This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Study of Design of Rate-Compatible Polar Codes Based on Non-Uniform Channel Polarization

Robert M. Oliveira and Rodrigo C. de Lamare Robert M. Oliveira and Rodrigo C. de Lamare - Centre for Telecommunications Studies (CETUC), Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Rio de Janeiro-RJ, Brasil, E-mails: rbtmota@gmail.com e delamare@cetuc.puc-rio.br. Part of this work has been reported in a conference paper presented at ISWCS 2019.
Abstract

We propose a novel scheme for rate-compatible arbitrary-length polar code construction for the additive white Gaussian noise (AWGN) channel. The proposed scheme is based on the concept of non-uniform channel polarization. The original polar codes can only be designed with code lengths that are powers of two. Puncturing, shortening and extension are three strategies to obtain arbitrary code lengths and code rates for polar codes. There are other ways to design codes with arbitrary length but which have encoding and decoding with higher complexity such as multi-kernel, concatenated codes and specific constructions for Belief propagation (BP) or Successive Cancellation (SC) decoding. In general, the quality of the projected bit channels by these arbitrary-length techniques differs from that of the original bit channels, which can greatly affect the performance of the constructed polar codes. The proposed Non-Uniform Polarization based on Gaussian Approximation (NUPGA) is an efficient construction technique for rate-compatible arbitrary-length polar codes, which chooses the best channels (i.e., selects the positions of the information bits) by re-polarization of the codeword with desired length. A generalization of the Gaussian Approximation is devised for both polarization and re-polarization processes. We also present shortening and extension techniques for design polar codes. Simulations verify the effectiveness of the proposed NUPGA designs against existing rate-compatible techniques.

Index Terms:
Channel Polarization, Non-uniform Polarization, Re-polarization, Arbitrary-length, Rate-Compatible, Polar Codes.

I Introdution

Polar codes, introduced by Arikan [1], were proved to achieve the symmetric capacity of binary input symmetric discrete memoryless channels (B-DMCs) under a Successive Cancellation (SC) decoder as the codelength goes to infinity. The block error rate converges to zero as the code length NN goes to infinity. Polar codes are based on the phenomenon of channel polarization. The channel polarization theorem states that, as the codelength NN goes to infinity, the polarized bit-channels become either a noiseless channels or pure noise channels. The information bits are transmitted over the noiseless bit-channels and the pure noise bit-channels are set to zero (frozen bits). The construction of a polar code involves the identification of channel reliability values associated to each bit to be encoded. This identification can be performed for a code length and a specific signal-to-noise ratio. Therefore, polar code construction refers to selecting an appropriate frozen bit position pattern and several polar code construction algorithms have been proposed. Polar codes were recently selected by the 3GPP group as the channel codes for the upcoming 5th generation mobile communication standard (5G) uplink/downlink control channel [2].

In the construction of polar codes, we recall that the code length NN of standard polar codes is limited to powers of two, i.e., N=2nN=2^{n}, however, the code length flexibility is required for practical applications. There are several construction techniques applied in the standard polar code model proposed by Arikan [1] considering the SC decoder. Among the most well-known polar codes construction techniques are the Bhattacharyya-based approach, proposed by Arikan [1], the Density Evolution (DE) schemes of Mori [3][4] and Tal [5], the Gaussian Approximation (GA) technique of [6] and the Polarization Weight (PW) algorithm [7]. The Bhattacharyya parameter-based approach was proposed along with Monte-Carlo (MC) simulations to estimate bit channel reliabilities [1]. The MC method needs to estimate the average error probability of each bit-channel via simulations. Therefore, encoding and SC decoding are required in each simulation. In the DE method, we need to compute the probability density function (PDF) of the log-likelihood-ratio (LLR) of each channel first and then choose the channels that are most likely to be correct. Since DE includes function convolutions, its precision is limited by the complexity. Similar to the MC method, the DE method has high computational cost. Extending the ideas of [3] and [4], Tal [5] devised two approximation methods by which one can get upper and lower bounds on the error probability of each bit-channel using efficient schemes of degrading and upgrading quantization. A bit-channel reliability estimation method for AWGN channels based on DEGA has been proposed in [6], giving accurate results with a significant reduction in complexity if compared with DE. The PW algorithm [7] is a recent attempt to study the partial order (PO) [8] for designing universal polar codes, which performs as well as GA but with much lower complexity. An important characteristic of polar codes is that the channel orderings are channel-dependent. PO is based on the observation that the channel orderings are degraded according to the binary expansion of their indexes. Therefore, in this method the channel orderings are not channel-dependent. PO provides us with quality information for all channels. This can be used to simplify code construction of polar codes. In [9] and [10] a comparative study of the performance of polar codes constructed by various techniques using the AWGN channel and SC decoder has been carried out. Construction of polar codes based on the AWGN channel and GA have been reported in [11] and [12]. In [9] the design of good polar codes with any construction method has been verified with the SC decoding error rate for various scenarios and polar code construction algorithms. Polar codes can also be constructed and adapted to a specific decoder, for example, construction of polar code for SCL decoding [13] and BP decoding [14][15]. In [16] the authors propose a genetic algorithm framework that jointly optimizes the code construction and rate with a specific decoder.

To obtain code length flexibility, arbitrary kernels and multi-kernel (MK), puncturing, shortening and extension are typically performed. Polarization matrices of various sizes, for example 3x3, 5x5 and 7x7, were used to build a polar code of any length. BCH kernel matrices proposed in [17] and the code decompositions proposed in [18] both have restrictions on the size of the kernel matrices. Square polarizing kernels larger than two have been proposed in [19], [20] and [21], while a polar code construction with mixed kernel sizes has been proposed in [22][23]. By considering different polarizing kernels of alternate dimensions, MK improves block length flexibility. Although the general coding and decoding structure follows the same structure of Arikan’s standard polar codes, there is an increased complexity with the generalization. Polar codes construction using the Reed-Muller (RM) rule [24][25][26] can improve the performance of the error rate.

Various shortening and puncturing methods for polar codes have been reported in [27]-[41]. Generally, puncturing or shortening causes a loss of performance because when the number of bits punctured or shortened increases the code length decreases, degrading the performance. A review on puncturing and shortening techniques can be found in [27], which includes designs based on the column weights (CW) of the generator matrix and the reversal quasi-uniform puncturing scheme (RQUP) based on bit reversed permutation. In practice, the design of the code is made for N=2nN=2^{n} and rate-compatible code design techniques use a specifically chosen criterion for shortening or puncturing and generate a codeword with length MM that is 2n1<M<2n2^{n-1}<M<2^{n}. In [28]-[30] puncturing methods have been reported using belief propagation (BP) decoding based on optimization techniques employing retransmission schemes such as Hybrid Automatic Repeat reQuest (HARQ). Different properties of punctured codes have been explored: minimum distance, exponent binding, stop tree drilling, and the reduced generating matrix method [31]-[34]. Schemes that depend on the analysis of density evolution were proposed in [35] and [36]. On the other hand, shortening methods have been studied with SC decoding. In shortening techniques, we freeze a bit channel that receives a fixed zero value. The decoder, however, uses a plus infinity log-likelihood ratio (LLR) for that code bit as it is often assumed that this value is known. The study in [37] proposed a search algorithm to jointly optimize the shortening patterns and set of frozen bits. The work in [38] devised a simple shortening method, reducing the generator matrix based on the weight of the columns (CW). In [39] the reversal quasi-uniform puncturing scheme (RQUP) for reducing the generator matrix has been proposed. The authors in [40] presented a polarization-driven (PD) shortening technique for the design of rate-compatible polar codes, which consists of reducing the generator matrix by relating its row index with the channel polarization. Recently, the PW algorithm has been used in a puncturing and shortening technique reported in [41].

Extension of polar codes have been studied in [42], [43] and [44]. For HARQ schemes it was proposed that an arbitrary number of incremental coded bits can be generated by extending the polarization matrix such that multiple retransmissions are aggregated to produce a longer polar code with extra coding gain. The complexity of the encoder and decoder are similar to that of standard polar codes. Nevertheless, there is a significant increase in complexity when designing flexible-length polar codes by concatenated codes [45], [49] and by asymmetric kernel construction [47]. In both cases the code construction is specific to each kernel dimension without generalization gains. Chained polar subcodes [48] were shown to be an effective method for achieving length compatible polar codes.

In this paper, we present the concept of non-uniform polarization, which allows the construction of rate-compatible polar codes considering the polarization of channels with an arbitrary distribution of the Bhattacharyya parameter. Generalized channel polarization schemes have been proposed in [49] and [50]. In [49] the authors present a rate-matching scheme for multi-channel polar codes, which can be directly applied to bit-interleaved coded modulation schemes. Moreover, in [50] polar coding schemes are introduced for independent parallel channels in which the channel parameters are no longer fixed but exhibit some random behaviors.

The original construction of Arikan [1] considers a single Bhattacharyya parameter to all channels, which we call uniform polarization. We develop a Non-Uniform Polarization technique based on the Gaussian Approximation (NUPGA) for designing rate-compatible polar codes of arbitrary length [54]. We then develop NUPGA-based shortening and extension algorithms for rate-compatible polar code designs. In the proposed techniques the shortened or extended channels are re-polarized for a more efficient choice of noiseless channels. We also present a generalization of the GA algorithm, which is used for both polarization of the initial channel and re-polarization of the shortened channel, and we present a simplified construct technique for extended polar codes. Simulations compare the proposed NUPGA techniques with existing approaches. A key feature of the proposed designs in that, the encoder and decoder structures are the same as that of the original polar codes [1] and require the same complexity.

In summary, the main contributions of this work are:

  • a novel NUPGA approach for designing rate-compatible polar codes along with a proof that it achieves capacity;

  • NUPGA-based shortening and extension techniques for designing rate-compatible polar codes;

  • an extensive simulation study that compares the NUPGA and existing design techniques.

