[go: up one dir, main page]

CN115276886B - A method and device for coding identification - Google Patents

A method and device for coding identification

Info

Publication number
CN115276886B
CN115276886B CN202110474855.8A CN202110474855A CN115276886B CN 115276886 B CN115276886 B CN 115276886B CN 202110474855 A CN202110474855 A CN 202110474855A CN 115276886 B CN115276886 B CN 115276886B
Authority
CN
China
Prior art keywords
data
group
coding parameters
candidate
candidate coding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110474855.8A
Other languages
Chinese (zh)
Other versions
CN115276886A (en
Inventor
刘云
王方刚
刘钰
汤文博
王宏宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN202110474855.8A priority Critical patent/CN115276886B/en
Publication of CN115276886A publication Critical patent/CN115276886A/en
Application granted granted Critical
Publication of CN115276886B publication Critical patent/CN115276886B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0056Systems characterized by the type of code used
    • H04L1/0059Convolutional codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/0001Systems modifying transmission characteristics according to link quality, e.g. power backoff
    • H04L1/0036Systems modifying transmission characteristics according to link quality, e.g. power backoff arrangements specific to the receiver
    • H04L1/0038Blind format detection

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Quality & Reliability (AREA)
  • Error Detection And Correction (AREA)

Abstract

本申请提供一种编码识别方法及装置,其中,该方法包括:接收第一信号;根据第一信号的信令参数,确定候选编码集合,候选编码集合包括N组候选编码参数;针对N组候选编码参数中的第p组候选编码参数,根据第p组候选编码参数中的删余矩阵,对第一信号中的第一数据的删余位置进行补充,得到第二数据;根据第p组候选编码参数对第二数据进行解码,获得解码后的比特序列;根据第p组候选编码参数对比特序列进行编码,得到第三数据;根据第二数据和第三数据,确定第p组候选编码参数对应的待验证数据;根据N组候选编码参数分别对应的N个待验证数据,在N组候选编码参数中确定出第一信号的一组目标编码参数。

The present application provides a coding identification method and device, wherein the method includes: receiving a first signal; determining a candidate coding set according to a signaling parameter of the first signal, the candidate coding set including N groups of candidate coding parameters; for a p-th group of candidate coding parameters in the N groups of candidate coding parameters, supplementing the punctured positions of first data in the first signal according to a puncture matrix in the p-th group of candidate coding parameters to obtain second data; decoding the second data according to the p-th group of candidate coding parameters to obtain a decoded bit sequence; encoding the bit sequence according to the p-th group of candidate coding parameters to obtain third data; determining, according to the second data and the third data, data to be verified corresponding to the p-th group of candidate coding parameters; and determining a group of target coding parameters for the first signal from the N groups of candidate coding parameters according to the N data to be verified respectively corresponding to the N groups of candidate coding parameters.

