AU739896B2 - System, device and method for improving a defined property of transform-domain signals - Google Patents

System, device and method for improving a defined property of transform-domain signals Download PDF

Info

Publication number
AU739896B2
AU739896B2 AU34871/99A AU3487199A AU739896B2 AU 739896 B2 AU739896 B2 AU 739896B2 AU 34871/99 A AU34871/99 A AU 34871/99A AU 3487199 A AU3487199 A AU 3487199A AU 739896 B2 AU739896 B2 AU 739896B2
Authority
AU
Australia
Prior art keywords
symbols
perturbation
bits
domain
offset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
AU34871/99A
Other versions
AU3487199A (en
Inventor
M. Vedat Euyboglu
Frank Robert Kschischang
Aradhana Narula
Jian Yang
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Motorola Solutions Inc
Original Assignee
Motorola Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Motorola Inc filed Critical Motorola Inc
Publication of AU3487199A publication Critical patent/AU3487199A/en
Application granted granted Critical
Publication of AU739896B2 publication Critical patent/AU739896B2/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/02Amplitude-modulated carrier systems, e.g. using on-off keying; Single sideband or vestigial sideband modulation
    • H04L27/04Modulator circuits; Transmitter circuits
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/32Carrier systems characterised by combinations of two or more of the types covered by groups H04L27/02, H04L27/10, H04L27/18 or H04L27/26
    • H04L27/34Amplitude- and phase-modulated carrier systems, e.g. quadrature-amplitude modulated carrier systems
    • H04L27/3405Modifications of the signal space to increase the efficiency of transmission, e.g. reduction of the bit error rate, bandwidth, or average power
    • H04L27/3411Modifications of the signal space to increase the efficiency of transmission, e.g. reduction of the bit error rate, bandwidth, or average power reducing the peak to average power ratio or the mean power of the constellation; Arrangements for increasing the shape gain of a signal set
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/26Systems using multi-frequency codes
    • H04L27/2601Multicarrier modulation systems
    • H04L27/2614Peak power aspects
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/26Systems using multi-frequency codes
    • H04L27/2601Multicarrier modulation systems
    • H04L27/2614Peak power aspects
    • H04L27/2615Reduction thereof using coding

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Digital Transmission Methods That Use Modulated Carrier Waves (AREA)
  • Noise Elimination (AREA)