The rest of the paper is organized as follows. In Section II, we present a brief review of the fundamentals of polar codes required for our exposition, outline their notation, and describe their encoding and SC/SCL decoding. In Section III, we review the principles of polarization theory of polar codes. In Section IV, we discuss the non-uniform polarization of polar codes and show that similarly to uniform polarization, it achieves channel capacity. In Section V, we give a detailed description of the proposed NUPGA-based shortening and extension techniques along with the pseudo-codes for their implementation. We present our simulation results in Section VI and the conclusions in Section VII.

II Polar codes

In this section we review some fundamental aspects of polar codes that will help in the exposition of the proposed techniques. Using the notation proposed by Arikan [1], we describe key principles of the encoder and the decoder of polar codes.

Given a B-DMC W:𝒳𝒴W:\mathcal{X}\to\mathcal{Y}, where 𝒳=\mathcal{X}= {0,1}\{0,1\} and 𝒴\mathcal{Y} denote the input and output alphabets, respectively, we define the channel transition probabilities as W(y|x)W(y|x), x𝒳x\in\mathcal{X}, y𝒴y\in\mathcal{Y}. As demonstrated in [1], after channel combining and splitting operations on N=2nN=2^{n} independent uses of WW, we get NN successive uses of synthesized binary input channels WN(i)W^{(i)}_{N} with i=1,2,,Ni=1,2,\ldots,N. KK represents the most reliable sub-channels. The indices of KK form the set of information 𝒜\mathcal{A}. They are the ones that carry the information bits. The indices of the remaining sub-channels are included in the complementary set 𝒜c\mathcal{A}^{\text{c}}, and can be set to fixed bit values, all zeros.

A polar codes scheme is uniquely defined by three parameters: code-length N=2nN=2^{n}, code-rate R=K/NR=K/N and an information set 𝒜\mathcal{A}\in [N][N] with cardinality KK. For encode we have x1N=u1NGNx^{N}_{1}=u^{N}_{1}\textbf{G}_{N}, where GN\textbf{G}_{N} is the transform matrix, u1N{0,1}Nu^{N}_{1}\in\{0,1\}^{N} is the source block and x1N{0,1}Nx^{N}_{1}\in\{0,1\}^{N} is the codeword. The source block u1Nu^{N}_{1} is comprised of information bits u𝒜u_{\mathcal{A}} and frozen bits u𝒜cu_{\mathcal{A}^{\text{c}}}. The NN-dimensional matrix can be recursively defined as GN=BNF2n\textbf{G}_{N}=\textbf{B}_{N}\textbf{F}^{\otimes n}_{2}, where \otimes denotes the Kronecker product, F2=[1011]\textbf{F}_{2}=\footnotesize\left[\begin{array}[]{cc}1&0\\ 1&1\end{array}\right] and BN\textbf{B}_{N} is the bit-reversal permutation matrix, which can be omitted without loss of generality. Then, the codeword is transmitted to the receiver through AWGN channel.

We may adopt the SC decoder so that the information bits are estimated as [1]:

u^i=argmaxui{0,1}WN(i)(y1N,u1i1|ui),iA.\hat{u}_{i}=\arg\max\limits_{u_{i}\in\{0,1\}}\ W_{N}^{(i)}(y_{1}^{N},u_{1}^{i-1}|u_{i}),i\in A. (1)

Having known the decoded bits u^1N=(u^1,,u^N)\hat{u}^{N}_{1}=(\hat{u}_{1},\ldots,\hat{u}_{N}) and received sequence y1N=(y1,,yN)y^{N}_{1}=(y_{1},\ldots,y_{N}), the likelihood ratio (LR) message of uiu_{i}, LR(ui)=WN(i)(y1N,u^1i1|0)WN(i)(y1N,u^1i1|1){\rm LR}(u_{i})=\frac{W^{(i)}_{N}(y^{N}_{1},\hat{u}_{1}^{i-1}|0)}{W^{(i)}_{N}(y^{N}_{1},\hat{u}_{1}^{i-1}|1)}, can be recursively calculated using the SC decoding algorithm [1]. Then, ui^\hat{u_{i}}, an estimated value of uiu_{i}, can be computed by:

u^i={hi(y1N,u^1i1),if i𝒜.ui,if i𝒜c.\hat{u}_{i}=\begin{cases}h_{i}(y_{1}^{N},\hat{u}_{1}^{i-1}),&\text{if $i\in\mathcal{A}$}.\\ u_{i},&\text{if $i\in\mathcal{A}$${}^{c}$}.\end{cases} (2)

where hi:𝒴N×𝒳h_{i}:\mathcal{Y}^{\text{N}}\times\mathcal{X} i1𝒳{}^{i-1}\to\mathcal{X}, i𝒜i\in\mathcal{A}, are decision functions defined as:

hi(y1N,u^1i1)={0,if WN(i)(y1N,u^1i1|0)WN(i)(y1N,u^1i1|1)11,otherwise.h_{i}(y_{1}^{N},\hat{u}_{1}^{i-1})=\begin{cases}0,&\text{if $\frac{W^{(i)}_{N}(y^{N}_{1},\hat{u}_{1}^{i-1}|0)}{W^{(i)}_{N}(y^{N}_{1},\hat{u}_{1}^{i-1}|1)}\geq 1$}\\ 1,&\text{otherwise}.\end{cases} (3)

for y1N𝒴Ny_{1}^{N}\in\mathcal{Y}^{\text{N}}, u^1\hat{u}_{1} i1𝒳{}^{i-1}\in\mathcal{X} i-1.

The LR output from the node at row ii and stage jj is denoted as L(i,j)L(i,j), according to the decoding tree in [1]. In order to calculate L(i,j)L(i,j), as proposed in [1], we compute the following equation recursively:

L(i,j+1)={f(L(i,j),L(i+n/2j+1,j)),(f nodes)g(L(in/2j+1,j),L(i,j),u^sum),(g nodes)L(i,j+1)=\\ \begin{cases}f(L(i,j),L(i+n/2^{j+1},j)),&\text{($f$ nodes)}\\ g(L(i-n/2^{j+1},j),L(i,j),\hat{u}_{sum}),&\text{($g$ nodes)}\end{cases} (4)

where ff and gg functions were defined in [1] as:

f(a,b)=1+aba+bf(a,b)=\frac{1+ab}{a+b} (5)
g(a,b,u^sum)=a12u^sumbg(a,b,\hat{u}_{sum})=a^{1-2\hat{u}_{sum}}b (6)

Notice that in (6), u^sum\hat{u}_{sum} is the modulo-2 sum of partial previous decoded bits. The term u^sum\hat{u}_{sum} depicts the successive operation in the SC algorithm. The decision on the current bit strongly depends on the estimate of previously decoded bits. A log-likelihood ratio (LLR)-based SC algorithm has been developed in [51] to simplify the design. Accordingly, (5)-(6) in the natural domain are transformed to the following equations in the logarithm domain:

F(a,b)=2tanh1(tanh(a/2)tanh(b/2))F(a,b)=2\text{tanh}^{-1}(\text{tanh}(a/2)\text{tanh}(b/2)) (7)
G(a,b,u^sum)=a(1)u^sum+b.G(a,b,\hat{u}_{sum})=a(-1)^{\hat{u}_{sum}}+b. (8)

Similar to LDPC decoding, a min-sum approximation [51] can be further employed to reduce the complexity of (7):

F(a,b)sign(a)sign(b)min(|a|,|b|),F(a,b)\approx\text{sign}(a)\text{sign}(b)\min(|a|,|b|), (9)

where (8)-(9) describe the LLR version of the SC algorithm.

For the sucessive cancelation list (SCL) decoder [52], let S(i)S^{(i)} denote the set of candidate sequences in the iith step of the decoding process, and |S(i)||S^{(i)}| is the size of S(i)S^{(i)}. Let LL be the maximum allowed size of the list and TT be a threshold for pruning with T1T\leq 1. The SCL algorithm can be described as follows:

  • bits are estimated successively with index i=1,2,,ni=1,2,\ldots,n; for each candidate in the list,

  • generate two ii-length sequences for decoding u^i\hat{u}_{i} as bit 0 and bit 1 by SC decoding;

  • if the number of candidates |S(i)||S^{(i)}| is not larger than LL, there is nothing to do;

  • otherwise, reserve LL candidates with the largest probabilities and drop the others from S(i)S^{(i)};

  • check each candidate u^iS(i)\hat{u}_{i}\in S^{(i)}, if P(u^1i)<Tmaxu^1iS(i)P(u^1i)P(\hat{u}_{1}^{i})<T\max\limits_{\hat{u}_{1}^{i}\in S^{(i)}}P(\hat{u}_{1}^{i}), eliminate u^1i\hat{u}_{1}^{i} from S(i)S^{(i)}.

For sequence estimation, after all the bits are examined, re-encode every candidate in the list and calculate the corresponding likelihood probabilities. Select the one with the maximal probability as the sequence estimate:

u^1N=argmaxu^1NS(i)i=1NW(yi|(u1N)i).\hat{u}_{1}^{N}=\arg\max\limits_{\hat{u}_{1}^{N}\in S^{(i)}}\prod\limits_{i=1}^{N}W(y_{i}|(u_{1}^{N})_{i}). (10)

III Theoretical aspects of polar codes construction

In this section, we recall the theoretical aspects of the construction of polar codes and show that the channel polarization theory can be generalized to non-uniform channels. In this scenario, the main aspects of the channel polarization theory are maintained, namely, the conservation of the associated channel capacity and the induction to the polarized channel [1].

