On the Tradeoff Between Accuracy and Complexity in Blind Detection of Polar Codes
Polar codes are a recent family of error-correcting codes with a number of desirable characteristics. Their disruptive nature is illustrated by their rapid adoption in the $5^{th}$-generation mobile-communication standard, where they are used to prot…
Authors: Pascal Giard, Alexios Balatsoukas-Stimming, Andreas Burg
On the T radeof f Between Accuracy and Comple xity in Blind Detection of Polar Codes Pascal Giard, Alexios Balatsoukas-Stimming, and Andreas Burg T elecommunications Circuits Laboratory Ecole polytechnique f ´ ed ´ erale de Lausanne (EPFL), 1015 Lausanne VD, Switzerland Email: { pascal.giard,alexios.balatsoukas,andreas.bur g } @epfl.ch Abstract —Polar codes are a recent family of error -correcting codes with a number of desirable characteristics. Their disruptive nature is illustrated by their rapid adoption in the 5 th -generation mobile-communication standard, where they are used to protect control messages. In this work, we describe a two-stage system tasked with identifying the location of control messages that consists of a detection and selection stage followed by a decoding one. The first stage spurs the need for polar-code detection algorithms with variable effort to balance complexity between the two stages. W e illustrate this idea of variable effort for multiple detection algorithms aimed at the first stage. W e propose three novel blind detection methods based on belief-propagation decoding inspired by early-stopping criteria. Then we show how their reliability impro ves with the number of decoding iterations to highlight the possible tradeoffs between accuracy and complexity . Additionally , we show similar tradeoffs for a detection method fr om pre vious w ork. In a setup where only one block encoded with the polar code of interest is present among many other blocks, our results notably show that, depending on the complexity budget, a variable number of undesirable blocks can be dismissed while achieving a missed-detection rate in line with the block-error rate of a complex decoding algorithm. I . I N T R O D U C T I O N Adaptiv e modulation and coding (AMC) is an ef fective tech- nique that is used by most modern communications systems in order to adapt the information-data rate of the system to the conditions of the wireless channel ov er which transmission takes place. The AMC information is transmitted ov er a dedicated control channel, which commonly uses a restricted number of modulation and coding combinations. Ho wever , in recent standards substantial amounts of control data have to be transmitted so that AMC techniques are also used for the con- trol channel. T o avoid using an additional control channel for the control channel, blind detection techniques are commonly employed to determine if control messages are present. The location of control messages along with their code parameters need to be blindly detected. The blind code detection task has been sho wn to be NP-hard in general [1], [2], so that heuristic algorithms are used in practice. For e xample, various methods hav e been proposed for the blind detection of Hamming and BCH codes (e.g., [3], [4] and references therein), con v olutional codes (e.g., [5], [6] and references therein), Turbo codes (e.g., [7], [8] and references therein), and LDPC codes (e.g., [9], [10] and references therein). Howe ver , so far , the blind detection of polar codes, which were recently included in the 5G standard, has received little attention [11]–[13]. M-1 B -1 Detecti on & Pre Sel ection Decoding 0 1 ... 0 ... Fig. 1. Overall system with detection stage and decoding stages. W e are interested in the following blind detection scenario. W e are giv en a set of M received noisy blocks of length N , out of which exactly one originates from a codeword of a particular polar code C , while the remaining blocks originate from random i.i.d. bit-sequences of length N (that models data that is not of interest and encoded by some other code). The relev ant polar codes used in 5G are concatenated with a cyclic redundancy check (CRC). Thus, we could attempt to decode all M receiv ed blocks with a po werful decoding algorithm (e.g., successi ve-cancellation list (SCL) decoding) and to use the CRC to identify the block that was actually encoded using the polar code C with high probability . Howe ver , this approach has a high complexity and existing methods [11]– [13] consider a two-step approach, where a low-comple xity algorithm is first used to discard some candidate blocks and only B < M candidate blocks are passed on to the high- complexity decoding algorithm