009
not statistically independent at the receiver.
In 3GPP TS38.211, a 16QAM symbol can be generated by 4 bits. Without loss of generality, we consider a 16QAM symbol generated by four bits [alt a2, a3, a4] as
Figure imgf000016_0001
Without loss of generality, we will prove that the demodulated a4 and a2 are not statistically independent by computing the conditional probability Pr(a1 = a7|a2 = a^, Y).
Assuming that the received symbol is Y, the probability that a4 =
Figure imgf000016_0002
and a2 = cT2 can be expressed as
Figure imgf000016_0006
where
Figure imgf000016_0007
Substituting Eq. (15) and (16) into (14), we can obtain
Figure imgf000016_0008
For any 4 bits [a^, a^, a^, a^], Pr(X[aj,aj,aj,aj]|T) in Eq. (15) can be further expressed as
Figure imgf000016_0003
where σ2 is the power of the noise of the channel. Substituting Eq. (13) and (18) into (17), after some mathematical derivations (see the Appendix 1), we arrive at
Figure imgf000016_0004
where Re{/} is the real part of Y. It is obvious from (19) that depends on a2, implying the conclusion:
Figure imgf000017_0002
Conclusion 1: For 16QAM symbol generated by Eq. (13), <¾ is not independent from a2. In Eq. (19), if <¾ is demodulated to be <¾, it means that
Figure imgf000017_0006
> 0.5, which is equivalent to exp and further equivalent to
Figure imgf000017_0007
Figure imgf000017_0001
Moreover, for the case (1 - 2%)Re{T) > 0, it can be observed from (19) that
Figure imgf000017_0004
. Therefore, we have the following conclusion:
Figure imgf000017_0003
Conclusion 2: for 16QAM, if <¾ is demodulated to be ¾, there must be
Figure imgf000017_0008
Figure imgf000017_0005
These conclusions can also be observed from the following numerical evaluation, in which we let the 16QAM symbol generated by Eq. (13) transmit through AWGN channel and compare the following bit error rates (BER):
• BER of a 1.
• BER of <¾ under condition: demodulated α2 = 1,
• BER of <¾ under condition: demodulated α2 = 0.
It can be found that the BER of α1 is significantly related to whether a2 is demodulated as “1” or “0” at the receiver. Thus, α1 and a2 are statistically dependent, i.e. , conclusion 1 is verified. We can find that BER curve of α1 is lower and steeper on condition demodulated a2 = 1 than on condition demodulated a2 = 0, which implies that
Figure imgf000017_0012
0, Y) when <¾ is demodulated to be Therefore, conclusion 2 is verified.
Figure imgf000017_0013
We have proved for 16QAM that two bits, α1 and a2, demodulated from the same 16QAM symbol are not statistically independent. In order to prove that
Figure imgf000017_0009
are not statistically independent, we let α1 = U1 and a2 be one bit in the summation the feasibility is proved in Appendix 2.
Figure imgf000017_0010
Considering the following two facts:
1) α1 and a2 are not statistically independent as proved above,
2) and α2 are not statistically independent since α2 is summed in U2,
Figure imgf000017_0011
we can conclude that α1 and U2 are not statistically independent. Due to α1 = U1, we have the following corollary:
Corollary: are not statistically independent.
Figure imgf000017_0014
Evaluation for 16QAM using Eq. (12) to compute LLR results in decoding error: we have proved in section 2 and 3 that in Eq. (8) may not equal to LLR(bt) in Eq. (12) because the bits
Figure imgf000018_0007
demodulated from the same 16QAM symbol may be not statistically independent. In this section, we will provide example and numerical evaluation for 16QAM to show that using Eq. (10) in conventional decoder may further result in decoding error.
At the transmitter, we use Eq. (5) to generate coded bits. In particular, we consider length Mo = 8 polar code with Minf0 = 4 information bits and Mf = 4 frozen bits, where the 4 information bits are assumed as [1,1, 1,1], The B and G in Eq. (5) are obtained as follows:
• In this example, we assume information bits are inserted to d4, b6, b7, b8 of the vector B as
B = [0,0,0, b4, 0, b6, b7, b8] = [0,0, 0,1, 0,1, 1,1] (20) with “0” in Eq. (20) being frozen bits, and b4, b6, b7, b8 being information bits.
Figure imgf000018_0006
Then, the coded bits C can be computed by Eq. (5) and we obtain
C = BG (mod2) = [0,1, 1,0, 1,0, 0,1]
After that, the first and second 4 bits in C are modulated into two 16QAM symbols, and
Figure imgf000018_0002
according to Eq. (13), respectively. The channel is AWGN channel. In this example,
Figure imgf000018_0001
we assume that SNR=0dB to simplify calculations. The received symbol vector Y is assumed as
Figure imgf000018_0005
We compare the following two decoders, i.e. bit-LLR based decoder and symbol soft value based decoder.
Bit-LLR based decoder is adopted at the receiver: when bit-LLR based decoder (i.e. the conventional polar decoder) is adopted, the LLR of each information bit is calculated by Eq. (13). By using the received signal in Eq. (21), the
Figure imgf000018_0003
computed by Eq. (11) are as follow
Figure imgf000018_0004
0
Figure imgf000019_0002
Then, we can obtain the decoded information bits
Figure imgf000019_0003
decoding error happens.
Symbol soft value based decoder is adopted at the receiver: the symbol soft value is defined in Eq. (1). In this example, the symbol soft value of modulation symbol α forr the t-th
Figure imgf000019_0007
received modulation symbol can be written as
Figure imgf000019_0004
where is one modulation symbol generated by 4 bits [α1 α2 , α3, α4] as in Eq.
Figure imgf000019_0006
(12),
• t Ε {1,2} is the index of received modulation symbol,
• Yt is the t-th received modulation symbol.
Since there is one-to-one mapping between modulation symbol and 4 bits [α1, α2, α3, α4] as in (13), the LL(x[ai.a2.a3.a4], t) in Eq. (22) can be mapped to the probability of the values of the 4 bits [α4, α2, α3, α4], which can be used in Eq. (12) to compute LLR(bt).
In particular, let α4 = c4, α2 = c2, α3 = c3, α4 = c4 for generating the first modulation symbol by Eq. (13) and let α1 = c5, α2 = c6, α3 = c7, α4 = c8 for the second modulation symbol, where c4 to c8 are the 1st to 8th coded bits in C, respectively. Let cZu = c1(i.e., zu = 1) as an example, the Pr([cZu, U2 ] = [0,0] | Y) in Eq. (12) can be expressed as:
Figure imgf000019_0005
SzeZi\{i] cz=° which is computed based on the symbol soft values. Similarly, we obtain
Figure imgf000019_0001
Finally, LLR(bJ can be calculated based on symbol soft values.
The way to compute Pr([cZu, U2 ] = [0,0] |Y) in Eq. (23) based on symbol soft value is different from the conventional method given in Eq. (10) and (11). We compute LLR(bt) by Eq. (23) based on these symbol soft values, where { }
Figure imgf000020_0001
is calculated as in Eq. (18). The final results are as follow:
Figure imgf000020_0002
Then, we can obtain the decoded information bits i.e. , the decoding
Figure imgf000020_0003
is correct.
The examples above show that when symbol soft value based decoder can perform correct decoding, the bit-LLR based one may lead to decoding error. Furthermore, BLER simulation shows that the symbol soft value based decoder is statistically less prone to decoding error than the bit-LLR based decoder, i.e., about 20% reduction of BLER at SNR=0dB.
In the examples above, list decoding is not discussed. If list decoding is applied, decoding processes based on each entry in the list are the same as in the examples above. Therefore, the same problem exists for list decoding and the same solution can be applied.
Polar codes can achieve channel capacity for binary-input discrete memoryless channels (B- DMCs). However, if high order modulations, e.g., 16QAM, are used, the channels are no longer B-DMCs, and therefore polar codes may not achieve the channel capacity. By using the proposed encoder and decoder scheme herein disclosed, higher throughput can be achieved compared to bit-based decoder because the channel is DMC with symbol-input.
The same problem can be found for any channel coding if an information bit can be expressed as the sum of at least two correlated bits. For example, in low-density parity-check (LDPC) code, if there is a parity-check function includes one information bits and two other coded bits, and the two coded bits are correlated to each other due to modulation, e.g., 16QAM in the example in IDF, the same problem can be found.