III-A PC construction

To construct polar codes, it is necessary to find the set of indices for the information bits, 𝒜\mathcal{A}. Standard polar codes can have length N=2nN=2^{n} distinct bit-channels (WN)(W_{N}). If NN\to\infty, these bit-channels are divided into either noise free or completely noisy channels. To measure the quality of a binary input channel WW, the Bhattacharyya parameter of WW, which is indicated by Z(W)Z(W) [1] and defined as

Z(W)=y𝒴W(y|x=0)W(y|x=1),Z(W)=\sum_{y\in\mathcal{Y}}\sqrt{W(y|x=0)W(y|x=1)}, (11)

where W(Y|X)W(Y|X) is the channel transitional probability of input alphabet 𝒳\mathcal{X} ={0,1}=\{0,1\} and output alphabet 𝒴\mathcal{Y}, x𝒳x\in\mathcal{X}, y𝒴y\in\mathcal{Y}. For any binary discrete memoryless channel (BDMC), the reliability of bit-channels can be recursively determined [1], and with the exception of the BEC channel, for all other channels its method of determination is approximate [1], and as seen earlier, several algorithms have been proposed [9]. For example, BEC channels with Z(W)Z(W) close to zero are almost noiseless, whereas channels with Z(W)Z(W) close to one are almost pure-noise channels. The essential idea is to choose the most reliable bit-channels (noise free channels) to transmit information bits (𝒜\mathcal{A}), while noisy bit channels known to both encoder and decoder are frozen (𝒜c\mathcal{A}^{\text{c}}).

For the construction of arbitrary-length polar codes, a generalization of channel polarization is necessary for the definition of non-uniform polarization, maintaining the primary results of the channel polarization theory. First, we will generalize channel types to see if full capacity is maintained. Then, we will verify if the channel polarization theory is valid for non-uniform channels.

III-B Channel capacity

Consider the discrete memoryless channel (DMC) shown in Fig. 1, where it is seen that the symbol UU is passed through the DMC designated by the symbol WW.

Refer to caption
Figure 1: Discrete memoryless channel with random variables

The symbol at the input of the DMC can be considered as generated by a discrete random variable UU. Similarly, the symbol at the output of the channel is modeled by another discrete random variable YY. Then, a set of DMC channels from Fig. 1 can be shown as in Fig. 2a. The Bhattacharyya parameter is Z(W)Z(W) for all DMC channels. Consider the transmission of NN different symbols [u1u2uN][u_{1}u_{2}\cdots u_{N}] through the channel in a serial manner. Consider that these NN symbols are generated by independent and identically distributed (i.i.d.) random variables. Without loss of generality, we consider that the transmission of each symbol is through each channel separately, as in Fig. 2a. Therefore, the deduction of the system’s capacity will be the same as if we use other channels, that is, non-uniform channels, as suggested in Fig. 2b.

Refer to caption
Figure 2: (a) Uniform DMC and (b) non-uniform DMC

Now, the Bhattacharyya parameter is different for all DMC channels. The mutual information for Fig. 2a and Fig. 2b are shown below.

Let U=[U1U2UN]\textbf{U}=[U_{1}\ U_{2}\ \cdots\ U_{N}] and Y=[Y1Y2YN]\textbf{Y}=[Y_{1}\ Y_{2}\ \cdots\ Y_{N}] then the mutual information between U and Y can be written as

I(U;Y)=I(U1;Y)+I(U2;Y|U1)+I(U3;Y|U1,U2)++I(UN;Y|U1,U2,,UN1).\begin{split}I(\textbf{U};\textbf{Y})&=I(U_{1};\textbf{Y})+I(U_{2};\textbf{Y}|U_{1})+I(U_{3};\textbf{Y}|U_{1},U_{2})\\ &\quad+\cdots+I(U_{N};\textbf{Y}|U_{1},U_{2},\cdots,U_{N-1}).\end{split} (12)

If U1U_{1} is independent of Y1Y_{1}, Y2Y_{2}, \cdots, YNY_{N}, then we can write that

I(U1;Y)=I(U1;Y1)I(U2;Y|U1)=I(U2;Y2)I(U3;Y|U1,U2)=I(U3;Y3)I(UN;Y|U1,U2,,UN1)=I(UN;YN)\begin{split}I(U_{1};\textbf{Y})&=I(U_{1};Y_{1})\\ I(U_{2};\textbf{Y}|U_{1})&=I(U_{2};Y_{2})\\ I(U_{3};\textbf{Y}|U_{1},U_{2})&=I(U_{3};Y_{3})\\ I(U_{N};\textbf{Y}|U_{1},U_{2},\cdots,U_{N-1})&=I(U_{N};Y_{N})\end{split}

Then, (12) can be written as

I(U;Y)=I(U1;Y1)+I(U2;Y2)+I(U3;Y3)++I(UN;YN)I(\textbf{U};\textbf{Y})=I(U_{1};Y_{1})+I(U_{2};Y_{2})+I(U_{3};Y_{3})+\cdots+I(U_{N};Y_{N}) (13)

and let the capacity be C=maxI(U;Y)C=\text{max}I(\textbf{U};\textbf{Y}), then we have

maxI(U;Y)=maxI(U1;Y1)+maxI(U2;Y2)++maxI(UN;YN)maxI(U;Y)=NC\begin{split}\text{max}I(\textbf{U};\textbf{Y})&=\text{max}I(U_{1};Y_{1})+\text{max}I(U_{2};Y_{2})\\ &\quad+\cdots+\text{max}I(U_{N};Y_{N})\\ \text{max}I(\textbf{U};\textbf{Y})&=NC\end{split} (14)

However, a key concept of channel polarization is that it consists of a method where the channel outputs depend on the other inputs as well. This implies the following inequalities:

I(U1;Y)I(U1;Y1)I(U2;Y|U1)I(U2;Y2)I(U3;Y|U1,U2)I(U3;Y3)I(UN;Y|U1,U2,,UN1)I(UN;YN)\begin{split}I(U_{1};\textbf{Y})&\neq I(U_{1};Y_{1})\\ I(U_{2};\textbf{Y}|U_{1})&\neq I(U_{2};Y_{2})\\ I(U_{3};\textbf{Y}|U_{1},U_{2})&\neq I(U_{3};Y_{3})\\ I(U_{N};\textbf{Y}|U_{1},U_{2},\cdots,U_{N-1})&\neq I(U_{N};Y_{N})\end{split}

That is, (12) cannot be simplified as in (13). In addition, it is necessary to ensure that

I(U1;Y)<I(U3;Y|U1,U2)I(U2;Y|U1)<<I(UN;Y|U1,U2,,UN1),\begin{split}I(U_{1};\textbf{Y})&<I(U_{3};\textbf{Y}|U_{1},U_{2})\leq I(U_{2};\textbf{Y}|U_{1})\\ <\cdots&<I(U_{N};\textbf{Y}|U_{1},U_{2},\cdots,U_{N-1}),\end{split} (15)

which means the individual capacities increase in an orderly manner but the total capacity remains constant, i.e., the total capacity of the channels is maintained, regardless of whether the channels are equal or not, that is, uniform or non-uniform, with different Bhattacharyya parameters. Then, for uniform channels, according to (14), and for non-uniform channels, with the inequality of (15), the capacity of the channels is conserved, and we show that non-uniform polarization schemes achieve symmetric capacity:

maxI(U;Y)=i=1NCi=NC\text{max}I(\textbf{U};\textbf{Y})=\sum_{i=1}^{N}C_{i}=NC (16)

Therefore, we can devise methods to construct polar codes that take into account different Bhattacharyya parameters. It is necessary to verify whether the theory of channel polarization [1] converges also for non-uniform channels. In the next sections, we show the main results for channel capacity, channel polarization and polarization convergence. Then, we show that all results remain valid for the case of generalized channels.

III-C Uniform construction

In the classic construction of Arikan [1] the channel polarization considers Z(W)Z(W) identical for all channels. Let W:𝒳𝒴W:\mathcal{X}\to\mathcal{Y} denote a general symmetric binary input discrete memoryless channel (B-DMC), with input alphabet 𝒳=\mathcal{X}= {0,1}\{0,1\}, output alphabet 𝒴\mathcal{Y} and the channel transition probability W(y|x)W(y|x), x𝒳x\in\mathcal{X}, y𝒴y\in\mathcal{Y}. We write WNW^{N} to denote the channel corresponding to NN uses of WW: thus WN:𝒳W^{N}:\mathcal{X} N 𝒴\to\mathcal{Y} N with

WN(y1N|x1N)=i=1NW(yi|xi)W^{N}(y_{1}^{N}|x_{1}^{N})=\prod_{i=1}^{N}W(y_{i}|x_{i}) (17)

The mutual information with equiprobable inputs, or symmetric capacity, is defined by [1]

I(W)=yYxX12W(y|x)logW(y|x)12W(y|0)+12W(y|1),I(W)=\sum\limits_{y\in Y}\sum\limits_{x\in X}\frac{1}{2}W(y|x)\log\frac{W(y|x)}{\frac{1}{2}W(y|0)+\frac{1}{2}W(y|1)}, (18)

where the base-2 logarithm 0I(W)10\leq I(W)\leq 1 is employed, and the corresponding reliability metric, the Bhattacharyya parameter is given by [1]

Z(W)=yYW(y|0)W(y|1),Z(W)=\sum\limits_{y\in Y}\sqrt{W(y|0)W(y|1)}, (19)

where 0Z(W)10\leq Z(W)\leq 1. For any B-DMC WW, we have

log21+Z(W)I(W)1+Z(W)2.log\frac{2}{1+Z(W)}\leq I(W)\leq\sqrt{1+Z(W)^{2}}. (20)

Applying the channel polarization transform for NN independent uses of WW, after channel combining and splitting operation we obtain the group of polarized channels WN(i):𝒳𝒴×𝒳i-1W_{N}^{(i)}:\mathcal{X}\to\mathcal{Y}\times\mathcal{X}^{\text{i-1}}, i=1,2,,Ni=1,2,\ldots,N, defined by the transition probabilities

WN(i)(y1N,u1(i1)|ui)=ui+1NXN112N1WN(y1N|u1N),W_{N}^{(i)}(y_{1}^{N},u_{1}^{(i-1)}|u_{i})=\sum\limits_{u_{i+1}^{N}\in X^{N-1}}\frac{1}{2^{N-1}}W_{N}(y_{1}^{N}|u_{1}^{N}), (21)

where N=2nN=2^{n} is the code length.