Description

WO 99/53663 PCT/US99/07841 SYSTEM, DEVICE AND METHOD FOR IMPROVING A DEFINED PROPERTY OF TRANSFORM-DOMAIN SIGNALS Related Application This application is a continuation-in-part of US Application No.
09/058,671 filed April 10, 1998, which is hereby incorporated by reference in its entirety.
Field Of Invention This invention relates to a system, device and method for improving a defined property of transform-domain signals, and more particularly to a system, device and method for reducing the peak-to-average energy ratio (PAR) of time-domain signals.
Background Of Invention The large time-domain peak-to-average energy ratio (PAR) of discrete multitone (DMT) signals is often cited as a major disadvantage of DMT systems. This problem exists in systems using other modulation schemes as well, such as in systems using orthogonal frequency division multiplexing (OFDM) and orthogonal quadrature amplitude modulation
(OQAM).
A large PAR requires implementation of a high-precision digital-toanalog converter (DAC), or else requires the system to be tolerant of signal distortion (clipping) introduced when input signals exceed the DAC range. For a fixed DAC precision, scaling the input signal so that signal values are always within range may result in excessive quantization noise; on the other hand, insufficient signal scaling may result in excessive clipping noise.
A number of approaches to reduce the time-domain peak amplitude of DMT and OFDM symbols have been proposed. These techniques can be divided into three classes. In the first class, multiple symbols are used to represent the same data and side information, transmitted on reserved tones, is used to tell the receiver which of the symbols was transmitted. For example in J.S. Chow, J.A.C. Bingham, and M.S.
Flowers, "Mitigating clipping noise in multicarrier systems," Proc. 1997 Int.
Conf. Commun. (ICC'97), pp. 715-719, June 1997, if the peak of the DMT symbol is too high, the DMT symbol is scaled and reserved tones are used to relay the scaling factor to the receiver. This technique reduces the signal-to- WO 99/53663 PCT/US99/07841 noise ratio (SNR) of the transmitted symbol and thus results in an increased bit error rate. In Djokovic, "PAR reduction without noise enhancement", submission T1E1.4/97 270 to ADSL Standard Issue 2, Sept. 1997., the transmitter chooses between the original DMT symbol and its conjugate formed by scrambling the original symbol. In D.J. Mestdagh and P.M. Spruyt, "A method to reduce the probability of clipping in DMT-based transceivers," IEEE Trans. On Commun., vol. 44. 1234-1238, Oct. 1996, a pseudo-random phase sequence is added to the original DMT symbol. The most significant drawback with this class of techniques is that the transmitter must relay side information about the transmitted symbol to the receiver. In addition to incurring a data rate loss or an increase in bandwidth, if the side information is corrupted, the entire DMT symbol will be destroyed.
The second class of PAR reduction techniques is based on determining sequences which have good PAR properties. See for example, S. Shepherd, J. Orriss, and S. Barton, "Asymptotic limits in peak envelope power reduction by redundant coding in orthogonal frequency-division multiplex modulation," IEEE Trans. on Commun., vol. 46, pp. 5-10, Jan. 1998. These methods generally involve removing "bad" time-domain sequences from the set of possible transmitted symbols and thus result in a data rate loss. Furthermore, these methods require mapping the data to the "good" symbols. This map is generally accomplished via a lookup table. The size of the required lookup table becomes impractical in a DMT system with many tones and large constellation sizes.
In the third class of schemes, PAR reduction is achieved via a redundant signal representation, in which a given data block can be represented by any of a number of possible transmitted signals from some equivalence class, with the "most desirable" class representative---in this case, a representative with small time-domain peak value---chosen for transmission. In such schemes, the receiver is designed to operate "modulo equivalence classes" producing the data block associated with an equivalence class whenever it detects an element of that class. In this way, the receiver requires no knowledge of the precise algorithm used to select a class representative at the transmitter. One way to operate "modulo 'equivalence classes" in the DMT case is to have the receiver simply ignore the contents of various frequency bins. See A. Gatherer and M. Polley, "Controlling clipping probability in DMT transmission," Conf. Record 31 Asilomar Conf. On Sign. Sys. And Comp., Nov. 1997; A. Gatherer and M.
WO 99/53663 PCT/US99/07841 Polley, "Proposed PAR Reduction Techniques for G.lite," Universal ADSL Technical Group Contribution TG/98-025, Feb. 4, 1998; J. Tellado and J.M.
Cioffi, "PAR reduction in multicarrier transmission systems," contribution 97- 367 to TI E1.4 standards committee, Dec. 1997. For any given data block, the transmitter can place values in these unused bins to minimize (as far as possible) the peak value of the transmitted time-domain signal. These techniques incur a significant data rate loss since several bins are not used to transmit data.
Therefore, there exists a need for a PAR reduction technique which utilizes the data carrying or complex frequency bins in DMT modulation schemes to reduce PAR without affecting the data rate. There is also a need for such a technique which can be applied generally to other modulation schemes and to improve other properties of the time-domain, or, in general, the transform-domain signal.
Brief Description of the Drawings FIG. 1A is a schematic block diagram of a DMT transmitter configured according to this invention; FIG. 1B is a schematic block diagram of an alternative DMT transmitter configuration according to this invention; FIG. 2 is an expanded signal point constellation in accordance with this invention; FIG. 3 is a schematic block diagram of a receiver configured according to this invention; FIG. 4 is a schematic block diagram of the offset coset representative generator of FIGS. 1A and 1B; FIG. 5 is a schematic block diagram of the perturbation device of FIG.
1A; FIG. 6 is a schematic block diagram of the valid perturbation generator in the perturbation device of FIG. FIG. 7 is a schematic block diagram of the perturbation selector in the perturbation device of FIG. FIG. 8 is a schematic block diagram of the offset decoder of the receiver of FIG. 3; FIG. 9 is a schematic block diagram of an alternative, frame based configuration of the offset coset representative generator of FIGS. 1A and 1B; WO 99/53663 PCT/US99/07841 FIG. 10A is a schematic block diagram of an alternative, frame based configuration of the perturbation device of FIG. 1A; FIG. 10 OB is a schematic block diagram of the perturbation device of FIG. 10A incorporating look-ahead; FIG. 11 is a schematic block diagram of a valid perturbation generator depicted in FIG. FIG. 12 is a schematic block diagram of a perturbation selector depicted in FIG. FIG. 13 is a schematic block diagram of an alternative, frame based configuration of the offset decoder of FIG. 3; FIG. 14 is a schematic block diagram of an alternative configuration of the perturbation selector of FIG. 5 for use in a DSL spliterless application; and FIG. 15 is an alternative, rotated expanded signal point constellation in accordance with this invention.
Description of a Preferred Embodiment The present invention is generally directed to a system and method for improving a defined property of a signal after block transformation, hereinafter referred to as a transform-domain signal. In order to provide a more readily understandable description of the invention we describe herein an actual application of the invention to reduce the peak-to-average energy ratio (PAR) of the time-domain signal (more generally referred to herein as the transformdomain signal) in discrete multitone (DMT) modulation schemes. It will be apparent to those skilled in the art that the invention is generally applicable to other modulation schemes, such as orthogonal frequency division multiplexing (OFDM), and orthogonal quadrature amplitude modulation (OQAM). Moreover, it will be apparent to those skilled in the art that the invention may be used to improve other defined properties in the transform-domain signal in addition to PAR. For example, it may also be used to shape the spectrum of the transform-domain signal after it goes through a non-linearity, as for example in the splitterless operation of a DSL system where it is desirable to reduce the voiceband (O-4kHz) interference generated by the non-linearity in the plain old telephone service (POTS) phone.
The transmitting scheme of the DMT system is based on blocks of N symbols. Each symbol in a block corresponds to a different frequency bin.
Thus, each symbol block X consists of frequency domain symbols XO-XN.l. In asymmetrical digital subscriber line (ADSL) systems using DMT (assuming N is even), there are no symbols transmitted in the zero (X 0 and Nyquist (XN, 2 WO 99/53663 PCT/US99/07841 frequency bins. There are symbols transmitted in the lower N/2-1 complex frequency bins (Xl-X, 2 and the upper N/2-1 complex frequency bins XN.l) are selected as the complex conjugate images of the lower N/2-1 bins so that the resulting frequency-domain signal possesses the Hermitian symmetry needed to make the time-domain signal real-valued. Therefore, there are actually n (where n=N/2-1) complex frequency bin symbols per block.
As shown in FIG. 1A the DMT transmitter 10 receives a serial digital bit stream over line 12 from data terminal equipment (not shown), such as a personal computer. The serial bit stream is converted to parallel format by a serial to parallel converter 14. For each block, serial to parallel converter outputs (kn-r)+m information bits, v and u, where r is a number of redundancy bits and k is a number of bits needed to represent the equivalence classes in the expanded constellation. The variables rand k as well as the terms equivalence class and expanded constellation are described below.
As noted above, n is the number of complex frequency bin symbols generated per block. The m base information bits, u, correspond to m m 2 where mi represents the number of base information bits transmitted in complex frequency bin i. For each of the n complex frequency bins, base constellation mapper maps mi base information bits into a symbol from a base constellation. The ith base constellation contains 2" points.
In the base constellation mapper 16, a base constellation for each frequency bin is determined by the channel quality for the frequency bin and n base symbols, g, for each block are generated. The channel quality is typically determined by probing the channel during a training sequence. The size of the constellation, and hence the number of input data bits that can be represented by the symbol chosen from the constellation, is dependent upon the quality of the channel in the frequency range of the bin. A channel having better quality can use a denser constellation with more closely spaced points and therefore more bits can be transmitted with each symbol. Thus, the number of input data bits represented by a block of symbols is dependent upon the quality of the channel.
To illustrate the general idea of a base constellation in accordance with this invention with a specific example, consider a DMT system with base constellation capable of transmitting two bits per symbol. In FIG. 2, there is shown base constellation 30 (which is assumed to reside in one quadrant) containing points A, B, C, and D, from which the base constellation symbols are selected by the base constellation mapper 16. Also in accordance with this invention, at least some of the base constellations are expanded to WO 99/53663 PCT/US99/07841 include additional points beyond the points necessary to transmit mi base information bits per symbol. These expanded constellations are partitioned into equivalence classes.
The base signal constellations are expanded to support the transmission of up to k additional bits per symbol. Some of these kn bits are used to send additional information bits while others can be used to provide the transmitter with some flexibility in choosing the transmitted symbols. This extra degree of freedom can be used to optimize some objective function of the resulting signal for example the peak time-domain amplitude or the spectral shape of the transmitted signal after a non-linear transformation. We refer to these kn additional bits as "offset bits." In the example depicted in FIG. 2, base constellation 30 is expanded by a factor of 4 to form 16 point expanded constellation 32. Therefore, k=2 offset bits per symbol are needed to determine which of the equivalent points in expanded constellation 32 is transmitted. Expanded constellation 32 includes base constellation 30 and expansion areas 34, 36, and 38 each containing four points labeled A-D. All the points with the same label belong to the same equivalence class..
In the example of FIG. 2, the expanded constellation is formed from the base constellation by repeating the base constellation in each of the four quadrants. The minimum distance between neighboring points in the constellation for the ith symbol is defined as di. This distance is dependent upon channel quality. This type of constellation expansion will be referred to as an additive expansion because the equivalent points in the expanded constellation are generated by adding a value (0 or -2d in each dimension in this example) to points in the base constellation.
In this example, we have expanded the base constellation by a factor of 4. Of course, the base constellation can also be expanded by a factor larger than 4. For example, by adding 0 or integer multiples of +l-2d, in each dimension to points in the base constellation, we can generate additional equivalence class points. As will be seen below, both the performance capability and system complexity increase with larger constellation expansions. For a general square constellation with c points, expanded constellation points may be generated by adding integer multiples of cd,/2 in each dimension. Other methods of generating expanded constellations containing several constellation point equivalence classes will be clear to those skilled in the art. Below an expanded constellation generated via rotation of the base constellation is described.
WO 99/53663 PCTIUS99/07841 Referring again to FIG. 1A, kn-r bits, v, are provided to offset coset representative generator 18 which produces kn offset (or more particularly coset representative offset) bits. The n base symbols g and the kn coset representative offset bits t are combined by expanded constellation mapper to form n expansion symbols, h, from the expanded constellations. In the example above, with k=2, the base symbols g correspond to the base constellation points and the k offset bits select the quadrant of the corresponding symbols. The n expansion symbols are mapped to a block of N conjugate symmetric symbols X (XO-XN.1) by Hermitian symmetry block generator 22 In Hermitian symmetry block generator 22, the n symbols are mapped to symbols X, XN, 2 .1 and symbols XN, 2 XN_ are the complex conjugates of X, XN/ 2 -1 The block of N symbols X is provided to an invertible transform device, such as inverse discrete Fourier transform (IDFT) device 24 which transforms the N frequency domain symbols into N time-domain symbols x Perturbation device 26 modifies the N time-domain symbols x to produce perturbed time-domain blocks y by modifying the coset representative offset bits t to improve a defined property of the N time domain symbols, in this example, minimizing the peak value, as described below. The perturbed time-domain blocks y are provided to parallel to serial converter 28 which converts the perturbed time-domain blocks y from parallel form to serial form and transmits them over the channel.
Base constellation mapper 16, offset coset representative generator 18, expanded constellation mapper 20 and Hermitian symmetry block generator 22 collectively form signal mapper 23 which maps the input data from serial to parallel converter 14 to blocks X of frequency domain symbols. And, IDFT device 24 and perturbation device 26 collectively form perturbation/transform device 27.
In FIG. 3 there is shown a schematic block diagram of receiver according to this invention. The perturbed time domain symbols y, after going through the channel, are received as symbols w at serial to parallel converter 44 which receives the time-domain symbols w in serial form and converts them to blocks of received time-domain symbols w, wO-wN.1- The blocks of received time-domain symbols w, wO-wN1, are provided to discrete Fourier transform (DFT) device 46 which converts the blocks of time domain symbols into blocks of received frequency-domain symbols W, WO-WN.. The blocks of received frequency-domain symbols W, WO-WN.1 are provided to frequency domain equalizer device 48 which takes into account the effect of the channel on the transmitted perturbed frequency domain blocks Y YOY-YN.-1, and scales WO 99/53663 PCT/US99/07841 the received symbols W, Wo-WN.l, to produce symbols Y'O-Y'N.1 which are estimates of the transmitted blocks Y,YO-YN1.
The estimates of the transmitted perturbed frequency domain blocks Y' are provided to base symbol and offset extractor 50 which extracts base symbols g and valid perturbation offset bits s. These bits do not correspond exactly to coset representative offset bits t because the offset bits were modified in perturbation device 26, FIG. 1A. The base symbol and offset extractor 50 first decodes each of the n symbols g transmitted in the block of N symbols, Y, to a point in the corresponding expanded constellation. The offset bits s of these n symbols are provided to offset decoder 52 to recover the offset information bits which are equivalent to offset information bits v, as described below. The n base symbols g are provided to base constellation demapper 54, to recover the m base information bits u. The base symbols g correspond to points in the base constellations.
The decoded information bits, u and v, may then be further processed and provided to data terminal equipment, such as a personal computer.
Offset Coset Representative Generator Offset coset representative generator 18 is depicted in more detail in FIG. 4. The offset information bits v, considered to be a 1 x (kn-r) row vector, are post-multiplied (modulo 2) filtered) in matrix block 60 by matrix H
T
having kn-r rows and kn columns to produce the 1 x kn row vector of coset representative offset bits t which are provided to expanded constellation mapper 20 and perturbation device 26, FIG. 1.
An example of matrix H.T when there are n=3 symbols transmitted per block, k=2 and there is one redundancy bit per symbol is as follows: 1 0 0 0 0 0
H
T 0 0 1 0 0 0 (1) 0 0 0 0 1 0 In this example, if the offset information bits are given by v [v 0 v 1 v2], the output bits are simply the input bits padded with zeros, i.e. t [v O 0 v 1 0 v 2 0].
Perturbation Device Perturbation device 26 is depicted in more detail in FIG. 5. Perturbation device 26 operates in the time-domain to perturb the blocks of symbols; however, it can be readily modified to operate in the frequency domain as with WO 99/53663 PCT/US99/07841 perturbation device 26' in perturbation/transform device 27', FIG. lB. The kn coset representative offset bits t are provided to valid perturbation generator The valid perturbation generator 70, generates 2" valid perturbation vectors (or some subset thereof to reduce complexity), where r is the number of redundancy bits. In general, the "perturbations" are not additive, but can be considered as such according to the following scheme. Let y, be the perturbed time domain block corresponding to perturbation i, i=0,1, 2' Let pi y x, where x=y o The vectors i=0,1, are referred to as "valid perturbation vectors" and x is referred to as the "nominal time-domain block." The perturbation selector 72 receives these 2' valid perturbation vectors (or some subset thereof), p and adds each of these perturbation vectors to the nominal time-domain block x to generate yi= x The vector y with smallest time-domain peak (or that which achieves some other objective function) is selected for transmission.
If the expanded constellation is formed by expanding the base constellation for each of the n symbols by a factor of 2 k, then in addition to the m base bits, kn offset bits t can be transmitted over the channel in each block of symbols. Of these kn offset bits, kn-rcoset representative offset bits are used to send additional information bits and the flexibility afforded by r redundancy bits is used to improve a desired property of the transform-domain signal. Larger values of r provide greater flexibility in improving the defined property of the transform-domain signal, but result in lower bit rates for information transmission.
Valid perturbation generator Valid perturbation generator 70 is described herein based on binary linear codes, though it will be apparent to those skilled in the art that this structure can be extended to non-binary group codes.
Valid perturbation generator 70, FIG. 6, generates valid perturbation vectors that correspond to modifications of the offset for each symbol. The kn coset representative offset bits t provided to valid perturbation generator define a coset representative for a defined linear code C generated by perturbation codeword generator 80 using a matrix G having r rows and kn columns.
Matrix G and matrix block H T 60, FIG. 4, are selected such that GHT=O where H is a matrix having kn-r rows and kn columns, itself satisfying the property that HTHT Ikn., where Ikn,r is the (kn-r) x (kn-r) identity matrix. In other words, HT is a right inverse of HT. It is required that G have row rank r WO 99/53663 PCT/US99/07841 and that H have row rank kn-r. An example of matrix G when n=3, r=3 and k=2 is shown as follows: 0 1 0 1 0 1 G 0 1 0 1 0 0 (2) 0 1 0 0 0 0 Here G can be chosen as the generator matrix for any well-known binary linear code, or it could correspond to the generator matrix for a truncated or terminated convolutional code, optimized for Hamming distance properties or according to some other criterion.
Using the kn coset representative offset bits t, valid perturbation generator 70 modifies offset bits t by EXCLUSIVE OR'ing, adding modulo 2, the bits with valid codewords c, defined by matrix G. These codewords, c, r, G, are generated by all 2 r possible choices for the rredundancy bits denoted r, producing 2 r valid codewords The codewords generated by perturbation codeword generator 80 have the property that cHT=O. The result of EXCLUSIVE OR'ing the valid codewords c with the coset representative offset bits t is to produce a set of valid perturbation offset bits s, t c, the valid perturbation offset bits s, are mapped to N-symbol block P, via perturbation mapper 82 and Hermitian symmetry block generator 84, as described below. It should be noted that with this selection process any of the valid perturbation offset bits s, may be used and will be decoded, as described below, to the offset information bits v.
Each set of kn valid perturbation offset bits s, corresponds to k offset bits per symbol. Continuing with the earlier example where it is assumed k=2 and r-n, the offset bits s, define the quadrants of the n symbols. Equivalently, the k=2 bits per symbol define the displacement of the point in the base constellation required to generate the appropriate point in the equivalence class containing the original base constellation point. In the nominal timedomain block x, the offset bits are defined by t. Each s, corresponds to a modification of these offset bits. Equivalently, in the example, the valid perturbation offset bits s, correspond to changing the quadrants of the transmitted symbols. Recall that t was generated from the offset information bits v. Therefore the valid perturbation offset bits si which are formed from t are information dependent.
If HT is defined as in the example above, and r=n (1 redundancy bit per symbol), then the unmodified coset representative offset bits t consist of n WO 99/53663 PCT/US99/07841 pairs of bits, where the second bit in each pair is zero. Therefore the coset representative offset bits t only choose between one of two quadrants, those represented by 00 and by 10. In this example, the valid codewords c, will consist of n pairs of bits whose first bit in each pair is 0. If the second bit in a pair is non-zero, c, modifies the quadrant from 00 to 01 or from 10 to 11. Let d be the distance between neighboring points in the base constellation. In this example, if quadrant 00 is defined to denote the quadrant containing the base constellation, quadrant 10 is defined to be the quadrant below the base constellation, quadrant 01 is defined to be the quadrant to the left of the base constellation, and quadrant 11 is defined to be the remaining quadrant, then the valid perturbation offset bits modify the coset chosen by the information dependent coset representative offset bits t by a perturbation of 0 or -2d for each symbol.
The perturbation mapper 82 maps each set of valid perturbation offset bits s, into n symbol perturbations. These n symbol perturbations represent the resulting perturbation from changing the offset bits from tto si. In other words, recall that each of the n expansion symbols in h was determined from base symbols g and offset bits t. Denote by the n expansion symbols corresponding to base symbols g and offset bits si. The n perturbation symbols q, are the difference between h,'and h, h. In the example above, q, contains perturbations of 0 or -2d in each symbol.
For each set of valid perturbation offset bits the n perturbation symbols (0 or -2d for each symbol in example above) are mapped by the Hermitian symmetry block generator 84 into an N-symbol frequency domain symbol P, with complex conjugate symmetry. The operation of the Hermitian symmetry block generator 84 was described above. The frequency domain symbols P, are provided to IDFT device 86 to generate 2' time-domain perturbation vectors p,.
It will be apparent to those skilled in the art that different values for k, r, H, and G, will lead to different perturbation vectors. Also, different methods of mapping the bits to symbols will lead to different perturbation vectors. The valid perturbation vectors generated are dependent on offset information bits
V.
In general, for a fixed k, H, G, and r, and for a fixed mapping scheme, the set of 2t valid perturbation vectors will come from a set of 2 k possible timedomain perturbation vectors. Instead of generating these valid perturbation vectors for each incoming t as described above, valid perturbation vector generator 70 could store all 2 k possible time-domain perturbation vectors in WO 99/53663 PCT/US99/07841 memory and use the coset representative offset bits tto determine which 2' of these perturbation vectors (or some subset thereof)) are valid for the given t.
Note that if the expanded constellation is not an additive expansion as described above, the perturbation symbols may depend on not only the coset representative offset bits t, but also the base symbols g. In this case there may be more than 2 kn possible time-domain perturbation vectors.
Perturbation Selector Perturbation selector 72 is shown in more detail in FIG. 7. For each of the 2' valid time-domain perturbation vectors perturbed time-domain block y, is computed by block 90, where Then all of the y, perturbed time domain blocks computed are evaluated in block 92 and the y, with the smallest peak value is selected as the perturbed time-domain block of symbols to be transmitted.
Base Symbol and Offset Extractor Base symbol and offset extractor 50, FIG. 3, maps the frequency domain equalized blocks Y'to n symbol points in the expanded constellations.
Each point in the expanded constellation is equivalent to a point in the base constellation (equivalence class representative). The offset signifies which of the 2 k equivalent points was actually transmitted. The 2 k equivalence class points are represented by k offset bits per symbol. The equivalence class point transmitted is represented by kn offset bits, s. These offset bits are provided to the offset decoder 52 which determines the information bits encoded in the offset bits, as described below. The n equivalence class representatives in the base constellations are the estimates of the transmitted base symbols g and are provided to base constellation de-mapper 54 which de-maps these points to estimates of the transmitted base information bits u.
Offset Decoder Offset decoder 52, shown in greater detail in FIG 8, includes matrix block 100. In matrix block 100 the 1 x kn row vector of offset bits s is postmultiplied (modulo 2) filtered) by matrix HT having kn rows and kn-r columns to recover the 1 x (kn-r) row vector of offset information bits v'.
In order to demonstrate how the each of the candidates of valid perturbation offset bits are decoded to the same offset information bits, the encoding and decoding processes must be expressed mathematically. The information bits recovered, v, (decoding) can be expressed mathematically as follows: WO 99/53663 PCT/US99/07841 V= sH T (3) and the valid perturbation offset bits s (encoding) can be expressed mathematically as follows: s VHT rG, (4) where c r G is a valid codeword generated by perturbation codeword generator 80, FIG. 6. If the right hand side of equation is substituted into equation for s, then the following equation is derived: v' vH-
T
H
T rGHT By selecting G, H T and HT so that the following conditions are satisfied: HT
H
T
I (where I is the identity matrix and GHT= 0, then v' v regardless of the value of r.
Frame Based Perturbations In a block based system, such as a DMT based system, bits are mapped to blocks of N symbols. In the invention described above, we assume that the offset bits are modified on a block by block basis. In other words all n=N/2-1 symbols transmitted on the block of N symbols are perturbed jointly.
It may be useful in some cases to divide the blocks into frames having a size less than n symbols. For example if n and r are large, a large set of valid perturbation vectors must be generated and/or stored and/or tested. If smaller frame sizes are used, and the perturbations performed on a frame by frame basis, the number of valid perturbation vectors that must be tested and/or stored and/or generated will be reduced. The cost of this approach is some loss in performance since the perturbations are selected to optimize the desired property on a frame by frame basis. Some of this performance can be recovered by using look-ahead, as described below. This of course again increases the system complexity.
With frame based perturbation, the transmitter of this invention differs in the following two ways: 1)The offset coset representative generator operates on f frames of kn/f bits as described below; and 2)The perturbation device divides its input and operates on fframes of kn/f bits as described below. And, the receiver of this invention differs in one way; namely, the offset decoder divides its input and operates on fframes of kn/f bits as described below.
WO 99/53663 PCT/US99/07841 Note that to simplify the explanation, it is easiest to assume n/f is an integer, otherwise the offset coset representative generator and perturbation device and offset decoder would need to operate on frames of different sizes.
Nevertheless, generalization to the case where n/f is not an integer is straightforward.
Frame Based Offset Coset Representative Generator Offset coset representative generator 18a, FIG. 9, includes frame divider 110 which receives kn-r information bits v and divides the kn-r bits v into frames of size kn/f-r/f. These frames are denoted as v, and n'=n/f and Thus, for each of the fframes, kn'-r' information bits are transmitted via and r' redundancy bits are used to improve a desired property of the transform-domain symbol. These 1 x frames of offset information bits are post-multiplied (modulo 2) filtered) in matrix blocks 1120-112f., by matrix HT having kn'-r' rows and kn' columns to produce a 1 x kn' frame of kn' coset representative offset bits t (to-t The fframes (to-t are concatenated in frame concatenator 114 to form kn coset representative offset bits t which are provided to expanded constellation mapper 20, FIG. 1, and perturbation device 26a, FIG. Frame Based Perturbation Device Perturbation device 26a, FIG. 10A, includes frame divider 120 which receives kn coset representative offset bits t and divides the bits into fframes of size kn', denoted by to-t,. Alternatively, the frames of size kn' can be provided directly from the offset coset representative generator 18a, FIG. 9.
Each frame of coset representative offset bits tis provided to a valid perturbation generator 112j(1120-112,.) which generates 2' valid perturbation vectors (or some subset thereof) and provides these to the jth perturbation selector 124j (1240-124,.,) corresponding to the jth frame.
In general, the perturbations are not additive, but can be considered as such according to the following scheme. Let be the time domain signal corresponding to perturbation i, i=0,1, Let yj jo, and let yo= which will be defined subsequently. The i are referred to as the 'valid perturbation vectors' corresponding to the jth frame of coset representative offset bits t, The jth perturbation selector is provided 2' valid perturbation (or some subset thereof) vectors py, corresponding to the jth frame of coset representative offset bits t, It is also provided with the output of Perturbation WO 99/53663 PCTIUS99/07841 selector 124.,, which will be denoted The first perturbation selector, perturbation selector 124o is provided with nominal time-domain block x, which we will denote by Perturbation selector 124j computes yj, =y 1 for each of the valid perturbation vectors provided to perturbation selector 124j. It provides the y, "with the smallest time domain peak to perturbation selector 124 The last perturbation selector, perturbation selector 12 4 outputs y=y,.
to the channel.
In perturbation device 26a, the perturbations are selected sequentially on a frame by frame basis. The performance of this device can be improved by incorporating look-ahead. That is, instead of selecting the valid perturbation offset bits s, and corresponding perturbed output vector y" based solely on the current frame, perturbation selector 124, may use the valid perturbation offset bits s for the current frame and for future frames to decide which perturbed output vector achieves the lowest peak time-domain power.
To illustrate this idea, consider first a look-ahead depth of 1.
Perturbation device 26b, FIG. 10B, includes perturbation selector 124, which looks at the perturbation vectors entering perturbation selector 124. to determine which valid perturbation offset bits sy combined with valid perturbation offset bits reduces the peak power of y s, the most. Then vector y, s is output to perturbation selector 12 4 Similarly, perturbation selector 12 4 j+ looks ahead to perturbation selector 124j+2.
If the look-ahead depth is A, then perturbation selector 124j looks ahead to the valid perturbation vectors entering perturbation selectors 124j, to 124 to determine which valid perturbation offset bits s, combined with valid perturbation offset bits sj -s reduces the peak power of sj S+ Note that it is not possible in this implementation of the device to look beyond block boundaries. Therefore the last A-1 perturbation selectors will have look-ahead depth less than A. Furthermore, the last A-1 perturbation vectors are fully determined at perturbation selector f-A-1. Perturbation device 26b has a look-ahead depth A=1. When we are trying to improve the peak power of a time-domain block of symbols, looking beyond block boundaries is not helpful. For other objective functions, look-ahead beyond block boundaries may be useful. It will be clear to those skilled in the art that this invention can be modified to look-ahead beyond block boundaries. Note that if the look-ahead depth A is equal to the number of frames in one block f, this WO 99/53663 PCT/US99/07841 scheme reduces to the first perturbation selector described above, it is equivalent to assuming 1 frame of size n symbols.
Frame Based Valid Perturbation Generator The configuration of valid perturbation generators 1220-122,., is depicted in Fig 11. The valid perturbation generators are provided with their respective frames of kn' bits corresponding to frames of n'symbols and generates valid perturbation vectors of N-symbols that are used to modify the time-domain symbol x in order to minimize its peak power.
A valid perturbation generator generates valid perturbation vectors that correspond to modifications of the offset bits for n' symbols in each frame.
The kn' coset representative offset bits t provided to a valid perturbation generator define a coset representative for a defined linear code C generated by perturbation codeword generator 126 using a matrix G having r' rows and kn' columns. Matrix G and matrix block HT (in offset coset representative generator 18, FIG. 1) are selected such that GHT=0 where H is a matrix having kn'-r rows and kn' columns, itself satisfying the property that HTHT Ikn,, where is the x identity matrix. In other words, HT is a right inverse of HT. We require that G have row rank r' and that H have row rank kn'-r'.
In perturbation codeword generator 126, 2 r codewords, (or some subset thereof) c, r, G, are generated by post-multiplying all 2' possible choices (or some subset thereof) for the r' redundancy bits denoted r by G. Codewords generated by perturbation codeword generator 126 have the property that cHT=O. There are 2 r valid codewords Using the kn' coset representative bits the valid perturbation generator modifies coset representative sign bits t by EXCLUSIVE OR'ing, adding modulo 2, the bits with valid codewords c, defined by perturbation codeword generator 126. The resulting valid perturbation bits si,, ty c, are mapped to N-symbol block Pj,, via perturbation mapper 128 and Hermitian symmetry block generator 130. It should be noted that with this selection process any of the valid perturbation offset bits sj, may be used and will be decoded, as described below, to the information bits v.
Perturbation mapper 128 maps each set of valid perturbation offset bits sj, into n' symbol perturbations, These n' symbol perturbations represent the resulting perturbation from changing the offset bits of framej from t to Let hj denote the jth frame of n'expansion symbols in h. These expansion symbols were determined from base symbols g and offset bits t. Denote by WO 99/53663 PCT/US99/07841 hj,' the n' expansion symbols corresponding to base symbols g and offset bits sy. The n' perturbation symbols q,,'are the difference between and h, qj, hj'- These n' symbol perturbations q,'are mapped to q, a set of n symbol perturbations, where only the jth frame of n' symbols in the set of n symbol perturbations q, is non-zero. For each set of valid perturbation offset bits sj,, the n perturbation symbols are mapped by the Hermitian symmetry block generator 130 into an N-symbol frequency domain symbol with complex conjugate symmetry. The operation of the Hermitian symmetry block generator 130 is described above. The frequency domain symbols are provided to IDFT device 132 to generate 2" time-domain perturbation vectors Pp.
It will be apparent to those skilled in the art that different values for k, r', H, and G, will lead to different perturbation vectors. Also, different methods of mapping the bits to symbols will lead to different perturbation vectors. The valid perturbation vectors generated are dependent on information bits vy. In general, for a fixed k, H, G, and and for a fixed mapping scheme, the set of 2' valid perturbation vectors will come from a set of 2 n possible time-domain perturbation vectors. Instead of generating these valid perturbation vectors for each incoming t as described above, the valid perturbation vector generator could store all 2 kn' possible time-domain perturbation vectors in memory and use the coset representative offset bits t to determine which 2' of these perturbation vectors (or some subset thereof) are valid for the given t. Note that if the expanded constellation is not an additive expansion as described above, the perturbation symbols may depend on not only the coset representative offset bits t, but also the base symbols g. In this case there may be more than 2 kn possible time-domain perturbation vectors.
Frame Based Perturbation Selector Perturbation selector 124j (1240 124 is shown in more detail in FIG.
12. For each of the 2' valid time-domain perturbation vectors pj,, (or some subset thereof), perturbed time-domain block y, is computed by block 140, where (Note: the input to Perturbation selector 1240 is x.) Then all of the yj,, perturbed time domain blocks computed are evaluated in block 142 and the with the smallest peak value is selected as the perturbed time-domain block of symbols to be provided to Perturbation selector 124,. (Note: the output of Perturbation selector 124,., is output to the channel y.) WO 99/53663 PCT/US99/07841 Frame Based Offset Decoder Offset decoder 52a, FIG. 13, includes frame divider 150 which divides the kn valid perturbation offset bits s into f frames of kn'=kn/f bits each. Each frame so-s,, is provided to a matrix block (1520-152f,). In thejth matrix block, the th frame of 1 x kn' valid perturbation offset bits is multiplied (modulo 2) filtered) by matrix HT having kn' rows and kn'-r'columns to recover thejth frame of 1 x r) offset information bits The fframes of offset information bits are passed to frame concatenator 154 which concatenates the f frames to form an estimate of the kn-r offset information bits v'.
In order to demonstrate how each of the candidates of valid perturbation offset bits s, are decoded to the same offset information bits v,, the encoding and decoding processes must be expressed mathematically.
The offset information bits recovered, (decoding) can be expressed mathematically as follows: Sy HT (6) and the valid perturbation offset bits s, (encoding) can be expressed mathematically as follows: s v, H T rG, (7) where c r G is a valid codeword generated by perturbation codeword generator 126, FIG. 11. If the right hand side of equation is substituted into equation for s, then the following equation is derived: v, H
T
H
T
GH
T (8) By selecting G, H T and HT so that the following conditions are satisfied: HT
H
T
I (where I is the identity matrix and GH
T
0, then v' v, regardless of the value of r Splitterless Operation In an Asymmetric Digital Subscriber Line (ADSL) modem operating without a splitter, the transmitted ADSL signal results in interference in the voice band (0-4kHz) at the POTS phone. This interference is the result of intermodulation effects due to the non-linear devices in the POTS phone. This interference can be reduced by using the present invention above to improve an appropriate objective function of the transmitted signal. One possible WO 99/53663 PCT/US99/07841 objective function is to create a notch in the spectrum of the transmitted ADSL signal after it goes through the non-linearity at 2kHz.
Let the subscript k denote time. Then X(k) denotes the kth unperturbed time-domain DMT symbol block and x(k+l) denotes the k+ls t block etc.
Similarly, yk, denotes the kth transmitted perturbed time-domain DMT symbol block and y(k+l) denotes the k+lS symbol block etc. Let Z(k) denote the output of the spectrum calculator 164 Fig. 14, i.e. the spectrum of the transmitted signals y transmitted up to time k, after the POTS non-linearity, evaluated at 2kHz.
This objective function can be improved using the above described inventions. In fact, this can be achieved by incorporating the new objective function in the selection criterion of the perturbation selector. As shown in Fig 14, perturbation selector 72a of this embodiment consists of a perturber 160, a non-linear device 162, a spectrum calculator 164, and a selector 166. The perturber 160 modifies the nominal time domain block x with each of the valid perturbation vectors to produce candidate transmit blocks These blocks are provided to the non-linear device 162 which mimics the POTS non-linearity.
Spectrum calculator 164 computes the power of the non-linear distorted signals around 2 kHz and selector 166 chooses the candidate perturbed timedomain block y that minimizes the output of the spectrum calculator 164.
In our examples above we assumed the "additive" constellation expansion as described in conjunction with Fig 2. For this particular objective function, further benefit may be obtained by using an alternative constellation expansion as described below. In particular, as will become clear, implementation complexity can be significantly reduced.
A rotated expanded constellation 170, FIG. 15, is formed by rotating the symbols in base constellation 172, rather than by shifting the base constellation (which was referred to as an additive constellation expansion earlier) as shown in Fig. 2.
In the specific example shown in Fig 15, we consider a DMT system with base constellation 172 capable of transmitting two bits per symbol. Base constellation 172 contains points A, B, C, and D, from which the base constellation symbols are selected by the base constellation mapper 16, FIG.
1. The base constellation 172 is expanded by a factor of 4 to form a 16 point constellation. Thus, k=2 bits per symbol are needed to determine which of the equivalent points in the expanded constellation is transmitted. Expanded constellation 170 includes base constellation 172 and expansion areas 174, 176, and 178 each containing four points labeled A-D. Expanded constellation WO 99/53663 PCT/US99/07841 170 is formed from the base constellation 172 by rotating each of the points in the base constellation by 00, 90 0 1800, and 2700.
For each of the n base symbols, g, base constellation mapper 16 chooses a point in base constellation 172. The expanded constellation mapper 20, FIG. 1, uses the kn or 2n (two bits per symbol) coset representative offset bits t to rotate the n symbols by 00, 90', 1800, or 2700.
One way to define the mapping of the two bits per symbol is: 00 corresponds to a 00 rotation, 01 corresponds to a 900 rotation, 11 corresponds to a 1800 rotation, and 10 corresponds to a 2700 rotation, To reduce the implementation complexity, this scheme uses perturbation codewords that do not require re-computing the IDFT, the rows of the matrix G of perturbation codeword generator 80, FIG. 1, having r rows and kn or 2n columns are chosen such that the codewords ci generated from this matrix lead to perturbed time-domain blocks y, that can easily be obtained from the nominal time-domain block x. Recall, G, HT, and HT must be chosen such that GHT=0, and H-THT= 12nx2n, where 12nx2n is the 2n x 2n identity matrix.
This reduced complexity scheme can be achieved by allowing three rows for matrix G, which also corresponds to r=3 redundancy bits. Assuming n=8, the three rows are: 1. 11 11 11 11 11 11 11 11, which corresponds to a sign inversion of x.
2. 00 11 00 11 00 11 00 11, which corresponds to a circular rotation of x by N/2 samples.
3. 00 01 11 10 00 01 11 10, which corresponds to a circular rotation of x by N/4 samples.
In this specific example, there are r=3 redundancy bits which corresponds to 23=8 possible perturbations The selector 166 selects the best of these 8 perturbations to minimize the output of the spectrum calculator 164 to create a null at 2kHz in the spectrum of the transmitted blocks y after they are distorted by the POTS non-linearity. Note that although these perturbations do not change the peak of the transmitted symbols, they can be used to shape the non-linearly distorted spectrum of the transmitted symbols.
The perturbation selector 72a, FIG. 14, can improve its performance by incorporating look-ahead. With a one-step look-ahead, the perturbation selector would select the perturbed time-domain block y(k) such that y(k) in combination with the best choice for y(k+l) creates the deepest null in the spectrum With a A-step look-ahead, the perturbation selector operating on the kth block would select the perturbed time-domain block y(k) such that WO 99/53663 PCT/US99/07841 y(k) in combination with the best choice for y(k+l) y(k+A) that minimizes the output of the spectrum calculator.
Although we have described an uncoded system in our examples, this invention can be easily extended to the case of a coded system, for example a trellis-coded system, in a manner that will be apparent to those skilled in the art.
It should be noted that this invention may be embodied in software and/or firmware, which may be stored on a computer useable medium, such as a computer disk or memory chip. The invention may also take the form of a computer data signal embodied in a carrier wave, such as when the invention is embodied in software/firmware, which is electrically transmitted, for example, over the Internet.
The present invention may be embodied in other specific forms without departing from the spirit or essential characteristics. The described embodiments are to be considered in all respects only as illustrative and not restrictive. The scope of the invention is, therefore, indicated by the appended claims rather than by the foregoing description. All changes, which come within the meaning and range within the equivalency of the claims, are to be embraced within their scope.
What is claimed is:

Claims (9)

1. A device for improving a defined property of transform-domain symbols, the device, comprising: a signal mapper which maps input data into blocks of symbols in a first domain and which generates offset bits corresponding to each block of symbols; and a perturbation/transform device, responsive to the blocks of symbols in the first domain and the corresponding offset bits, which produces blocks of perturbed transform domain symbols in order to improve the defined property of the transformed symbols.
2. The device of claim 1 wherein the perturbation/transform device includes: an invertible transform device, responsive to the signal mapper, which transforms each block of symbols in the first domain into a block of transform domain symbols; and a perturbation device, responsive to the invertible transform device and the corresponding offset bits, which selectively perturbs each block of transform domain symbols to form the blocks of perturbed transform domain symbols.
3. The device of claim 1 wherein the perturbation/transform device includes: a perturbation device, responsive to the signal mapper and the corresponding offset bits, which selectively perturbs each block of symbols to form blocks of perturbed symbols; and an invertible transform device, responsive to the perturbation device, which transforms the blocks of perturbed symbols in the first domain into the blocks of perturbed transform domain.
4. A receiver for receiving and decoding symbols created by the perturbation/transform device of claim 1. The device of claim 1 further characterized by: a selector for selecting a block of perturbed transform domain symbols that meets a predetermined criteria.
WO 99/53663 PCT/US99/07841
6. The device of claim 5 wherein the predetermined criteria is a the smallest Peak to Average power Ratio.
7. The device of claim 5 wherein the predetermined criteria is the least amount of nonlinear interference in a voice band.
8. The device of claim 5 further characterized by a transmitter for transmitting the selected block of perturbed transform domain symbols.
9. A receiver for receiving blocks of perturbed symbols characterized by: a transforming device to transform the received blocks of perturbed symbols into frequency domain symbols; an offset extractor for extracting base symbols and perturbation offset bits and transforming said base symbols into base information bits; and an offset decoder for transforming the perturbation offset bits into offset information bits.
AU34871/99A 1998-04-10 1999-04-09 System, device and method for improving a defined property of transform-domain signals Ceased AU739896B2 (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US5867198A 1998-04-10 1998-04-10
US09/058671 1998-04-10
US7508698A 1998-05-08 1998-05-08
US09/075086 1998-05-08
PCT/US1999/007841 WO1999053663A1 (en) 1998-04-10 1999-04-09 System, device and method for improving a defined property of transform-domain signals

Publications (2)

Publication Number Publication Date
AU3487199A AU3487199A (en) 1999-11-01
AU739896B2 true AU739896B2 (en) 2001-10-25

Family

ID=26737890

Family Applications (1)

Application Number Title Priority Date Filing Date
AU34871/99A Ceased AU739896B2 (en) 1998-04-10 1999-04-09 System, device and method for improving a defined property of transform-domain signals

Country Status (9)

Country Link
EP (1) EP1068707A4 (en)
JP (1) JP2002511708A (en)
KR (1) KR20010042557A (en)
CN (1) CN1296689A (en)
AU (1) AU739896B2 (en)
BR (1) BR9909560A (en)
CA (1) CA2328098A1 (en)
MX (1) MXPA00009895A (en)
WO (1) WO1999053663A1 (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100480775B1 (en) * 2000-11-18 2005-04-06 삼성전자주식회사 Method and apparatus for reducing Peak to Average Ratio for multicarrier transmission system
WO2006046090A1 (en) * 2004-10-28 2006-05-04 Nokia Corporation Recursive sequence generation for selected mapping in multi-carrier systems
EP1990964A1 (en) * 2007-05-10 2008-11-12 Thomson Licensing Method of reducing a peak to average power ratio of a multicarrier signal
US8254482B2 (en) 2008-05-13 2012-08-28 Samsung Electronics Co., Ltd. Perturbed decoder, perturbed decoding method and apparatus in communication system using the same
GB2471876B (en) * 2009-07-15 2011-08-31 Toshiba Res Europ Ltd Data communication method and apparatus
EP3122013B1 (en) 2014-04-17 2018-06-06 Huawei Technologies Co., Ltd. Coded modulation and demodulation method, apparatus and system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5479447A (en) * 1993-05-03 1995-12-26 The Board Of Trustees Of The Leland Stanford, Junior University Method and apparatus for adaptive, variable bandwidth, high-speed data transmission of a multicarrier signal over digital subscriber lines
US5774500A (en) * 1995-12-08 1998-06-30 Board Of Trustees, The Leland Stanford Jr., University Multi-channel trellis shaper

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6301268B1 (en) * 1998-03-10 2001-10-09 Lucent Technologies Inc. Communication method for frequency division multiplexing signalling systems with reduced average power requirements

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5479447A (en) * 1993-05-03 1995-12-26 The Board Of Trustees Of The Leland Stanford, Junior University Method and apparatus for adaptive, variable bandwidth, high-speed data transmission of a multicarrier signal over digital subscriber lines
US5774500A (en) * 1995-12-08 1998-06-30 Board Of Trustees, The Leland Stanford Jr., University Multi-channel trellis shaper

Also Published As

Publication number Publication date
CA2328098A1 (en) 1999-10-21
EP1068707A1 (en) 2001-01-17
BR9909560A (en) 2002-03-26
EP1068707A4 (en) 2001-09-12
WO1999053663A1 (en) 1999-10-21
MXPA00009895A (en) 2002-04-24
JP2002511708A (en) 2002-04-16
KR20010042557A (en) 2001-05-25
CN1296689A (en) 2001-05-23
AU3487199A (en) 1999-11-01

Similar Documents

Publication Publication Date Title
Jayalath et al. Reduced complexity PTS and new phase sequences for SLM to reduce PAP of an OFDM signal
KR100346336B1 (en) Reduction of the peak to average power ratio in multicarrier modulation system
JP4511602B2 (en) Method of reducing peak-to-average power ratio of space-time block coded MIMO-OFDM by circulation and inversion between antennas
WO2004042981A2 (en) Method and apparatus for reducing a peak-to-average power ratio in an orthogonal frequency division multiplex signal
CA2291493A1 (en) Peak to average power ratio reduction in communication systems
Abdullah et al. Modified selective mapping scheme with low complexity for minimizing high peak-average power ratio in orthogonal frequency division multiplexing system
KR20050026285A (en) Apparatus and method for reducing peak to average power ratio in orthogonal frequency division multiplexing communication system
Sarowa et al. Evolution of PAPR reduction techniques: A wavelet based OFDM approach
WO2018188758A1 (en) Processing multiple carrier visible light communication signals
US7136423B1 (en) Side tones packets injection (STPI) for PAR reduction
AU739896B2 (en) System, device and method for improving a defined property of transform-domain signals
US7397860B1 (en) Fractional local peak detection and mitigation for PAR reduction
AU740189B2 (en) System, device and method for improving a defined property of transform-domain signals
CN112543161A (en) Method for reducing peak-to-average ratio of medium-voltage carrier signal
Akter et al. PAPR in 3rd generation partnership project long term evolution: An overview to find the impact
Deshpande et al. Optimized peak to average power ratio (PAPR) reduction technique for OFDM
Rostamzadeh et al. PAPR reduction in wavelet packet modulation
Zhang Low complex PAPR reduction schemes for OFDM systems
Panicker et al. A distortion based Iterative Filtering and Clipping for better PAPR Reduction in OFDM
Nerma et al. Performance Analysis of a Novel OFDM System Based on Dual–Tree Complex Wavelet Transform (DT-CWT)
Prabhu et al. A PAPR reduction technique in OFDM transmissions using hierarchical QAM
Sood et al. An overview on papr reduction in ofdm by pts technique
Al-Shaikhi Constellation compaction design to reduce both PAPR and average power in OFDM systems
Bangard et al. Peak to Average Power Ratio (PAPR) Reduction Techniques in OFDM: An Overview
Chen et al. A Simple Construction of 16-QAM Codewords with Low PMEPR for OFDM Signals

Legal Events

Date Code Title Description
FGA Letters patent sealed or granted (standard patent)