Non-binary decoder is also considered for turbo code when non-binary turbo encoder is used, i.e., duo-binary turbo convolution code. In duo-binary turbo convolution code, the input of encoder is quaternary or with higher order.
Comparing with a duo-binary turbo convolution encoder, a polar encoder is binary encoder and not based on convolution. At the decoder, SC polar decoding can be efficiently performed in a recursive manner by a butterfly-based decoder, which is different from the iteration based duo-binary turbo convolution decoder. Due to the different structures of encoder and decoder, the functions in duo-binary turbo convolution code cannot be used for polar code. Therefore, a symbol soft value based polar decoder and corresponding encoder are desired.
For the above reasons a first communication device 100 and a second communication device 300 are herein disclosed according to examples of the invention. The first communication device 100 act as a transmitter and the second communication device 300 act as a receiver in the herein given examples but are not limited thereto.
Fig. 1 shows a first communication device 100 according to an example of the invention. In the example shown in Fig. 1 , the first communication device 100 comprises a processor 102, a transceiver 104 and a memory 106. The processor 102 may be coupled to the transceiver 104 and the memory 106 by communication means 108 known in the art. The first communication device 100 may further comprise an antenna or antenna array 110 coupled to the transceiver 104, which means that the first communication device 100 may be configured for wireless communications in a wireless communication system. That the first communication device 100 may be configured to perform certain actions can in this disclosure be understood to mean that the first communication device 100 comprises suitable means, such as e.g. the processor 102 and the transceiver 104, configured to perform said actions.
The processor 102 of the first communication device 100 may be referred to as one or more general-purpose central processing units (CPUs), one or more digital signal processors (DSPs), one or more application-specific integrated circuits (ASICs), one or more field programmable gate arrays (FPGAs), one or more programmable logic devices, one or more discrete gates, one or more transistor logic devices, one or more discrete hardware components, and one or more chipsets.
The memory 106 of the first communication device 100 may be a read-only memory, a random access memory, or a non-volatile random access memory (NVRAM).
The transceiver 104 of the first communication device 100 may be a transceiver circuit, a power controller, an antenna, or an interface which communicates with other modules or devices.
In examples, the transceiver 104 of the first communication device 100 may be a separate chipset or being integrated with the processor 102 in one chipset. While in some examples, the processor 102, the transceiver 104, and the memory 106 of the first communication device 100 are integrated in one chipset. According to examples of the disclosure the first communication device 100 is configured to obtain a set of uncoded bits comprising Mo bits, wherein the set of uncoded bits comprises information bits. The first communication device 100 is further configured to obtain a set of coded bits by a linear transformation of the set of uncoded bits based on a coding matrix G. The coding matrix G is a Kronecker product of two binary matrices G1 and G2, where G1 is a n-th
Kronecker power of matrix and G2 is a K x K full rank binary matrix, where K is the
Figure imgf000022_0001
modulation order of a modulation symbol constellation and K > 1, and where Mo is a multiple of K. The first communication device 100 is further configured to obtain a set of modulated symbols by modulating the set of coded bits based on the modulation symbol constellation. The first communication device 100 is further configured to transmit the set of modulated symbols to a second communication device 300.
Generally, a Kronecker product of a first matrix A and a second matrix B of size M x N is to generate a third matrix C, where the element in the (M(d1 - 1) + d 2)-th row and (/V(d3 - 1) + d4)-th column of C is equal to the product of the element in the c^-th row and d2-th column of A and the element in the d3-th row and d4-th column of B. Further, a n-th Kronecker power of matrix is the result of Kronecker producted by itself for n - 1 times.
Figure imgf000022_0002
Figure imgf000022_0003
Fig. 2 shows a flow chart of a corresponding method 200 which may be executed in a first communication device 100, such as the one shown in Fig. 1. The method 200 comprises obtaining 202 a set of uncoded bits comprising Mo bits, wherein the set of uncoded bits comprises information bits. The method 200 further comprises obtain 204 a set of coded bits by a linear transformation of the set of uncoded bits based on a coding matrix G, wherein the coding matrix G is a Kronecker product of two binary matrices G1 and G2, where G1 is a n-th
Kronecker power of matrix and G2 is a K x K full rank binary matrix, where K is the
Figure imgf000022_0004
modulation order of a modulation symbol constellation and K > 1, and where Mo is a multiple of K. The method 200 further comprises obtaining 206 a set of modulated symbols by modulating the set of coded bits based on the modulation symbol constellation. The method 200 further comprises transmitting 208 the set of modulated symbols to a second communication device 300.
In examples of the invention, the coding matrix G may equal to a Kronecker product of the two binary matrices G1 and G2.
In examples of the invention, integer n is given by the formula:
Figure imgf000023_0001
In further examples of the invention, K is a power of 2 when G2 is a log2 -th Kronecker power of matrix
Figure imgf000023_0002
Fig. 3 shows a second communication device 300 according to an example of the invention. In the example shown in Fig. 3, the second communication device 300 comprises a processor 302, a transceiver 304 and a memory 306. The processor 302 is coupled to the transceiver 304 and the memory 306 by communication means 308 known in the art. The second communication device 300 may be configured for both wireless and wired communications in wireless and wired communication systems, respectively. The wireless communication capability is provided with an antenna or antenna array 310 coupled to the transceiver 304, while the wired communication capability is provided with a wired communication interface 312 coupled to the transceiver 304. That the second communication device 300 is configured to perform certain actions can in this disclosure be understood to mean that the second communication device 300 comprises suitable means, such as e.g. the processor 302 and the transceiver 304, configured to perform said actions.
The processor 302 of the second communication device 300 may be referred to as one or more general-purpose CPUs, one or more DSPs, one or more ASICs, one or more FPGAs, one or more programmable logic devices, one or more discrete gates, one or more transistor logic devices, one or more discrete hardware components, and one or more chipsets.
The memory 306 of the second communication device 300 may be a read-only memory, a random access memory, or a NVRAM.
The transceiver 304 of the second communication device 300 may be a transceiver circuit, a power controller, an antenna, or an interface which communicates with other modules or devices.
In examples, the transceiver 304 of the second communication device 300 may be a separate chipset or being integrated with the processor 302 in one chipset. While in some examples, the processor 302, the transceiver 304, and the memory 306 of the second communication device 300 are integrated in one chipset. According to examples of the disclosure the second communication device 300 is configured to receive a set of modulated symbols from a first communication device 100. The set of received modulated symbols are associated with a set of coded bits and a modulation symbol constellation. The second communication device 300 is further configured to obtain a set of symbol soft values based on the set of received modulated symbols and symbols of the modulation symbol constellation. The second communication device 300 is further configured to obtain a set of decoded bits associated with the set of coded bits based on the set of received modulated symbols and the set of symbol soft values.