Channel polarization is defined as an operation by which one generates NN independent copies of a given B-DMC WW and a second set of NN channels WN(i):1iNW_{N}^{(i)}:1\leq i\leq N that show a polarization effect in the sense that, as NN becomes large, the symmetric capacity terms I(WN(i))I(W_{N}^{(i)}) tend towards 0 or 11 for all but a vanishing fraction of indices ii.

Refer to caption
Figure 3: The Channel W2W_{2}

The recursion combines two independent copies of WW, as shown in Fig. 3, and obtains the channel W2:𝒳2𝒴2W_{2}:\mathcal{X}^{\text{2}}\to\mathcal{Y}^{\text{2}} with the transition probabilities

W2(1)(y12|u1)=u212W(y1|u1u2)W(y2|u2).W_{2}^{(1)}(y_{1}^{2}|u_{1})=\sum_{u_{2}}\frac{1}{2}W(y_{1}|u_{1}\oplus u_{2})W(y_{2}|u_{2}). (22)
W2(2)(y12|u1|u2)=12W(y1|u1u2)W(y2|u2).W_{2}^{(2)}(y_{1}^{2}|u_{1}|u_{2})=\frac{1}{2}W(y_{1}|u_{1}\oplus u_{2})W(y_{2}|u_{2}). (23)

The construction tree used in channel polarization is shown in Fig. 4 [1]. Note that it considers a uniform value of the Bhattacharyya parameter that is represented in the tree by WW.

Refer to caption
Figure 4: The tree process for the recursive channel construction.

For example, we show a set of results for BEC channels. Consider the transformation (WN(i),WN(i))(W2N(2i1),W2N(2i))(W_{N}^{(i)},W_{N}^{(i)})\to(W_{2N}^{(2i-1)},W_{2N}^{(2i)}) is rate-preserving and realiability-improving in the sense that [1], and produces as output the following two binary-input DMCs (with larger output alphabets):

(WN(i),WN(i))(W2N(2i1),W2N(2i))Z(W2N(2i))2Z(WN(i))Z(WN(i))2Z(W2N(2i1))Z(WN(i))2Z(W2N(2i1))Z(W2N(2i))\begin{split}(W_{N}^{(i)},W_{N}^{(i)})&\to(W_{2N}^{(2i-1)},W_{2N}^{(2i)})\\ Z(W_{2N}^{(2i)})&\leq 2Z(W_{N}^{(i)})-Z(W_{N}^{(i)})^{2}\\ Z(W_{2N}^{(2i-1)})&\leq Z(W_{N}^{(i)})^{2}\\ Z(W_{2N}^{(2i-1)})&\leq Z(W_{2N}^{(2i)})\end{split} (24)

and that by definition in (18), we have

I(W2N(2i))=I(U1;Y1,Y2),I(W2N(2i1))=I(U2;Y1,Y2,U1),\begin{split}I(W_{2N}^{(2i)})&=I(U_{1};Y_{1},Y_{2}),\\ I(W_{2N}^{(2i-1)})&=I(U_{2};Y_{1},Y_{2},U_{1}),\end{split} (25)

where U1U_{1} and U2U_{2} are iid. From the chain rule, it follows that

I(W2N(2i))+I(W2N(2i1))=I(U1;Y1,Y2)+I(U2;Y1,Y2,U1)=2I(WN(i))\begin{split}I(W_{2N}^{(2i)})+I(W_{2N}^{(2i-1)})&=I(U_{1};Y_{1},Y_{2})+I(U_{2};Y_{1},Y_{2},U_{1})\\ &=2I(W_{N}^{(i)})\end{split} (26)

and

I(W2N(2i))=I(U2;Y1,Y2,U1)I(WN(i)),\begin{split}I(W_{2N}^{(2i)})&=I(U_{2};Y_{1},Y_{2},U_{1})\\ &\geq I(W_{N}^{(i)}),\end{split} (27)

which results in

I(W2N(2i))I(W2N(2i1))I(W_{2N}^{(2i)})\geq I(W_{2N}^{(2i-1)}) (28)

For the case of the parameter ZZ in the BEC channel we have that the reliability terms further satisfy [1]

Z(W2N(2i1))2Z(WN(i))Z(WN(i))2Z(W_{2N}^{(2i-1)})\leq 2Z(W_{N}^{(i)})-Z(W_{N}^{(i)})^{2} (29)
Z(W2N(2i))=Z(WN(i))2.Z(W_{2N}^{(2i)})=Z(W_{N}^{(i)})^{2}. (30)

The cumulative rate and reliability satisfy [1]

i=1NI(WN(i))=NI(W).\sum_{i=1}^{N}I(W_{N}^{(i)})=NI(W). (31)
i=1NZ(WN(i))NZ(W).\sum_{i=1}^{N}Z(W_{N}^{(i)})\leq NZ(W). (32)

The uniform channel polarization for any set of B-DMCs W(i)W_{(i)}, i[1,N]i\in[1,N], ensures that for arbitrary small δ0\delta\leq 0 there exist polar codes that achieve the sum capacity IsI_{s}, in the sense that as NN\rightarrow\infty, which is a power of 2, the fraction of indices i[1,N]i\in[1,N] satisfies

|{i|I(WN(i))(1δ,1]}|NIsN,|{i|I(WN(i))[0,δ)}|N1IsN,\begin{split}\frac{|\{i|I(W_{N}^{(i)})\in(1-\delta,1]\}|}{N}\to\frac{I_{s}}{N},\\ \frac{|\{i|I(W_{N}^{(i)})\in[0,\delta)\}|}{N}\to 1-\frac{I_{s}}{N},\end{split} (33)

where the values of IN(i)I_{N}^{(i)} converge to {0,1}\{0,1\}.

IV Proposed Non-uniform Construction

In this section, we show a generalization of the equations presented in Section III.B, and we verify that for non-identical channels, that is, with different Bhattacharyya parameters, they also converge for channel polarization.

If the channels are independent but not uniform, then W(i):𝒳(i)𝒴(i)W_{(i)}:\mathcal{X}_{\text{(i)}}\to\mathcal{Y}_{\text{(i)}}, as shown in Fig. 5, where we rewrite (17) as

WN(y1N|x1N)=i=1NW(i)(yi|xi).W^{N^{\prime}}(y_{1}^{N^{\prime}}|x_{1}^{N^{\prime}})=\prod_{i=1}^{N^{\prime}}W_{(i)}(y_{i}|x_{i}). (34)
Refer to caption
Figure 5: The non-uniform channel W2W_{2^{\prime}}

We consider NN and NN^{\prime} with the same cardinality and in such a way that their transition probabilities W(i)(y|x)W_{(i)}(y|x) and W(j)(y|x)W_{(j)}(y|x) may differ if iji\neq j. A non-identical channel corresponds to a channel with different Bhattacharyya parameters. As in [1], given any B-DMC W(i)W_{(i)} the same definitions of the symmetric capacity (18) and the Bhattacharyya parameter (19) are adopted as performance measures, and rewritten as

I(W(i))=yYxX12W(i)(y|x)logW(i)(y|x)12W(i)(y|0)+12W(i)(y|1),I(W_{(i)})=\sum\limits_{y\in Y}\sum\limits_{x\in X}\frac{1}{2}W_{(i)}(y|x)\log\frac{W_{(i)}(y|x)}{\frac{1}{2}W_{(i)}(y|0)+\frac{1}{2}W_{(i)}(y|1)}, (35)
Z(W(i))=yiYW(i)(yi|0)W(i)(yi|1).Z(W_{(i)})=\sum\limits_{y_{i}\in Y}\sqrt{W_{(i)}(y_{i}|0)W_{(i)}(y_{i}|1)}. (36)

We notice that the relation in (20) is equivalent and can be rewritten as

log21+Z(W(i))I(W(i))1+Z(W(i))2,\log\frac{2}{1+Z(W_{(i)})}\leq I(W_{(i)})\leq\sqrt{1+Z(W_{(i)})^{2}}, (37)

where (21) remains valid.

The W2W_{2} channel with the transition probabilities of (22) and (23) can be written as

W2(1)(y12|u1)=u212W(1)(y1|u1u2)W(2)(y2|u2),W_{2}^{(1)}(y_{1}^{2}|u_{1})=\sum_{u_{2}}\frac{1}{2}W_{(1)}(y_{1}|u_{1}\oplus u_{2})W_{(2)}(y_{2}|u_{2}), (38)
W2(2)(y12,u1|u2)=12W(1)(y1|u1u2)W(2)(y2|u2).W_{2}^{(2)}(y_{1}^{2},u_{1}|u_{2})=\frac{1}{2}W_{(1)}(y_{1}|u_{1}\oplus u_{2})W_{(2)}(y_{2}|u_{2}). (39)

Using the BEC channel again as an example, for a comparison with Section III.B, for the case of the parameter ZZ we have:

Z(W2(2))=y12,u1W2(2)(y12,u1|u2=0)W2(2)(y12,u1|u2=1)=y12,u112W(1)(y1|u1)W(2)(y2|0)W(1)(y1|u1)W(2)(y2|1)=y2,u1W(2)(y2|0)W(2)(y2|1)y1,u112W(1)(y1|u1)W(1)(y1|u1)=Z(W(2))Z(W(1)).\begin{split}Z(W_{2}^{(2)})&=\sum_{y_{1}^{2},u_{1}}\sqrt{W_{2}^{(2)}(y_{1}^{2},u_{1}|u_{2}=0)W_{2}^{(2)}(y_{1}^{2},u_{1}|u_{2}=1)}\\ &=\sum_{y_{1}^{2},u_{1}}\frac{1}{2}\sqrt{W_{(1)}(y_{1}|u_{1})W_{(2)}(y_{2}|0)}\\ &\quad\cdot\sqrt{W_{(1)}(y_{1}|u_{1})W_{(2)}(y_{2}|1)}\\ &=\sum_{y_{2},u_{1}}\sqrt{W_{(2)}(y_{2}|0)W_{(2)}(y_{2}|1)}\\ &\quad\cdot\sum_{y_{1},u_{1}}\frac{1}{2}\sqrt{W_{(1)}(y_{1}|u_{1})W_{(1)}(y_{1}|u_{1})}\\ &=Z(W_{(2)})Z(W_{(1)}).\end{split} (40)

The reliability terms in (29) and in (30) are rewritten as

Z(W2(1))Z(W(1))+Z(W(2))Z(W(1))Z(W(2)),Z(W_{2}^{(1)})\leq Z(W_{(1)})+Z(W_{(2)})-Z(W_{(1)})Z(W_{(2)}), (41)
Z(W2(2))Z(W(1))Z(W(2)),Z(W_{2}^{(2)})\leq Z(W_{(1)})Z(W_{(2)}), (42)
Z(W2(2))Z(W2(1)).Z(W_{2}^{(2)})\leq Z(W_{2}^{(1)}). (43)

The cumulative rate in (31) and the reliability in (32) are then given by

i=1NI(WN(i))=i=1NI(W(i)),\sum_{i=1}^{N^{\prime}}I(W_{N^{\prime}}^{(i)})=\sum_{i=1}^{N^{\prime}}I(W_{(i)}), (44)
i=1NZ(WN(i))i=1NZ(W(i)).\sum_{i=1}^{N^{\prime}}Z(W_{N^{\prime}}^{(i)})\leq\sum_{i=1}^{N^{\prime}}Z(W_{(i)}). (45)
Refer to caption
Figure 6: The full polarization tree alternative.

We can show that (26) can be obtained by performing the following operations:

I(W2(1))=I(Y1,Y2,U1),I(W2(2))=I(Y1,Y2,U1;U2),I(W2(1))+I(W2(2))=I(Y1,Y2,U1)+I(Y1,Y2,U1;U2)=I(W1)+I(W2).\begin{split}I(W_{2}^{(1)})&=I(Y_{1},Y_{2},U_{1}),\\ I(W_{2}^{(2)})&=I(Y_{1},Y_{2},U_{1};U_{2}),\\ I(W_{2}^{(1)})+I(W_{2}^{(2)})&=I(Y_{1},Y_{2},U_{1})+I(Y_{1},Y_{2},U_{1};U_{2})\\ &=I(W_{1})+I(W_{2}).\end{split}

The non-uniform polarization channel for any set of B-DMCs WN(i)W_{N}^{(i)}, i[1,N]i\in[1,N], for arbitrary small δ0\delta\leq 0 there exist polar codes that achieve the sum capacity Is=1NIiI_{s}=\sum_{1}^{N}I_{i}, Ii=I(Xi,Yi)I_{i}=I(X_{i},Y_{i}) in the sense that as NN\rightarrow\infty, which is a power of 2, the fraction of indices i[1,N]i\in[1,N] satisfies

limi|{i|1NI(WN(i))(1δ,1]}|2iIsN,limi|{i|1NI(WN(i)))[0,δ)}|2i1IsN.\begin{split}\lim\limits_{i\to\infty}\frac{|\{i|\sum_{1}^{N}I(W_{N}^{(i)})\in(1-\delta,1]\}|}{2^{i}}\to\frac{I_{s}}{N},\\ \lim\limits_{i\to\infty}\frac{|\{i|\sum_{1}^{N}I(W_{N}^{(i)}))\in[0,\delta)\}|}{2^{i}}\to 1-\frac{I_{s}}{N}.\end{split} (46)

where the values of IN(i)I_{N}^{(i)} converge to {0,1}\{0,1\}, which is a novel result related to the established result for uniform channel polarization in (33).

V Proposed NUPGA Design Algorithms

In this section, we describe the proposed NUPGA design algorithms which employ the non-uniform construction. In the proposed NUPGA design algorithms, the tree process for the recursive channel polarization can be redesigned according to Fig.6 without loss of generalization, with the nodes being calculated using the functions described in (29) and (30).

V-A Proposed NUPGA-based shortening

We use the PD shortening technique [40] as a starting point to define the channels that will initially be shortened. We recall that, the purpose of a shortening technique is to reduce the codeword length NN to MM, that is 2n1<M<2n2^{n-1}<M<2^{n}. Let KK denote the number of information bits. Let NN denote the code length of the basic polar codes, and let MM denote the code length of the shortened polar codes, where K<M<NK<M<N. Let PP denote the shortening pattern, which is the index set of the shortened bits, and |P|=NM|P|=N-M denote the cardinality of shortened bits. The code rate of the shortened codes is R=K/MR=K/M. In shortening, the PP shortened bits of x1Nx^{N}_{1} are known at the decoder, such that the LLRs of them can be set to infinity for decoding. Consider that the vector PP contains the channels obtained by the PD shortening technique [40]. We first generate the codeword by defining the channel in PP as zero valued (frozen bits). We then reduce the length of the codeword message based on the PP. Polar codes are characterized by non-universality [1]. In this work, it is adopted the design-SNR equal to zero. As the code has been shortened, the reliability of the bit channels changes and the information set should change accordingly. In this regard, the study in [40] indicates that the order of channel polarization does not change after shortening. For the shortened channels, we consider the parameter Z(W)Z(W) penalized a frozen bit, and will be used as input in the NUPGA method.

Under AWGN channels, the LLRs of each subchannel, namely LN(i)L_{N}^{(i)}, the estimation of the channel polarization are calculated using the GA [6] algorithm with the following recursions:

{E(LN(2i1))=ϕ1(1(1ϕ(E(LN/2(i))))2)E(LN(2i))=2E(LN/2(i)),\begin{cases}E(L^{(2i-1)}_{N})=\phi^{-1}(1-(1-\phi(E(L^{(i)}_{N/2})))^{2})\\ E(L^{(2i)}_{N})=2E(L^{(i)}_{N/2}),\end{cases} (47)

where E[]E[\cdot] represents the mean of random variable, and

ϕ(x)={exp(0.4527x(0.86)+0.0218)if 0<x10πx(1107x)exp(x4)ifx>10\phi(x)=\begin{cases}\exp(-0.4527x^{(0.86)}+0.0218)\ {\rm if}\ 0<x\leq 10\\ \sqrt{\frac{\pi}{x}}(1-\frac{10}{7x})\exp(-\frac{x}{4})\ ~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}{\rm if}\ x>10\\ \end{cases} (48)

With the generalization we have modified (47) in order to make it applicable to arbitrary code lengths, with f=E(LN(2i1))f=E(L^{(2i-1)}_{N^{\prime}}) and g=E(LN(2i))g=E(L^{(2i)}_{N^{\prime}}) according to Fig.6. This results in the following proposed recursions:

{E(LN(2i1))=ϕ1(1(1ϕ(E(L1(i))))(1ϕ(E(L2(i)))))E(LN(2i))=E(L1(i))E(L2(i)).\begin{cases}E(L^{(2i-1)}_{N^{\prime}})=\phi^{-1}(1-(1-\phi(E(L^{(i)}_{1})))(1-\phi(E(L^{(i)}_{2}))))\\ E(L^{(2i)}_{N^{\prime}})=E(L^{(i)}_{1})E(L^{(i)}_{2}).\end{cases} (49)

The proposed NUPGA shortening algorithm is described in Algorithm 1. As an example, consider N=4N=4 and K=2K=2 and initially the scheme without shortening. Then we have that the non-shortened vector is P={1,1,1,1}P=\{1,1,1,1\}, which is the expected result for F={0,1,0,1}F=\{0,1,0,1\}. Now consider the shortened vector P={1,1,1,0}P=\{1,1,1,0\}, which is applied in the operation indicated in step 5 of Algorithm 1. Then, the evolved bit channel capabilities are Z([WN(i)])={0.21,1.64,2.28,0}Z([W^{(i)}_{N}])=\{0.21,1.64,2.28,0\} and the new information set F={0,1,1,0}F=\{0,1,1,0\}.

Algorithm 1 Proposed NUPGA Shortening Algorithm
1:INPUT: N,K,PN,K,P and design-SNR EdB=(REb/No)E_{dB}=(RE_{b}/N_{o}) in dB
2:OUTPUT: F{0,1,,N1}F\in\{0,1,\ldots,N-1\} with |F|=N|F|=N
3:S=10EdB/10S=10^{EdB/10} and n=log2Nn=log_{2}N
4:LRNL\in R^{N}, Initialize [E(L1(i)]1N=4S[E(L^{(i)}_{1}]^{N}_{1}=4S
5:Upgrade with shortening vector [E(L1(i))]1N[E(L^{(i)}_{1})]^{N}_{1} with PP
6:for i = 1 to n+1n+1 do
7:     d=2(i2)d=2^{(i-2)}
8:     for b = 1 do 2(i1)2^{(i-1)} to NN do
9:         for k = 0 to d1d-1 do
10:              if E(Lk+b(i1))=0E(L^{(i-1)}_{k+b})=0 or E(Lk+b+d(i1))=0E(L^{(i-1)}_{k+b+d})=0 then
11:                  E(Lk+b(i))=E(Lk+b(i1))E(L^{(i)}_{k+b})=E(L^{(i-1)}_{k+b})
12:                  E(Lk+b+d(i))=E(Lk+b+d(i1))E(L^{(i)}_{k+b+d})=E(L^{(i-1)}_{k+b+d})               end if
13:              E(Lk+b(i))=ϕ1(1(1ϕ(E(Lk+b(i1))))(1E(L^{(i)}_{k+b})=\phi^{-1}(1-(1-\phi(E(L^{(i-1)}_{k+b})))(1-
14:              ϕ(E(Lk+b+d(i1)))))\ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \phi(E(L^{(i-1)}_{k+b+d}))))
15:              E(Lk+b+d(i))=E(Lk+b(i1))E(Lk+b+d(i1))E(L^{(i)}_{k+b+d})=E(L^{(i-1)}_{k+b})E(L^{(i-1)}_{k+b+d})          end for      end for end for
16:F=Findindicesofsmallestelements(E[L],K)F={\rm Find~{}indices~{}of~{}smallest~{}elements~{}}(E[L],K)
17:return FF