as illustrated in Fig. 1. Contributions: In this paper, we present blind polar-code detection methods that enable the fine-grained adjustment of the tradeoff between the missed-detection rate (MDR) and complexity , where the complexity is determined by the effort spent on the detection-metric calculations and the number of retained candidates in the first and second stage, respecti vely . T o this end, we present new polar-code detection algorithms based on belief-propagation (BP) decoding of polar codes by adapting early-stopping criteria de veloped for BP decoding for the purpose of detection. Using the newly proposed algorithms as well as a detection algorithm from [13] (with a slight mod- ification that enables complexity-performance tradeoffs), our simulation results show that good accuracy can be achiev ed with a significant reduction in complexity . Outline: The remainder of this paper starts with Section II that provides background on the construction, decoding, and detection of polar codes. In Section III, we describe three detection methods based on BP decoding. Then, we explore the v arious tradeoffs between detection accuracy and com- plexity that can be achiev ed with the proposed algorithms in Section IV . Finally , Section V concludes this paper . I I . B AC K G RO U N D In this section, we provide some background on the con- struction of polar codes, and on the successi ve-cancellation (SC), fast simplified SC (fast-SSC), and BP decoding algo- rithms. W e also briefly describe an existing fast-SSC-based blind detection method for polar codes. A. Construction of P olar Codes Polar codes are linear block codes with a structured N × N generator matrix G [14]. Specifically , we have: G = 1 0 1 1 ⊗ n , (1) where n = log 2 N , and ⊗ n denotes the n -fold Kronecker product. Let A ⊆ { 0 , . . . , N − 1 } and let A c , referred to as the frozen-bit set, denote the complement of A . Then, encoding of a 1 × N polar code word is performed as x = uG , where u A contains information bits and u A c = 0 . Due to the particular structure of the generator matrix defined in (1) and the associated decoding algorithm described in the following section, the dif ferent bit locations in u hav e different reliabilities. The set A for a polar code of rate R = K N is chosen to contain the K most reliable bit positions [14]. B. Decoding Algorithms 1) SC and F ast-SSC Decoding: SC decoding traverses a data-dependency graph (DDG) [14] and produces a vector of decision log-likelihood ratios (LLRs) α that is used to produce an estimate of u , denoted by ˆ u , as follows: ˆ u i = δ u ( α i ) = 0 , if i ∈ A c , 0 , if i ∈ A and α i ≥ 0 , 1 , if i ∈ A and α i < 0 . (2) Fast-SSC decoding reduces the decoding latency of SC de- coding by exploiting the structure of certain subgraphs in the DDG. These subgraphs correspond to constituent sub-codes of the polar code that can be decoded efficiently (and often in a single time step) by specialized decoding algorithms [15]. 2) BP Decoding: BP decoding uses message passing on the factor graph defined by the generator matrix of a polar code. This factor graph has practically identical structure with the DDG used for SC decoding, with the main dif ference between the two algorithms being the scheduling of messages and the fact that in BP decoding all messages are soft (i.e., LLRs) while a significant part of SC decoding uses hard (i.e., 0 or 1 ) messages. BP decoding at iteration I consists of a right-to-left (or channel-to-information) pass which produces a vector of decision LLRs α I for the information vector u , followed by a left-to-right (or information-to-channel) pass which produces a vector of decision LLRs β I for the codew ord vector x . Similarly to SC decoding, α I can be used to produce estimates for u using (2), while β I can be used to produce estimates for x as follows: ˆ x I i = δ x ( β I i ) = 0 , if β I i ≥ 0 , 1 , if β I i < 0 . (3) A detailed description of BP decoding can be found in [16]. C. F ast-SSC-Based Blind Detection of P olar Codes In this section, we briefly summarize an algorithm that we proposed in previous w ork [13]. This method is based on fast- SSC decoding [15], where a detection metric is calculated with update rules that exploit the inherent structure of the constituent codes that compose a polar code. In this fast-SSC- based method, a detection metric D t is initialized to D 0 = 0 and is progressiv ely updated as more and more leaf nodes in the decoder tree are visited. A threshold on the detection metric can then be set in order to decide whether a polar- encoded codew ord is present or not. A straightforward way to adapt this method in order to obtain various tradeof fs between detection accuracy and calculation effort is to visit only a limited number of nodes in the decoder tree instead of traversing the entire tree, and this is the method we use to obtain the results in Section IV . In [13], detection-metric calculations are proposed for three constituent-code types: rate-0 codes, Repetition codes, and single-parity-check (SPC) codes. In this work, we initially used all three types but owing to its single parity bit, as opposed to the rate-0 and Repetition codes, SPC codes are the least reliable code of the three. As will be shown in Section IV , it may be beneficial not to update the detection metric after visiting an SPC node. For a detailed description of the detection-metric calculations, we refer the reader to [13]. I I I . B P - B A S E D B L I N D D E TE C T I O N Existing blind detection methods for polar codes use vari- ants of SC decoding for detection [11]–[13]. Due to the stringent latency requirements for blind detection imposed by the 5G standard, blind detection methods based on BP decoding are of interest for the first stage because BP decoding is highly parallelizable and its complexity can be scaled easily by changing the number of performed iterations. Thus, in this section we propose three novel blind detection methods for polar codes based on BP decoding that are inspired by early- stopping criteria found in the literature [16]–[21]. BP decoding refines the reliabilities of the LLRs at each iteration, a property that all proposed methods exploit. A. Method 1: T rac king of Decision-LLR Signs Under BP decoding, decodable noisy polar-encoded blocks should conv erge to some codeword as the number of iterations increases. Thus, the signs of the decision LLRs are expected to gradually stabilize, meaning that an increasing number of decision LLRs should have the same signs between different iterations. This fact can be exploited in order to define the following metric for blind BP-based detection of polar codes: D I LS = i ∈ { 0 , . . . , N − 1 } : sign α I i = sign α I − 1 i , (4) where α I i is the decision LLR at bit location i at iteration I , and α I − 1 i is the decision LLR for the same bit location but at iteration ( I − 1) . In words, D I LS is the number of decision-LLR signs that remained unchanged in-between iteration I and the one preceding it. B. Method 2: F r ozen-Bit Set Inspection By construction of the polar code, we know that u i = 0 for i ∈ A c . As such, e ven though the frozen channels are the least-reliable channels, one would expect that, as BP decoding conv erges, an increasing number of decision LLRs corresponding to frozen-bit locations should become non- negati ve. Using this observation, we can define the following metric for blind BP-based detection of polar codes: D I F S = i ∈ A c : α I i ≥ 0 , (5) where α I i is the decision LLR at bit location i at iteration I . In words, D I F S is the number of non-negati ve frozen-bit decision-LLR signs at iteration I . C. Method 3: Decision-V ector Re-Encoding In BP decoding, the right-to-left pass performs decoding, while the left-to-right pass is similar to soft encoding of the decision LLRs obtained with the right-to-left pass. For this reason, as BP decoding con ver ges, one would expect the re- encoded version of the decision vector ˆ u I to become equal to the decision vector ˆ x I obtained with (3), i.e., by taking hard decisions on the right-hand-side LLRs of the BP graph. In other words, if decoding is successful, we should have ˆ u I G = ˆ x I , and we can use this property in order to define the following metric for blind BP-based detection of polar codes: D I RE = i ∈ { 0 , . . . , N − 1 } : ˜ x I i = ˆ x I i , (6) where ˜ x I = ˆ u I G . In words, D I RE is equal to the number of bit positions of ˜ x I i and ˆ x I i that agree at iteration I . I V . A C U R R A C Y V S C O M P L E X I T Y In this section, we quantify the accuracy of v arious detection methods by plotting the missed-detection rate (MDR) as a function of the number of candidates B passed to the second stage, i.e., to an SCL decoder . A. System Setup Inspired by the L TE standard [22] and by the discussions that took place at the 3GPP RAN1 meetings towards the cre- ation of the next-generation mobile-communication standard (5G), we examine the performance for control messages that consist of a 16-bit identifier, an 8-bit payload, leading to a total of K = 24 information bits, and a CRC of C = 16 bits. These control messages are encoded using a polar code of rate R = K + C N , where N = 256 . The actual information rate of this scheme is R inf = K N and all E b / N 0 values in the simulations are calculated using R inf . For reference, the block-error rate (BLER) for a polar code with N = 256 , K = 24 , and C = 16 decoded with the SC, SCL, and BP decoding algorithms is illustrated in Fig. 2. All simulation results are gi ven for random code words, BPSK modulation, and an A WGN channel. The 16-bit CRC used has the generator polynomial z 16 + z 12 + z 5 + 1 . W e use a scaled-min-sum version of the BP decoding algorithm with a flooding schedule and a scaling factor of 0.9375. Results are for at least 50 000 blocks and until a minimum of 500 blocks in 3 3 . 