Next Article in Journal
GL-YOLO-Lite: A Novel Lightweight Fallen Person Detection Model
Next Article in Special Issue
Transformer-Based Detection for Highly Mobile Coded OFDM Systems
Previous Article in Journal
Notions of Completeness in the EPR Discussion
Previous Article in Special Issue
Design and Analysis of Joint Group Shuffled Scheduling Decoding Algorithm for Double LDPC Codes System
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Adaptive Bit-Labeling Design for Probabilistic Shaping Based on Residual Source Redundancy

Xiamen Key Laboratory of Mobile Multimedia Communications, College of Information Science and Engineering, Huaqiao University, Xiamen 361021, China
*
Author to whom correspondence should be addressed.
Entropy 2023, 25(4), 586; https://doi.org/10.3390/e25040586
Submission received: 21 February 2023 / Revised: 25 March 2023 / Accepted: 28 March 2023 / Published: 29 March 2023
(This article belongs to the Special Issue Coding and Entropy)

Abstract

:
By using the residual source redundancy to achieve the shaping gain, a joint source-channel coded modulation (JSCCM) system has been proposed as a new solution for probabilistic amplitude shaping (PAS). However, the source and channel codes in the JSCCM system should be designed specifically for a given source probability to ensure optimal PAS performance, which is undesirable for systems with dynamically changing source probabilities. In this paper, we propose a new shaping scheme by optimizing the bit-labeling of the JSCCM system. Instead of the conventional fixed labeling, the proposed bit-labelings are adaptively designed according to the source probability and the source code. Since it is simple to switch between different labelings according to the source probability and the source code, the proposed design can be considered as a promising low complexity alternative to obtain the shaping gain for sources with different probabilities. Numerical results show that the proposed bit-labelings can significantly improve the bit-error rate (BER) performance of the JSCCM system.

1. Introduction

Bit interleaved coded modulation (BICM) [1] with uniformly distributed symbols leads to a shaping loss and prevents the performance from approaching the Shannon limit for higher order modulation [2]. To close the gap to the Shannon limit, probabilistic amplitude shaping (PAS) schemes were introduced using a distribution matcher (DM) [3]. In [4,5], the PAS schemes using non-binary and protograph low-density parity-check (LDPC) codes were investigated for BICM systems. To further reduce the complexity of binary DM, a PAS scheme via simplified sign-bit shaping was proposed for high spectral-efficiency coding in [6]. In [7], a probabilistic shaping scheme for nongray labelled QAM constellations was proposed.
Although the PAS schemes for BICM have been extensively investigated in recent years, most of them only focus on uniform inputs. Specifically, the constant composition distribution matching (CCDM) utilized in the standard PAS works can only transform Bernoulli (1/2) distributed input bits into output symbols [8].
However, in realistic applications, natural sources often contain substantial amounts of redundancy due to the non-uniform distribution of the source symbols and the source memory. In such cases, source codes should be utilized, which can be divided into two categories: variable-length codes (VLCs) and fixed-length codes (FLCs). Although VLCs exhibit high compression rates, a few bit errors after the channel decoder may dramatically corrupt the decoded source data. To prevent this catastrophic error propagation, FLCs have been proposed and successfully demonstrated for several applications such as GSM and wide-band adaptive multi-rate (WB-AMR) speech transmission [9,10] and image/video transmission [11,12,13]. Because of the limit of the length, the FLCs still exhibit residual redundancy in their outputs.
For non-uniform sources, in [14], protograph LDPC codes are optimized under binary modulation with unequal power allocation. By using the source residual redundancy after source coding to achieve probabilistic shaping, a joint source-channel coded modulation (JSCCM) system was proposed [15]. In [15], the design of the source code parameter is targeted specifically at a given source probability, and thus the residual redundancy left after source coding can be properly used to shape the transmitted symbols. Accordingly, the source-channel code pairs optimized at one source probability may lead to extremely poor performance at another source probability due to the mismatch of the source code parameter and the source probability. However, this characteristic is undesirable for some systems with varying levels of data redundancy since the source-channel code pairs should be optimized at different source probabilities to ensure the PAS performance.
In this paper, a low complexity method to obtain the shaping gain for sources with different probabilities is proposed for the JSCCM system. The main contributions of this paper are as follows:
  • By studying the effects of bit-labeling in JSCCM systems, it is found that good bit-labelings for different source codes or different source probabilities could be different.
  • Based on the achievable system rate analysis, a new shaping scheme for the JSCCM system is proposed by optimizing the bit-labeling.
  • In contrast to the fixed Gray labeling [16], the adaptive design of bit-labelings for the JSCCM system is proposed according to the source codes and the source probabilities. Since it is much simpler to switch between labelings than to optimize the source-channel code pairs for different source probabilities, it is attractive for systems with changing source statistics.
The remainder of the paper is organized as follows. Section 2 presents the JSCCM system model. Section 3 proposes an adaptive design algorithm of the bit-labeling. Section 4 discusses the performance of the system using the adaptively designed labelings in comparison with the fixed labeling. Finally, Section 5 concludes the paper.

