METHODS AND APPARATUS FOR INFORMATION AND DATA TRANSMISSION
20250062779 ยท 2025-02-20
Inventors
- Chulong LIANG (Shenzhen, CN)
- Wei Zhao (Shenzhen, CN)
- Jin Xu (Shenzhen, CN)
- Liguang Li (Shenzhen, CN)
- Guanghui Yu (Shenzhen, CN)
- Jian KANG (Shenzhen, CN)
- Qiang FU (Shenzhen, CN)
Cpc classification
H03M13/617
ELECTRICITY
H03M13/6356
ELECTRICITY
H03M13/2778
ELECTRICITY
International classification
H04L1/00
ELECTRICITY
Abstract
Methods, apparatus, and systems that relate to rate matching scheme design for polar coding, PAC coding, or other pre-transformed polar coding are disclosed. In one example aspect, a method for digital communication includes determining, by a first node, an output bit sequence having E bits based on an input bit sequence having K bits, wherein the output bit sequence is determined by performing a polar transform with H components and a pre-transform; wherein the polar transform is based on H polar matrices G.sup.(N.sup.
Claims
1. A method for digital communication, comprising: determining, by a first node, an output bit sequence having E bits based on an input bit sequence having K bits, wherein the output bit sequence is determined by performing a polar transform with H components and a pre-transform, wherein the polar transform is based on H polar matrices G.sup.(N.sup.
2. The method of claim 1, wherein at least two of the H polar matrices have sizes greater than 2.
3. The method of claim 1, wherein each of N.sub.0, N.sub.1, . . . , N.sub.H1 is an integer being a power of 2.
4. The method of claim 1, wherein the output bit sequence is determined by further performing a repetition operation, wherein an input of the repetition operation is based on the input bit sequence.
5. The method of claim 4, wherein the repetition operation comprises: obtaining, by the first node, a repetition input bit sequence; and determining, by the first node, H component repetition output bit sequences c.sup.(0), c.sup.(1), . . . , c.sup.(H1) based on at least one of: 1) a length list (K.sub.0, K.sub.1, . . . , K.sub.H1), wherein K.sub.i indicating the length of c.sup.(i) or 2) a repetition index list (R.sup.(0), R.sup.(1), . . . , R.sup.(H1)) , wherein c.sup.(i)=[c.sub.0.sup.(i), c.sub.1.sup.(i), . . . , c.sub.K.sub.
6. The method of claim 5, wherein at least two of the H component repetition output bit sequences share at least one common element.
7. The method of claim 5, wherein at least one of the H component repetition output bit sequences c.sup.(0), c.sup.(1), . . . , c.sup.(H1) has a length equal to the length of the input bit sequence.
8. The method of claim 5, wherein at least two of the H component repetition output bit sequences c.sup.(i) and c.sup.(j) are determined based on at least one same bit in the input bit sequence.
9. The method of claim 5, wherein at least two of the H component repetition output bit sequences c.sup.(i) and c.sup.(j) comprise matching sub-sequences generated based on the input bit sequence.
10. The method of claim 5, wherein at least one element R.sup.(i) in the repetition index list (R.sup.(0), R.sup.(1), . . . , R.sup.(H1)) is equal to a first-type integer set Z.sub.K={0, 1, 2, . . . , K1}, wherein the first-type integer set Z.sub.K={0, 1, 2, . . . , K1} comprises all non-negative integers smaller than K.
11. A method for digital communication, comprising: receiving, by a second node, a signal including an output bit sequence having E bits from a first node; and determining, by the second node, an input bit sequence having K bits based on the signal, wherein the output bit sequence is determined by performing a polar transform with H components and a pre-transform, wherein the polar transform is based on H polar matrices G.sup.(N.sup.
12. The method of claim 11, wherein the output bit sequence is determined by further performing a rate profile operation, wherein the input of the rate profile operation is based on the input bit sequence.
13. The method of claim 12, wherein the rate profile operation is performed on the input bit sequence c=[c.sub.0, c.sub.1, . . . , c.sub.K1] using a first data bit index set Q={Q.sub.0, Q.sub.1, . . . , Q.sub.K1} to obtain a repetition rate profile output bit sequence v=[v.sub.0, v.sub.1, . . . , v.sub.N1].
14. The method of claim 13, wherein the output bit sequence is determined by further performing a repetition operation, wherein the repetition operation comprises: determining, by the first node, H component repetition output bit sequences c.sup.(0), c.sup.(1), . . . , c.sup.(H1) based on the repetition rate profile output bit sequence v=[v.sub.0, v.sub.1, . . . , v.sub.N1] by at least one of: 1) a length list (K.sub.0, K.sub.1, . . . , K.sub.H1, wherein K.sub.i indicating the length of c.sup.(i) or 2) the first data bit index set Q={Q.sub.0, Q.sub.1, . . . , Q.sub.K1}, wherein c.sup.(i)=[c.sub.0.sup.(i), c.sub.1.sup.(i), . . . , c.sub.K.sub.
15. The method of claim 12, wherein the rate profile operation is performed with H components.
16. An apparatus for communication network, comprising at least one processor configured to cause the apparatus to: determine an output bit sequence having E bits based on an input bit sequence having K bits, wherein the output bit sequence is determined by performing a polar transform with H components and a pre-transform, wherein the polar transform is based on H polar matrices G.sup.(N.sup.
17. The apparatus of claim 16, the processor is further configured to perform a first concatenation operation, wherein the input of the first concatenation operation is based on the input sequence.
18. The apparatus of claim 17, wherein the first concatenation operation generates an intermediate output sequence having E bits.
19. The apparatus of claim 17, wherein the first concatenation operation is performed on a first H component bit sequences generated based on the input sequence.
20. The apparatus of claim 16, wherein the pre-transform generates an intermediate bit sequence having E bits, wherein a bit of the intermediate bit sequence is determined by a convolution bit sequence or a convolution polynomial, wherein the convolution bit sequence comprises a generator bit sequence g=[g.sub.0, g.sub.1, . . . , g.sub.m] or a recursive feedback bit sequence q=[q.sub.0, q.sub.1, . . . , q.sub.m], wherein m is a positive integer, wherein the convolution polynomial comprises a generator polynomial g(D)=g.sub.0+g.sub.1.Math.D+ . . . +g.sub.m1.Math.D.sup.m1 +g.sub.m.Math.D.sup.m or a recursive feedback polynomial q(D)=q.sub.0+q.sub.1.Math.D+ . . . +q.sub.m1.Math.D.sup.m1 +q.sub.m.Math.D.sup.m , and wherein m is a positive integer.
Description
BRIEF DESCRIPTION OF THE DRAWING
[0010]
[0011]
[0012]
[0013]
[0014]
[0015]
[0016]
[0017]
[0018]
[0019]
[0020]
DETAILED DESCRIPTION
[0021] Headings for the various sections below are used to facilitate the understanding of the disclosed subject matter and do not limit the scope of the claimed subject matter in any way. Accordingly, one or more features of one section can be combined with one or more features of another section. Furthermore, 5G terminology is used for the sake of clarity of explanation, but the techniques disclosed in the present document are not limited to 5G technology only and may be used in wireless systems that implemented other protocols.
[0022] This application proposes methods and apparatuses related to rate matching schemes for pre-transformed polar coding in wireless communication systems.
[0023] In the fifth generation (5G) mobile communications standard of the 3.sup.rd Generation Partnership Project (3GPP), low-density parity-check (LDPC) codes are used for data transmission. However, LDPC codes is worse than polar codes in short payload size (also called transport block size (TBS)). Also, LDPC codes have high error floors (at block error rate (BLER) of 0.0001). To fulfill the future ultra-reliable low latency communication (URLLC), we have to design more powerful channel codes.
[0024] Polarization-adjusted convolutional (PAC) codes can achieve finite-length bounds in moderate decoding complexity. PAC codes are a revolution of polar codes. As a result, PAC codes have code lengths with power of 2 (N=2.sup.n with positive integer n) as polar codes. However, to efficiently transmitting a payload (or transport block (TB)) in different wireless channel environments, it does not always have a code length of N=2.sup.n in time and frequency resources allocated by a base station (BS). As a result, rate matching schemes are needed for applying PAC codes in wireless communications. In this application, methods and apparatus for design in rate matching for polar coding, PAC coding, or other pre-transformed polar coding are proposed with good performance.
Introduction
Notations
[0025] GF(2) denotes the Galois field of size 2 with two elements 0 and 1.
[0026] br(i) is the bit-reversal function.
[0027] floor(x) denotes the largest integer not greater than x.
[0028] ceil(x) denotes the smallest integer not less than x.
[0029] round(x) is the round function such that round(x) is the integer closest to x, for example, round (3.2)=3, round (4.8)=5, round (2.5)=3, round (1.9)=2, round (3.4)=3.
[0030] max(x,y) denotes the maximum value between x and y, i.e.,
[0031] mod(x, y) denotes the remainder of x divided by y. For example, mod(5, 3)=2 and mod(3, 5)=3.
[0032] X.sub.i, j denotes the element in the i-th row and j-th column of a matrix X, where a boldface capital letter is used to represent a matrix.
[0033] [x.sub.0, x.sub.1, . . . , x.sub.Y1] denotes a sequence (or a vector) of length Y containing elements x.sub.0, x.sub.1, . . . , x.sub.Y1. A boldface small letter x is used to represent a sequence (or a vector) [x.sub.0, x.sub.1, . . . , x.sub.Y1].
[0034] {x.sub.0, x.sub.1, . . . , x.sub.Y1} denotes a set with Y distinct elements x.sub.0, x.sub.1, . . . , x.sub.Y1, i.e., for any ij, x.sub.ix.sub.j.
[0035] <x.sub.0, x.sub.1, . . . , x.sub.Y1>denotes an ordered set with Y distinct elements x.sub.0, x.sub.1, . . . , x.sub.Y1, i.e., for any ij, x.sub.ix.sub.j. Let X=<x.sub.0, x.sub.1, . . . , x.sub.Y1>, X (i) denotes the i-th element x; in the ordered set X.
[0036] For a set X, |X| denotes the set size, i.e., the number of elements in the set X.
[0037] Z.sub.N={0, 1, . . . , N2, N1} denotes the integer set containing all non-negative integers smaller than N.
[0038] Indices for sequences, vectors, or matrices are starting from zero.
Introduction to Polar Matrix
[0039] This section introduces some concepts of use of a polar matrix according to various embodiments.
[0040] We denote G.sup.(N) as a polar transform matrix (or simply, polar matrix) with N rows and N columns, where N is power of 2, i.e., N=2.sup.n and n is a positive integer. n is called the order of the polar matrix of G.sup.(N) and N is called the polar matrix size of G.sup.(N), i.e., G.sup.(N) is of size N.
[0041] G.sup.(N) can be one of the following:
[0042] Here, all the matrix operations are over GF(2), e.g.,
is the n-th Kronecker power of the matrix P.sup.(2), and B.sup.(N) is a bit-reversal permutation matrix with N rows and N columns, 0 is an all-zero matrix with N/2 rows and N/2 columns.
[0043] Let B.sub.i,j .sup.(N) be the element at the i-th row and j-th column of the bit-reversal permutation matrix B.sup.(N). Then,
for 0i<N and 0j<N, where br(i) is the bit-reversal function defined as
and [b.sub.n1, b.sub.n2, . . . , b.sub.1, b.sub.0] is the n-bit binary expansion of the integer i, i.e.,
[0044] A sequence (or a vector) x of length N over GF(2) multiplying the polar matrix G.sup.(N) over GF(2) is called polar transform on the sequence (vector) x. Denote y=x.Math.G.sup.(N), where the vector-matrix multiplication is over GF(2). Then, y is the polar transform of x.
[0045]
Introduction to 3GPP 5G Polar Coding
[0046] Some example embodiments of use of polar coding according to 3GPP 5G standard are disclosed in this section.
[0047] In the 3GPP 5G standard, polar codes are used in control channel transmission. The diagram of 5G polar coding with rate matching is shown in
[0048] Denote Q a data bit index set of size K, i.e., |Q|=K, where Q is a subset of an integer set Z.sub.N={0, 1, . . . , N2, N1} containing all non-negative integers smaller than N. Then, the encoding of an input bit sequence c=[c.sub.0, c.sub.1, . . . , c.sub.K2, c.sub.K1] into an output bit sequence e=[e.sub.0, e.sub.1, . . . , e.sub.E2, e.sub.E1] for the 5G polar coding with a polar matrix G.sup.(N) includes the following operations, where K is the length of the input bit sequence, E is the length of the output bit sequence, K and E are positive integers, K<N, and K<E.
[0049] As shown in
[0050] (1) Adding frozen bits: The adding-frozen-bits operation combines NK zero bits with the input bit sequence c to form a polar transform input sequence u=[u.sub.0, u.sub.1, . . . , u.sub.N2, u.sub.N1] of length N according to the data bit index set Q.
[0051] The polar transform input sequence u is determined by the input bit sequence c, the data bit index set Q, and the polar matrix size N as follows:
TABLE-US-00001 k = 0; For i = 0 to N-1 If i Q u.sub.i = c.sub.k; k = k + 1; Else u.sub.i = 0; End if End for
[0052] (2) Polar transform: The polar transform is converting a first length-N bit sequence into a second length-N bit sequence by multiplying the first length-N bit sequence and the polar matrix G.sup.(N) over GF(2). A polar transform output bit sequence d=[d.sub.0, d.sub.1, . . . , d.sub.N2, d.sub.N1] of length N is determined by the polar transform input sequence u and the polar matrix G.sup.(N) as d=u.Math.G.sup.(N), where the vector-matrix multiplication is over GF(2).
[0053] (3) Rate matching: The rate matching of polar coding in 5G includes two operations: Sub-block interleaving and bit selection.
[0054] (3.1) Sub-block interleaving: An interleaving output bit sequence d=[d.sub.0, d.sub.1, . . . , d.sub.N2, d.sub.N1] of length N is determined by a sub-block interleaver pattern of length 32, the polar transform output bit sequence d, and the polar matrix size N as follows.
TABLE-US-00002 For i = 0 to N-1 j = floor(32i/N); J.sub.i = .sub.jX(N/32) + mod(i, N/32); d.sub.i = d.sub.j.sub.
where =[.sub.0, .sub.1, .sub.2, .sub.3, .sub.4, .sub.5, .sub.6, .sub.7, .sub.8, .sub.9, .sub.10, .sub.11, .sub.12, .sub.13, .sub.14, .sub.15, .sub.16, .sub.17, .sub.18, .sub.19, .sub.20, .sub.21, .sub.22, .sub.23, .sub.24, .sub.25, .sub.26, .sub.27, .sub.28, .sub.29, .sub.30, .sub.31, ]=[0, 1, 2, 4, 3, 5, 6, 7, 8, 16, 9, 17, 10, 18, 11, 19, 12, 20, 13, 21, 14, 22, 15, 23, 24, 25, 26, 28, 27, 29, 30, 31], and J=[J.sub.0, J.sub.1, . . . , J.sub.N2, J.sub.N1] is an interleaver pattern of length N determined by the sub-block interleaver pattern and the polar matrix size N. The interleaver pattern J is a permutation of the integer sequence [0, 1, 2, . . . , N2, N1].
[0055] (3.2) Bit selection: There are three types of bit selection named as repetition, puncturing and shortening. With the interleaving output bit sequence d, the length of the input bit sequence K, the length of the output bit sequence E, and the polar matrix size N, the output bit sequence e is determined as follows: [0056] Repetition: For EN, e.sub.k=d.sub.mod(k,N), k=0, 1, 2, . . . , E2, E1. [0057] Puncturing: For E<N and K/E7/16, e.sub.k=d.sub.NE+k, k=0, 1, 2, . . . , E2, E1. [0058] Shortening: For E<N and K/E>7/16, e.sub.k=d.sub.k, k=0, 1, 2, . . . , E2, E1.
Polarization-Adjusted Convolutional (PAC) Coding
[0059] Some example embodiments of PAC coding are disclosed in this section.
[0060] PAC codes is a class of pre-transformed polar codes. Specifically, PAC codes are polar codes using convolution transform.
[0061] The diagram of PAC coding is shown in
[0062]
[0063] (1) Rate profiling: The rate profiling is an operation same as the adding-frozen-bits operation in the 5G polar coding. Thus, two terms adding-frozen-bits and rate profiling are used interchangeably to refer to the same operation in this document. The rate-profiling operation combines NK zero bits with the input bit sequence c to form a rate-profiling output sequence v=[v.sub.0, v.sub.1, . . . , v.sub.N2, v.sub.N1] of length N according to the data bit index set Q. Specifically, the rate-profiling output bit sequence v is determined by the input bit sequence c, the data bit index set Q, and the polar matrix size N as follows.
TABLE-US-00003 k = 0; For i = 0 to N-1 If i Q v.sub.i = c.sub.k; k = k + 1; Else v.sub.i = 0; End if End for
[0064] (2) Convolution transform: the convolution transform is an operation converting a convolution input bit sequence of length N into a convolution output bit sequence of length N by performing convolution on the convolution input bit sequence and a generator bit sequence g=[g.sub.0, g.sub.1, . . . , g.sub.m1, g.sub.m] of length-(m+1) defining a generator polynomial g(D)=g.sub.0+g.sub.1.Math.D+ . . . +g.sub.m1.Math.D.sup.m1+g.sub.m.Math.D.sup.m over GF(2), where m is the memory length of the convolution transform or equivalently the generator polynomial degree of the generator polynomial g(D) and D is a dummy variable representing delay in a digital circuit.
[0065] The convolution transform with a generator polynomial g(D) is shown in
TABLE-US-00004 For i = 0 to N-1 u.sub.i = 0; For k = 0 to m u.sub.i = mod(u.sub.i + g.sub.k.Math.v.sub.i-k, 2); End for End for
[0066] Polar transform: The polar transform is the same as in the 5G polar coding. A polar transform output bit sequence d=[d.sub.0, d.sub.1, . . . , d.sub.N2, d.sub.N1] of length N is determined according to the convolution transform output bit sequence u and the polar matrix G.sup.(N) as d=u.Math.G.sup.(N), where the vector-matrix multiplication is over GF(2).
INTRODUCTION TO EMBODIMENTS
[0067] This section discloses multiple examples related to rate matching for polar coding, PAC coding, or other pre-transformed polar coding with good performance.
[0068]
Embodiment 1
[0069] This section discloses an encoding method used in a wireless communication system.
[0070] In one example, a method of digital communication comprising obtaining, by a first node, an input bit sequence c=[c.sub.0, c.sub.1, . . . , c.sub.K1]; and determining, by a first node, an output bit sequence having E bits based on an input bit sequence having K bits, wherein the output bit sequence is determined by performing a polar transform with H components and a pre-transform; wherein the polar transform is based on H polar matrices G.sup.(N.sup.
[0071] Here, K is the input length of the input bit sequence c.
[0072] E is the output length of the output bit sequence e.
[0073] H is the number of component polar matrices.
[0074] K, E, and H are all positive integers. In one example, K, E, and H satisfy K<E and H<E.
[0075] H is an integer greater than one.
[0076] For h=0, 1, . . . , H1, the h-th component polar transform is based on the h-th component polar matrix G.sup.(N.sup.
[0077] In one example, the summation of H component polar matrix sizes is equal to the output length E, i.e., N.sub.0+N.sub.1+ . . . +N.sub.H1=E.
[0078] In another example, a method of digital communication may include obtaining, by a first node, an input bit sequence c=[c.sub.0, c.sub.1, . . . , c.sub.K1]; and determining, by the first node, an output bit sequence e=[e.sub.0, e.sub.1, . . . , e.sub.E1] by performing at least one of the following: a repetition, H component rate profiling, a first concatenation, a pre-transform, a segmentation, H component polar transform based on H polar matrices G.sup.(N.sup.
[0079] Here, K is the input length of the input bit sequence c; E is the output length of the output bit sequence e; H is the number of component polar matrices; W is the number of component interleaving.
[0080] In one example K, E, and H are positive integers and W is an integer not greater than H.
[0081] In another example, K, E, and H satisfy K<E and H<E.
[0082] H is an integer greater than one.
[0083] For h=0, 1, . . . , H1, the h-th component polar transform is based on the h-th component polar matrix G.sup.(N.sup.
[0084] The summation of H component polar matrix sizes can be equal to the output length E, i.e., N.sub.0+N.sub.1+ . . . +N.sub.H1=E.
Embodiment 2
[0085] This section discloses a decoding method used in a wireless communication system.
[0086] A method of digital communication, comprising receiving, by a second node, a signal including an output bit sequence e=[e.sub.0, e.sub.1, . . . , e.sub.E1] sent by a first node; and determining, by the second node, an estimation of an input bit sequence c=[c.sub.0, c.sub.1, . . . , c.sub.K1].
[0087] In one example, the output bit sequence e can be determined by determining by performing a polar transform with H components and a pre-transform; wherein the polar transform is based on H polar matrices G.sup.(N.sup.
[0088] In one example, the output bit sequence e can be determined by the first node by at least one of the following: a repetition, H component rate profiling, a first concatenation, a pre-transform, a segmentation, H component polar transform based on H polar matrices G.sup.(N.sup.
[0089] Here, K is the input length of the input bit sequence c; E is the output length of the output bit sequence e; H is the number of component polar matrices; W is the number of component interleaving; K, E, and H are positive integers; K<E and H<E; H is an integer greater than one; W is an integer not greater than H; for h=0, 1, . . . , H1, the h-th component polar transform is based on the h-th component polar matrix G.sup.(N.sup.
Embodiment 3
[0090] This section discloses the parameters related in determining the output bit sequence e.
[0091] Embodiment 3 is based on the above embodiments.
[0092] The output bit sequence e is determined by the first node by at least one of the following: [0093] the output bit sequence length K, [0094] the output bit sequence length E, [0095] H component polar matrix sizes N.sub.0, N.sub.1, . . . , N.sub.H1, [0096] H component repetition lengths K.sub.0, K.sub.1, . . . , K.sub.H1, [0097] H component repetition index sets R.sup.(0), R.sup.(1), . . . , R.sup.(H1). [0098] a first data bit index set Q={Q.sub.0, Q.sub.1, . . . , Q.sub.K1}, [0099] H component data bit index sets Q.sup.(0), Q.sup.(1), . . . , Q.sup.(H1), [0100] a generator polynomial g(D)=g.sub.0+g.sub.1.Math.D+ . . . +g.sub.m1.Math.D.sup.m1+g.sub.m.Math.D.sup.m over GF(2), [0101] a recursive feedback polynomial q(D)=q.sub.0+q.sub.1.Math.D+q.sub.2.Math.D.sup.2+ . . . +q.sub.m.Math.D.sup.m over GF(2), [0102] H component polar matrices G.sup.(N.sup.
H Component Polar Matrix Sizes N.sub.0, N.sub.1, . . . , N.sub.H1
[0105] For h=0, 1, . . . , H1, the component polar matrix sizes N.sub.h is the polar matrix size of the h-th component polar matrix G.sup.(N.sup.
[0106] In some embodiments, all H component polar matrix sizes N.sub.0, N.sub.1, . . . , N.sub.H1 are the same, i.e., N.sub.0=N.sub.1= . . . =N.sub.H1. A specific example with H=3 polar matrix sizes for an output length E=24 is N.sub.0=N.sub.1=N.sub.2=8.
[0107] In some embodiments, not all H component polar matrix sizes N.sub.0, N.sub.1, . . . , N.sub.H1 are the same, i.e., there exists hk such that N.sub.hN.sub.k. A specific example with H=3 polar matrix sizes for an output length E=24 are N.sub.0=16, N.sub.1=4 and N.sub.2=4, wherein N.sub.0N.sub.1.
[0108] In some embodiments, all H component polar matrix sizes N.sub.0, N.sub.1, . . . , N.sub.H1 are different, i.e., if hk, N.sub.hN.sub.k. A first specific example with H=2 polar matrix sizes for an output length E=24 are N.sub.0=16 and N.sub.1=8, wherein N.sub.0N.sub.1. A second specific example with H=3 polar matrix sizes for an output length E=26 is N.sub.0=16, N.sub.1=8, and N.sub.2=2, wherein N.sub.0N.sub.1, N.sub.0N.sub.2, and N.sub.1N.sub.2.
H Component Repetition Lengths K.sub.0, K.sub.1, . . . , K.sub.H1
[0109] In some embodiments, at least one of the H component repetition lengths K.sub.0, K.sub.1, . . . , K.sub.H1 is equal to the input length K. A first specific example with H=3 polar matrix sizes and K=6, there are K.sub.0=6, K.sub.1=3 and K.sub.2=1, wherein, K.sub.0=K=6. A second specific example with H=3 polar matrix sizes and K=6, there are K.sub.0=6, K.sub.1=6 and K.sub.2=1, wherein, K.sub.0=K.sub.1=K=6.
[0110] In some embodiments, all H component repetition lengths K.sub.0, K.sub.1, . . . , K.sub.H1 are the same, i.e., K.sub.0=K.sub.1= . . . =K.sub.H1. A specific example with H=3 polar matrix sizes, there are K.sub.0=K.sub.1=K.sub.2=2.
[0111] In some embodiments, not all H component repetition lengths K.sub.0, K.sub.1, . . . , K.sub.H1 are the same, i.e., there exists hk such that K.sub.hK.sub.k. A specific example with H=3 polar matrix sizes, there are K.sub.0=6, K.sub.1=2 and K.sub.2=2, wherein K.sub.0K.sub.1.
[0112] In some embodiments, all H component repetition lengths K.sub.0, K.sub.1, . . . , K.sub.H1 are different, i.e., if hk, K.sub.hK.sub.k. A specific example with H=3 polar matrix sizes, there are K.sub.0=6, K.sub.1=3 and K.sub.2=1, wherein K.sub.0K.sub.1, K.sub.0K.sub.2, and K.sub.1K.sub.2.
Component Repetition Index Sets R.sup.(0), R.sup.(1), . . . , R.sup.(H1)
[0113] For h=0, 1, . . . , H1, the h-th component repetition set R.sup.(h)={R.sub.0.sup.(h), R.sub.1.sup.(h), . . . , R.sub.K.sub.
[0114] In some embodiments, at least one of the H component repetition index sets R.sup.(0), R.sup.(1), . . . , R.sup.(H1) is equal to a first-type integer set Z.sub.K={0, 1, 2, . . . , K1}, wherein the first-type integer set Z.sub.K={0, 1, 2, . . . , K1} comprises all non-negative integers smaller than K. In a specific example with K=6, E=24, H=2 polar matrix sizes N.sub.0=16 and N.sub.1=8, the H=2 component repetition index sets R.sup.(0) and R.sup.(1) are R.sup.(0)=Z.sub.6={0, 1, 2, 3, 4, 5} with K.sub.0=K=6 and R.sup.(1)={0, 1, 2} with K.sub.1=3, respectively.
[0115] In some embodiments, none of H component repetition index sets R.sup.(0), R.sup.(1), . . . , R.sup.(H1) is equal to a first-type integer set Z.sub.K={0, 1, 2, . . . , K1}, wherein the first-type integer set Z.sub.K={0, 1, 2, . . . , K1} comprises all non-negative integers smaller than K.
[0116] In a specific example with K=6, E=24, H=3 polar matrix sizes N.sub.0=16, N.sub.1=4 and N.sub.2=4, the H=3 component repetition index sets are R.sup.(0)={0, 1, 2, 3, 4} with K.sub.0=5, R.sup.(1)={5, 0} with K.sub.1=2, and R.sup.(2)={1, 2} with K.sub.2=2, respectively, wherein R.sup.(0)Z.sub.6, R.sup.(1)Z.sub.6, and, R.sup.(2)Z.sub.6, wherein, Z.sub.6={0, 1, 2, 3, 4, 5}.
[0117] In some embodiments, for h=0, 1, . . . , H2, the (h+1)-th component repetition index set R.sup.(h+1) is a subset of the h-th component repetition index set R.sup.(h)={R.sub.0.sup.(h), R.sub.1.sup.(h), . . . , R.sub.K.sub.
[0118] In some embodiments, for h, h being non-negative integers less than H and h not equal to h, the intersection of the h-th component repetition index set R.sup.(h) and the h-th component repetition index set R.sup.(h) is an empty set, i.e., R.sup.(h)R.sup.(h)=={ }, wherein denotes the empty set. In a specific example with K=6, E=24, H=3 polar matrix sizes N.sub.0=16, N.sub.1=4 and N.sub.2=4, the H=3 component repetition index sets are R.sup.(0)={0, 1} with K.sub.0=2, R.sup.(1)={2, 3} with K.sub.1=2, and R.sup.(2)={4, 5} with K.sub.1=2, respectively.
[0119] In some embodiments, there exists h and k being non-negative integers less than H and h not equal to k (hk) such that the intersection of the h-th component repetition index set R.sup.(h) and the k-th component repetition index set R.sup.(k) is not an empty set, i.e., R.sup.(h)(R.sup.(k), wherein, ={ } is the empty set.
[0120] In a first specific example with K=6, E=24, H=2 polar matrix sizes N.sub.0=16 and N.sub.1=8, the H=2 component repetition index sets R.sup.(0) and R.sup.(1) are R.sup.(0)=Z.sub.6={0, 1, 2, 3, 4, 5} with K.sub.0=K=6 and R.sup.(1)={0, 1, 2} with K.sub.1=3, respectively, wherein, R.sup.(0)(R.sup.(1)={0, 1, 2}{ }=; wherein denotes the empty set.
[0121] In a second specific example with K=6, E=24, H=3 polar matrix sizes N.sub.0=8, N.sub.1=8, and N.sub.2=8, the H=3 component repetition index sets R.sup.(0), R.sup.(1), R.sup.(2) are R.sup.(0)=Z.sub.6={0, 1, 2, 3, 4, 5} with K.sub.0=K=6, R.sup.(1)={0, 1, 2} with K.sub.1=3 and R.sup.(2)={4} with K.sub.2=1, respectively, wherein, R.sup.(0)R.sup.(1)={0, 1, 2} and R.sup.(0)R.sup.(2)={4}; wherein denotes the empty set.
[0122] In a third specific example with K=6, E=26, H=3 polar matrix sizes N.sub.0=16, N.sub.1=8, and N.sub.2=2, the H=3 component repetition index sets R.sup.(0), R.sup.(1), R.sup.(2) are R.sup.(0)={0, 1, 2, 3, 4} with K.sub.0=5, R.sup.(1)={5, 0} with K.sub.1=2, and R.sup.(2)={4} with K.sub.2=1, respectively, wherein, R.sup.(0)R.sup.(1)={0} and R.sup.(0)R.sup.(2)={4}; wherein denotes the empty set.
[0123] In some embodiments, all H component repetition index sets R.sup.(0), R.sup.(1), . . . , R.sup.(H1) comprise an index k, wherein k is a non-negative integer. A specific example with H=3 component repetition index sets R.sup.(0), R.sup.(1), R.sup.(2) are R.sup.(0)={0, 1, 2, 3, 4} with K.sub.0=5, R.sup.(1)={5, 0, 2} with K.sub.1=2, and R.sup.(2)={4, 0} with K.sub.2=2, respectively, wherein H=3 component repetition index sets R.sup.(0), R.sup.(1), R.sup.(2) comprise an index k=0.
Component Data Bit Index Sets Q.sup.(0), Q.sup.(1), . . . , Q.sup.(H1)
[0124] For h=0, 1, . . . , H1, the h-th component data bit index set Q.sup.(h)={Q.sub.0.sup.(h), Q.sub.1.sup.(h), . . . , Q.sub.K.sub.
[0125] In some embodiments, for some h, if k<k, the k-th element Q.sub.k.sup.(h) in the h-th component data bit index set Q.sup.(h) is smaller than the k-th element Q.sub.k.sup.(h) in the h-th component data bit index set Q.sup.(h), i.e., the h-th component data bit index set Q.sup.(h) is sorted in ascending order according to index values with Q.sub.0<Q.sub.1< . . . <Q.sub.K2<Q.sub.K1. In some embodiments, for some h, if k<k, the k-th element Q.sub.k.sup.(h) in the h-th component data bit index set Q.sup.(h) is greater than the k-th element Q.sub.k.sup.(h) in the h-th component data bit index set Q.sup.(h), i.e., the h-th component data bit index set Q.sup.(h) is sorted in descending order according to index values with Q.sub.0>Q.sub.1> . . . >Q.sub.K2>Q.sub.K1. In some embodiments, for some h, if k<k, the reliability of the Q.sub.k.sup.(h)-th polarized sub-channel (denoted as W(Q.sub.k.sup.(h))) corresponding to the h-th component polar matrix G.sup.(N.sup.
[0126] In some embodiments, at least one of the H component data bit index set sizes K.sub.0, K.sub.1, . . . , K.sub.H1 is equal to the input length K.
[0127] In a first specific example with K=6, E=24, H=2 polar matrix sizes N.sub.0=16 and N.sub.1=8, the H=2 component data bit index sets Q.sup.(0) and Q.sup.(1) are Q.sup.(0)={12, 7, 11, 13, 14, 15} with K.sub.0=K=6 and Q.sup.(1)={12, 7, 11} with K.sub.1=3, respectively, wherein, the 0-th component data bit index set Q.sup.(0)={12, 7, 11, 13, 14, 15} is corresponding to the 0-th component polar matrix G.sup.(N.sup.
[0128] In a second specific example with K=6, E=24, H=3 polar matrix sizes N.sub.0=8, N.sub.1=8, and N.sub.2=8, the H=3 component data bit index sets Q.sup.(0), Q.sup.(1), Q.sup.(2) are Q.sup.(0)={2, 4, 3, 5, 6, 7} with K.sub.0=K=6, Q.sup.(1)={2, 4, 5} with K.sub.1=3 and Q.sup.(2)={3} with K.sub.2=1, respectively. In a third specific example with K=6, E=26, H=3 polar matrix sizes N.sub.0=16, N.sub.1=8, and N.sub.2=2, the H=3 component repetition index sets Q.sup.(0), Q.sup.(1), Q.sup.(2) are Q.sup.(0)={7, 11, 13, 14, 15} with K.sub.0=5, Q.sup.(1)={6, 7} with K.sub.1=2, and Q.sup.(2)={1} with K.sub.2=1, respectively.
First Data Bit Index Set Q
[0129] The first data bit index set Q={Q.sub.0, Q.sub.1, . . . , Q.sub.K1} has K elements, i.e., the size of the input data bit index set is |Q|=K, wherein K is the input length. The first data bit index set Q={Q.sub.0, Q.sub.1, . . . , Q.sub.K1} is a subset of a third-type integer set Z.sub.N.sub.
and the third-type integer set Z.sub.N.sub.
[0130] In a first specific example with K=6, N.sub.m=16, and E=24, a first data bit index set is Q={12, 7, 11, 13, 14, 15}.
[0131] In a second specific example with K=6 and H=3 polar matrix sizes N.sub.0=8, N.sub.1=8 and N.sub.2=8, we have Nm=max(max(N.sub.0, N.sub.1), N.sub.2)=8, a data bit index set Q={2, 4, 3, 5, 6, 7}, and H=3 component data bit index set Q.sup.(0)={Q.sub.0.sup.(0), Q.sub.1.sup.(0), Q.sub.2.sup.(0), Q.sub.3.sup.(0), Q.sub.4.sup.(0), Q.sub.5.sup.(0)}=Q={2, 4, 3, 5, 6, 7}, Q.sup.(1)={Q.sub.0.sup.(1), Q.sub.1.sup.(1), Q.sub.2.sup.(1)}={2, 4, 3}, Q.sup.(2)={Q.sub.0.sup.(2)}={4}.
[0132] In a third specific example with K=6 and H=3 polar matrix sizes N.sub.0=16, N.sub.1=8 and N.sub.2=2, we have N.sub.m=max(max(N.sub.0, N.sub.1), N.sub.2)=16, and a data bit index set Q={12, 7, 11, 13, 14, 15}.
[0133] In some embodiments, for k=0, 1, . . . , K2, the element Q.sub.k in the first data bit index set Q is smaller than Q.sub.k+1, i.e., the first data bit index set Q is sorted in ascending order according to index values with Q.sub.0<Q.sub.1< . . . <Q.sub.K2<Q.sub.K1.
[0134] In some embodiments, for k=0, 1, . . . , K2, the reliability of the Q.sub.k-th polarized sub-channel (denoted as W(Q.sub.k)) is smaller than the reliability of the Q.sub.k+1-th polarized sub-channel (denoted as W(Q.sub.k+1)), i.e., the first data bit index set Q is sorted in ascending order according to the polarized sub-channel reliability with W(Q.sub.0)<W(Q.sub.1)< . . . <W(Q.sub.K2)<W(Q.sub.K1).
[0135] In a first specific example with N.sub.m=8 and K=4, a first data bit index set is Q={Q.sub.0, Q.sub.1, Q.sub.2, Q.sub.3}={3, 5, 6, 7} with Q.sub.0<Q.sub.1<Q.sub.2<Q.sub.3.
[0136] In a second specific example with N.sub.m=32 and K=25, a first data bit index set is Q={Q.sub.0, Q.sub.1, Q.sub.2, Q.sub.3, Q.sub.4, Q.sub.5, Q.sub.6, Q.sub.7, Q.sub.8, Q.sub.9, Q.sub.10, Q.sub.11, Q.sub.12, Q.sub.13, Q.sub.14, Q.sub.15, Q.sub.16, Q.sub.17, Q.sub.18, Q.sub.19, Q.sub.20, Q.sub.21, Q.sub.22, Q.sub.23, Q.sub.24}={5, 9, 6, 17, 10, 18, 12, 20, 24, 7, 11, 19, 13, 14, 21, 26, 25, 22, 28, 15, 23, 31, 27, 29, 30} with polarized sub-channel reliability being W(Q.sub.0)<W(Q.sub.1)<W(Q.sub.2)<W(Q.sub.3)<W(Q.sub.4)<W(Q.sub.5) <W(Q.sub.6)<W(Q.sub.7)<W(Q.sub.8)<W(Q.sub.9)<W(Q.sub.10)<W(Q.sub.11)<W(Q.sub.12)<W(Q.sub.13)<W(Q.sub.14)<W(Q.sub.15)<W(Q.sub.16)<W(Q.sub.71)<W(Q.sub.18)<W(Q.sub.19)<W(Q.sub.20)<W(Q.sub.21)<W(Q.sub.22)<W(Q.sub.23)<W(Q.sub.24).
A Generator Polynomial g(D)
[0137] The generator polynomial g(D)=g.sub.0+g.sub.1.Math.D+ . . . +g.sub.m.Math.D.sup.m can be any binary polynomial over GF(2), wherein h is the memory length of the generator polynomial g(D) or the degree of generator polynomial g(D). A generator polynomial g(D)=g.sub.0+g.sub.1.Math.D+ . . . +g.sub.m.Math.D.sup.m has a corresponding generator bit sequence g=[g.sub.0, g.sub.1, . . . , g.sub.m] of length m+1. The generator polynomial g(D) and its corresponding generator bit sequence g are used interchangeably in this document.
[0138] In a first specific example with a memory length m=6, a generator polynomial g(D)=g.sub.0+g.sub.1.Math.D + . . . +g.sub.m.Math.D.sup.m=g.sub.0+g.sub.1.Math.D+g.sub.2.Math.D.sup.2+g.sub.3.Math.D.sup.3+g.sub.4.Math.D.sup.4+g.sub.5.Math.D.sup.5+g.sub.6.Math.D.sup.6=1+D.sup.2+D.sup.3+D.sup.5+D.sup.6. In a second specific example with a memory length m=3, a generator polynomial g(D)=g.sub.0+g.sub.1.Math.D+ . . . +g.sub.m.Math.D.sup.m=g.sub.0+g.sub.1.Math.D+g.sub.2.Math.D.sup.2+g.sub.3.Math.D.sup.3=1+D+D.sup.3.
[0139] More specific examples for a generator polynomial g(D)=g.sub.0+g.sub.1.Math.D+ . . . +g.sub.m.Math.D.sup.m are as follows:
wherein m is the memory length.
A Recursive Feedback Polynomial q(D)
[0140] The recursive feedback polynomial q(D)=q.sub.0+q.sub.1.Math.D+ . . . +q.sub.m.Math.D.sup.m can be any binary polynomial over GF(2), wherein m is the memory length of the recursive feedback polynomial q(D) or the degree of the recursive feedback polynomial q(D). A recursive feedback polynomial q(D)=q.sub.0+q.sub.1.Math.D+ . . . +q.sub.m.Math.D.sup.m has a corresponding recursive feedback bit sequence q=[q.sub.0, q.sub.1, . . . , q.sub.m] of length m+1. The recursive feedback polynomial q(D) and its corresponding recursive feedback bit sequence q are used interchangeably in this document.
[0141] In some embodiments, the value of q.sub.0 is a bit one 1 in the recursive feedback polynomial q(D).
[0142] In a first specific example with a memory length m=6, a recursive feedback polynomial is q(D)=q.sub.0+q.sub.1.Math.D+ . . . +q.sub.m.Math.D.sup.m=q.sub.0+q.sub.1.Math.D+q.sub.2.Math.D.sup.2+q.sub.3.Math.D.sup.3+q.sub.4.Math.D.sup.4+q.sub.5.Math.D.sup.5+q.sub.6.Math.D.sup.6=1+D.sup.2+D.sup.4+D.sup.5+D.sup.6.
[0143] In a second specific example with a memory length m=3, a recursive feedback polynomial is q(D)=q.sub.0+q.sub.1.Math.D+ . . . +q.sub.m.Math.D.sup.m=q.sub.0+q.sub.1.Math.D+q.sub.2.Math.D.sup.2+q.sub.3.Math.D.sup.3=1+D.sup.2+D.sup.3.
Component Interleaver Patterns J.sup.(0), J.sup.(1), . . . , J.sup.(W1)
[0144] For h=0, 1, . . . , W1, the h-th component interleaver pattern J.sup.(h)=[J.sub.0.sup.(h), J.sub.1.sup.(h), . . . , J.sub.N.sub.
[0145] A first specific example with H=2, W=2, N.sub.0=16, N.sub.1=8, a 0-th component interleaver pattern J.sup.(0)=[J.sub.0.sup.(0), J.sub.1.sup.(0), . . . , J.sub.N.sub.
[0146] A second specific example with H=3, W=2, N.sub.0=N.sub.1=N.sub.2=8, a 0-th component interleaver pattern J.sup.(0)=[J.sub.0.sup.(0), J.sub.1.sup.(0), . . . , J.sub.N.sub.
[0147] A third specific example with H=3, W=3, N.sub.0=16, N.sub.1=8, and N.sub.2=2, a 0-th component interleaver pattern J.sup.(0)=[J.sub.0.sup.(0), J.sub.1.sup.(0), . . . , J.sub.N.sub.
[0148] A fourth specific example with H=3, W=1, N.sub.0=8, N.sub.1=16, and N.sub.2=2, a 2.sup.nd component interleaver pattern J.sup.(2)=[J.sub.0.sup.(2), J.sub.1.sup.(2), . . . , J.sub.N.sub.
[0149]
[0150]
[0151]
[0152] In some embodiments, the first node performs a repetition by obtaining the input bit sequence c of length K and determining H component repetition output bit sequences c.sup.(0), c.sup.(1), c.sup.(2), . . . , c.sup.(H1), wherein, for h=0, 1, 2, . . . , H1, the h-th component repetition output bit sequence c.sup.(h)=[c.sub.0.sup.(h), c.sub.1.sup.(h), . . . , c.sub.K.sub.
[0153] In some embodiments, for h=0, 1, 2, . . . , H1, the first node performs a component rate profiling by obtaining the h-th component repetition output bit sequences c.sup.(h)=[c.sub.0.sup.(h), c.sub.1.sup.(h), . . . , c.sub.K.sub.
[0154] In some embodiments, the first node performs a first concatenation by obtaining H component rate profiling output bit sequences v.sup.(0), v.sup.(1), v.sup.(2), . . . , v.sup.(H1) and determining a concatenation output bit sequence y=[y.sub.0, y.sub.1, y.sub.2, . . . , Y.sub.E1] of length E, wherein, for h=0, 1, . . . , H1, the h-th component rate profiling output bit sequence v.sup.(h)=[v.sub.0.sup.(h), v.sub.1.sup.(h), . . . , v.sub.N.sub.
[0155] In some embodiments, the first node performs a pre-transform by obtaining the concatenation output bit sequence y=[y.sub.0, y.sub.1, y.sub.2, . . . , Y.sub.E1] of length E and determining a pre-transform output bit sequence u=[u.sub.0, u.sub.1, u.sub.2, . . . , u.sub.E1] of length E by at least one of the following: the generator polynomial g(D)=g.sub.0+g.sub.1.Math.D+g.sub.2.Math.D.sup.2+ . . . +g.sub.m.Math.D.sup.m over GF(2), the recursive feedback polynomial q(D)=q.sub.0+q.sub.1.Math.D+q.sub.2.Math.D.sup.2+ . . . +q.sub.m.Math.D.sup.m over GF(2), wherein, E is the length of the output bit sequence e=[e.sub.0, e.sub.1, e.sub.2, . . . , e.sub.E1].
[0156] In some embodiments, the first node performs a segmentation by obtaining the pre-transform output bit sequence u=[u.sub.0, u.sub.1, u.sub.2, . . . , u.sub.E1] of length E and determining H segmentation output bit sequences u.sup.(0), u.sup.(1), . . . , u.sup.(H1) according to H component polar matrix sizes N.sub.0, N.sub.1, . . . , N.sub.H1, wherein, H is the number of component polar matrices; for h=0, 1, . . . , H1, the h-th segmentation output bit sequence u.sup.(h) is of length N.sub.h, wherein N.sub.h is the h-th component polar matrix size and E is the length of the output bit sequence e=[e.sub.0, e.sub.1, e.sub.2, . . . , e.sub.E1].
[0157] In some embodiments, for h=0, 1, 2, . . . , H1, the first node performs a component polar transform by obtaining the h-th segmentation output bit sequence u.sup.(h) of length N.sub.h and determining an h-th component polar transform output bit sequence d.sup.(h)=[d.sub.0.sup.(h), d.sub.1.sup.(h), . . . , d.sub.N.sub.
[0158] Three examples are shown in
[0159] In some embodiments, the first node performs a second concatenation by obtaining the H component polar transform output bit sequences d.sup.(0), d.sup.(1), d.sup.(2), . . . , d.sup.(H1) and determining the output bit sequence e=[e.sub.0, e.sub.1, . . . , e.sub.E1] of length E, wherein, a specific example is shown in
[0160] In some embodiments, the number of interleaver patterns W is equal to the number of component polar matrices H and for h=0, 1, 2, . . . , H1, the first node performs a component interleaving by obtaining the h-th component polar transform output bit sequence d.sup.(h)=[d.sub.0.sup.(h), d.sub.1.sup.(h), . . . , d.sub.N.sub.
[0161] In some embodiments, the number of interleaver patterns W is smaller than the number of component polar matrices H and for h=0, 1, 2, . . . , W1, the first node performs a component interleaving by obtaining the h-th component polar transform output bit sequence d.sup.(h)=[d.sub.0.sup.(h), d.sub.1.sup.(h), . . . , d.sub.N.sub.
[0162] In some embodiments, the first node performs a component interleaving on W bit sequences of the H component polar transform output bit sequences d.sup.(0), d.sup.(1), d.sup.(2), . . . , d.sup.(H1) to determine W component interleaving output bit sequences, wherein W is a non-negative integer not greater than H. In a first specific example with H=3 component polar transform output bit sequences d.sup.(0), d.sup.(1), d.sup.(2) and W=2, the first node performs a component interleaving on W=2 component polar transform output bit sequences d.sup.(0), d.sup.(2) to determine W=2 component interleaving output bit sequences d.sup.(0), d.sup.(2), wherein the 0-th component interleaving output bit sequence d.sup.(0) is corresponding to the 0-th component polar transform output bit sequence d.sup.(0); the 2.sup.nd component interleaving output bit sequence d.sup.(2) is corresponding to the 2.sup.nd component polar transform output bit sequence d.sup.(2).
[0163] In a second specific example with H=3 component polar transform output bit sequences d.sup.(0), d.sup.(1), d.sup.(2) and W=1, the first node performs a component interleaving on W=1 component polar transform output bit sequence d.sup.(0) to determine W=1 component interleaving output bit sequence d.sup.(0), wherein the 1.sup.st component interleaving output bit sequence d.sup.(0) is corresponding to the 1.sup.st component polar transform output bit sequence d.sup.(0).
Embodiment 4
[0164] This section discloses examples involving repetition.
[0165] Embodiment 4 is based on the above embodiments.
[0166]
[0167] Here, the repetition input bit sequence can be an input bit sequence c=[c.sub.0, c.sub.1, . . . , c.sub.K1] of length K; for h=0, 1, . . . , H1, the h-th component repetition output bit sequence c.sup.(h)=[c.sub.0.sup.(h), c.sub.1.sup.(h), . . . , c.sub.K.sub.
[0168] In some embodiments, for h=0, 1, . . . , H1, the repetition determines the h-th component repetition output bit sequence c.sup.(h) by setting the k-th bit c.sub.k.sup.(h) in the h-th component repetition output bit sequence c.sup.(h) to the bit with an index R.sub.k.sup.(h) in the input bit sequence c=[c.sub.0, c.sub.1, . . . , c.sub.K1], i.e., c.sub.k.sup.(h)=c.sub.R.sub.
TABLE-US-00005 For h = 0 to H-1 For k = 0 to k.sub.h-1 c.sub.k.sup.(h) = c.sub.R.sub.
[0169] In a first specific example with K=6, an input bit sequence c=[c.sub.0, c.sub.1, c.sub.2, c.sub.3, c.sub.4, c.sub.5], H=2 component repetition index sets R.sup.(0)={0, 1, 2, 3, 4, 5} with K.sub.0=6 and R.sup.(1)={0, 1, 2} with K.sub.1=3, the 0th component repetition output bit sequence c.sup.(0)=[c.sub.0.sup.(0), c.sub.1.sup.(0), c.sub.2.sup.(0), c.sub.3.sup.(0), c.sub.4.sup.(0), c.sub.5.sup.(0)]=[c.sub.R.sub.
[0170] In a second specific example with K=6, an input bit sequence c=[c.sub.0, c.sub.1, c.sub.2, c.sub.3, c.sub.4, c.sub.5], H=3 component repetition index sets R.sup.(0)={0, 1, 2, 3, 4, 5} with K.sub.0=6, R.sup.(1)={0, 1, 2} with K.sub.1=3 and R.sup.(2)={4} with K.sub.2=1, the 0th component repetition output bit sequence c.sup.(0)=[c.sub.0.sup.(0), c.sub.1.sup.(0), c.sub.2.sup.(0), c.sub.3.sup.(0), c.sub.4.sup.(0), c.sub.5.sup.(0)]=[c.sub.R.sub.
[0171] In some embodiment, the repetition comprises obtaining, by the first node, the input bit sequence c=[c.sub.0, c.sub.1, . . . , c.sub.K1] of length K; and performing, by the first node, an rate profiling on the input bit sequence c=[c.sub.0, c.sub.1, . . . , c.sub.K1] using the first data bit index set Q={Q.sub.0, Q.sub.1, . . . , Q.sub.K1} to obtain a repetition rate profile output bit sequence v=[v.sub.0, v.sub.1, . . . , v.sub.N1] of length N as
TABLE-US-00006 k = 0; For i = 0 to N-1 If i Q v.sub.i = c.sub.k; k = k + 1; Else v.sub.i = 0; End if End for [0172] determining, by the first node, the H component repetition output bit sequences c.sup.(0), c.sup.(1), . . . , c.sup.(H1) by at least one of the following: [0173] the first data bit index set Q={Q.sub.0, Q.sub.1, . . . , Q.sub.K1}, [0174] the H component repetition lengths K.sub.0, K.sub.1, . . . , K.sub.H1, [0175] wherein, for h=0, 1, . . . , H1, the h-th component repetition output bit sequence c.sup.(h)=[c.sub.0.sup.(h), c.sub.1.sup.(h), . . . , c.sub.K.sub.
[0176] In some embodiments, for h=0, 1, . . . , H1, the repetition determines the h-th component repetition output bit sequence c.sup.(h) by setting the k-th bit c.sub.k.sup.(h) in the h-th component repetition output bit sequence c.sup.(h) to the bit with an index Q.sub.k in the repetition rate profile output bit sequence v=[v.sub.0, v.sub.1, . . . , v.sub.N1], i.e., c.sub.k.sup.(h)=v.sub.Q.sub.
TABLE-US-00007 For h = 0 to H1 For k = 0 to K.sub.h1 c.sub.k.sup.(h) = v.sub.Qk; End for End for
[0177] In a first specific example with K=6, an input bit sequence c=[c.sub.0, c.sub.1, c.sub.2, c.sub.3, c.sub.4, c.sub.5], H=2 polar matrix sizes N.sub.0=16 and N.sub.1=8, a first data bit index set Q={12, 7, 11, 13, 14, 15}, K.sub.0=6, K.sub.1=3, we obtain a repetition rate profile output bit sequence v=[v.sub.0, v.sub.1, . . . , v.sub.N1]=[v.sub.0, v.sub.1, v.sub.2, v.sub.3, v.sub.4, v.sub.5, v.sub.6, v.sub.7, v.sub.8, v.sub.9, v.sub.10, v.sub.11, v.sub.12, v.sub.13, v.sub.14, v.sub.15 ] of length N.sub.m=max(N.sub.0, N.sub.1)=16, then we obtain the 0th component repetition output bit sequence c.sup.(0)=[c.sub.0.sup.(0), c.sub.1.sup.(0), c.sub.2.sup.(0), c.sub.3.sup.(0), c.sub.4.sup.(0), c.sub.5.sup.(0)]=[v.sub.Q.sub.
[0178] In some embodiments, at least two of H repetition output bit sequences c.sup.(0), c.sup.(1), c.sup.(2), . . . , c.sup.(H1) comprises the Q.sub.k-th bit v.sub.Q.sub.
[0179] In some embodiments, at least two of H repetition output bit sequences c.sup.(0), c.sup.(1), c.sup.(2), . . . , c.sup.(H1) comprises the k-th bit c.sub.k in the input bit sequence c=[c.sub.0, c.sub.1, . . . , c.sub.K1] of length K. A specific example is all repetition output bit sequences c.sup.(0), c.sup.(1), c.sup.(H1) comprises the 0-th bit c.sub.0 in the input bit sequence c=[c.sub.0, c.sub.1, . . . , c.sub.K1] of length K, wherein a specific example is c.sub.0.sup.(0)=c.sub.0.sup.(1)= . . . =c.sub.0.sup.(H2)=c.sub.0.sup.(H1)==c.sub.0.
[0180] In some embodiments, at least two of H repetition output bit sequences c.sup.(0), c.sup.(1), c.sup.(2), . . . , c.sup.(H1) are of the same length, i.e., there exists hk such that K.sub.h=K.sub.k, wherein for h=0, 1, . . . , H1, K.sub.h is the length of the h-th repetition output bit sequences c.sup.(h). A specific example with H=3, all repetition output bit sequences c.sup.(0), c.sup.(1), c.sup.(2) are of length K.sub.0=K.sub.1=K.sub.2=2.
[0181] In some embodiments, not all repetition output bit sequences c.sup.(0), c.sup.(1), c.sup.(2), . . . , c.sup.(H1) are of the same length, i.e., there exists hk such that K.sub.hK.sub.k, wherein K.sub.h is the length of the h-th repetition output bit sequence c.sup.(h) and K.sub.k is the length of the k-th repetition output bit sequence c.sup.(k). A specific example with H=3, the 0-th repetition output bit sequence c.sup.(0) is of length K.sub.0=6 and the 1.sup.st repetition output bit sequence c.sup.(1) is of length K.sub.1=3, wherein K.sub.0K.sub.1.
[0182] In some embodiments, all repetition output bit sequences c.sup.(0), c.sup.(1), c.sup.(2), . . . , c.sup.(H1) are of different lengths, i.e., if hk, K.sub.hK.sub.k, wherein K.sub.h is the length of the h-th repetition output bit sequence c.sup.(h) and K.sub.k is the length of the k-th repetition output bit sequence c.sup.(k). A specific example with H=3, the 0-th repetition output bit sequence c.sup.(0) is of length K.sub.0=6, the 1.sup.st repetition output bit sequence c.sup.(1) is of length K.sub.1=3, and the 2.sup.nd repetition output bit sequence c.sup.(2) is of length K.sub.2=1, wherein K.sub.0K.sub.1, K.sub.0K.sub.2, and K.sub.1K.sub.2.
Embodiment 5
[0183] This section discloses examples involving a component rate profiling.
[0184] Embodiment 5 is based on the above embodiments.
[0185] In some embodiments, for h=0, 1, . . . , H1, the h-th component repetition output bit sequence c.sup.(h)=[c.sub.0.sup.(h), c.sub.1.sup.(h), . . . , c.sub.K.sub.
[0186] The component rate profiling determining an component rate profiling output bit sequence v=[u.sub.0, v.sub.1, . . . , v.sub.N1] comprises obtaining, by the first node, a component rate profiling input bit sequence c=[c.sub.0, c.sub.1, . . . , c.sub.K1]; and determining, by the first node, a component rate profiling output bit sequence v=[v.sub.0, v.sub.1, . . . , v.sub.N1] by a component rate profiling using a component data bit index set Q={Q.sub.0, Q.sub.1, . . . , Q.sub.K1} of size K; wherein, K is a component repetition length; N is the polar matrix size of a component polar matrix G.sup.(N).
Component Data Bit Index Set Q
[0187] In some embodiments, the component data bit index set Q is a subset of a fourth-type integer set Z.sub.N={0, 1, 2, . . . , N2, N1}, wherein, the fourth-type integer set Z.sub.N={0, 1, 2, . . . , N2, N1} comprises and only comprises all non-negative integers smaller than N. The component data bit index set Q={Q.sub.0, Q.sub.1, . . . , Q.sub.K1} has K non-negative elements Q.sub.0, Q.sub.1, . . . , Q.sub.K2, Q.sub.K1, i.e., the component data bit index set Qis of size K. In some embodiments, for k=0, 1, . . . , K2, the element Q.sub.k in the component data bit index set Qis smaller than Q.sub.k+1, i.e., the component data bit index set Q is sorted in ascending order according to index values with Q.sub.0<Q.sub.1< . . . <Q.sub.K2<Q.sub.K1. In some embodiments, for k=0, 1, . . . , K2, the reliability of the Q.sub.k-th polarized sub-channel (denoted as W(Q.sub.k)) is smaller than the reliability of the Q.sub.k+1-th polarized sub-channel (denoted as W(Q.sub.k+1)), i.e., the component data bit index set Q is sorted in ascending order according to the polarized sub-channel reliability with W(Q.sub.0)<W(Q.sub.1)< . . . <W(Q.sub.K2)<W(Q.sub.K1). In some embodiments, for k=0, 1, . . . , K2, the element Q.sub.k in the component data bit index set Q is greater than Q.sub.k+1, i.e., the component data bit index set Q is sorted in descending order according to index values with Q.sub.0>Q.sub.1> . . . >Q.sub.K2>Q.sub.K1. In some embodiments, for k=0, 1, . . . , K2, the reliability of the Q.sub.k-th polarized sub-channel (denoted as W(Q.sub.k)) is greater than the reliability of the Q.sub.k+1-th polarized sub-channel (denoted as W(Q.sub.k+1)), i.e., the component data bit index set Q is sorted in descending order according to the polarized sub-channel reliability with W(Q.sub.0)>W(Q.sub.1)> . . . >W(Q.sub.K2)>W(Q.sub.K1).
[0188] In a first specific example with N=8 and K=4, a component data bit index set is Q={Q.sub.0, Q.sub.1, Q.sub.2, Q.sub.3}={3, 5, 6, 7}. In a second specific example with N=32 and K=25, a component data bit index set is Q={Q.sub.0, Q.sub.1, Q.sub.2, Q.sub.3, Q.sub.4, Q.sub.5, Q.sub.6, Q.sub.7, Q.sub.8, Q.sub.9, Q.sub.10, Q.sub.11, Q.sub.12, Q.sub.13, Q.sub.14, Q.sub.15, Q.sub.16, Q.sub.17, Q.sub.18, Q.sub.19, Q.sub.20, Q.sub.21, Q.sub.22, Q.sub.23, Q.sub.24}={5, 9, 6, 17, 10, 18, 12, 20, 24, 7, 11, 19, 13, 14, 21, 26, 25, 22, 28, 15, 23, 31, 27, 29, 30} with polarized sub-channel reliability with W(Q.sub.0)<W(Q.sub.1)<W(Q.sub.2)<W(Q.sub.3)<W(Q.sub.4)<W(Q.sub.5)<W(Q.sub.6)<W(Q.sub.7)<W(Q.sub.8)<W(Q.sub.9) <W(Q.sub.10)<W(Q.sub.11)<W(Q.sub.12)<W(Q.sub.13)<W(Q.sub.14)<W(Q.sub.15)<W(Q.sub.16)<W(Q.sub.17)<W(Q.sub.18)<W(Q.sub.19)<W(Q.sub.20)<W(Q.sub.21)<W(Q.sub.22)<W(Q.sub.23)<W(Q.sub.24). In a third specific example with N=8 and K=4, a component data bit index set is Q={Q.sub.0, Q.sub.1, Q.sub.2, Q.sub.3}={7, 6, 5, 3}.
[0189] In some embodiments, the component rate profiling determines the component rate profiling output bit sequence v=[v.sub.0, v.sub.1, . . . , v.sub.N1] corresponding to the component rate profiling input bit sequence c=[c.sub.0, c.sub.1, . . . , c.sub.K1] according to the component data bit index set Q is as follows.
TABLE-US-00008 For each index i = 0, 1, ..., N1, if the index i belongs to the component data bit index set Q, the i-th bit v.sub.i in the component rate profiling output bit sequence v is set to a bit in the component rate profiling input bit sequence c; if the index i does not belongs to the data bit index set Q, the i-th bit v.sub.i in the component rate profiling output bit sequence v is set to a bit zero (0); End for
wherein, a specific example pseudo-code for the rate profiling is as follows.
TABLE-US-00009 k = 0; For i = 0 to N 1 If i Q v.sub.i = c.sub.k; k = k + 1; Else v.sub.i = 0; End if End for
[0190] In some embodiments, for an index i belonging to the component data bit index set Q, the bit v.sub.i in the component rate profiling output bit sequence v is set to a bit in the component rate profiling input bit sequence c.
[0191] A first specific example with N=8, K=3 and a component data bit index set Q={5, 6, 7}, a component rate profiling input bit sequence c=[c.sub.0, c.sub.1, c.sub.2], the bits v.sub.5, v.sub.6, v.sub.7 with indices belonging to the component data bit index set Q={5, 6, 7} in a component rate profiling output bit sequence v=[v.sub.0, v.sub.1, v.sub.2, v.sub.3, v.sub.4, v.sub.5, v.sub.6, v.sub.7] is set as v.sub.5=c.sub.0, v.sub.6=c.sub.1, and v.sub.7=c.sub.2.
[0192] A second specific example with N=16, K=6 and a component data bit index set Q={12, 7, 11, 13, 14, 15}, a component rate profiling input bit sequence c=[c.sub.0, c.sub.1, c.sub.2, c.sub.3, c.sub.4, c.sub.5], the bits v.sub.12, v.sub.7, v.sub.11, v.sub.13, v.sub.14, v.sub.15 with indices belonging to the data bit index set Q={12, 7, 11, 13, 14, 15} in a component rate profiling output bit sequence v=[v.sub.0, v.sub.1, v.sub.2, v.sub.3, v.sub.4, v.sub.5, v.sub.6, v.sub.7, v.sub.8, v.sub.9, v.sub.10, v.sub.11, v.sub.12, v.sub.13, v.sub.14, v.sub.15] is set as v.sub.12=c.sub.0, v.sub.7=c.sub.1, v.sub.11=c.sub.2, v.sub.13=c.sub.3, v.sub.14=c.sub.4, and v.sub.15=c.sub.5.
[0193] A third specific example is given as
TABLE-US-00010 k = 0; For i = 0 to N1 If i Q v.sub.i = c.sub.k; k = k + 1; Else v.sub.i = 0; End if End for
[0194] In some embodiments, for a index i not belonging to the component data bit index set Q, the bit v.sub.i in the component rate profiling output bit sequence v is equal to 0.
[0195] A first specific example with N=8, K=3 and Q={5, 6, 7}, the bits v.sub.0, v.sub.1, v.sub.2, v.sub.3, v.sub.4 with indices not belonging to the component data bit index set Q={5, 6, 7} in a component rate profiling output bit sequence v=[v.sub.0, v.sub.1, v.sub.2, v.sub.3, v.sub.4, v.sub.5, v.sub.6, v.sub.7] is set as v.sub.0=0, v.sub.1=0, v.sub.2=0, v.sub.3=0, and v.sub.4=0.
[0196] A second specific example with N=16, K=6 and Q={7, 11, 12, 13, 14, 15}, the bits v.sub.0, v.sub.1, v.sub.2, v.sub.3, v.sub.4, v.sub.5, v.sub.6, v.sub.8, v.sub.9, v.sub.10 with indices not belonging to the component data bit index set Q={7, 11, 12, 13, 14, 15} in a component rate profiling output bit sequence v=[v.sub.0, v.sub.1, v.sub.2, v.sub.3, v.sub.4, v.sub.5, v.sub.6, v.sub.7, v.sub.8, v.sub.9, v.sub.10, v.sub.11, v.sub.12, v.sub.13, v.sub.14, v.sub.15] is set as v.sub.0=0, v.sub.1=0, v.sub.2=0, v.sub.3=0, v.sub.4=0, v.sub.5=0, v.sub.6=0, v.sub.8=0, v.sub.9=0, and v.sub.10=0.
[0197] A third specific example is given as
TABLE-US-00011 k = 0; For i = 0 to N1 If i Q v.sub.i = c.sub.k; k = k + 1; Else v.sub.i = 0; End if End for
[0198] In some embodiments, the component rate profiling output bit sequence v is the multiplexing of the component rate profiling input bit sequence c and an all-zero sequence of length NK, wherein N is the polar matrix size and K is the component rate profiling input bit sequence length.
[0199] A first specific example with N=8 and K=3 is a component rate profiling input bit sequence c=[c.sub.0, c.sub.1, c.sub.2] and an all-zero sequence of length NK=83=5, then a component rate profiling output bit sequence v=[v.sub.0, v.sub.1, v.sub.2, v.sub.3, v.sub.4, v.sub.5, v.sub.6, v.sub.7]=[0, 0, 0, 0, 0, c.sub.0, c.sub.1, c.sub.2].
[0200] A second specific example with N=16, K=6, a component rate profiling input bit sequence c=[c.sub.0, c.sub.1, c.sub.2, c.sub.3, c.sub.4, c.sub.5] and an all-zero sequence of length NK=164=12, then a component rate profiling output bit sequence v=[v.sub.0, v.sub.1, v.sub.2, v.sub.3, v.sub.4, v.sub.5, v.sub.6, v.sub.7, v.sub.8, v.sub.9, v.sub.10, v.sub.11, v.sub.12, v.sub.13, v.sub.14, v.sub.15]=[0, 0, 0, 0, 0, 0, 0, 0, 0, 0, c.sub.0, 0, c.sub.1, c.sub.2, c.sub.3] is determined.
Embodiment 6
[0201] This section discloses examples involving a first concatenation.
[0202] Embodiment 6 is based on the above embodiments. The input of a concatenation operation can be based on the input sequence c.
[0203] In some examples, the concatenation block can be connected with one or more component rate profile block.
[0204] In some embodiments, the H component rate profiling output bit sequences v.sup.(0), v.sup.(1), . . . , v.sup.(H1) are input to a first concatenation to determine a concatenation output bit sequence y=[y.sub.0, y.sub.1, y.sub.2, . . . , y.sub.E1] of length E, wherein, for h=0, 1, . . . , H1, N.sub.h is the length of the h-th component rate profiling output bit sequence v.sup.(h)=[v.sub.0.sup.(h), v.sub.1.sup.(h), . . . , v.sub.N.sub.
[0205] Examples of systems involving a first concatenation block are given in
[0206] In some embodiments, the first concatenation comprises obtaining, by the first node, H component concatenation input bit sequences v.sup.(0), v.sup.(1), . . . , v.sup.(H1); and determining, by the first node, a concatenation output bit sequence y=[y.sub.0, y.sub.1, y.sub.2, . . . , y.sub.E1] as y=[v.sup.(0), v.sup.(1), . . . , v.sup.(H1)]=[v.sub.0.sup.(0), v.sub.1.sup.(0), . . . , v.sub.N.sub.
[0207] Here, E is the length of the output bit sequence e=[e.sub.0, e.sub.1, e.sub.2, . . . , e.sub.E1]; for h=0, 1, . . . , H1, the h-th component concatenation input bit sequence v.sup.(h)=[v.sub.0.sup.(h), v.sub.1.sup.(h), . . . , v.sub.N.sub.
[0208] The purpose of the concatenation block is to combine the multiple input sequences to generate an output sequence, which can be used as input for other blocks within a system.
[0209] In some example, the first concatenation may comprise obtaining, by the first node, H component concatenation input bit sequences v.sup.(0), v.sup.(1), . . . , v.sup.(H1); and determining, by the first node, a concatenation output bit sequence y=[y.sub.0, y.sub.1, y.sub.2, . . . , y.sub.E1] as
TABLE-US-00012 i = 0; For h = 0 to H1 For k = 0 to N.sub.h1 y.sub.i = v.sub.k.sup.(h); i = i + 1; End for End for
[0210] Here, E is the length of the output bit sequence e=[e.sub.0, e.sub.1, e.sub.2, . . . , e.sub.E1]; for h=0, 1, . . . , H1, the h-th component concatenation input bit sequence v.sup.(h)=[v.sub.0.sup.(h), v.sub.1.sup.(h), . . . , v.sub.N.sub.
Embodiment 7
[0211] This section discloses examples related to pre-transform.
[0212] Embodiment 7 is based on the above embodiments.
[0213] The input of a pre-transform can be based on the input sequence.
[0214] In some examples, a pre-transform block is connected with a concatenation block.
[0215] In some embodiments, the concatenation output bit sequence y=[y.sub.0, y.sub.1, y.sub.2, . . . , Y.sub.E1] of length E is input to a pre-transform to determine a pre-transform output bit sequence u=[u.sub.0, u.sub.1, u.sub.2, . . . , u.sub.E1] of length E by at least one of the following: the generator polynomial g(D)=g.sub.0+g.sub.1.Math.D+g.sub.2.Math.D.sup.2+ . . . +g.sub.m.Math.D.sup.m over GF(2), the recursive feedback polynomial q(D)=q.sub.0+q.sub.1.Math.D+q.sub.2.Math.D.sup.2+ . . . +q.sub.m.Math.D.sup.m over GF(2).
[0216] A pre-transform operation can be conducted based on either a generator polynomial or a recursive feedback polynomial.
[0217] In some embodiments, the pre-transform comprises obtaining, by the first node, a pre-transform input bit sequence of length N, and determining, by the first node, a pre-transform output bit sequence u=[u.sub.0, u.sub.1, . . . , u.sub.N1] by using at least one of the following: the generator polynomial g(D)=g.sub.0+g.sub.1.Math.D+ . . . +g.sub.m.Math.D.sup.m over GF(2), the recursive feedback polynomial q(D)=q.sub.0+q.sub.1.Math.D+ . . . +q.sub.m.Math.D.sup.m .
[0218] In the above example, N can be any positive integer; m is a memory length; specific examples are given in
(Pre-Transform Using a Generator Polynomial g(D)
[0219] In some embodiments, the pre-transform determines the pre-transform output bit sequence u corresponding to the pre-transform input bit sequence y=[y.sub.0, y.sub.1, y.sub.2, . . . , y.sub.E1] of length E according to a generator polynomial g(D)=g.sub.0+g.sub.1.Math.D+g.sub.2.Math.D+ . . . +g.sub.m1.Math.D+g.sub.m.Math.D, wherein m is called a memory length of the generator polynomial g(D). The generator polynomial g(D)=g.sub.0+g.sub.1.Math.D+ . . . +g.sub.m1.Math.D.sup.m1+g.sup.m.Math.D.sup.m can be any binary polynomial over GF(2), wherein m is the polynomial degree or the memory length. In a specific example with a memory length m=6, a generator polynomial is g(D)=g.sub.0+g.sub.1.Math.D+g.sub.2.Math.D.sup.2+g.sub.3.Math.D.sup.3+g.sub.4.Math..sup.4D+g.sub.5.Math.D.sup.5+g.sub.6.Math.D.sup.6=1+0.Math.D+1.Math.D.sup.2+1.Math.D.sup.3+0.Math.D.sup.4+1.Math.D.sup.5+1.Math.D.sup.6=1+D.sup.2+D.sup.3+D.sup.5+D.sup.6. In another specific example with a memory length m=3, a generator polynomial is g(D)=g.sub.0+g.sub.1.Math.D+g.sub.2.Math.D.sup.2+g.sub.3.Math.D.sup.3=1+1.Math.D+0.Math.D.sup.2+1.Math.D.sup.3=1+D+D.sup.3.
[0220]
wherein the summation and the multiplication is over GF(2); the bit y.sub.ik=0 for i<k; g.sub.k is a coefficient of the term with degree K in the generator polynomial g(D)=g.sub.0+g.sub.1.Math.D+ . . . +g.sub.m1.Math.D.sup.m1+g.sub.m.Math.D.sup.m over GF(2); a specific pseudo code is as follows.
TABLE-US-00013 For i = 0 to N1 k = 0; u.sub.i = 0; While k m && k i u.sub.i = mod(u.sub.i + g.sub.k.Math.y.sub.ik, 2); k = k + 1; End while End for
[0221]
(Pre-Transform Using a Recursive Feedback Polynomial q(D))
[0222] In some embodiments, the pre-transform determines the pre-transform output bit sequence u corresponding to the pre-transform input bit sequence y according to a recursive feedback polynomial q(D)=q.sub.0+q.sub.1.Math.D+q.sub.2.Math.D+ . . . +q.sub.m1.Math.D+q.sub.m.Math.D, wherein m is called a memory length of the recursive feedback polynomial q(D).
[0223] The feedback polynomial q(D)=q.sub.0+q.sub.1.Math.D+ . . . +q.sub.m1.Math.D.sup.m1+q.sub.m.Math.D.sup.m is a binary polynomial with the zero-degree coefficient q.sub.0 being 1 and other coefficients q.sub.1, . . . , q.sub.m being any binary values over GF(2), wherein m is a memory length. In a specific example with a memory length m=6, a feedback polynomial is q(D)=q.sub.0+q.sub.1.Math.D+q.sub.2.Math.D.sup.2+q.sub.3.Math.D.sub.3+q.sub.4.Math.D.sub.4+q.sub.5.Math.D.sub.5+q.sub.6.Math.D.sub.6=1+0.Math.D+1.Math.D.sup.2 +0.Math.D3+1.Math.D.sup.4+1.Math.D.sup.5+1.Math.D.sup.6=1+D.sup.2+D.sup.4+D.sup.5+D.sup.6. In another specific example with a memory length m=3, a feedback polynomial is q(D)=q.sub.0+q.sub.1.Math.D+q.sub.2.Math.D.sup.2+q.sub.3.Math.D.sub.3=1+0.Math.D+1.Math.D.sup.2+1.Math.D.sup.3=1+D.sup.2+D.sup.3.
[0224]
TABLE-US-00014 For i = 0 to N1 k = 1; u.sub.i = y.sub.i, While k m && k i u.sub.i = mod(u.sub.i + q.sub.k.Math.u.sub.ik, 2); k = k + 1; End while End for
[0229]
(Pre-Transform Using Both a Generator Polynomial g(D) and a Recursive Feedback Polynomial q(D)
[0230] In some embodiments, the pre-transform determines the pre-transform output bit sequence u corresponding to the pre-transform input bit sequence y according to both a generator polynomial g(D)=g.sub.0+g.sub.1.Math.D+ . . . +g.sub.m1.Math.D.sup.m1+g.sub.m.Math.D and a recursive feedback polynomial q(D)=q.sub.0+q.sub.1.Math.D+ . . . +q.sub.m1.Math.D.sup.m1+q.sub.m.Math.D.sup.m, wherein m is called a memory length for both the generator polynomial g(D) and the recursive feedback polynomial q(D).
[0231] The generator polynomial g(D)=g.sub.0+g.sub.1.Math.D+ . . . +g.sub.m1.Math.D.sup.m1+g.sub.m.Math.D.sup.m can be any binary polynomial over GF(2), wherein m is the polynomial degree or the memory length. In a specific example with a memory length m=6, a generator polynomial is g(D)=g.sub.0+g.sub.1.Math.D+g.sub.2.Math.D.sup.2+g.sub.3.Math.D.sup.3+g.sub.4.Math.D.sup.4+g.sub.5.Math.D.sup.5+g.sub.6.Math.D.sup.6=1+0.Math.D+1.Math.D.sup.2+1.Math.D.sup.3+0.Math.D.sup.4+1.Math.D.sup.5+1.Math.D.sup.6=1+D.sup.2+D.sup.3+D.sup.5+D.sup.6. In another specific example with a memory length m=3, a generator polynomial is g(D)=g.sub.0+g.sub.1.Math.D+g.sub.2.Math.D.sup.2+g.sub.3.Math.D.sup.3=1+1.Math.D+0.Math.D.sup.2+1.Math.D.sup.3=1+D+D.sup.3. The recursive feedback polynomial q(D)=q.sub.0+q.sub.1.Math.D+ . . . +q.sub.m1.Math.D.sup.m1+q.sub.m.Math.D.sup.m is a binary polynomial with the zero-degree coefficient q.sub.0 being 1 and other coefficients q.sub.1, . . . , q.sub.m being any binary values over GF(2), wherein m is the memory length. In a specific example with a memory length m=6, a recursive feedback polynomial is q(D)=q.sub.0+q.sub.1.Math.D+q.sub.2.Math.D.sup.2+q.sub.3.Math.D.sup.3+q.sub.4.Math.D.sup.4+q.sub.5.Math.D.sup.5+q.sub.6.Math.D.sup.6=1+0.Math.D+1.Math.D.sup.2+0.Math.D.sup.3+1.Math.D.sup.4+1.Math.D.sup.5+1.Math.D.sup.6=1+D.sup.2+D.sup.4+D.sup.5+D.sup.6. In another specific example with a memory length m=3, a recursive feedback polynomial is q(D)=q.sub.0+q.sub.1.Math.D+q.sub.2.Math.D.sup.2+q.sub.3.Math.D.sup.3=1+0.Math.D+1.Math.D.sup.2+1.Math.D.sup.3=1+D.sup.2+D.sup.3.
[0232]
[0233] As shown in
TABLE-US-00015 For j = m to 1 t.sub.j = t.sub.j1; End for t.sub.0 = 0;
[0239] A specific pseudo code for the above steps is as follows.
TABLE-US-00016 For j = 0 to m t.sub.j = 0; End for k = 0; For i = 0 to N1 s = 0; t.sub.0 = y.sub.i; For j = 0 to m s = mod(s + q.sub.j.Math.t.sub.j, 2); End for t.sub.0 = S; u.sub.i = 0; For j = 0 to m u.sub.i = mod(u.sub.i + g.sub.j.Math.t.sub.j, 2); End for For j = m to 1 t.sub.j = t.sub.j1; End for End for
Embodiment 8
[0240] This section discloses examples related to segmentation.
[0241] Embodiment 8 is based on all of the above embodiments.
[0242] In some examples, the input of a segmentation block is based on the input sequence c.
[0243] In some examples, a segmentation block can relate to a pre-transform block.
[0244] In some embodiments, the pre-transform output bit sequence u=[u.sub.0, u.sub.1, u.sub.2, . . . , u.sub.E1] of length E is input to a segmentation to determine H segmentation output bit sequences u.sub.(0), u.sub.(1), . . . u.sub.(H1) by H component polar matrix sizes N.sub.0, N.sub.1, . . . , N.sub.H1, wherein, H is the number of component polar matrices; for h=0, 1, . . . , H1, the h-th segmentation output bit sequence u.sup.(h) is of length N.sub.h, wherein N.sub.h is the h-th component polar matrix size and E is the length of the pre-transform output bit sequence u and E=N.sub.0+N.sub.1+ . . . +N.sub.H1.
[0245] In some examples, the segmentation operation comprises obtaining, by the first node, a segmentation input bit sequence of length E; and determining, by the first node, H segmentation output bit sequences u.sub.(0), u.sub.(1), . . . u.sub.(H1) by H component polar matrix sizes N.sub.0, N.sub.1, . . . , N.sub.H1 as below:
TABLE-US-00017 i = 0; For h = 0 to H1 For k = 0 to N.sub.h1 u.sub.k.sup.(h) = u.sub.i; i = i + 1; End for End for
[0246] In the above example, the segmentation input bit sequence of length E is the pre-transform output bit sequence u=[u.sub.0, u.sub.1, u.sub.2, . . . , u.sub.E1] of length E; for h=0, 1, . . . , H1, the h-th segmentation output bit sequence u .sup.(h) is of length equal to the h-th component polar matrix size N.sub.h. In some embodiments, the segmentation input bit sequence of length E consists of the H segmentation output bit sequences u.sub.(0), u.sub.(1), . . . u.sub.(H1).
[0247] In some examples, a segmentation block can be connected to one or more component polar transform blocks.
[0248] Examples are given in
Embodiment 9
[0249] This section discloses examples involving polar transforms.
[0250] Embodiment 9 is based on all the above embodiments.
[0251] An encoding or decoding system may contains multiple component polar transforms.
[0252] The input of the component polar transforms can be based on the input sequence c.
[0253] In some examples, a component polar transform block can be connected with a segmentation block.
[0254] In one example, for h=0, 1, 2, . . . , H1, the h-th segmentation output bit sequences u.sup.(h) of length N.sub.h is input to a component polar transform to determine an h-th component polar transform output bit sequence d.sup.(h)=[d.sub.0.sup.(h), d.sub.1.sup.(h), . . . , d.sub.N.sub.
[0255] In some examples, a component polar transform block can be connected with a component interleaving block. In one example, the input of a component interleaving block is based on the output of a component polar transform block.
[0256] Some examples are shown in
Embodiment 10
[0257] This section discloses examples involving output bit sequence comprises component polar transform output bit sequences.
[0258] Embodiment 10 is based on the above embodiments.
[0259] In one example, the output bit sequence e=[e.sub.0, e.sub.1, . . . , e.sub.E1] comprises H component polar transform output bit sequences d.sup.(0), d.sup.(1), . . . , d.sup.(H1), wherein, for h=0, 1, . . . , H1, the h-th component polar transform output bit sequence d.sup.(h)=[d.sub.0.sup.(h), d.sub.1.sup.(h), . . . , d.sub.N.sub.
[0260] In another example, the output bit sequence e=[e.sub.0, e.sub.1, . . . , e.sub.E1] is a second concatenation of H component polar coding output bit sequences d.sup.(0), d.sup.(1), . . . , d.sup.(H1) as follows: [e.sub.0, e.sub.1, e.sub.2, . . . , e.sub.E1]=[d.sup.(0), d.sup.(1), . . . , d.sup.(H1)]=[d.sub.0.sup.(0), d.sub.1.sup.(0), . . . d.sub.N.sub.
[0261] In yet another example, the output bit sequence e=[e.sub.0, e.sub.1, . . . , e.sub.E1] is a second concatenation of H component polar coding output bit sequences d.sup.(0), d.sup.(1), . . . , d.sup.(H1) as follows:
TABLE-US-00018 i = 0; For h = 0 to H1 For k = 0 to N.sub.h1 e.sub.i = d.sub.k.sup.(h); i = i + 1; End for End for
[0262]
Embodiment 11
[0263] This section discloses example systems comprising component interleaving.
[0264] Embodiment 11 is based all of the above Embodiments.
[0265] A component interleaving operation can be achieved based on an interleaver pattern J.
[0266] In some examples, for h=0, 1, . . . , W1, the h-th component polar transform output bit sequence d.sup.(h)=[d.sub.0.sup.(h), d.sub.1.sup.(h), . . . , d.sub.N.sub.
[0267] In some embodiments, the h-th component interleaver pattern J.sup.(h) is determined using the method in Example 1 with a polar matrix size N=N.sub.h, wherein N.sub.h is the h-th component polar matrix size. In some embodiments, the h-th component interleaver pattern J.sup.(h)is determined using the method in Example 2 with a polar matrix size N=N.sub.h, wherein N.sub.h is the h-th component polar matrix size.
[0268] In another example, a component interleaving determined by an component interleaver pattern J=[J.sub.0, J.sub.1, . . . , J.sub.N2, J.sub.N1] of length N comprises obtaining, by the first node, a component interleaving input bit sequence d=[d.sub.0, d.sub.1, . . . , d.sub.N1] of length N; and determining, by the first node, a component interleaving output bit sequence d=[d.sub.0, d.sub.1, . . . , d.sub.N1] of length N as d.sub.i=d.sub.J.sub.
[0269] In other words, the i-th bit of the interleaving output bit sequence d is equal to the J.sub.i-th bit of the interleaving input bit sequence d=[d.sub.0, d.sub.1, . . . , d.sub.N1], wherein, the component interleaver pattern J can be any permutation of the integer sequence [0, 1, 2, . . . , N2, N1].
[0270] Several examples are discussed below to indicate the interleaving process mentioned above.
[0271] Example 1: A first specific example of a component interleaver pattern J=[J.sub.0, J.sub.1, . . . , J.sub.N2, J.sub.N1] is determined as by a polar matrix size N and a sub-block interleaver pattern =[.sub.0, .sub.1, .sub.2, .sub.3, .sub.4, .sub.5, .sub.6, .sub.7, .sub.8, .sub.9, .sub.10, .sub.11, .sub.12, .sub.13, .sub.14, .sub.15, .sub.16, .sub.17, .sub.18, .sub.19, .sub.20, .sub.21, .sub.22, .sub.23, .sub.24, .sub.25, .sub.26, .sub.27, .sub.28, .sub.29, .sub.30, .sub.31]=[0, 1, 2, 4, 3, 5, 6, 7, 8, 16, 9, 17, 10, 18, 11, 19, 12, 20, 13, 21, 14, 22, 15, 23, 24, 25, 26, 28, 27, 29, 30, 31] as follows.
TABLE-US-00019 For i = 0 to N1 j = floor(32i/N); J.sub.i= .sub.j(N/32) + mod(i, N/32); End for
[0272] Example 2: A second specific example of an interleaver pattern J=[J.sub.0, J.sub.1, . . . , J.sub.N2, J.sub.N1] is that the relationship between the index i and the i-th element Ji in the interleaver pattern J satisfies the following quadratic form:
J.sub.i=mod(f.sub.1.Math.i+f.sub.2.Math.i.sup.2, N)
where some examples of parameters f.sub.1 and f.sub.2 depending on a polar matrix size N are summarized in TABLE 1.
TABLE-US-00020 TABLE 1 Interleaver parameters for Example 2 N f.sub.1 f.sub.2 64 7 16 128 15 32 256 15 32 512 31 64 1024 31 64 2048 31 64 4096 31 64
[0273] Example 3: A third example of a component interleaver pattern J=[J.sub.0, J.sub.1, . . . , J.sub.N2, J.sub.N1] with N=8 is J=[J.sub.0, J.sub.1, J.sub.2, J.sub.3, J.sub.4, J.sub.5, J.sub.6, J.sub.7]=[5, 4, 7, 1, 6, 0, 2, 3].
Embodiment 12
[0274] This section discloses examples of output bit sequences include component interleaving output bit sequences.
[0275] Embodiment 12 is based on all the Embodiments disclosed above.
[0276] In some embodiments, the output bit sequence e=[e.sub.0, e.sub.1, . . . , e.sub.E1] comprises W component interleaving output bit sequences d.sup.(0), d.sup.(1), . . . , d.sup.(W1) and HW component polar transform output bit sequences d.sup.(W), d.sup.(W+1), . . . , d.sup.(H1), wherein, for h=0, 1, . . . , W1, the h-th component interleaving output bit sequence d.sup.(h)=[d.sub.0.sup.(h), d.sub.1.sup.(h), . . . , d.sub.N.sub.
[0277] In some embodiments, the output bit sequence e=[e.sub.0, e.sub.1, . . . , e.sub.E1] is a second concatenation of W=H component interleaving output bit sequences d.sup.(0), d.sup.(1), . . . , d.sup.(H1) as follows:
[e.sub.0, e.sub.1, e.sub.2, . . . , e.sub.E1]=[d.sup.(0), d.sup.(1), . . . , d.sup.(H1)]=[d.sub.0.sup.(0), d.sub.1.sup.(0), . . . d.sub.N.sub.
[0278] In some embodiments, the output bit sequence e=[e.sub.0, e.sub.1, . . . , e.sub.E1] is a second concatenation of W=H component output bit sequences d.sup.(0), d.sup.(1), . . . , d.sup.(H1) as follows:
TABLE-US-00021 i = 0; For h = 0 to H1 For k = 0 to N.sub.h1 e.sub.i = d.sub.k.sup.(h); i = i + 1; End for End for
[0279]
[0280] In some examples, the output bit sequence e=[e.sub.0, e.sub.1, . . . , e.sub.E1] is a second concatenation of W component interleaving output bit sequences d.sup.(0), d.sup.(1), . . . , d.sup.(W1) and HW component polar transform output bit sequences d.sup.(W), d.sup.(W+1), . . . , d.sup.(H1) as follows:
[e.sub.0, e.sub.1, e.sub.2, . . . , e.sub.E1]=[d.sup.(0), d.sup.(1), . . . , d.sup.(W1), d.sup.(W), d.sup.(W+1), . . . , d.sup.(H1)]=[d.sub.0.sup.(0), . . . d.sub.N.sub.
[0281] In some embodiments, the output bit sequence e=[e.sub.0, e.sub.1, . . . , e.sub.E1] is a second concatenation of W component interleaving output bit sequences d.sup.(0), d.sup.(1), . . . , d.sup.(W1) and HW component polar transform output bit sequences d.sup.(W), d.sup.(W+1), . . . , d.sup.(H1) as follows:
TABLE-US-00022 i = 0; For h = 0 to W1 For k = 0 to N.sub.h1 e.sub.i = d.sub.k.sup.(h); i = i + 1; End for End for For h = W to H1 For k = 0 to N.sub.h1 e.sub.i = d.sub.k.sup.(h); i = i + 1; End for End for
[0282]
[0283]
[0284] The implementations as discussed above will apply to a network communication.
[0285]
[0286]
[0287] Various preferred embodiments and additional features of the above-described methods of
[0288] In some embodiments, the repetition operation comprising: obtaining, by the first node, a repetition input bit sequence; and determining, by the first node, H component repetition output bit sequences c.sup.(0), c.sup.(1), . . . , c.sup.(H1) based on at least one of: 1) a length list (K.sub.0, K.sub.1, . . . , K.sub.H1), wherein K.sub.i indicating the length of c.sup.(i) or 2) a repetition index list (R.sup.(0), R.sup.(1), . . . , R.sup.(H1)). In some embodiments, at least one of the H component repetition output bit sequences c.sup.(0), c.sup.(1), . . . , c.sup.(H1) has a length equal to the length of the input bit sequence. In some embodiments, none of the H component repetition output bit sequences c.sup.(0), c.sup.(1), . . . , c.sup.(H1) has a length equal to the length of the input bit sequence. In some embodiments, at least one of the H component repetition output bit sequences c.sup.(0), c.sup.(1), . . . , c.sup.(H1) is equal to the input bit sequence. In some embodiments, at least one element K.sub.i in the length list (K.sub.0, K.sub.1, . . . , K.sub.H1) is equal to K, wherein K is the length of the input bit sequence. In some embodiments, an element R.sup.(i) in the repetition index list (R.sup.(0), R.sup.(1), . . . , R.sup.(H1)) is an integer set. In some embodiments, at least one element R.sup.(i) in the repetition index list (R.sup.(0), R.sup.(1), . . . , R.sup.(H1)) is equal to a first-type integer set Z.sub.K={0, 1, 2, . . . , K1}, wherein the first-type integer set Z.sub.K={0, 1, 2, . . . , K1} comprises all non-negative integers smaller than K and K is the length of the input bit sequence. In some embodiments, for h=0, 1, . . . , H2, R.sup.(h+1) is a subset of R.sup.(h). In some embodiments, at least two of the H component repetition output bit sequences share at least one common element. In some embodiments, c.sup.(h)=[c.sub.0.sup.(h), c.sub.1.sup.(h), . . . , c.sub.K.sub.
[0289] In some embodiments, at least two of the H component repetition output bit sequences c.sup.(i) and c.sup.(j) comprise matching sub-sequences generated based on the input bit sequence. In one example, an input bit sequence c=[c.sub.0, c.sub.1, c.sub.2, c.sub.3, c.sub.4, c.sub.5, c.sub.6, c.sub.7, c.sub.8], c.sup.(i)=[c.sub.0, c.sub.1, c.sub.7, c.sub.3] and c.sup.(j)=[c.sub.3, c.sub.2, c.sub.7, c.sub.5]. Here, c.sup.(i) and c.sup.(j) have matching subsequences [c.sub.7, c.sub.3] and [c.sub.3, c.sub.7] accordingly. Both matching sub-sequences are generated based on the input sequence c, i.e., the elements c.sub.3 and c.sub.7 are in the input sequence c. Also, the two sub-sequences [c.sub.7, c.sub.3] and [c.sub.3, c.sub.7] have a matching relationship, e.g., the third and fourth elements in c.sup.(i) (c.sub.7 and c.sub.3) determine the third and first elements (c.sub.7 and c.sub.3) in c.sup.(j) . The two matching subsequences do not need to be in the same order with each other. Also, the elements in a matching subsequence do not need to be in consecutive positions in c.sup.(i) or c.sup.(j).
[0290] In some embodiments, the output bit sequence is determined by further performing a rate profile operation, wherein the input of the rate profile operation is based on the input bit sequence. In some embodiments, the rate profile operation is performed on the input bit sequence c=[c.sub.0, c.sub.1, . . . , c.sub.K1] using a first data bit index set Q={Q.sub.0, Q.sub.1, . . . , Q.sub.K1} to obtain a repetition rate profile output bit sequence v=[v.sub.0, v.sub.1, . . . , v.sub.N1].
[0291] In some embodiments, the output bit sequence is determined by further performing a repetition operation, wherein the repetition operation comprises: determining, by the first node, H component repetition output bit sequences c.sup.(0), c.sup.(1), . . . , c.sup.(H1) based on the repetition rate profile output bit sequence v=[v.sub.0, v.sub.1, . . . , v.sub.N1] by at least one of: 1) a length list (K.sub.0, K.sub.1, . . . , K.sub.H1), wherein K.sub.i indicating the length of c.sup.(i) or 2) the first data bit index set Q={Q.sub.0, Q.sub.1, . . . , Q.sub.K1}. In some embodiments, at least one of the H component repetition output bit sequences c.sup.(0), c.sup.(1), . . . , c.sup.(H1) has a length equal to the length of the input bit sequence. In some embodiments, none of the H component repetition output bit sequences c.sup.(0), c.sup.(1), . . . , c.sup.(H1) has a length equal to the length of the input bit sequence. In some embodiments, at least one of the H component repetition output bit sequences c.sup.(0), c.sup.(1), . . . , c.sup.(H1) is equal to the input bit sequence. In some embodiments, at least one element K.sub.i in the length list (K.sub.0, K.sub.1, . . . , K.sub.H1) is equal to K, wherein K is the length of the input bit sequence. In some embodiments, the first data bit index set Q={Q.sub.0, Q.sub.1, . . . , Q.sub.K1} is sorted according to index values or reliability of polarized sub-channels. In some embodiments, at least two of the H component repetition output bit sequences share at least one common element. In some embodiments, c.sup.(h)=[c.sub.0.sup.(h), c.sub.1.sup.(h), . . . , c.sub.K.sub.
[0292] In some embodiments, at least two of the H component repetition output bit sequences c.sup.(i) and c.sup.(j) comprise matching sub-sequences in the repetition rate profile output bit sequence v=[v.sub.0, v.sub.1, . . . , v.sub.N1], where N is an integer larger than 1. In one example, a repetition rate profile output bit sequence v=[v.sub.0, v.sub.1, v.sub.2, v.sub.3, v.sub.4, v.sub.5, v.sub.6, Y.sub.7], c.sup.(i)=[v.sub.0, v.sub.1, v.sub.2] and c.sup.(j)=[v.sub.2, v.sub.1, v.sub.4]. Here, c.sup.(i) and c.sup.(j) have matching subsequences [v.sub.1, v.sub.2] and [v.sub.2, v.sub.1] accordingly. Both matching subsequences are generated based on the repetition rate profile output bit sequence v, i.e., the elements v.sub.1 and v.sub.2 are in the repetition rate profile output bit sequence v. Also, the two subsequences [v.sub.1, v.sub.2] and [v.sub.2, v.sub.1] have a matching relationship, e.g., the second and third elements in c.sup.(i) (v.sub.1 and v.sub.2) map to the second and first elements (v.sub.1 and v.sub.2) in c.sup.(j). The two matching subsequences do not need to be in the same order with each other. Also, the elements in a matching subsequence do not need to be in consecutive positions in c.sup.(i) or c.sup.(j).
[0293] In some embodiments, the rate profile operation is performed with H components. In some embodiments, the h-th component of the rate profile operation is performed based on a component data bit set Q.sup.(h)={Q.sub.0.sup.(h), Q.sub.1.sup.(h), Q.sub.2.sup.(h), . . . , Q.sub.K.sub.
[0294] In some embodiments, the above introduced methods further comprising performing a first concatenation operation, wherein the input of the first concatenation operation is based on the input sequence. In some embodiments, the first concatenation operation generates an intermediate output sequence having E bits. In some embodiments, the first concatenation operation is performed on a first H components bit sequences generated based on the input sequence.
[0295] In some embodiments, the above introduced methods further comprising performing a second concatenation operation, wherein the input of the second concatenation operation is based on the input sequence. In some embodiments, a second concatenation operation is performed on a second H components bit sequences generated based on the input sequence.
[0296] In some embodiments, the pre-transform generates an intermediate bit sequence having E bits. In some embodiments, a bit of the intermediate bit sequence is determined by a convolution bit sequence or a convolution polynomial. In some embodiments, the convolution bit sequence comprises a generator bit sequence g=[g.sub.0, g.sub.1, . . . , g.sub.m], or a recursive feedback bit sequence q=[q.sub.0, q.sub.1, . . . , q.sub.m], wherein m is a positive integer. In some embodiments, the convolution polynomial comprises a generator polynomial g(D)=g.sub.0+g.sub.1.Math.D+ . . . +g.sub.m1.Math.D.sup.m1+g.sub.m.Math.D.sup.m, or a recursive feedback polynomial q(D)=q.sub.0+q.sub.1.Math.D+ . . . +q.sub.m1.Math.D.sup.m1+q.sub.m.Math.D.sup.m, wherein m is a positive integer. In some embodiments, the output bit sequence is determined by performing a segmentation operation, wherein the input of the segmentation operation is based on the input bit sequence.
[0297] In some embodiments, the output bit sequence is determined further by performing an interleaving operation, wherein the input of the interleaving operation is based on the input bit sequence. In some embodiments, the interleaving operation is performed with W components, wherein W is an integer less than or equal to H. In some embodiments, the interleaving operation of any of the W components is determined by an interleaving pattern J.sup.(h)=[J.sub.0.sup.(h), J.sub.1.sup.(h), . . . , J.sub.N.sub.
[0298] It will be appreciated that the present document discloses methods and apparatus related to rate matching schemes applying to polar coding, PAC coding, or other pre-transformed polar coding. In 5G mobile communications standard of 3GPP, low-density parity-check (LDPC) codes are used for data transmission. However, LDPC has certain drawbacks compared to polar codes in short payload size (also called transport block size (TBS)). Alternatively, PAC codes can achieve finite-length bounds in moderate decoding complexity. PAC codes have code lengths with power of 2 (N=2.sup.n with positive integer n) as polar codes. However, to efficiently transmitting a payload (or transport block (TB)) in different wireless channel environments, it does not always have a code length of N=2.sup.n in time and frequency resources allocated by a base station (BS). Therefore, rate matching schemes are needed for applying PAC codes in wireless communications.
[0299] The disclosed and other embodiments, modules and the functional operations described in this document can be implemented in digital electronic circuitry, or in computer software, firmware, or hardware, including the structures disclosed in this document and their structural equivalents, or in combinations of one or more of them. The disclosed and other embodiments can be implemented as one or more computer program products, i.e., one or more modules of computer program instructions encoded on a computer readable medium for execution by, or to control the operation of, data processing apparatus. The computer readable medium can be a machine-readable storage device, a machine-readable storage substrate, a memory device, a composition of matter effecting a machine-readable propagated signal, or a combination of one or more of them. The term data processing apparatus encompasses all apparatus, devices, and machines for processing data, including by way of example a programmable processor, a computer, or multiple processors or computers. The apparatus can include, in addition to hardware, code that creates an execution environment for the computer program in question, e.g., code that constitutes processor firmware, a protocol stack, a database management system, an operating system, or a combination of one or more of them. A propagated signal is an artificially generated signal, e.g., a machine-generated electrical, optical, or electromagnetic signal, that is generated to encode information for transmission to suitable receiver apparatus.
[0300] A computer program (also known as a program, software, software application, script, or code) can be written in any form of programming language, including compiled or interpreted languages, and it can be deployed in any form, including as a standalone program or as a module, component, subroutine, or other unit suitable for use in a computing environment. A computer program does not necessarily correspond to a file in a file system. A program can be stored in a portion of a file that holds other programs or data (e.g., one or more scripts stored in a markup language document), in a single file dedicated to the program in question, or in multiple coordinated files (e.g., files that store one or more modules, sub programs, or portions of code). A computer program can be deployed to be executed on one computer or on multiple computers that are located at one site or distributed across multiple sites and interconnected by a communication network.
[0301] The processes and logic flows described in this document can be performed by one or more programmable processors executing one or more computer programs to perform functions by operating on input data and generating output. The processes and logic flows can also be performed by, and apparatus can also be implemented as, special purpose logic circuitry, e.g., an FPGA (field programmable gate array) or an ASIC (application specific integrated circuit).
[0302] Processors suitable for the execution of a computer program include, by way of example, both general and special purpose microprocessors, and any one or more processors of any kind of digital computer. Generally, a processor will receive instructions and data from a read only memory or a random access memory or both. The essential elements of a computer are a processor for performing instructions and one or more memory devices for storing instructions and data. Generally, a computer will also include, or be operatively coupled to receive data from or transfer data to, or both, one or more mass storage devices for storing data, e.g., magnetic, magneto optical disks, or optical disks. However, a computer need not have such devices. Computer readable media suitable for storing computer program instructions and data include all forms of non-volatile memory, media and memory devices, including by way of example semiconductor memory devices, e.g., EPROM, EEPROM, and flash memory devices; magnetic disks, e.g., internal hard disks or removable disks; magneto optical disks; and CD ROM and DVD-ROM disks. The processor and the memory can be supplemented by, or incorporated in, special purpose logic circuitry.
[0303] While this document contains many specifics, these should not be construed as limitations on the scope of an invention that is claimed or of what may be claimed, but rather as descriptions of features specific to particular embodiments. Certain features that are described in this document in the context of separate embodiments can also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment can also be implemented in multiple embodiments separately or in any suitable subcombination. Moreover, although features may be described above as acting in certain combinations and even initially claimed as such, one or more features from a claimed combination can in some cases be excised from the combination, and the claimed combination may be directed to a subcombination or a variation of a subcombination. Similarly, while operations are depicted in the drawings in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order, or that all illustrated operations be performed, to achieve desirable results.
[0304] Only a few examples and implementations are disclosed. Variations, modifications, and enhancements to the described examples and implementations and other implementations can be made based on what is disclosed.