Description

Code identification method and device
Technical Field
The present application relates to the field of communications technologies, and in particular, to a method and an apparatus for identifying codes.
Background
The advent of a large number of mobile broadband terminals and the development of the internet of things, together with the appearance of new services such as augmented reality, virtual reality and the like, enables mobile data traffic to be explosively increased. According to shannon information theory, the increase of wireless communication demands and the increase of data transmission rate make the demand of wireless spectrum resources of future mobile communication system increase continuously, resulting in shortage of wireless spectrum resources. Currently, radio spectrum resources are divided by the international telecommunications sector (international tecommunication union-radio communication sector, ITU-R) and various communication devices can only use licensed bands for communication. New wireless services require a significant investment in funds if they want to acquire available spectrum resources. The growing demand and the shortage of frequency spectrum, which are contradictory, limit the sustainable development of future mobile communication systems.
In order to solve the contradiction between the increase of the demand and the shortage of the frequency spectrum, the cognitive radio system can interact information with the surrounding environment to sense and utilize the available frequency spectrum in the space, and the idle radio spectrum can be found and utilized at any time, so that a plurality of users can access the frequency band to communicate at the same time, and the wireless communication congestion is avoided.
When a plurality of terminals are simultaneously accessed to a frequency band for communication, in order to ensure the performance of data transmission, channels can be encoded, and the error correction performance of received signals is improved. Commonly used channel coding can be generally classified into classical algebraic codes and modern codes. Classical algebraic codes, such as error correction codes (bose chaudhuri hocquenghem, BCH) \reed-solomon (RS) codes, etc. Modern codes such as Turbo codes, low-density parity-check (LDPC) codes, etc. The transmitting end encodes the data through the encoding modes and transmits the data to the receiving end, and the receiving end needs to obtain the encoding modes of the transmitting end and the related encoding parameters to decode correctly.
In view of the limitation of bandwidth resources, especially in an authenticated radio system, there may be cases where the parameters of the channel coding are dynamically changing. For example, channel State Information (CSI) is measured by adaptive modulation and coding (adaptive modulation and coding, AMC) techniques, whereby dynamic adjustments change the modulation and coding parameters. When the receiving end cannot obtain the complete coding mode and the relevant coding parameters (for example, a packet loss scene or a scene with interference), the receiving end cannot decode correctly, so that the communication performance is reduced.
Disclosure of Invention
The embodiment of the application provides a code identification method and a code identification device, which are used for realizing correct decoding and improving the receiving performance of data when a complete coding mode and relevant parameters of coding cannot be obtained.
The application provides a coding identification method, which comprises the steps of receiving a first signal, determining a candidate coding set according to signaling parameters of the first signal, wherein the candidate coding set comprises N groups of candidate coding parameters, N is a positive integer larger than 1, aiming at a p-th group of candidate coding parameters in the N groups of candidate coding parameters, sequentially taking any positive integer from 1 to N, executing, according to puncturing Yu Juzhen in the p-th group of candidate coding parameters, supplementing puncturing positions of first data in the first signal to obtain second data, according to the p-th group of candidate coding parameters, decoding the second data to obtain a decoded bit sequence, according to the p-th group of candidate coding parameters, coding the bit sequence to obtain third data, according to the first data and the third data, determining N pieces of to-be-verified data corresponding to the p-th group of candidate coding parameters, and according to the determined N pieces of to-be-verified data corresponding to the N groups of candidate coding parameters, respectively, and coding the N groups of candidate coding parameters in the N groups of candidate coding parameters to obtain a target coding parameters.
According to the method, N groups of candidate coding parameters are determined according to the signaling in the first signal, the code word soft information to be verified corresponding to each group of candidate coding parameters is determined according to the N groups of candidate coding parameters, and the identification metric suitable for the puncturing coding method is selected, namely the data to be verified corresponding to each group of candidate coding parameters are verified, so that higher inter-class discrimination is realized, a group of target coding parameters of the first signal can be better identified, the technical problem that the periodic puncturing convolutional codes cannot be identified in the prior art is solved, the identifiable range of the convolutional codes is expanded, and the coding identification performance is improved.
One possible implementation manner, the candidate coding parameters comprise at least one of a coding mode, a puncturing matrix and a coding rate.
One possible implementation manner is to determine the candidate coding set according to signaling parameters of the first signal, wherein the signaling parameters of the first signal comprise at least one of bandwidth parameters and modulation parameters.
For example, the coding rate in the candidate coding set can be determined through the signaling parameters of the first signal, so that preparation and screening are performed for the identification of the subsequent target coding parameters, and the coding identification efficiency is improved.
One possible implementation manner is to determine a block convolutional code BCC generation matrix corresponding to the p-th set of candidate coding parameters; and decoding the second data according to the BCC generation matrix corresponding to the p-th group of candidate coding parameters to obtain the decoded bit sequence.
By the method, the BCC generation matrix can be determined under the candidate coding parameters corresponding to different candidate coding modes, the first data (for example, the second data after the addition of the puncturing positions) in the first signal is decoded, the difficulty of coding identification without the puncturing period is reduced, and the decoding efficiency and success rate are improved.
A possible implementation mode includes that the coding mode included in the candidate coding parameters is a Turbo coding mode, a first sub-encoder included in a Turbo encoder corresponding to the p-th group candidate coding parameters is determined according to a puncturing matrix and a coding code rate included in the p-th group candidate coding parameters, and a BCC generating matrix corresponding to the p-th group candidate coding parameters is determined according to a recursive systematic convolutional code (RSC) generating matrix of the first sub-encoder.
By the method, when the coding mode included in the candidate coding parameters is the Turbo coding mode, the first sub-coder can be determined according to the Turbo coder, then the BCC generation matrix corresponding to the p-th group of candidate coding parameters is determined, and the blind coding recognition problem of the Turbo codes is equivalent to RSC blind coding recognition and further equivalent to simple BCC blind coding recognition, so that the problem of missing blind coding recognition methods of the periodically-deleted Turbo codes is effectively solved. Therefore, the difficulty of corresponding decoding by the Turbo encoder is reduced, and the decoding efficiency and the success rate of coding identification are improved.
A possible implementation mode includes that the coding mode included in the p-th group of candidate coding parameters is an RSC coding mode, determining an RSC generating matrix of an encoder corresponding to the RSC coding mode according to a puncturing matrix and a coding code rate included in the p-th group of candidate coding parameters, and determining a BCC generating matrix corresponding to the p-th group of candidate coding parameters according to the RSC generating matrix.
By the method, when the encoding mode included in the candidate encoding parameters is the RSC encoding mode, the BCC generating matrix can be determined according to the RSC generating matrix of the encoder corresponding to the RSC encoding mode, so that the decoding difficulty is simplified. The method and the device can effectively identify the RSC codes with the deleting period and the RSC codes without the deleting period. When the code mode is determined to be the RSC code mode, the RSC blind code identification can be equivalent to simple BCC blind code identification, the difficulty of RSC blind code identification is reduced, the identifiable range of the convolutional code is expanded, the conventional convolutional code identification of any code rate, the Turbo code blind identification of any code rate are included, and the RSC code blind identification of any code rate is wide in application range.
And determining a BCC generation matrix corresponding to the p-th group candidate coding parameter according to the puncturing matrix and the coding code rate included in the p-th group candidate coding parameter.
By the method, when the coding mode included in the candidate coding parameters is the BCC coding mode, the corresponding BCC generation matrix can be determined. Therefore, the identification of the BCC coding mode is realized, and in addition, the coding identification under different candidate coding modes is combined, so that the coding identification scheme in the application can simultaneously identify different coding modes, and the range of coding identification is enlarged.
One possible implementation manner determines to-be-verified data corresponding to the p-th set of candidate coding parameters according to codeword soft information, included in the third data, of puncturing bits corresponding to a puncturing matrix in the p-th set of candidate coding parameters and codewords of the first data.
By the method, the data to be verified can be obtained through the code word soft information obtained by encoding in the third data and the code word of the second data, and the data to be verified can be verified through the encoding identification verification method, for example, the encoding mode of the first data is verified through the syndrome of the data to be verified, so that the higher measurement of the degree of distinction between classes can be obtained, and the effective identification of different groups of candidate encoding parameters can be realized, thereby improving the identification precision under different encoding parameters.
One possible implementation manner is to respectively determine the posterior probability log-likelihood ratios of the syndromes of the N data to be verified, respectively determine the likelihood probabilities of the posterior probability log-likelihood ratios of the syndromes of the N data to be verified, and take a set of candidate coding parameters with the likelihood probabilities being the maximum value as the set of target coding parameters.
By the method, the posterior probability log-likelihood ratio of the syndrome of the data to be verified is used as the recognition measure of the candidate coding parameters of different groups, so that the recognition accuracy under different coding parameters is improved, and the method is suitable for scenes with the change of the coding parameters or the lack of the coding parameters.
In a second aspect, the present application provides a code recognition apparatus applied to a device at a receiving end, for example, a terminal device or a chip of the terminal device. The apparatus may include a receiving module and a processing module.
The receiving module is used for receiving a first signal, the processing module is used for determining a candidate coding set according to signaling parameters of the first signal, the candidate coding set comprises N groups of candidate coding parameters, N is a positive integer larger than 1, for a p-th group of candidate coding parameters in the N groups of candidate coding parameters, the p is sequentially taken to be any positive integer from 1 to N, the processing module is used for supplementing the puncturing position of first data in the first signal according to puncturing Yu Juzhen in the p-th group of candidate coding parameters to obtain second data, decoding the second data according to the p-th group of candidate coding parameters to obtain a decoded bit sequence, encoding the bit sequence according to the p-th group of candidate coding parameters to obtain third data, determining to-be-verified data corresponding to the p-th group of candidate coding parameters according to the first data and the third data, and determining N to-be-verified data corresponding to the N groups of candidate coding parameters respectively in the N groups of candidate coding parameters to obtain the first group of target coding parameters in the N groups of candidate coding parameters.
One possible implementation manner, the candidate coding parameters comprise at least one of a coding mode, a puncturing matrix and a coding rate.
The processing module is specifically configured to determine the candidate coding set according to a signaling parameter of the first signal, where the signaling parameter of the first signal includes at least one of a bandwidth parameter and a modulation parameter.
The processing module is specifically configured to determine a block convolutional code BCC generation matrix corresponding to the p-th set of candidate coding parameters, and decode the second data according to the BCC generation matrix corresponding to the p-th set of candidate coding parameters to obtain the decoded bit sequence.
One possible implementation manner is that the candidate coding parameters comprise a Turbo coding manner; the processing module is specifically configured to determine a first sub-encoder included in a Turbo encoder corresponding to the p-th set of candidate coding parameters according to a puncturing matrix and a coding code rate included in the p-th set of candidate coding parameters, and determine a BCC generation matrix corresponding to the p-th set of candidate coding parameters according to a recursive systematic convolutional code RSC generation matrix of the first sub-encoder.
The method comprises the steps of determining a coding mode of a p-th group of candidate coding parameters, determining a RSC generation matrix of an encoder corresponding to the RSC coding mode according to a puncturing matrix and a coding code rate included in the p-th group of candidate coding parameters, and determining a BCC generation matrix corresponding to the p-th group of candidate coding parameters according to the RSC generation matrix.
The processing module is specifically configured to determine a BCC generation matrix corresponding to the p-th set of candidate coding parameters according to a puncturing matrix and a coding rate included in the p-th set of candidate coding parameters.
A possible implementation manner, the processing module is specifically configured to determine, according to codeword soft information included in the third data and corresponding to puncturing bits of a puncturing matrix in the p-th set of candidate coding parameters, and a codeword of the first data, to-be-verified data corresponding to the p-th set of candidate coding parameters.
The processing module is specifically configured to determine a posterior probability log likelihood ratio of the syndromes of the N data to be verified, determine likelihood probabilities of the posterior probability log likelihood ratios of the syndromes of the N data to be verified, and use a set of candidate encoding parameters corresponding to the likelihood probabilities as the set of target encoding parameters.
In a third aspect, an embodiment of the present application provides a communication apparatus, where the communication apparatus has a function of implementing the receiving end device in the above aspects, and the communication apparatus may be a terminal device or may be a chip included in the terminal device. The communication device may also have a function of implementing the receiving-end apparatus in the above aspects, and the communication device may be a network apparatus or a chip included in the network apparatus.
The functions of the communication device may be implemented by hardware, or may be implemented by executing corresponding software by hardware, where the hardware or software includes one or more modules or units or means (means) corresponding to the functions.
In one possible design, the structure of the communication device includes a processing module and a transceiver module, where the processing module is configured to support the device to perform the corresponding functions of the terminal device in the above aspects or perform the corresponding functions of the network device in the above aspects. The transceiver module is configured to support communication between the communication apparatus and other communication devices, for example, when the communication apparatus is a terminal device, and may receive a first signal from a network device. The communication device may also include a memory module coupled to the processing module that holds the program instructions and data necessary for the communication device. As an example, the processing module may be a processor, the communication module may be a transceiver, and the storage module may be a memory, where the memory may be integrated with the processor or may be separately provided from the processor.
In another possible design, the communication device may include a processor and may also include a memory. The processor is coupled to the memory and is operable to execute the computer program instructions stored in the memory to cause the communication device to perform the methods of the above aspects. Optionally, the communication device further comprises a communication interface, and the processor is coupled to the communication interface. The communication interface may be a transceiver or an input/output interface when the communication apparatus is a terminal device or a network device, or may be an input/output interface of a chip when the communication apparatus is a chip included in a terminal device or a chip included in a network device. Alternatively, the transceiver may be a transceiver circuit and the input/output interface may be an input/output circuit.
In a fourth aspect, embodiments of the present application provide a chip system comprising a processor coupled to a memory for storing a program or instructions that, when executed by the processor, cause the chip system to implement the method of the above aspects.
Optionally, the system on a chip may further comprise an interface circuit for transmitting code instructions to the processor. The processor in the chip system can be one or more, and the processor can be realized by hardware or software. When implemented in hardware, the processor may be a logic circuit, an integrated circuit, or the like. When implemented in software, the processor may be a general purpose processor, implemented by reading software code stored in a memory. The memory in the system-on-chip may also be one or more. The memory may be integral to the processor or separate from the processor. For example, the memory may be a non-transitory processor, such as a read only memory ROM, which may be integrated on the same chip as the processor or may be separately provided on different chips.
In a fifth aspect, embodiments of the present application provide a computer readable storage medium having stored thereon a computer program or instructions which, when executed, cause a communication device to perform the method of the first aspect or any of the possible designs of the first aspect.
In a sixth aspect, embodiments of the present application provide a computer program product which, when executed by a communication device, causes the communication device to perform the method of the first aspect or any of the possible designs of the first aspect.
In a seventh aspect, an embodiment of the present application provides a communication system including a network device and at least one terminal device. One of the at least one terminal device is configured to perform the method of the above-described first aspect or any of the possible designs of the first aspect, or the network device is configured to perform the method of the above-described first aspect or any of the possible designs of the first aspect. Optionally, the communication system may further comprise a core network device.
For the description of the technical effects that can be achieved by any one of the second aspect to the seventh aspect, please refer to the description of the technical effects that can be achieved by the corresponding design in the first aspect, and the disclosure is not repeated here.
Drawings
Fig. 1a is a schematic diagram of a network architecture according to an embodiment of the present application;
fig. 1b is a schematic diagram of a network architecture according to an embodiment of the present application;
fig. 2a is a schematic diagram of an application scenario provided in an embodiment of the present application;
Fig. 2b is a schematic diagram of an application scenario provided in an embodiment of the present application;
FIG. 3a is a flowchart of a code identification method according to an embodiment of the present application;
FIG. 3b is a schematic diagram of a decoding method according to an embodiment of the present application;
fig. 3c is a schematic diagram of a turbo coding method according to an embodiment of the present application;
fig. 3d is a schematic diagram of a turbo coding method according to an embodiment of the present application;
FIG. 3e is a schematic diagram of puncturing according to an embodiment of the present application;
FIG. 3f is a schematic diagram of determining soft information corresponding to candidate codes according to an embodiment of the present application;
FIG. 4 is a flowchart of a code identification method according to an embodiment of the present application;
FIG. 5 is a flowchart of a code identification method according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a code recognition device according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of a code recognition device according to an embodiment of the present application.
Detailed Description
The following concepts related to the embodiments of the present application are first described to facilitate understanding of the technical solutions of the present application.
1. Channel coding, namely, coding the information bits to be transmitted by using coding, adding redundant bits to obtain coded bits, and correcting transmission errors by using corrected information bits. Among them, the coding types are relatively many, including Block CHECK CHARACTER (BCC), recursive systematic convolutional codes (recursive system convolutional, RSC), turbo codes, RM codes, LDPC codes, BCH codes, RS codes, (u|u+v) codes, polarization (polar) codes, etc.
2. And carrying out channel coding on the information bits to obtain at least one codeword. Illustratively, grouping information bits according to a dimension of encoding may result in at least one information code group, and encoding the information code group with encoding may result in at least one codeword. Wherein the information code groups are in one-to-one correspondence with the code words, i.e. each information code group corresponds to a code word. Specifically, each bit in the codeword is a symbol (or bit, each symbol takes a 0 or 1).
3. The code generation matrix refers to the basis of coding and characterizes the code structure of the coder. Different generation matrices can be corresponding to different coding modes. For example, for Turbo codes, a plurality of component encoders may be included, each component encoder may be an RSC encoder, each RSC encoder may correspond to one RSC generating matrix, and the data may be convolved by the RSC generating matrix of one RSC encoder to obtain a corresponding codeword.
4. The identification method of the channel code comprises the following steps:
The transmitter of the signal encodes the signal to be transmitted and the signal needs to be decoded at the receiver according to the encoded correlation parameters. In the actual decoding process, the receiver may not know a part of a priori information of the signal transmitted by the transmitter, and in order to implement processing of the received signal, the receiver needs to use a channel coding identification method to perform subsequent signal detection and the like, so as to obtain the transmitted information bit.
In decoding the signal, decoded information bits can be obtained from hard decision information and soft decision information. Wherein the hard decision information includes a value on each symbol, such as 0 or 1. The soft decision information may include a log-likelihood ratio (LLR) of a posterior probability corresponding to each symbol, or the like. Where LLR represents the posterior probability of 0 per symbol versus the posterior probability of 1 for symbol. Where the posterior probability refers to a probability that the codeword c is 0 or 1 (e.g., p (c= 0|r) or p (c= 1|r)), and the posterior probability log likelihood ratio refers to a ratio L (c|r) of the posterior probabilities (e.g., p (c= 0|r)/p (c= 1|r)).
The identification method of the channel coding is mainly divided into two types, namely linear block code identification and convolutional code identification. The present application relates generally to the identification of convolutional codes. The method type of convolutional code recognition comprises 3 types, namely conventional convolutional code recognition, punctured convolutional code recognition and punctured Turbo code recognition.
1) Identification of conventional convolutional codes
For example, conventional convolutional codes may include RSC codes, BCC codes, and the like.
The method is based on the constraint relation between a codeword sequence and a check matrix, solves a linear equation set to obtain the check matrix corresponding to the encoder, and specifically comprises a blind code identification method based on Gaussian elimination, walsh-Hadamard analysis, euclidean and the like.
In the blind coding identification method based on the Gaussian elimination method, a linear equation set corresponding to the constraint relation can be directly solved according to the constraint relation satisfied between the received codeword sequence and the check matrix, so that the check matrix corresponding to the encoder is obtained. However, the blind code recognition method based on the Gaussian elimination method is only suitable for simple conventional convolutional code recognition, and the method has the defects of multiple solutions of equation sets, poor fault tolerance and the like when solving the linear equation sets corresponding to the constraint relation.
Based on the Walsh-Hadamard analysis method, the Walsh-Hadamard transformation can be utilized to solve a linear equation set of the constraint relation, so as to further obtain a check matrix corresponding to the code. In the Euclidean-based blind identification method, the relation between the received codeword sequence and the polynomials in the generator matrix is analyzed and deduced by combining the coding and verification principle of the convolutional code, the coding identification problem is converted into the greatest common divisor problem of searching two polynomials on a finite field, and then the generator polynomial corresponding to the encoder is obtained by utilizing the traditional Euclidean algorithm. However, the Walsh-Hadamard analysis method and the euclidean-based blind code identification method are only suitable for the conventional convolutional code blind identification of 1/2 code rate, the convolutional code or the Turbo code of other code rates can not be identified, and the application range is limited.
2) Identification of punctured convolutional codes
The punctured convolutional codes may include punctured Turbo codes, punctured RSC codes, punctured BCC codes, and the like.
Because the puncturing convolutional codes with arbitrary code rate of (n-1)/n can be obtained by the source convolutional codes with 1/2 code rate through a specific puncturing matrix, the identification of the puncturing convolutional codes can be based on the equivalent transformation of a polynomial in a generating matrix, and the source convolutional code generating matrix and the puncturing matrix with 1/2 code rate can be solved, so that the coding mode can be identified. However, the method is only suitable for identifying the punctured convolutional code with the code rate of (n-1)/n, and can not be expanded to other punctured convolutional codes or punctured Turbo codes with other code rates, so that the application range is limited.
3) Puncturing convolutional code with periodicity of puncturing matrix and identification of puncturing Turbo code with periodicity of puncturing matrix
The puncturing matrix may be periodic for punctured convolutional codes and punctured Turbo codes. The periodic convolution code or Turbo code of the puncturing matrix refers to that after the mother code encoder outputs code words, the characteristics of periodicity of the puncturing matrix are utilized, and the generating matrix and the puncturing matrix of the mother code encoder are combined to determine the simplest information recovery matrix. Therefore, the information bit soft information and the codeword soft information before puncturing are recovered through the simplest information recovery matrix, and the blind code identification of periodic puncturing is completed.
4) Identification of aperiodic convolutional or Turbo codes for puncturing matrices
Taking a long term evolution (long term evolution, LTE) system as an example, an LTE transmitter first passes through a Turbo mother code encoder with a code rate of r=1/3, and redundant code words are entirely punctured during rate matching, so that code words with different rates are constructed, and therefore, the puncturing positions of code words corresponding to each component encoder after rate dematching of an LTE receiver are random and have no periodicity, namely, a puncturing matrix has no periodicity. When the period of the puncturing matrix is long or no period, the simplest information recovery matrix is difficult to solve, and the convolutional code or the Turbo code without period puncturing cannot be identified.
In view of this, the embodiment of the application provides a code identification method, which can be applied to a coding device of a receiving end. The method provided by the embodiment of the application is described below with reference to the accompanying drawings.
The technical scheme of the embodiment of the application can be applied to various groups of mobile communication systems supporting channel coding, such as a universal mobile telecommunications system (universal mobile telecommunication system, UMTS), a worldwide interoperability for microwave access (worldwide interoperability for microwave access, wiMAX) communication system, a long term evolution (long term evolution, LTE) system, an enhanced LTE (LTE-Advanced, LTE-A) system, a New Radio (NR) system, an NR-car and anything communication (vehicle-to-everything, V2X) system or other next generation communication systems, and can also be applied to a wireless local area network (wireless local area network, WLAN) supporting IR-HARQ, such as any one of the protocols of the International Institute of Electrical and Electronics Engineers (IEEE) 802.11 series currently adopted by the WLAN. For example, to the 802.11ay standard, or to the 802.11ay next generation standard, etc. The embodiment of the present application will be described by taking the communication system shown in fig. 1a as an example.
As shown in fig. 1a, the communication system may include one or more Basic Service Sets (BSS), where network nodes in the basic service sets include an Access Point (AP) and a Station (STA), and the transmitting end and the receiving end of the embodiments of the present application may be the AP or the STA in the communication system, or may be a chip located in the AP or the STA. The scheme of the embodiment of the application can be applied to communication between the AP and the STA, can also be applied to communication between the AP and the STA, can be one-to-one communication and can also be one-to-many and many-to-many communication. For example, communication between one AP and one STA (for example, as shown in the left part of fig. 1 a) may be performed, in which the AP communicates with multiple STAs (as shown in the right part of fig. 1 a), communication between multiple APs and multiple STAs may be performed, or simultaneous communication between multiple STAs and the AP may be performed.
The encoding method provided by the embodiment of the application can be applied to various groups of communication scenes, such as one or more of enhanced mobile broadband (enhanced mobile broadband, eMBB), ultra-reliable low-latency communication (ultra reliable low latency communication, URLLC), machine type communication (MACHINE TYPE communication, MTC), large-scale machine type communication (MASSIVE MACHINE TYPE communication, mMTC), device-to-device (D2D), vehicle-to-vehicle (vehicle to everything, V2X), vehicle-to-vehicle (vehicle to vehicle, V2V), internet of things (internet of things, ioT) and the like. The coding method provided by the embodiment of the application can be suitable for services which need low-time delay and high-reliability transmission, such as unmanned, industrial automation, traffic safety and control, remote service and the like.
The network elements or devices involved in the communication system shown in fig. 1a are described below.
The AP may be a device with a wireless transceiver function, such as a directional multi-gigabit (directional multi-gigabit, DMG) AP, an enhanced directional multi-gigabit (enhanced directional multi-gigabit, EDMG) AP, or an AP supporting 60GHz, but the embodiment of the present application is not limited thereto. The AP may also be referred to as a base station.
The STA may be a device having a wireless transceiving function, for example, a wireless device supporting 60GHz communication. The STA may also be referred to as a subscriber unit, access terminal, mobile station, remote terminal, mobile device, user terminal, wireless communication device, user agent, user equipment, or User Equipment (UE). Specifically, the mobile terminal may be a terminal device (terminal equipment) or a User Equipment (UE) or a Mobile Station (MS) or a Mobile Terminal (MT), etc. Specifically, the terminal may be a mobile phone (mobile phone), a tablet computer, or a computer with a wireless transceiver function, and may also be a Virtual Reality (VR) terminal, an augmented reality (augmented reality, AR) terminal, a wireless terminal in industrial control, a wireless terminal in unmanned driving, a wireless terminal in telemedicine, a wireless terminal in a smart grid, a wireless terminal in a smart city (SMART CITY), a smart home, a vehicle-mounted terminal, and the like.
In the embodiment of the present application, the receiving end and the transmitting end are relative concepts, and the receiving end may refer to a device for receiving and decoding a message sent by the transmitting end by using the code identification method in the present application.
For example, the transmitting end may be the AP101 in the left diagram of fig. 1a, and the receiving end may be the STA102 in the left diagram of fig. 1 a.
Further, FIG. 1a is an exemplary framework diagram, the number of nodes included in FIG. 1a is not limited, and the communication system may include other nodes, such as gateway devices, application servers, etc., in addition to the functional nodes shown in FIG. 1a, without limitation. The sending end and the receiving end of the embodiment of the application can be network nodes in the communication system, and can also be chips in the network nodes in the WALN communication system.
Referring to fig. 1b, another communication system according to an embodiment of the present application is shown. Fig. 1b includes a network device and a terminal device.
Among other things, a network device, including for example AN Access Network (AN) device, such as a base station (e.g., AN access point), may refer to a device in the access network that communicates with a wireless terminal device over one or more cells over AN air interface, or a network device in a vehicle-to-everything (V2X) technology is, for example, a Road Side Unit (RSU). The base station may be configured to encode information bits and transmit the encoded information to the terminal device. Correspondingly, the terminal equipment receives the information sent by the base station and decodes the information. The terminal device may in turn be configured to encode information bits and transmit the encoded information to the base station. Correspondingly, the base station receives the information sent by the terminal equipment and decodes the information. The RSU may be a fixed infrastructure entity supporting V2X applications, which may exchange messages with other entities supporting V2X applications. The network device may also coordinate attribute management for the air interface. For example, the network device may include an evolved base station (NodeB or eNB or e-NodeB, evolutional Node B) in an LTE system or long term evolution advanced (long term evolution-a), or may also include a next generation NodeB (next generation node B, gNB) in a fifth generation mobile communication technology (the 5th generation,5G) NR system (also simply referred to as an NR system), or may also include a centralized unit (centralized unit, CU) and a Distributed Unit (DU) in a Cloud access network (Cloud radio access network, cloud RAN) system, and embodiments of the present application are not limited.
The network devices may also include core network devices including, for example, access and mobility management functions (ACCESS AND mobility management function, AMF) or user plane functions (user plane function, UPF) and the like. The embodiment of the application mainly relates to an access network, so that the network devices refer to access network devices unless otherwise specified hereinafter.
Terminal devices, including devices that provide voice and/or data connectivity to a user, specifically, devices that provide voice to a user, or devices that provide data connectivity to a user, or devices that provide voice and data connectivity to a user. For example, may include a handheld device having wireless connectivity, or a processing device connected to a wireless modem. The terminal device may communicate with the core network via a radio access network (radio access network, RAN), exchange voice or data with the RAN, or interact voice and data with the RAN. The terminal device may include a User Equipment (UE), a wireless terminal device, a mobile terminal device, a device-to-device (D2D) terminal device, a vehicle-to-device (V2X) terminal device, a machine-to-machine/machine-type communication (M2M/MTC) terminal device, an internet of things (internet of things, ioT) terminal device, a subscription unit (subscriber unit), a subscription station (subscriber station), a mobile station (mobile station), a remote station, an Access Point (AP), a remote terminal (remote terminal), an access terminal (ACCESS TERMINAL), a user terminal (user terminal), a user agent (user agent), or a user equipment (user device), etc. For example, mobile telephones (or "cellular" telephones) computers with mobile terminal devices, portable, pocket, hand-held, computer-built mobile devices, and the like may be included. Such as personal communication services (personal communication service, PCS) phones, cordless phones, session initiation protocol (session initiation protocol, SIP) phones, wireless local loop (wireless local loop, WLL) stations, personal Digital Assistants (PDAs), and the like. But also limited devices such as devices with lower power consumption, or devices with limited memory capabilities, or devices with limited computing capabilities, etc. Examples include bar codes, radio frequency identification (radio frequency identification, RFID), sensors, global positioning systems (global positioning system, GPS), laser scanners, and other information sensing devices.
By way of example, and not limitation, in embodiments of the present application, the terminal device may also be a wearable device. The wearable device can also be called as a wearable intelligent device or an intelligent wearable device, and is a generic name for intelligently designing daily wear and developing wearable devices, such as glasses, gloves, watches, clothes, shoes, and the like, by applying wearable technology. The wearable device is a portable device that is worn directly on the body or integrated into the clothing or accessories of the user. The wearable device is not only a hardware device, but also can realize a powerful function through software support, data interaction and cloud interaction. The generalized wearable intelligent device comprises full functions, large size and complete or partial functions which can be realized independently of a smart phone, such as a smart watch, a smart glasses and the like, and is only focused on certain application functions, and needs to be matched with other devices such as the smart phone for use, such as various smart bracelets, smart helmets, smart jewelry and the like for physical sign monitoring.
While the groups of terminal devices described above, if located on a vehicle (e.g., placed in a vehicle or mounted in a vehicle), may be considered as in-vehicle terminal devices, for example, also referred to as in-vehicle units (OBUs).
In the embodiment of the application, the terminal equipment can also comprise a relay. Or it is understood that all that is capable of data communication with a base station can be seen as a terminal device.
In the embodiment of the present application, the device for implementing the function of the terminal device may be the terminal device, or may be a device capable of supporting the terminal device to implement the function, for example, a chip system, and the device may be installed in the terminal device. In the embodiment of the application, the chip system can be composed of chips, and can also comprise chips and other discrete devices. In the technical solution provided in the embodiment of the present application, the device for implementing the function of the terminal is a terminal device, which is described in the technical solution provided in the embodiment of the present application.
The network device operates, for example, in LTE, LTE-a, NR or other communication systems.
The network device in fig. 1b is for example a base station. The network device may correspond to different devices in different systems, for example, eNB in a 4G system, and access network device in 5G in a 5G system, for example, gNB. Of course, the technical solution provided by the embodiment of the present application may also be applied to a future mobile communication system, so that the network device in fig. 1b may also correspond to a network device in a future mobile communication system. In fig. 1b, the network device is a base station, and in fact, referring to the foregoing description, the network device may also be an RSU or the like. In addition, the terminal device in fig. 1b is taken as an example of a mobile phone, and as can be seen from the foregoing description of the terminal device, the terminal device in the embodiment of the present application is not limited to the mobile phone.
For example, the application is applicable to blind code identification in collaborative communication scenarios. As shown in fig. 2a, in the communication scenario, for example, in the present wireless communication scenario, in order to fully utilize spectrum resources and improve spectrum efficiency, an adaptive modulation and coding (Adaptive Modulation and Coding, AMC) technology is adopted to measure channel state Information (CHANNEL STATE Information, CSI), so as to dynamically adjust and change modulation and coding parameters and the like. Due to the time-variability of CSI, terminal devices (e.g., handsets, customer premise equipment (Customer Premise Equipment, CPE), etc.) need to frequently send channel quality indication (Channel Quality Indication, CQI) signaling to network devices (e.g., LTE base stations). Because the signaling interaction between the terminal equipment and the network equipment is too frequent, the problems of signaling loss, signal interference, interruption and the like easily occur in the transmission process, so that related control signaling between the terminal equipment and the network equipment cannot be accurately transmitted, communication cannot be established, and the communication performance of the terminal equipment is affected.
In addition, for another example, the application can also be applied to blind code recognition in a non-cooperative communication scenario, where a third party terminal device (such as a terminal device accessing a network in an access manner such as wireless local area network (WIRELESS FIDELITY, wi-Fi) or bluetooth) blindly recognizes a scenario of an LTE signal, and the communication scenario is shown in fig. 2 b.
In particular, in a non-cooperative communication scenario, a third-party terminal device actively or passively intercepts a communication signal of a communication system (such as an LTE user terminal and an LTE base station), and in order to obtain transmission information of the communication signal, the third-party terminal device must decode the signal. Because the third party and the communication system are different systems, and belong to non-cooperative communication, the third party cannot accurately obtain the coding parameter signaling interacted by the communication system, so that decoding cannot be accurately performed.
The following describes a code recognition method provided by the embodiment of the present application with reference to the communication systems shown in fig. 1 a-1 b and the application scenarios shown in fig. 2 a-2 b. Wherein the terms and the like may refer to actions involved between the embodiments of the present application. The message names of interactions between the devices or parameter names in the messages in the embodiments of the present application are just an example, and other names may be used in specific implementations without limitation.
Fig. 3a is a flowchart of a coding identification method according to an embodiment of the present application, where the method may be performed by a decoding device at a receiving end, where the decoding device may be an AP or an STA located in fig. 1a, or located in a network device or a terminal device in fig. 1 b. As shown in fig. 3a, the method may include:
S301, receiving a first signal.
Wherein upon receiving the first signal, a parameter of the signaling of the first signal may be obtained.
One possible implementation manner may perform blind detection on a field corresponding to the first signal, to obtain first data of the first signal.
The signaling in the first data may include bandwidth signaling, synchronization signaling, modulation signaling, etc., as shown in fig. 3 b.
One possible implementation manner uses key signaling such as bandwidth signaling, synchronization signaling, etc. in the data segment to preprocess the data segment of the received signal. The preprocessing of the data segment by the receiver may include determining a bandwidth parameter of the first signal according to the bandwidth signaling, synchronizing the received first signal according to the synchronization signaling, demodulating the first data in the first signal according to the modulation signaling, and so on.
S302, determining a candidate coding set of the first signal according to the signaling parameters of the first signal.
Wherein N sets of candidate coding parameters may be included in the candidate coding set. The set of candidate coding parameters may include, but is not limited to, at least one of candidate coding modes, candidate puncturing matrices, candidate coding rates.
Wherein the N sets of candidate coding parameters may be determined according to a communication system to which the first signal corresponds.
In some embodiments, the candidate coding mode may be determined according to a communication system corresponding to the first signal. For example, when it is determined that the communication system corresponding to the first signal is an LTE communication system, it may be determined that the coding scheme of the first signal is a Turbo coding scheme without periodic puncturing. When the communication system corresponding to the first signal is determined to be a Wi-Fi communication system, the coding mode of the first signal can be determined to be a punctured BCC coding mode.
In one possible implementation, the candidate puncturing matrix may be determined according to a communication system to which the first signal corresponds.
For example, when the communication system corresponding to the first signal is determined to be an LTE communication system, a possible puncturing matrix in the punctured Turbo coding mode may be determined as a candidate puncturing matrix according to the standard of the LTE communication system. When the communication system corresponding to the first signal is determined to be a Wi-Fi communication system, a possible puncturing matrix in the punctured BCC coding mode can be determined as a candidate puncturing matrix according to the standard of the LTE communication system.
After determining the coding mode, the candidate coding rate may be determined according to the signaling of the first signal.
One possible implementation manner, the receiving end may determine the candidate coding rate according to the bandwidth signaling and the modulation signaling in the first signal.
For example, when the bandwidth signaling included in the data segment of the LTE uplink signal received at the receiver is 5MHz and the modulation signaling is 16-QAM, it may be determined that the candidate coding rate corresponding to the LTE uplink signal includes {2/3,3/4}, according to the standard of the LTE communication system.
For the p-th group of candidate coding parameters in the N groups of candidate coding parameters, p is sequentially taken to be any positive integer from 1 to N, and the following S303-S305 are executed:
S303, supplementing the puncturing position of the first data according to puncturing Yu Juzhen in the p-th group of candidate coding parameters in the candidate coding set, and determining the second data.
For example, as shown in fig. 3e, the puncturing matrix may be 3 symbols for one period, and delete the 1 st symbol. Through the puncturing matrix, the codeword before puncturing can be punctured in the encoding process, so as to obtain a punctured codeword, i.e. a codeword corresponding to data (for example, first data in the first signal) sent by the sending end to the receiving end.
Accordingly, in the decoding process, the receiving end may supplement the puncturing position of the received first data according to the puncturing matrix in the p-th set of candidate coding parameters, for example, may supplement 0, so that, according to the first data (i.e., the second data) after the puncturing bit is supplemented, the decoding is performed by the coding mode in the p-th set of candidate coding parameters, that is, S304 is performed, so as to obtain the decoded bit sequence of the first data.
S304, decoding the second data according to the p-th group candidate coding parameters in the candidate coding set, and determining the decoded bit sequence.
S303 and S304 may also be understood as decoding the first data according to the p-th set of candidate coding parameters in the candidate coding set, and determining a decoded bit sequence, that is, determining bit information corresponding to the first data under the p-th set of candidate coding parameters.
For example, the bit information corresponding to the first data of the first signal under the p-th set of candidate coding parameters may be codeword soft information corresponding to the first data of the first signal under the p-th set of candidate coding parameters determined according to the p-th set of candidate coding parameters. And decoding the codeword soft information corresponding to the first data of the first signal to determine the information bit soft information of the first data. For another example, the bit information corresponding to the first data of the first signal under the p-th group of candidate coding parameters may also be hard information of the information bit corresponding to the first data of the first signal under the p-th group of candidate coding parameters, which is not limited herein.
In some embodiments, taking the first data in the first signal as an example, the receiving end may identify the first data in the first signal according to the p-th group of candidate coding parameters in the candidate coding set, determine codeword soft information corresponding to the first data under the i-th group of coding candidates, and further determine information bit soft information possibly corresponding to the first data.
S3041, determining a BCC generation matrix corresponding to the p-th group candidate coding parameters according to the p-th group candidate coding parameters.
In example 1, when the coding candidate mode is a Turbo coding mode, a parent code encoder for Turbo coding and a child encoder included in the parent code encoder may be determined according to the p-th group of candidate coding parameters.
For example, the p-th group candidate coding parameters are a Turbo coding mode without periodic puncturing, puncturing Yu Juzhen is a puncturing matrix with a pre-puncturing code rate of 1/3 to a post-puncturing code rate of 1/2, and the coding code rate is 1/2. At this time, the Turbo mother code encoder may include a first sub-encoder and a second sub-encoder. Wherein the first sub-encoder may be a sub-encoder of component RSC1 and the second sub-encoder may be a sub-encoder of component RSC 2.
It should be noted that, the sub-encoder of the component RSC1 and the sub-encoder of the component RSC2 may be the same encoder, or may be different encoders, and may be set according to the needs of the communication system. The receiving end may select the sub-encoder of the component RSC1 to determine the codeword soft information of the first data in the first signal and correspondingly decode, or may select the sub-encoder of the component RSC2 to determine the codeword soft information of the first data in the first signal and correspondingly decode, which is not limited herein.
The following description will take, as an example, a sub-encoder selecting the component RSC1 to determine codeword soft information of first data in the first signal and decode correspondingly. As shown in fig. 3c, the coding block diagram of the Turbo mother code encoder of the LTE uplink signal is shown, where the information bits are first coded by the Turbo mother code encoder with a code rate R of 1/3, that is, the information bits of the fourth data are first coded by the component encoder RSC 1. After interleaving, the information bits of the fourth data are encoded by the component encoder RSC 2.
Taking component encoder RSC1 as an example, the RSC generation matrix corresponding to component encoder RSC1 satisfies:
Wherein, the
g0(D)=1+D2+D3 (2)
g1(D)=1+D +D3 (3)
As shown in fig. 3d, after the information bits are encoded by the Turbo mother code encoder, rate matching is performed by the puncturing matrix, and the whole segment of the redundant code element is punctured, so that a code word with a 1/2 code rate is generated. Taking fourth data as data of the first data before encoding (i.e. information bits of the first data) as an example, the fourth data is 500 bits, after the fourth data passes through the RSC1 encoder, a codeword with 1500 bits can be obtained, and then 1000 bits of the first data can be obtained through the puncturing matrix. Therefore, for the candidate puncturing Yu Juzhen and the candidate coding rate, a mother code encoder of the Turbo coding and a child encoder included in the mother code encoder can be determined.
The first data in the encoded first signal is the data after RSC encoding and puncturing, and still is difficult to identify.
In the application, in order to simplify the decoding of the RSC generation matrix, the RSC generation matrix in the Turbo mother code encoder can be equivalent to the BCC generation matrix. Thus, the blind identification problem of the component encoder RSC is converted into a corresponding blind identification problem of the BCC encoder.
For example, taking the generator matrix of the component encoder RSC1 as an example, a BCC generator matrix equivalent to the component encoder RSC1 may be determined. The BCC generation matrix equivalent to the component encoder RSC1 satisfies:
G(D)=[g0(D),g1(D)]
=[1+D2+D3,1+D +D3] (4)
Thus, according to the p-th set of candidate encoding parameters, the second data may be decoded to obtain soft information for each information bit of the second data.
In example 2, when the encoding candidate is RSC encoding, the RSC encoder may be determined according to the p-th group of candidate encoding parameters. Thus, from the RSC encoder, an equivalent BCC generation matrix is determined.
For example, according to the p-th group of candidate coding parameters, determining that the coding rate is 1/3 in the RSC encoder, and the generating matrix of the RSC encoder satisfies the above formula (1), the equivalent BCC generating matrix of the RSC encoder satisfies the above formula (4).
Example 3, when the coding candidate is a BCC coding, the BCC encoder may be determined based on the p-th set of candidate coding parameters. I.e. the BCC generation matrix can be determined from the p-th set of candidate coding parameters.
S3042, decoding codeword soft information corresponding to the first data according to the BCC generation matrix corresponding to the p-th group candidate coding parameters to obtain a decoded bit sequence, namely information bit soft information of the first data.
In combination with example 1, codeword soft information for first data in a first signal may be determined based on a candidate coding scheme, a candidate puncturing matrix, and a candidate coding rate.
Continuing with the above example, considering that the BCC generation matrix corresponding to the candidate coding scheme is determined according to the first sub-encoder (component encoder RSC 1), codeword soft information of the first data corresponding component encoder RSC1 may be extracted based on the component encoder RSC1 and the puncturing matrix. Take 1000 bits as an example of the first data. And determining 1500 bits of the first data before puncturing through the candidate puncturing matrix, namely inserting corresponding bits at puncturing positions according to puncturing Yu Juzhen, for example, the bits at the puncturing positions are 0, so as to obtain second data. Therefore, by means of the coding principle of the component encoder RSC1, the second data is analyzed by combining the puncturing positions in 1500 bits of the first data before puncturing and the first data (namely the second data), so as to obtain codeword soft information corresponding to the first data before puncturing. I.e. codeword soft information for each bit over 1500 bits.
Furthermore, the receiving end can decode the codeword soft information of the first data according to the BCC generation matrix corresponding to the p-th group of candidate coding parameters to obtain the decoded information bit soft information of the first data.
The information bit soft information of the first data may be determined by a soft output viterbi decoding (soft-output viterbi decoding, SOVA) algorithm, or may be determined by other soft output decoding algorithms, for example, a BCJR algorithm, a log-MAP algorithm, or the like, which is not limited herein.
Taking the fourth data as 500 bits, the first data includes 1000 bits of data as an example, by decoding the codeword soft information of the first data and the BCC generation matrix, each information bit soft information on the information bits of the first data (i.e., soft information of each information bit on 500 information bits of the fourth data) can be obtained.
In connection with example 2, codeword soft information for the first data may be extracted based on the BCC generator matrix and the puncturing matrix equivalent to the RSC encoder. Namely, determining puncturing positions in 1500 bits of the first data before puncturing according to the puncturing matrix, and then obtaining codeword soft information on each bit corresponding to the first data before puncturing by combining the puncturing positions in 1500 bits of the first data before puncturing and the first data according to the BCC generating matrix equivalent to the RSC encoder.
In connection with example 3, codeword soft information for the first data may be extracted based on the BCC encoder and the puncturing matrix. Namely, determining puncturing positions in 1500 bits of the first data before puncturing according to the puncturing matrix, and then combining the puncturing positions in 1500 bits of the first data before puncturing with the first data according to the BCC encoder to obtain codeword soft information on each bit corresponding to the first data before puncturing.
And S305, encoding the bit sequence according to the p-th group candidate encoding parameters, and determining third data.
For example, the information bit soft information of the first data may be encoded according to the p-th set of candidate encoding parameters to determine the third data. The third data is codeword soft information obtained by encoding the information bit soft information of the first data.
In one possible implementation manner, according to the BCC generation matrix corresponding to the p-th set of candidate coding parameters, the BCC coding is performed on the information bit soft information of the first data to obtain third data.
In connection with example 1, taking the information bits of the first data as 500 bits, the codeword of the first data includes a codeword of 1500 bits as an example. The receiving end can encode the information bit soft information of the first data according to the BCC generating matrix equivalent to the component encoder RSC1 corresponding to the p-th group of candidate encoding parameters by a soft-input soft-output (SISO) encoding method to generate codeword soft information (1500-bit codeword soft information) of the third data.
In connection with example 2, taking the information bits of the first data as 500 bits, the codeword of the first data includes a codeword of 1500 bits as an example. The receiving end can generate codeword soft information (codeword soft information of 1500 bits) of the third data according to the information bit soft information of the first data and the equivalent BCC generation matrix of the RSC encoder corresponding to the p-th set of candidate coding parameters.
In connection with example 3, taking the information bits of the first data as 500 bits, the codeword of the first data includes a codeword of 1500 bits as an example. The receiving end may encode the information bit soft information of the first data according to the BCC generation matrix corresponding to the p-th set of candidate encoding parameters, to generate codeword soft information (codeword soft information of 1500 bits) of the third data.
S306, determining the data to be verified corresponding to the p-th group of candidate coding parameters according to the third data and the first data.
For example, the data to be verified may be soft information of the codeword to be verified corresponding to the p-th set of candidate coding parameters determined according to the third data and the first data.
In order to better verify the candidate codes, in the application, the receiving end can also determine soft information corresponding to the p-th group candidate coding parameters of the first data according to the third data and the first data. For example, the soft information corresponding to the p-th candidate coding parameter may be codeword soft information to be verified corresponding to the p-th candidate coding parameter of the first data, where the codeword soft information to be verified may be used to verify codeword soft information obtained by candidate coding.
The code word soft information corresponding to the p-th group candidate coding parameter of the first data can be determined according to the code word soft information corresponding to the puncturing bit of the puncturing matrix in the third data and the code word of the first data.
For example, the puncturing matrix of the first data is, as shown in fig. 3f, 4 symbols for 1 period, with the 1 st symbol in each period as the puncturing position. Therefore, the codeword soft information of the puncturing bit corresponding to the puncturing matrix in the third data (codeword soft information of the 1 st bit in each period of 4 code elements and 1 period) can be used as the codeword soft information of the complementary puncturing position of the second data, and the data to be verified (i.e. codeword soft information to be verified) corresponding to the p-th group candidate coding parameter of the first data can be obtained.
S307, determining a group of target coding parameters of the first signal according to N data to be verified corresponding to the N groups of candidate coding parameters.
One possible implementation manner is to determine the posterior probability log-likelihood ratios of the syndromes of the N data to be verified respectively, for example, the receiving end may determine the posterior probability log-likelihood ratios of the syndromes of the N codeword soft information to be verified corresponding to the N sets of candidate coding parameters of the first data according to the N codeword soft information to be verified corresponding to the N sets of candidate coding parameters.
Therefore, the likelihood probability of the posterior probability log likelihood ratio of the syndromes of the N data to be verified can be respectively determined, and a group of candidate coding parameters corresponding to the maximum likelihood probability is taken as the group of target coding parameters. For example, by a maximum likelihood method, a maximum likelihood probability value in a posterior probability log likelihood ratio of the syndromes of the N codeword soft information to be verified corresponding to the N sets of candidate coding parameters is determined, and the candidate coding parameters corresponding to the maximum likelihood probability are decided as a set of target coding parameters of the first signal.
For example, the p-th set of candidate encoding parameters is θp εΘ, and the size of the BCC generator matrix is (n 0-q)×n0,n0 represents the number of bits of the codeword after encoding the fourth data, n 0 -q represents the number of information bits corresponding to the fourth data. In combination with the above example, n 0 is 1500 bits, and n 0 -q is 500 bits.
Under the condition that the p-th group candidate coding parameter is θp , the codeword obtained by coding the information bits before coding (fourth data) through the BCC generation matrix can be expressed as:
in GF (2) domain, the parity check matrix corresponding to the BCC generator matrix satisfies
In a non-zero vectorRepresenting the index of the non-zero entry in the i-th row of the parity check matrix H, the index of the non-zero entry in the i-th row of the parity check matrix H satisfies:
πi=[πi(1),πi(2),…,πi(Ni)]T
Wherein N i represents the number of non-zero elements of the ith row in the parity check matrix H, wherein 0 is less than or equal to pi i(1)<πi(2)<…<πi(Ni)≤n0 -1.
The i-th row in the parity check matrix H includes 4 non-zero elements, i.e., N i =4. And the non-zero elements are located in columns 1,4, 5 and 8. Then pi i (1) is 1, pi i (2) is 4, pi i (3) is 4, and pi i (4) is 8. I.e. the index pi i=[1,4,5,8]T of the non-zero entry in row i.
For the p-th group candidate coding parameter θp , the parity check relation of the coded codeword satisfies when the p-th group candidate coding parameter is consistent with the target coding parameter θ of the transmitting end:
Hcθp′=0,if and only ifθ=θp′
the parity relation of the encoded codeword for the i-th row, i.e. the i-th syndrome, satisfies:
wherein 1≤i≤n 0 -q, and wherein a represents the sum in the GF (2) domain.
In combination with the above example, it is possible to obtain that the i-th parity relation (i-th syndrome) satisfies:
c1⊕c4⊕c5⊕c8=0
For the parity check matrix H of (n 0 -q) rows, (n 0 -q) parity check relations (syndromes) can be obtained.
Therefore, the ith syndrome can be determined according to the parity check relation of the code word after the coding of the ith row, and the posterior probability log likelihood ratio of the ith syndrome of the code word soft information to be verified corresponding to the p-th group candidate coding parameter of the first data is determined according to the ith syndrome.
That is, according to the ith syndrome, determining the codeword soft information of pi i (j) bits corresponding to the p-th candidate coding parameter of the first dataWherein j is more than or equal to 1 and N i.
In combination with the above example, the index pi i=[1,4,5,8]T,Ni =4 of the non-zero entry in the i-th row. The code word soft information on pi i (j) bits included in the syndrome of the ith code word soft information to be verified corresponding to the p-th group candidate coding parameter of the first data can be determined to be the 1 st code word bit soft information of the code word soft information to be verified corresponding to the p-th group candidate coding parameter of the first data, the 4 th code word bit soft information of the code word soft information to be verified corresponding to the p-th group candidate coding parameter of the first data, the 5 th code word bit soft information of the code word soft information to be verified corresponding to the p-th group candidate coding parameter of the first data, and the 8 th code word bit soft information of the code word soft information to be verified corresponding to the p-th group candidate coding parameter of the first data.
Thus, the codeword soft information on pi i (j) bits corresponding to the ith syndrome of the codeword soft information to be verified corresponding to the p-th set of candidate encoding parameters of the first dataAnd determining the posterior probability log-likelihood ratio of the ith syndrome of the codeword soft information to be verified, which corresponds to the p-th group of candidate coding parameters of the first data.
For the p-th candidate coding parameter θp , the posterior probability log-likelihood ratio of the ith syndrome of the codeword soft information to be verified corresponding to the p-th candidate coding parameter of the first dataThe method meets the following conditions:
Wherein, the And the code word soft information to be verified corresponding to the p-th candidate coding parameters of the first data of the i-th row pi i (j) is represented.
And determining the posterior probability log-likelihood ratio of the syndrome of the codeword to be verified corresponding to the p-th group candidate coding parameter of the first data according to the posterior probability log-likelihood ratio of the (n 0 -q) syndromes of the codeword to be verified corresponding to the p-th group candidate coding parameter of the first data.
In one possible implementation manner, the posterior probability log likelihood ratio of the syndrome of the codeword to be verified corresponding to the p-th set of candidate coding parameters of the first data may be determined after averaging according to the posterior probability log likelihood ratio of the (n 0 -q) syndromes of the codeword to be verified corresponding to the p-th set of candidate coding parameters of the first data.
For example, the posterior probability log likelihood ratio of the syndrome of the codeword soft information to be verified corresponding to the p-th set of candidate coding parameters of the first data satisfies:
Wherein, the M is more than or equal to 0 and less than or equal to (n) 0 -q). M is a positive integer. For cases where n0-q gammas are negative numbers and there is no positive number, the largest gamma can be directly selected as the posterior probability log likelihood ratio for the syndrome.
Optionally, the posterior probability log likelihood ratio of the syndrome of the codeword soft information to be verified corresponding to the p-th group candidate coding parameter of the first data comprisesThe posterior probability log likelihood ratio of the M syndromes being the positive number. Thus, interference of the posterior probability log likelihood ratio of the non-positive number syndrome can be avoided.
After determining the posterior probability log-likelihood ratio of the syndrome of the codeword soft information to be verified corresponding to the p-th set of candidate coding parameters of the first data, the coding parameters of the first signal may be determined according to the posterior probability log-likelihood ratio of the syndrome of the codeword soft information to be verified corresponding to the p-th set of candidate coding parameters of the first data.
One possible implementation manner uses soft information of syndrome posterior probability of codeword soft information to be verified corresponding to a p-th set of candidate coding parameters of the first data as an identification metric, and uses a maximum likelihood method, so that the p-th set of candidate coding parameters corresponding to the maximum identification metric is used as a set of target coding parameters of the identified first signal.
For example, according to the syndrome posterior probability log likelihood ratios of the N codeword soft information to be verified corresponding to the N sets of candidate coding parameters, when the posterior probability log likelihood ratios of the syndromes of the codeword soft information to be verified corresponding to the set of candidate coding parameters are maximum, the candidate coding parameters corresponding to the codeword soft information to be verified corresponding to the set of candidate coding parameters are used as a set of target coding parameters of the first signal. Specifically, the posterior probability log-likelihood ratio of the syndrome of the codeword soft information to be verified corresponding to a set of target coding parameters of the first signal and the posterior probability log-likelihood ratio of the syndrome of the codeword soft information to be verified corresponding to other sets of candidate coding parameters in the candidate coding set satisfy:
The posterior probability log likelihood ratio of the syndromes of the N code word soft information to be verified corresponding to the N groups of candidate coding parameters of the first data is used as the recognition measure, the recognition measure has higher degree of distinction between classes, and a group of target coding parameters of the first signal can be recognized more accurately.
Of course, the application can also identify and measure the N code word soft information to be verified corresponding to the N groups of candidate coding parameters of the first data in other modes, thereby determining a group of target coding parameters of the first signal.
And S308, decoding the first signal according to a set of target coding parameters of the first signal to obtain a bit sequence of the first signal.
For example, when it is determined that the coding scheme in the other set of target coding parameters is a periodically-puncturing-free Turbo coding scheme, a Turbo encoder may be determined according to the identified puncturing matrix and the coding rate, so as to decode the first signal according to the Turbo encoder.
For another example, when the encoding mode in the other encoding parameters is determined to be the punctured RSC encoding mode, the RSC encoder may be determined according to the identified puncturing matrix and the encoding code rate, so as to decode the first signal according to the RSC encoder.
For another example, when the coding scheme in the other coding parameters is determined to be the punctured BCC coding scheme, a BCC encoder may be determined according to the identified puncturing matrix and coding rate, so as to decode the first signal according to the BCC encoder.
According to the method, N groups of candidate coding parameters are determined according to the signaling in the first signal, the codeword soft information to be verified corresponding to each group of candidate coding parameters is determined according to the N groups of candidate coding parameters, the identification metric suitable for the puncturing coding method is selected, namely the posterior probability log likelihood ratio of the syndrome of the codeword soft information to be verified corresponding to each group of candidate coding parameters, and one group of target coding parameters of the first signal can be better identified through higher inter-class discrimination, so that the technical problem that the periodic puncturing convolutional codes cannot be identified in the prior art is solved, the identifiable range of the convolutional codes is expanded, and the coding identification performance is improved.
Example one
In the following, a specific example is taken to illustrate a code identification method in the present application, and fig. 4 is a flowchart of a code identification method provided in an embodiment of the present application, where the method may be performed by a decoding device of a receiving end, where the decoding device may be an AP or an STA located in fig. 1a, or a network device or a terminal device located in fig. 1 b. As shown in fig. 4, the method may include:
s401, the receiving end receives the first signal.
The receiving end may obtain the parameter of the signaling of the first signal according to the first signal.
And S402, the receiving end determines whether to carry out coding identification according to the signaling parameters in the first data. If yes, S403 is executed, and if no, S4010 is executed.
The receiving end can determine whether to perform coding identification according to whether the first signal includes information of coding parameters. In some embodiments, the information of the coding parameters may include information of coding parameters such as coding mode, puncturing matrix, coding rate, etc.
For example, the first data does not include information of the encoding parameter, it may be determined that encoding identification is required, that is, S403 is performed. The first data includes information of the encoding parameter, it may be determined that the first signal does not need to be encoded for identification, that is, S4010 is performed.
For the p-th group of candidate coding parameters in the N groups of candidate coding parameters, p is sequentially taken to be any positive integer from 1 to N, and the following S403-S408 are executed:
s403, the receiving end determines a candidate coding set according to the signaling parameter of the first signal.
The receiving end determines a candidate code set of the first signal in combination with parameters of signaling of the first signal in S402, for example, parameters of signaling such as bandwidth signaling, modulation signaling, etc.
In example 1, for example, the receiving end determines that the adopted coding mode is a Turbo coding mode according to the communication system corresponding to the first signal. Further, the receiving end determines candidate puncturing Yu Juzhen and candidate coding rate in the Turbo coding mode according to the bandwidth signaling and the modulation signaling. Thus, a candidate set of encodings of the first signal is determined.
In example 2, for example, the receiving end determines, according to the communication system corresponding to the first signal, that the adopted coding mode is an RSC coding mode. Further, the receiving end determines candidate puncturing Yu Juzhen and candidate coding rate in the RSC coding mode according to the bandwidth signaling and the modulation signaling. Thus, a candidate set of encodings of the first signal is determined.
S404, the receiving end determines a BCC generation matrix corresponding to the p-th group candidate coding parameter according to the p-th group candidate coding parameter in the candidate coding set.
In example 1, for example, when the receiving end determines that the coding mode adopted by the first signal is a Turbo coding mode, the receiving end may determine, according to the candidate puncturing Yu Juzhen and the candidate coding rate, a Turbo mother code encoder before puncturing, and an RSC encoder in the mother code encoder. Thus, according to the RSC generation matrix of the RSC encoder, the BCC generation matrix corresponding to the p-th group of candidate coding parameters is determined. Reference is specifically made to S3041.
Example 2, when the encoding candidate mode is the RSC encoding mode, the candidate puncturing Yu Juzhen and the candidate encoding rate are determined according to parameters of signaling such as bandwidth signaling, modulation signaling, and the like, and the standard of the communication system. Thereby, the RSC generation matrix corresponding to the p-th group candidate coding parameter is determined. And determining an equivalent BCC generation matrix according to the RSC generation matrix.
And S405, the receiving end decodes the first data in the first signal according to the BCC generation matrix corresponding to the p-th group candidate coding parameters, and determines the information bit soft information corresponding to the first data.
With reference to example 1, the receiving end may extract codeword soft information corresponding to a sub-encoder (component RSC encoder) in the Turbo encoder from the first signal under the p-th set of candidate encoding parameters (corresponding to one candidate Turbo encoder) based on the hypothesis test theory, further decode the first signal with the BCC generation matrix of the p-th set of candidate encoding parameters in S404, and output information bit soft information after the first signal is decoded under the candidate Turbo encoder by the BCC generation matrix corresponding to the p-th set of candidate encoding parameters.
With reference to example 2, the receiving end may determine, based on the hypothesis test theory, codeword soft information corresponding to the first signal from the first signal according to candidate puncturing Yu Juzhen under the p-th set of candidate coding parameters (corresponding to one candidate RSC encoder), further decode the first signal with reference to the BCC generation matrix corresponding to the p-th set of candidate coding parameters in S404, and output the codeword soft information corresponding to the first signal under the candidate RSC encoder through the decoded information bit soft information corresponding to the BCC generation matrix corresponding to the p-th set of candidate coding parameters.
And S406, the receiving end codes the information bit soft information corresponding to the first data according to the BCC generation matrix corresponding to the p-th group candidate coding parameter, and determines the third data.
With reference to example 1, under each group of candidate Turbo encoders, the BCC soft information corresponding to the first data output in S406 is subjected to BCC soft encoding by using a BCC generation matrix corresponding to the p-th group of candidate encoding parameters of the component RSC encoder in the Turbo encoder, so as to obtain codeword soft information, i.e., third data, of the information bit soft information corresponding to the first data.
With reference to example 2, under each set of candidate RSC encoders, the BCC generation matrix corresponding to the p-th set of candidate encoding parameters of the RSC encoder is used to perform BCC soft encoding on the information bit soft information corresponding to the first data output in S405, so as to obtain codeword soft information of the information bit soft information corresponding to the first data, that is, third data.
S407, the receiving end determines the codeword soft information to be verified corresponding to the p-th group candidate coding parameters according to the first data and the third data.
And determining codeword soft information of the third data corresponding to the puncturing position in the first data through the puncturing matrix corresponding to the third data and the p-th set of candidate coding parameters, so that codeword soft information to be verified corresponding to the p-th set of candidate coding parameters can be obtained by supplementing the codeword soft information of the third data corresponding to the puncturing position in the first data to the codeword soft information of the puncturing position in the first data.
S408, the receiving end determines the posterior probability log likelihood ratio of the syndrome of the codeword soft information to be verified corresponding to the p-th group candidate coding parameter according to the codeword soft information to be verified corresponding to the p-th group candidate coding parameter.
And determining the posterior probability log-likelihood ratio of the syndrome of the codeword to be verified corresponding to the p-th group candidate coding parameter by utilizing the codeword to be verified soft information corresponding to the p-th group candidate coding parameter in S407, thereby using the posterior probability log-likelihood ratio of the syndrome of the codeword to be verified corresponding to the p-th group candidate coding parameter as the identification measure for identifying the coding parameter of the encoder.
S409, the receiving end determines a group of target coding parameters of the first signal based on maximum likelihood estimation and on posterior probability log likelihood ratio judgment of syndromes of N code word soft information to be verified corresponding to N groups of candidate coding parameters.
And S4010, the receiving end decodes the first signal according to the group of target coding parameters.
When the first signal contains information of the coding parameters, it can be determined that the first data does not need coding identification, and the receiver can determine the coding parameters of the first signal according to the information of the coding parameters in the first data, and decode the first data.
When the first data does not include the information of the coding parameter, the first data may be decoded according to the coding parameter of the identified Turbo coding scheme. Or when the first data does not include the information of the coding parameter, the first data may be decoded according to the coding parameter of the identified RSC coding mode.
By the method, under the condition that the puncturing matrix of the Turbo code has no period, the blind code recognition problem of the Turbo code is equivalent to RSC blind code recognition, and further equivalent to simple BCC blind code recognition, so that the problem of the lack of the blind code recognition method of the periodically-punctured Turbo code is effectively solved. The method and the device improve the problems that the prior art is only suitable for simple or fixed code rate conventional convolutional code identification, fixed code rate puncturing convolutional code identification and short puncturing period Turbo code identification. In addition, besides identifying the Turbo code without the puncturing period, the RSC code with the puncturing period and the RSC code without the deleting period can be effectively identified. When the code mode is determined to be the RSC code mode, the RSC blind code identification can be equivalent to simple BCC blind code identification, the difficulty of RSC blind code identification is reduced, the identifiable range of the convolutional code is expanded, the conventional convolutional code identification of any code rate, the Turbo code blind identification of any code rate are included, and the RSC code blind identification of any code rate is wide in application range. In addition, the method is suitable for scenes with the change of the coding parameters or the missing of the coding parameters by an identification measurement method (posterior probability log likelihood ratio of a syndrome) with high degree of discrimination among classes.
Example two
In the following, a specific example is taken to illustrate a code identification method in the present application, and fig. 5 is a flowchart of a code identification method provided in an embodiment of the present application, where the method may be performed by a decoding device of a receiving end, where the decoding device may be an AP or an STA located in fig. 1a, or located in a network device or a terminal device in fig. 1 b. As shown in fig. 5, the method may include:
S501, a receiving end receives a first signal.
The receiving end may obtain the parameter of the signaling of the first signal according to the first signal.
S502, the receiving end determines whether to carry out coding identification according to the signaling parameters in the first data. If yes, S504 is executed, and if no, S5010 is executed.
The receiving end can determine whether to perform coding identification according to whether the first signal includes information of coding parameters. In some embodiments, the information of the coding parameters may include information of coding parameters such as coding mode, puncturing matrix, coding rate, etc.
For example, the first data does not include information of the encoding parameter, it may be determined that encoding identification is required, that is, S503 is performed. The first data includes information of the encoding parameter, it may be determined that the first signal does not need to be encoded for identification, that is, S5010 is performed.
And S503, the receiving end determines a candidate coding set of the BCC coding mode according to the signaling parameter of the first signal.
And the receiving end determines that the adopted coding mode is a BCC coding mode according to the communication system corresponding to the first signal. Further, in combination with the parameters of the signaling of the first signal in S501, for example, parameters of the signaling such as bandwidth signaling, modulation signaling, etc., a candidate coding set of the first signal is determined.
Example 3, when the coding candidate is BCC coding, the candidate puncturing Yu Juzhen and the candidate coding rate are determined according to parameters of signaling such as bandwidth signaling and modulation signaling, and standards of the communication system. Thus, each set of candidate coding parameters in the candidate coding set is determined.
For the p-th group of candidate coding parameters in the N groups of candidate coding parameters, p is sequentially taken to be any positive integer from 1 to N, and the following S504-S508 are executed:
s504, the receiving end determines a BCC generation matrix according to the p-th group candidate coding parameters in the candidate coding set.
Example 3, when the coding candidate is BCC coding, the candidate puncturing Yu Juzhen and the candidate coding rate are determined according to parameters of signaling such as bandwidth signaling and modulation signaling, and standards of the communication system. Thus, the BCC generation matrix corresponding to the p-th set of candidate coding parameters is determined.
And S505, the receiving end decodes the first data in the first signal according to the BCC generation matrix, and determines the information bit soft information corresponding to the first data.
With reference to example 3, the receiving end may extract, based on the hypothesis test theory, codeword soft information corresponding to a BCC encoder from the first signal according to puncturing Yu Juzhen under a p-th set of candidate encoding parameters (corresponding to one candidate BCC encoder), and decode the codeword soft information of the first signal according to the BCC generation matrix to obtain information bit soft information of the first signal after corresponding decoding under the candidate BCC encoder.
And S506, the receiving end encodes the information bit soft information corresponding to the first data according to the BCC generation matrix to determine the third data.
With reference to example 3, under each group of candidate BCC encoders, the BCC soft information corresponding to the first data output in S505 is subjected to BCC soft encoding by the BCC generation matrix corresponding to the BCC encoder, so as to obtain codeword soft information of the information bit soft information corresponding to the first data, i.e. third data.
S507, the receiving end determines the codeword soft information to be verified corresponding to the p-th group candidate coding parameters according to the first data and the third data.
And determining codeword soft information of the third data corresponding to the puncturing position in the first data through the puncturing matrix corresponding to the third data and the p-th set of candidate coding parameters, so that codeword soft information to be verified corresponding to the p-th set of candidate coding parameters can be obtained by supplementing the codeword soft information of the third data corresponding to the puncturing position in the first data to the codeword soft information of the puncturing position in the first data.
S508, the receiving end determines the posterior probability log likelihood ratio of the syndrome of the codeword soft information to be verified corresponding to the p-th group candidate coding parameter according to the codeword soft information to be verified corresponding to the p-th group candidate coding parameter.
And determining the posterior probability log-likelihood ratio of the syndrome of the codeword to be verified corresponding to the p-th group candidate coding parameter by utilizing the codeword to be verified soft information corresponding to the p-th group candidate coding parameter in S507, thereby using the posterior probability log-likelihood ratio of the syndrome of the codeword to be verified corresponding to the p-th group candidate coding parameter as the identification measure for identifying the coding parameter of the encoder.
S509, the receiving end determines a group of target coding parameters of the first signal based on maximum likelihood estimation and on posterior probability log likelihood ratio judgment of syndromes of N code word soft information to be verified corresponding to N groups of candidate coding parameters.
And S5010, the receiving end decodes the first signal according to a group of target coding parameters of the first signal.
When the first signal contains information of the coding parameters, it can be determined that the first data does not need coding identification, and the receiver can determine the coding parameters of the first signal according to the information of the coding parameters in the first data, and decode the first data.
When the first data does not include the information of the encoding parameter, the first data may be decoded according to the encoding parameter of the identified BCC encoding scheme.
By the method, the identifiable range of the convolution code is expanded, so that besides the Turbo code or the RSC code without the puncturing period, the BCC code with the puncturing period and the BCC code without the deleting period can be effectively identified. The method is not only aimed at the problem of blind code identification of the periodic Turbo code or the RSC code, but also suitable for blind identification of multiple groups of punctured convolutional code types, and expands the application range of code identification.
Referring to fig. 6, a schematic structural diagram of a communication device according to an embodiment of the present application is provided, where the communication device 600 includes a receiving module 610 and a processing module 620. The communication device may be used to implement the functionality relating to the terminal device in any of the method embodiments described above. The communication means may be, for example, a terminal device, such as a hand-held terminal device or a vehicle-mounted terminal device, a chip or a circuit included in the terminal device, or a device including the terminal device, such as various types of vehicles, or the like. The communication device may be used to implement the functionality relating to the terminal device in any of the method embodiments described above. The communication means may be, for example, a terminal device or a chip or a circuit comprised in a terminal device.
The communication device is illustrated, when performing the operations or steps of the corresponding terminal device in the method embodiments shown in fig. 3a, fig. 4 and fig. 5, the receiving module 610 is configured to receive a first signal, the processing module 620 is configured to determine a candidate encoding set according to a signaling parameter of the first signal, where the candidate encoding set includes N groups of candidate encoding parameters, where N is a positive integer greater than 1, for a p-th group of candidate encoding parameters in the N groups of candidate encoding parameters, the p sequentially takes any one positive integer from 1 to N, perform the steps of supplementing a puncturing position of first data in the first signal according to a puncturing Yu Juzhen in the p-th group of candidate encoding parameters, obtain second data, decode the second data according to the p-th group of candidate encoding parameters, obtain a decoded bit sequence, encode the bit sequence according to the p-th group of candidate encoding parameters, determine, according to the first data and the third data, determine that the p-th group of candidate encoding parameters corresponds to the p-th group of candidate encoding parameters, and determine that the N-th group of candidate encoding parameters corresponds to the N-th group of candidate encoding parameters is the first data, and the N-th candidate encoding parameters is determined according to the N-th group of candidate encoding parameters.
One possible implementation manner, the candidate coding parameters comprise at least one of a coding mode, a puncturing matrix and a coding rate.
In a possible implementation manner, the processing module 620 is specifically configured to determine the candidate code set according to a signaling parameter of the first signal, where the signaling parameter of the first signal includes at least one of a bandwidth parameter and a modulation parameter.
In a possible implementation manner, the processing module 620 is specifically configured to determine a block convolutional code BCC generation matrix corresponding to the p-th set of candidate coding parameters, and decode the second data according to the BCC generation matrix corresponding to the p-th set of candidate coding parameters to obtain the decoded bit sequence.
The processing module 620 is specifically configured to determine a first sub-encoder included in a Turbo encoder corresponding to the p-th set of candidate coding parameters according to a puncturing matrix and a coding rate included in the p-th set of candidate coding parameters, and determine a BCC generation matrix corresponding to the p-th set of candidate coding parameters according to a recursive systematic convolutional code RSC generation matrix of the first sub-encoder.
The processing module 620 is specifically configured to determine an RSC generation matrix of an encoder corresponding to the RSC coding mode according to the puncturing matrix and the coding rate included in the p-th set of candidate coding parameters, and determine a BCC generation matrix corresponding to the p-th set of candidate coding parameters according to the RSC generation matrix.
The processing module 620 is specifically configured to determine, according to the puncturing matrix and the coding rate included in the p-th set of candidate coding parameters, a BCC generation matrix corresponding to the p-th set of candidate coding parameters.
In a possible implementation manner, the processing module 620 is specifically configured to determine, according to codeword soft information included in the third data and corresponding to puncturing bits of the puncturing matrix in the p-th set of candidate coding parameters, and a codeword of the first data, to-be-verified data corresponding to the p-th set of candidate coding parameters.
In a possible implementation manner, the processing module 620 is specifically configured to determine, for any one to-be-verified data of the N to-be-verified data, a posterior probability log likelihood ratio of a syndrome of the to-be-verified data and likelihood probability of the posterior probability log likelihood ratio, and take a set of candidate encoding parameters corresponding to the N likelihood probabilities when the likelihood probability is the maximum as the set of target encoding parameters.
The processing module 620 involved in the communication device may be implemented by at least one processor or processor-related circuit component and the receiving module 610 may be implemented by at least one transceiver or transceiver-related circuit component or communication interface. The operation and/or function of each module in the communication device is to implement the corresponding flow of the method shown in fig. 3a, fig. 4 or fig. 5, respectively, and is not described herein for brevity. Optionally, the communication device may further include a storage module, where the storage module may be configured to store data and/or instructions, and the receiving module 610 and/or the processing module 620 may read the data and/or instructions in the access module, so that the communication device implements a corresponding method. The memory module may be implemented, for example, by at least one memory. The storage module, the processing module and the transceiver module may exist separately, or may be integrated in whole or in part, for example, the storage module and the processing module are integrated, or the processing module and the transceiver module are integrated, etc.
In connection with each network element shown in fig. 1a and 1b, for example, an AP, an STA, a base station, or a terminal device may employ the constituent structure shown in fig. 7 or include the components shown in fig. 7. Fig. 7 is a schematic diagram of a communication device 700 according to an embodiment of the present application, for example, the communication device 700 may be an AP or a chip in the AP, a baseband chip, or a system on a chip. Similarly, the network device and the terminal device shown in fig. 1b may adopt the constituent structure shown in fig. 7 or include the components shown in fig. 7. For example, the apparatus 700 may be a chip or a system on a chip in a network device or a terminal device. As shown in fig. 7, the apparatus 700 may include a processor 701, a communication line 702, and a transceiver circuit 703. Further, the apparatus 700 may also include a memory 704. The processor 701, the memory 704, and the transceiver circuit 703 may be connected via a communication line 702.
The processor 701 may be a central processing unit (central processing unit, CPU), a general purpose processor network processor (network processor, NP), a digital signal processor (DIGITAL SIGNAL processing, DSP), a microprocessor, a microcontroller, a programmable logic device (programmable logic device, PLD), or any combination thereof. The processor 701 may also be other means for performing processing functions, such as a circuit, device, or software module. The processor 701 may have functions of encoding, modulating, demodulating, decoding, etc.
Communication lines 702 are used to carry information between the various components included in the apparatus 700.
Transceiver circuitry 703 for communicating with other devices or other communication networks. The other communication network may be an ethernet, a radio access network (radio access network, RAN), a wireless local area network (wireless local area networks, WLAN), etc. The transceiver circuit 703 may be a radio frequency module or any means capable of enabling communication. The embodiment of the present application is described by taking the transceiver circuit 703 as an example of a radio frequency module, where the radio frequency module may include an antenna, a radio frequency circuit, and the radio frequency circuit may include a radio frequency integrated chip, a power amplifier, and the like.
Memory 704 for storing instructions. Wherein the instructions may be a computer program for performing the code recognition method of the present application.
The memory 704 may be a read-only memory (ROM) or other type of static storage device capable of storing static information and/or instructions, a random access memory (random access memory, RAM) or other type of dynamic storage device capable of storing information and/or instructions, an EEPROM, a CD-ROM or other optical disk storage, magnetic disk storage medium or other magnetic storage device, including compact disk, laser disk, optical disk, digital versatile disk, blu-ray disk, etc.
It should be noted that, the memory 704 may exist independently of the processor 701 or may be integrated with the processor 701. Memory 704 may be used to store instructions or program code or some data, etc. Memory 704 may be located within device 700 or external to device 700, without limitation. A processor 701 is configured to execute instructions stored in a memory 704 to implement an encoding method according to the following embodiments of the present application.
In one example, processor 701 may include one or more CPUs, such as CPU0 and CPU1 in fig. 7.
As an alternative implementation, the apparatus 700 includes a plurality of processors, for example, the processor 707 may be included in addition to the processor 701 in fig. 7.
As an alternative implementation, the apparatus 700 further comprises an output device 705 and an input device 707. By way of example, input device 707 is a keyboard, mouse, microphone, or joystick, and output device 705 is a display screen, speaker (speaker), or the like.
It should be noted that the apparatus 700 may be a desktop computer, a portable computer, a network server, a mobile phone, a tablet computer, a wireless AP, an embedded device, a chip system, or a device having a similar structure in fig. 7. Furthermore, the constituent structures shown in fig. 7 do not constitute limitations of the apparatus, and the apparatus may include more or less components than those shown in fig. 7, or may combine some components, or may be arranged in different components, in addition to those shown in fig. 7.
In the embodiment of the application, the chip system can be composed of chips, and can also comprise chips and other discrete devices.
The embodiment of the application also provides a chip system, which comprises a processor, wherein the processor is coupled with a memory, and the memory is used for storing a program or instructions, and when the program or instructions are executed by the processor, the chip system is enabled to realize the method of the corresponding terminal equipment or the method of the corresponding network equipment in any method embodiment.
Alternatively, the processor in the system-on-chip may be one or more. The processor may be implemented in hardware or in software. When implemented in hardware, the processor may be a logic circuit, an integrated circuit, or the like. When implemented in software, the processor may be a general purpose processor, implemented by reading software code stored in a memory.
Alternatively, the memory in the system-on-chip may be one or more. The memory may be integral with the processor or separate from the processor, and the application is not limited. The memory may be a non-transitory processor, such as a ROM, which may be integrated on the same chip as the processor, or may be separately provided on different chips, and the type of memory and the manner of providing the memory and the processor are not particularly limited in the present application.
The chip system may be a field programmable gate array (field programmable GATE ARRAY, FPGA), an Application Specific Integrated Chip (ASIC), a system on chip (SoC), a central processing unit (central processor unit, CPU), a network processor (network processor, NP), a digital signal processing circuit (DIGITAL SIGNAL processor, DSP), a microcontroller (micro controller unit, MCU), a programmable controller (programmable logic device, PLD) or other integrated chip, for example.
It should be understood that the steps in the above-described method embodiments may be accomplished by integrated logic circuitry in hardware in a processor or instructions in the form of software. The steps of the method disclosed in connection with the embodiments of the present application may be embodied directly in a hardware processor for execution, or in a combination of hardware and software modules in the processor for execution.
Embodiments of the present application also provide a computer-readable storage medium having stored therein computer-readable instructions which, when read and executed by a computer, cause the computer to perform the method of any of the method embodiments described above.
Embodiments of the present application also provide a computer program product which, when read and executed by a computer, causes the computer to perform the method of any of the method embodiments described above.
The embodiment of the application also provides a communication system which comprises the network equipment and at least one terminal equipment. Optionally, the communication system may further comprise a core network device.
It is to be appreciated that the processor referred to in the embodiments of the present application may be a CPU, but may also be other general purpose processors, DSP, ASIC, FPGA or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
It should also be understood that the memory referred to in embodiments of the present application may be volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory. The nonvolatile memory may be a read-only memory (ROM), a programmable ROM, an erasable ROM, an electrically erasable ROM, or a flash memory, among others. The volatile memory may be random access memory (random access memory, RAM) which acts as external cache memory. By way of example, and not limitation, many forms of RAM are available, such as static random access memory, dynamic random access memory, synchronous dynamic random access memory, double data rate synchronous dynamic random access memory, enhanced synchronous dynamic random access memory, synchronous link dynamic random access memory, and direct memory bus random access memory.
It should be noted that when the processor is a general-purpose processor, DSP, ASIC, FPGA or other programmable logic device, discrete gate or transistor logic device, discrete hardware components, the memory (storage module) is integrated into the processor.
It should be noted that the memory described herein is intended to comprise, without being limited to, these and any other suitable types of memory.
It should be understood that the various numbers related to the various embodiments of the present application are merely for convenience of description, and the size of the sequence numbers of the above-mentioned processes or steps does not mean the order of execution, and the order of execution of the processes or steps should be determined by the functions and inherent logic thereof, and should not constitute any limitation on the implementation process of the embodiments of the present application.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, and are not repeated herein.
In the several embodiments provided by the present application, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of the units is merely a logical function division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server, a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present application. The storage medium includes various media capable of storing program codes such as a U disk, a mobile hard disk, a ROM, a RAM, a magnetic disk or an optical disk.
In various embodiments of the application, where no special description or logic conflict exists, terms and/or descriptions between the various embodiments are consistent and may reference each other, and features of the various embodiments may be combined to form new embodiments based on their inherent logic.

Claims (22)

1.一种编码识别方法,其特征在于,包括:1. A coding recognition method, characterized by comprising: 接收第一信号;receiving a first signal; 根据所述第一信号的信令参数,确定候选编码集合,所述候选编码集合包括N组候选编码参数;所述N为大于1的正整数;Determine a candidate coding set according to the signaling parameter of the first signal, where the candidate coding set includes N groups of candidate coding parameters; where N is a positive integer greater than 1; 针对N组候选编码参数中的第p组候选编码参数,所述p依次取遍1至N中的任意一个正整数,执行:For the pth group of candidate coding parameters among the N groups of candidate coding parameters, where p is any positive integer from 1 to N in sequence, execute: 根据所述第p组候选编码参数中的删余矩阵,对所述第一信号中的第一数据的删余位置进行补充,得到第二数据;Supplementing punctured positions of first data in the first signal according to a puncturing matrix in the pth group of candidate coding parameters to obtain second data; 根据所述第p组候选编码参数对所述第二数据进行解码,获得解码后的比特序列;Decoding the second data according to the pth group of candidate coding parameters to obtain a decoded bit sequence; 根据所述第p组候选编码参数对所述比特序列进行编码,得到第三数据;Encode the bit sequence according to the pth group of candidate encoding parameters to obtain third data; 根据所述第一数据和所述第三数据,确定所述第p组候选编码参数对应的待验证数据;Determine, according to the first data and the third data, data to be verified corresponding to the pth group of candidate encoding parameters; 根据确定出的所述N组候选编码参数分别对应的N个待验证数据,在所述N组候选编码参数中确定出所述第一信号的一组目标编码参数。According to the N data to be verified corresponding to the determined N groups of candidate coding parameters, a group of target coding parameters of the first signal is determined from the N groups of candidate coding parameters. 2.如权利要求1所述的方法,其特征在于,所述候选编码参数包括以下至少一项:编码方式,删余矩阵,编码码率。2. The method according to claim 1, characterized in that the candidate coding parameters include at least one of the following: coding mode, puncturing matrix, and coding rate. 3.如权利要求1所述的方法,其特征在于,所述第一信号的信令参数包括以下至少一项:3. The method according to claim 1, wherein the signaling parameter of the first signal comprises at least one of the following: 带宽参数、调制参数。Bandwidth parameters, modulation parameters. 4.如权利要求1所述的方法,其特征在于,所述根据所述第p组候选编码参数对所述第二数据进行解码,获得解码后的比特序列,包括:4. The method according to claim 1, wherein decoding the second data according to the pth group of candidate coding parameters to obtain a decoded bit sequence comprises: 确定所述第p组候选编码参数对应的分组卷积码BCC生成矩阵;Determine a group convolutional code BCC generator matrix corresponding to the p-th group of candidate coding parameters; 根据所述第p组候选编码参数对应的BCC生成矩阵,对所述第二数据进行解码,获得所述解码后的比特序列。The second data is decoded according to a BCC generation matrix corresponding to the p-th group of candidate coding parameters to obtain the decoded bit sequence. 5.如权利要求4所述的方法,其特征在于,所述候选编码参数包括的编码方式为Turbo编码方式;5. The method according to claim 4, wherein the encoding mode included in the candidate encoding parameters is a Turbo encoding mode; 所述根据所述第p组候选编码参数,确定所述第p组候选编码参数对应的BCC生成矩阵,包括:The determining, according to the p-th group of candidate coding parameters, a BCC generation matrix corresponding to the p-th group of candidate coding parameters includes: 根据所述第p组候选编码参数中包括的删余矩阵和编码码率,确定所述第p组候选编码参数对应的Turbo编码器包含的第一子编码器;Determine, according to the puncturing matrix and the coding rate included in the p-th group of candidate coding parameters, a first sub-encoder included in the Turbo encoder corresponding to the p-th group of candidate coding parameters; 根据所述第一子编码器的递归系统卷积码RSC生成矩阵,确定所述第p组候选编码参数对应的BCC生成矩阵。A BCC generation matrix corresponding to the p-th group of candidate coding parameters is determined according to a recursive systematic convolutional code (RSC) generation matrix of the first sub-encoder. 6.如权利要求4所述的方法,其特征在于,所述第p组候选编码参数包括的编码方式为RSC编码方式;6. The method according to claim 4, characterized in that the encoding mode included in the p-th group of candidate encoding parameters is an RSC encoding mode; 所述根据所述第p组候选编码参数,确定所述第p组候选编码参数对应的BCC生成矩阵,包括:The determining, according to the p-th group of candidate coding parameters, a BCC generation matrix corresponding to the p-th group of candidate coding parameters includes: 根据所述第p组候选编码参数中包括的删余矩阵和编码码率,确定RSC编码方式对应的编码器的RSC生成矩阵;Determine an RSC generation matrix of an encoder corresponding to the RSC coding mode according to the puncturing matrix and the coding rate included in the pth group of candidate coding parameters; 根据所述RSC生成矩阵,确定所述第p组候选编码参数对应的BCC生成矩阵。A BCC generation matrix corresponding to the p-th group of candidate coding parameters is determined according to the RSC generation matrix. 7.如权利要求4所述的方法,其特征在于,所述第p组候选编码参数包括的编码方式为BCC编码方式;7. The method according to claim 4, wherein the encoding mode included in the p-th group of candidate encoding parameters is a BCC encoding mode; 所述根据所述第p组候选编码参数,确定所述第p组候选编码参数对应的BCC生成矩阵,包括:The determining, according to the p-th group of candidate coding parameters, a BCC generation matrix corresponding to the p-th group of candidate coding parameters includes: 根据所述第p组候选编码参数中包括的删余矩阵和编码码率,确定所述第p组候选编码参数对应的BCC生成矩阵。Determine a BCC generation matrix corresponding to the p-th group of candidate coding parameters according to the puncturing matrix and the coding rate included in the p-th group of candidate coding parameters. 8.如权利要求4所述的方法,其特征在于,所述根据所述第一数据和所述第三数据,确定所述第p组候选编码参数对应的待验证数据,包括:8. The method according to claim 4, wherein determining the data to be verified corresponding to the p-th group of candidate coding parameters according to the first data and the third data comprises: 根据所述第三数据中包括的对应所述第p组候选编码参数中的删余矩阵的删余比特位的码字软信息,及所述第一数据的码字,确定所述第p组候选编码参数对应的待验证数据。The data to be verified corresponding to the pth group of candidate coding parameters is determined according to the codeword soft information of the puncturing bits of the puncturing matrix in the pth group of candidate coding parameters included in the third data and the codeword of the first data. 9.如权利要求1-8任一项所述的方法,其特征在于,所述根据确定出的所述N组候选编码参数分别对应的N个待验证数据,在所述N组候选编码参数中确定出所述第一信号的一组目标编码参数,包括:9. The method according to any one of claims 1 to 8, characterized in that the step of determining a set of target coding parameters of the first signal from the N sets of candidate coding parameters according to the N sets of data to be verified that respectively correspond to the N sets of candidate coding parameters comprises: 分别确定所述N个待验证数据的校正子的后验概率对数似然比;Determine the posterior probability log-likelihood ratios of the syndromes of the N to-be-verified data respectively; 分别确定所述N个待验证数据的校正子的后验概率对数似然比的似然概率;Determine the likelihood probabilities of the posterior probability log-likelihood ratios of the syndromes of the N to-be-verified data respectively; 将所述似然概率为最大值对应的一组候选编码参数,作为所述一组目标编码参数。A set of candidate coding parameters corresponding to the maximum likelihood probability is used as the set of target coding parameters. 10.一种编码识别装置,其特征在于,包括:10. A coding recognition device, comprising: 接收模块,用于接收第一信号;A receiving module, configured to receive a first signal; 处理模块,用于根据所述第一信号的信令参数,确定候选编码集合,所述候选编码集合包括N组候选编码参数;所述N为大于1的正整数;针对N组候选编码参数中的第p组候选编码参数,所述p依次取遍1至N中的任意一个正整数,执行:根据所述第p组候选编码参数中的删余矩阵,对所述第一信号中的第一数据的删余位置进行补充,得到第二数据;根据所述第p组候选编码参数对所述第二数据进行解码,获得解码后的比特序列;根据所述第p组候选编码参数对所述比特序列进行编码,得到第三数据;根据所述第一数据和所述第三数据,确定所述第p组候选编码参数对应的待验证数据;根据确定出的所述N组候选编码参数分别对应的N个待验证数据,在所述N组候选编码参数中确定出所述第一信号的一组目标编码参数。A processing module is used to determine a candidate coding set according to the signaling parameters of the first signal, the candidate coding set including N groups of candidate coding parameters; N is a positive integer greater than 1; for the p-th group of candidate coding parameters in the N groups of candidate coding parameters, p is taken as any positive integer from 1 to N in turn, and execute: according to the redundancy matrix in the p-th group of candidate coding parameters, the redundancy position of the first data in the first signal is supplemented to obtain the second data; according to the p-th group of candidate coding parameters, the second data is decoded to obtain a decoded bit sequence; according to the p-th group of candidate coding parameters, the bit sequence is encoded to obtain the third data; according to the first data and the third data, the data to be verified corresponding to the p-th group of candidate coding parameters is determined; according to the N data to be verified corresponding to the determined N groups of candidate coding parameters, a group of target coding parameters of the first signal is determined from the N groups of candidate coding parameters. 11.如权利要求10所述的装置,其特征在于,所述一组候选编码参数包括以下至少一项:编码方式,删余矩阵,编码码率。11. The device according to claim 10, characterized in that the set of candidate coding parameters includes at least one of the following: coding mode, puncturing matrix, and coding rate. 12.如权利要求10所述的装置,其特征在于,所述第一信号的信令参数包括以下至少一项:带宽参数、调制参数。12. The device according to claim 10, characterized in that the signaling parameter of the first signal includes at least one of the following: a bandwidth parameter and a modulation parameter. 13.如权利要求10所述的装置,其特征在于,所述处理模块根据所述第p组候选编码参数对所述第二数据进行解码,获得解码后的比特序列时,具体用于:13. The device according to claim 10, wherein the processing module decodes the second data according to the p-th group of candidate coding parameters to obtain a decoded bit sequence, specifically for: 确定所述第p组候选编码参数对应的分组卷积码BCC生成矩阵;Determine a group convolutional code BCC generator matrix corresponding to the p-th group of candidate coding parameters; 根据所述第p组候选编码参数对应的BCC生成矩阵,对所述第二数据进行解码,获得所述解码后的比特序列。The second data is decoded according to a BCC generation matrix corresponding to the p-th group of candidate coding parameters to obtain the decoded bit sequence. 14.如权利要求13所述的装置,其特征在于,所述第p组候选编码参数包括的编码方式为Turbo编码方式;14. The device according to claim 13, wherein the encoding mode included in the p-th group of candidate encoding parameters is a Turbo encoding mode; 所述处理模块根据所述第p组候选编码参数,确定所述第p组候选编码参数对应的BCC生成矩阵时,具体用于When the processing module determines the BCC generation matrix corresponding to the p-th group of candidate coding parameters according to the p-th group of candidate coding parameters, it is specifically used to 根据所述第p组候选编码参数包括的删余矩阵和编码码率,确定所述第p组候选编码参数对应的Turbo编码器包含的第一子编码器;Determine, according to the puncturing matrix and the coding rate included in the p-th group of candidate coding parameters, a first sub-encoder included in the Turbo encoder corresponding to the p-th group of candidate coding parameters; 根据所述第一子编码器的递归系统卷积码RSC生成矩阵,确定所述第p组候选编码参数对应的BCC生成矩阵。A BCC generation matrix corresponding to the p-th group of candidate coding parameters is determined according to a recursive systematic convolutional code (RSC) generation matrix of the first sub-encoder. 15.如权利要求13所述的装置,其特征在于,所述第p组候选编码参数包括的编码方式为RSC编码方式;15. The device according to claim 13, wherein the encoding mode included in the p-th group of candidate encoding parameters is an RSC encoding mode; 所述处理模块根据所述第p组候选编码参数,确定所述第p组候选编码参数对应的BCC生成矩阵时,具体用于:When the processing module determines the BCC generation matrix corresponding to the p-th group of candidate coding parameters according to the p-th group of candidate coding parameters, it is specifically used to: 根据所述第p组候选编码参数包括的删余矩阵和编码码率,确定RSC编码方式对应的递归系统卷积码RSC生成矩阵;Determine a recursive systematic convolutional code (RSC) generator matrix corresponding to the RSC coding mode according to the puncturing matrix and the coding rate included in the pth group of candidate coding parameters; 根据所述RSC生成矩阵,确定所述第p组候选编码参数对应的BCC生成矩阵。A BCC generation matrix corresponding to the p-th group of candidate coding parameters is determined according to the RSC generation matrix. 16.如权利要求13所述的装置,其特征在于,所述第p组候选编码参数包括的编码方式为BCC编码方式;16. The device according to claim 13, wherein the encoding mode included in the p-th group of candidate encoding parameters is a BCC encoding mode; 所述处理模块根据所述第p组候选编码参数,确定所述第p组候选编码参数对应的BCC生成矩阵时,具体用于:When the processing module determines the BCC generation matrix corresponding to the p-th group of candidate coding parameters according to the p-th group of candidate coding parameters, it is specifically used to: 根据所述第p组候选编码参数包括删余矩阵和编码码率,确定BCC编码方式对应的BCC生成矩阵。According to the pth group of candidate coding parameters including the puncturing matrix and the coding rate, a BCC generation matrix corresponding to the BCC coding mode is determined. 17.如权利要求14所述的装置,其特征在于,所述处理模块根据所述第一数据和所述第三数据,确定所述第p组候选编码参数对应的待验证数据时,具体用于:17. The device according to claim 14, wherein when the processing module determines the data to be verified corresponding to the p-th group of candidate coding parameters according to the first data and the third data, it is specifically used to: 根据所述第三数据中包括的对应所述第p组候选编码参数中的删余矩阵的删余比特位的码字软信息,及所述第一数据的码字,确定所述第p组候选编码参数对应的待验证数据。The data to be verified corresponding to the pth group of candidate coding parameters is determined according to the codeword soft information of the puncturing bits of the puncturing matrix in the pth group of candidate coding parameters included in the third data and the codeword of the first data. 18.如权利要求10-17任一项所述的装置,其特征在于,所述处理模块根据确定出的所述N组候选编码参数分别对应的N个待验证数据,在所述N组候选编码参数中确定出所述第一信号的一组目标编码参数时,具体用于:18. The device according to any one of claims 10 to 17, characterized in that the processing module is specifically used to: 分别确定所述N个待验证数据的校正子的后验概率对数似然比;Determine the posterior probability log-likelihood ratios of the syndromes of the N to-be-verified data respectively; 分别确定所述N个待验证数据的校正子的后验概率对数似然比的似然概率;Determine the likelihood probabilities of the posterior probability log-likelihood ratios of the syndromes of the N to-be-verified data respectively; 将所述似然概率为最大值对应的一组候选编码参数,作为所述一组目标编码参数。A set of candidate coding parameters corresponding to the maximum likelihood probability is used as the set of target coding parameters. 19.一种编码识别装置,其特征在于,包括处理器,所述处理器与至少一个存储器耦合,所述处理器用于读取所述至少一个存储器所存储的计算机程序,以执行如权利要求1~9中任意一项所述的方法。19. A code recognition device, characterized in that it comprises a processor, the processor is coupled to at least one memory, and the processor is used to read a computer program stored in the at least one memory to execute the method as described in any one of claims 1 to 9. 20.一种通信设备,其特征在于,包括如权利要求10~19中任意一项所述的编码识别装置。20. A communication device, characterized in that it comprises the coding recognition device as described in any one of claims 10 to 19. 21.一种计算机可读存储介质,其特征在于,包括计算机程序,当所述计算机程序在计算机上运行时,使得所述计算机执行如权利要求1至9任一项所述的方法。21. A computer-readable storage medium, characterized by comprising a computer program, which, when executed on a computer, enables the computer to execute the method according to any one of claims 1 to 9. 22.一种芯片,其特征在于,包括处理器和通信接口,所述处理器用于通过所述通信接口读取指令以执行如权利要求1~9中任意一项所述的方法。22. A chip, comprising a processor and a communication interface, wherein the processor is used to read instructions through the communication interface to execute the method according to any one of claims 1 to 9.
CN202110474855.8A 2021-04-29 2021-04-29 A method and device for coding identification Active CN115276886B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110474855.8A CN115276886B (en) 2021-04-29 2021-04-29 A method and device for coding identification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110474855.8A CN115276886B (en) 2021-04-29 2021-04-29 A method and device for coding identification

Publications (2)

Publication Number Publication Date
CN115276886A CN115276886A (en) 2022-11-01
CN115276886B true CN115276886B (en) 2025-07-15

Family

ID=83745375

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110474855.8A Active CN115276886B (en) 2021-04-29 2021-04-29 A method and device for coding identification

Country Status (1)

Country Link
CN (1) CN115276886B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115941404A (en) * 2022-12-19 2023-04-07 重庆邮电大学 Low-complexity iterative detection method for CPM signal in short-wave communication
CN116455429A (en) * 2023-03-15 2023-07-18 上海矽朋微电子有限公司 Multi-user power line communication method based on optimal Bayesian algorithm
CN120263202B (en) * 2025-06-05 2025-09-12 中国电子科技集团公司第十研究所 High-efficiency Hadamard decoding method and device suitable for high-speed parallel processing, storage medium and electronic equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104683072A (en) * 2015-03-26 2015-06-03 山东大学 A Blind Identification Method of Parameters of Component Encoders with Punctured Turbo Codes
CN107026709A (en) * 2016-02-01 2017-08-08 中兴通讯股份有限公司 A kind of data packet coding processing method and processing device, base station and user equipment

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190273573A1 (en) * 2018-03-05 2019-09-05 Qualcomm Incorporated High-rate trellis coded modulations

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104683072A (en) * 2015-03-26 2015-06-03 山东大学 A Blind Identification Method of Parameters of Component Encoders with Punctured Turbo Codes
CN107026709A (en) * 2016-02-01 2017-08-08 中兴通讯股份有限公司 A kind of data packet coding processing method and processing device, base station and user equipment

Also Published As

Publication number Publication date
CN115276886A (en) 2022-11-01

Similar Documents

Publication Publication Date Title
US10966118B2 (en) Channel encoding method and communication device
CN115276886B (en) A method and device for coding identification
CN109075799B (en) Encoding and decoding methods and devices of polar codes
CN108809482B (en) Rate matching method and device for Polar codes
US20220052709A1 (en) Crc interleaving pattern for polar codes
EP3602797B1 (en) Puncturing of polar codes with complementary sequences
EP4510457A1 (en) Data processing method, electronic device, storage medium, and program product
US10581464B2 (en) Encoder device, decoder device, and methods thereof
CN114915297A (en) Coding and decoding method and related device
CN114731210B (en) Communication method and device
CN108696283A (en) The method and apparatus of data encoding and decoding
US20240333427A1 (en) Rate matching method and apparatus
CN116235414A (en) Channel coding method and device
EP4208947B1 (en) Method and apparatus for improved belief propagation based decoding
US20240007222A1 (en) Coding method and apparatus
WO2024192763A1 (en) Methods, systems, and apparatus for non-sequential decoding of polar codes
WO2025209273A1 (en) Polar code decoding method and communication apparatus
WO2025168008A1 (en) Encoding method, decoding method, and communication apparatus
WO2025012757A1 (en) Nested sequences for polar codes
CN120165696A (en) A communication method and communication device based on low-density parity check code
WO2025065582A1 (en) Communication method and apparatus
CN120283370A (en) Cascade coding method, cascade decoding method and device
CN120378046A (en) Method, apparatus and computer program
CN115580376A (en) Decoding method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant