摘要:
A polarization stream architecture is described. A transmitter may implement a reverse polarization stream to shape a first source signal in a first signal space to a first target signal in a second signal space. The reverse polarization stream is implemented as a cascade of reverse polarization steps. Each reverse polarization step includes a shuffle function, a split function, a scaling function and an offset function. Machine-learning techniques may be used to implement the scaling function and the offset function. A receiver may implement a polarization stream to recover the source signal.
摘要:
A transmitter and receiver are provided for communication over a noisy channel in a wireless communications system. The transmitter and receiver use polar coding to provide reliability of data transmission over the noisy wireless channel. In addition, signature bits are inserted in some unreliable bit positions of the polar code. For a given codeword, the receiver with knowledge of the signature can more effectively decode the codeword. Cyclic redundancy check (CRC) bits may also included in the input vector to assist in decoding.
摘要:
A transmitter and receiver are provided for communication over a noisy channel in a wireless communications system. The transmitter and receiver use polar coding to provide reliability of data transmission over the noisy wireless channel. In addition, signature bits are inserted in some unreliable bit positions of the polar code. For a given codeword, the receiver with knowledge of the signature can more effectively decode the codeword. Cyclic redundancy check (CRC) bits may also included in the input vector to assist in decoding.
摘要:
A system and method of non-orthogonal multiple access (NoMA) transmission using a configurable NoMA scheme is provided. A bit level processor, a modulation block, a phase and amplitude adjuster, and a symbol to resource element mapper collectively produce a NoMA signal for output or transmission. A NoMA scheme implemented by the system and method is configurable through one or more NoMA configuration inputs that configure one or more of the bit level processor, the modulation block, the phase and amplitude adjustment block and the symbol to resource element mapper. A multiple access (MA) signature produced by the apparatus once configured for the particular NoMA scheme is selectable through one or more MA signature inputs.
摘要:
Methods for encoding and decoding Polar codes are provided, together with apparatuses for performing the methods. An encoding method combines first and second sequences of information bits and CRC bits and a plurality of frozen bits into an input vector. The input vector is multiplied by a generator matrix for a Polar code to produce a concatenated codeword. A decoding method receives such a codeword and produces a decoded vector by generating successive levels of a decision tree. For a first number of levels of the decision tree, paths beyond a first maximum number of most probable paths are discarded. For a second number of levels of the decision tree, paths beyond a second maximum number of most probable paths are discarded. In some cases, the decoding method may have improved performance compared to some decoding methods for non-concatenated codewords.
摘要:
An improved method of computer communication and networking with error-correction encoding and transmission using a punctured polar code construction that is based on polar code decomposition is provided. Advantageously, this allows sorting of a reliability sequence to be performed for a reduced-length vector to identify the information bit positions in the reduced-length polar code vector. Polar code decomposition is used to determine a number of information bits allocated to given reduced-length vector (e.g., K0 and K1). The polar code construction is a function of a puncturing pattern. In some embodiments, the puncturing pattern is a shortening pattern.
摘要:
Input bits are encoded into codewords that include coded bits. Encoding involves applying a first set of polar encoding matrices GY of prime number dimension Y to the input bits to produce output bits, and applying a second set of polar encoding matrices GZ of prime number dimension Z to the output bits to produce the codeword. One or both of GX and GY could be non-2-by-2. Such kernel design and other aspects of code construction, including reliabilities and selection of sub-channels for code construction, non-CRC-aided error correction, and code shortening and puncturing, are discussed in further detail herein.
摘要:
Systems and methods are disclosed that relate to performing rate matching when using polar codes. In one embodiment, a plurality of bits are received at a polar encoder. A value is obtained that corresponds to at least one of: a coding rate to be used to transmit the plurality of bits, and a number of coded bits to be used to transmit the plurality of bits. It is determined which range of values the value falls within, and an information sequence is obtained that corresponds to the range the value falls within. The plurality of bits are mapped to a subset of positions of an input vector according to the information sequence. The remaining positions of the input vector are set as frozen values that are known by a decoder. The input vector is then encoded in the polar encoder to generate a codeword.
摘要:
Systems and methods for Polar encoding with a blockwise checksum are provided. The method involves processing a set of K information blocks to produce a blockwise checksum with u blocks, where K>=2, and u>=1, and where each information block or checksum block contains P bits. The blockwise checksum may, for example, be a Fletcher checksum. The Polar code may be based on an m-fold Kronecker product matrix. Then, an N-bit input vector is produced with P×K information bits and the P×u blockwise checksum bits, and with N−PK−Pu frozen bits, where N=2m where m>=2. The N-bit input vector is processed to produce a result equivalent to multiplying the input vector by a Polar code generator matrix to produce a codeword. The codeword is then transmitted or stored.
摘要:
A blind carrier frequency offset estimator is based on a single-OFDM-symbol training sequence in multi-user OFDMA uplink. Through multiple access interference modeling and analysis, a virtual user is employed that occupies the all null sub-carriers. By minimizing the energy leakage on the virtual user in term of tentative frequency offsets, the estimator can approach the real frequency offset. The estimator performs only on frequency-domain, simplifies interference calculations, and lowers the rank of the matrix. An iterative computation method is used to approach the real frequency offset.