Fig. 4 shows a flow chart of a corresponding method 400 which may be executed in a second communication device 300, such as the one shown in Fig. 3. The method 400 comprises receiving 402 a set of modulated symbols from a first communication device 100. The set of received modulated symbols are associated with a set of coded bits and a modulation symbol constellation. The method 400 further comprises obtaining 404 a set of symbol soft values based on the set of received modulated symbols and symbols of the modulation symbol constellation. The method 400 further comprises obtaining 406 a set of decoded bits associated with the set of coded bits based on the set of received modulated symbols and the set of symbol soft values.
In examples of the invention, the second communication device 300 obtains the set of coded bits from a linear transformation of a set of uncoded bits based on a coding matrix G. The coding matrix G is a Kronecker product of two binary matrices G1 and G2, where G1 is a n-th Kronecker power of matrix and G2 is a K x K full rank binary matrix. K is the modulation
Figure imgf000024_0001
order of the modulation symbol constellation and K > 1, and Mo is a multiple of K.
In further examples of the invention, integer n is given by the formula:
Figure imgf000024_0002
Fig. 5 shows a communication system 500 according to an example of the invention. The wireless communication system 500 comprises a first communication device 100 and a second communication device 300 configured to operate in the communication system 500. For simplicity, the communication system 500 shown in Fig. 5 only comprises one first communication device 100 and one second communication device 300. However, the communication system 500 may comprise any number of first communication devices 100 and any number of second communication devices 300 without deviating from the scope of the invention.
In the communication system 500, the first communication device 100 act as a transmitter and the second communication device 300 act as a receiver. In other examples, the reverse case is possible. It is illustrated in Fig. 5 that the first communication device 100 transmits a set of modulated symbols to the second communication device 300 over a radio channel 510. Upon reception of a set of modulated symbols from the first communication device 100, the second communication device 300 obtains a set of symbol soft values and further obtain a set of decoded bits associated based on the set of received modulated symbols and the set of symbol soft values. It is further noted from Fig. 5 that the first communication device 100 is illustrated as a network access node, such as a base station; and the second communication device 300 is illustrated as a client device, such as a User Equipment. However, examples of the disclosure are not limited thereto.
For the polar code encoding and decoding scheme according to examples of the disclosure at least two objectives are achieved. The first objective is to provide for polar code an efficient method to calculate in the decoder of the second communication device 300 correct LLR values for each information bit, using the output signal of the demodulator of the transmitted modulation symbols. The second objective is to guarantee that the proposed decoder can be efficiently performed in a recursive manner by using a data flow graph with butterfly-based decoder structure, and therefore low decoding complexity can be achieved.
The concept of “bit segment” used in this disclosure may be defined as a segment of continuous bits in a bit stream, e.g., coded bits. The definition of soft value of a bit segment may be: (24)
Figure imgf000025_0001
where Pr(a = a0 |Y) is the probability that a = a0 given that Y was received. If the bit segment is used to generate a modulation symbol Xa, we have
Figure imgf000025_0002
In examples of the disclosure the following points may be made for the second communication device 300 with general polar decoder based on symbol soft value.
R1 : The input of the decoder of the second communication device 300 is symbol soft value. For a modulation symbol X and the received symbol Y (if the channel is known at the receiver, Y the received symbol after equalization), the symbol soft value is related to |YXH |2 or YXH for the case the channel is unknown at the receiver, or related to p|Y - X|2 for the case the channel is known at the receiver, where p is the SNR.
R2: The LLR of an information bit in the decoder of a codeword generated by a polar encoder, is calculated by using a corresponding set of soft values of modulation symbols used to transmit coded bits whose linear combination produces in the first communication device 100 the observed information bit. In particular, assume the i -th information bit bL is a linear combination of a set of coded bits cz, z e ZL as defined in (6), i
Figure imgf000026_0004
can be calculated as
Figure imgf000026_0001
where
Figure imgf000026_0002
• Sx, b2, ... , bi-! are previously estimated bits,
• Mo is the length of coded bits,
• K is the modulation order,
• C is the vector of coded bits ct,
• C(t) is the t-th bit segment of C, which is defined as C(t) =
Figure imgf000026_0003
,
• Xc(t) is the modulation symbol generated based on the coded bit segment C(t),
• LL(xc(t), t) = ln Pr{xt = Xc(t) |Yt} is the symbol soft value, which is the log probability of modulation symbol Xc(t) being transmitted if the t-th received symbol is Yt,
• is a sub-matrix which include the first to the (j - l)-th column of G (includes all rows).
In orderto implement the decoder in Eq. (25) with low complexity, the following novel f function and g function may be applied in a recursive manner at the second communication device 300 which is different from the f and g functions used in conventional decoders as previously described.
R3: The LLR of bt in Eq. (25) can be calculated based on the following novel f function and g function: Definition of f function: calculate the soft values of the sum of two independent bit segments in GF(2) by:
Figure imgf000027_0001
with
• Input: soft values of bit segments a and b,
• Output: soft value of bit segment c = a ® b,
Figure imgf000027_0002
Definition of g function: update the soft values of a bit segment a based on its soft values and the soft values of another bit segment b, and the sum of these two bit segments c in GF (2) is known:
Figure imgf000027_0003
• Input: estimated sum of bit segment c = affib = c0 , soft values of bit segments a and b,
• Output: soft value of bit segment a,
Figure imgf000027_0004
In order to apply the recursive manner at the second communication device 300, the first communication device 100 needs to guarantee the recursive structure of coding matrix for coded bit segments correspond to each transmitted modulation symbol. In particular, the following points may be made for the second communication device 300. the number of coded bits
Figure imgf000027_0005
and K is the modulation order, G2 is a full rank binary matrix of size K
Figure imgf000027_0006
T2: If rate matching is applied, entire bit segment (of length K) should be kept, removed or repeated in the rate matched bits. This is explained more in detail in the following disclosure.
T3: If interleaving is applied after encoding, the interleaving should be bit-segment-level instead of bit-level, i.e., only change the order of each entire bit segment (length K). This is also explained more in detail in the following disclosure.
Figure imgf000028_0001
In examples of the invention, interleaving may be considered as part of rate matching. In this case, the rate matching includes at least two steps: a first step which is to select or remove or add some bits for repetition; and a second step which is interleaving. In this case, point T2 above is designed for the first step, and point T3 is for the second step.
