CONSTRUCTION METHOD OF TFDMA RANDOM SELF-ORGANIZING AD HOC NETWORK
20210368346 · 2021-11-25
Assignee
Inventors
Cpc classification
H04W84/18
ELECTRICITY
H04L27/32
ELECTRICITY
International classification
H04W4/00
ELECTRICITY
H04L27/32
ELECTRICITY
H04W16/02
ELECTRICITY
Abstract
The disclosure discloses a method for constructing a TFDMA random self-organizing ad hoc network: the total spectrum bandwidth W is divided into N=W/Δf sub-channels, and Δf represents the bandwidth of one sub-channel. 24 hours a day is divided into U epochs, V time frames, S time slots, and E time chips. In an epoch of sub-channel bandwidth Δf, the last time slot is connected to the first time slot to form a time-frequency loop net. The N epoch-ring net corresponding to the N sub-channels are stacked together in a manner of time slot alignment to form a cylindrical web. A web is reused U times to cover the full spectrum bandwidth W and 24 hours a day, forming a time-frequency division multiple access self-organizing network.
Claims
1. A time-frequency division multiple access (TFDMA) random self-organizing ad hoc network construction method, comprising: dividing spectrum resources of full frequency domain and full time domain resources in 24 hours a day occupied by a network system, wherein first, the divided frequency domain and time domain units are constructed into a period-frequency slot epoch-ring net, and then N period-frequency slot epoch-ring nets are stacked into a cylindrical web according to a time slot alignment principle, and finally U cylindrical webs are formed into the time-frequency division multiple access random self-organizing ad hoc network that covers the full frequency domain and the full time domain, the specific steps of network construction are as follows: the full frequency domain resources are a total frequency spectrum allocated to the TFDMA ad hoc network, W is set to represent a bandwidth of the total frequency spectrum, and the total frequency spectrum of the network system with bandwidth W is divided into N sub-channels, Δf is set to represent a bandwidth of each sub-channel, Δf=f.sub.i−f.sub.i-1, i=1, 2, . . . , N, then, the TFDMA ad hoc network comprises N hopping points f.sub.i or N sub-channels center frequency f.sub.ci=f.sub.c+i.Math.Δf, N=W/Δf, wherein Δf is called a frequency slot or a frequency chip, and a first center frequency is f.sub.c=f.sub.0=f.sub.c0; the full-time domain resources in 24 hours a day is divided as follows, 24 hours are divided into U epochs, each epoch determines one cylindrical web, thereby determining the minimum loop time of one TFDMA ad hoc network; one epoch is divided into V time frames, each of the time frames is a basic time unit of a time division multiple access mode, one time frame is divided into S time slots, and each of the time slots is a basic time unit of the TFDMA ad hoc network which one user terminal can assess, one time slot is divided into E time chips, each of the time chips is time occupied by a pulse symbol packet with a definite or adjustable duty cycle, which is also a duration of a symbol in a codeword in a permutation group code, the period-frequency slot epoch-ring net, referred to as an epoch-ring net or a subnet, is determined by a period of the U epochs combined with a frequency slot Δf, specifically, a last time slot of V.Math.S time slots in an epoch is connected to a first time slot to form a period-frequency slot epoch-ring net formed by the V.Math.S time slots and the frequency slot Δf, which is also called a time slot-frequency slot epoch-ring net, or epoch-ring net for short, the network system comprises a total of N epoch-ring nets that can operate independently, each epoch-ring net is allocated a determined frequency hopping point or a center frequency of a sub-channel; the cylindrical web is formed by stacking the N independently operable epoch-ring nets into a cylindrical web in a manner that time slots are aligned; when each corresponding time slot of the N epoch-ring nets is aligned, the web contains V.Math.S time slices, and each of the time slices is composed of a time slot and N frequency slots; the TFDMA ad hoc network is composed of U cylindrical webs, that is, one web is repeatedly used for U times, thereby forming a time-frequency division multiple access self-organizing network covering the full frequency domain and the full time domain.
2. The TFDMA random self-organizing ad hoc network construction method according to claim 1, wherein a method for multiple users to access the TFDMA random self-organizing ad hoc network comprises: method 1: N users respectively access to N independent epoch-ring nets, operating in frequency division multiple access and time division multiplexing modes, that is, the N users use different N frequencies to multiplex the same time slot, enabling N robot terminals to operate simultaneously by accessing the N independent epoch-ring nets simultaneously in a time slot; method 2: S users access an epoch-ring net within a time frame, accessing a network in a mode of time division multiple accessing and multiplexing the same frequency; method 3: S.Math.N users access N independent epoch-ring nets or access a web within a time frame, wherein in each of the N epoch-ring nets, there are S users accessing the network in a mode of time division multiple accessing and multiplexing the same frequency; within a duration of one time frame of the web, in each of the S time slices, there are N users accessing the network in a mode of frequency division multiple accessing and multiplexing the same time slot; method 4: a user accessing an epoch-ring net will occupy a time-frequency slot, namely T.Math.Δf, wherein T represents a duration of a time slot, T=E.Math.Δt; a user in the epoch-ring net can use V time slots from V different time frames, and can also use V time slots from V different time frames in the next epoch, and the same is continued in the next epoch, therefore, a user can use up to V.Math.U time slots in 24 hours; method 5: in the same time frame of the N epoch-ring nets, the maximum number of users is N.Math.S; one epoch-ring net contains V TDMA-time frames, and the maximum number of users accommodated is S.Math.V; the maximum number of users accommodated in the one web is N.Math.S.Math.V; thereby forming the TFDMA ad hoc network covering the full frequency domain and the full time domain.
3. The TFDMA random self-organizing ad hoc network construction method according to claim 1, wherein a transceiver terminal that can access the network should be equipped with an n-dimensional dual-domain modulation signal with time-frequency division multiple access characteristics; a construction method of the n-dimensional dual-domain modulation signal is to use an n×n permutation matrix to form a signal pattern, the permutation matrix is taken from the codeword of the permutation group code, a row index and a column index of the permutation matrix are respectively adopted to establish an index of a domain chip or a domain slot of a modulation multi-domain and a time index of a time domain, which makes the modulation multi-domain and the time domain to work together to form the n-dimensional dual-domain modulation signal, n-dimensional dual-domain modulation signal pattern, which is also called a signal point, and the construction method is as follows: the n-dimensional dual-domain modulation signal is modeled by the permutation matrix, a row index 1, 2, . . . , n of the permutation matrix is used to determine a specific value of a continuous modulation multi-domain on a vertical axis from bottom to top, d.sub.i is set to represent the i-th value among n values of the modulation multi-domain, and gives an index of values, i=0, 1, 2, . . . , n, d.sub.0=0 represents a starting value 0 of the modulation multi-domain, a multi-domain modulation refers to amplitude modulation domain, phase modulation domain, frequency modulation domain, pulse position modulation domain, polarization modulation domain, spatial modulation domain, and effective combinations of these modulation domains, such as joint multi-domain modulation of amplitude domain and phase domain, Δd.sub.b=d.sub.i−d.sub.i-1 is set to represent a value chip or a value slot of the modulation multi-domain, which means in a domain of the modulation multi-domain, a difference between two adjacent values among n values d.sub.1, d.sub.2, . . . , do arranged from small to large, or the smallest difference between any two of the n modulation domain values, b=1, 2, . . . , n, giving an index of, Δd.sub.b, the value chip or the value slot of the modulation multi-domain; a column index 1, 2, . . . , n of the permutation matrix is processed from left to right into n moments in a continuous time domain on a horizontal axis, expressed as t.sub.i, which refers to the i-th moment of the n moments in the time domain, and gives an index of continuous moments, i=0, 1, 2, . . . , n, t.sub.0=0 represents a starting moment 0 of the time domain; one domain of the dual-domain modulation signal is a modulation multi-domain determined by the row index of the permutation matrix, and the other domain is a time domain determined by the column index of the permutation matrix; a difference between two adjacent moments of the n moments in the time domain is defined as a time chip, wherein the n moments correspond to n time chips, and a duration of each time chip is T.sub.c=Δt.sub.b−t.sub.i−t.sub.i-1, b=1, 2, . . . , n gives a time chip index; T.sub.c=Δt.sub.b is also a duration of one symbol in a permutation codeword; then T.sub.w=nT.sub.c is a duration of a codeword and a duration of an n-dimensional dual-domain modulation signal; n domain chips Δd.sub.b of the modulation multi-domain and the n time chips Δt.sub.b of the time domain define a n-dimensional dual-domain modulation signal model composed of the modulation multi-domain and the time domain, wherein b=1, 2, . . . , n; in a time interval of the n time chips Δt.sub.b corresponding to n elements “1” in the permutation matrix, n carriers modulated by n values of a permutation vector are transmitted respectively in each time chip Δt.sub.b, in the permutation matrix, no signal is emitted at a position where each element “0” is located; in n-dimensional time-domain and n-dimensional modulation-domain signal patterns, a position where an element “1” is located in the permutation matrix is replaced by a modulation carrier signal formed by the modulation domain chip Δd.sub.b and the time chip Δt.sub.b, and expressed as a square color block; in the position where the element “0” is located in the permutation matrix is replaced by an unfilled square.
