当前位置:网站首页>NR polar code VII - SCL (successful cancellation list coding)
NR polar code VII - SCL (successful cancellation list coding)
2022-04-23 01:35:00 【Bai Xiaosheng of Ming Dynasty】
Preface
SC Is a greedy algorithm , Finally, only one is decoded , Although it can pass through SC Decoding reaches Shannon capacity . But in finite code length , Because of Murphy's law , Follow CRC Problem with collaboration , The improvement in performance is not so obvious .
SCL Can better follow CRC Collaboration , It generates a list , The list includes [1,2,4,8,16]msg.
adopt CRC After verification , Normally, the remaining one will pass the verification , Improved CRC Probability of successful verification . Although it increases the complexity , However, the communication performance is significantly improved , There is no mathematical proof of this , It's just an engineering practice .
Catalog :
- SC Decoding and Murphy's law
- SCL(succesive cancellation list decoding)
- DM(decision SC)& PM
- M = 4 Example
One SC decoding and Murphy's law

in the light of k Messages bit:
Polar After decoding , Need to carry out CRC. because CRC Need all of bit All bits must be transmitted correctly ,99.9% It's no use being right , It still needs to be retransmitted .
SC Coding is based on probability , from
To
The probability of correct transmission is higher and higher .
n The probability of correct transmission of all codes is p=
Then the probability of at least one error is err=1-p.
for instance :
(N=10,K=400) The encoding length is 1024, Information bit Count by 400
At least one probability of error 0.3449(BEC channel )
40% Probability has to be retransmitted , Of course K Set less , Can improve CRC Success , However, it will lead to low utilization of time slot resources .
This is also modem The question of universality , Need an overall assessment , Scene is complicated , Often one problem is solved , More complicated problems will be caused by . For example, as mentioned earlier OFDM, Inside GI,CP How to calculate , If you don't do well, your performance will be worse .
SC Put it forward , Many years later, someone proposed to use SCL solve ,List decoding It has a very long history , It's not new . But the combination of the two found that the practical effect is better .
Two SCL(succesive cancellation list decoding)
3.1 brief introduction
Until now, we have been based on binary tree method to elaborate polar, Bilken University, Turkey Erdal Arikan professor
The original work discusses its core idea based on information theory and matrix . This method is also called SSCL,SSC(simplified SCL)
A simplified version of SCL, The functions and principles are the same , It's just that the methods and perspectives are different .
SCL There is no strict mathematical proof that it must be effective , It can be understood through computer risk theory ,
The original SC decoding , Finally, only the most probable result is decoded msg.
adopt SCL Can give [1,2,4,16] Kind of msg list , after CRC After normal, there will be one left , For other cases, it can be based on PM Choose the penalty factor and the smallest .
3.2 Program flow

First step : add CRC
This is what the physical layer does , Follow Polar irrelevant .
To send a TB, Assumed length is A individual bits, after CRC after , To become a
The length is K bits Information about
Actually need to send msg by k bits
The second step Polar
Unreliable channel transmission N-K A freeze bit, Fixed for 0
Transmit on a reliable channel K individual bit
The third step Output codeword
Now output a codeword Is the actual value
Step four : BPSK AWGN Post transmission
Step five : The receiving party checks the received data SC List Decoder
![]()
SC decoder after , Will only output a maximum probability msg
list Decoder Will be output [4,8,16] individual msg. Every msg All are
A predicted value of the original transmission data
Step six : CRC
Received by the physical layer msg List Conduct estimate.
There are three normal situations :
1: Only one passed CRC check , Retain
2: One doesn't pass CRC check , Retransmission
3: More than one pass , adopt PM Strategy , Choose a penalty factor and the smallest .
In the actual scene, the 3 Kind of , Rarely encounter a probability of less than one in a million ( Follow CRC It depends on the length )
3、 ... and DM(decision SC)& PM

The original SC programme , Decoding i individual bit when , be based on L(u) Only one result will be given , Or 0, Or 1.
SCL programme ,
For news bit:
Decoding i individual bit When , At the same time give 2 results .
If
:
, ,DM Decision penalty factor . Now for 0
, Because at the moment with belief Make the opposite decision , So belief The absolute value of is used as the penalty factor
If
:

Because at the moment with belief Make the opposite decision , So belief The absolute value of As a punishment factor
For freezing bit
At the moment, I will only make one decision, But if
, Still have to
Plus... At the moment 
PM(path Metric)
We decoded the bit Of DM Add up to this path PM, The smaller the value . The higher the credibility .
Four M = 4 Example
4.1 The basic structure , be based on PM,DM The splitting process of

Decode first
, Give two paths , There are... On each path 2 A penalty factor :
: The verdict is 0, The penalty factor given
: The verdict is 1, The penalty factor given
Based on the above two paths , Make again DM, Now there is 4 Paths ,
size of PM=4
4.2 prune
When we decode to the th 3 individual bit When , And then there is 8 A path , This time should be based on PM Make a sort ,
Keep the lowest 4 individual , Cut out the penalty factor and the highest 4 individual .
The same is true for the later process

版权声明
本文为[Bai Xiaosheng of Ming Dynasty]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/04/202204230124398692.html
边栏推荐
- 最新流程引擎 flowable 6.7.2 更新说明
- 无关联进程间通信 —— 命名管道的创建和使用
- gin -get请求的小示例2-Handle处理post请求
- Introduction to PCIe xdma IP core (with list) - mingdeyang science and Education (mdy edu. Com)
- “自虐神器”一夜爆火:用手柄控制自己的脸,代码自取,后果自负
- 清研环境深交所上市:年营收1.8亿 市值41亿
- Interface automation session authentication solution
- Learning of gin framework -- golang
- 计蒜客:数独(DFS)
- Gbase 8s存储结构简介及空间管理
猜你喜欢

(product resources) mingdeyang ad8488 module high performance digital X-ray FMC interface 128 analog channel high-speed ADC chip

Use Charles to grab app package

On regular expression matching cryptography

leetcode771. Gemstones and stones
![[registration] tf54: engineer growth map and excellent R & D organization building](/img/c6/ae2c6427bd6af764ac614d59be54db.png)
[registration] tf54: engineer growth map and excellent R & D organization building

New functions of ai2022, introduction to new functions of illustrator 2022

Linked list dynamic header insertion

Innovative practice of short video content understanding and generation technology in meituan

In the second half of the smart watch, opportunities and challenges coexist
Let's talk about passive safety again. I'll teach you to understand the rating report of China Insurance Research Institute collision test
随机推荐
修改数组(并查集)
Activity preview | on April 23, a number of wonderful openmldb sharing came, which lived up to the good time of the weekend!
Interview eight part essay (disorderly order, no classification)
Realize the function of progress bar through layerdrawable
Introduction to gbase 8s checkpoint
GBASE 8s分片表管理操作
Is the stable currency a super opportunity to accelerate the death of the public chain or replace BTC?
Garlic customer: equilateral triangle (DFS)
UVC camera encapsulation class
Branch and loop statements
Basic knowledge of software testing (detailed version) collection of this article is enough
Custom numeric input control
Garlic Junkai company (DFS full arrangement)
Learning of gin framework -- golang
Jisuan Hakka spectrum (DFS for direct post algebra)
CVPR | 2022 | expressed by transformer learning multiple hypotheses! A new framework for 3D human pose estimation!
Gbase 8s存儲結構簡介及空間管理
Examples of branch and loop statements
Gbase 8t index
Android sqliteopenhelper data table structure upgrade