With reference to Fig. 6 which illustrates further examples of the disclosure will hereby be described and explained. The terminology, expressions, systems design, etc. according to 3GPP NR may be used but is not limited thereto.
The second communication device 300 includes a demodulation block 320 coupled to a polar decoder block 322. If there are interleaving and/or rate matching performed at the first communication device 100, conventional de-interleaving and/or inverse operation of rate matching may be applied correspondingly at the second communication device 300 but are not illustrated in Fig. 6.
Demodulation block 320: the input of demodulation block 320 is a set of received modulation symbols which has been transmitted by the first communication device 100 over a radio channel 510. In the demodulation block 320 the probability of each symbol is calculated, which is equivalent to a symbol soft value of the symbol. The output of the demodulation block 320 that is provided to the polar decoder block 322 are symbol soft values instead of bit LLRs as in conventional solutions. A symbol soft value corresponds to a modulation symbol X in constellation and the received modulation symbol Y. It represents or relates to the probability that modulation symbol X was transmitted from the first communication device 100.
If the channel 510 is unknown at the second communication device 300, the probability may be calculated based on XYH or |XYH |2, and therefore the symbol soft value can be XYH or |XYH |2. The reason is that the logarithmic value of probability that X was transmitted given received symbol Y is proportional to |XYH |2. lf XYH is used as symbol soft value, the phase information of the channel 510 is also considered. When calculating the soft value of the sum of two bit segments (corresponding to two symbols), we assume the phase information of the channel 510 of the two symbols are the same, i.e. , calculated by vector addition. Otherwise, |XYH | 2 may be used and phase information of the channel 510 is not considered, and therefore there is no restriction on channel phase, i.e., the soft value of the sum is calculated by scalar addition. Alternatively, |XYH|2 can be replaced by |XYH| . Moreover, if symbols X and Y are matrixes, which means that there are multiple transmission antennas at the first communication device 100, the |XYH|2 above can be replaced by trace(XYHYXH).
In other words, each symbol soft value in the set of symbol soft values are obtained based on an inner product between a received modulated symbol in the set of received modulated symbols and a symbol of the modulation symbol constellation when the properties of the channel 510 is unknown to the second communication device 300.
The inner product between a received modulated symbol in the set of received modulated symbols and a symbol of the modulation symbol constellation may be obtained according to |YXH|2 or YXH where Y is the received modulated symbol in the set of received modulated symbols, X is the symbol of the modulation symbol constellation, and H is the conjugate transpose operator.
On the other hand, if the channel 510 is known at the second communication device 300 and equalization is applied before demodulation, the symbol soft value can be p|Y - X| 2 , where p is the SNR of the channel 510. The reason is that the logarithmic value of probability that X was transmitted given received Y is proportional to p|Y - X|2. Optionally, p|Y - X|2 can be replaced by Jp | Y - X| .
In other words, each symbol soft value in the set of symbol soft values is obtained based a difference between a received modulated symbol in the set of received modulated symbols and a symbol of the modulation symbol constellation when the properties of the channel 510 is known to the second communication device 300.
The difference between the received modulated symbol in the set of received modulated symbols and the symbol of the modulation symbol constellation may be obtained according to p | Y - X|2 where Y is the received modulated symbol in the set of received modulated symbols, X is the symbol of the modulation symbol constellation, and p is the signal-to-noise ratio (SNR) of the received modulated symbol in the set of received modulated symbols.
Moreover, the relative value of the symbol soft value can also be used by the second communication device 300. For example, when Xy is taken as reference (X^ is one constellation point), e.g., f = 0 or other values within {0,1, ... 2K - 1}, the relative value can be |XYH|2 - |XZYH|2 for unknown channel at the second communication device 300, and for known channel at the second communication device 300.
Figure imgf000030_0003
Assuming there are 2K modulation symbols in the constellation, each received modulation symbol will generate 2K corresponding symbol soft values which are provided to the polar decoder 322.
Polar decoder 322: the polar decoder block 322 of the second communication device 300 includes two subblocks, i.e. a decoding block 330 and a de-mapper block 332 which corresponds to two steps, i.e.:
1 . Produce a decoded bit vector B by estimating the probability of B segment by segment, i.e. the decoding block 330,
2. Select information bits from B, i.e. the de-mapper block 332.
The second step, which corresponds to the de-mapper 332 of the polar decoder 322 is the same as in a conventional polar decoder. Hence, we only focus on the first step and therefore the decoding block 330.
Fig. 7 illustrates an exemplary solution which may be performed in the decoding block 330 and comprises three steps l-lll.
In step I in Fig. 7, the second communication device 300 obtains symbol soft values of each modulation symbols, which are the soft values of corresponding coded bit segments.
In step II in Fig. 7, the second communication device 300 calculates the probability of the q-th decoded bit segment according to the formula
Figure imgf000030_0002
Figure imgf000030_0001
In step III in Fig. 7, the second communication device 300 estimates for the q-th decoded bit segment as the bit segment with the largest probability. If the q-th decoded bit segment is the last bit segment to estimate, the decoding is finished and an estimation of B is outputted as shown in Fig. 7. Otherwise, the second communication device 300 will calculate the probability of the next decoded bit segment, i.e. for q = q + 1, as illustrated with the feedback line in Fig. 7 from step III to II.
An idea of the first step is to estimate each bit segment of B in turn based on a bit segment level successive cancellation (SC) polar decoding algorithm:
Figure imgf000031_0001
where P
Figure imgf000031_0004
| , , , is the probability that the currently decoded bit segment is given Y was received and the previously decoded bit segments were . The feasible values of bit segment should guarantee that the frozen bit is
Figure imgf000031_0005
0 and the parity check bit is correct. According to Eq. (29), the LLR of the i-th bits bi in B can be calculated by Eq. (25). To further calculate Eq. (25), it can be expressed as in Eq. (11) as ^^^(^^)
Figure imgf000031_0002
Similar to Eq. (23), the probability
Figure imgf000031_0006
can be calculated as:
Figure imgf000031_0007
=
Figure imgf000031_0003
where: ● xt is the t-th modulation symbol, ● xC (t) is the modulation symbol generated based on the bit segment C(t), ● LL(xc (t), ) = ln Pr{xt = xc(t)|Yt} is the symbol soft value defined in (22), where Yt is the ^-th received symbol, ● G(:,1:kq) is a sub-matrix which include the first to the ^^-th column of ^ including all rows, ●
Figure imgf000031_0008
(according to the proof in section 1.2.2.1) and
Figure imgf000031_0009
condition of the probability). The rest probabilities in Eq. (27) can be calculated in the same way as in Eq. (20), and finally we can obtain Eq. (25). Therefore, we can obtain the LLR of each bit in B based on the symbol soft values according to Eq. (27) and Eq. (28). This is important and different from conventional LLR-based polar decoders as in Eq. (11). The SC decoder based on Eq. (26) to (28) is novel because there is no LLR of coded bit needed/calculated at the second communication device 300. By using Eq. (26) and (27) problem mentioned previously can be avoided.