5 4 4 . 5 5 5 . 5 6 10 − 4 10 − 3 10 − 2 10 − 1 10 0 E b / N 0 (dB) Block-error rate SC: BP: I = 15 I = 50 SCL: L = 2 L = 4 Fig. 2. Error-correction performance of a polar code with N = 256 , K = 24 , and C = 16 under v arious decoding algorithms. error were found for each E b / N 0 point. From Fig. 2, it can be seen that the BLER after 15 iterations of scaled-min-sum BP decoding is nearly identical to that of SC decoding. Increasing the number iterations from 15 to 50 provides a coding gain little under 0.25 dB at a BLER of 10 − 2 . At a BLER of 10 − 3 , compared to the other simulated decoding algorithms, CRC- aided SCL decoding provides coding gains of approximately 0.8 dB and 1.5 dB, with list sizes L ∈ { 2 , 4 } , respecti vely . The parameters mentioned above, used for the BLER sim- ulations, also apply for the accuracy simulations, where the accuracy is expressed in terms of the MDR as a function of the number of retained candidates. Furthermore, a set of M = 44 blocks are generated per trial among which only one is encoded with the expected polar code while the remaining ones contain random i.i.d. bit-sequences, and simulations are for 100 000 trials. The results are for an E b / N 0 value that corresponds to a BLER of 10 − 2 (i.e., the beginning of the region of interest for wireless communications) under CRC- aided SCL decoding with a maximum list size L = 2 . W e define a missed detection as the ev ent where a block has been encoded with the expected polar code, its noisy realization is decodable, and the detection method failed to rank it among the B -best candidates (i.e., the candidates that w ould be passed to the decoder). B. BP-Based Detection In Fig. 3, we show the MDR of the BP-based methods, described Section III, as a funct ion of the number of candidates passed to the decoding stage for various number of iterations. For these methods, the detection complexity of the first stage increases as a function of the number of decoding iterations I . It should be noted that method 1 is relying on the tracking of decision-LLR signs in-between two iterations, meaning that at least two decoding iterations are required. In Fig. 3, we can observe that the number of performed BP iterations greatly affects the number of candidates that need to be passed to the second stage in order to achiev e a gi ven MDR. For example, at a fixed MDR of 10 − 1 , for method 1 the required number of retained candidates B quickly drops from 40 to 20, from iterations I = 2 and I = 3 , then to M = 6 at iteration I = 4 . Furthermore, although the difference in terms 5 10 15 20 25 30 35 40 10 − 3 10 − 2 10 − 1 10 0 Number of candidates passed to decoder ( B ) Missed-detection rate I : 2 3 4 5 10 15 20 30 40 50 (a) Method 1: T racking of Decision-LLR Signs 5 10 15 20 25 30 35 40 10 − 3 10 − 2 10 − 1 10 0 Number of candidates passed to decoder ( B ) Missed-detection rate I : 1 2 3 4 5 10 15 20 30 40 50 (b) Method 2: Frozen-Bit Set Inspection 5 10 15 20 25 30 35 40 10 − 3 10 − 2 10 − 1 10 0 Number of candidates passed to decoder ( B ) Missed-detection rate I : 1 2 3 4 5 10 15 20 30 40 50 (c) Method 3: Decision-V ector Re-Encoding Fig. 3. BP-Based Detection: MDR as a function of the number of retained candidates B for a polar code with N = 256 , K = 24 , and C = 16 . of error -correction performance between 15 and 50 iterations of BP decoding is small, as illustrated in Fig. 2, the effect on detection accuracy is significant. The most extreme case is with method 3, illustrated in Fig. 3c, where it can be seen that for B = 4 retained candidates, increasing I from 15 to 50 reduces the MDR from little under 2 × 10 − 2 down to 4 × 10 − 3 . T o keep the comple xity of the first stage lo w while achie ving an MDR of 10 − 2 , the BP-based methods were found to require I = 5 , I = 3 , and I = 7 iterations for method 1, method 2, and method 3, respectiv ely , to pass no more than 3 / 4 of the M = 44 candidates (i.e., 33 candidates) to the high-comple xity SCL decoder of the second stage. For the same MDR, all three methods are sho wn to be capable of dismissing at least half of the candidates within I = 15 iterations, where method 2 ev en manages to keep no more than 1 / 4 of the candidates. W e also observe that, for all BP-based methods, increasing the number of iterations leads to diminishing returns. Comparing the curves of methods 2 and 3, we note that their slopes greatly differ . This hints that these methods may hav e different use cases, e.g., for an MDR of 10 − 2 method 2 is quickly capable of dismissing candidates whereas method 3 appears more suitable to iteratively reduce the MDR at a fixed and small number of retained candidates. C. F ast-SSC-Based Detection In Fig. 4, we show the MDR of the f ast-SSC-based method, described in Section II, as a function of the number of candidates passed to the decoding stage for various number visited leaf nodes. For that method, the detection complexity of the first stage increases as a function of these visits. For readability , the number of visited leaf nodes t in Fig. 4 is only increased when a leaf node used in the detection-metric calculations is visited, e.g., visiting a rate-1 node leaves the detection metric unchanged and is thus not accounted for in the value of t shown in the plots. T wo plots for the fast-SSC-based method are presented in Fig. 4. The left-hand-side one, Fig. 4a, shows the accuracy of the detection metric when all update rules proposed in our previous work [13] are used, where the dashed curves are the result of updates by a SPC node. The right-hand-side one, Fig. 4b, shows the accuracy of the same method when SPC nodes are excluded, i.e., when [13, Eq. (4)] is not applied. Looking at Fig. 4a, a certain number of crossov ers between curves for dif ferent v alues of t can be observ ed, hinting that at least one update rule may be detrimental to the accuracy . The first such crossover occurs when t increases from 5 to 6. The update applied at t = 6 corresponds to an SPC node. Fig. 4b shows the accuracy of the same method where that update rule is excluded. From that figure it can be seen that all curves follow the same trajectory , there is no sudden change of slope anymore. Under SC-based decoding, the BLER of that polar code at the E b / N 0 of interest is approximately 5 × 10 − 2 . Our hypothesis is that at such a high BLER, the SPC nodes are too unreliable to be beneficial for detection. For a MDR of 10 − 2 , the fast-SSC-based method is able to dismiss ov er a quarter of the M = 44 candidates with a t as small as 3. Excluding the SPC metric updates and visiting at least 12 of the 14 contributing nodes, 40 of the 44 candidates can be dismissed while achieving the same MDR. Fig. 4b also shows that a quarter of the candidates can be dismissed with a 10 − 3 MDR by visiting at least 6 of the 14 the nodes that update the detection metric. D. Har dwar e Implementation Considerations The hardware-implementation complexity of all proposed methods is largely dominated by that of the underlying decoder . Comparing the comple xity of BP-based methods against that of the fast-SSC one is challenging as the nature of their respective decoders can significantly vary . Ho wever , comparing the o verhead of the BP-based methods against each other , method 1 requires the storage of N decision-LLR signs, and N comparisons. Method 2, on the other hand, is the least complex, requiring only ( N − k ) comparisons. Lastly , method 3 requires N comparisons and additional circuitry to carry out the hard re-encoding step. 5 10 15 20 25 30 35 40 10 − 3 10 − 2 10 − 1 10 0 Number of candidates passed to decoder ( B ) Missed-detection rate t : 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 (a) All Nodes 5 10 15 20 25 30 35 40 10 − 3 10 − 2 10 − 1 10 0 Number of candidates passed to decoder ( B ) Missed-detection rate t : 1 2 3 4 5 6 7 8 9 10 11 12 13 14 (b) Excluding SPC Nodes Fig. 4. Fast-SSC-Based Detection: MDR as a function of the number of retained candidates B for a polar code with N = 256 , K = 24 , and C = 16 . V . C O N C L U S I O N In this paper , we described a two-stage system tasked with the location of control messages encoded with polar codes, where the first stage calculates a detection metric and selects a set of candidates to be passed to a second stage consisting of a high-complexity decoder . The key to enable complexity-performance tradeof fs is to have a first stage which progressiv ely computes and refines a metric which is then used for pre-selecting a set of candidates that should be passed on to the second stage. More steps in the first stage provide a better metric that allo ws for reliably excluding more candidates from the second stage, but they also add complexity to the first stage. In this paper we presented multiple algorithms to implement the first stage, three of them are based on belief- propagation (BP) decoding, whereas the fourth is deri ved from fast-SSC [13]. In the first three methods, each step inv olves a refinement of the channel and code word log-likelihood ratios using the BP decoding algorithm follo wed by a simple metric calculation derived from early-termination criteria. For the fourth method, the metric itself is calculated and refined in steps based on intermediate results of the decoding algorithm presented in [13]. A C K N O W L E D G E M E N T This w ork has been supported by the Swiss National Science Foundation under grant #175813. R E F E R E N C E S [1] A. V alembois, “Detection and recognition of a binary linear code, ” Discr ete Applied Mathematics , vol. 111, no. 1–2, pp. 199–218, Jul. 2001. [2] A. Balatsoukas-Stimming and A. Filos-Ratsikas, “On the computational complexity of blind detection of binary linear codes, ” Jun. 2018. [Online]. A vailable: https://arxiv .org/abs/1806.01050 [3] A. D. Y ardi, A. Kumar , and S. V ijayakumaran, “Channel-code detection by a third-party receiv er via the likelihood ratio test, ” in IEEE Int. Symp. on Inf . Theory (ISIT) , Jun. 2014, pp. 1051–1055. [4] C. Chabot, “Recognition of a code in a noisy environment, ” in IEEE Int. Symp. on Inf . Theory (ISIT) , Jun. 2007, pp. 2211–2215. [5] M. Cluzeau and M. Finiasz, “Reconstruction of punctured conv olutional codes, ” in IEEE Inf. Theory W orkshop (ITW) , Oct. 2009, pp. 75–79. [6] R. Moosavi and E. G. Larsson, “ A fast scheme for blind identification of channel codes, ” in IEEE Global T elecommun. Conf. (GLOBECOM) , Dec. 2011, pp. 1–5. [7] Y . G. Debessu, H. C. W u, and H. Jiang, “Novel blind encoder parameter estimation for turbo codes, ” IEEE Commun. Lett. , vol. 16, no. 12, pp. 1917–1920, Dec. 2012. [8] J. P . Tillich, A. Tixier , and N. Sendrier, “Reco vering the interlea ver of an unkno wn turbo-code, ” in IEEE Int. Symp. on Inf. Theory (ISIT) , Jun. 2014, pp. 2784–2788. [9] T . Xia and H. C. W u, “No vel blind identification of LDPC codes using av erage LLR of syndrome a posteriori probability , ” IEEE T rans. Signal Pr ocess. , v ol. 62, no. 3, pp. 632–640, Feb. 2014. [10] P . Y u, H. Peng, and J. Li, “On blind recognition of channel codes within a candidate set, ” IEEE Commun. Lett. , vol. 20, no. 4, pp. 736–739, Apr . 2016. [11] C. Condo, S. A. Hashemi, A. Ardakani, F . Ercan, and W . J. Gross, “Design and implementation of a polar codes blind detection scheme, ” ArXiv e-prints , Jan. 2018. [12] C. Condo, S. A. Hashemi, and W . J. Gross, “Blind detection with polar codes, ” IEEE Commun. Lett. , vol. 21, no. 12, pp. 2550–2553, Dec. 2017. [13] P . Giard, A. Balatsoukas-Stimming, and A. Burg, “Blind detection of polar codes, ” in IEEE Int. W orkshop on Signal Process. Syst. (SiPS) , Oct. 2017, pp. 1–6. [14] E. Arıkan, “Channel polarization: A method for constructing capacity- achieving codes for symmetric binary-input memoryless channels, ” IEEE T rans. Inf. Theory , vol. 55, no. 7, pp. 3051–3073, Jul. 2009. [15] G. Sarkis, P . Giard, A. V ardy , C. Thibeault, and W . J. Gross, “Fast polar decoders: Algorithm and implementation, ” IEEE J. Sel. Areas Commun. , vol. 32, no. 5, pp. 946–957, May 2014. [16] B. Y uan and K. K. Parhi, “Early stopping criteria for energy-efficient low-latenc y belief-propagation polar code decoders, ” IEEE T rans. Signal Pr ocess. , v ol. 62, no. 24, pp. 6496–6506, Dec. 2014. [17] Y . Ren, C. Zhang, X. Liu, and X. Y ou, “Efficient early termination schemes for belief-propagation decoding of polar codes, ” in IEEE Int. Conf. on ASIC (ASICON) , Nov . 2015, pp. 1–4. [18] S. M. Abbas, Y . F an, J. Chen, and C. Y . Tsui, “Lo w complexity belief propagation polar code decoder , ” in IEEE Int. W orkshop on Signal Pr ocess. Syst. (SiPS) , Oct. 2015, pp. 1–6. [19] C. Simsek and K. Turk, “Simplified early stopping criterion for belief- propagation polar code decoders, ” IEEE Commun. Lett. , vol. 20, no. 8, pp. 1515–1518, Aug. 2016. [20] Q. Zhang, A. Liu, and X. T ong, “Early stopping criterion for belief propagation polar decoder based on frozen bits, ” Electron. Lett. , vol. 53, pp. 1576–1578(2), Nov . 2017. [21] H. F . Y u, H. C. Lee, and S. K. Lee, “Early termination belief propagation decoder with parity check matrix for polar codes, ” in Wir eless and Optical Commun. Conf. (WOCC) , Apr. 2018, pp. 1–4. [22] 3 rd Generation Partnership Project (3GPP), “Physical layer procedures, ” 3GPP TS 36.213 V .8.2.0, Feb 2008.
Original Paper
Loading high-quality paper...
Comments & Academic Discussion
Loading comments...
Leave a Comment