V-B Proposed NUPGA-based extension

A simple polar codes extension scheme can be implemented as suggested in Fig.7 [44]. An additional level of polarization is performed in P1MP_{1}^{M} and the information bits u1ku_{1}^{k}. The connection between the additional channels P1MP_{1}^{M} and channels ukMku_{k-M}^{k} is carried out by the linear polarization sequence of u1ku_{1}^{k}. In the extension scheme the complexity is NlogNNlogN, less than the puncturing/shortening scheme which is (N+1)log(N+1)(N+1)log(N+1). This scheme is efficient for kernels with low dimension (N<512N<512) and for extension of P<50%P<50\% of NN. Using the proposed NUPGA technique, we can consider all additional bit channels as P1M=0P_{1}^{M}=0 and as bits output from polarized channels ukMku_{k-M}^{k}, uniform and limited to the length of the extension. For the encoder we have the same definition, that is, P1M=0P_{1}^{M}=0. In the decoder, we have

u^1k=f(LLR((u1k)+LLR(ukMk)),\hat{u}_{1}^{k}=f(LLR((u_{1}^{k})+LLR(u_{k-M}^{k})), (50)

in the same order.

Refer to caption
Figure 7: Polar code extension scheme

Note that according to (44), we have

i=1NI(WN(i))+i=1MI(WM(i))=i=1NI(W(i))+i=1MI(W(i))\sum_{i=1}^{N}I(W_{N}^{(i)})+\sum_{i=1}^{M}I(W_{M}^{(i)})=\sum_{i=1}^{N}I(W_{(i)})+\sum_{i=1}^{M}I(W_{(i)})\\

this only happens in the following two cases: either WN(i)W_{N}^{(i)} and WM(i)W_{M}^{(i)} are noise channel and both of the I()I(\cdot) are equal to 1, or WN(i)W_{N}^{(i)} and WM(i)W_{M}^{(i)} are both perfect channel such that the two I()I(\cdot) are equal to 0. Using NUPGA, when WN(i)W_{N}^{(i)} is perfect and WM(i)W_{M}^{(i)} is useless, the two I()I(\cdot) are 1 and 0, respectively. In other words, if the extended bit channel WM(i)W_{M}^{(i)} is noise channel and excluding the case that both WN(i)W_{N}^{(i)} and WM(i)W_{M}^{(i)} are perfect channel, the re-polarization improves the reliability of the shortened channels. With regards to (45), we have

i=1NZ(WN(i))+i=1MZ(WM(i))i=1NZ(W(i))+i=1MZ(W(i))\sum_{i=1}^{N}Z(W_{N}^{(i)})+\sum_{i=1}^{M}Z(W_{M}^{(i)})\leq\sum_{i=1}^{N}Z(W_{(i)})+\sum_{i=1}^{M}Z(W_{(i)})

and with the use of NUPGA, we have

i=1MZ(WM(i))i=1NZ(WN(i))\sum_{i=1}^{M}Z(W_{M}^{(i)})\leq\sum_{i=1}^{N}Z(W_{N}^{(i)})

and then

i=1MZ(W(i))i=1NZ(W(i))\sum_{i=1}^{M}Z(W_{(i)})\leq\sum_{i=1}^{N}Z(W_{(i)})

which ensures that the extended channels will all be noisy.

This method is similar to the extension of the polarization matrix proposed in [43] and [44]. Note that the construction method for polar codes extension allows us to maintain the same encoder and decoder for codeword N. In the proposed NUPGA Extension algorithm, the original codeword of the channels initially designed is first extended by adding new bits. Thus, it is possible to increase the code length by gradually adding new bits, making it possible to build codewords of any length. The information bit channels are polarized according to the reliability of the bit channel calculated from the new extended channels. The main idea of the proposed NUPGA extension algorithm is to generate the new bit channels as frozen bits and make the associated information bits more reliable than before. The extension length is ΔM\Delta M and the new rate is M=(N+ΔM)M=(N+\Delta M) which can still be decoded efficiently. Therefore, the proposed NUPGA extension algorithm is employed for the design of extension channels. The details of the proposed NUPGA extension algorithm are shown in Algorithm 2.

Algorithm 2 Proposed NUPGA Extension Algorithm
1:INPUT: N,K,P,ΔMN,K,P,\Delta M and design-SNR EdB=(REb/No)E_{dB}=(RE_{b}/N_{o}) in dB
2:OUTPUT: F{0,1,,N+ΔM1}F\in\{0,1,\ldots,N+\Delta M-1\}
3:S=10EdB/10S=10^{EdB/10}, n=log2Nn=log_{2}N
4:LRNL\in R^{N}, Initialize [E(L1(i))]1N=4S[E(L^{(i)}_{1})]^{N}_{1}=4S and [E(L1(i))]NΔM=0[E(L^{(i)}_{1})]^{\Delta M}_{N}=0
5:Upgrade with vector [E(L1(i))]1N[E(L^{(i)}_{1})]^{N}_{1} with PP
6:for i = 1 to n+1n+1 do
7:     d=2(i2)d=2^{(i-2)}
8:     for b = 1 do 2(i1)2^{(i-1)} to NN do
9:         for k = 0 to d1d-1 do
10:              if E(Lk+b(i1))=0E(L^{(i-1)}_{k+b})=0 or E(Lk+b+d(i1))=0E(L^{(i-1)}_{k+b+d})=0 then
11:                  E(Lk+b(i))=E(Lk+b(i1))E(L^{(i)}_{k+b})=E(L^{(i-1)}_{k+b})
12:                  E(Lk+b+d(i))=E(Lk+b+d(i1))E(L^{(i)}_{k+b+d})=E(L^{(i-1)}_{k+b+d})               end if
13:              E(Lk+b(i))=ϕ1(1(1ϕ(E(Lk+b(i1))))(1E(L^{(i)}_{k+b})=\phi^{-1}(1-(1-\phi(E(L^{(i-1)}_{k+b})))(1-
14:              ϕ(E(Lk+b+d(i1)))))\ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \phi(E(L^{(i-1)}_{k+b+d}))))
15:              E(Lk+b+d(i))=E(Lk+b(i1))E(Lk+b+d(i1))E(L^{(i)}_{k+b+d})=E(L^{(i-1)}_{k+b})E(L^{(i-1)}_{k+b+d})          end for      end for end for
16:F=Findindicesofsmallestelements(E[L],K)F={\rm Find~{}indices~{}of~{}smallest~{}elements~{}}(E[L],K)
17:return FF

VI Simulation Results

In this section, we evaluate the performance of the proposed NUPGA algorithms described in Section V and compare them with the shortened polar code techniques CW [38], RQUP [39] and PD [40]. We assess the Bit Error Rate (BER) and Frame Error Rate (FER) performances of the polar codes using BPSK for data transmission over an AWGN channel. We consider different shortened codewords, rates and variations of the SC decoder and the SC list (SCL) decoder. In Fig.8 we show the performance of the proposed NUPGA shortening and existing algorithms under the SC decoder as described in [9], whereas Fig.9 shows their performance under SCL [52] with list size L=16L=16. Fig.10 shows the performance of the proposed NUPGA shortening and existing techniques using a Cyclic Redundancy Check (CRC)-aided list decoding (CA-SLC) [52] with list size L=16L=16 and CRC with size 24. In Fig.11 we compare the performance of the proposed NUPGA extension algorithm with the PD and NUPGA shortening algorithms with the list decoder.

Refer to caption
Figure 8: Performance of polar codes with N=512N=512 and rate-compatible codewords using shortening with M=320M=320 and K=160K=160.

In the first example, in Fig.8, we show the performance of Arikan’s standard polar codes [9] with length N=512N=512, denoted as mother code (MC), and their rate-compatible versions operating at rate R=1/2R=1/2 with M=320M=320 and K=160K=160 using the CW [38], RQUP [39], PD [40] and the proposed NUPGA shortening techniques. In Fig.9 we show the performance of codes of length M=400M=400, K=200K=200 for the rate-compatible designs and CA-SCL with L=16L=16. In Fig.10 we show the performance of codes of length M=400M=400, K=50K=50, CA-SCL with L=16L=16 and CRC with length 24 in a system operating with rate R=1/4R=1/4. In Fig.11, we compare the performance of the shortened polar codes M=280M=280 and k=128k=128, the proposed NUPGA extension technique with three other curves: with MC [9] of length N=256N=256, the PD [40] algorithm and the proposed NUPGA shortening algorithm under list decoding (CA-SCL) with L=16L=16 and CRC with length 24. The results show that the NUPAG extension technique outperforms the NUPGA shortening and the PD algorithms using list decoding with CRC.

Refer to caption
Figure 9: Performance of PD and NUPGA shortening algorithm, both with M=400M=400, K=200K=200 and CA-SCL with L=16L=16.

We can observe a performance gain of the NUPGA shortening algorithm in all simulations, and the gain is greater in the case of low rates under list decoding, as shown in Fig.10. In Fig.8 we observe that the performance gain of NUPGA is of the order of 0.5 dB as compared to the approach of CW [38]. In Fig.9, we observe that the gain obtained by NUPGA is less than 0.1dB. In Fig.10 we notice that the gain is up to 1.2dB, which indicates that the NUPGA is advantageous for low rates. In the comparison shown in Fig.11, we observe that the NUPGA extension algorithm achieves a performance improvement over that obtained by the NUPGA shortening algorithm, which is around 0.1 dB. We can see that according to the curves a little incremental extension has good BER performance, maintaining the same FER performance as the original code [9]. Future work will consider the application of NUPGA to detection problems [56, 55, 67, 58, 59, 60, 61, 62, 63, 64, 65, 66, 75, 76, 77, 80, 78, 79, 81].

Refer to caption
Figure 10: Performance of PD and NUPGA shortening algorithms both with M=400M=400 and K=50K=50 using CA-SCL with L=16L=16 and CRC=24CRC=24.
Refer to caption
Figure 11: Performance of NUPGA extension algorithm, PD and NUPGA shortening algorithms using CA-SCL with L=16L=16 and CRC with length 2424.

VII Conclusions

In this work, we have proposed a rate-compatible scheme for constructing arbitrary-length polar codes using a non-uniform channel polarization technique. We have then developed NUPGA-based code design algorithms that exploit the non-uniform channel polarization and the GA technique along with a proof that it achieves capacity. With the proposed NUPGA-based shortening and extension algorithms we can design polar codes for any code length by re-polarizing the length of a conventional polar code. This is in contrast to common schemes like punctured or shortened polar codes. Since the performance of these length-compatible polar codes (including extended, punctured or shortened) deteriorates with the distance to code length of the mother code, our scheme considerably outperforms existing schemes. Simulations illustrate the excellent performance of NUPGA-based designs for short codes.

References

  • [1] E. Arikan, “Channel Polarization: A Method for Constructing Capacity-Achieving Codes for Symmetric Binary-Input Memoryless Channels”, IEEE Transactions on Information Theory, vol. 55 no. 7, pp. 3051-3073, July 2009.
  • [2] (2018). “Technical Specification Group Radio Access Network” [Online]. Available: http://www.3gpp.org/ftp/Specs/archive/38series/38.212/
  • [3] R. Mori and T. Tanaka, “Performance of polar codes with the construction using density evolution”, IEEE Communications Letters, vol. 13, no. 7, pp. 519–521, July 2009.
  • [4] R. Mori and T. Tanaka, “Performance and construction of polar codes on symmetric binary-input memoryless channels”, International Symposium on Information Theory (ISIT), 2009, pp. 1496–1500.
  • [5] I. Tal and A. Vardy, “How to Construct polar codes”, IEEE Transactions on Information Theory, vol. 59, no. 10, pp. 6562-6582, 2013.
  • [6] P. Trifonov, “Efficient design and decoding of polar codes,” IEEE Transactions on Communications, vol. 60, no. 11, pp. 1–7, 2012.
  • [7] Y. Ge, R. Zhang, W. Tong, “B-expansion: A Theoretical Framework for Fast and Recursive Construction of Polar Codes”, IEEE Global Communication Conference, 2017.
  • [8] C. Schurch, “A partial Order for the Synthesized Channels of a Polar Code”, IEEE International Symposium on Information Theory (ISIT), pp. 220–224, 2016.
  • [9] H. Vangala, E. Viterbo and Y. Hong, “A Comparative Study of Polar Code Constructions for the AWGN Channel”, https://arxiv.org/pdf/1501.02473.pdf, Jan 2015.
  • [10] J. Li, M. Hu and Z. Cheng, “Research on Polar Code Construction Algorithms under Gaussian Channel”, 2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN), July 2018.
  • [11] D. Wu, Y. Li and Y. Sun, “Construction and Block Error Rate Analysis of Polar Codes Over AWGN Channel Based on Gaussian Approximation”, IEEE Communication Letters, vol. 18, no. 7, Jul 2014.
  • [12] H. Li and J. Yuan, “A pratical construction method for Polar Codes in AWGN channels”, IEEE 2013 Tencon - Spring, April 2013.
  • [13] P. Yuan, T. Prinz, and G. Bocherer, “Polar Code Construction for List Decoding”, ArXiv e-prints, July 2017.
  • [14] M. Qin, J. Guo, A. Bhatia, A. G. i Fabregas, and P. Siegel, “Polar Code Constructions Based on LLR Evolution”, IEEE Commun. Lett., vol. 21, no. 6, pp. 1221–1224, June 2017.
  • [15] S. Sun and Z. Zhang, “Designing Practical Polar Codes Using Simulation-Based Bit Selection”, IEEE J. Emerging and Sel. Topics Circuits Syst., vol. 7, no. 4, pp. 594–603, Dec. 2017.
  • [16] A. Elkelesh, M. Ebada, S. Cammerer and S. ten Brink, “Genetic Algorithm-based Polar Code Construction for the AWGN Channel”, SCC 2019; 12th International ITG Conference on Systems, Communications and Coding, March 2019.
  • [17] S.B. Korada, E. Sasoglu, and R. Urbanke, “Polar codes: Characterization of exponent, bounds, and constructions”, IEEE Trans. Inf. Theory, vol.56, no.12, pp.6253–6264, 2010.
  • [18] N. Presman, O. Shapira, and S. Litsyn, “Binary polar code kernels from code decompositions”, Proc. IEEE Int. Symp. Inform. Theory (ISIT), pp.179–183, July 2011.
  • [19] L. Zhang, Z. Zhang, and X. Wang, “Polar code with block-length N=3nN=3^{n}”, Wireless Communications and Signal Processing (WCSP), International Conference, pp. 1–6, October 2012.
  • [20] B. Serbetci and A. E. Pusane, “Practical polar code construction using generalised generator matrices”, IET Communications, vol. 8, no. 4, pp.419–426, March 2014.
  • [21] Zhiliang Huang at all, “On the Successive Cancellation Decoding of Polar Codes with Arbitrary Linear Binary Kernel”, https://arxiv.org/pdf/1701.03264v2.pdf, Jan 2017.
  • [22] F. Gabry, V. Bioglio, I. Land, and J.-C. Belfiore, “Multi-Kernel Construction of Polar Codes”, IEEE Int. Conf. Commun. (ICC), 2017.
  • [23] M. Benammar, V. Bioglio, F. Gabry, and I. Land, “Multi-Kernel Polar Codes: Proof of Polarization and Error Exponents”, IEEE Info. Theory Workshop, 2017.
  • [24] N. Hussami, S. B. Korada, and R. Urbanke, “Performance of Polar Codes for Channel and Source Coding”, IEEE Inter. Symp. Inf. Theory (ISIT), June 2009, pp. 1488–1492.
  • [25] B. Li, H. Shen, and D. Tse, “A RM-Polar Codes”, ArXiv e-prints, July 2014.
  • [26] M. Mondelli, S. H. Hassani, and R. L. Urbanke, “From Polar to ReedMuller Codes: A Technique to Improve the Finite-Length Performance”, IEEE Trans. Commun., vol. 62, no. 9, pp. 3084–3091, Sep. 2014.
  • [27] V. Bioglio, F. Gabry and I. Land, “Low-Complexity Puncturing and Shortening of Polar Codes”, 2017 IEEE Wireless Communications and Networking Conference Workshops (WCNCW), San Francisco, CA, pp. 1-6, 2017.
  • [28] S. N. Hong et al., “Capacity-achieving rate-compatible polar codes”, arXiv preprint arXiv:1510.01776, 2015.
  • [29] H. Saber and I. Marsland, “An incremental redundancy Hybrid ARQ scheme via puncturing and extending of polar codes”, IEEE Transactions on Communications, vol. 63, no. 11, pp. 3964-3973, 2015.
  • [30] K. Chen, K. Niu and J. Lin, “A hybrid ARQ scheme based on polar codes”, IEEE Communications Letters, vol. 17, no. 10, pp. 1996-1999, 2013.
  • [31] K. Niu, K. Chen and J.-R. Lin, “Beyond turbo codes: rate-compatible punctured polar codes”, in IEEE International Conference on Communications (ICC), 2013, pp. 3423-3427.
  • [32] D. Shin et al., “Design of Length-Compatible Polar Codes Based on the Reduction of Polarizing Matrices”, IEEE Transactions on Communications, vol. 61, no. 7, July 2013.
  • [33] A. Eslami and H. Pishro-Nik, “A practical approach to polar codes”, in IEEE International Symposium on Information Theory Proceedings(ISIT), 2011, pp. 16-20.
  • [34] A. Eslami and H. Pishro-Nik, “On finite-length performance of polar codes: stopping sets, error floor, and concatenated design”, IEEE Transactions on Communications, vol. 61, no. 3, March 2013.
  • [35] J. Kim et al., “An Efficient Search on Puncturing Patterns for Short Polar Codes”, International Conference on Information and Communication Technology Convergence (ICTC), 2015.
  • [36] L. Zhang et al., “On the Puncturing Patterns for Punctured Polar Codes”, IEEE International Symposium on Information Theory, 2014.
  • [37] V. Miloslavskaya, “Shortened polar codes”, IEEE Transactions on Information Theory, vol. 61, no. 9, pp. 4852-4865, 2015.
  • [38] R. Wang and R. Liu, “A novel puncturing scheme for polar codes”, IEEE Communications Letters, vol. 18, no. 12, pp. 2081-2084, 2014.
  • [39] K. Niu et al., “Rate-Compatible Punctured Polar Codes: Optimal Construction Based on Polar Spectra”, https://arxiv.org/pdf/1612.01352, 2016.
  • [40] R. M. Oliveira and R. C. de Lamare, “Rate-Compatible Polar Codes Based on Polarization-Driven Shortening”, IEEE Communications Letters, vol. 22, no. 10, pp. 1984-1987, 2018.
  • [41] M. Jang et al., “Rate matching for polar codes based on binary domination”, IEEE Transactions on Communications, vol. 67, no. 10, pp. 6668-6681, 2019.
  • [42] H. Saber and I. Marsland, “An Incremental Redundancy Hybrid ARQ Scheme via Puncturing and Extending of Polar Codes”, IEEE Transactions on Communications, vol. 63, no. 11, pp. 3964-3973, 2015.
  • [43] M. Zhao at all, “An Adaptive IR-HARQ Scheme for Polar Codes by Polarizing Matrix Extension”, IEEE Communications Letters, vol. 22, no. 7, pp. 1306-1309, 2018.
  • [44] Yu-Ming Huang at all, “Re-Polarization Processing in Extended Polar Codes”, IEICE Transactions on Communications , vol. E100-B, no. 10, pp. 1765-1777, 2017.
  • [45] P. Trifonov and P. Semenov, “Generalized concatenated codes based on polar codes”, 8th International Symposium on Wireless Communication Systems, 2011.
  • [46] H. Mahdavifar at all, “On the construction and decoding of concatenated polar codes”, International Symposium on Information Theory (ISIT), pp. 952-956, July 2013.
  • [47] A. Cavatassi at all, “Asymmetric Construction of Low-Latency and Length-Flexible Polar Codes”, IEEE International Conference on Communications (ICC), July 2019.
  • [48] P. Trifonov, “Chained Polar Subcodes”, 11th International ITG Conference on Systems, Communications and Coding (SCC), June 2017.
  • [49] H. Mahdavifar, M. El-Khamy, J. Lee and I. Kang, “Compound polar codes”, 2013 Information Theory and Applications Workshop (ITA), pp. 1-6, 2013.
  • [50] J. Kim, J. Lee, “Polar codes for non-identically distributed channels”, EURASIP Journal on Wireless Communications and Networking, 2016:287, 2016.
  • [51] C.Leroux, I.Tal, A.Vardy,and W.J. Gross, “Hardware architectures for successive cancellation decoding of polar codes”, IEEE ICASSP, pp. 1665-1668, 2011.
  • [52] I. Tal and A. Vardy, “List Decoding of Polar Codes”, IEEE Transactions on Information Theory, vol. 61, no. 5, pp. 2213-2226, May 2015.
  • [53] R. M. Oliveira and R. C. de Lamare, “Non-Uniform Channel Polarization and Design of Rate-Compatible Polar Codes”, 16th International Symposium on Wireless Communication Systems (ISWCS), Oulu, Finland, pp. 537-541, 2019.
  • [54] R. M. Oliveira and R. C. de Lamare, “Design of Rate-Compatible Polar Codes Based on Non-Uniform Channel Polarization”, IEEE Access, 2021.
  • [55] R. C. de Lamare, ”Massive MIMO systems: Signal processing challenges and future trends,” URSI Radio Science Bulletin, vol. 2013, no. 347, pp. 8-20, Dec. 2013.
  • [56] W. Zhang et al., ”Large-Scale Antenna Systems With UL/DL Hardware Mismatch: Achievable Rates Analysis and Calibration,” IEEE Transactions on Communications, vol. 63, no. 4, pp. 1216-1229, April 2015.
  • [57] P. Li, R. C. de Lamare and R. Fa, “Multiple Feedback Successive Interference Cancellation Detection for Multiuser MIMO Systems”, IEEE Trans. on Wireless Comm., vol. 10, no. 8, pp. 2434-2439, Aug. 2011.
  • [58] R. C. de Lamare and R. Sampaio-Neto, ”Adaptive MBER decision feedback multiuser receivers in frequency selective fading channels,” IEEE Communications Letters, vol. 7, no. 2, pp. 73-75, Feb. 2003.
  • [59] R. C. De Lamare, R. Sampaio-Neto and A. Hjorungnes, ”Joint iterative interference cancellation and parameter estimation for cdma systems,” IEEE Communications Letters, vol. 11, no. 12, pp. 916-918, December 2007.
  • [60] R. C. De Lamare and R. Sampaio-Neto, “Minimum Mean-Squared Error Iterative Successive Parallel Arbitrated Decision Feedback Detectors for DS-CDMA Systems,” IEEE Transactions on Communications, vol. 56, no. 5, pp. 778-789, May 2008.
  • [61] Y. Cai and R. C. de Lamare, ”Space-Time Adaptive MMSE Multiuser Decision Feedback Detectors With Multiple-Feedback Interference Cancellation for CDMA Systems,” IEEE Transactions on Vehicular Technology, vol. 58, no. 8, pp. 4129-4140, Oct. 2009.
  • [62] R. C. de Lamare and R. Sampaio-Neto, ”Adaptive Reduced-Rank Equalization Algorithms Based on Alternating Optimization Design Techniques for MIMO Systems,” IEEE Transactions on Vehicular Technology, vol. 60, no. 6, pp. 2482-2494, July 2011.
  • [63] P. Li and R. C. De Lamare, ”Adaptive Decision-Feedback Detection With Constellation Constraints for MIMO Systems,” IEEE Transactions on Vehicular Technology, vol. 61, no. 2, pp. 853-859, Feb. 2012.
  • [64] R. C. de Lamare, “Adaptive and Iterative Multi-Branch MMSE Decision Feedback Detection Algorithms for Multi-Antenna Systems,” IEEE Transactions on Wireless Communications, vol. 12, no. 10, pp. 5294-5308, October 2013.
  • [65] P. Li and R. C. de Lamare, ”Distributed Iterative Detection With Reduced Message Passing for Networked MIMO Cellular Systems,” IEEE Transactions on Vehicular Technology, vol. 63, no. 6, pp. 2947-2954, July 2014.
  • [66] Y. Cai, R. C. de Lamare, B. Champagne, B. Qin and M. Zhao, ”Adaptive Reduced-Rank Receive Processing Based on Minimum Symbol-Error-Rate Criterion for Large-Scale Multiple-Antenna Systems,” IEEE Transactions on Communications, vol. 63, no. 11, pp. 4185-4201, Nov. 2015.
  • [67] R. C. de Lamare and R. Sampaio-Neto, ”Adaptive Reduced-Rank Processing Based on Joint and Iterative Interpolation, Decimation, and Filtering,” in IEEE Transactions on Signal Processing, vol. 57, no. 7, pp. 2503-2514, July 2009.
  • [68] D. Angelosante, J. A. Bazerque and G. B. Giannakis, “Online adaptive estimation of sparse signals: where RLS meets the l1l_{1}-norm,” IEEE Trans. Sig. Proc., vol. 58, no. 7, pp. 3436-3446, 2010.
  • [69] Z. Yang, R. C. de Lamare and X. Li, ”L1L_{1} -Regularized STAP Algorithms With a Generalized Sidelobe Canceler Architecture for Airborne Radar,” in IEEE Transactions on Signal Processing, vol. 60, no. 2, pp. 674-686, Feb. 2012.
  • [70] R. C. de Lamare and R. Sampaio-Neto, ”Sparsity-Aware Adaptive Algorithms Based on Alternating Optimization and Shrinkage,” in IEEE Signal Processing Letters, vol. 21, no. 2, pp. 225-229, Feb. 2014.
  • [71] Jihoon Choi et. al, “Adaptive MIMO decision feedback equalization for receivers with time-varying channels,” in IEEE Trans. on Sig. Proc., vol. 53, no. 11, pp. 4295-4303, Nov. 2005.
  • [72] P. S. Bradley et. al, “Feature selection via concave minimization and support vector machines,” in Proc. 13th ICML, 1998, pp. 82–90.
  • [73] Xiaodong Wang and H. V. Poor, “Iterative (turbo) soft interference cancellation and decoding for coded CDMA,” in IEEE Trans. on Comm., vol. 47, no. 7, pp. 1046-1061, July 1999.
  • [74] A. G. D. Uchoa, C. T. Healy and R. C. de Lamare, ”Iterative Detection and Decoding Algorithms for MIMO Systems in Block-Fading Channels Using LDPC Codes,” IEEE Transactions on Vehicular Technology, vol. 65, no. 4, pp. 2735-2741, April 2016.
  • [75] Z. Shao, R. C. de Lamare and L. T. N. Landau, ”Iterative Detection and Decoding for Large-Scale Multiple-Antenna Systems With 1-Bit ADCs,” IEEE Wireless Communications Letters, vol. 7, no. 3, pp. 476-479, June 2018.
  • [76] R. B. di Renna and R. C. de Lamare, “Adaptive Activity-Aware Iterative Detection for Massive Machine-Type Communications”, IEEE Wireless Communications Letters, 2019.
  • [77] Z. Shao, L. T. N. Landau and R. C. de Lamare, “Dynamic Oversampling for 1-Bit ADCs in Large-Scale Multiple-Antenna Systems,” in IEEE Transactions on Communications
  • [78] A. G. D. Uchoa, C. Healy, R. C. de Lamare and R. D. Souza, “Design of LDPC Codes Based on Progressive Edge Growth Techniques for Block Fading Channels,” in IEEE Communications Letters, vol. 15, no. 11, pp. 1221-1223, November 2011
  • [79] C. T. Healy and R. C. de Lamare, ”Decoder-Optimised Progressive Edge Growth Algorithms for the Design of LDPC Codes with Low Error Floors,” in IEEE Communications Letters, vol. 16, no. 6, pp. 889-892, June 2012.
  • [80] C. T. Healy and R. C. de Lamare, ”Design of LDPC Codes Based on Multipath EMD Strategies for Progressive Edge Growth,” in IEEE Transactions on Communications, vol. 64, no. 8, pp. 3208-3219, Aug. 2016.
  • [81] J. Liu and R. C. de Lamare, ”Low-Latency Reweighted Belief Propagation Decoding for LDPC Codes,” IEEE Communications Letters, vol. 16, no. 10, pp. 1660-1663, October 2012.
  • [82] L. Liu et. al, “Sparse Signal Processing for Grant-Free Massive Connectivity: A Future Paradigm for Random Access Protocols in the Internet of Things,” in IEEE Sig. Proc. Mag., vol. 35, no. 5, pp. 88-99, Sept. 2018.