Moreover, since list decoding is applied, when making decision of the q-th decoded bit segment by Eq. (26), the decoder should output all feasible estimation of to
Figure imgf000032_0004
the list in descending order of P
Figure imgf000032_0003
If the list length exceeds the maximum length Lmax after estimating the q-th bit segment, then keep Lmax estimations of with the largest probability. Finally, after decoding all the bit segments of B,
Figure imgf000032_0005
output the most possible estimation.
The computation of Eq. (26) to (28) can be efficiently performed in a recursive manner by using a bit segment level data flow graph with structure named a butterfly-based decoder. In Appendix 3, we prove that the structure of butterfly-based decoder is the same as in conventional polar decoder with y- coded bits.
Two functions, i.e., a f function and a g function, may be used in the butterfly-based decoder which is shown Fig. 8. The f function is used to calculate the probabilities of the sum of two independent bit segments in GF (2), i.e. f function: for two independent bit segments a and b, if c = affib, then the probability of c satisfies
Figure imgf000032_0002
If we convert the probability in Eq. (29) to the symbol soft value, the following f function for symbol soft value can be obtained:
Figure imgf000032_0001
In other words, in examples of the disclosure the f function may be formulated as: obtaining the set of decoded bits comprises obtain the set of decoded bits based on soft values of decoded bit segments. The soft values of each decoded bit segment are determined based on soft values of at least one intermediate bit segment (e.g., c in Eq. (29) and (30)), and the soft values of each intermediate bit segment are determined based on soft values of two basic bit segments(e.g., bit segments a and b in Eq. (29) and (30)). The sum of the two basic bit segments in Galois Field (GF) of two elements is equal to the intermediate bit segment, and the soft values of the two bit segments are obtained based on the set of symbol soft values.
The g function is used to calculate the probabilities of the sum of two bit segments in GF(2) when one of them has already been estimated, i.e. g function: for two bit segments a and b, if c = affib and c is known as c = c0, then the probability of a can be updated as
Figure imgf000033_0004
If we convert the probability in Eq. (31) to the symbol soft value, the following g function the symbol soft value can be obtained:
Figure imgf000033_0001
which can be used for calculating Eq. (28) in butterfly-based decoder. LL(b = aoffico) =
Figure imgf000033_0002
In other words, in examples of the disclosure the g function may be formulated as: obtaining the set of decoded bits comprises obtain the set of decoded bits based on soft values of decoded bit segments. The soft values of each decoded bit segment are determined based on soft values of at least one intermediate bit segment (e.g., a in Eq. (31) and (32)), and the soft values of each intermediate bit segment on the left side of Eq.
Figure imgf000033_0005
(32)) are determined based on initial soft values of the intermediate bit segment (e.g., soft value on the right side of Eq. (32)), soft values of one basic bit segment (e.g.,
Figure imgf000033_0003
basic bit segment is b in Eq. (31) and (32)), and at least one decoded bit (e.g., decoded bits in c0 in Eq. (31) and (32)). The initial soft values of the intermediate bit segment are obtained based on the set of symbol soft values.
With reference back to Fig. 6, the first communication device 100 on the other hand comprises a polar encoder block 120 coupled to a bit segmentation block 122 which in turn is coupled to a modulation block 124.
Polar encoder block 120: the polar encoder block 120 includes two subblocks, i.e., a mapper block 130 and a linear transformation block 132. The first step and correspondingly the mapper block 130, which is inverse to the de-mapper block 332 in the polar decoder 322, is the same as in conventional polar encoders and will therefore not be described more in detail. The mapper block 130 obtains N bits and outputs a bit vector B with Mo uncoded bits which are provided to the linear transformation block 132.
For the second step and corresponding linear transformation block 132, which is inverse transform of decoding block 330 in the polar decoder 322, the bit vector B is linearly transformed using coding matrix G to obtain bit vector C with Mo coded bits i.e., C = BG. A conventional polar coding matrix G = can be used here, where Mo is the
Figure imgf000034_0001
number of coded bits. The bit vector C is provided to the bit segmentation block 122.
Alternatively, a set of coding matrices can also be used here as extension of the coding matrix used in linear transformation block 132. In particular, let
Figure imgf000034_0002
be the q-th bit segment of C, and define
Figure imgf000034_0003
where K is the modulation order.
Let C be the bit vector composed
Figure imgf000034_0004
is the q-th bit segment of C). According to Eq. (5) and (33), the coding matrix to generate C from B can be expressed as
Figure imgf000034_0005
which is a block coding matrix. The decoding is based on the structure of Gb(ocfe and rl oi® independent from transformation matrix j log2 between
Figure imgf000034_0006
Thus, any full
Figure imgf000034_0007
rank binary transformation matrix G2 is feasible for the proposed decoder. Therefore, the coding matrix can be extended to
Figure imgf000034_0008
where G2 can be any full rank binary matrix of size K x K.
From Eq. (35), the coded bits are generated based on a block coding matrix Gb(ocfe in Eq. (33) with recursive structure, and G2 is a linear operation from bit segment
Figure imgf000034_0009
Thus, the recursive structure can be guaranteed if each modulation symbol is generated based on each bit segment which requires that the operations after encoding should not mix any two bit segments
Figure imgf000034_0010
Bit segmentation block 122: the soft values of each coded bit segment are needed at the polar decoder. In order to obtain the soft value for the bit segment at the second communication device 300, the same bit segmentation will be used at the first communication device 100, and each bit segment will be used to generate one modulation symbol. Therefore, the bit segmentation is in the bit segmentation block 122: the q-th coded bit segment includes the [K(q - 1) + l]-th to [Kq]-th bits in the vector C obtain from the linear transformation block 132.
The output of the bit segmentation block 122 is parallel bits segments with K number of bits each which are provided to the modulation block 124.
Modulation block 124: modulation is a mapping from the bit segments provided by the bit segmentation block 122 to modulation symbols in the modulation block 124. A difference from conventional modulation is that the modulation order K herein is power of 2 if
Figure imgf000035_0004
* . This is because that the transformation matrix between
Figure imgf000035_0001
Figure imgf000035_0002
Figure imgf000035_0003
and needs log2 K to be an integer, i.e., K is power of 2.
In implementations of the invention, there may be one or more additional steps at the first communication device 100 and corresponding steps at the second communication device 300. Some examples are hereby described.
Interleaving: interleaving is generally to change order of coded bits in order to make the transmission more robust. However, the second communication device 300 needs to get the soft values of each entire original (before interleaving) coded bit segment. Hence, the interleaving should be bit-segment-level instead of bit-level, i.e., interleaving is to change order of entire bit segments.
Therefore, in examples of the disclosure the first communication device 100 obtains the set of modulated symbols based on interleave the set of coded bits by interleaving entire segments of the set of coded bits; and obtain the set of modulated symbols by modulating the interleaved set of coded bits.
Rate matching: rate matching is to change the length of coded bits to satisfy the scheduled resources. Assume the number of needed coded bits is M according to the scheduled resources and modulation order, it may not equal to Mo. In particular, if M < Mo, M bits can be selected from Mo coded bits at the transmitter. If M > Mo, repetition of coded bits can be used to generate M bits at the first communication device 100. The requirement of rate matching is that entire coded bit segment should be kept, removed or repeated in the rate matched bits. The reason is that selecting, removing or repeating half bit segment will make it impossible for the second communication device 300 to obtain the soft value of the whole bit segment. Therefore, in examples of the disclosure the first communication device 100 obtains the set of modulated symbols based on obtain a subset of the set of coded bits. The subset of the set of coded bits consists of entire segments of the set of coded bits. The first communication device 100 further obtains the set of modulated symbols by modulating the subset of the set of coded bits.
Furthermore, in examples of the disclosure the first communication device 100 obtains the set of modulated symbols based on obtain an extended set of coded bits. The extended set of coded bits comprises the set of coded bits and one or more segments of the set of coded bits. The first communication device 100 further obtains the set of modulated symbols by modulating the extended set of coded bits.
In this disclosure a segment of coded bits may be defined and obtained according to the formula
Figure imgf000036_0001
where k = 1, 2, 3 ... is an index of a bit in the set of coded bits and ib = 1, 2, ... K.
Moreover, as aforementioned there are two main cases at the second communication device 300 which have implications for the decoding procedure, i.e. the case when the second communication device 300 knows the properties of the channel 510 and the case when the second communication device 300 does not know the properties of the channel 510 which has previously been discussed. Knowledge of the channel 510 may e.g. relate to knowledge of the SNR, SNIR, phase rotation, or other relevant channel properties. These channel properties may be estimated based on reception of reference or pilot signals. However, information about the channel properties may also be received from other communication devices, e.g. in control signaling. Firstly, the case when the second communication device 300 do not know the properties of the channel 510 will be described further and thereafter the case when the second communication device 300 knows the properties of the channel 510.
The following aspects are when the properties of the channel 510 are unknown to the second communication device 300.
Modulation: in this case, multi-dimensional modulation can be used due to unknown channel at the second communication device 300. Each multi-dimensional modulation symbol contains multiple elements, i.e., as a vector x. Demodulation: the received symbol vector on the time-frequency (T-F) resources for mapping the t-th modulation symbol is yt . There are two options that may be employed by the demodulation block 320.
Option 1 : the output of demodulation is |ytx * |2 where x^ is the f-th symbol in the constellation. In order to reduce complexity, the demodulator can output |ytXj? |2 for some x^ with large |ytXy? |2 values. Alternatively, the output can be a value computed based on |ytx * |2 , for example, or
Figure imgf000037_0001
relative values. In this embodiment, we use |ytx * |2 as example.
Option 2: the output of demodulation where x^ is the f-th symbol vector in the
Figure imgf000037_0010
constellation. In order to reduce complexity, the demodulator can output some ytx * for some xf with large value. The second option can be applied only when the channel of some
Figure imgf000037_0011
modulation symbols can be considered to be the same or similar to each other. Hence, in NR a base station/network access node may need to send control signal to a UE to indicate the time and/or frequency resource size(s) that can be considered as using the same beam/precoder or considered as the same channel. Otherwise, the resource size can be preconfigured or decided by receiver.
Polar decoder: symbol soft value based list polar decode to estimate B: the LLR of each bit in B can be estimated by Eq. (25) or by a recursive polar decoder. For the recursive polar decoder, according to Appendix 3 a butterfly-based decoder can be used as shown in Fig. 8 to estimate B . The butterfly-based decoder may be part of the decoder block 330 of the second communication device 300 in examples of the invention.
The butterfly-based decoder obtains 2K symbol soft values of each received modulation symbol from the demodulation block 320. The estimation of B in the butterfly-based decoder includes stages as shown in Fig. 8, and each stage includes operations. Denote
Figure imgf000037_0007
Figure imgf000037_0009
the u-th operation of the v-th stage as The input of operation
Figure imgf000037_0008
's the output of operation O^. There is no operation at stage 0.
Figure imgf000037_0006
For other stages:
• The operation
Figure imgf000037_0002
is a f function if
Figure imgf000037_0003
is even,
• The operation
Figure imgf000037_0004
is a g function if
Figure imgf000037_0005
is odd. The f and g functions have been discussed previously and simplified operations are as follow:
Figure imgf000038_0002
For the decision, due to list decoding, the decision blocks in Fig. 8 need to output probabilities of all feasible decoded bit segments, which are represented by path metric (PM) values.
Figure imgf000038_0003
After all of the decisions have been made, output B whose bit segments are generated by multiplying by bit segments with the largest PM values from the decision
Figure imgf000038_0001
operations.
Alternatively, G-L can be multiplied by the binary indices of the input soft values, and therefore the indices of the input soft values are changed. According to Appendix 3 below, the butterfly-based structure of proposed recursive decoder in Fig. 8 with symbol soft value input is the same as conventional SC polar decoder. Since the complexity of conventional SC polar decoder is 0(M0 logM0), the propose recursive decoder is also with the complexity of order of O(M0 logM0).
In this example of the invention, the channel 510 is known at the second communication device 300. The channel 510 may e.g. be estimated based on detection of pilot symbols or reference symbols transmitted together with data symbols from the first communication device 100 to the second communication device 300 which is illustrated in Fig. 5. In this case, equalization is necessary before demodulation. Therefore, the set of received modulation symbol used in the demodulation block is a set of modulation symbols after equalization. The following aspects are special for this case.
Modulation: at the first communication device 100, the only difference compared to the embodiment when the channel is unknown is that one modulation symbol may be one complex value or a vector of complex values.
Demodulation: at the second communication device 300, the demodulation block is different from the example when the channel is unknown. After equalization, the symbol on the T-F resources for mapping the t-th modulation symbol is yt. The output of demodulation are is the /-th symbol in the constellation, p is the SNR at the receiver. In
Figure imgf000039_0002
order to reduce complexity, the demodulation may output p\yt - Xy |2 for some x^ with large
Figure imgf000039_0001
value. Alternatively, the output can be a value computed based on pIyt - xf I2, for example, exp (p\yt - Xy|2), or relative values, p can also be expressed where a2 is the
Figure imgf000039_0003
noise power after equalization.
Polar Decoder: at the second communication device 300, the f function in polar decoder is different from the example when the channel is unknown since the output of demodulation is different. The f function is as follow:
Figure imgf000039_0004
Performance results
We use a link-level evaluation on block error rate (BLER) for comparing the proposed polar decoder according to example of the disclosure and a conventional polar decoder in the case that Multi-dimensional modulation is applied and channel is unknown at the receiver. In Table 1 the simulation parameters are presented.
Table 1 : simulation parameters
Figure imgf000040_0003
The evaluation results are shown in Fig. 9 in which the x-axis shows the SNR in dB and the y- axis error rate in BLER. It can be found from Fig. 9 that a 2.3dB SNR gain can be achieved by the proposed polar decoder (solid line in Fig. 9) compared to the conventional decoder (dashed line in Fig. 9).
Appendix 1
Proof of equation (19):
First, we define the normalization factor
Figure imgf000040_0001
Substituting (18), (A1) into (17), we can obtain
Figure imgf000040_0002
Figure imgf000041_0001
where Re{} and Im{} are the real part and imaginary part, respectively. According to (12), we have
Figure imgf000041_0002
It can be found that R is only related to α1 and α2, } is only related
Figure imgf000041_0003
to α 3 and α 4. Thus — for any α1, and are the
Figure imgf000041_0004
Figure imgf000041_0005
Figure imgf000041_0006
same for any a3 and a4. Hence, (A2) can be simplified as
Figure imgf000041_0007
Substituting (A3) into (A5) and replacing {0,1} by {ar ,1 - a^, we can obtain
Figure imgf000041_0008
Figure imgf000042_0001
Then, (19) is obtained.
Appendix 2
Proof of: a2 is in the summation
Figure imgf000042_0005
Since U1 = cZu = a±, the index of ar and a2 within the coded bit vector C are zu and zu + 1, respectively. Moreover, due to zu e Zt, according to the definition of Zj in (6), we have gZu i = 1. It can be proved that g i = 1 as follows:
Consider as in (5), it is obvious that gk+lii = 1 if k is odd and gk i = 1.
Figure imgf000042_0006
Since every 4 coded bits are modulated into one 16QAM symbol and ar is the first bit modulated in a 16QAM symbol, the index of ar within C must be odd, i.e. , zu is odd. Because gZu ,i = 1 and zu is odd, we can obtain gZu+lft = 1.
According to the definition of Zj in (6), the index of α2 (i-e-, zu + 1) belongs to Zj due to qZu+i,i = 1. Therefore, a2 is involved in the summation
Figure imgf000042_0009
Appendix 3
Proof of: The structure of butterfly-based decoder for symbol soft value based decoder is the same as in conventional polar decoder with
Figure imgf000042_0002
coded bits.
Figure imgf000042_0003
Proof: Since and C = BG, we can obtain
Figure imgf000042_0007
Figure imgf000042_0004
where Bw is the q-th bit segment in B, IKxK is identity matrix. It can be observed that C can
Figure imgf000042_0008
block matrix with block size K x K, and the value of each block is lKxK multiplied by an factor -( Thus, for the bit segment in B1£fi , Gb(ocfe have the same structure as the conventional polar encoder with coded bits. Therefore, at the receiver,
Figure imgf000043_0001
the same butterfly-based decoder structure for conventional polar decoder with
Figure imgf000043_0002
coded bits
Figure imgf000043_0003
can be used for the proposed symbol soft value based decoder.
A client device in this disclosure includes but is not limited to: a UE such as a smart phone, a cellular phone, a cordless phone, a session initiation protocol (SIP) phone, a wireless local loop (WLL) station, a personal digital assistant (PDA), a handheld device having a wireless communication function, a computing device or another processing device connected to a wireless modem, an in-vehicle device, a wearable device, an integrated access and backhaul node (IAB) such as mobile car or equipment installed in a car, a drone, a device-to-device (D2D) device, a wireless camera, a mobile station, an access terminal, an user unit, a wireless communication device, a station of wireless local access network (WLAN), a wireless enabled tablet computer, a laptop-embedded equipment, an universal serial bus (USB) dongle, a wireless customer-premises equipment (CPE), and/or a chipset. In an Internet of things (IOT) scenario, the client device may represent a machine or another device or chipset which performs communication with another wireless device and/or a network equipment.
The UE may further be referred to as a mobile telephone, a cellular telephone, a computer tablet or laptop with wireless capability. The UE in this context may e.g. be portable, pocket- storable, hand-held, computer-comprised, or vehicle-mounted mobile device, enabled to communicate voice and/or data, via the radio access network, with another entity, such as another receiver or a server. The UE can be a station (STA), which is any device that contains an IEEE 802.11 -conformant media access control (MAC) and physical layer (PHY) interface to the wireless medium (WM). The UE may also be configured for communication in 3GPP related LTE and LTE-Advanced, in WiMAX and its evolution, and in fifth generation wireless technologies, such as NR.
A network access node in this disclosure includes but is not limited to: a NodeB in wideband code division multiple access (WCDMA) system, an evolutional Node B (eNB) or an evolved NodeB (eNodeB) in LTE systems, or a relay node or an access point, or an in-vehicle device, a wearable device, or a gNB in the fifth generation (5G) networks. Further, the network access node herein may be denoted as a radio network access node, an access network access node, an access point, or a base station, e.g. a radio base station (RBS), which in some networks may be referred to as transmitter, “gNB”, “gNodeB”, “eNB”, “eNodeB”, “NodeB” or “B node”, depending on the technology and terminology used. The radio network access nodes may be of different classes such as e.g. macro eNodeB, home eNodeB or pico base station, based on transmission power and thereby also cell size. The radio network access node can be a station (STA), which is any device that contains an IEEE 802.11 -conformant MAC and PHY interface to the wireless medium. The radio network access node may also be a base station corresponding to the 5G wireless systems.
Furthermore, any method according to examples of the disclosure may be implemented in a computer program, having code means, which when run by processing means causes the processing means to execute the steps of the method. The computer program is included in a computer readable medium of a computer program product. The computer readable medium may comprise essentially any memory, such as a ROM (Read-Only Memory), a PROM (Programmable Read-Only Memory), an EPROM (Erasable PROM), a Flash memory, an EEPROM (Electrically Erasable PROM), or a hard disk drive.
Moreover, it is realized by the skilled person that examples of the first communication device 100 and the second communication device 300 comprises the necessary communication capabilities in the form of e.g., functions, means, units, elements, etc., for performing the solution. Examples of other such means, units, elements and functions are: processors, memory, buffers, control logic, encoders, decoders, rate matchers, de-rate matchers, mapping units, multipliers, decision units, selecting units, switches, interleavers, de-interleavers, modulators, demodulators, inputs, outputs, antennas, amplifiers, receiver units, transmitter units, DSPs, MSDs, TCM encoder, TCM decoder, power supply units, power feeders, communication interfaces, communication protocols, etc. which are suitably arranged together for performing the solution.
Especially, the processor(s) of the first communication device 100 and the second communication device 300 may comprise, e.g., one or more instances of a Central Processing Unit (CPU), a processing unit, a processing circuit, a processor, an Application Specific Integrated Circuit (ASIC), a microprocessor, or other processing logic that may interpret and execute instructions. The expression “processor” may thus represent a processing circuitry comprising a plurality of processing circuits, such as, e.g., any, some or all of the ones mentioned above. The processing circuitry may further perform data processing functions for inputting, outputting, and processing of data comprising data buffering and device control functions, such as call processing control, user interface control, or the like.
Finally, it should be understood that the disclosure is not limited to the examples described above, but also relates to and incorporates all examples within the scope of the appended independent claims.

Claims

1. A first communication device (100) for a communication system (500), the first communication device (100) being configured to obtain a set of uncoded bits comprising Mo bits, wherein the set of uncoded bits comprises information bits; obtain a set of coded bits by a linear transformation of the set of uncoded bits based on a coding matrix G, wherein the coding matrix G is a Kronecker product of two binary matrices G1 and G2, where G1 is a n-th Kronecker power of matrix and G2 is a K x K full rank
Figure imgf000046_0001
binary matrix, where K is the modulation order of a modulation symbol constellation and K >
1. and where Mo is a multiple of K obtain a set of modulated symbols by modulating the set of coded bits based on the modulation symbol constellation; and transmit the set of modulated symbols to a second communication device (300).
2. The first communication device (100) according to claim 1 , wherein
Figure imgf000046_0002
3. The first communication device (100) according to claim 1 or 2, wherein K is a power of 2 when G2 is a log2 K'-th Kronecker power of matrix
Figure imgf000046_0003
4. The first communication device (100) according to any one of the preceding claims, wherein obtaining the set of modulated symbols comprises obtain a subset of the set of coded bits, wherein the subset of the set of coded bits consists of entire segments of the set of coded bits; and obtain the set of modulated symbols by modulating the subset of the set of coded bits.
5. The first communication device (100) according to any one of the preceding claims, wherein obtaining the set of modulated symbols comprises obtain an extended set of coded bits, wherein the extended set of coded bits comprises the set of coded bits and one or more segments of the set of coded bits; and obtain the set of modulated symbols by modulating the extended set of coded bits.
6. The first communication device (100) according to any one of the preceding claims, wherein obtaining the set of modulated symbols comprises interleave the set of coded bits by interleaving entire segments of the set of coded bits; and obtain the set of modulated symbols by modulating the interleaved set of coded bits.
7. The first communication device (100) according to any one of claims 4 to 6, wherein a segment of coded bits is obtained according to
Figure imgf000047_0001
where k = 1, 2, 3 ... is an index of a bit in the set of coded bits and ib = 1, 2, ... K.
8. A second communication device (300) for a communication system (500), the second communication device (300) being configured to receive a set of modulated symbols from a first communication device (100), wherein the set of received modulated symbols are associated with a set of coded bits and a modulation symbol constellation; obtain a set of symbol soft values based on the set of received modulated symbols and symbols of the modulation symbol constellation; and obtain a set of decoded bits associated with the set of coded bits based on the set of received modulated symbols and the set of symbol soft values.
9. The second communication device (300) according to claim 8, wherein the set of coded bits are obtained from a linear transformation of a set of uncoded bits based on a coding matrix G, wherein the coding matrix G is a Kronecker product of two binary matrices G1 and G2, where G1 is a n-th Kronecker power of matrix and G2 is a K x K full rank binary matrix, where
Figure imgf000047_0002
K is the modulation order of the modulation symbol constellation and K > 1, and where Mo is a multiple of K.
10. The second communication device (300) according to claim 9, wherein
Figure imgf000047_0003
11. The second communication device (300) according to any one of claims 8 to 10, wherein each symbol soft value in the set of symbol soft values are obtained based on an inner product between a received modulated symbol in the set of received modulated symbols and a symbol of the modulation symbol constellation when the properties of the channel (510) is unknown to the second communication device (300).
12. The second communication device (300) according to claim 11 , wherein the inner product between a received modulated symbol in the set of received modulated symbols and a symbol of the modulation symbol constellation is obtained according to
|YXH | 2 orYXH where Y is the received modulated symbol in the set of received modulated symbols, X is the symbol of the modulation symbol constellation, and H is the conjugate transpose operator.
13. The second communication device (300) according to any one of claims 8 to 12, wherein each symbol soft value in the set of symbol soft values is obtained based a difference between a received modulated symbol in the set of received modulated symbols and a symbol of the modulation symbol constellation when the properties of the channel (510) is known to the second communication device (300).
14. The second communication device (300) according to claim 13, wherein the difference between the received modulated symbol in the set of received modulated symbols and the symbol of the modulation symbol constellation is obtained according to p|Y - X|2 where Y is the received modulated symbol in the set of received modulated symbols, X is the symbol of the modulation symbol constellation, and p is the signal-to-noise ratio of the received modulated symbol in the set of received modulated symbols.
15. The second communication device (300) according to any one of claims 8 to 14, wherein obtaining the set of decoded bits comprises obtain the set of decoded bits based on soft values of decoded bit segments, wherein soft values of each decoded bit segment are determined based on soft values of at least one intermediate bit segment, and wherein soft values of each intermediate bit segment are determined based on soft values of two basic bit segments, wherein the sum of the two basic bit segments in Galois Field of two elements is equal to the intermediate bit segment, and wherein the soft values of the two bit segments are obtained based on the set of symbol soft values.
16. The second communication device (300) according to any one of claims 8 to 15, wherein obtaining the set of decoded bits comprises obtain the set of decoded bits based on soft values of decoded bit segments, wherein soft values of each decoded bit segment are determined based on soft values of at least one intermediate bit segment, and wherein soft values of each intermediate bit segment are determined based on initial soft values of the intermediate bit segment, soft values of one basic bit segment, and at least one decoded bit, and wherein the initial soft values of the intermediate bit segment are obtained based on the set of symbol soft values.
17. A method (200) for a first communication device (100), the method (200) comprising: obtaining (202) a set of uncoded bits comprising Mo bits, wherein the set of uncoded bits comprises information bits; obtaining (204) a set of coded bits by a linear transformation of the set of uncoded bits based on a coding matrix G, wherein the coding matrix G is a Kronecker product of two binary matrices G1 and G2, where G1 is a n-th Kronecker power of matrix and G2 is a K x K
Figure imgf000049_0001
full rank binary matrix, where K is the modulation order of a modulation symbol constellation and K > 1, and where Mo is a multiple of K\ obtaining (206) a set of modulated symbols by modulating the set of coded bits based on the modulation symbol constellation; and transmitting (208) the set of modulated symbols to a second communication device (300).
18. A method (400) for a second communication device (300), the method (400) comprising: receiving (402) a set of modulated symbols from a first communication device (100), wherein the set of received modulated symbols are associated with a set of coded bits and a modulation symbol constellation; obtaining (404) a set of symbol soft values based on the set of received modulated symbols and symbols of the modulation symbol constellation; and obtaining (406) a set of decoded bits associated with the set of coded bits based on the set of received modulated symbols and the set of symbol soft values.
19. A computer program with a program code for performing a method according to claim 17 or 18 when the computer program runs on a computer.
PCT/EP2020/071854 2020-08-04 2020-08-04 Encoding and decoding scheme using symbol soft values WO2022028672A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202080104743.7A CN116134735A (en) 2020-08-04 2020-08-04 Coding and decoding schemes using symbol soft values
PCT/EP2020/071854 WO2022028672A1 (en) 2020-08-04 2020-08-04 Encoding and decoding scheme using symbol soft values

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/EP2020/071854 WO2022028672A1 (en) 2020-08-04 2020-08-04 Encoding and decoding scheme using symbol soft values

Publications (1)

Publication Number Publication Date
WO2022028672A1 true WO2022028672A1 (en) 2022-02-10

Family

ID=71948582

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2020/071854 WO2022028672A1 (en) 2020-08-04 2020-08-04 Encoding and decoding scheme using symbol soft values

Country Status (2)

Country Link
CN (1) CN116134735A (en)
WO (1) WO2022028672A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023198279A1 (en) * 2022-04-12 2023-10-19 Huawei Technologies Co., Ltd. Transmitting device, receiving device, communication apparatus and methods for random-access communication

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
BOCHERER GEORG ET AL: "Efficient Polar Code Construction for Higher-Order Modulation", 2017 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE WORKSHOPS (WCNCW), IEEE, 19 March 2017 (2017-03-19), pages 1 - 6, XP033093159, DOI: 10.1109/WCNCW.2017.7919039 *
CORINA I. IONITA ET AL: "On the design of binary polar codes for high-order modulation", 2014 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 1 December 2014 (2014-12-01), pages 3507 - 3512, XP055390406, ISBN: 978-1-4799-3512-3, DOI: 10.1109/GLOCOM.2014.7037351 *
JIA XIAOTONG ET AL: "A Novel Modulation Scheme of Polar Codes", 2018 14TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), IEEE, 25 June 2018 (2018-06-25), pages 1385 - 1390, XP033393737, DOI: 10.1109/IWCMC.2018.8450407 *
MAHDAVIFAR H ET AL: "Compound polar codes", INFORMATION THEORY AND APPLICATIONS WORKSHOP (ITA), 2013, IEEE, 10 February 2013 (2013-02-10), pages 1 - 6, XP032425929, ISBN: 978-1-4673-4648-1, DOI: 10.1109/ITA.2013.6502955 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023198279A1 (en) * 2022-04-12 2023-10-19 Huawei Technologies Co., Ltd. Transmitting device, receiving device, communication apparatus and methods for random-access communication

Also Published As

Publication number Publication date
CN116134735A (en) 2023-05-16

Similar Documents

Publication Publication Date Title
US9831895B2 (en) System and method for a message passing algorithm
CN107211033B (en) Method and device for data transmission
WO2018014272A1 (en) Methods and systems for encoding and decoding for ldpc codes
US10211952B2 (en) Scheme for communication using integer-forcing scheme in wireless communication system
CN107113090A (en) The generation method and equipment of polarization Polar codes
US10887050B2 (en) Downlink signal reception method and user equipment, and downlink signal transmission method and base station
US10560221B2 (en) Apparatus and methods for training-based channel code design
WO2011025008A1 (en) Wireless communication system, base station apparatus and communication method
US10411754B2 (en) Apparatus and method for non-orthogonal transmissions
US10581464B2 (en) Encoder device, decoder device, and methods thereof
WO2022028672A1 (en) Encoding and decoding scheme using symbol soft values
CN113472363B (en) Coding method and device
WO2021079643A1 (en) Method and device for multilevel polar-coded modulation transmitting and receiving
WO2016000197A1 (en) Decoding method and device
Meng et al. A universal receiver for uplink noma systems
Kim et al. Adaptive sliding-window coded modulation in cellular networks
US20220060295A1 (en) Method And Apparatus For Sequentially Detecting And Decoding Sparse Code Multiple Access Signal For Multiple Users
CN115298980B (en) Communication device and method for iterative code design
WO2021249632A1 (en) Accumulative iterative code for communication systems
Press Channel performance estimation for massive multiple input multiple output
JP6327138B2 (en) Receiving machine
WO2021115618A1 (en) First and second communication devices for pilot-less transmissions in a communication system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20751127

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20751127

Country of ref document: EP

Kind code of ref document: A1