4. The TFDMA random self-organizing ad hoc network construction method according to claim 3, wherein the n-dimensional dual-domain modulation signal is specifically as follows: one domain of the dual-domain modulation refers to the time domain, and the other is the modulation multi-domain, which is determined as the amplitude modulation domain, the phase modulation domain, and the frequency modulation domain of a carrier, and the n-dimensional dual-domain modulation signal is a signal model composed of the time domain and the modulation multi-domain (mainly refers to the multi-domain of amplitude domain, phase domain, frequency domain, or a combination of two of the above or a combination of the three), a general expression structure of the signal model is as follows: a symbol X.sub.m(a; l.sub.1; (t.sub.l1).sup.q) representing any permutation codeword in P.sub.n is constructed, wherein X∈{A,P,F}, A represents an amplitude, P represents a phase, and F represents a frequency, the subscript m of X.sub.m gives an index or number of the number of signals in a n-dimensional dual-domain modulation signal set, a value of m is determined by a coset number a and a shifted bit number q, that is, m=f(a,q); when X.sub.m=A.sub.m, a permutation codeword A.sub.m(a; l.sub.1; (t.sub.l1).sup.q) is a n-dimensional permutation vector for modulating a carrier amplitude; when X.sub.m=P.sub.m, a permutation codeword P.sub.m(a; l.sub.1; (t.sub.l1).sup.q) is a n-dimensional permutation vector for modulating a carrier phase; when X.sub.m=F.sub.m, a permutation codeword F.sub.m(a; l.sub.1; (t.sub.l1).sup.q) is a n-dimensional permutation vector for modulating a carrier frequency; the three symbols in parentheses, (a; l.sub.1; (t.sub.l1).sup.q), giving three elements that generate this permutation codeword, these three elements can form an expression X.sub.m(a; l.sub.1; (t.sub.l1))=(t.sub.l1).sup.q(a.Math.l.sub.1) which calculates a designated permutation codeword when a and q are determined; the meaning of these three symbols is as follows: a is an index of a permutation codeword in a coset leader set L.sub.n, as well as a number of a coset, a value range of a is 1≤a≤n−1, when n is a prime number, a is taken from the maximum value a=|L.sub.n|=n−1, when n is not the prime number, a value of a is mutually exclusive with any n>1, that is, all values of a should satisfy GCD(a,n)=1 (a greatest common factor between a and n is 1), under the circumstances, all the values of a are less than n−1; l.sub.1 is a unit permutation codeword, l.sub.1=[12 . . . n]; (t.sub.l1).sup.Q is set to denote a reduced-order function of cycle-left-shifted composition function (t.sub.l1).sup.n-1, wherein Q is the maximum value of the index q of a cycle-shifted bit number, the reason for order reduction is that digital communication requires Q must be a power of 2, and a value of q is 1≤q≤Q≤n−1, so that Q makes (t.sub.l1).sup.Q act on the coset leader set L.sub.n={a.Math.l.sub.1}, thereby generating a permutation array code Γ.sub.n={(t.sub.l1).sup.QL.sub.n}={(t.sub.l1).sup.Q{al.sub.1}}, when specific values of q and a are provided, it is possible to accurately calculate an index or number of a corresponding codeword in the permutation array code Γ.sub.n, m=(a−1)(Q+1)+q; a n-dimensional vector used for the amplitude, phase, and frequency modulation of the carrier must be a permutation codeword in the permutation array constellation Γ.sub.n={(t.sub.l1).sup.QL.sub.n}⊂P.sub.n; the symbol X.sub.m(a; l.sub.1; (t.sub.l1).sup.q) of the any permutation codeword and the cycle-left-shifted operator t.sub.l1 in the generated permutation array code Γ.sub.n={(t.sub.l1).sup.QL.sub.n}={(t.sub.l1).sup.Q{al.sub.1}} may also be replaced by a cycle-right-shifted operator t.sub.rn, and the permutation applies to other parts of the disclosure, a vector u=A.sub.m(a; l.sub.1; (t.sub.l1))=[u.sub.1u.sub.2 . . . u.sub.n]∈Γ.sub.n.sup.1⊂P.sub.n represents an amplitude modulation permutation codeword, Γ.sub.n.sup.1={(t.sub.l1).sup.Q.sup.
5. The TFDMA random self-organizing ad hoc network construction method according to claim 3, wherein the n-dimensional dual-domain modulation signal is specifically: the “dual domain” of the n-dimensional dual-domain modulation signal refers to: one domain is the time domain, and the other domain is a modulation single domain or a joint domain of multiple domains, wherein the modulation single domain refers to the amplitude modulation domain, the phase modulation domain, and the frequency modulation domain, the modulation multi-domain refers to the two-by-two combination of the three modulation domains or even a combination of the three modulation domains, which specifically constitutes the expressions and the signal patterns of six types of n-dimensional dual-domain modulation signal models: model 1: it is set that a n-dimensional modulation domain is the carrier amplitude, d.sub.i=A.sub.i, a row index 1, 2, . . . , n of the permutation matrix is used to determine a amplitude value A.sub.1, A.sub.2, . . . , A.sub.n from bottom to top, wherein i=0, 1, 2, . . . , n is an index of the amplitude value, a starting value of the amplitude value is A.sub.0=0, a difference between two adjacent amplitude values constitutes an amplitude chip or the amplitude slot, Δd.sub.b=d.sub.i−d.sub.i-1=ΔA.sub.b−A.sub.i−A.sub.i-1, b,i=1, 2, . . . , n is an index of the amplitude chip or the amplitude slot, that is to use an n×n permutation matrix to construct a dual-domain modulation signal model with n-dimensional time domain and n-dimensional amplitude domain, abbreviated as n-dimensional time amplitude modulation signal (n-TAM); the i-th element “1” from left to right in the permutation matrix is replaced by the amplitude value A.sub.i corresponding to the b-th time chip Δt.sub.b, A.sub.i is a symbol value in the permutation codeword A.sub.m(a; l.sub.1; (t.sub.l1).sup.q.sup.
6. The TFDMA random self-organizing ad hoc network construction method according to claim 5, wherein the frequency domain modulation signal comprises a design of N hopping frequency points and a design of the center frequency of N subcarriers, and an allocation of total frequency of the system N to each user, wherein: a design scheme of a sub-channel bandwidth Δf is: a spectrum bandwidth allocated to the TFDMA ad hoc network is W, and two ways to divide W are determined; the first way is Δf=f.sub.i−f.sub.i-1, which is a coherent bandwidth, which is defined as the minimum bandwidth that does not cause frequency interference, this frequency allocation method maximizes the number of sub-channels N=W/Δf without frequency interference, and which is the design scheme for the sub-channel bandwidth Δf with the largest number of users; the second way is Δf=f.sub.i−f.sub.i-1, which is much larger than the coherent bandwidth, the number of frequency points of the system is still calculated through N=W/Δf, but the number of total frequency points of the system is much smaller than that of the first method, each user still uses n frequency points to access the TFDMA network, but a method of using n frequency points is randomly hopped, and the n frequency points are different each time, thereby forming a fast frequency hopping system, this is the design scheme for the sub-channel bandwidth Δf with the strongest anti-interference ability but the smallest number of users; it is further required that, the design scheme for the sub-channel bandwidth Δf can be changed between the above schemes; a total number of system points N allocated to each user's n frequency allocation comprises the following three methods: the first method is a continuous n frequency allocation scheme, the sub-channel bandwidth Δf is the coherent bandwidth, and the minimum center frequency of the system is f.sub.0; the minimum center frequency f.sub.lc,0 and n frequencies of each user can be calculated from f.sub.lc,0 and Δf; the minimum center frequency point of each user is f.sub.lc,0=f.sub.0+(l−1).Math.n.Math.Δf, l=1, 2, . . . , N/n, N=W/Δf; if each user is assigned n different frequencies, the n frequencies of the first user can be calculated using the expression f.sub.lc,w.sub.
7. The TFDMA random self-organizing ad hoc network construction method according to claim 3, wherein the n×n permutation matrix used to construct the n-dimensional dual-domain modulation signal model is a permutation codeword obtained from the permutation group code P.sub.n, and then 2.sup.k codewords can be obtained from the n(n−1) codewords of P.sub.n to constitute the permutation array code 1′n, and the 2.sup.k codewords of the permutation array code Γ.sub.n constitute the permutation array constellation diagram Γ.sub.n of the n-dimensional high-order (2.sup.k order) dual-domain modulation signal, the permutation array code and the permutation array constellation diagram can be equivalently expressed by Γ.sub.n, the specific design steps for the permutation array code Γ.sub.n are: step 1: a cycle-right-shifted operator t.sub.rn is constructed, when it acts as any permutation codeword x=[x.sub.1x.sub.2 . . . x.sub.n], the rightmost element of this codeword is moved to the leftmost, and the remaining n−1 elements in turn is moved to the right, that is, t.sub.rnx=t.sub.rn[x.sub.1x.sub.2 . . . x.sub.n]=[x.sub.nx.sub.1x.sub.2 . . . x.sub.n-1], a function of t.sub.rn is equivalent to storing the permutation codeword in a n-dimensional cycle-shift register, and the n-dimensional cycle-shift register is shifted to the right once to obtain a new permutation codeword; a cycle-left-shifted operator t.sub.l1 is constructed, when it acts on any permutation vector x=[x.sub.1x.sub.2 . . . x.sub.n], the leftmost element of this vector is moved to the rightmost, and the remaining n−1 elements are moved to the left in turn, that is, t.sub.l1x=t.sub.l1[x.sub.1x.sub.2 . . . x.sub.n]=[x.sub.2x.sub.3 . . . x.sub.n-1x.sub.nx.sub.1], a function of t.sub.l1 is equivalent to storing the permutation codeword into the n-dimensional cycle-shift register, and the n-dimensional cycle-shift register is shifted to the left once to obtain a new permutation codeword; step 2: a composition function (t.sub.rn).sup.n-1 of the left-shifted operator t.sub.l1 is constructed, when it acts on any codeword x=[x.sub.1x.sub.2 . . . x.sub.n], n permutation codeword including this permutation codeword x are obtained, thereby constituting a loop Latin square, and constituting an orbit set of the permutation codeword with x as the leader of the orbit, or constituting a coset with x as the leader of the coset, thereby obtaining a set {(t.sub.l1).sup.n-1x}={x, (t.sub.l1).sup.1x, (t.sub.l1).sup.2x, . . . , (t.sub.l1).sup.n-1x}={(t.sub.l1).sup.n-1[x.sub.1x.sub.2 . . . x.sub.n]}={[x.sub.1 . . . x.sub.n], . . . (t.sub.l1).sup.1[x.sub.1 . . . x.sub.n], (t.sub.l1).sup.2[x.sub.1 . . . x.sub.n], . . . , (t.sub.l1).sup.n-1[x.sub.1 . . . x.sub.n]}={[x.sub.1 . . . x.sub.n], [x.sub.nx.sub.1 . . . x.sub.n-1], [x.sub.n-1x.sub.nx.sub.1 . . . x.sub.n-2], . . . [x.sub.2 . . . x.sub.nx.sub.1]} constituted by n permutation codewords containing the permutation codeword x; a composition function (t.sub.rn).sup.n-1 of the right-shifted operator t.sub.rn is constructed, the same codeword set {(t.sub.l1).sup.n-1x}={x,(t.sub.l1).sup.1x, (t.sub.l1).sup.2x, . . . , (t.sub.l1).sup.n-1x}={(t.sub.l1).sup.n-1[x.sub.1x.sub.2 . . . x.sub.n]}={[x.sub.1 . . . x.sub.n], (t.sub.l1).sup.1[x.sub.1 . . . x.sub.n], (t.sub.l1).sup.2[x.sub.1 . . . x.sub.n], . . . , (t.sub.l1).sup.n-1[x.sub.1 . . . x.sub.n]}={[x.sub.1 . . . x.sub.n], [x.sub.n x.sub.1 . . . x.sub.n-1], [x.sub.n-1x.sub.nx.sub.1 . . . x.sub.n-2], . . . , [x.sub.2 . . . x.sub.nx.sub.1]} is obtained; the codeword set {(t.sub.l1).sup.n-1x} and {(t.sub.l1).sup.n-1x} are the same set, but the order of their n codewords is different; step 3: the composition function (t.sub.l1).sup.Q of the cycle-left-shifted operator t.sub.l1 and the composition function (t.sub.rn).sup.Q of the cycle-right-shifted operator t.sub.rn to act on a set produced by a coset leader set L.sub.n is the permutation array code Γ.sub.n, the general calculation expression is Γ.sub.n={(t.sub.l1).sup.QL.sub.n} or Γ.sub.n={(t.sub.l1).sup.QL.sub.n}, these two code sets are different, Q(≤n−1) is called a cycle-shifted index, its value is the power of 2 minus 1; specifically 9 permutation array codes: their code length is n=4, 5, 8, 15, 16, 17, 32, 51, 64; binary message that can carry k bits corresponds to k=3, 4, 5, 6, 7, 8, 9, 10, 11 bits; the number of cosets contained in these 9 permutation array codes are respectively |L.sub.n|=2.sup.k.sup.
8. The TFDMA random self-organizing ad hoc network construction method according to claim 7, wherein in the calculation expression of the 9 permutation array codes Γ.sub.4, Γ.sub.5, Γ.sub.8, Γ.sub.15, Γ.sub.16, Γ.sub.17, Γ.sub.32, Γ.sub.51, Γ.sub.64, the method of generating the coset leader set L.sub.n is to use proportional transformation f.sub.a(x)=ax, when x=l.sub.1 is an unit permutation vector, it is used to calculate L.sub.n={al.sub.1|a∈Z.sub.n-1; l.sub.1=[12 . . . n]∈S.sub.n}∪S.sub.n, which can be divided into three situations: situation 1, when n is a prime number, the coset leader set L.sub.n is a largest one-fixed-point subgroup, the size of L.sub.n is |L.sub.n|=n−1, the largest fixed-point of L.sub.n is δ=1, and the smallest Hamming distance of L.sub.n is d.sub.L.sub.
9. The TFDMA random self-organizing ad hoc network construction method according to claim 3, wherein the permutation array constellation diagram of the n-dimensional high-order dual-domain modulation signal, the n-dimensional vectors used to modulate the amplitude, phase and frequency of the n carriers come from 2.sup.k permutation codewords from the 9 permutation array codes, a signal point s.sub.m(t) of six types of the n-dimensional dual-domain signal model is controlled by the subscript m=1, 2, . . . , |Γ.sub.n| to form a signal point generated by |Γ.sub.n|=2.sup.k permutation codewords, these 2.sup.k signals points constitute the n-dimensional high-order dual-domain modulation signal permutation array constellation diagram, expressed as a set {s.sub.m(t)|m=1, 2, . . . , |Γ.sub.n|; s.sub.m(t)∈{n-TPM, n-TFM, n-TAPM, n-TAFM, n-TAPFM}}, the specific structure design is as follows: n-TAM constellation diagram: the n-dimensional 2.sup.k order time and amplitude dual-domain modulation signal permutation array constellation diagram is a set {s.sub.m(t)|m=1, 2, . . . , 2.sup.k; s.sub.m(t)=[u.sub.1u.sub.2 . . . u.sub.n]g(t)cos ω.sub.ct; [u.sub.1u.sub.2 . . . u.sub.n]∈Γ.sub.n} constituted by 2.sup.k signal points s.sub.m(t), which are 2.sup.k constellation diagrams constituted by “amplitude modulated signals controlled sequentially by n time chips”; n-TPM constellation diagram: the n-dimensional 2.sup.k order time and phase dual-domain modulation signal permutation array constellation diagram is a set
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0013]
[0014]
[0015]
[0016]
[0017]
[0018]
[0019]
[0020]
[0021]
[0022]
DESCRIPTION OF EMBODIMENTS
[0023] In order to make the objectives, technical solutions, and advantages of the present disclosure clearer, the following further describes the present disclosure in detail with reference to the accompanying drawings and embodiments. It should be understood that the specific implementation cases described here are only used to explain the present disclosure, but not to limit the present disclosure. In addition, the technical features involved in the various embodiments of the present disclosure described below can be combined with each other as long as they do not conflict with each other.
[0024] Basic Principle
[0025] The section basic principle describes the theoretical basis and mathematical model based on which the structure of the signal model and permutation array constellation diagram of the disclosure are designed, and mainly involves: the method of generating permutation group code.
[0026] The set formed by all n! permutations of n elements defined in a finite domain Z.sub.n={1, 2, . . . , n} of positive integers is called a symmetric group, which is expressed as S.sub.n={π.sub.1, . . . π.sub.k, . . . , π.sub.n!}, wherein each element can be represented by a permutation vector π.sub.k=[a.sub.1 . . . a.sub.i . . . a.sub.n], wherein k=1, 2, . . . , n! represents the index of the permutation vector contained in the symmetric group S.sub.n. All elements of each permutation vector are different, wherein a.sub.1, . . . , a.sub.i, . . . , a.sub.n∈Z.sub.n. The degree (dimension, size) of each permutation is |π.sub.k|=n, and the potential (order) of the symmetric group is expressed as |S.sub.n|=n!. Set π.sub.0=e=[a.sub.1a.sub.2 . . . a.sub.n]=[12 . . . n], which represents the identity element of the symmetric group S.sub.n. The general permutation group code is defined as a sub-group of the symmetric group S.sub.n, and the four axioms of the permutation group code abstract algebraic group are: closure, associativity, identity, and inverse. A permutation group code can be expressed as (n, μ, d)-PGC, wherein n represents the length of the codeword, μ represents the maximum potential (maximum size) of this code set, and d represents the minimum Hamming distance between any two permutation codewords in this code set. For example, (n,n(n−1),n−1) permutation group code PGC is a group code with code length n, potential n(n−1), and minimum Hamming distance n−1.
[0027] (n,n(n−1), n−1) Coset partition structure of permutation group code:
[0028] The inventor's research results that have been published show that when any n>1 is a prime number, the code set P.sub.n of (n,μ,d) permutation group codes can be equivalently calculated by the following two algebraic calculation methods for each codeword to obtain:
[0029] In the expression, the expression (1) represents the first method of generating the code set P.sub.n, indicating that P.sub.n is obtained by calculating two smaller sub-groups, namely the standard loop sub-group C.sub.n and the maximum single-fixed-point sub-group L.sub.n about the fixed-point n∈Z.sub.n through the composition operator “∘”. The expression (2) represents the second method of generating the code set P.sub.n, which shows that each permutation codeword of P.sub.n can be calculated by the affine transformation f.sub.a,b(l.sub.1)−al.sub.1+b.
[0030] It can be seen from the two methods of generating P.sub.n that they all adopt the maximum single fixed point sub-group L.sub.n. Therefore, the key problem is to first generate L.sub.n, which is generated by the proportional transformation f.sub.a(x)=ax, wherein a∈Z.sub.n-1, x∈S.sub.n. For the maximum single fixed point sub-group, the first requirement is that n>1 is a prime number to ensure that a and n are mutually exclusive, so that the set {ax|a∈Z.sub.n-1} reaches the maximum; the second requirement is that x∈S.sub.n must be the identity element to ensure that the set {ax|a∈Z.sub.n-1} is a permutation group, that is, the algebraic group must contain the identity element. Therefore, the specific calculation formula of L.sub.n is
L.sub.n={al.sub.1|a∈Z.sub.n-1;l.sub.1=[12 . . . n]}={1.Math.l.sub.1,2.Math.l.sub.1, . . . ,a.Math.l.sub.1, . . . ,(n−1).Math.l.sub.1}{l.sub.1,l.sub.2, . . . ,l.sub.a, . . . ,l.sub.n-1}
[0031] It can be seen that all permutation vectors in L.sub.n contain a fixed-point n∈Z.sub.n, and other symbols are transferable. L.sub.n contains n−1 permutation vectors l.sub.1, l.sub.2, . . . , l.sub.a, . . . , l.sub.n-1, which is called coset leader permutation codeword or orbit leader permutation codeword, L.sub.n is also called coset leader set or orbit leader set.
[0032] The coset characteristics of the code set P.sub.n can be summarized as follows:
[0033] 1) The code set P.sub.n is composed of n−1 C.sub.n right cosets C.sub.nl.sub.1, C.sub.nl.sub.2, . . . , C.sub.nl.sub.n-1 under the condition of multiplication, and each coset contains n codewords. Another type of coset generating method is the translation group, that is, the maximum fixed-point subgroup L.sub.n is translated. Specifically, an equal element vector
of n length is adopted to translate L.sub.n, that is, P.sub.n={L.sub.n+b|b∈Z.sub.n}={L.sub.n+[b].sub.n}={l.sub.1+[b].sub.n, l.sub.2+[b].sub.n, . . . , l.sub.n-1+[b].sub.n}. It can be seen that P.sub.n consists of n−1 L.sub.n right cosets l.sub.1+[b].sub.n, l.sub.2+[b].sub.n, . . . , l.sub.n-1+[b].sub.n under the add group condition, and each coset contains n codewords.
[0034] 2) The code set P.sub.n can also be regarded as composed of n−1 orbits, and each orbit contains n codewords. There are two ways to form orbits, and they are equivalent. The first method is: the standard loop sub-group C.sub.n acts on the n−1 orbit leader permutation vectors l.sub.1, l.sub.2, . . . , l.sub.a, . . . , l.sub.n-1 in L.sub.n to obtain n−1 orbits C.sub.nl.sub.1, C.sub.nl.sub.2, . . . , C.sub.nl.sub.n-1. The second method is: n-dimensional equal element vector [b].sub.n is adopted to perform translation operations on n−1 orbit leader permutation vectors l.sub.1, l.sub.2, . . . , l.sub.a, . . . , l.sub.n-1 in L.sub.n to obtain n−1 orbits l.sub.1+[b].sub.n, l.sub.2+[b].sub.n, . . . , l.sub.n-1+[b].sub.n.
[0035] Permutation matrix and permutation matrix set isomorphic to (n,n(n−1), n−1) permutation group code:
[0036] The permutation matrix is defined as a.sub.n n×n square matrix with only one element “1” in each row and each column, and the remaining elements are “0”.
[0037] Any permutation matrix can be represented by a permutation vector, vice versa, any permutation vector can also be represented by a permutation matrix. The corresponding relationship between the two is that the index coordinates of each element in the permutation vector give the column index of the permutation matrix, and the value of each element in the permutation vector gives the line number of each element “1” in the permutation matrix.
[0038] All n! permutation vectors in the symmetric group S.sub.n have a one-to-one corresponding permutation matrix. Therefore, S.sub.n can also be expressed as a set of n!permutation matrices. Similarly, the n(n−1) permutation vectors in the permutation group code P.sub.n can also be represented isomorphically as n(n−1) n×n permutation matrices.
[0039] In the first example, the permutation vector is generated by n=7, and the corresponding permutation matrix can be written. For example, take the unit permutation vector [1234567], it can be written that it corresponds to a 7×7 permutation matrix, which is an identity matrix.
[0040] In another example, take any permutation vector with n=7 [3164275], and its corresponding permutation matrix is
[0041] In the disclosure, the n×n permutation matrix is a mathematical model for establishing an n-dimensional dual-domain modulation signal, and the permutation group code P.sub.n is a mathematical tool for establishing an n-dimensional high-order dual-domain modulation signal permutation array constellation diagram.
Technical Solution
[0042] The technical solution is divided into three parts. The first part is the frame structure design of the TFDMA ad hoc network; the second part is the permutation matrix based n-dimensional dual-domain modulation signal structure design; and the third part is the structure design of permutation group code based n-dimensional high-order dual-domain modulation signal permutation array constellation diagram.
[0043] Part 1: TFDMA Random Access (Ad Hoc) Network Frame Structure Design
[0044] The frequency resource allocated to the TFDMA ad hoc network is divided. W is set to represent the bandwidth of the frequency spectrum allocated to the TFDMA ad hoc network in the disclosure. Δf is set to represent the minimum interval between any two adjacent sub-channels or adjacent hopping frequencies. Then the TFDMA network contains N=W/Δf hopping frequency points or N sub-channels with center frequency f.sub.c+i.Math.Δf, wherein i=0, 1 . . . , N−1, and the frequency unit is hertz (Hz). If the bandwidth of a sub-channel is equal to the interval between two adjacent center frequencies, then Δf is also called the frequency slot (frequency chip) of the TFDMA network, or the bandwidth of the sub-channel.
[0045] The time resource in 24 hours a day is divided as follows. 24 hours may be divided into U epochs, each epoch determines the minimum loop time of a TFDMA ad hoc network. Each epoch is divided into V time frames, each time frame is the basic time unit of the time division multiple access of multiple users. Each time frame is divided into S time slots, and one time slot is the basic time unit of the TFDMA ad hoc network which the user terminal can assess. Each time slot is divided into E time chips. One time chip is a pulse symbol duration unit with a suitable duty cycle, and it is also the duration of one symbol in the permutation codeword.
[0046] T is set to denote the duration of a time slot. A time-frequency slot is defined as a square formed by the abscissa of a time slot and the ordinate of a frequency slot, expressed as T-Δf. The TFDMA network allows many user terminals to access the network in the manner of combination of time division multiple access and frequency division multiple access, thus a new concept of time-frequency division multiple access is introduced.
[0047] Definition 1: A multi-user network access scheme is called time-frequency division multiple access (TFDMA) access, if it satisfies the following operating conditions: 1) N user terminals access N sub-nets in the manner of frequency division multiple access and time division multiplexing without frequency interference, that is, N users respectively occupy N different frequencies and reuse the same time slot. 2) S user terminals access one sub-net in the manner of time division multiple access and frequency division multiplexing without symbol interference, that is, the S user terminals respectively occupy S different time slots and reuse the same frequency. 3) Each user terminal accessing a sub-net must occupy at least one time slot frequency slot T.Math.Δf, in a sub-net, a user terminal can occupy at most V time slots from V different time frames. 4) In a time frame, the maximum number of users of N sub-nets is N.Math.S, a sub-net (one time band) contains N time division multiple access frequency multiplexing time frames, and the maximum number of users is S.Math.V.
[0048] Each epoch occupies a sub-channel, that is, occupies a frequency slot with a center frequency of f.sub.i and a bandwidth of Δf, or occupies a hopping frequency f.sub.i, i=1, . . . , N. An epoch related to a frequency slot is composed of V.Math.S time slots. If the last time slot is connected to the first time slot, the V.Math.S time slot forms a time-frequency loop, which is called an epoch-ring net, as shown in
[0049] N epoch-ring nets corresponding to N center frequencies f.sub.1, f.sub.2, . . . , f.sub.N are stacked in a slot-aligned form to form a cylindrical web, as shown in
[0050] It can be seen from
[0051] N users respectively access to N independent epoch-ring nets, operating in frequency division multiple access and time division multiplexing modes, that is, N users use different N frequencies to multiplex the same time slot, enabling N robot terminals to operate simultaneously by accessing the network simultaneously in a time slot. S users access an epoch-ring net in a time frame, and operate in a time division multiple access mode and multiplexing one frequency. S.Math.N users access N independent epoch-ring nets or access a web within a time frame. In each of the N epoch-ring nets, there are S users accessing the network in the time division multiple access mode and multiplexing the same frequency. Within the duration of one time frame of the web, in each of the S time slices, there are N users accessing the network in the frequency division multiple access mode and multiplexing the same time slot. A user accessing a epoch-ring net will occupy a time-frequency slot, namely T.Math.Δf, wherein T represents the duration of a time slot. A user in the epoch-ring net can use V time slots from V different time frames, and can also use V time slots from V different time frames in the next epoch, and the same is continued in the next epoch. Therefore, a user can use up to V.Math.U time slots in 24 hours. In the same time frame of N epoch-ring nets, the maximum number of users is N.Math.S. A epoch-ring net contains V TDMA-time frames, and the maximum number of users accommodated is S.Math.V. The maximum number of users accommodated in a web is N.Math.S.Math.V. In a time-frequency slot, a terminal can access the web, and a web is composed of N×V.Math.S time-frequency slots. Therefore, the maximum number of users of a web is N.Math.V.Math.S, wherein each user terminal occupies a time slot.
[0052] From the above, it seems very easy to construct a TFDMA network. The key lies its feasibility, which requires solving two basic problems. The first is: what kind of signal model has access to the TFDMA network, so that such signal model can be used to construct a transceiver system running with the TFDMA network; the second is: how to design the structure of the time slot to consider the key technical factors. The time slot structure determines how to choose timing (time reference), synchronization strategy, anti-jitter mechanism and protection scheme. This disclosure does not take into consideration the design of the structure of time slot for the time being because it involves a specific application environment, and different applications require different time slot structures. Only the structural design of the signal model is taken into consideration below.
[0053] Part 2: The n-Dimensional Dual-Domain Modulation Signal Model that can Access the TFDMA Network
[0054] This part uses permutation matrix as a mathematical tool to invent an n-dimensional dual-domain modulation signal model. The so-called “dual-domain” refers to: one domain is the time domain, and the other domain is the modulation single domain, or a joint domain of multiple domains, wherein the modulation single domain refers to the amplitude modulation domain, the phase modulation domain and the frequency modulation domain, and the modulation multi-domain refers to the two-by-two combination of three modulation domains or even the combination of three modulation domains.
[0055] The n-dimensional dual-domain modulation signal is modeled by a permutation matrix. The row index 1, 2, . . . , n of the permutation matrix is used to determine the specific value of the discrete modulation domain from bottom to top. d.sub.i is set to represent the i-th value among the n values of multi-domain modulation, its subscript gives the index of n discrete values, i=0, 1, 2, . . . , n, d.sub.0=0 represents the starting value 0 of the modulation domain. Multi-domain modulation refers to amplitude modulation domain, phase modulation domain, frequency modulation domain, pulse position modulation domain, polarization modulation domain, spatial domain (antenna) modulation, and effective combinations of these modulation domains, such as joint multi-domain modulation of amplitude domain and phase domain. Δd.sub.b=d.sub.i−d.sub.i-1 is set to represent the domain chip or domain slot of the modulation domain, which means a difference between two adjacent values among n values d.sub.1, d.sub.2, . . . , d, arranged from small to large, or the smallest difference between any two of the n modulation domain values, b=1, 2, . . . , n, giving the index of, Δd.sub.b, the domain chip or domain slot of the modulation domain.
[0056] The column index 1, 2, . . . , n of the permutation matrix is processed from left to right into n discrete moments that appear at once in the time domain, expressed as ti, which refers to the i-th moment of the n moments in the time domain, and gives the index of these moments, i=0, 1, 2, . . . , n, t.sub.0=0 represents the starting moment 0 of the time domain. One domain of the dual-domain modulation signal is a modulation multi-domain determined by the row index of the permutation matrix, and the other domain is a time domain determined by the column index of the permutation matrix. The difference between two adjacent moments of n moments in the time domain is defined as a time chip, wherein n moments correspond to n time chips, and the duration of each time chip is T.sub.c=Δt.sub.b−t.sub.i−t.sub.i-1, b=1, 2, . . . , n gives the time chip index; T.sub.c=Δt.sub.b is also the duration of one symbol in a permutation codeword. Then T.sub.w=nT.sub.c is the duration of a codeword and the duration of an n-dimensional dual-domain modulation signal.
[0057] The n domain chips Δd.sub.b of the modulation multi-domain and n time chips Δt.sub.b of the time domain define the n-dimensional dual-domain modulation signal model composed of the modulation multi-domain and the time domain, wherein b=1, 2, . . . , n. In the time interval of n time chips Δt.sub.b corresponding to n elements “1” in the permutation matrix, the carrier modulated by the b-th value of a permutation vector in the modulation domain is transmitted. In the permutation matrix, no signal is emitted at the position where each element “0” is located.
[0058] When the modulation domain is determined, a dual-domain signal composed of the determined time domain and modulation multi-domain can be obtained. This disclosure only invents six n-dimensional dual-domain modulation signal models for three parameters of the carrier, including amplitude, phase, and frequency, and including the mathematical expressions and signal patterns of the signal models. The mathematical symbols and equivalent expression used for modeling time domain and modulating multi-domain n-dimensional dual-domain modulation signals are described as follows. [0059] A symbol X.sub.m(a; l.sub.1; (t.sub.l1).sup.q) representing any permutation codeword in P.sub.n is constructed, which is equivalent to taking a permutation codeword from the permutation group code P.sub.n, wherein X∈{A,P,F}, A represents the amplitude, P represents the phase, and F represents the frequency. The subscript m of X.sub.m gives the index or number of the number of signals in the n-dimensional dual-domain modulation signal set. The specific value of the codeword index m is determined by the coset number a and shift bit value index q, that is, m=f(a,q). This symbol indicates: when X.sub.m=A.sub.m, the permutation codeword A.sub.m(a; l.sub.1; (t.sub.l1).sup.q) is the n-dimensional permutation vector modulating the carrier amplitude; when X.sub.m=P.sub.m, the permutation codeword P.sub.m(a; l.sub.1; (t.sub.l1).sup.q) is the n-dimensional permutation vector for modulating the carrier phase; when X.sub.m=F.sub.m, the permutation codeword F.sub.m(a; l.sub.1; (t.sub.l1).sup.q) is the n-dimensional permutation vector for modulating the carrier frequency. The three symbols in parentheses, (a; l.sub.1; (t.sub.l1).sup.q), give the three elements that generate this permutation codeword. These three elements can form an expression X.sub.m(a; l.sub.1; (t.sub.l1).sup.q)=(t.sub.l1)(a.Math.l.sub.1) which calculates designated permutation codewords. The meaning of these three symbols is as follows: a is the index of the permutation codeword in the coset leader set L.sub.n, as well as the number of the coset. The value range of a is 1≤a≤n−1. When n is a prime number, a is taken from the maximum value a=|L.sub.n|=n−1, when n is not a prime number, the value of a should be mutually exclusive with any n>1, that is, all the values of a should satisfy GCD(a,n)=1 (the greatest common factor between a and n is 1). Under the circumstances, all the values of a are less than n−1; l.sub.1 is a unit permutation codeword, l.sub.1=[12 . . . n]. (t.sub.l1).sup.Q is set to denote a reduced-order function of cycle-left-shifted composite function (t.sub.l1).sup.n-1, wherein Q is the maximum value of the index q of the cycle-shifted bit number, and the value of q is 1≤q≤Q<n−1, so that (t.sub.l1).sup.Q acts on the coset leader set L.sub.n={a.Math.l.sub.1}, thereby generating permutation array code Γ.sub.n={(t.sub.l1).sup.QL.sub.n}={(t){al.sub.1}}. When the specific values of q and a are provided, it is possible to accurately calculate the index or number of the corresponding codeword in the permutation array code Γ.sub.n, m=(a−1)Q+q. The n-dimensional vector used for the amplitude, phase, and frequency modulation of the carrier must be the permutation codeword in the permutation array constellation Γ.sub.n={(t.sub.l1).sup.QL.sub.n}⊂P.sub.n. The vector u=A.sub.m(a; l.sub.1; (t.sub.l1).sup.q.sup.
[0066] Following the above description of symbols and simplified equivalent expression, the disclosure establishes the following six n-dimensional dual-domain modulation signal models.
[0067] Model 1: It is set that the modulation multi-domain is the carrier amplitude, that is, d.sub.i=A.sub.i, then the domain chip of the modulation multi-domain is the amplitude chip or the amplitude slot, that is, Δd.sub.b=d.sub.i−d.sub.i-1=ΔA.sub.b−A.sub.i−A.sub.i-1, b=1, 2, . . . , n. This is, an n×n permutation matrix is adopted to construct a dual-domain modulation signal composed of an n-dimensional time domain and an n-dimensional amplitude domain, abbreviated as n-dimensional time-amplitude dual-domain modulation signal model (n-TAM). The element “1” in the permutation matrix is replaced by the amplitude value A.sub.i corresponding to the time chip Δt.sub.b in the corresponding permutation vector. A.sub.i is a symbol value in the permutation codeword A.sub.m(a; l.sub.1; (t.sub.l1).sup.q.sup.
[0068]
[0069] Model 2: It is set that the modulation multi-domain is the carrier phase, i.e., d.sub.i=p.sub.i, then the value chip of the modulation domain is the phase chip or the phase slot, i.e., Δd.sub.b=d.sub.i−d.sub.i-1=Δp.sub.b−p.sub.i−p.sub.i-1, b, i=1, 2, . . . , n. That is, an n×n permutation matrix can be used to construct an n-dimensional dual-domain modulation signal composed of the n-dimensional time domain and the n-dimensional phase domain, which is referred to as n-dimensional time-phase dual-domain modulation signal model (n-TPM) for short. The element “1” in the permutation matrix is replaced by the phase value p.sub.i corresponding to the time chip Δt.sub.b in the permutation vector, and p.sub.i is determined by a symbol value v in the permutation codeword v=P.sub.m(a; l.sub.1; (t.sub.l1).sup.q.sup.
can be obtained. If a k-bit binary message sequence selects a codeword [v.sub.1v.sub.2 . . . v.sub.n] in the permutation array code Γ.sub.n.sup.2={(t.sub.l1).sup.Q.sup.
[0070]
(a phase unit) sequence Δp.sub.1, Δp.sub.2, . . . , Δp.sub.b, . . . , Δp.sub.n, each square is the product
of Δp.sub.b and Δt.sub.b, b=1, 2, . . . , n. Each element 1 in the permutation matrix is replaced with the phase value
v.sub.i corresponding to the time chip Δt.sub.b in the corresponding permutation vector, which is equivalent to using a phase value
generated by a symbol value v of each corresponding in time chip Δt.sub.b of a permutation codeword v=P.sub.m(a; l.sub.1; (t.sub.l1).sup.q.sup.
[0071] Model 3: It is set that the modulation multi-domain is the carrier frequency, i.e., d.sub.i=f.sub.i. Then the domain chip of the modulation multi-domain is frequency chip or frequency slot, i.e., Δd.sub.b=d.sub.i−d.sub.i-1=Δf.sub.b−f.sub.i−f.sub.i-1, b, i=1, 2, . . . , n. That is, an n×n permutation matrix can be used to construct an n-dimensional dual-domain modulation signal of the n-dimensional time-domain and n-dimensional frequency domain, which is referred to as n-dimensional time-frequency dual-domain modulation signal model (n-TFM).
[0072] Since spectrum is a scarce natural resource, the spectrum bandwidth allocated to the TFDMA network is W. In the method of dividing the total system frequency W in this disclosure, two issues need to be considered: one is the design scheme of the sub-channel bandwidth Δf; the other is the allocation scheme of allocating n frequencies of the number of total system frequency N to each user. Specifically, the first method is Δf=f.sub.i−f.sub.i-1, which is the coherent bandwidth, and is defined as the minimum bandwidth that does not cause frequency interference. This frequency allocation method makes it possible that the number of sub-channels N=W/Δf without frequency interference reaches the maximum, and which is the design scheme for sub-channel bandwidth Δf under the condition where the number of users reaches the maximum. The second method is Δf=f.sub.i−f.sub.i-1, which is much larger than the coherent bandwidth. The number of frequency points of the system is still calculated through N=W/Δf, but the total number of frequency points of the system is much smaller than the first method. Each user still uses n frequency points to access the TFDMA network, but the way of taking n frequency points is random hopping, and the n frequency points taken each time are different, forming a fast frequency hopping system, which is the design scheme with the strongest anti-interference ability but the reasonable minimum sub-channel bandwidth Δf for the number of users. It is further required that the design scheme of the sub-channel bandwidth Δf can be changed in the above-mentioned maximum and minimum scheme.
[0073] The way each user obtains n frequencies from the N frequencies of the system is specifically as follows. The first method is a continuous n discrete frequency allocation scheme, and the sub-channel bandwidth Δf is the coherent bandwidth. f.sub.0 is set as the minimum center frequency of the system, and other center frequencies can be calculated through f.sub.0 and Δf, that is, f.sub.lc=f.sub.0+(l−1).Math.Δf, l=1, 2, . . . , N, l=1, 2, . . . , N. If each user is assigned n different frequencies, the n frequencies of the first user can be calculated by using the expression f.sub.1c,i-1=f.sub.0+(i−1).Math.Δf, i=1, 2, . . . , n. The n frequencies of the first user can be calculated by using the expression f.sub.2c,i-1=f.sub.1c,n-1+(i−1).Math.Δf, i=1, 2, . . . , n; . . . ; the n frequencies of the Nth user can be calculated by using the expression f.sub.Nc,i-1=f.sub.(N-1)c,n-1+(i−1) Δf, i=1, 2, . . . , n. The maximum number of users of frequency division multiple access that the system can operate in a time slot is N/n. The second method is n hopping frequency allocation scheme, the sub-channel bandwidth Δf=f.sub.i−f.sub.i-1 is much larger than the coherent bandwidth, and the number of frequency points of the system is still calculated through N=W/Δf. Each user still uses n frequency points to access the TFDMA network, but the way to take n frequency points is random hopping. After each user gets n frequency points, they can use permutation codeword [w.sub.1w.sub.2 . . . w.sub.n] to number n frequency points, that is, the n hopping frequency points of each user can be expressed as f.sub.w.sub.
[0074]
(a frequency unit) sequence Δf.sub.1, Δf.sub.2, . . . , Δf.sub.b, . . . , Δf.sub.n. Each square is the product Δf.sub.b.Math.Δt.sub.b of Δf.sub.b and Δt.sub.b, m=1, 2, . . . , M. Each element 1 of the permutation matrix is replaced with the frequency value f.sub.i=f.sub.w.sub.
[0075] Model 4: It is set that the modulation multi-domain is the joint modulation domain of the amplitude domain and phase domain of the carrier, set d.sub.i=A.sub.i and d.sub.i=p.sub.i, then the domain chip of the modulation multi-domain is the combination of the amplitude chip and the phase chip, that is, Δd.sub.b=d.sub.i−d.sub.i-1=ΔA.sub.b−A.sub.i−A.sub.i-1 and Δd.sub.b=d.sub.i−d.sub.i-1=Δp.sub.b=p.sub.i−p.sub.i-1, b,i=1, 2, . . . , n. That is, two different n×n permutation matrices can be used to construct an n-dimensional dual-domain modulation signal composed of a joint modulation multi-domain composed of the n-dimensional time domain and n-dimensional amplitude as well as n-dimensional phase, which is referred to as n dimensional time-amplitude-phase dual-domain modulation signal model (n-TAPM). The element “1” in the two permutation matrices are respectively replaced by the amplitude value A.sub.i and the phase value p.sub.i corresponding to the time chip Δt.sub.b. A.sub.i is a symbol value of the permutation codeword A.sub.m(a; l.sub.1; (t.sub.l1).sup.q.sup.
can be obtained. If a k-bit binary message sequence selects a codeword [u.sub.1u.sub.2 . . . u.sub.n] of [u.sub.1u.sub.2 . . . u.sub.n], Q.sub.1≤n−1, 1≤q.sub.1≤Q.sub.1, and another k-bit binary message sequence selects a codeword [v.sub.1v.sub.2 . . . v.sub.n] of Γ.sub.n.sup.2={(t.sub.l1).sup.Q.sup.
[0076]
[0077] Model 5: It is set that the modulation domain is the joint modulation of the amplitude and frequency of the carrier, set d.sub.i=A.sub.i and d.sub.i=f.sub.i, then the domain chip of the modulation domain are the amplitude slot and frequency slot, namely Δd.sub.b=d.sub.i−d.sub.i-1=ΔA.sub.b−A.sub.i−A.sub.i-1 and Δd.sub.b=d.sub.i−d.sub.i-1=Δf.sub.b−f.sub.i−f.sub.i-1, b, i=1, 2, . . . , n. That is, two different n×n permutation matrices can be used to construct an n-dimensional dual-domain modulation signal composed of the joint modulation multi-domain of the n-dimensional time domain and the n-dimensional amplitude domain as well as the n-dimensional frequency, which is referred to as n-dimensional time-amplitude frequency dual-domain modulation signal model (n-TAFM). The elements “1” in the two permutation matrices are respectively replaced by the amplitude value A.sub.i and the frequency value f.sub.i corresponding to the time chip Δt.sub.b. A.sub.i is the i-th symbol value of the permutation codeword A.sub.m(a; l.sub.1; (t.sub.l1).sup.q.sup.
[0078]
[0079] Model 6: It is set that the modulation multi-domain is the joint modulation domain of the amplitude, phase and frequency of the carrier, set d.sub.i=A.sub.i, d.sub.i=p.sub.i and d.sub.i=f.sub.i, then the domain chip of the modulation multi-domain are the amplitude chip Δd.sub.b=d.sub.i−d.sub.i-1=ΔA.sub.b=A.sub.i−A.sub.i-1, phase chip Δd.sub.b=d.sub.i−d.sub.i-1=Δp.sub.b=p.sub.i−p.sub.i-1 and frequency chip Δd.sub.b=d.sub.i−d.sub.i-1=Δf.sub.b=f.sub.i−f.sub.i-1, b, i=1, 2, . . . , n. That is, three different n×n permutation matrices can be used to construct a dual-domain modulation signal model (n-TAPFM) composed of the n-dimensional time domain and the amplitude-phase-frequency joint modulation multi-domain. The elements “1” in the three permutation matrices are respectively replaced by the amplitude value A.sub.i, the phase value p.sub.i and the frequency value f.sub.i corresponding to the time chip Δt.sub.b in the permutation vector. A.sub.i is the i-th symbol value of the permutation codeword A.sub.m(a; l.sub.1; (t.sub.l1).sup.q.sup.
and f.sub.i=f.sub.w.sub.
[0080]
[0081] Part 3: Multi-Dimensional High-Order Dual-Domain Modulation Signal Permutation Array Constellation Diagram
[0082] The main purpose of this section is to invent a constructing method for an n-dimensional high-order dual-domain modulation signal permutation array constellation method based on the permutation group code P.sub.n. That is, the n-dimensional dual-domain modulation signal model in Part 2 is used as the signal point, and the 2.sup.k codewords in a subset of the permutation group code P.sub.n are used to control the transmission of this signal point, thereby forming the permutation array constellation diagram of an n-dimensional 2.sub.k order dual-domain modulation signal.
[0083] This section will describe three points. One is related to the method of selecting 2.sup.k codewords from p codewords of (n,μ,d) permutation group code P.sub.n to form a permutation array code Γ.sub.n when n>1 is any positive integer, which involves the method of using the cycle-shifted technology to generate the permutation array code Γ.sub.n. The second is related to an disclosure of a method for constructing coset leader set L.sub.n in the case of any n. The third is related to a structure and design method of the permutation array constellation architecture of n-dimensional high-order dual-domain modulation signal by using the six n-dimensional dual-domain modulation signal models in Part 2 based on the structural design of the permutation array code Γ.sub.n.
[0084] First, when n>1 is any positive integer, the design method of the coset leader set L.sub.n is invented. From the method of generating expressions (1) and (2), it can be found that the key to enumerating the permutation group code P.sub.n is to first calculate the coset leader set L.sub.n. This disclosure uses a scale transformation f.sub.a(x)=ax(wherein a∈Z.sub.n-1 and x∈S.sub.n) to calculate L.sub.n={al.sub.1|a∈Z.sub.n-1; l.sub.1=[12 . . . n]∈S.sub.n}∪S.sub.n. φ(n) is set to denote the number of numbers in a=1, 2, . . . , n−1 that do not have a common factor with n, {φ} denotes the set of numbers in a that do not have a common factor with n. The value range of a is a∈{φ}, which determines the size of the coset leader set, that is, |L_n|=|{φ}|=φ(n). The maximum number of fixed-points of any permutation vector except the unit permutation vector in L.sub.n is expressed as δ, which gives the minimum Hamming distance of L.sub.n, that is, d.sub.L.sub.
[0085] 1. When n is a prime number, all the values of a=1, 2, . . . , n−1 and n are mutually prime numbers, that is, GCD(a,n)=1, there is no common factor of all values of a with n. Therefore, φ(n)=n−1, a∈{φ}={1, 2, . . . , n−1}=Z.sub.n-1, then L.sub.n is referred to as the maximum single fixed point subgroup. A simple calculation expression L={al.sub.1|a∈Z.sub.n-1; l.sub.1=[12 . . . n]∈S.sub.n} can be used to enumerate all permutation codewords in L.sub.n. When the size of L.sub.n is |L_n|=|{φ}|=φ(n)=n−1, it reaches the maximum. Since each permutation of the maximum single fixed point subgroup L.sub.n contains only single-fixed-point, that is, δ=1, the minimum Hamming distance is d.sub.L.sub.
[0086] 2. When n is not a prime number but a power of 2, that is, when n=2.sup.q is a power of 2, and q≥2 is a positive integer, the size of L.sub.n is |L.sub.n|=2.sup.q-1, the maximum fixed-point is δ=2.sup.q-1, the minimum Hamming distance of L.sub.n is d.sub.L.sub.
[0087] 3. When n>1 is the product of two prime numbers and contains 3, let h be another prime number, and the size of L.sub.n is |L.sub.n|=φ(n)=|{From 1 to n−1, the set of numbers that do not contain multiples of 3 and multiples of h}|. The maximum fixed-point of L.sub.n is δ=the number of co-values of all 3 from 1 to n−1. The minimum Hamming distance of L.sub.n is d.sub.L.sub.
[0088] In summary, for any positive integer n>1, the design method for L.sub.n is: i) calculating the set {φ} formed by a=1, 2, . . . , n−1 and the value a which has no common factor with n, determining the number of the set |{φ}|=φ(n)=|L.sub.n|; ii) calculating L={al.sub.1|a∈{φ}; GCD(a, n)=1; l.sub.1=[12 . . . n]}, obtaining the coset leader set L.sub.n or listing L.sub.n through observation; iii) using the method of observation or analysis to find the maximum fixed-point codeword from the set L.sub.n, obtaining δ, and obtaining the minimum Hamming distance d.sub.L.sub.
[0089] Secondly, when n>1 is any positive integer, the design method of (n, μ, d) permutation group code P.sub.n is provided first, and then the permutation array code Γ.sub.n is generated from P.sub.n. Specifically, the cycle-shifted technique is used to generate the permutation group code P.sub.n. In the basic principle, it describes the algebraic generating method of permutation group code (n,n(n−1),n−1) when n is a prime number, and the permutation synchronous operation method (such as (1) calculation operation expression) and the calculation method of affine transformation (such as (2) calculation operation expression) are adopted. In the calculation operation expression (1), it is difficult to enumerate the code set P.sub.n in the form of hardware and software, and the complexity in time calculation is quite high. In the calculation operation expression (2), it is required to use modulo-n addition and modulo-n multiplication operations, which has certain time complexity. Cycle-shifted technology is an effective method to reduce time complexity. For this purpose, the following cycle-shifted operator is defined, and a composition function based on the cycle-shifted operator is constructed.
[0090] The cycle-right-shifted operator t.sub.rn is defined, when it acts on any permutation vector x=[x.sub.1x.sub.2 . . . x.sub.n], the rightmost element of this vector is moved to the leftmost, and the remaining n−1 elements are moved to the right in turn, namely t.sub.rnx=t.sub.rn[x.sub.1x.sub.2 . . . x.sub.n]=[x.sub.nx.sub.1x.sub.2 . . . x.sub.n-1]. The cycle-left-shifted operator t.sub.l1 is defined, when it acts on any permutation vector x=[x.sub.1x.sub.2 . . . x.sub.n], the leftmost element of this vector is moved to the rightmost, and the remaining n−1 elements are moved to the left in turn, namely t.sub.l1x=t.sub.l1[x.sub.1x.sub.2 . . . x.sub.n]=[x.sub.2x.sub.3 . . . x.sub.n-1x.sub.nx.sub.1].
[0091] A composition function of the cycle-right-shifted operator and the left-shifted operator are constructed. The composition function (t.sub.rn).sup.n-1 of the right-shifted operator t.sub.rn is constructed, when it acts on any permutation codeword x=[x.sub.1x.sub.2 . . . x.sub.n], n permutation codeword including this permutation codeword x are obtained, thereby constituting a loop Latin square, and constituting an orbit set of permutation codewords with x as the leader of the orbit, or constituting a coset with x as the leader of the coset, thereby obtaining a set {(t.sub.rn).sup.n-1x}={x, (t.sub.rn).sup.1x, (t.sub.rn).sup.2x, . . . , (t.sub.rn).sup.n-1x}={(t.sub.rn).sup.n-1[x.sub.1x.sub.2 . . . x.sub.n])}={[x.sub.1x.sub.2 . . . x.sub.n], (t.sub.rn).sup.1[x.sub.1x.sub.2 . . . x.sub.n], (t.sub.rn).sup.2[x.sub.1x.sub.2 . . . x.sub.n], [x.sub.1x.sub.2 . . . x.sub.n]}={[x.sub.1x.sub.2 . . . x.sub.n], [x.sub.nx.sub.1x.sub.2 . . . x.sub.n-1], [x.sub.n-1x.sub.nx.sub.1x.sub.2 . . . x.sub.n-2], . . . , [x.sub.2x.sub.3 . . . x.sub.nx.sub.1]} constituted by n permutation codewords containing the permutation codeword x. The composition function (t.sub.1l).sup.n-1 of the left-shifted operator t.sub.l1 is constructed, when it acts as any permutation codeword x=[x.sub.1x.sub.2 . . . x.sub.n], n permutation codewords including this permutation codeword x is obtained, thereby constituting a loop Latin square, and constituting an orbit set of permutation codewords with x as the leader of the orbit, or constituting a coset with x as the leader of the coset, thereby obtaining a set {(t.sub.l1).sup.n-1x}={x, (t.sub.l1).sup.1x, (t.sub.l1).sup.2x, . . . , (t.sub.l1).sup.n-1x}={(t.sub.l1).sup.n-1 [x.sub.1x.sub.2 . . . x.sub.n]}={[x.sub.1 . . . x.sub.n], (t.sub.l1).sup.1[x.sub.1 . . . x.sub.n], (t.sub.l1).sup.2[x.sub.1 . . . x.sub.n], . . . , (t.sub.l1).sup.n-1[x.sub.1 . . . x.sub.n]}={[x.sub.1 . . . x.sub.n], [x.sub.nx.sub.1 . . . x.sub.n-1], [x.sub.n-1x.sub.nx.sub.1 . . . x.sub.n-2], . . . , [x.sub.2 . . . x.sub.nx.sub.1]} constituted by n permutation codewords containing the permutation codeword x. These two composition functions act on the same permutation codeword x, and get the same code set {(t.sub.rn).sup.n-1x}={(t.sub.l1).sup.n-1x}, but the order of the codewords in these two sets is different.
[0092] If the cycle-right-shifted composition function (t.sub.rn).sup.n-1 and the cycle-left-shifted composition function (t.sub.l1).sup.n-1 both act on the maximum single-fixed-point subgroup L.sub.n, the permutation group code P.sub.n={(t.sub.rn).sup.n-1L.sub.n}={(t.sub.l1).sup.n-1L.sub.n} can be obtained. More specifically, the cycle-left-shifted composition function (t.sub.l1).sup.n-1 and the cycle-right-shifted composition function (t.sub.rn).sup.n-1 are used to act on the orbit leader permutation vector l.sub.1, l.sub.2, . . . , l.sub.a, . . . , l.sub.|L.sub.
[0093] The method of generating permutation group code P.sub.n in different situations is given below.
[0094] 1) When n is a prime number, L.sub.n={al.sub.1|a∈Z.sub.n-1; l.sub.1=[12 . . . n]∈S.sub.n} is the maximum single fixed point subgroup of S.sub.n, and P.sub.n is calculated as follows.
[0095] P.sub.n is a (n,n(n−1),n−1) permutation group code. This generating method has been protected in the patent “communication channel encoding method and permutation code set generator (Patent No.: ZL 2016 1 0051144.9, patent right obtained on Jan. 26, 2019)”. Here, the above disclosure is described again in different ways, and the description is easier to understand and clearer for operation.
[0096] 2) When n is not a prime number, L={al.sub.1|a∈Z.sub.n-1; GCD(a,n)=1; l.sub.1=[12 . . . n]∈S.sub.n} is a fixed-point subgroup of S.sub.n, and P.sub.n is calculated as follows.
[0097] P.sub.n is a (n,n.Math.φ(n),n−δ) permutation group code, wherein δ is the maximum fixed-points in all permutation vectors of L.sub.n, and δ can be used to determine the minimum Hamming distance d.sub.L.sub.
Example 2
[0098] Set n=8 as a power of 2, not a prime number. The value of a in a∈Z.sub.n-1=Z.sub.7={1,2,3,4,5,6,7} which has no common factor with n=8 can be taken from {φ}={1,3,5,7}, φ(n)=φ(8)=4, |{φ}|=φ(8)=|L.sub.8|=4. First of all, L.sub.8 is calculated.
[0099] L.sub.8 {al.sub.1|a∈Z.sub.n-1; GCD(a,n); l.sub.1=[12 . . . n]}={al.sub.1|a∈{1,3,5,7}; l.sub.1=
[0100] ={l.sub.1, l.sub.3, l.sub.5, l.sub.7}={[12345678], [36147258], [52741638], [76543218]}
[0101] It can be verified that the three vectors in the set {al.sub.1|a∈{2,4,6}; l.sub.1=[12345678]}={l.sub.2, l.sub.4, l.sub.6}={[24682468, [48484848], [64286428]} are all constituted by positive numbers, but none of them is permutation vector. The cycle-left-shifted composition function (t.sub.l1).sup.n-1 can be used to act on L.sub.8 to generate P.sub.8.
[0102] In digital communication systems, since binary sequences are used to control the emission of signal points in the constellation diagram, which requires the size of the constellation diagram to be a power of 2, and the size of the permutation group code P.sub.n is not necessarily a power of 2, so the permutation array code Γ.sub.n needs to be incorporated.
[0103] The limiting condition for constructing permutation array code Γ.sub.n is: i) Γ.sub.n must be a subset of P.sub.n, so |Γ.sub.n|≤|P.sub.n| is incorporated; ii) Γ.sub.n must have a coset structure similar to P.sub.n, and be able to use the reduced order functions (t.sub.l1).sup.Q and (t.sub.rn).sup.Q of the cycle-shifted bit composition function (t.sub.l1).sup.n-1 and (t.sub.rn).sup.n-1 to act on L.sub.n, wherein Q≤n−1, and the value of Q must be a power of 2 minus 1; iii) since the size of the permutation array constellation diagram is a power of 2, this requires that the size of the permutation array code Γ.sub.n must be a power of 2, wherein the number of cosets in Γ.sub.n is also a power of 2, and the number of codewords in each coset is also a power of 2; iv) under the condition that |Γ.sub.n| is a power of 2, Γ.sub.n should be as large as possible to obtain a larger data rate.
[0104] According to the above limiting conditions of the permutation array code Γ.sub.n set in the disclosure, a design criterion for Γ.sub.n can be determined as follows: For Γ.sub.n={(t.sub.l1).sup.QL.sub.n}⊂P.sub.n or Γ.sub.n={(t.sub.rn).sup.QL.sub.n}⊂P.sub.n, the size |L.sub.n| of L.sub.n is preferably a power of 2, as set in the above condition iii).
[0105] In the limiting condition i) of permutation array code Γ.sub.n, |Γ.sub.n|≤|P.sub.n|, which implies that codewords need to be discarded when obtaining Γ.sub.n from P.sub.n, and the above design criterion ensures that, when Γ.sub.n is obtained from P.sub.n, none of coset in P.sub.n should be discarded. Therefore, this design criterion ensures that the number of cosets of Γ.sub.n is equal to the number of cosets of P.sub.n, and both need to be a power of 2, which also ensures that |Γ.sub.n| is as large as possible, so as to obtain the most codewords from P.sub.n to reach the maximum data rate, therefore, Γ.sub.n is the optimal permutation array code.
[0106] P.sub.n={(t.sub.rn).sup.n-1L.sub.n}={(t.sub.l1).sup.n-1L.sub.n} is the permutation group, but Γ.sub.n={(t.sub.rn).sup.QL.sub.n}={(t.sub.rn).sup.Ql.sub.1, (t.sub.rn).sup.Ql.sub.2, . . . , (t.sub.rn).sup.Ql.sub.n-1} or Γ.sub.n={(t.sub.l1).sup.QL.sub.n}={(t.sub.l1).sup.Ql.sub.1, (t.sub.l1).sup.Ql.sub.2, . . . , (t.sub.l1).sup.Ql.sub.n-1} is no longer the permutation group because there is Q=2.sup.p−1≤n−1 from P.sub.n to Γ.sub.n. In other words, at least n−2.sup.Q codewords must be deleted from each coset of P.sub.n to form Γ.sub.n. The deletion of these codewords from P.sub.n destroys the group structure of Γ.sub.n, making it not satisfy the four axioms of the group, that is, some codewords in Γ.sub.n do not have inverses, and not all codewords satisfy the associative law. Therefore, Γ.sub.n is called permutation array code. Additionally, each subset {(t.sub.l1).sup.Ql.sub.a} in Γ.sub.n={(t.sub.l1).sup.QL.sub.n}={(t.sub.l1)l.sub.1, (t.sub.l1).sup.Ql.sub.2, . . . , (t.sub.l1).sup.Ql.sub.n-1} is still a coset, but is no longer the orbit of the permutation codeword of the coset leader, because every orbit in original P.sub.n can migrate from the last orbit back to the orbit leader permutation, and every coset in Γ.sub.n no longer has orbit characteristics. It is set that the binary sequence to be transmitted is decomposed into segments of length k, then the size of the permutation array code is |Γ.sub.n|=2.sup.k.
[0107] Table 1 shows the generating expression and related parameters of the permutation array codes. The disclosure seeks to protect 9 permutation array codes.
[0108] In the expression, n is the code length, and the code length of the permutation array code sought to be protected is n=4, 5, 8, 15, 16, 17, 32, 51, 64, refer to the first column of Table 1.
[0109] The length of the binary message sequence carried by the 9 permutation array codes is k=3, 4, 5, 6, 7, 8, 9, 10, 11 bits, as shown in the second column of Table 1.
[0110] The number of cosets contained in these 9 permutation array codes are |L.sub.n|=2.sup.k.sup.
[0111] The size of the 9 permutation array codes is |Γ.sub.n|=2.sup.k=8, 16, 32, 64, 128, 256, 512, 1024, 2048, see the fifth column of Table 1.
[0112] Among all the codewords of the 9 permutation array codes, the corresponding maximum fixed-points are δ=2, 1, 4, 5, 8, 1, 16, 17, 32, as shown in the second last column of Table 1.
[0113] The minimum Hamming distances of the 9 permutation array codes are d.sub.Γ.sub.
[0114] The expression for generating 9 permutation array codes is
Γ.sub.4={(t.sub.l1).sup.3L.sub.4}={(t.sub.l1).sup.3{al.sub.1}|a∈{1,3};l.sub.1=[x.sub.1x.sub.2x.sub.3x.sub.4]}
Γ.sub.5={(t.sub.l1).sup.3L.sub.5}={(t.sub.l1).sup.3{al.sub.1}|a∈{1,2,3,4};l.sub.1=[x.sub.1x.sub.2x.sub.3x.sub.4x.sub.5]}
Γ.sub.8={(t.sub.l1).sup.7L.sub.8}={(t.sub.l1).sup.7{al.sub.1}|a∈{1,3,5,7};l.sub.1=[x.sub.1x.sub.2. . . x.sub.7x.sub.8]}
Γ.sub.15={(t.sub.l1).sup.7L.sub.15}={(t.sub.l1).sup.7{al.sub.1}|a∈{1,2,4,7,8,11,13,14};l.sub.1=[x.sub.1x.sub.2 . . . x.sub.14x.sub.15]}
Γ.sub.16={(t.sub.l1).sup.15L.sub.16}={(t.sub.l1).sup.15{al.sub.1}|a∈{1,3,5,7,9,11,13,15};l.sub.1=[x.sub.1x.sub.2 . . . x.sub.15x.sub.16]}
Γ.sub.17={(t.sub.l1).sup.15L.sub.17}={(t.sub.l1).sup.15{al.sub.1}|a∈{1,2, . . . ,15};l.sub.1=[x.sub.1x.sub.2 . . . x.sub.16x.sub.17]}
Γ.sub.32={(t.sub.l1).sup.31L.sub.32}={(t.sub.l1).sup.31{al.sub.1}|a∈{1,3,5,7, . . . ,29,31};l.sub.1=[x.sub.1x.sub.2. . . x.sub.31x.sub.32]}
Γ.sub.51={(t.sub.l1).sup.31L.sub.51}={(t.sub.l1).sup.31{al.sub.1}|a∈{Remove multiples of 3 and multiples of 17 from natural numbers from i to 51};l.sub.1=[x.sub.1x.sub.2. . . x.sub.50x.sub.51]}
Γ.sub.64={(t.sub.l1).sup.63L.sub.64}={(t.sub.l1).sup.63{al.sub.1}|a∈{All odd numbers from 1 to 64};l.sub.1 [x.sub.1x.sub.2 . . . x.sub.63x.sub.64]}}
[0115] Specifically, in order to make each codeword well represented when the codeword length n>9, the unit vector l.sub.1=[123 . . . n] of each permutation array code is expressed as l.sub.1=[x.sub.1x.sub.2x.sub.3 . . . x.sub.n], that is, the subscript value of each element in the vector is used to represent the permutation codeword of the long code.
[0116] From P.sub.n to Γ.sub.n, the number of discarded codewords for 9 permutation array codes is described as follows: codeword is not discarded from Γ.sub.4, Γ.sub.8, Γ.sub.16, Γ.sub.32, Γ.sub.64, four codewords are discarded from P.sub.5 to Γ.sub.5, 56 codewords are discarded from P.sub.15 to Γ.sub.15, 16 codewords are discarded from P.sub.17 to Γ.sub.17, 608 codewords are discarded from P.sub.51 to Γ.sub.51, see the last third column in Table 1.
TABLE-US-00001 TABLE 1 Permutation array code Γ.sub.n generating method and related parameters Minimum Fixed Hamming Permutation points Distance n k k.sub.1 k.sub.2 |Γ.sub.n| |L.sub.n| α ∈ {φ} array code Γ.sub.n |P.sub.n| δ n − δ 4 3 1 2 8 2 α ∈{1, 3} Γ.sub.4 = {(t.sub.l1).sup.3{al.sub.1}} |P.sub.4| = |Γ.sub.4| 2 2 5 4 2 2 16 4 α ∈{1, 2, 3, 4} Γ.sub.5 = {(t.sub.l1).sup.3{al.sub.1}} |P.sub.5| = |Γ.sub.5| + 4 1 4 8 5 2 3 32 4 α ∈{1, 3, 5, 7} Γ.sub.8 = {(t.sub.l1).sup.7{al.sub.1}} |P.sub.8| = |Γ.sub.8| 4 4 15 6 3 3 64 8 α ∈{1, 2, 4, 7, 8, 11, 13, 14} Γ.sub.15 = {(t.sub.l1).sup.7{al.sub.1}} |P.sub.15| = |Γ.sub.15| + 56 5 10 16 7 3 4 128 8 α ∈{1, 3, 5, 7, 9, 11, 13, 15} Γ.sub.16 = {(t.sub.l1).sup.15{al.sub.1}} |P.sub.16| = |Γ.sub.16| 8 8 17 8 4 4 256 16 α ∈{{1, 2, 3, 4, 5, 6, 7, 8, Γ.sub.17 = {(t.sub.l1).sup.15{al.sub.1}} |P.sub.17| = |Γ.sub.17| + 16 1 16 9, 10, 11, 12, 13, 14, 15} 32 9 4 5 512 16 α ∈{{1, 3, 5, 7, 9, 11, 13, 15, 17, Γ.sub.32 = {(t.sub.l1).sup.31{al.sub.1}} |P.sub.32| = |Γ.sub.32| 16 16 19, 21, 23, 25, 27, 29, 31} 51 10 5 5 1024 32 α ∈ {{1, 2, 4, 5, 7, 8, 10, 11, 13, Γ.sub.51 = {(t.sub.l1).sup.31{al.sub.1}} |P.sub.51| = |Γ.sub.51| + 608 17 34 14, 16, 19, 20, 22, 23, 25, 26, 28, 29, 31, 32, 35, 37, 38, 40, 41, 43, 44, 46, 47, 49, 50} 64 11 5 6 2048 32 α ∈ {{1, 3, 5, 7, 9, 11, 13, 15, 17, Γ.sub.64 = {(t.sub.l1).sup.63{al.sub.1}} |P.sub.64| = |Γ.sub.64| 32 32 19, 21, 23, 25, 27, 29, 31, 33, 35, 37, 39, 41, 43, 45, 47, 49, 51, 53, 55, 57, 61, 63}
[0117] From the n-dimensional dual-domain modulation signal model in Part 2, it can be seen that the n-dimensional vector modulating the amplitude, phase, and frequency of n carriers is derived from the permutation codewords in the permutation array code set Γ.sub.n. Then, the six signal models s.sub.m(t) are controlled by the subscript m=1, 2, . . . , |Γ.sub.n| to form signal points generated by |Γ.sub.n|=2.sup.k permutation codewords. This |Γ.sub.n| signal points form a high-order permutation array constellation diagram of an n-dimensional dual-domain modulation signal, and represented as a set {s.sub.m(t)|m=1, 2, . . . , |Γ.sub.n|; s.sub.m(t)=n-TAM, n-TPM, n-TFM, n-TAPM, n-TAFM, n-TAPFM}. For these 6 permutation array constellations, the specific structure design is as follows:
[0118] 1) The permutation array constellation diagram of the n-dimensional 2.sup.k order time-amplitude dual-domain modulation signal is a set {s.sub.m(t)|m=1, 2, . . . , 2.sup.k; s.sub.m(t)=[u.sub.1u.sub.2 . . . u.sub.n]g(t)ω.sub.ct; [u.sub.1u.sub.2 . . . u.sub.n]∈Γ.sub.n} of 2.sup.k signal points s.sub.m(t), which is a constellation diagram constituted by 2.sup.k “amplitude signals sequentially controlled by n time chips”.
[0119] 2) The n-dimensional 2.sup.k order time-phase dual-domain modulation signal permutation array constellation diagram is a set
constituted by 2.sup.k signal points s.sub.m(t), which is a constellation diagram constituted by 2.sup.k “phase signals sequentially controlled by n time chips”.
[0120] 3) The n-dimensional 2.sup.k-order time-frequency dual-domain modulation signal permutation array constellation diagram is a set {s.sub.m(t)|m=1, 2, . . . , 2.sup.k; s.sub.m(t)=g(t)[(cos 2πf.sub.w.sub.
[0121] 4) The permutation array constellation diagram of the dual-domain modulation signal composed of n-dimensional 2.sup.k-order time-amplitude-phase joint modulation multi-domain is a set
constituted by 2.sup.k signal points s.sub.m(t), which is a constellation diagram constituted by 2.sup.k “joint modulation domain signals of amplitude and phase sequentially controlled by n time chips”, wherein Γ.sub.n.sup.1={(t.sub.l1).sup.Q.sup.
[0122] 5) The permutation array constellation diagram of the dual-domain modulation signal composed of n-dimensional 2.sup.k-order time-amplitude-frequency joint modulation multi-domain is a set {s.sub.m(t)|m=1, 2, . . . , 2.sup.k; s.sub.m(t)=g(t)[(u.sub.1 cos(2ππf.sub.w.sub.
[0123] 6) The permutation array constellation diagram of the dual-domain modulation signal composed of n-dimensional 2.sup.k-order time-amplitude-phase-frequency joint modulation multi-domain is a set
composed of 2.sup.k signal points s.sub.m(t), which is a constellation diagram composed of 2.sup.k “variable power phase modulation-frequency modulation joint modulation domain signal sequentially controlled by n time chips”, wherein Γ.sub.n.sup.1={(t.sub.l1).sup.Q.sup.
[0124] Permutation array code Γ.sub.n={(t.sub.l1).sup.Q{al.sub.1}} and its subset Γ.sub.n.sup.1={(t.sub.l1).sup.Q.sup.
[0125] It is worth noting that the permutation array constellation diagrams of the 6 kinds of n-dimensional 2.sup.k-order dual-domain modulation signals constructed above is described and exhibited in a different form as compared with conventional or currently adopted constellation diagrams of the 2-dimensional 2.sup.k-order modulation signals. For example, the commonly adopted QAM constellation diagram is defined as a two-dimensional plane quadrature amplitude phase modulation constellation diagram. Because QAM constellation diagram is two-dimensional, the points on the two-dimensional plane can be adopted to represent the signal points. The discrete dots on the plane represent the signal constellation diagram. The permutation array code is a hyperball code of equal power, which means that the n-dimensional 2.sup.k-order dual-domain modulation signal of the hyperball code based on the permutation array code cannot visually display the geometric shape of the signal point in the 2-dimensional plane and the 3-dimensional space. Therefore, the permutation array constellation diagram of the n-dimensional 2.sup.k-order dual-domain modulation signal can only be described by the above-mentioned calculation expression at present. It should be emphasized that the permutation array constellation diagrams of the above-mentioned 6 kinds of n-dimensional 2.sup.k-order dual-domain modulation signals are represented by mathematical symbols and operation expressions formed by them, but it neither belongs to any mathematical category, nor is it universal or natural mathematical tools and laws of nature. All signal expressions and constellation diagram expressions are constructed by the inventor by borrowing mathematical symbols.