2. System Model

The structure of the JSCCM system over AWGN channels is shown in Figure 1. A non-uniform memoryless binary (“0” and “1”) source is considered in this paper, where the probability of “1” is represented as p ( p 0.5 ). The source entropy is therefore given by
H ( p ) = p log 2 p ( 1 p ) log 2 ( 1 p ) < 1 .
Let us consider source protograph LDPC codes with base matrix B s and channel protograph LDPC codes with base matrix B c . Then, the progressive edge growth (PEG) algorithm is employed to generate the corresponding low-density matrices H s and H c by the copy-and-permute operation [17].
The encoding process of the JSCCM system comprises two steps as follows. Firstly, the source bit sequence s is compressed by using the source code as
b T = H s s T ,
where b is the compressed bit sequence. Then, the compressed bit sequence is protected by the channel code. For systematic binary channel encoding, a systematic generator matrix can be constructed from the parity-check matrix H c and is represented by
G c = P I ,
where I is the identity matrix. The systematic channel codeword x is thus obtained as
x = b G c = c b ,
where c = b P is the parity bit sequence.
Assume a quadrature amplitude (QAM) alphabet with 2 m signal points, where m is the modulation order. By setting the channel code rate to be ( m 1 ) / m , the channel codeword x can be composed of a parity bit sequence c of length N and a compressed bit sequence b of length N × ( m 1 ) , where N represents the lifting factor. Thus, the sequence x is organized as a N × m binary matrix by the interleaver as
M x ( 1 ) = c 1 b 1 1 b 1 2 b 1 m 1 c 2 b 2 1 b 2 2 b 2 m 1 c N b N 1 b N 2 b N m 1 b 0 b 1 b 2 b m 1 ,
where every column forms a bit level b i for 0 i m 1 .
In (5), the parity bits in c are all transferred to the bit level b 0 and the compressed bits in block b i , 1 i m 1 are transferred to the bit level b i . Subsequently, the QAM symbol sequence X = X 1 , X 2 , , X N for transmission is obtained by row-wise mapping according to the mapping rule.
With the constellation scaling α > 0 , the AWGN channel is described by the input–output relationship
Y = α X + Z ,
where X is the modulated symbol sequence, Y is the received symbol sequence, and  Z is the AWGN sequence.
The overall transmission rate of the JSCCM system is defined in “source bits/channel symbol” as
R = m R c R s = m 1 R s ,
where R s and R c represent the source coding rate and the channel coding rate, respectively.
At the receiver, after demodulation and de-interleaving, the joint source and channel decoder is applied to reconstruct the source bit sequence.

3. Analysis and Design of Bit-Labeling

As shown in [15], in JSCCM systems, the parity bits transferred to the bit level b 0 are uniformly distributed. Meanwhile, the compressed bits transferred to the bit level in block b i , 1 i m 1 can be computed by (2) as the modulo-2 sum of the source bits. Therefore, the probability distribution of the compressed bits is determined essentially by the row weight distribution of B s in combination with the source probability distribution p as [15,18]
p B s i ( 1 ) = k = 0 , odd w i w i k p k 1 p w i k , i = 1 , 2 , , m 1
where w i represents the weight of the i-th row of B s and w i k denotes the binomial coefficients. Note that p i ( 1 ) + p i ( 0 ) = 1 and p i ( 1 ) p i ( 0 ) for i = 1 , 2 , , m 1 when p 0.5 , thus leading to nonuniform input symbol distributions.
Let X denote a set of 2 m -ary QAM constellation points. After interleaving, a symbol mapper maps an m-bit vector x = [ b 0 , , b m 1 ] F 2 m onto X = ϕ ( x ) X , where ϕ ( · ) : F 2 m X is a symbol mapping function. Assume that the bits at the input of the modulator are independent, the symbol probabilities for transmission obtained as follows
P B s ( X , ϕ ) = 1 2 i = 1 m 1 p i ( b i ) ,
where p i ( u ) represents the probability of transmitting a bit u { 0 , 1 } at bit position b i .
For a given source probability p and a source code matrix B s , the probability of every bit level can be identified. Then, the symbol probability is determined by the mapping function ϕ ( · ) , which maps each length-m binary vector [ b 0 , , b m 1 ] to a corresponding symbol X, and thus we explicitly indicate this dependence in (9).

3.1. Effects of Bit-Labelings

With an aim to illustrate the effects of bit-labelings on the JSCCM system, we compare the BER performance of two different Gray labelings. Figure 2 shows a 16-QAM constellation with L and L labelings, which are both under the rule of one-bit discrepancy between adjacent binary labels.
Figure 3 plots the simulated BER results of those two labelings with different source codes ( B s , 1  [15] and B R 4 J A [19]) and different source probabilities ( p = 0.04 and p = 0.96 ). Note that the two source probabilities contribute to the same source entropy according to (1). It can be found that the labeling L with a competitive advantage at p = 0.04 is outperformed by L at p = 0.96 when B s , 1 is utilized. Meanwhile, it can be observed that the better labeling for B s , 1 results in worse performance for B R 4 J A when p = 0.96 . Therefore, the good bit-labelings for different source probabilities or different source codes can be different. An adaptive design of bit-labeling according to the source probability and the source code is essential for the JSCCM system.

3.2. An Adaptive Design Scheme of Bit-Labeling

In this section, we consider the adaptive design procedure that optimizes the bit-labeling according to the source probability and the source code for a given target transmission rate by the achievable system rate analysis.
For the reliable transmission of an asymmetric source with entropy H ( p ) over a memoryless AWGN channel with capacity C at a rate of R source bits per channel symbol, the Shannon limit can be expressed as [20]
H ( p ) R < C ,
where C represents the capacity of two independent Gaussian channels in parallel given by log 2 ( 1 + R · E s / N 0 ) , E s is the average energy per source bit, and  N 0 is the one-sided noise power spectral density. Given p and R, the Shannon limit can be interpreted by the smallest E s / N 0 satisfying (10) and expressed as
E s N 0 Shannon = 2 H ( p ) R 1 R .
For the QAM-modulated AWGN channel with the alphabet X and the input probability distribution P B s ( X , ϕ ) given by (9), the channel capacity is calculated as
C B s E s N 0 , ϕ = X X P ( X , ϕ ) + P α ( Y | X ) log 2 P α ( Y | X ) X X P ( X , ϕ ) P α ( Y | X ) d Y ,
where α = E s N 0 R N 0 / X X P ( X , ϕ ) X 2 and P α ( Y | X ) = 1 π N 0 exp ( Y α X ) 2 N 0 ,
According to (12), C B s E s N 0 , ϕ for a given source probability p and a source code matrix B s is conditional on E s / N 0 and the mapping function ϕ . Thus, by properly designing ϕ , a shaping gain in E s / N 0 can be obtained. However, it is impossible to derive an analytical solution to ϕ , and the search for ϕ has to resort to an exhaustive method.
In Algorithm 1, an adaptive design procedure is proposed to search for the optimal mapping function ϕ , also known as the optimal bit-labeling, according to the given source probability p and the source code B s at a target transmission rate R. For a practical search, we start from the smallest E s / N 0 satisfying (10), denoted by E s N 0 Shannon , and gradually increase the value of E s / N 0 until the achievable system rates, denoted as C B s E s N 0 , ϕ / H ( p ) , is around R, at which point we wish to optimize the bit-labeling. Then, we evaluate the channel capacity C B s E s N 0 , ϕ for different mapping functions and select the mapping function which exhibits the highest capacity. Note that the number of different labelings is very large for the constellation with high-order modulations such as 16QAM, so we focus on Gray codes due to their good error rate performance.
Example: Consider p = 0.05, m = 4, R = 6 bits/symbol, Δ = 0.1 dB. The source code is the 1/2-rate- B s , 1 code [15]. In Figure 4, the achievable system rates R = C B s E s N 0 , ϕ / H ( p ) versus E s / N 0 for a 16QAM constellation using the optimized labeling L o p t 1 and labeling L are provided. For comparison, the Shannon limits C / H ( p ) are also provided. Compared to labeling L, when R is 6 bits/symbol, the JSCCM system with the optimized labeling can obtain 0.5 dB shaping gain, which reduces the gap to the Shannon limit.
Algorithm 1 Adaptive Bit-Labeling Design
Require:  p , B s , R , Δ , ϕ i n i
1:
C H ( p ) R ;
2:
snr min 10 log 10 2 C 1 R ;       \∗Shannon limit∗\
3:
snr snr min , ϕ ϕ i n i
4:
for all gray mappings ϕ ( ϕ ϕ i n i ) do
5:
   compute P B s ( X , ϕ ) with p, B s and ϕ ;
6:
   compute C B s 10 snr / 10 , ϕ with P B s X , ϕ , snr and ϕ ;
7:
   while  C B s 10 snr / 10 , ϕ / H ( p ) < R  do
8:
      snr = snr + Δ
9:
   end while
10:
   compute C B s 10 ( snr Δ ) / 10 , ϕ and C B s 10 snr / 10 , ϕ ;
11:
   if  C B s 10 ( snr Δ ) / 10 , ϕ C B s 10 ( snr Δ ) / 10 , ϕ and C B s 10 snr / 10 , ϕ C B s 10 snr / 10 , ϕ  then
12:
      ϕ ϕ ;
13:
      snr snr min
14:
   end if
15:
end for
15:
return  ϕ ;
To further verify the merits of the proposed bit-labelings, we present some bit-error-rate (BER) results of the JSCCM systems with 16QAM over an AWGN channel for different source codes and source probabilities. For all the cases, the same Protograph LDPC code (3/4-rate- B c U [21]) is employed as a channel code. And four Protograph LDPC codes, including the 1/2-rate- B s , 1 code [15], the 1/2-rate- B R 4 J A code [19], the 3/8-rate- B s , 2 code [22], and the 3/8-rate- B s , 3 code [23], are used for source coding as follows:
B s , 1 = 1 1 3 3 1 0 1 0 5 2 0 1 1 2 3 3 1 1 .
B R 4 J A = 3 1 1 1 1 2 1 2 .
B s , 2 = 2 1 1 1 1 1 1 1 1 2 0 1 2 1 1 0 1 1 2 1 0 2 0 1 .
B s , 3 = 2 1 0 2 3 1 1 1 1 2 1 2 1 3 0 2 1 1 2 1 1 0 3 2 .

4. Experimental Results

The system settings for different cases are presented in Table 1. In particular, since the source coding rates are 1 / 2 and 3 / 8 , the resulting system rates are derived from (7) are 6 bits and 8 bits per symbol, respectively. In all experiments, the length of the source sequence is set as 3600 bits. For cases with different source coding rates, the source and channel codes are designed from case to case with respect to the source and channel coding rates, respectively. The optimal labelings obtained by Algorithm 1 for different cases are shown in Figure 5 and Figure 6 above the constellation points.
The BER curves of the system with the optimized labelings (solid lines) and the labeling L (dashed lines) for different cases are depicted in Figure 7, Figure 8, Figure 9 and Figure 10. For instance, in Figure 7, for the source code B s , 1 , the optimized labeling L o p t 1 achieves approximately 0.5 dB gain over labeling L at a BER of 10 6 . Additionally, for the source code B R 4 J A , our designed L o p t 2 outperforms L by approximately 1.3 dB at a BER of 10 5 . Similar observations can be found in Figure 8, Figure 9 and Figure 10. Particularly, the source code B s , 2 in Figure 10, which has extremely poor BER performance with labeling L, achieves a performance gain of at least 3 dB after labeling design. Specifically, the performance gain varies depending on the matching degree of the utilized labeling to the source code and the source probability. For example, using a bit labeling that is highly mismatched to the source probability and the source code could yield a loss of shaping gain, and the performance can be greatly improved by the proposed design of bit-labeling. If the labeling is well matched to the source probability and the source code, the advantage of our method diminishes.

5. Conclusions

In this paper, a new PAS scheme via bit-labeling design for the JSCCM system is proposed. In contrast to the fixed labeling, an algorithm of adaptive bit-labeling design is proposed according to the source probability and the source code based on the achievable system rate analysis. Simulation results demonstrate that the adaptively designed bit-labelings significantly improve the BER performance of the JSCCM system.

Author Contributions

Conceptualization, C.C. and Q.C.; methodology, C.C. and S.L.; software, C.C.; validation, S.L., L.Z., and Q.C.; formal analysis, C.C. and S.L.; investigation, C.C.; resources, S.L.; data curation, C.C.; writing—original draft preparation, C.C.; writing—review and editing, Q.C.; visualization, C.C.; supervision, Q.C.; project administration, C.C.; funding acquisition, C.C. and Q.C. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the National Natural Science Foundation of China under Grants 61901182 and 62101195; the Science Foundation of the Fujian Province, China (Grant No. 2020J05056); the Fujian Province Young and Middle-aged Teacher Education Research Project (No. JAT220182); the Fundamental Research Funds for the Central Universities (ZQN-1008); and the Scientific Research Funds of Huaqiao University (19BS206, 20BS105, and 21BS118).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
AWGNAdditive white Gaussian noise
BERBit error rate
BICMBit interleaved coded modulation
DMDistribution matcher
JSCCJoint source-channel coding
JSCCMJoint source-channel coded modulation
PASProbabilistic amplitude shaping
PEGProgressive edge growth
QAMQuadrature amplitude modulation

References

  1. Caire, G.; Taricco, G.; Biglieri, E. Bit-interleaved coded modulation. IEEE Trans. Inf. Theory 1998, 3, 927–946. [Google Scholar] [CrossRef] [Green Version]
  2. Forney, G.D.; Gallager, R.G.; Lang, G.; Longstaff, F.; Qureshi, S. Efficient modulation for band-limited channels. IEEE J. Sel. Areas Commun. 1984, 5, 632–647. [Google Scholar] [CrossRef] [Green Version]
  3. Böcherer, G.; Steiner, F.; Schulte, P. Bandwidth efficient and rate-matched low-density parity-check coded modulation. IEEE Trans. Commun. 2015, 12, 4651–4665. [Google Scholar] [CrossRef] [Green Version]
  4. Steiner, F.; Böcherer, G.; Liva, G. Bit-metric decoding of non-binary LDPC codes with probabilistic amplitude shaping. IEEE Commun. Lett. 2018, 11, 2210–2213. [Google Scholar] [CrossRef] [Green Version]
  5. Steiner, F.; Böcherer, G.; Liva, G. Protograph-based LDPC code design for shaped bit-metric decoding. IEEE J. Sel. Areas Commun. 2016, 2, 397–407. [Google Scholar] [CrossRef] [Green Version]
  6. Corlay, V.; Gresset, N. A simple sign-bit probabilistic shaping scheme. IEEE Commun. Lett. 2022, 4, 763–767. [Google Scholar] [CrossRef]
  7. Kang, W. A probabilistic shaping scheme for bit-interleaved coded modulation with iterative decoding. IEEE Commun. Lett. 2022, 11, 2517–2521. [Google Scholar] [CrossRef]
  8. Schulte, P.; Böcherer, G. Constant composition distribution matching. IEEE Trans. Inf. Theory. 2016, 62, 1–5. [Google Scholar] [CrossRef] [Green Version]
  9. Perkert, R.; Kaindl, M.; Hindelang, T. Iterative source and channel decoding for GSM. In Proceedings of the IEEE ICASSP, Salt Lake City, UT, USA, 7–11 May 2001; pp. 2649–2652. [Google Scholar]
  10. Othman, N.S.; El-Hajjar, M.; Alamri, O.; Hanzo, L. Soft-bit assisted iterative AMR-WB source-decoding and turbo-detection of channel-coded differential space-time spreading using sphere packing modulation. In Proceedings of the IEEE VTC-Spring, Dublin, Ireland, 22–25 April 2007; pp. 2010–2014. [Google Scholar]
  11. Kliewer, J.; Gortz, N. Iterative source-channel decoding for robust image transmission. In Proceedings of the IEEE ICASSP, Orlando, FL, USA, 13–17 May 2002; pp. 2173–2176. [Google Scholar]
  12. Zhu, G.; Alajaji, F. Joint Source-Channel Turbo Coding for Binary Markov Sources. IEEE Trans. Signal Process. 2006, 5, 1065–1075. [Google Scholar]
  13. Nasruminallah; El-Hajjar, M.; Othman, N.S.; Quang, A.P.; Hanzo, L. Over-complete mapping aided, soft-bit assisted iterative unequal error protection H.264 joint source and channel decoding. In Proceedings of the IEEE VTC-Fall, Calgary, AB, Canada, 21–24 September 2008; pp. 1–5. [Google Scholar]
  14. Chen, Q.; He, Y.; Chen, C.; Zhou, L. Optimization of protograph LDPC codes via surrogate channel for unequal power allocation. IEEE Trans. Commun. 2023. early access. [Google Scholar] [CrossRef]
  15. Chen, C.; Chen, Q.; Wang, L.; He, Y.-C.; Chen, Y. Probabilistic shaping for protograph LDPC-coded modulation by residual source redundancy. IEEE Trans. Commun. 2021, 7, 4267–4281. [Google Scholar] [CrossRef]
  16. Agrell, E.; Lassing, J.; Ström, E.G.; Ottosson, T. On the optimality of the binary reflected Gray code. IEEE Trans. Inf. Theory 2004, 12, 3170–3182. [Google Scholar] [CrossRef]
  17. Nguyen, V. Design of Capacity-Approaching Protograph-Based LDPC Coding Systems. Ph.D. Dissertation, University of Texas at Dallas, Dallas, TX, USA, December 2012. [Google Scholar]
  18. He, J.; Li, Y.; Wu, G.; Qian, S.; Xue, Q.; Matsumoto, T. Performance improvement of joint source-channel coding with unequal power allocation. IEEE Wirel. Commun. Lett. 2017, 5, 582–585. [Google Scholar] [CrossRef] [Green Version]
  19. Divsalar, D.; Dolinar, S.; Jones, C.R.; Andrews, K. Capacity approaching protograph codes. IEEE J. Sel. Areas. Commun. 2009, 6, 876–888. [Google Scholar] [CrossRef]
  20. Chen, C.; Wang, L.; Lau, F.C.M. Joint optimization of protpgraph LDPC code pair for joint source and channel coding. IEEE Trans. Commun. 2018, 8, 3255–3267. [Google Scholar] [CrossRef]
  21. Uchikawa, H. Design of non-precoded protograph-based LDPC codes. In Proceedings of the IEEE International Symposium on Information Theory (ISIT), Honolulu, HI, USA, 29 June–4 July 2014; pp. 2779–2783. [Google Scholar]
  22. Chen, Q.; Wang, L. Design and Analysis of Joint Source Channel Coding Schemes Over Non-Standard Coding Channels. IEEE Trans. Veh. Technol. 2020, 5, 5369–5380. [Google Scholar] [CrossRef]
  23. Lyu, Y.; Wang, L.; Cai, G.; Chen, G. Iterative receiver for M-ary DCSK systems. IEEE Trans. Commun. 2015, 11, 3929–3936. [Google Scholar] [CrossRef]
Figure 1. The structure of a JSCCM system.
Figure 1. The structure of a JSCCM system.
Entropy 25 00586 g001
Figure 2. A 16-QAM constellation with two labelings: L and L (in parentheses).
Figure 2. A 16-QAM constellation with two labelings: L and L (in parentheses).
Entropy 25 00586 g002
Figure 3. BER performance of JSCCM system with two labelings.
Figure 3. BER performance of JSCCM system with two labelings.
Entropy 25 00586 g003
Figure 4. Achievable system rates for a 16QAM constellation using different labelings.
Figure 4. Achievable system rates for a 16QAM constellation using different labelings.
Entropy 25 00586 g004
Figure 5. The optimized bit-labelings L o p t 1 , L o p t 2 (in parentheses) and L o p t 3 (in bold) for JSCCM system.
Figure 5. The optimized bit-labelings L o p t 1 , L o p t 2 (in parentheses) and L o p t 3 (in bold) for JSCCM system.
Entropy 25 00586 g005
Figure 6. The optimized bit-labelings L o p t 4 , L o p t 5 (in parentheses) and L o p t 6 (in bold) for JSCCM system.
Figure 6. The optimized bit-labelings L o p t 4 , L o p t 5 (in parentheses) and L o p t 6 (in bold) for JSCCM system.
Entropy 25 00586 g006
Figure 7. BER comparison of different labelings with p = 0.05 and R = 6 .
Figure 7. BER comparison of different labelings with p = 0.05 and R = 6 .
Entropy 25 00586 g007
Figure 8. BER comparison of different labelings with p = 0.03 and R = 8 .
Figure 8. BER comparison of different labelings with p = 0.03 and R = 8 .
Entropy 25 00586 g008
Figure 9. BER comparison of different labelings with p = 0.94 and R = 6 .
Figure 9. BER comparison of different labelings with p = 0.94 and R = 6 .
Entropy 25 00586 g009
Figure 10. BER comparison of different labelings with p = 0.98 and R = 8 .
Figure 10. BER comparison of different labelings with p = 0.98 and R = 8 .
Entropy 25 00586 g010
Table 1. System settings for performance comparisons.
Table 1. System settings for performance comparisons.
Source ProbabilitySource CodeTarget Rate (Bits/Symbol)Optimized Labeling
p = 0.05 B s , 1 6 L o p t 1
p = 0.05 B R 4 J A 6 L o p t 2
p = 0.03 B s , 2 8 L o p t 3
p = 0.03 B s , 3 8 L o p t 2
p = 0.94 B s , 1 6 L o p t 4
p = 0.94 B R 4 J A 6 L o p t 2
p = 0.98 B s , 2 8 L o p t 5
p = 0.98 B s , 3 8 L o p t 6
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Chen, C.; Chen, Q.; Liu, S.; Zhou, L. Adaptive Bit-Labeling Design for Probabilistic Shaping Based on Residual Source Redundancy. Entropy 2023, 25, 586. https://doi.org/10.3390/e25040586

AMA Style

Chen C, Chen Q, Liu S, Zhou L. Adaptive Bit-Labeling Design for Probabilistic Shaping Based on Residual Source Redundancy. Entropy. 2023; 25(4):586. https://doi.org/10.3390/e25040586

Chicago/Turabian Style

Chen, Chen, Qiwang Chen, Sanya Liu, and Lin Zhou. 2023. "Adaptive Bit-Labeling Design for Probabilistic Shaping Based on Residual Source Redundancy" Entropy 25, no. 4: 586. https://doi.org/10.3390/e25040586

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop