Next Article in Journal
Joint Design of Polar Coding and Physical Network Coding for Two−User Downlink Non−Orthogonal Multiple Access
Next Article in Special Issue
Lossy P-LDPC Codes for Compressing General Sources Using Neural Networks
Previous Article in Journal
Influence of Information Blocking on the Spread of Virus in Multilayer Networks
Previous Article in Special Issue
Lossless Image Coding Using Non-MMSE Algorithms to Calculate Linear Prediction Coefficients
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Protograph Designing of P-LDPC Codes via M3 Method

1
Department of Information and Communication Engineering, Xiamen University, Xiamen 361005, China
2
College of Telecommunications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
*
Author to whom correspondence should be addressed.
Entropy 2023, 25(2), 232; https://doi.org/10.3390/e25020232
Submission received: 13 December 2022 / Revised: 22 January 2023 / Accepted: 24 January 2023 / Published: 27 January 2023
(This article belongs to the Special Issue Advances in Information and Coding Theory)

Abstract

:
Recently, a mesh model-based merging (M 3 ) method and four basic graph models were proposed to construct the double protograph low-density parity-check (P-LDPC) code pair of the joint source channel coding (JSCC). Designing the protograph (mother code) of the P-LDPC code with both a good waterfall region and lower error floor is a challenge, and few works have existed until now. In this paper, the single P-LDPC code is improved to further verify the availability of the M 3 method, and its structure is different from the channel code in the JSCC. This construction technique yields a family of new channel codes with lower power consumption and higher reliability. The structured design and better performance demonstrate that the proposed code is hardware-friendly.

1. Introduction

Channel coding is an important issue in the physical layer, which protects the source with high reliability in channel transmission. By using channel coding, the transmission rate can theoretically approach the capacity [1]. In the physical standard of fifth-generation communication, channel coding is practically implemented by the low-density parity-check (LDPC) code, which has good error-correction and anti-interference properties [2]. In this case, the LDPC code will possibly be a good candidate for sixth-generation communication.
In addition, the LDPC code is employed as the channel encoder over different transmission noises, and presents good coding performance [3]. Furthermore, the LDPC code is considered in practical environments, such as wireless body area [4,5,6] and underwater channels [7,8,9]. It is also demonstrated that the optimization of the LDPC code can further improve the coding performance.
As a capacity-approaching channel code, the protograph LDPC (P-LDPC) code provides high reliability and low power consumption in the transmission link [10]. The optimal design of the P-LDPC code can further improve the system performance [11]. In this case, different structures based on the protograph of the P-LDPC code are derived, including the protograph-based quasi-cyclic [12], the protograph-based spatially coupled [13], and the protograph-based raptor-like (PBRL) [14]. All the aforementioned structures are demonstrated with good coding performance results. In the existing fifth-generation communication, the codes in [10] are directly fabricated as the silicon chips of the channel encoder since [10] provides good “mother codes” for LDPC code constructions and expansions.
It should be noted that the “mother codes” in [10] are also called the benchmark protographs. First, the benchmark protograph provides a good protomatrix, and it can be expanded to obtain the corresponding check matrix by using the progressive edge-growth (PEG) algorithm [15]. Then, the check matrix is further designed with structural characteristics to improve the coding property. Hence, the coding property of the benchmark protograph is an important factor impacting the system performance.
For the benchmark protograph, the mainstream of coding optimization is a more structured design. This not only improves the coding property, but also it reduces the designing complexity. For example, Ref. [16] proposes the Hadamard-based P-LDPC code, Ref. [17] builds non-binary LDPC code by the graphical representation of absorbing sets, and Ref. [18] considers algebraical and graphical methods to construct rate-compatible LDPC codes. The aforementioned research works aim to improve the system performance of high reliability and low-power consumption by optimally designing the structured protographs.
However, the existing works focus on optimizing the matrices of larger dimensions. It is investigated that the majority of existing codes can outperform the benchmark code in [10] by designing high-dimension matrices, while they do not directly refresh the benchmark codes with the same dimensions. Furthermore, the high-dimension matrices will increase the code-designing complexity and storage capacity. Considering these facts, we intend to directly improve the benchmark codes with the same dimensions.
Recently, based on the graph theory, a new structure was proposed in [19], which designs a mesh model-based merging (M 3 ) method to construct the double P-LDPC (DP-LDPC) code pair. Inspired by building blocks, four basic graph models are devised to merge the source and channel protographs simultaneously in [19]. In this case, the structural characteristics of both the source and channel codes are considered. Furthermore, it is demonstrated that the optimization of the DP-LDPC code pair can ameliorate the transmission performance [5,6].
To be sure, the DP-LDPC code pair is different from the single P-LDPC code. Furthermore, it is a challenge to optimally design the short-length LDPC code with both a good waterfall region and lower error floor. In addition, there are fewer works focusing on designing the mother code since its optimization is a hard task. Hence, the M 3 method is introduced to improve the channel P-LDPC code in this paper. In doing so, the mother code in [10] can be refreshed. We aim to obtain a better benchmark protograph with both lower power consumption and higher reliability, and provide a superior basis for expanding the check matrix.
Although this work focuses on the basically theoretical research, we think that the results can be promoted to larger scopes. For functional use, the M 3 method can be employed to optimally search the source code for realizing the source compression. For system use, the M 3 method can be utilized both in the single channel coding and the joint source-channel coding [19]. For practical use, the M 3 method can design the channel coding based on the LDPC code to adapt different transmission environments [4,5,6,7,8,9]. Furthermore, this work is a kind of further design based on [20], and it focuses on the detailed structure under the precondition of the matrix rank. In this case, the proposed protomatrices can be directly employed in practical application.
The key point is that the proposed channel codes refresh the “mother codes” in [10]. It should be noted that the “mother code” is the basis of different LDPC code, and it is still employed in the existing fifth-generation communication. In detail, there are three aspects of the theory. First, the M 3 method provides an efficient way to optimally design the “mother code” with both a good waterfall region and lower error floor, and generally this is a hard task. Second, the proposed code will be a new “seed” to design various LDPC codes, including the protograph-based quasi-cyclic code, the protograph-based spatially coupled code, and the protograph-based raptor-like code. Third, the M 3 method has universality and generality such that it will diversely promote expanding ways to obtain the objective LDPC code, which will be good candidate for the sixth-generation communication.
Overall, two contributions are summarized as follows:
(1)
The existing protograph family is refreshed by the M 3 method with both a good waterfall region and lower error floor. The proposed channel code has better performance, and it can be considered a new benchmark protograph.
(2)
The M 3 method provides a new route based on the graphical theory to effectively design the mother code with lower coding complexity, which is friendly for hardware implementation.
The rest of this paper is organized as follows. In Section 2, the system based on the P-LDPC code is introduced. The M 3 method is detailed in Section 3, including the definitions of graph models, the protograph generation algorithm, and the searching complexity reduction. In Section 4, the simulation results about the bit error ratio (BER) and the frame error ratio (FER) are presented based on different P-LDPC codes. Section 5 concludes the paper.

2. System Based on P-LDPC Code

In binary field F ( 2 ) , the channel coding employs a P-LDPC code to encode a block of uniformly distributed bits s . The protomatrix of the P-LDPC code is expressed as
B = b 1 , 1 b 1 , 2 b 1 , n b 2 , 1 b 2 , 2 b 2 , n b m , 1 b m , 2 b m , n m × n ,
where b ı , ȷ N is the degree indicating the number of linking edges between the ıth check node (CN) and the jth variable node (VN), the subscripts are ı , ȷ N * , and the dimension m × n satisfies m < n and m , n N * . Here, N * is the set of positive integers, and N is the set of natural numbers.
The code rate is defined as R = n m n 1 and 0 < R < 1 . Here, the VN with the maximum column weight is punctured, which is calculated by max ı = 1 ı = m b ı , ȷ . Then, the protomatrix B is directly expanded to obtain the corresponding check matrix H by the PEG algorithm [15]. The dimension of H is M × N and the lifting number is N / n . According to the relation between the check matrix H and the generator matrix G , it has
H T · G = 0 ,
where the generator matrix G can be calculated by the invertible H , and the dimension of G is ( N M ) × N .
The encoding is realized as follows:
s · G = e ,
where the length of s is N M , and e of length N is the encoded sequence.
The encoded e is modulated by the binary phase shift keying scheme, and then a symbol sequence x is obtained, where the length of x is N. After that, x is transmitted through the additive white Gaussian noise channel as
y = x + n ,
where n is an additive noise following the Gaussian distribution of n N ( 0 , σ 2 ) , and the noise variance is σ 2 .
The channel decoding is implemented by the belief propagation algorithm, which iteratively propagates the log-likelihood ratio (LLR) between VNs and CNs. First, LLR is updated from VNs to CNs as
L v c = c S ( v ) \ c L c v + L c h ,
where the subscripts v and c represent VN and CN, respectively, S ( v ) \ c ( S ( c ) \ v ) denotes the set of neighboring CNs (VNs) of the v (c) expecting c (v). Here, L c h is the initial channel LLR satisfying
L c h = ln 1 + e 2 y σ 2 1 1 + e + 2 y σ 2 1 = 2 y σ 2 ,
where y y .
From CNs to VNs, LLR is calculated as
L c v = 2 tanh 1 v S ( c ) \ v tanh L v c 2 .
Then, LLR is summarized as follows:
L v = c S ( v ) L c v .
Finally, the decoding s ^ is determined by the soft decision of LLR as
s ^ = 0 , if L v 0 , 1 , if L v < 0 ,
where s ^ s ^ , and s ^ is the reconstructed source sequence of length N M .

3. M 3 Method

Referring to the encoding and decoding procedures, the coding property is mainly determined by the protograph and its PEG extension. In this case, the protograph improvement will obtain better system performance. To improve the channel protograph, the related techniques of the M 3 method are introduced as follows.
The protograph is defined as a connected graph, where VN and CN are collectively called the node v, and the linking edge between the two nodes is signified as e.
Definition 1.
A graph G = ( V , E ) is a connected graph of dimension m × n , including { v 1 , v 2 , , v m n } V nodes and { e 1 , e 2 , , e ( m 1 ) n + ( n 1 ) m } E edges. The connected graph G is expressed as a planar graph as follows:
G = v 1 e 1 v 2 v n e n e n + 1 e 2 n 1 v n + 1 e 2 n v n + 2 v 2 n v m n n + 1 e ( m 1 ) n + ( n 1 ) m ( n 2 ) v m n n + 2 v m n ,
where m × n is simplified as the subscript m n , “↔” and “↕” are the nondirectional edges, V and E represent sets of nodes and edges, respectively, and m , n N * .
Definition 2.
The basic graph models of M 3 method are expressed by four different planar graphs, and their dimensions are determined, as follows:
G 1 = v ı , ȷ ,
G 2 = 1 e 1 0 ,
G 3 = 0 e 1 1 ,
G 4 = v ı , ȷ e 1 v ı , ȷ + 1 e 4 e 2 v ı + 1 , ȷ e 3 v ı + 1 , ȷ + 1 .
Here, the basic model G 1 has one node v ı , ȷ , and v ı , ȷ N . G 2 and G 3 are filled with two nodes “0” and “1”. G 4 is a square graph which has four nodes and four edges, where v ı , ȷ in G 4 can take a different value from G 1 . It should be noted that G 4 is a symmetric structure satisfying v ı , ȷ = v ı + 1 , ȷ + 1 and v ı , ȷ + 1 = v ı + 1 , ȷ .
Definition 3.
If a protograph G = ( V , E ) includes several symmetric subgraphs G 4 = ( V 4 , E 4 ) satisfying V 4 V and E 4 E , it is said that G is structured. The degree of the symmetric subgraph follows G 4 = ( v ı , ȷ ) 2 × 2 for ∀ v ı , ȷ = v ȷ , ı . With the number of G 4 increased, G is more structured.
Lemma 1.
A planar graph G of any dimension can be constructed by the four basic graph models of the M 3 method. The size of G increases with the number of basic models.
Proof. 
Given a connected graph G = ( V , E ) of dimension m × n , the four basic graph models of the M 3 method are signified as G j = ( V j , E j ) , where ȷ = { 1 , 2 , 3 , 4 } . If the graph G j is a connected subgraph of G , it is said that G can be constructed by several G j .
According to the definition of a connected graph [21], an undirected graph is connected if it has a path from an arbitrary node to another node. From Definition 2, the four basic models G j are undirected graphs. It is also obvious that the four basic models G j are four connected graphs.
Referring to the definition of connected subgraph [21], the node and edge sets of the subgraph should satisfy V j V and E j E , respectively.
In Definition 1, there are m n nodes v and ( m 1 ) n + ( n 1 ) m edges e, where v and e are defined as v k and e l , respectively, and the subscripts satisfy k { 1 , , m n } and e { 1 , , ( m 1 ) n + ( n 1 ) m } .
For G 1 , it has
V 1 { v ı , ȷ } = V { v k } V , E 1 { } E , G 1 G .
Here, V 1 { v ı , ȷ } represents the node set V 1 only containing one node v ı , ȷ , and E 1 { } indicates that the edge set E 1 is an empty set.
G 1 only has one node v ı , ȷ which can be signified as an arbitrary node v k in G . No edge in G 1 is denoted as the empty set , and is a subset of G . Thus it attains that G 1 is a connected subgraph of G .
For G 2 , it has
V 2 { 1 , 0 } = V { v k , v 2 k } V , E 2 { e 1 } = E { e l } E , G 2 G .
Here, V 2 { 1 , 0 } represents the node set V 2 containing two nodes 0 and 1, and E 2 { e 1 } indicates that the edge set E 2 only has one edge e 1 .
G 2 is a column vector including two nodes and one edge. The edge e 1 in G 2 can be signified as an arbitrary e l in G . The two nodes span two rows; therefore, the corresponding labels are v k and v 2 k , respectively. Thus, it attains that G 2 is a connected subgraph of G .
For G 3 , it has
V 3 { 0 , 1 } = V { v k , v k + 1 } V , E 3 { e 1 } = E { e l } E , G 3 G .
G 3 is a row vector including two nodes and one edge. Different from G 2 , the two nodes span two columns; therefore, the corresponding labels are v k and v k + 1 . Thus it attains that G 3 is a connected subgraph of G .
For G 4 , it has
V 4 { v ı , ȷ , v ı , ȷ + 1 , v ı + 1 , ȷ + 1 , v ı + 1 , ȷ } = V { v k , v k + 1 , v 2 k + 1 , v 2 ( k + 1 ) } V , E 4 { e 1 , e 2 , e 3 , e 4 } = E { e l , e l + 1 , e 2 l + 1 , e 2 ( l + 1 ) } E , G 4 G .
G 4 is a square matrix including four nodes and four edges. The nodes and edges span two rows and two columns simultaneously; therefore, the labels are signified as v k , v k + 1 , v 2 k + 1 , v 2 ( k + 1 ) and e l , e l + 1 , e 2 l + 1 , e 2 ( l + 1 ) , respectively. Thus it attains that G 4 is a connected subgraph of G .
In conclusion, the four basic models G j are four connected subgraphs of G . Given an arbitrary dimension, G can be constructed by using several G j . With the number of G j increased, the dimension of G is enlarged. □

3.1. Protograph Generation Algorithm

Based on the four basic graph models, the protograph generation algorithm is proposed to construct the channel protograph, as shown in Algorithm 1.
First, an initial protograph G i n i is given with the dimension of m × n . Each node is located by a coordinate ( C ı , C ȷ ) , which represents the C ı th row and the C ȷ th column. In line 1 of Algorithm 1, the generation rules are calculated based on given m × n . Equation (25) shows the constraint of the number of using basic models G j , expressed as N ( G j ) , where “ · ” and “ · ” are rounded up and down to integers, respectively. Theoretically, according to the given m × n , the maximum number of corresponding G j is determined as max N ( G j ) .
In line 3 of Algorithm 1, three basic graph models, including G 2 , G 3 and G 4 , are filled in G i n i as the coordinates change. Since the three models have different row and column dimensions, they can be distinguished during the node traversal. After padding the basic graph models, the practical number of using G j is counted as N ( G j ) .
In line 4 of Algorithm 1, the satisfiability of the constructed G i n i is determined by comparing the theoretical max N ( G j ) and the practical N ( G j ) , following N ( G j ) max N ( G j ) . This ensures the objective protograph satisfying the generation rules.
In line 5 of Algorithm 1, the remaining vacancies are filled with G 1 . Equation (26) calculates the number of remaining nodes. Finally, the complete protograph G i n i is output as the objective G .
For example, the objective protograph G of dimension 3 × 5 is expressed as follows:
G = 1 v ı , ȷ v ı , ȷ v ı , ȷ e 1 v ı , ȷ + 1 e 1 e 4 e 2 0 v ı , ȷ e 1 v ı , ȷ + 1 v ı + 1 , ȷ e 3 v ı + 1 , ȷ + 1 e 4 e 2 v ı , ȷ v ı + 1 , ȷ e 3 v ı + 1 , ȷ + 1 v ı , ȷ v ı , ȷ ,
where G is combined by five G 1 , one G 2 , and two G 4 , and v ı , ȷ N can take distinct values.
By using the differential evolution (DE) algorithm [22], the undetermined nodes v are searched to match with the appropriate values. As shown in Figure 1, the initial channel protograph is iteratively updated by mutation, crossover, and selection. After an ergodic process, the objective channel protograph is determined by the objective function. The objective function is defined as
F = min E b / N 0 ,
where E b / N 0 represents the signal-to-noise ratio (SNR) in dB, and the optimization objective of function F is to achieve the minimum SNR.
Then, the protomatrix of dimension 3 × 5 is obtained as
B 3 × 5 M 3 = 1 0 0 1 2 0 0 2 2 1 0 2 0 1 2 .
To further expand the code rates, three larger protomatrices are acquired at different dimensions, as follows:
B 3 × 7 M 3 = 1 0 0 1 2 0 0 0 1 1 2 1 2 1 0 1 1 1 3 1 2 ,
B 3 × 9 M 3 = 0 0 0 0 0 0 2 2 1 1 1 1 2 1 2 2 2 0 1 1 2 1 2 1 0 1 0 ,
B 3 × 11 M 3 = 0 0 0 0 0 0 0 0 2 2 1 1 2 1 2 1 2 1 1 2 2 0 2 1 2 1 2 1 1 1 0 1 0 .
Algorithm 1 Protograph generation based on graph models.
Input:
 the initial protograph, G i n i ;
 the coordinate of node, ( C ı , C ȷ ) ;
 the dimension of the objective protograph, m × n ;
Output:
 the objective protograph, G ;
1:
Calculating generation rules based on given m × n
max N ( G j ) 0 N ( G 2 ) < m × n 2 m × n 4 , 0 N ( G 3 ) < m × n 2 m × n 4 , 0 < N ( G 4 ) < m × n 4 .
2:
for C ı = 1 to m and C ȷ = 1 to n do
3:
   Padding basic graph models
N ( G j ) if m 2 , n 2 , then ( C ı , C ȷ ) = ( C ı + 1 , C ȷ + 1 ) , ( C ı , C ȷ + 1 ) = ( C ı + 1 , C ȷ ) ; if m 2 , n < 2 , then ( C ı , C ȷ ) = 1 , ( C ı + 1 , C ȷ ) = 0 ; if m < 2 , n 2 , then ( C ı , C ȷ ) = 0 , ( C ı , C ȷ + 1 ) = 1 .
4:
   Decision of satisfiability: N ( G j ) max N ( G j ) , j { 2 , 3 , 4 } .
5:
   Filling vacancies by G 1
N ( G 1 ) = m × n 2 × N ( G 2 ) 2 × N ( G 3 ) 4 × N ( G 4 ) ,
6:
end for
7:
Output result: G G i n i .

3.2. Searching Complexity Reduction

The measurement metric of the coding complexity is the number of searching entries. During the searching process, each node needs to match an appropriate degree. Hence, this is an exhaustive traversal method. Assuming the dimension of the objective protograph is m × n , and the range of degree is [ 0 , 3 ] * , where [ 0 , 3 ] * represents the integers from 0 to 3.
In the original DE algorithm, the total number of searching entries is calculated by
O 1 = 4 m × n ,
where O 1 is exponentially increased with a larger m × n .
The M 3 method provides a more structured design of the protograph. Since there are several symmetric subgraphs and some determined nodes, the total number of searching entries is expressed as
O 2 = 4 m × n Φ + Ψ 2 ,
where m × n Φ + Ψ 2 indicates the number of searching nodes in G , Φ represents the determined nodes consisting of G 2 and G 3 , and Ψ denotes the number of remaining nodes filled with G 1 . Generally, Ψ takes a smaller value.
Overall, the searching complexity is theoretically reduced to
O 1 O 2 O 1 50 % .

4. Simulation Results

In this section, the BER and FER performance results are compared based on different P-LDPC codes. Two benchmark codes with the same dimension as B m × n M 3 are selected, namely B m × n AR 3 A [23] and B m × n AR 4 JA [24]. Furthermore, the PBRL-LDPC codes in [14] are introduced to compare with the proposed P-LDPC codes.
Figure 2 shows the BER and FER performances compared with two benchmark codes. The code rate is R = 1 / 2 , and the lifting number is 800. The proposed B 3 × 5 M 3 in red hexagram line obtains 0.62 dB coding gains at BER = 10 7 . In addition, compared to B 3 × 5 AR 3 A and B 3 × 5 AR 4 JA , B 3 × 5 M 3 has lower decoding threshold of Th = 0.475.
In Figure 3, the PBRL-LDPC and the P-LDPC codes are simulated by FER performance. The lifting number is 200, and the code length is 1000. For the P-LDPC type, the proposed B 3 × 5 M 3 outperforms B 3 × 5 AR 3 A and B 3 × 5 AR 4 JA to present the advantage of short-to-medium length. However, two PBRL-LDPC codes [14] have better FER performance. The main reason is that the PBRL-LDPC directly optimizes the check matrix with a larger dimension, while the P-LDPC only considers the protograph of a smaller dimension.
Figure 4 demonstrates the validity of code rate extensions. The code rates are given as R = 1 / 2 , 2 / 3 , 3 / 4 , and 4 / 5 , and the lifting number is 800. At the same code rate, the proposed B m × n M 3 achieves a lower decoding threshold and error floor. Hence, the structured design based on the M 3 method is effective to realize the higher reliability of the channel coding.

5. Conclusions

In this paper, the M 3 method is introduced to construct the channel P-LDPC code. The structured design of the channel protograph is obtained with both a lower decoding threshold and error floor; therefore, the “mother code” in [10] can be refreshed. From this point, it is found that the optimization of the “mother code” is necessary. The proposed codes will be good candidates of the “mother code”. This structured design provides a highly symmetric protograph, which is hardware friendly in practical applications. Overall, this work cannot only be promoted to differently functional uses, including the source coding, the channel coding, the joint source channel coding, and the coding optimization over practical transmission environment, but also it has theory-driven “mother code” design. In our future work, the check matrix of the proposed protograph will be optimized by two stage extensions. The derived codes will achieve the desired performance results compared to good competitors.

Author Contributions

Conceptualization, D.S. and L.W.; methodology, D.S.; software, D.S.; validation, D.S., L.W. and M.M.; formal analysis, D.S.; investigation, D.S.; resources, D.S.; data curation, D.S.; writing—original draft preparation, D.S.; writing—review and editing, D.S. and L.W.; visualization, D.S.; supervision, L.W.; project administration, L.W.; funding acquisition, L.W. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by National Natural Science Foundation of China grant number 61671395.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Cover, T.M.; Thamos, J.A. Elements of Information Theory, 2nd ed.; Wiley: Hoboken, NJ, USA, 2006. [Google Scholar]
  2. Shao, S.; Hailes, P.; Wang, T.-Y.; Wu, J.-Y.; Maunder, R.G.; Al-Hashimi, B.M.; Hanzo, L. Survey of Turbo, LDPC, and Polar Decoder ASIC Implementations. IEEE Commun. Surv. Tutor. 2019, 21, 2309–2333. [Google Scholar] [CrossRef] [Green Version]
  3. Chen, Q.; Wang, L.; Chen, P.; Chen, G. Optimization of Component Elements in Integrated Coding Systems for Green Communications: A Survey. IEEE Commun. Surv. Tutorials 2019, 21, 2977–2999. [Google Scholar] [CrossRef]
  4. Song, D.; Wang, L.; Chen, Q.; Chen, G. Optimal Design of Joint Protomatrix for DP-LDPC Codes-based JSCC System over On-body Channel. IEEE Access 2021, 9, 33091–33101. [Google Scholar] [CrossRef]
  5. Song, D.; Wang, L.; Xu, Z.; Chen, G. Joint Code Rate Compatible Design of DP-LDPC Code Pairs for Joint Source Channel Coding over Implant-to-external Channel. IEEE Trans. Wirel. Commun. 2022, 21, 5526–5540. [Google Scholar] [CrossRef]
  6. Song, D.; Ren, J.; Wang, L.; Chen, G. Designing a Common DP-LDPC Code Pair for Variable on-body Channels. IEEE Trans. Wirel. Commun. 2022, 21, 9596–9609. [Google Scholar] [CrossRef]
  7. Rafati, A.; Lou, H.; Xiao, C. Soft-Decision Feedback Turbo Equalization for LDPC-Coded MIMO Underwater Acoustic Communications. IEEE J. Ocean. Eng. 2014, 39, 90–99. [Google Scholar] [CrossRef]
  8. Padala, S.K.; D’Souza, J. Performance of Spatially Coupled LDPC Codes over Underwater Acoustic Communication Channel. In Proceedings of the 2020 National Conference on Communications (NCC), Kharagpur, India, 21–23 February 2020; pp. 1–5. [Google Scholar]
  9. Liang, J.; He, J. Performance Enhanced of Geometrically Shaped 64-QAM With LDPC in UOWC System. IEEE Photonics Technol. Lett. 2022, 34, 807–810. [Google Scholar] [CrossRef]
  10. Divsalar, D.; Dolinar, S.; Jones, C.R.; Andrews, K. Capacity-approaching Protograph Codes. IEEE J. Select. Areas Commun. 2009, 27, 876–888. [Google Scholar] [CrossRef]
  11. Fang, Y.; Bi, G.; Guan, Y.L.; Lau, F.C.M. A Survey on Protograph LDPC Codes and Their Applications. IEEE Commun. Surv. Tutor. 2015, 17, 1989–2016. [Google Scholar] [CrossRef]
  12. Ranganathan, S.V.S.; Divsalar, D.; Wesel, R.D. Design of Improved Quasi-cyclic Protograph-based Raptor-like LDPC Codes for Short Block-lengths. In Proceedings of the 2017 IEEE International Symposium on Information Theory (ISIT), Aachen, Germany, 25–30 June 2017; pp. 1207–1211. [Google Scholar]
  13. Mitchell, D.G.M.; Lentmaier, M.; Costello, D.J. Spatially Coupled LDPC Codes Constructed from Protographs. IEEE Trans. Inf. Theory 2015, 9, 4866–4889. [Google Scholar] [CrossRef] [Green Version]
  14. Chen, T.-Y.; Vakilinia, K.; Divsalar, D.; Wesel, R.D. Protograph-based Raptor-like LDPC Codes. IEEE Trans. Commun. 2015, 5, 1522–1532. [Google Scholar] [CrossRef] [Green Version]
  15. Hu, X.Y.; Eleftheriou, E.; Arnold, D.M. Regular and Irregular Progressive Edge-Growth Tanner Graphs. IEEE Trans. Inf. Theory 2005, 1, 386–398. [Google Scholar] [CrossRef]
  16. Zhang, P.-W.; Lau, F.C.M.; Sham, C.-W. Protograph-Based LDPC Hadamard Codes. IEEE Trans. Commun. 2021, 69, 4998–5013. [Google Scholar] [CrossRef]
  17. Amiri, B.; Kliewer, J.; Dolecek, L. Analysis and Enumeration of Absorbing Sets for Non-binary Graph-based Codes. IEEE Trans. Commun. 2014, 62, 398–409. [Google Scholar] [CrossRef]
  18. Mu, X.; Shen, C.; Bai, B. A combined Algebraic- and Graph-based Method for Constructing Structured RC-LDPC Codes. IEEE Commun. Lett. 2016, 20, 1273–1276. [Google Scholar] [CrossRef]
  19. Song, D.; Wang, L.; Chen, P. Mesh Model-based Merging Method for DP-LDPC Code Pair. IEEE Trans. Commun. 2023, in press. [Google Scholar] [CrossRef]
  20. An, L.; Yang, G. Enhancement of Opacity for Distributed State Estimation in Cyber-physical Systems. Automatica 2022, 136, 110087. [Google Scholar] [CrossRef]
  21. Harary, F. Graph Theory; Addison-Wesley: Reading, MA, USA, 1994; p. 11. [Google Scholar] [CrossRef]
  22. Srinivas, M.; Patnaik, L.M. Genetic algorithms: A survey. Computer 1994, 27, 17–26. [Google Scholar] [CrossRef]
  23. Divsalar, D.; Dolinar, S.; Jones, C. Low-rate LDPC Codes with Simple Protograph Structure. In Proceedings of the International Symposium on Information Theory (ISIT), Adelaide, Australia, 4–9 September 2005; pp. 1622–1626. [Google Scholar]
  24. Divsalar, D.; Jones, C.; Dolinar, S.; Thorpe, J. Protograph Based LDPC Codes with Minimum Distance Linearly Growing with Block Size. In Proceedings of the GLOBECOM ’05. IEEE Global Telecommunications Conference, St. Louis, MO, USA, 28 November–2 December 2005; pp. 1152–1156. [Google Scholar]
Figure 1. The framework of the DE algorithm.
Figure 1. The framework of the DE algorithm.
Entropy 25 00232 g001
Figure 2. BER and FER comparisons based on benchmark codes in [10], the code rate is R = 1 / 2 , and the lifting number is 800.
Figure 2. BER and FER comparisons based on benchmark codes in [10], the code rate is R = 1 / 2 , and the lifting number is 800.
Entropy 25 00232 g002
Figure 3. FER comparison based on PBRL-LDPC in [14] and P-LDPC codes, the code rate is R = 1 / 2 , and the lifting number is 200.
Figure 3. FER comparison based on PBRL-LDPC in [14] and P-LDPC codes, the code rate is R = 1 / 2 , and the lifting number is 200.
Entropy 25 00232 g003
Figure 4. BER and FER comparisons based on B m × n M 3 and B m × n AR 3 A in [10], the code rate is R = 1 / 2 , 2 / 3 , 3 / 4 , 4 / 5 , and the lifting number is 800.
Figure 4. BER and FER comparisons based on B m × n M 3 and B m × n AR 3 A in [10], the code rate is R = 1 / 2 , 2 / 3 , 3 / 4 , 4 / 5 , and the lifting number is 800.
Entropy 25 00232 g004
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Song, D.; Miao, M.; Wang, L. Protograph Designing of P-LDPC Codes via M3 Method. Entropy 2023, 25, 232. https://doi.org/10.3390/e25020232

AMA Style

Song D, Miao M, Wang L. Protograph Designing of P-LDPC Codes via M3 Method. Entropy. 2023; 25(2):232. https://doi.org/10.3390/e25020232

Chicago/Turabian Style

Song, Dan, Meiyuan Miao, and Lin Wang. 2023. "Protograph Designing of P-LDPC Codes via M3 Method" Entropy 25, no. 2: 232. https://doi.org/10.3390/e25020232

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop