WO2024120181A1 - 数据处理方法、设备和存储介质 - Google Patents

数据处理方法、设备和存储介质 Download PDF

Info

Publication number
WO2024120181A1
WO2024120181A1 PCT/CN2023/132939 CN2023132939W WO2024120181A1 WO 2024120181 A1 WO2024120181 A1 WO 2024120181A1 CN 2023132939 W CN2023132939 W CN 2023132939W WO 2024120181 A1 WO2024120181 A1 WO 2024120181A1
Authority
WO
WIPO (PCT)
Prior art keywords
sequence
value
information
subchannel
reliability
Prior art date
Application number
PCT/CN2023/132939
Other languages
English (en)
French (fr)
Inventor
赵巍
梁楚龙
许进
李立广
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2024120181A1 publication Critical patent/WO2024120181A1/zh

Links

Definitions

  • the present application relates to the field of communication technology, and in particular to a data processing method, device and storage medium.
  • Polar code Since polarization code has higher reliability on short code, Polar code is adopted as the coding scheme for 5G NR control messages in the fifth generation mobile communication system (5G) standard developed by the 3rd Generation Partnership Project (3GPP), specifically the downlink control information (DCI) and uplink control information (UCI) in the control channel, and the broadcast information carried by the physical broadcast channel (PBCH).
  • 5G fifth generation mobile communication system
  • 3GPP 3rd Generation Partnership Project
  • DCI downlink control information
  • UCI uplink control information
  • PBCH physical broadcast channel
  • the Polar code sequence is used to indicate the bit selection order before Polar code encoding, that is, "good channel selection".
  • the Polar Weight (PW) sequence explains from the perspective of standardization and practicality that the Polar code sequence can have the characteristics of being independent of channel parameters, so that the PW sequence shows good and stable performance under various code length and code rate configurations.
  • the polarization weights can be sorted from low to high, and then the serial numbers of the input bits to which they originally correspond can be found to obtain the PW sequence. If the PW sequence is calculated in real time, a very high precision is required when calculating the polarization weights, resulting in the consumption of many storage transistors; if the PW sequence is obtained from the memory, the PW sequence of size N max needs to be stored in the memory. For the Polar code with N polarization sub-channels, the sub-sequence consisting of the first N elements is sequentially extracted from the PW sequence of size N max to form a reliability sorting sequence of N sub-channels, where N is less than or equal to N max . Although this method reduces the online computing resource overhead, it increases the storage overhead.
  • the present application provides a data processing method, device and storage medium to reduce the storage resource overhead used in the Polar code encoding process.
  • an embodiment of the present application provides a data processing method, the method comprising the following steps:
  • the information bit sequence includes K information bits, where K is an integer greater than 0;
  • the encoded data sequence is transmitted.
  • an embodiment of the present application provides a data processing method, the method comprising the following steps:
  • a coded data sequence sent by a transmitting end is received, wherein the coded data sequence is obtained by encoding an information bit sequence according to at least one of a first coding parameter, a quantization weight value sequence, and a reliability threshold to obtain the coded data sequence, the information bit sequence includes K information bits, K is an integer greater than 0, the coded data sequence includes N coded data, N is an integer greater than K, the quantization weight value sequence includes n quantization weight values, N represents the number of polarization subchannels, and N is less than or equal to 2 to the power of n.
  • an electronic device including:
  • At least one memory for storing at least one program
  • an embodiment of the present application provides a computer-readable storage medium, which stores a program executable by a processor, and the program executable by the processor is used to implement the data processing method described in the first aspect or the second aspect above when executed by the processor.
  • an embodiment of the present application provides a computer program product, comprising a computer program or computer instructions, wherein the computer program or the computer instructions are stored in a computer-readable storage medium, a processor of a computer device reads the computer program or the computer instructions from the computer-readable storage medium, and the processor executes the computer program or the computer instructions, so that the computer device performs the data processing method described in the first aspect or the second aspect above.
  • the K information ratios are The information bit sequence of the polarization sub-channel is encoded to obtain a coded data sequence, wherein the coded data sequence includes N coded data, N is an integer greater than K, and the quantization weight value sequence includes n quantization weight values, N represents the number of polarization sub-channels, and N is less than or equal to the nth power of 2.
  • FIG. 1a is a schematic diagram of a logic code for implementing adding frozen bits
  • FIG2 is a schematic diagram of the architecture of a communication system to which an embodiment of the present application is applicable;
  • FIG3 is a flow chart of a data processing method provided in an embodiment of the present application.
  • 4 to 7 are schematic diagrams of logic codes for updating implementation information and frozen bit sequences provided in embodiments of the present application.
  • FIG10 is a schematic flow chart of another data processing method provided in an embodiment of the present application.
  • FIG11 is a schematic diagram of the structure of a data processing device provided in an embodiment of the present application.
  • FIG. 12 is a schematic diagram of the structure of an electronic device provided in an embodiment of the present application.
  • Wi is the polarization weight used for the i-th input bit (i-th subchannel); i represents the sequence number of the input bit.
  • i the sequence number of the input bit.
  • N 2n polarization subchannels
  • i 0, 1, 2, ..., N-2, N-1
  • n the number of bits required to express the integer N in binary
  • the process of adding frozen bits can be implemented by the logic code shown in FIG. 1a .
  • the Polar code sequence and the corresponding reliability are given by a table.
  • the code length is N
  • the storage of the Polar code sequence requires log 2 (N)*N bits of memory.
  • the present application proposes a data processing method for online calculation of subchannel reliability and determination of information bit position.
  • FIG 2 shows a schematic diagram of the architecture of a communication system applicable to an embodiment of the present application.
  • the communication system shown in Figure 2 includes a first transmission node 110 and a second transmission node 120, and the first transmission node 110 sends a coded data sequence to the second transmission node 120.
  • the first transmission node 110 and the second transmission node 120 may include but are not limited to one of the following devices: base station (Base Station, BS), access point (Access Point, AP), node B (node B), g node B (g node B, generalized node B), radio network controller (Radio Network Controller, RNC), evolved Node B (Evolved Node B, eNB), base station controller (Base Station Controller, BSC), base transceiver station (Base Transceiver Station, BTS), transceiver function (Transceiver Function, TF), radio router, radio transceiver, basic service unit (Basic Service Set, BSS), extended service unit (Extended Service Set, ESS) or radio base station (Radio Base Station, RBS), and the embodiments of the present application do not make specific limitations on this.
  • base station Base Station, BS
  • Access Point Access Point
  • AP access Point
  • node B node B
  • g node B g node B
  • the first transmission node 110 and the second transmission node 120 may be referred to as access terminals, user equipment (UE), user units, user stations, mobile stations, mobile stations, remote stations, remote terminals, mobile devices, user terminals, wireless communication devices, user agents or user devices.
  • the first transmission node 110 and the second transmission node 120 may be cellular phones, cordless phones, Session Initiation Protocol (SIP) phones, Wireless Local Loop (WLL) stations, Personal Digital Assistants (PDAs), handheld devices with wireless communication functions, computing devices or other processing devices connected to wireless modems, vehicle-mounted devices, wearable devices, 5G networks or terminal devices in future 5G networks, etc., and the embodiments of the present application do not specifically limit this.
  • SIP Session Initiation Protocol
  • WLL Wireless Local Loop
  • PDAs Personal Digital Assistants
  • Figure 3 is a flow chart of a data processing method provided by the first aspect of the embodiment of the present application.
  • the data processing method can be applied to the first transmission node 110 shown in Figure 2.
  • the data processing method includes the following steps S100-S300, and each step is described in sequence below:
  • Step S100 Acquire an information bit sequence, where the information bit sequence includes K information bits, where K is an integer greater than 0.
  • Step S200 Encode the information bit sequence according to at least one of the first coding parameter, the quantization weight value sequence, and the reliability threshold to obtain a coded data sequence, wherein the coded data sequence includes N coded data, N is an integer greater than K, the quantization weight value sequence includes n quantization weight values, N represents the number of polarization subchannels, and N is less than or equal to 2 to the power of n.
  • Step S300 Send the encoded data sequence.
  • the first encoding parameter includes at least one of the following:
  • the information bit sequence size refers to the number of information bits contained in the information bit sequence.
  • the number of information bits is represented by K, where K is an integer greater than 0;
  • the number of polarization sub-channels is represented by N, where N is a positive integer power of 2 and N is greater than K.
  • Code rate which refers to K/N, that is, the ratio of the information bit sequence size K to the number of polarization subchannels N.
  • the code rate is represented by R;
  • the information index number is represented by k, where k is an integer greater than or equal to 0 and less than or equal to (K-1), or k is an integer greater than or equal to (N-K) and less than or equal to (N-1);
  • a subchannel index number indicating the number of the polar code subchannel.
  • i is used to represent the subchannel index number, where i is an integer greater than or equal to 0 and less than N.
  • stage0, stage1, ... are used to represent the polar coding stage index number
  • stage-1 is used to represent the stage of obtaining the information and frozen bit sequences from the information bit sequence
  • the number of transport block bits TBS is a positive integer
  • the number of cyclic redundancy check bits L CRC is a positive integer
  • the number of parity check bits L PC is a positive integer.
  • the first encoding parameter can be selected and set according to the specific application scenario, which is not limited here.
  • the specific application principle of the above-mentioned first encoding parameter will be explained in the following embodiments and will not be repeated here.
  • step S200 the coded data sequence in step S200 can be obtained by the following steps S210-S220:
  • Step S210 adding frozen bits to the information bit sequence according to at least one of the first coding parameter, the quantization weight value sequence and the reliability threshold, to obtain an information and frozen bit sequence, wherein the information and frozen bit sequence includes N bits;
  • Step S220 Encode the information and the frozen bit sequence to obtain a coded data sequence.
  • the information and frozen bit sequence u includes K information bits and (NK) frozen bits, and the positions of the information bits and the frozen bits are determined according to at least one of the first coding parameter, the quantization weight value sequence, and the reliability threshold.
  • step S210 the information and frozen bit sequence of step S210 can be obtained through the following steps S211-S212:
  • Step S211 adding frozen bits to the information bit sequence according to a preset rule to obtain an initial information and frozen bit sequence, wherein the information and frozen bit sequence include N bits.
  • the initial information and frozen bit sequence may be obtained by any of the following methods:
  • Method 1 The information bits in the information bit sequence are sequentially set to the first K bits of the initial information and frozen bit sequences.
  • the information bit sequence a [ a0 , a1 , ..., aK-1 ]
  • N represents the number of polarization subchannels, and its value is a positive integer power of 2
  • K is the number of information bits, and its value is a positive integer
  • K ⁇ N is satisfied.
  • Method 2 The information bits in the information bit sequence are sequentially set to the last K bits of the initial information and frozen bit sequence.
  • the information bit sequence a [ a0 , a1 , ..., aK-1 ]
  • N represents the number of polarization subchannels, and its value is a positive integer power of 2
  • K is the number of information bits, and its value is a positive integer
  • K ⁇ N is satisfied.
  • Mode 3 The information bits in the information bit sequence are set in reverse order to the first K bits of the initial information and frozen bit sequence.
  • Mode 4 The information bits in the information bit sequence are set in reverse order to the last K bits of the initial information and frozen bit sequences.
  • the position of the information bit in the information and frozen bit sequence can be adjusted through the information index number and the information and frozen bit indication to obtain the information and frozen bit sequence finally input into the polarized channel without requiring additional storage space to store the information bits, thereby saving storage space.
  • Step S212 traverse the N polarized sub-channels in order of sub-channel index numbers from large to small or from small to large, and perform the following steps S2121-S2123 for the currently traversed polarized sub-channel:
  • Step S2121 determining the sub-channel reliability value of the currently traversed polarization sub-channel according to the quantization weight value sequence
  • Step S2122 determining a frozen bit indication corresponding to the currently traversed polarization sub-channel according to the reliability threshold and the sub-channel reliability value;
  • Step S2123 determining the value of the bit corresponding to the currently traversed polarization subchannel in the information and frozen bit sequence according to the frozen bit indication, and updating the information and frozen bit sequence according to the value of the bit.
  • the subchannel index numbers corresponding to the N polarized subchannels are arranged in order from large to small or from small to large to obtain a subchannel index number sequence [0, 1, ..., N-1] or [N-1, N-2, ..., 0]; then the polarized subchannels corresponding to the subchannel index numbers in the subchannel index number sequence are traversed, and each time a polarized subchannel is traversed, the subchannel reliability value and frozen bit indication corresponding to the currently traversed polarized subchannel are determined, and then according to the frozen bit indication, it is determined whether the bit carried by the currently traversed polarized subchannel is an information bit or a frozen bit, and then the information and frozen bit sequence are updated. When the traversal of the N polarized subchannels is completed, the final information and frozen bit sequence is obtained.
  • is used to represent a quantization weight value sequence
  • includes n quantization weight values
  • the j-th quantization weight value ⁇ j in ⁇ represents the quantization weight value corresponding to the j-th bit in the binary form of the subchannel index number
  • j is any integer from 0 to (n-1).
  • the sum of all quantized weight values in the quantized weight value sequence ⁇ is less than the first value.
  • M is used to represent the first value, that is, ⁇ n-1 + ⁇ n-2 +...+ ⁇ 0 ⁇ M. It should be noted that M is a positive integer power of 2.
  • the first value includes one of the following: 256, 512, 1024, 2048 or 4096.
  • the second is determined under the constraint that the difference between the quantized polarization weight sequence (quantized PW sequence) obtained according to the quantized weight value sequence and the polarization weight sequence (PW sequence) is not greater than the second value D.
  • the quantized weight value sequence ⁇ includes one of the following:
  • [96, 81, 68, 57, 48, 40, 34, 28, 24, 20]; or,
  • [197, 165, 139, 116, 98, 82, 68, 58, 49, 41]; or,
  • [389, 327, 275, 231, 194, 163, 137, 115, 97, 82]; or,
  • [780, 656, 552, 464, 390, 328, 276, 232, 195, 164]; or,
  • [101, 85, 71, 60, 50, 42, 35, 30, 25]; or,
  • [206, 173, 145, 122, 102, 86, 73, 61, 51]; or,
  • [480,404,340,286,240,202,170,143,120].
  • the reliability threshold of the embodiment of the present application can be obtained from a preset mapping relationship according to an index value, wherein the index value includes but is not limited to being determined according to at least one of the number of information bits K, the number of polarization subchannels N, and the code rate R, and the mapping relationship includes but is not limited to at least one of the following: a mapping formula, a mapping table, or a mapping diagram.
  • the mapping relationship can also be other expressions with a corresponding relationship, which is not limited to the embodiment of the present application.
  • the reliability value of the i-th subchannel can be calculated according to the quantization weight value sequence, and the reliability threshold can be obtained according to the mapping relationship.
  • a reliability threshold w th is obtained from a preset mapping relationship according to the index value.
  • the index value is determined according to the value of the number of information bits K and the value of the number of polarization subchannels N, and a mapping relationship between the number of information bits K, the number of polarization subchannels N, and the reliability threshold is recorded in a mapping table (hereinafter referred to as a reliability threshold table).
  • N is a positive integer power of 2, including but not limited to one of the following: 32, 64, 128, 256, 512, 1024 ;
  • K is a positive integer, including but not limited to one of the following: 25, 35, 43, 51, 59, 67, 75, 83, 91, 99, 107, 115, 123, 131, 139, 147, 155, 163, 171, 179, 187, 195, 203, 219, 235, 251, 267, 283, 299;
  • w K,N ⁇ M, M is a positive integer power of 2, and the value of M includes but is not limited to one of the following: 256, 512, 1024, 2048, 4096.
  • Table 2 is a feasible reliability threshold table indexed by K and N; in other examples, the reliability threshold table includes at least one row or at least one column in Table 2. It can be understood that Table 2 is only a feasible mapping form of the reliability threshold table, and other mapping forms are also possible, which are not specifically limited in this embodiment.
  • the relationship between the reliability threshold and the number of information bits K and the relationship between the reliability threshold and the number of polarization subchannels N can be obtained from the reliability threshold table, and the reliability threshold corresponding to a combination of a certain value K and a certain value N includes one of the following: NaN, w K,N , where "NaN" is a null value, indicating that the reliability threshold under the current K and N combination does not exist, and w K,N is the reliability threshold under the K and N combination.
  • the reliability threshold corresponding to the value of K and the value of N is NaN, where NaN indicates that the reliability threshold is a null value.
  • the reliability threshold corresponding to the value of K and the value of N is w K,N .
  • the value of w K,N is determined by the following steps S310-S313:
  • Step S310 Calculate the subchannel reliability value corresponding to the polarization subchannel according to the quantization weight value sequence ⁇ and the subchannel index number i corresponding to each polarization subchannel;
  • Step S311 obtaining a subchannel reliability sequence according to the subchannel reliability values corresponding to the N polarized subchannels;
  • Step S312 Select K largest sub-channel reliability values from the sub-channel reliability sequence
  • Step S313 Select the smallest sub-channel reliability value from the K largest sub-channel reliability values as w K,N .
  • N subchannel reliability values w' [w' 0 ,w' 1 ,...,w' N-1 ] are calculated; the largest K reliability values are selected from w', and then the minimum value w NK is selected from the largest K reliability values, where w NK is the element value at the (N,K) position in the reliability threshold table.
  • the reliability threshold w'i of the i-th subchannel is determined according to the following formula (2):
  • K1 and K2 represent two different values of K.
  • K1 is less than K2
  • w K1,N represents the reliability threshold corresponding to the value of K1 and the value of N
  • w K2,N represents the reliability threshold corresponding to the value of K1 and the value of N.
  • N1 and N2 represent two different values of N.
  • w K,N1 is less than w K,N2 .
  • w K,N1 represents the reliability threshold corresponding to the value of K and the value of N1
  • w K,N2 represents the reliability threshold corresponding to the value of K and the value of N2.
  • the reliability threshold w th is obtained from a preset mapping relationship according to the index value.
  • the index value is determined according to the value of the number of information bits K and the value of the code rate R, and the mapping relationship between the number of information bits K, the code rate R and the reliability threshold is recorded in a mapping table (hereinafter referred to as the reliability threshold table).
  • R is a real number greater than 0 and less than 1, including but not limited to one of the following: 25/32, 25/64, 25/128, 25/256, 25/512, 25/1024, 35/64, 35/128, 35/256, 35/512, 35/1024, 43/64, 43/128, 43/256, 43/512, 43/1024, 51/64, 51/128, 51/256, 51/512, 51/1024, 59/64, 59/128, 59/256, 59/512, 59/1024; K is a positive integer, including but not limited to one of the following: 25, 35, 43, 51, 59; w K,R ⁇ M, M is a positive integer power of 2, and the value of M includes but is not limited to one of the following: 256, 512, 1024, 2048, 4096; the reliability threshold table indexed by K and R is shown in Table 3. In other examples, the reliability threshold table includes at least one row or at least one column in Table 3. It can be understood that Table 3 is only a feasible
  • the reliability threshold corresponding to a certain value K and a certain value R combination includes one of the following: NaN, w K,R , where "NaN" is a null value, indicating that the reliability threshold under the current K and R combination does not exist, and w K,R represents the reliability threshold under the K and R combination.
  • the reliability threshold corresponding to the value of K and the value of R is NaN, where NaN indicates that the reliability threshold is a null value.
  • the reliability threshold corresponding to the value of K and the value of R is w K,R .
  • the value of w K,R is determined by the following steps S320-S323:
  • Step S320 Determine the value of N according to the value of K and the value of R;
  • Step S321 Calculate the subchannel reliability value corresponding to each polarization subchannel according to the quantization weight value sequence ⁇ and the subchannel index number i corresponding to each of the N polarization subchannels;
  • Step S322 obtaining a subchannel reliability sequence according to the subchannel reliability values corresponding to the N polarized subchannels, and selecting K largest subchannel reliability values from the subchannel reliability sequence;
  • Step S323 Select the smallest sub-channel reliability value from the K largest sub-channel reliability values, and use the smallest sub-channel reliability value as w K,R .
  • N K/R
  • N subchannel reliability values w' [w' 0 , w' 1 , ..., w' N-1 ] according to the quantization weight value sequence ⁇ and the subchannel index number i; select the largest K reliability values from w', and then select the minimum value w NK from the largest K reliability values, where w NK is the element value at the (R, K) position in the reliability threshold table.
  • R1 and R2 represent two different values of R, and when R1 is less than R2, w K,R1 is greater than w K,R2 , w K,R1 represents the reliability threshold corresponding to the value of K and the value of R1, and w K,R2 represents the reliability threshold corresponding to the value of K and the value of R2.
  • a reliability threshold is obtained from a preset mapping relationship according to an index value.
  • the index value is determined according to the value of the number of information bits K and the value of the number of polarization subchannels N.
  • a mapping relationship between the number of information bits K, the number of polarization subchannels N, and the reliability threshold is recorded in a reliability threshold table, and elements in the reliability threshold table are determined based on a quantization weight value sequence ⁇ .
  • a reliability threshold is obtained from a preset mapping relationship according to an index value.
  • the index value is determined according to the value of the number of information bits K and the value of the number of polarization subchannels N.
  • a mapping relationship between the number of information bits K, the number of polarization subchannels N, and the reliability threshold is recorded in a reliability threshold table, and elements in the reliability threshold table are determined based on a quantization weight value sequence ⁇ .
  • a reliability threshold is obtained from a preset mapping relationship according to an index value.
  • the index value is determined according to the value of the number of information bits K and the value of the number of polarization subchannels N.
  • a mapping relationship between the number of information bits K, the number of polarization subchannels N, and the reliability threshold is recorded in a reliability threshold table, and elements in the reliability threshold table are determined based on a quantization weight value sequence ⁇ .
  • N is a positive integer power of 2, including but not limited to one of the following: 32, 64, 128, 256, 512, 1024;
  • K is a positive integer, including but not limited to one of the following: 25, 35, 43, 51, 59, 67, 75, 83, 91, 99, 107, 115, 123, 131, 139, 147, 155, 163, 171, 179, 187, 195, 203, 219, 235, 251, 267, 283, 299;
  • a specific example of the reliability threshold table is shown in Table 6.
  • the reliability threshold table includes at least one row or at least one column in Table 6.
  • a reliability threshold is obtained from a preset mapping relationship according to an index value.
  • the index value is determined according to the value of the number of information bits K and the value of the number of polarization subchannels N.
  • a mapping relationship between the number of information bits K, the number of polarization subchannels N, and the reliability threshold is recorded in a reliability threshold table, and elements in the reliability threshold table are determined based on a quantization weight value sequence ⁇ .
  • N is a positive integer power of 2, including but not limited to one of the following: 32, 64, 128, 256, 512, 1024;
  • K is a positive integer, including but not limited to one of the following: 25, 35, 43, 51, 59, 67, 75, 83, 91, 99, 107, 115, 123, 131, 139, 147, 155, 163, 171, 179, 187, 195, 203, 219, 235, 251, 267, 283, 299;
  • a specific example of the reliability threshold table is shown in Table 7.
  • the reliability threshold table includes at least one row or at least one column in Table 7.
  • a reliability threshold is obtained from a preset mapping relationship according to an index value.
  • the index value is determined according to the value of the number of information bits K and the value of the number of polarization subchannels N.
  • a mapping relationship between the number of information bits K, the number of polarization subchannels N, and the reliability threshold is recorded in a reliability threshold table, and elements in the reliability threshold table are determined based on a quantization weight value sequence ⁇ .
  • N is a positive integer power of 2, including but not limited to one of the following: 32, 64, 128, 256, 512;
  • K is a positive integer, including but not limited to one of the following: 25, 35, 43, 51, 59, 67, 75, 83, 91, 99, 107, 115, 123, 131, 139, 147, 155, 163, 171, 179, 187, 195, 203, 219, 235, 251, 267, 283, 299;
  • a specific example of the reliability threshold table is shown in Table 8.
  • the reliability threshold table includes at least one row or at least one column in Table 8.
  • a reliability threshold is obtained from a preset mapping relationship according to an index value.
  • the index value is determined according to the value of the number of information bits K and the value of the number of polarization subchannels N.
  • a mapping relationship between the number of information bits K, the number of polarization subchannels N, and the reliability threshold is recorded in a reliability threshold table, and elements in the reliability threshold table are determined based on a quantization weight value sequence ⁇ .
  • N is a positive integer power of 2, including but not limited to one of the following: 32, 64, 128, 256, 512;
  • K is a positive integer, including but not limited to one of the following: 25, 35, 43, 51, 59, 67, 75, 83, 91, 99, 107, 115, 123, 131, 139, 147, 155, 163, 171, 179, 187, 195, 203, 219, 235, 251, 267, 283, 299;
  • a specific example of the reliability threshold table is shown in Table 9.
  • the reliability threshold table includes at least one row or at least one column in Table 9.
  • a reliability threshold is obtained from a preset mapping relationship according to an index value.
  • the index value is determined according to the value of the number of information bits K and the value of the number of polarization subchannels N.
  • a mapping relationship between the number of information bits K, the number of polarization subchannels N, and the reliability threshold is recorded in a reliability threshold table, and elements in the reliability threshold table are determined based on a quantization weight value sequence ⁇ .
  • N is a positive integer power of 2, including but not limited to one of the following: 32, 64, 128, 256, 512;
  • K is a positive integer, including but not limited to one of the following: 25, 35, 43, 51, 59, 67, 75, 83, 91, 99, 107, 115, 123, 131, 139, 147, 155, 163, 171, 179, 187, 195, 203, 219, 235, 251, 267, 283, 299;
  • a specific example of the reliability threshold table is shown in Table 10.
  • the reliability threshold table includes at least one row or at least one column in Table 10.
  • a reliability threshold is obtained from a preset mapping relationship according to an index value.
  • the index value is determined according to the value of the number of information bits K and the value of the number of polarization subchannels N.
  • a mapping relationship between the number of information bits K, the number of polarization subchannels N, and the reliability threshold is recorded in a reliability threshold table, and elements in the reliability threshold table are determined based on a quantization weight value sequence ⁇ .
  • N is a positive integer power of 2, including but not limited to one of the following: 32, 64, 128, 256, 512;
  • K is a positive integer, including but not limited to one of the following: 25, 35, 43, 51, 59, 67, 75, 83, 91, 99, 107, 115, 123, 131, 139, 147, 155, 163, 171, 179, 187, 195, 203, 219, 235, 251, 267, 283, 299;
  • a specific example of the reliability threshold table is shown in Table 11.
  • the reliability threshold table includes at least one row or at least one column in Table 11.
  • the reliability threshold is obtained from the preset mapping relationship according to the index value.
  • the index value is determined according to the value of the number of information bits K and the value of the code rate R.
  • the mapping relationship between the number of information bits K, the code rate R and the reliability threshold is recorded in the reliability threshold table, and can be The elements in the reliability threshold table are determined based on the quantized weight value sequence ⁇ .
  • R is a real number greater than 0 and less than 1, including but not limited to one of the following: 25/32, 25/64, 25/128, 25/256, 25/512, 25/1024, 35/64, 35/128, 35/256, 35/512, 35/1024, 43/64, 43/128, 43/256, 43/256, 43/512, 43 ...64, 43/128, 3/512, 43/1024, 51/64, 51/128, 51/256, 51/512, 51/1024, 59/64, 59/128, 59/256, 59/512, 59/1024;
  • K is a positive integer, including but not limited to one of the following: 25, 35, 43, 51, 59;
  • a specific example of the reliability threshold table is shown in Table 12.
  • the reliability threshold table includes at least
  • a reliability threshold is obtained from a preset mapping relationship according to an index value.
  • the index value is determined according to the value of the number of information bits K and the value of the code rate R.
  • the mapping relationship between the number of information bits K, the code rate R and the reliability threshold is recorded in a reliability threshold table, and the elements in the reliability threshold table are determined based on the quantization weight value sequence ⁇ .
  • R is a real number greater than 0 and less than 1, including but not limited to one of the following: 25/32, 25/64, 25/128, 25/256, 25/512, 35/64, 35/128, 35/256, 35/512, 43/64, 43/128, 43/ 256, 43/512, 51/64, 51/128, 51/256, 51/512, 59/64, 59/128, 59/256, 59/512;
  • K is a positive integer, including but not limited to one of the following: 25, 35, 43, 51, 59;
  • a specific example of the reliability threshold table is shown in Table 13. In another example, the reliability threshold table includes at least one row or at least one column in Table 13.
  • the subchannel reliability value is calculated based on the quantized weight value sequence, and the reliability threshold of the i-th polarization subchannel is calculated according to the following formula:
  • the value of M includes at least one of the following: 256, 512, 1024, 2048, 4096.
  • PW' [PW N-1 , PW N-2 , ..., PW 0 ] is obtained, where PW N-1 represents the subchannel index number corresponding to the highest reliability value, and PW 0 represents the subchannel index number corresponding to the lowest reliability value.
  • PW' [PW N-1 , PW N-2 , ..., PW 0 ] is obtained, where PW N-1 represents the subchannel index number corresponding to the highest reliability value, and PW 0 represents the subchannel index number corresponding to the lowest reliability value.
  • PW' [PW N-1 , PW N-2 , ..., PW 0 ] is obtained, where PW N-1 represents the subchannel index number corresponding to the highest reliability value, and PW 0 represents the subchannel index number corresponding to the lowest reliability value.
  • M 4096
  • N 512
  • PW' [PWN -1 , PWN -2 , ..., PW0 ] is obtained, where PWN -1 represents the subchannel index number corresponding to the highest reliability value, and PW0 represents the subchannel index number corresponding to the lowest reliability value.
  • PW' [PW N-1 , PW N-2 , ..., PW 0 ] is obtained, where PW N-1 represents the subchannel index number corresponding to the highest reliability value, and PW 0 represents the subchannel index number corresponding to the lowest reliability value.
  • PW' [PWN -1 , PWN -2 , ..., PW0 ] is obtained, where PWN -1 represents the subchannel index number corresponding to the highest reliability value, and PW0 represents the subchannel index number corresponding to the lowest reliability value.
  • PW' [PWN -1 , PWN -2 , ..., PW0 ] is obtained, where PWN -1 represents the subchannel index number corresponding to the highest reliability value, and PW0 represents the subchannel index number corresponding to the lowest reliability value.
  • PW' [PWN -1 , PWN -2 , ..., PW0 ] is obtained, where PWN -1 represents the subchannel index number corresponding to the highest reliability value, and PW0 represents the subchannel index number corresponding to the lowest reliability value.
  • the information and frozen bit indication corresponding to the polarized subchannel are determined according to the subchannel reliability value and the reliability threshold.
  • the determination process of the corresponding information and frozen bit indication includes: when the reliability value w'i of the i-th subchannel is greater than or equal to the reliability threshold wth , the i-th subchannel carries the information bit; when the reliability value w'i of the i-th subchannel is less than the reliability threshold wth , the i-th subchannel carries the frozen bit.
  • N is the number of polarization subchannels, and its value is a positive integer power of 2;
  • K is the number of information bits, and its value is a positive integer, and K ⁇ N;
  • F 1, indicating that the i-th subchannel carries information bits;
  • F 0, indicating that the i-th subchannel carries frozen bits.
  • the information bit sequence a [a 0 , a 1 , ..., a K-1 ] is sequentially set to the last K bits of the information and frozen bit sequences.
  • N is the number of polarization subchannels, and its value is a positive integer power of 2;
  • N is the number of polarization subchannels, and its value is a positive integer power of 2;
  • K is the number of information bits, and its value is a positive integer, and K ⁇ N;
  • F 1, indicating that the i-th subchannel carries information bits;
  • F 0, indicating that the i-th subchannel carries frozen bits.
  • N is the number of polarization subchannels, and its value is a positive integer power of 2;
  • K is the number of information bits, and its value is a positive integer, and K ⁇ N;
  • F 1, indicating that the i-th subchannel carries information bits;
  • F 0, indicating that the i-th subchannel carries frozen bits.
  • the size of the information and frozen bit sequence is N bits, which include information bits and frozen bits.
  • the information and frozen bit sequence can be obtained according to but not limited to the steps provided in any of Examples 14 to 18.
  • the intermediate encoded bits of each Stage are stored using the storage space of the information and frozen bit sequence, and two bits in each Stage are calculated in a group, and the encoding process is calculated serially according to Stage 0, Stage 1,...,Stage n-1. In this way, using the storage space of the information and frozen bit sequence to store the intermediate encoded bits of each Stage can reduce storage overhead.
  • the information and frozen bit sequence are processed in ascending order of the subchannel index numbers.
  • the specific processing process may include: processing in ascending order of the subchannel index numbers, calculating in groups of two bits in each Stage, storing the intermediate coded bits of each Stage using the storage space of the information and frozen bit sequence, and the encoding process is calculated serially according to Stage 0, Stage 1,..., Stage n-1.
  • mod 2 represents modulo 2.
  • k0 is a decimal number obtained by exchanging the j-th bit and the lowest bit of i
  • k1 is a decimal number obtained by exchanging the j-th bit and the lowest bit of i+ 1 .
  • i is an even number
  • B 0 0
  • j 3
  • i is an even number
  • j 3
  • the information and frozen bit sequence are processed in descending order of the subchannel index numbers.
  • the specific processing process may include: processing in descending order according to the subchannel index numbers, calculating in groups of two bits in each Stage, storing the intermediate coded bits of each Stage using the storage space of the information and frozen bit sequence, and the coding process is calculated serially according to Stage 0, Stage 1, ..., Stage n-1.
  • mod 2 represents modulo 2.
  • k0 is the decimal number obtained by exchanging the jth bit of i with the least significant bit
  • k1 is the decimal number obtained by exchanging the jth bit of i+1 with the least significant bit.
  • this example includes the following steps:
  • a second aspect of an embodiment of the present application provides a data processing method, which can be applied to the second transmission node 120 shown in FIG2, and the data processing method includes: receiving a coded data sequence sent by a transmitting end.
  • the coded data sequence is obtained in the following manner: encoding an information bit sequence according to at least one of a first coding parameter, a quantization weight value sequence, and a reliability threshold to obtain the coded data sequence, the information bit sequence includes K information bits, K is an integer greater than 0, the coded data sequence includes N coded data, N is an integer greater than K, the quantization weight value sequence includes n quantization weight values, N represents the number of polarization subchannels, and N is less than or equal to 2 to the power of n.
  • the process of restoring the encoded data sequence d to the original information bit sequence a is the inverse process of converting the information bit sequence a to the encoded data sequence d.
  • the specific implementation principle can refer to the implementation principle of the data processing method provided in the first aspect of the embodiment of the present application, and the embodiment of the present application will not be repeated here.
  • a third aspect of an embodiment of the present application provides a data processing device, the data processing device comprising at least one of the following:
  • a subchannel and stage calculator 210 configured to output a current subchannel index number and a stage index number
  • a reliability threshold memory 220 used to store a reliability threshold
  • Quantization weight value sequence memory 230 used to store the quantization weight value sequence
  • a subchannel reliability calculator 240 configured to determine a subchannel reliability value according to a quantized weight value sequence and a subchannel index number
  • a reliability comparator 250 for comparing the subchannel reliability value with a reliability threshold, and outputting information and a freeze bit indication according to the comparison result;
  • An information bit index calculator 260 is configured to output an information bit index according to the number of information bits, the number of polarization subchannels, and the information and frozen bit indication;
  • the coded bit information memory 270 is used to receive and store the input information bit sequence, and determine and store the information and frozen bit sequence according to the information bit sequence and the information and frozen bit indication;
  • a serial encoder 280 configured to perform serial encoding according to the information and the frozen bit sequence, and output an encoded data sequence
  • the coded bit information memory 270 is also used to store the coded data sequence.
  • the data processing device shown in Figure 12 is a system framework for implementing the data processing method provided in the first aspect of the embodiment of the present application.
  • this framework for Polar code encoding it is not necessary to directly store the Polar code sequence, and the information bit position can be determined through online calculation, thereby reducing storage complexity.
  • the initial value of Stage index j in the subchannel and Stage calculator 210 is equal to -1, the initial value of subchannel index i is equal to 0, and after i is counted from 0 to N-1, Stage index j is accumulated by 1.
  • the initial value of Stage index j in the subchannel and Stage calculator 210 is equal to -1, the initial value of subchannel index i is equal to N-1, and after i is counted down from N-1 to 0, Stage index j is accumulated by 1.
  • Stage-1 represents the stage of obtaining information and frozen bit sequence u from information bit sequence a.
  • Stage0, Stage1, ..., Stage n-1 represent the stage of obtaining coded data sequence d from information and frozen bit sequence u.
  • the reliability threshold memory 220 stores the reliability threshold w th , and the reliability threshold has a mapping relationship with parameters including but not limited to the following: information bit sequence size K, number of polarization subchannels N, and code rate R.
  • the subchannel reliability calculator 240 calculates the reliability value w'i of the i-th subchannel according to the subchannel index i and the quantization weight value sequence ⁇ .
  • the reliability comparator 250 determines the information and frozen bit indication of the subchannel by comparing the reliability value w'i of the i -th subchannel with the reliability threshold wth ; the information and frozen bit indication of the i-th subchannel are determined according to rules including but not limited to the following: when the reliability value w'i of the i-th subchannel is greater than or equal to the reliability threshold wth , the i-th subchannel carries the information bit; when the reliability value w'i of the i-th subchannel is less than the reliability threshold wth , the i-th subchannel carries the frozen bit.
  • the information bit index calculator 260 calculates the position k where the information bit is located.
  • the coded bit information memory 270 stores the information bit sequence a, the information and frozen bit sequence u, and the coded data d.
  • the serial encoder 280 encodes the information and the frozen bit sequence data in the coded bit information memory 270 to obtain coded data.
  • the disclosed devices and methods can be implemented in other ways.
  • the device embodiments described above are only schematic.
  • the division of the modules or units is only a logical function division. There may be other division methods in actual implementation, such as multiple units or components can be combined or integrated into another device, or some features can be ignored or not executed.
  • Another point is that the mutual coupling or direct coupling or communication connection shown or discussed can be through some interfaces, indirect coupling or communication connection of devices or units, which can be electrical, mechanical or other forms.
  • a fourth aspect of an embodiment of the present application provides an electronic device, and the electronic device 900 includes but is not limited to:
  • At least one processor 910 At least one processor 910;
  • At least one memory 920 used to store at least one program
  • processor 910 and the memory 920 may be connected via a bus or other means.
  • the processor 910 can adopt a central processing unit (CPU).
  • the processor can also be other general-purpose processors, digital signal processors (DSP), application-specific integrated circuits (ASIC), field programmable gate arrays (FPGA) or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components, etc.
  • DSP digital signal processors
  • ASIC application-specific integrated circuits
  • FPGA field programmable gate arrays
  • a general-purpose processor can be a microprocessor or the processor can also be any conventional processor, etc.
  • the processor 910 adopts one or more integrated circuits to execute relevant programs to implement the technical solutions provided in the embodiments of the present application.
  • the memory 920 is a non-transitory computer-readable storage medium that can be used to store non-transitory software programs and non-transitory computer executable programs, such as the data processing method performed by the electronic device side described in any embodiment of the present application.
  • the processor 910 implements the above data processing method by running the non-transitory software program and instructions stored in the memory 920.
  • the memory 920 may include a program storage area and a data storage area, wherein the program storage area may store an operating system and an application required for at least one function; and the data storage area may store and execute the above-mentioned data processing method.
  • the memory 920 may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one disk storage device, a flash memory device, or other non-volatile solid-state storage devices.
  • the memory 920 may optionally include a memory remotely located relative to the processor 910, and the remote memory may be connected to the processor 910 via a network. Examples of the above network include, but are not limited to, the Internet, an intranet, a local area network, a mobile communication network, and combinations thereof.
  • the non-transitory software programs and instructions required to implement the above-mentioned data processing method are stored in the memory 920, and when executed by one or more processors 910, the data processing method provided by any embodiment of the present application is executed.
  • An embodiment of the present application further provides a computer-readable storage medium, which stores a program executable by a processor.
  • the program executable by the processor is executed by the processor, it is used to implement the data processing method described in any of the above embodiments.
  • Computer-readable media can be computer-readable signal media or computer-readable storage media.
  • Computer-readable storage media can be, for example, but not limited to, electrical, magnetic, optical, electromagnetic, infrared, or semiconductor systems, devices or devices, or any combination of the above. More specific examples (non-exhaustive) of computer-readable storage media include: electrical connections with one or more wires, portable computer disks, hard disks, random access memories (RAM), read-only memories (ROM), erasable programmable read-only memories (EPROM or flash memory), optical fibers, portable compact disk read-only memories (CD-ROM), optical storage devices, magnetic storage devices, or any suitable combination of the above.
  • computer-readable storage media can be any tangible medium containing or storing a program, which can be used by an instruction execution system, device or device or used in combination with it.
  • Computer-readable signal media may include data signals propagated in baseband or as part of a carrier wave, which carry computer-readable program code. Such propagated data signals may take a variety of forms, including but not limited to electromagnetic signals, optical signals, or any suitable combination of the above. Computer-readable signal media may also be any computer-readable medium other than a computer-readable storage medium, which may send, propagate, or transmit a program for use by or in conjunction with an instruction execution system, apparatus, or device.
  • the program code embodied on the computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
  • Computer program code for performing the operations of the present application may be written in one or more programming languages or a combination thereof, including object-oriented programming languages, such as Java, Smalltalk, C++, and conventional procedural programming languages, such as "C" or similar programming languages.
  • the program code may be executed entirely on the user's computer, partially on the user's computer, as a separate software package, partially on the user's computer and partially on a remote computer, or entirely on a remote computer or server.
  • the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or may be connected to an external computer (e.g., via the Internet using an Internet service provider).
  • LAN local area network
  • WAN wide area network
  • Internet service provider e.g., via the Internet using an Internet service provider
  • An embodiment of the present application provides a computer program product, which stores program instructions.
  • the program instructions When the program instructions are executed on a computer, the computer implements the data processing method described in any of the above embodiments.

Landscapes

  • Compression, Expansion, Code Conversion, And Decoders (AREA)

Abstract

本申请公开了一种数据处理方法,包括获取信息比特序列,所述信息比特序列包括K个信息比特,K是大于0的整数;根据第一编码参数、量化权重值序列和可靠度阈值中的至少之一,对所述信息比特序列进行编码,得到编码数据序列,其中,所述编码数据序列包括N个编码数据,N是大于K的整数,所述量化权重值序列包括n个量化权重值,N表示极化子信道数量,N小于或等于2的n次幂;发送所述编码数据序列。

Description

数据处理方法、设备和存储介质
相关申请的交叉引用
本申请基于申请号为202211557955.8、申请日为2022年12月06日的中国专利申请提出,并要求该中国专利申请的优先权,该中国专利申请的全部内容在此引入本申请作为参考。
技术领域
本申请涉及通信技术领域,尤其涉及一种数据处理方法、设备和存储介质。
背景技术
由于极化(Polar)码在短码上具有更高的可靠性,在第三代移动通信合作伙伴项目(3rd Generation Partnership Project,3GPP)制定的第五代移动通信***(5th Generation Mobile Communication,5G)标准中,Polar码被采纳为5G NR控制消息的编码方案,具体为控制信道中的下行控制信息(Downlonk Control Information,DCI)、上行控制信息(Uplink Control Information,UCI),物理广播信道(Physical Broadcast Channel,PBCH)承载的广播信息。
Polar码序列用于指示Polar码编码前的比特选择顺序,也即“好信道选择”。Polar码为了支持5G NR控制消息灵活的码长和码率需求,需要设计足够实用的子信道可靠度排序序列。极化权重(Polar Weight,PW)序列从标准化与实用化的角度阐明了Polar码序列可以具有和信道参数无关的特点,使得PW序列在各种码长和码率配置下展现出了良好且稳定的性能。
具体应用时,可以在计算获得极化权重后,然后对极化权重由低到高排序,再找到它们原来对应的输入比特的序号,从而得到PW序列。若实时计算PW序列,则在计算极化权重时需要使用很高的精度,导致消耗很多存储晶体管;若从获取存储器中获取PW序列,则需要将大小为Nmax的PW序列存储于存储器中,对于极化子信道数量为N的Polar码,从大小为Nmax的PW序列中顺序抽取前N个元素构成的子序列,构成N个子信道的可靠度排序序列,其中,N小于等于Nmax。这种方式虽然减少了在线计算资源开销,但增大了存储开销。
发明内容
本申请提供了一种数据处理方法、设备和存储介质,以减少Polar码编码过程中使用的存储资源开销。
第一方面,本申请实施例提供一种数据处理方法,所述方法包括以下步骤:
获取信息比特序列,所述信息比特序列包括K个信息比特,K是大于0的整数;
根据第一编码参数、量化权重值序列和可靠度阈值中的至少之一,对所述信息比特序列进行编码,得到编码数据序列,其中,所述编码数据序列包括N个编码数据,N是大于K的整数,所述量化权重值序列包括n个量化权重值,N表示极化子信道数量,N小于或等于2的n次幂;
发送所述编码数据序列。
第二方面,本申请实施例提供一种数据处理方法,所述方法包括以下步骤:
接收由发送端发送的编码数据序列,其中,所述编码数据序列通过以下方式获得:根据第一编码参数、量化权重值序列和可靠度阈值中的至少之一对信息比特序列进行编码以得到所述编码数据序列,所述信息比特序列包括K个信息比特,K是大于0的整数,所述编码数据序列包括N个编码数据,N是大于K的整数,所述量化权重值序列包括n个量化权重值,N表示极化子信道数量,N小于或等于2的n次幂。
第三方面,本申请实施例提供了一种电子设备,包括:
至少一个处理器;
至少一个存储器,用于存储至少一个程序;
当至少一个所述程序被至少一个所述处理器执行时实现如上第一方面或第二方面所述的数据处理方法。
第四方面,本申请实施例提供了一种计算机可读存储介质,其中存储有处理器可执行的程序,所述处理器可执行的程序被处理器执行时用于实现如上第一方面或第二方面所述的数据处理方法。
第五方面,本申请实施例提供了一种计算机程序产品,包括计算机程序或计算机指令,所述计算机程序或所述计算机指令存储在计算机可读存储介质中,计算机设备的处理器从所述计算机可读存储介质读取所述计算机程序或所述计算机指令,所述处理器执行所述计算机程序或所述计算机指令,使得所述计算机设备执行如上第一方面或第二方面所述的数据处理方法。
本申请实施例,根据第一编码参数、量化权重值序列和可靠度阈值中的至少之一,对包括K个信息比 特的信息比特序列进行编码,得到编码数据序列,其中,所述编码数据序列包括N个编码数据,N是大于K的整数,所述量化权重值序列包括n个量化权重值,N表示极化子信道数量,N小于或等于2的n次幂。如此,在具体实施过程中,通过在线确定各个子信道传输信息比特还是冻结比特,得到包含信息比特和冻结比特的消息序列,进而通过对消息序列进行编码,得到编码数据序列,从而减少存储开销,减少存储晶体管使用数量。
附图说明
图1a是一种实现添加冻结比特的逻辑代码示意图;
图1b是N=16的极化变换因子图;
图2是本申请实施例适用的通信***的架构示意图;
图3是本申请实施例提供的一种数据处理方法的流程示意图;
图4-图7是本申请实施例提供的实现信息与冻结比特序列更新的逻辑代码示意图;
图8-图9是本申请实施例提供的串行编码逻辑代码示意图;
图10是本申请实施例提供的另一种数据处理方法的流程示意图;
图11是本申请实施例提供的一种数据处理装置的结构示意图;
图12是本申请实施例提供的一种电子设备的结构示意图。
具体实施方式
下面结合说明书附图和具体的实施例对本申请进行进一步的说明。
在以下的描述中,涉及到“一些实施例”,其描述了所有可能实施例的子集,但是可以理解,“一些实施例”可以是所有可能实施例的相同子集或不同子集,并且可以在不冲突的情况下相互结合。
除非另有定义,本文所使用的所有的技术和科学术语与属于本申请的技术领域的技术人员通常理解的含义相同。本文中所使用的术语只是为了描述本申请实施例的目的,不是旨在限制本申请。
为了便于理解本申请实施例的方案,下面先对本申请实施例涉及的技术名词进行解释。
(1)极化权重(Polar Weight,PW)序列:
对于PW序列,索引位i的极化子信道可靠度的计算公式为:
其中,Wi为第i个输入比特(第i个子信道)上用的极化权重;i表示第几个输入比特的序号,对于极化子信道数量为N=2n的Polar码,i=0,1,2,…,N-2,N-1;n为用二进制表达整数N所需要的比特数;i的二进制形式表示为i=Bn-1Bn-2…B2B1B0,B0为最低位;Bj表示将整数i变成二进制形式的第j个比特,其值为比特0或比特1,j=0,1,2,…,n-2,n-1。
需说明的是,对于极化子信道数量Nmax=2n计算得到的量化权重值序列β=[βn-1n-2,…,β0],可以用于极化子信道数量N=2t,t=n,n-1,n-2,…,1,的Polar编码。例如,根据n=10、Nmax=1024计算得到的量化权重值序列β=[β98,…,β0],以上配置可用于极化子信道数量N=1024,512,256,128……的Polar编码,所以N可以小于或者等于2n。为便于描述,在本申请实施例的方案中,将Nmax统一由N描述,且N=2n
表1给出了N=16的PW序列,即PW=[0,1,2,4,8,3,5,6,9,10,12,7,11,13,14,15],其中第一个元素“0”表示最低可靠度子信道的索引编号,最后一个元素“15”表示最高可靠度子信道的索引编号。
表1长度为N=16的PW序列
(2)Polar码编码
令a=[a0,a1,…,aK-1],a是长度为K的信息序列,N为极化子信道数量,把信息序列a编码为长度 为N的码字d=[d0,d1,…,dN-1]的编码过程如下:
(1)添加冻结比特:选择合适的承载信息比特的子信道和放置冻结比特的子信道,对消息序列a=[a0,a1,…,aK-1]添加N-K个比特0,得到序列u=[u0,u1,…,uN-1]。示例性的,添加冻结比特的过程可通过图1a所示的逻辑代码实现。
极化变换:把序列u与N行N列的极化矩阵GN,在GF(2)上相乘得到码字d=u·GN,其中,
图1b给出了N=16的极化变换因子图。
在3GPP制定的5G标准协议TS 38.212中,Polar码序列和相应的可靠度由一个表格给出,当码长为N时,存储Polar码序列需要log2(N)*N比特存储器。在把信息序列a编码为长度为N的码字d的编码过程中,首先根据Polar码序列,对消息序列a=[a0,a1,…,aK-1]添加N-K个比特0,得到序列u=[u0,u1,…,uN-1];然后将序列u作为极化变换输入,经过逻辑运算得到长度为N的码字d。为减少存储开销,本申请提出一种在线计算子信道可靠度并确定信息比特位置的数据处理方法。
请参见图2,图2示出了本申请实施例适用的一种通信***的架构示意图。图2所示的通信***包括第一传输节点110和第二传输节点120,第一传输节点110向第二传输节点120发送编码数据序列。其中,第一传输节点110、第二传输节点120可以但不限于包括以下设备之一:基站(Base Station,BS)、接入点(Access Point,AP)、节点B(node B)、g节点B(g node B,generalized node B)、无线电网络控制器(Radio Network Controller,RNC)、演进型Node B(Evolved Node B,eNB)、基站控制器(Base Station Controller,BSC)、基站收发台(Base Transceiver Station,BTS)、收发机功能体(Transceiver Function,TF)、无线电路由器、无线电收发机、基本服务单元(Basic Service Set,BSS)、扩展服务单元(Extended Service Set,ESS)或无线电基站(Radio Base Station,RBS),本申请实施例对此不作具体限定。
在一可行的实施方式中,第一传输节点110、第二传输节点120可以称为接入终端、用户设备(User Equipment,UE)、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、无线通信设备、用户代理或用户装置。例如,第一传输节点110、第二传输节点120可以是蜂窝电话、无绳电话、会话启动协议(Session Initiation Protocol,SIP)电话、无线本地环路(Wireless Local Loop,WLL)站、个人数字处理(Personal Digital Assistant,PDA)、有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备、5G网络或者未来5G以上网络中的终端设备等,本申请实施例对此不作具体限定。
请参见图3,图3是本申请实施例的第一方面提供的一种数据处理方法的流程示意图,该数据处理方法可应用于图2所示的第一传输节点110。如图3所示,该数据处理方法包括以下步骤S100-S300,下面依次介绍各个步骤:
步骤S100:获取信息比特序列,信息比特序列包括K个信息比特,K是大于0的整数。
步骤S200:根据第一编码参数、量化权重值序列和可靠度阈值中的至少之一,对信息比特序列进行编码,得到编码数据序列,其中,编码数据序列包括N个编码数据,N是大于K的整数,量化权重值序列包括n个量化权重值,N表示极化子信道数量,N小于或等于2的n次幂。
步骤S300:发送编码数据序列。
示例性的,第一编码参数包括以下至少之一:
(1)信息比特序列大小,指信息比特序列包含的信息比特数量,本申请实施例中,信息比特数量使用K表示,K是大于0的整数;
(2)极化子信道数量,指示传输极化码的子信道数量,本申请实施例中,极化子信道数量使用N表示,N为2的正整数次幂,且N大于K;
(3)码率,指K/N,即信息比特序列大小K与极化子信道数量N的比值,本申请实施例中,码率使用R表示;
(4)信息索引编号,用于索引信息与冻结比特序列中的信息比特的编号,本申请实施例中,信息索引编号使用k表示,k为大于等于0且小于等于(K-1)的整数,或k为大于等于(N-K)且小于等于(N-1)的整数;
(5)子信道索引编号,指示极化码子信道的编号,本申请实施例用i表示子信道索引编号,i为大于等于0小于N的整数;
(6)极化编码阶段索引编号,指示极化编码阶段的编号,本申请实施例用stage0、stage1…表示极化编码阶段索引编号,用stage-1表示由信息比特序列获得信息与冻结比特序列的阶段;
(7)传输块比特数量TBS,为一个正整数;
(8)循环冗余校验位比特数量LCRC,为一个正整数;
(9)奇偶校验位比特数量LPC,为一个正整数。
可以理解的是,第一编码参数可以根据具体应用场景来进行选择设置,此处并未限制,关于上述第一编码参数的具体应用原理将在下述各个实施例中进行说明,此处不作赘述。
示例性的,步骤S200中的编码数据序列具体可以通过以下步骤S210-S220获得:
步骤S210:根据第一编码参数、量化权重值序列和可靠度阈值中的至少之一,在信息比特序列中添加冻结比特,得到信息与冻结比特序列,其中,信息与冻结比特序列包括N个比特;
步骤S220:对信息与冻结比特序列进行编码,得到编码数据序列。
示例性的,对于输入的信息比特序列a=[a0,a1,…,aK-1],在信息比特序列a的K个信息比特之中添加(N-K)个冻结比特,得到信息与冻结比特序列u=[u0,u1,…,uN-1]。可以理解的是,信息与冻结比特序列u中包含K个信息比特和(N-K)个冻结比特,信息比特和冻结比特的位置根据第一编码参数、量化权重值序列和可靠度阈值中的至少之一确定。
示例性的,步骤S210的信息与冻结比特序列具体可以通过以下步骤S211-S212获得:
步骤S211:根据预设规则在信息比特序列中添加冻结比特,得到初始的信息与冻结比特序列,其中,信息与冻结比特序列包括N个比特。
示例性的,初始的信息与冻结比特序列可以通过以下任一种方式获得:
方式1:将信息比特序列中的信息比特顺序设置于初始信息与冻结比特序列的前K个比特位。
可以理解的是,信息比特序列a=[a0,a1,…,aK-1],当将信息比特顺序设置于信息与冻结比特序列的前K个比特位时,获得初始信息与冻结比特序列u=[u0,u1,…,uN-1]=[a0,a1,…,aK-1,0,…,0],N表示极化子信道数量,其值为2的正整数次幂,K为信息比特数量,其值为正整数,且满足K<N。
方式2:将信息比特序列中的信息比特顺序设置于初始的信息与冻结比特位序列的后K个比特位。
可以理解的是,信息比特序列a=[a0,a1,…,aK-1],当将信息比特顺序设置于信息与冻结比特序列的后K个比特位时,获得初始的信息与冻结比特序列u=[u0,u1,…,uN-1]=[0,…,0,a0,a1,…,aK-1],N表示极化子信道数量,其值为2的正整数次幂,K为信息比特数量,其值为正整数,且满足K<N。
方式3:将信息比特序列中的信息比特倒序设置于初始的信息与冻结比特序列序列的前K个比特位。
可以理解的是,信息比特序列a=[a0,a1,…,aK-1],当将信息比特倒序设置于信息与冻结比特序列的前K个比特位时,获得初始的信息与冻结比特序列u=[u0,u1,…,uN-1]=[aK-1,aK-2,…,a0,0,…,0],N表示极化子信道数量,其值为2的正整数次幂,K为信息比特数量,其值为正整数,且满足K<N。
方式4:将信息比特序列中的信息比特倒序设置于初始的信息与冻结比特序列的后K个比特位。
可以理解的是,信息比特序列a=[a0,a1,…,aK-1],当将信息比特序列中的信息比特倒序设置于初始信息与冻结比特序列的后K个比特位时,获得初始的信息与冻结比特序列u=[u0,u1,…,uN-1]=[0,…,0,aK-1,aK-2,…,a0],N表示极化子信道数量,其值为2的正整数次幂,K为信息比特数量,其值为正整数,且满足K<N。
信息比特序列按照上述方式初始存储于信息与冻结比特序列时,可通过信息索引编号和信息与冻结比特指示,调整信息比特在信息与冻结比特序列中的位置,获得最终输入极化信道的信息与冻结比特序列,而不需要额外的存储空间储存信息比特,因此节省存储空间。
步骤S212:按照子信道索引编号由大到小或者由小到大的顺序,依次对N个极化子信道进行遍历,并针对当前遍历到的极化子信道,执行以下步骤S2121-S2123:
步骤S2121:根据量化权重值序列确定当前遍历到的极化子信道的子信道可靠度值;
步骤S2122:根据可靠度阈值和子信道可靠度值确定当前遍历到的极化子信道对应的冻结比特指示;
步骤S2123:根据冻结比特指示确定信息与冻结比特序列中与当前遍历到的极化子信道对应的比特的取值,并根据比特的取值更新信息与冻结比特序列。
示例性的,将N个极化子信道对应的子信道索引编号按照由大到小或者由小到大的顺序排列,得到子信道索引编号序列[0,1,…,N-1]或者[N-1,N-2,…,0];然后对子信道索引编号序列中各个子信道索引编号对应的极化子信道进行遍历,每遍历一个极化子信道,则确定当前遍历到的极化子信道对应的子信道可靠度值以及冻结比特指示,再根据冻结比特指示确定当前遍历到的极化子信道承载的比特为信息比特还是冻结比特,进而对信息与冻结比特序列进行更新。当N个极化子信道遍历完毕,则得到最终的信息与冻结比特序列。
需说明的是,本申请实施例中使用β表示量化权重值序列,β包括n个量化权重值,β中的第j个量化权重值βj表示子信道索引编号的二进制形式中第j个比特位对应的量化权重值,j为0至(n-1)中的任一整数。示例性的,子信道索引编号i的二进制形式表示为i=Bn-1Bn-2…B2B1B0,第0个比特B0为最低位,第n-1个比特Bn-1为最高位,那么βj为Bj对应的量化权重值,Bj表示子信道索引编号i的二进制形式中第j个比特位,j∈{0,1,…,n-1},n=log2N,N为极化子信道数量。
可以理解的是,量化权重值序列中n个量化权重值按照升序或者降序排列。当按照升序排列时,量化 权重值序列β可表示为:β=[β01,…,βn-1];当按照降序排列时,量化权重值序列β可表示为:β=[βn-1n-2,…,β0]。
可以理解的是,量化权重值序列β中所有量化权重值之和小于第一数值,这里,使用M表示第一数值,即βn-1n-2+…+β0<M。需说明的是,M为2的正整数次幂,示例性的,第一数值的取值包括以下之一:256、512、1024、2048或者4096。
可以理解的是,量化权重值序列的确定方式可以有以下两种:
第一种,量化权重值序列可以是预先预定的,预先设定的量化权重值序列β=[βn-1n-2,…,β0]满足:βn-1n-2+…+β0<M,M为2的正整数次幂。
第二种,根根据量化权重值序列获得的量化极化权重序列(量化PW序列)与极化权重序列(PW序列)的差别数不大于第二数值D的约束条件下确定。其中,第二数值D为大于等于0且小于等于N的整数。假设M=2l,l是一个正整数,当M=2l时,每个可靠度阈值最多仅需要l个比特存储。
作为示例,量化权重值序列β包括以下之一:
β=[96,81,68,57,48,40,34,28,24,20];或者,
β=[197,165,139,116,98,82,68,58,49,41];或者,
β=[389,327,275,231,194,163,137,115,97,82];或者,
β=[780,656,552,464,390,328,276,232,195,164];或者,
β=[51,43,36,30,25,21,18,15,13];或者,
β=[101,85,71,60,50,42,35,30,25];或者,
β=[206,173,145,122,102,86,73,61,51];或者,
β=[480,404,340,286,240,202,170,143,120]。
示例性的,本申请实施例的可靠度阈值可以根据索引值从预设的映射关系中获得,其中,索引值包括但不仅限于根据信息比特数量K、极化子信道数量N和码率R中的至少之一确定,映射关系包括但不限于以下至少之一:映射公式、映射表格或者映射图,当然,映射关系还可以是其它具有对应关系的表述,本申请实施例对此不作限制。
在一种可能的实现方式中,对于信息比特序列a=[a0,a1,…,aK-1],根据量化权重值序列可以计算获得第i个子信道可靠度值,根据映射关系可以获得可靠度阈值,通过比较第i个子信道可靠度值与可靠度阈值,可确定第i个子信道是否承载信息比特,从而确定信息与冻结比特序列u=[u0,u1,…,uN-1],进而对信息与冻结比特序列u进行编码得到编码数据d=[d0,d1,…,dN-1]。
可以理解的是,信息比特序列和信息与冻结比特序列满足以下映射关系:uf1(j)=af2(j),其中,f1是j的函数,包括但不限于由f2(j)、信息与冻结比特指示、信息索引编号确定,f1(j)∈{0,1,…,N-1};f2是j的函数,包括但不限于f(j)=j、f(j)=K-j,f2(j)∈{0,1,…,K-1};j=0,1,…,K-1。基于以上映射关系,可以根据获得的信息比特序列a=[a0,a1,…,aK-1]确定信息与冻结比特序列u=[u0,u1,…,uN-1]中的元素。
下面通过一些具体示例对本申请实施例提供的数据处理方法进行说明。
示例一:
根据索引值从预设的映射关系中获得可靠度阈值wth,本示例中,索引值根据信息比特数量K的取值和极化子信道数量N的取值确定,并通过映射表格(下称作可靠度阈值表)记录信息比特数量K、极化子信道数量N与可靠度阈值之间的映射关系。
示例性的,N为2的正整数次幂,包括但不限于以下之一:32、64、128、256、512、1024;K为正整数,包括但不限于以下之一:25、35、43、51、59、67、75、83、91、99、107、115、123、131、139、147、155、163、171、179、187、195、203、219、235、251、267、283、299;wK,N<M,M为2的正整数次幂,M的取值包括但不限于如下之一:256、512、1024、2048、4096。参见表2,表2为一种可行的通过K和N索引的可靠度阈值表;在另一些示例中,可靠度阈值表包含表2中至少一行或至少一列。可以理解的是,表2仅是一种可行的可靠度阈值表映射形式,也可以是其它映射形式,本实施例对此并不做具体限定。
表2通过K和N索引的可靠度阈值表

可以理解的是,可靠度阈值随信息比特数量K的变化关系、以及随极化子信道数量N的变化关系可以从可靠度阈值表格中获得,某个数值K和某个数值N组合下对应的可靠度阈值包括以下之一:NaN、wK,N,其中,“NaN”为空值,表示当前K和N组合下的可靠度阈值不存在,wK,N为K和N组合下的可靠度阈值。
可以理解的是,在K的取值大于等于N的取值的情况下,与K的取值和N的取值对应的可靠度阈值为NaN,其中,NaN表示可靠度阈值为空值。
还可以理解的是,在K的取值小于N的取值的情况下,与K的取值和N的取值对应的可靠度阈值为wK,N,在一可行的实施方式中,wK,N的取值通过以下步骤S310-S313确定:
步骤S310:根据量化权重值序列β和各个极化子信道分别对应的子信道索引编号i计算极化子信道对应的子信道可靠度值;
步骤S311:根据N个极化子信道对应的子信道可靠度值得到子信道可靠度序列;
步骤S312:从子信道可靠度序列中选取K个最大的子信道可靠度值;
步骤S313:从K个最大的子信道可靠度值选取最小的子信道可靠度值作为wK,N
也就是说,根据量化权重值序列β和子信道索引编号i,计算N个子信道可靠度值w'=[w'0,w'1,…,w'N-1];从w’中选取最大的K个可靠度值,再从最大的K个可靠度值中选取最小值wN-K,wN-K为可靠度阈值表中(N,K)位置的元素值。
示例性的,第i个子信道的可靠度阈值w'i根据以下公式(2)确定:
其中,n=log2N,表示用二进制表达整数N所需要的比特数;i为大于等于0且小于N的整数,i采用二进制形式表示,i=Bn-1Bn-2…B2B1B0;Bj表示将整数i变成二进制形式的第j个比特。
可以理解的是,对于任意取值的N,分别具有对应的K1和K2,K1和K2表示K的两个不同的取值,在K1小于K2的情况下,存在wK1,N大于wK2,N,wK1,N表示与K1的取值和N的取值对应的可靠度阈值,wK2,N表示与 K2的取值和N的取值对应的可靠度阈值。
对于任意取值的K,分别具有对应的N1和N2,N1和N2表示N的两个不同的取值,在N1小于N2的情况下,存在wK,N1小于wK,N2,wK,N1表示与K的取值和N1的取值对应的可靠度阈值,wK,N2表示与K的取值和N2的取值对应的可靠度阈值。
示例二:
根据索引值从预设的映射关系中获得可靠度阈值wth,本示例中,索引值根据信息比特数量K的取值和码率R的取值确定,并通过映射表格(下称作可靠度阈值表)记录信息比特数量K、码率R与可靠度阈值之间的映射关系。
示例性的,R大于0且小于1的实数,包括但不限于以下之一:25/32、25/64、25/128、25/256、25/512、25/1024、35/64、35/128、35/256、35/512、35/1024、43/64、43/128、43/256、43/512、43/1024、51/64、51/128、51/256、51/512、51/1024、59/64、59/128、59/256、59/512、59/1024;K为正整数,包括但不限于以下之一:25、35、43、51、59;wK,R<M,M为2的正整数次幂,M的取值包括但不限于如下之一:256、512、1024、2048、4096;通过K和R索引的可靠度阈值表如表3所示,在另一些示例中,可靠度阈值表包含表3中至少一行或至少一列。可以理解的是,表3仅是一种可行的可靠度阈值表映射形式,也可以是其它映射形式,本实施例对此并不做具体限定。
表3通过K和R索引的可靠度阈值表
可以理解的是,可靠度阈值随信息比特数量K的变化关系、以及随码率R的变化关系可以从可靠度阈值表格中获得。某个数值K和某个数值R组合下对应的可靠度阈值包括以下之一:NaN、wK,R,其中,“NaN”为空值,表示当前K和R组合下的可靠度阈值不存在,wK,R表示K和R组合下的可靠度阈值。
可以理解的是,在K大于等于K/R的情况下,与K的取值和R的取值对应的可靠度阈值为NaN,其中NaN表示可靠度阈值为空值。
还可以理解的是,在K小于K/R的情况下,与K的取值和R的取值对应的可靠度阈值为wK,R,在一可行的实施方式中,wK,R的取值通过以下步骤S320-S323确定:
步骤S320:根据K的取值和R的取值,确定N的取值;
步骤S321:根据量化权重值序列β和N个极化子信道分别对应的子信道索引编号i计算各个极化子信道对应的子信道可靠度值;
步骤S322:根据N个极化子信道对应的子信道可靠度值得到子信道可靠度序列,从子信道可靠度序列中选取K个最大的子信道可靠度值;
步骤S323:从K个最大的子信道可靠度值选取最小的子信道可靠度值,并将最小的子信道可靠度值作为wK,R
也就是说,先根据信息比特数量K和码率R确定极化子信道数量N,示例性的,N=K/R;再根据量化权重值序列β和子信道索引编号i,计算N个子信道可靠度值w'=[w'0,w'1,…,w'N-1];从w'中选取最大的K个可靠度值,然后从最大的K个可靠度值中选取最小值wN-K,wN-K为可靠度阈值表中(R,K)位置的元素值。
可以理解的是,对于任意取值的K,分别具有对应的R1和R2,R1和R2表示R的两个不同的取值,在R1小于R2的情况下,存在wK,R1大于wK,R2,wK,R1表示与K的取值和R1的取值对应的可靠度阈值,wK,R2表示与K的取值和R2的取值对应的可靠度阈值。
示例三:
根据索引值从预设的映射关系中获得可靠度阈值,本示例中,索引值根据信息比特数量K的取值和极化子信道数量N的取值确定,通过可靠度阈值表记录信息比特数量K、极化子信道数量N与可靠度阈值之间的映射关系,并且可靠度阈值表中的元素基于量化权重值序列β确定。
示例性的,量化权重值序列β=[βn-1n-2,…,β0]=[96,81,68,57,48,40,34,28,24,20],n=10;N为2的正整数次幂,包括但不限于以下之一:32、64、128、256、512、1024;K为正整数,包括但不限于以下之一:25、35、43、51、59、67、75、83、91、99、107、115、123、131、139、147、155、163、171、179、187、195、203、219、235、251、267、283、299;可靠度阈值表格的一个具体示例如表4,在另一示例中,可靠度阈值表包含表4中至少一行或至少一列。
表4β=[96,81,68,57,48,40,34,28,24,20]时的可靠度阈值表
示例四:
根据索引值从预设的映射关系中获得可靠度阈值,本示例中,索引值根据信息比特数量K的取值和极化子信道数量N的取值确定,通过可靠度阈值表记录信息比特数量K、极化子信道数量N与可靠度阈值之间的映射关系,并且可靠度阈值表中的元素基于量化权重值序列β确定。
示例性的,量化权重值序列β=[βn-1n-2,…,β0]=[197,165,139,116,98,82,68,58,49,41],n=10;N为2的正整数次幂,包括但不限于以下之一:32、64、128、256、512、1024;K为正整数,包括但不限于以下之一:25、35、43、51、59、67、75、83、91、99、107、115、123、131、139、147、155、163、171、179、187、195、203、219、235、251、267、283、299;可靠度阈值表格的一个具体示例如表5,在另一示例中,可靠度阈值表包含表5中至少一行或至少一列。
表5β=[197,165,139,116,98,82,68,58,49,41]时的可靠度阈值表
示例五:
根据索引值从预设的映射关系中获得可靠度阈值,本示例中,索引值根据信息比特数量K的取值和极化子信道数量N的取值确定,通过可靠度阈值表记录信息比特数量K、极化子信道数量N与可靠度阈值之间的映射关系,并且可靠度阈值表中的元素基于量化权重值序列β确定。
示例性的,量化权重值序列β=[βn-1n-2,…,β0]=[389,327,275,231,194,163,137,115,97,82],n=10;N为2的正整数次幂,包括但不限于以下之一:32、64、128、256、512、1024;K为正整数,包括但不限于以下之一:25、35、43、51、59、67、75、83、91、99、107、115、123、131、139、147、155、163、171、179、187、195、203、219、235、251、267、283、299;可靠度阈值表格的一个具体示例如表6,在另一示例中,可靠度阈值表包含表6中至少一行或至少一列。
表6β=[389,327,275,231,194,163,137,115,97,82]时的可靠度阈值表

示例六:
根据索引值从预设的映射关系中获得可靠度阈值,本示例中,索引值根据信息比特数量K的取值和极化子信道数量N的取值确定,通过可靠度阈值表记录信息比特数量K、极化子信道数量N与可靠度阈值之间的映射关系,并且可靠度阈值表中的元素基于量化权重值序列β确定。
示例性的,量化权重值序列β=[βn-1n-2,…,β0]=[780,656,552,464,390,328,276,232,195,164],n=10;N为2的正整数次幂,包括但不限于以下之一:32、64、128、256、512、1024;K为正整数,包括但不限于以下之一:25、35、43、51、59、67、75、83、91、99、107、115、123、131、139、147、155、163、171、179、187、195、203、219、235、251、267、283、299;可靠度阈值表格的一个具体示例如表7,在另一示例中,可靠度阈值表包含表7中至少一行或至少一列。
表7β=[780,656,552,464,390,328,276,232,195,164]时的可靠度阈值表

示例七:
根据索引值从预设的映射关系中获得可靠度阈值,本示例中,索引值根据信息比特数量K的取值和极化子信道数量N的取值确定,通过可靠度阈值表记录信息比特数量K、极化子信道数量N与可靠度阈值之间的映射关系,并且可靠度阈值表中的元素基于量化权重值序列β确定。
示例性的,量化权重值序列β=[βn-1n-2,…,β0]=[51,43,36,30,25,21,18,15,13],n=9;N为2的正整数次幂,包括但不限于以下之一:32、64、128、256、512;K为正整数,包括但不限于以下之一:25、35、43、51、59、67、75、83、91、99、107、115、123、131、139、147、155、163、171、179、187、195、203、219、235、251、267、283、299;可靠度阈值表格的一个具体示例如表8,在另一示例中,可靠度阈值表包含表8中至少一行或至少一列。
表8β=[51,43,36,30,25,21,18,15,13]时的可靠度阈值表

示例八:
根据索引值从预设的映射关系中获得可靠度阈值,本示例中,索引值根据信息比特数量K的取值和极化子信道数量N的取值确定,通过可靠度阈值表记录信息比特数量K、极化子信道数量N与可靠度阈值之间的映射关系,并且可靠度阈值表中的元素基于量化权重值序列β确定。
示例性的,量化权重值序列β=[βn-1n-2,…,β0]=[101,85,71,60,50,42,35,30,25],n=9;N为2的正整数次幂,包括但不限于以下之一:32、64、128、256、512;K为正整数,包括但不限于以下之一:25、35、43、51、59、67、75、83、91、99、107、115、123、131、139、147、155、163、171、179、187、195、203、219、235、251、267、283、299;可靠度阈值表格的一个具体示例如表9,在另一示例中,可靠度阈值表包含表9中至少一行或至少一列。
表9β=[101,85,71,60,50,42,35,30,25]时的可靠度阈值表

示例九:
根据索引值从预设的映射关系中获得可靠度阈值,本示例中,索引值根据信息比特数量K的取值和极化子信道数量N的取值确定,通过可靠度阈值表记录信息比特数量K、极化子信道数量N与可靠度阈值之间的映射关系,并且可靠度阈值表中的元素基于量化权重值序列β确定。
示例性的,量化权重值序列β=[βn-1n-2,…,β0]=[206,173,145,122,102,86,73,61,51],n=9;N为2的正整数次幂,包括但不限于以下之一:32、64、128、256、512;K为正整数,包括但不限于以下之一:25、35、43、51、59、67、75、83、91、99、107、115、123、131、139、147、155、163、171、179、187、195、203、219、235、251、267、283、299;可靠度阈值表格的一个具体示例如表10,在另一示例中,可靠度阈值表包含表10中至少一行或至少一列。
表10β=[206,173,145,122,102,86,73,61,51]时的可靠度阈值表

示例十:
根据索引值从预设的映射关系中获得可靠度阈值,本示例中,索引值根据信息比特数量K的取值和极化子信道数量N的取值确定,通过可靠度阈值表记录信息比特数量K、极化子信道数量N与可靠度阈值之间的映射关系,并且可靠度阈值表中的元素基于量化权重值序列β确定。
示例性的,量化权重值序列β=[βn-1n-2,…,β0]=[480,404,340,286,240,202,170,143,120],n=9;N为2的正整数次幂,包括但不限于以下之一:32、64、128、256、512;K为正整数,包括但不限于以下之一:25、35、43、51、59、67、75、83、91、99、107、115、123、131、139、147、155、163、171、179、187、195、203、219、235、251、267、283、299;可靠度阈值表格的一个具体示例如表11,在另一示例中,可靠度阈值表包含表11中至少一行或至少一列。
表11β=[480,404,340,286,240,202,170,143,120]时的可靠度阈值表
示例十一:
根据索引值从预设的映射关系中获得可靠度阈值,本示例中,索引值根据信息比特数量K的取值和码率R的取值确定,通过可靠度阈值表记录信息比特数量K、码率R与可靠度阈值之间的映射关系,并且可 靠度阈值表中的元素基于量化权重值序列β确定。
示例性的,量化权重值序列β=[βn-1n-2,…,β0]=[97,165,139,116,98,82,68,58,49,41],n=10;R为大于0且小于1的实数,包括但不限于以下之一:25/32、25/64、25/128、25/256、25/512、25/1024、35/64、35/128、35/256、35/512、35/1024、43/64、43/128、43/256、43/512、43/1024、51/64、51/128、51/256、51/512、51/1024、59/64、59/128、59/256、59/512、59/1024;K为正整数,包括但不限于以下之一:25、35、43、51、59;可靠度阈值表格的一个具体示例如表12,在另一示例中,可靠度阈值表包含表12中至少一行或至少一列。
表12β=[197,165,139,116,98,82,68,58,49,41]时,通过K与R索引的可靠度阈值表
示例十二:
根据索引值从预设的映射关系中获得可靠度阈值,本示例中,索引值根据信息比特数量K的取值和码率R的取值确定,通过可靠度阈值表记录信息比特数量K、码率R与可靠度阈值之间的映射关系,并且可靠度阈值表中的元素基于量化权重值序列β确定。
示例性的,量化权重值序列β=[βn-1n-2,…,β0]=[480,404,340,286,240,202,170,143,120],n=9;R为大于0且小于1的实数,包括但不限于以下之一:25/32、25/64、25/128、25/256、25/512、35/64、35/128、35/256、35/512、43/64、43/128、43/256、43/512、51/64、51/128、51/256、51/512、59/64、59/128、59/256、59/512;K为正整数,包括但不限于以下之一:25、35、43、51、59;可靠度阈值表格的一个具体示例如表13,在另一示例中,可靠度阈值表包含表13中至少一行或至少一列。
表13β=[480,404,340,286,240,202,170,143,120]时,通过K与R索引的可靠度阈值表
示例十三:
在一种可能的实施例中,基于量化权重值序列计算子信道可靠度值,第i个极化子信道的可靠度阈值根据下式计算得到:
其中,n=log2N,表示用二进制表达整数N所需要的比特数;i为大于等于0且小于N的整数,i采用二进制形式表示,i=Bn-1Bn-2…B2B1B0;Bj表示将整数i变成二进制形式的第j个比特,其值为比特0或比特1,j∈{0,1,2,…,n-2,n-1};βj为i的二进制形式中,第j个比特位Bj对应的量化权重值,其值是大于0的整数。
可以理解的是,量化权重值序列β包括以下之一:β=[βn-1n-2,…,β0]是降序的正整数序列;或者,β=[β01,…,βn-1]是升序的正整数序列。
可以理解的是,量化权重值序列β满足但不限于以下条件之一:量化权重值序列β包含n个量化权重值,βj为Bj对应的量化权重值,Bj表示将整数二进制形式的i中的第j比特,i=Bn-1Bn-2…B2B1B0,第0个比特B0为最低位,第n-1个比特Bn-1为最高位,n=log2N,N为极化子信道数量,j∈{0,1,2,…,n-2,n-1}。
可以理解的是,量化权重值序列β=[βn-1n-2,…,β0]满足:βn-1n-2+…+β0<M,其中M为2的正整数次幂。具体的,M的取值包括如下至少之一:256、512、1024、2048、4096。
可以理解的是,量化权重值序列β=[βn-1n-2,…,β0]根据但不限于以下至少之一确定:量化权重值序列预先设定、量化权重值序列根据元素之和βn-1n-2+…+β0<M、根据量化权重值序列获得的量化PW序列与PW序列的差别数不大于第二数值D的约束条件下确定。其中,M为2的正整数次幂,M的取值包括但不限于如下之一:256、512、1024、2048、4096,βj是一个正整数,j∈{0,1,2,…,n-2,n-1},n=log2N;D为大于等于0且小于N的整数。
可以理解的是,当D的值较小时,获得的量化PW序列与PW序列的差别数小,但需要更大的M来满足存在量化PW序列,即需要更多的存储空间存储可靠度阈值;当D的值较大时,获得的量化PW序列与PW序列的差别数大,不需要很大的M即可满足存在量化PW序列,即仅需要较少的存储空间存储可靠度阈值;通过调整D的大小,可以满足不同的应用场景。
在一个示例中,M=256,N=512,n=9,D=254,量化权重值序列β=[βn-1n-2,…,β0]=[51,43,36,30,25,21,18,15,13],其中,量化权重值序列β满足:序列中元素之和βn-1n-2+…+β0=252<M。根据量化权重值序列β计算第i个子信道可靠度值w'i,i=0,1,…,N-1,将N个子信道可靠度值按照由大到小顺序排序,根据排序后的索引值,得到PW'=[PWN-1,PWN-2,…,PW0],其中PWN-1表示最高可靠度值对应的子信道索引编号,PW0表示最低可靠度值对应的子信道索引编号,将PW’序列翻转获得量化PW序列:PWquan=[PW0,PW1,…,PWN-1]。将根据参数获得的量化PW序列(PWquan)与PW序列(PW)进行对比,两者的差别数为254,且不大于D,即在254个位置有PWquan(i)≠PW(i),i=0,1,…,N-1。
在另一个示例中,M=512,N=512,n=9,D=76,量化权重值序列β=[βn-1n-2,…,β0]=[101,85,71,60,50,42,35,30,25],其中,量化权重值序列β符合以下特征:序列中元素之和βn-1n-2+…+β0=499<M。根据量化权重值序列β计算第i个子信道可靠度值w'i,i=0,1,…,N-1,将N个子信道可靠度值按照由大到小顺序排序,根据排序后的索引值,得到PW'=[PWN-1,PWN-2,…,PW0],其中PWN-1表示最高可靠度值对应的子信道索引编号,PW0表示最低可靠度值对应的子信道索引编号,将PW序列翻转获得量化PW序列:PWquan=[PW0,PW1,…,PWN-1]。将根据参数获得的量化PW序列(PWquan)与PW序列(PW)进行对比,两者的差别数为76,且不大于D,即在76个位置有PWquan(i)≠PW(i),i=0,1,…,N-1。
在又一个示例中,M=1024,N=512,n=9,D=6,量化权重值序列β=[βn-1n-2,…,β0]=[206,173,145,122,102,86,73,61,51],其中,量化权重值序列β符合以下特征:序列中元素之和βn-1n-2+…+β0=1019<M。根据量化权重值序列β计算第i个子信道可靠度值w'i,i=0,1,…,N-1,将N个子信道可靠度值按照由大到小顺序排序,根据排序后的索引值,得到PW'=[PWN-1,PWN-2,…,PW0],其中PWN-1表示最高可靠度值对应的子信道索引编号,PW0表示最低可靠度值对应的子信道索引编号,将PW’序列翻转获得量化PW序列PWquan=[PW0,PW1,…,PWN-1]。将根据参数获得的量化PW序列(PWquan)与PW序列(PW)进行对比,两者的差别数为6,且不大于D,即在6个位置有PWquan(i)≠PW(i),i=0,1,…,N-1。
在再一个示例中,M=4096,N=512,n=9,D=0,量化权重值序列β=[βn-1n-2,…,β0]=[480,404,340,286,240,202,170,143,120],其中,量化权重值序列β符合以下特征:序列中元素之和βn-1n-2+…+β0=2385<M。根据量化权重值序列β计算第i个子信道可靠度值w'i,i=0,1,…,N-1,将N个子信道可靠度值按照由大到小顺序排序,根据排序后的索引值,得到PW'=[PWN-1,PWN-2,…,PW0],其中PWN-1表示最高可靠度值对应的子信道索引编号,PW0表示最低可靠度值对应的子信道索引编号,将PW序列翻转获得量化PW序列PWquan=[PW0,PW1,…,PWN-1]。将根据参数获得的量化PW序列(PWquan)与PW序列(PW)进行对比,两者的差别数为0,且不大于D,即在0个位置有PWquan(i)≠PW(i),i=0,1,…,N-1。
在再一个示例中,M=512,N=1024,n=10,D=466,量化权重值序列β=[βn-1n-2,…,β0]=[96,81,68,57,48,40,34,28,24,20],其中,量化权重值序列β符合以下特征:序列中元素之和βn-1n-2+…+β0=496<M。根据量化权重值序列β计算第i个子信道可靠度值w'i,i=0,1,…,N-1,将N个子信道可靠度值按照由大到小顺序排序,根据排序后的索引值,得到PW'=[PWN-1,PWN-2,…,PW0],其中PWN-1表示最高可靠度值对应的子信道索引编号,PW0表示最低可靠度值对应的子信道索引编号,将PW序列翻转获得量化PW序列:PWquan=[PW0,PW1,…,PWN-1。将根据参数获得的量化PW序列(PWquan)与PW序列(PW)进行对比,两者的差别数为466,且不大于D,即在466个位置有PWquan(i)≠PW(i), i=0,1,…,N-1。
在再一个示例中,M=1024,N=1024,n=10,D=70,量化权重值序列β=[βn-1n-2,…,β0]=[197,165,139,116,98,82,68,58,49,41],其中,量化权重值序列β符合以下特征:序列中元素之和βn-1n-2+…+β0=1013<M。根据量化权重值序列β计算第i个子信道可靠度值w'i,i=0,1,…,N-1,将N个子信道可靠度值按照由大到小顺序排序,根据排序后的索引值,得到PW'=[PWN-1,PWN-2,…,PW0],其中PWN-1表示最高可靠度值对应的子信道索引编号,PW0表示最低可靠度值对应的子信道索引编号,将PW序列翻转获得量化PW序列:PWquan=[PW0,PW1,…,PWN-1]。将根据参数获得的量化PW序列(PWquan)与PW序列(PW)进行对比,两者的差别数为70,且不大于D,即在70个位置有PWquan(i)≠PW(i),i=0,1,…,N-1。
在再一个示例中,M=2048,N=1024,n=10,D=24,量化权重值序列β=[βn-1n-2,…,β0]=[389,327,275,231,194,163,137,115,97,82],其中,量化权重值序列β符合以下特征:序列中元素之和βn-1n-2+…+β0=2010<M。根据量化权重值序列β计算第i个子信道可靠度值w'i,i=0,1,…,N-1,将N个子信道可靠度值按照由大到小顺序排序,根据排序后的索引值,得到PW'=[PWN-1,PWN-2,…,PW0],其中PWN-1表示最高可靠度值对应的子信道索引编号,PW0表示最低可靠度值对应的子信道索引编号,将PW序列翻转获得量化PW序列:PWquan=[PW0,PW1,…,PWN-1]。将根据参数获得的量化PW序列(PWquan)与PW序列(PW)进行对比,两者的差别数为24,且不大于D,即在24个位置有PWquan(i)≠PW(i),i=0,1,…,N-1。
在再一个示例中,M=4096,N=1024,n=10,D=0,量化权重值序列β=[βn-1n-2,…,β0]=[780,656,552,464,390,328,276,232,195,164],其中,量化权重值序列β符合以下特征:序列中元素之和βn-1n-2+…+β0=4037<M。根据量化权重值序列β计算第i个子信道可靠度值w'i,i=0,1,…,N-1,将N个子信道可靠度值按照由大到小顺序排序,根据排序后的索引值,得到PW'=[PWN-1,PWN-2,…,PW0],其中PWN-1表示最高可靠度值对应的子信道索引编号,PW0表示最低可靠度值对应的子信道索引编号,将PW序列翻转获得量化PW序列PWquan=[PW0,PW1,…,PWN-1]。将根据参数获得的量化PW序列(PWquan)与PW序列(PW)进行对比,两者的差别数为0,且不大于D,即在0个位置有PWquan(i)≠PW(i),i=0,1,…,N-1。
示例十四:
可以理解的是,极化子信道对应的信息与冻结比特指示根据子信道可靠度值和可靠度阈值确定。具体地,对于第i个子信道,其对应的信息与冻结比特指示的确定过程包括:当第i个子信道的可靠度值w'i大于或等于可靠度阈值wth时,第i个子信道承载信息比特;当第i个子信道的可靠度值w'i小于可靠度阈值wth时,第i个子信道承载冻结比特。
示例性的,第i个子信道的信息与冻结比特指示使用标志位F表示,如果w'i≥wth,则F=b1,表示第i个子信道承载信息位;否则,F=b0,表示第i个子信道承载冻结位。其中b0与b1是两个不相等的二进制比特值。在一具体示例中,如果w'i≥wth,则F=1,表示第i个子信道承载信息位;否则,F=0,表示第i个子信道承载冻结位。
示例十五:
可以理解的是,信息与冻结比特序列中极化子信道对应的比特的取值根据信息与冻结比特指示确定,最终获得的信息与冻结比特序列和信息比特序列满足以下映射关系uf1(j)=af2(j),其中,f1是j的函数,包括但不限于由f2(j)、信息与冻结比特指示、信息索引编号确定,f1(j)∈{0,1,…,N-1};f2是j的函数,包括但不限于f(j)=j、f(j)=K-j,f2(j)∈{0,1,…,K-1};j=0,1,…,K-1。具体地,基于子信道的信息与冻结比特指示,使用信息索引编号对信息与冻结比特序列进行更新。其中,信息索引编号的初始值指向第一个信息比特或者最后一个信息比特。
示例性的,信息比特序列a=[a0,a1,…,aK-1],顺序设置于信息与冻结比特序列的前K个比特位,初始化的信息与冻结比特序列为u=[u0,u1,…,uN-1]=[a0,a1,…,aK-1,0,…,0]。设置信息索引编号初始值k=K-1,指向u中最后一个信息比特aK-1;设置子信道索引编号初始值i=N-1,指向u的最后一个比特;基于信息索引编号k和信息与冻结比特指示F对信息与冻结比特序列进行更新的逻辑代码可参见图4所示,包括但不限于以下步骤:如果k≥0且F=1,则ui=uk,k=k-1,i=i-1;否则,ui=0,i=i-1;上述步骤重复N次,当i=0时,完成信息与冻结比特序列更新,获得最终的信息与冻结比特序列。其中,N为极化子信道数量,其值为2的正整数次幂;K为信息比特数量,其值为正整数,且满足K<N;F=1,表示第i个子信道承载信息比特;F=0,表示第i个子信道承载冻结比特。
示例十六:
信息比特序列a=[a0,a1,…,aK-1],顺序设置于信息与冻结比特序列的后K个比特位,初始化的信息与冻结比特序列为u=[u0,u1,…,uN-1]=[0,…,0,a0,a1,…,aK-1]。设置信息索引编号初始值k=N-K,指向u中第一个信息比特a0,子信道索引编号初始值i=0,指向u中的第一个比特。基于信息索引编 号k和信息与冻结比特指示F对信息与冻结比特序列进行更新的逻辑代码可参见图5所示,包括但不限于以下步骤:如果k≤N-1且F=1,则ui=uk,k=k+1,i=i+1;否则,ui=0,i=i+1。上述步骤重复N次,当i=N-1时,完成信息与冻结比特序列更新,获得最终的信息与冻结比特序列。其中,N为极化子信道数量,其值为2的正整数次幂;K为信息比特数量,其值为正整数,且满足K<N;F=1,表示第i个子信道承载信息比特;F=0,表示第i个子信道承载冻结比特。
示例十七:
信息比特序列a=[a0,a1,…,aK-1],倒序设置于信息与冻结比特序列的前K个比特位,初始化的信息与冻结比特序列为u=[u0,u1,…,uN-1]=[aK-1,aK-2,…,a0,0,…,0]。设置信息索引编号初始值k=K-1,指向u中第一个信息比特a0,子信道索引编号初始值i=N-1,指向u中的最后一个比特。基于信息索引编号k和信息与冻结比特指示F对信息与冻结比特序列进行更新的逻辑代码可参见图6所示,包括但不限于以下步骤:如果k≥0且F=1,则ui=uk,k=k-1,i=i-1;否则,ui=0,i=i-1;上述步骤重复N次,当i=0时,完成信息与冻结比特序列更新,获得最终的信息与冻结比特序列。其中,N为极化子信道数量,其值为2的正整数次幂;K为信息比特数量,其值为正整数,且满足K<N;F=1,表示第i个子信道承载信息比特;F=0,表示第i个子信道承载冻结比特。
示例十八:
信息比特序列a=[a0,a1,…,aK-1],倒序设置于信息与冻结比特序列的后K个比特位,初始化的信息与冻结比特序列为u=[u0,u1,…,uN-1]=[0,…,0,aK-1,aK-2,…,a0]。设置信息索引编号初始值k=N-K,指向u中最后一个信息比特aK-1,子信道索引编号初始值i=0,指向u中的第一个比特。基于信息索引编号k和信息与冻结比特指示F对信息与冻结比特序列进行更新的逻辑代码可参见图7所示,包括但不限于以下步骤:如果k≤N-1且F=1,则ui=uk,k=k+1,i=i+1;否则,ui=0,i=i+1。上述步骤重复N次,当i=N-1时,完成信息与冻结比特序列更新,获得最终的信息与冻结比特序列。其中,N为极化子信道数量,其值为2的正整数次幂;K为信息比特数量,其值为正整数,且满足K<N;F=1,表示第i个子信道承载信息比特;F=0,表示第i个子信道承载冻结比特。
示例十九:
信息与冻结比特序列的大小为N个比特,这N个比特包含信息比特和冻结比特,信息与冻结比特序列可根据但不限于示例十四至示例十八中任意示例提供的步骤获得。
可以理解的是,本申请实施例在获得信息与冻结比特序列u=[u0,u1,…,uN-1]之后,对信息与冻结比特序列u=[u0,u1,…,uN-1]进行串行编码得到编码数据d=[d0,d1,…,dN-1]。具体的,每个Stage的中间编码比特使用信息与冻结比特序列的存储空间存储,每个Stage中两个比特一组进行计算,编码过程按照Stage 0,Stage 1,…,Stage n-1串行计算。如此,使用信息与冻结比特序列的存储空间存储每个Stage的中间编码比特能够降低存储开销。
示例性的,按照子信道索引编号从小到大的顺序对信息与冻结比特序列进行处理,具体处理过程可以包括:按照子信道索引编号从小到大顺序处理,每个Stage中两个比特一组进行计算,每个Stage的中间编码比特使用信息与冻结比特序列的存储空间存储,编码过程按照Stage 0,Stage 1,…,Stage n-1串行计算。
示例性的,对信息与冻结比特序列u=[u0,u1,…,uN-1]进行编码获得编码数据的过程可参见图8所示,包括以下步骤:按照子信道索引编号i=0,2,4,…,N-2从小到大顺序处理;每个Stage中子信道索引编号为k0和k1位置的两个比特作为一组进行计算;在每个Stage,一个中间编码比特(uk0+uk1)mod 2使用信息与冻结比特序列u的第k0个位置存储;根据j=0,1,2,…,n-1,编码过程按照Stage 0、Stage 1、…、Stage n-1串行计算,j表示Polar编码Stage索引编号。
其中,u=[u0,u1,…,uN-1]为由步骤S210输出的信息与冻结比特序列;i表示子信道索引编号,i表示为二进制形式i=Bn-1Bn-2…Bj+1BjBj-1…B2B1B0,B0表示最低位;mod 2表示对2求模。k0为将i的第j比特和最低位交换后得到的十进制数,k1为将i+1的第j比特和最低位交换得到的十进制数。在一示例中,i为偶数,B0=0,把i=Bn-1Bn-2…Bj+1BjBj-1…B2B1B0的第j个比特Bj和最低位B0交换,获得k0=Bn-1Bn-2…Bj+1B0Bj-1…B2B1Bj。一具体示例中,i=10d=1010b,j=3,把i的第j个比特和最低位交换后获得k0=0011b=3d。在一示例中,i为偶数,则i+1=Bn-1Bn-2…Bj+1BjBj-1…B2B1B0中的最低位B0=1,把i+1=Bn-1Bn-2…Bj+1BjBj-1…B2B1B0的第j个比特Bj和最低位交换B0,获得k1=Bn-1Bn-2…Bj+1B0Bj-1…B2B1Bj。一具体示例中,i+1=1011b=11d,j=3,把i+1的第j个比特和最低位交换后获得k1=1011b=11d。
示例二十:
示例性的,按照子信道索引编号从大到小的顺序对信息与冻结比特序列进行处理,具体处理过程可以包括:按照子信道索引编号从大到小顺序处理,每个Stage中两个比特一组进行计算,每个Stage的中间编码比特使用信息与冻结比特序列的存储空间存储,编码过程按照Stage 0、Stage 1、…、Stage n-1串行计算。
示例性的,对信息与冻结比特序列u=[u0,u1,…,uN-1]进行编码获得编码数据的过程可参见图9所示,包括以下步骤:按照子信道编号i=N-2,N-4,N-6,…,0从大到小顺序处理;每个Stage中子信道索引编号为k0和k1位置的两个比特作为一组进行计算;在每个Stage,一个中间编码比特(uk0+uk1)mod 2使用信息与冻结比特序列u的第k0个位置存储;一示例中,根据j=0,1,2,...,n-1,编码过程按照Stage 0,Stage 1,…,Stage n-1串行计算,j表示Polar编码Stage索引编号。
其中,u=[u0,u1,…,uN-1]为由步骤S210输出的信息与冻结比特序列;i表示子信道索引编号,i表示为二进制形式i=Bn-1Bn-2…Bj+1BjBj-1…B2B1B0,B0表示最低位;mod 2表示对2求模。k0为将i的第j比特和最低位交换后得到的十进制数,k1为将i+1的第j比特和最低位交换得到的十进制数。
示例二十一:
请参见图10,本示例包括以下步骤:
步骤S410:第一传输节点接收信息比特序列a,其中,a=[a0,a1,…,aK-1];
步骤S420:第一传输节点根据第一编码参数、量化权重值序列、可靠度阈值、信息比特序列a确定信息与冻结比特序列u,其中,u=[u0,u1,…,uN-1];
步骤S430:第一传输节点对信息与冻结比特序列u进行编码,得到编码数据d,其中,d=[d0,d1,…,dN-1];
步骤S440:第一传输节点向第二传输节点发送编码数据d=[d0,d1,…,dN-1]。
本申请实施例的第二方面提供的一种数据处理方法,该方法可应用于图2所示的第二传输节点120,该数据处理方法包括:接收由发送端发送的编码数据序列。其中,所述编码数据序列通过以下方式获得:根据第一编码参数、量化权重值序列和可靠度阈值中的至少之一对信息比特序列进行编码以得到所述编码数据序列,所述信息比特序列包括K个信息比特,K是大于0的整数,所述编码数据序列包括N个编码数据,N是大于K的整数,所述量化权重值序列包括n个量化权重值,N表示极化子信道数量,N小于或等于2的n次幂。
可以理解是,当接收端接收到来自发送端的编码数据序列d=[d0,d1,…,dN-1],对编码数据序列d=[d0,d1,…,dN-1]进行解码,得到信息与冻结比特序列u=[u0,u1,…,uN-1];根据第一编码参数、量化权重值序列和可靠度阈值中的至少之一,将信息与冻结比特序列u=[u0,u1,…,uN-1]还原为原始信息比特序列a=[a0,a1,…,aK-1]。
可以理解的是,将编码数据序列d还原至原始信息比特序列a的过程,为将信息比特序列a转换至编码数据序列d的逆处理过程,具体的实现原理可参照本申请实施例的第一方面提供的数据处理方法的实现原理,本申请实施例在此不作赘述。
可以理解的是,第二传输节点接收到的编码数据d=[d0,d1,…,dN-1],是由第一传输节点在获取到信息比特序列a的情况下,根据第一编码参数、量化权重值序列和可靠度阈值确定信息与冻结比特序列u,进而对信息与冻结比特序列进行编码得到。
请参见图11,本申请实施例的第三方面提供一种数据处理装置,该数据处理装置包括以下至少之一:
子信道与阶段(stage)计算器210,用于输出当前的子信道索引编号和阶段(stage)索引编号;
可靠度阈值存储器220,用于存储可靠度阈值;
量化权重值序列存储器230,用于存储量化权重值序列;
子信道可靠度计算器240,用于根据量化权重值序列和子信道索引编号确定子信道可靠度值;
可靠度比较器250,用于将子信道可靠度值与可靠度阈值进行比较,并根据比较结果输出信息与冻结位指示;
信息比特索引计算器260,用于根据信息比特数量、极化子信道数量和信息与冻结位指示输出信息比特索引;
编码比特信息存储器270,用于接收并存储输入的信息比特序列,根据信息比特序列、信息与冻结位指示,确定并存储信息与冻结比特序列;
串行编码器280,用于根据信息与冻结比特序列进行串行编码,输出编码数据序列;
编码比特信息存储器270还用于存储编码数据序列。
可以理解的是,图12所示的数据处理装置为实现本申请实施例第一方面提供的数据处理方法的***框架,使用该框架进行Polar码编码,可以不直接存储Polar码序列,通过在线计算确定信息比特位置,从而减少存储复杂度。
在一示例中,子信道与Stage计算器210中Stage索引j初始值等于-1,子信道索引i初始值等于0,i从0开始计数至N-1后,Stage索引j累加1。在一示例中,子信道与Stage计算器210中Stage索引j初始值等于-1,子信道索引i初始值等于N-1,i从N-1开始递减计数至0后,Stage索引j累加1。其中,Stage-1表示由信息比特序列a获得信息与冻结比特序列u的阶段。Stage0,Stage1,…,Stage n-1,表示由信息与冻结比特序列u获得编码数据序列d的阶段。
在一示例中,可靠度阈值存储器220中存储可靠度阈值wth,可靠度阈值与包括并不仅限于以下参数存在映射关系:信息比特序列大小K、极化子信道数量N、码率R。
在一示例中,量化权重值序列存储器230中存储量化权重值序列β=[βn-1n-2,…,β0]数据。一具体示例中,量化权重值序列存储器230中存储β=[βn-1n-2,…,β0]=[197,165,139,116,98,82,68,58,49,41]。
在一示例中,子信道可靠度计算器240根据子信道索引i和量化权重值序列β计算第i个子信道的可靠度值w'i。一具体示例中,n=10,i=5d=0000000101b,β=[βn-1n-2,…,β0]=[197,165,139,116,98,82,68,58,49,41],则w'5=β20=58+41=99。
在一示例中,可靠度比较器250通过比较第i个子信道的可靠度值w’i与可靠度阈值wth,确定子信道的信息与冻结比特指示;第i个子信道的信息与冻结比特指示根据包括但不限于以下规则确定:第i个子信道的可靠度值w'i大于等于可靠度阈值wth时,第i个子信道承载信息比特,第i个子信道的可靠度值w'i小于可靠度阈值wth时,第i个子信道承载冻结比特。
在一示例中,信息比特索引计算器260计算信息比特所在位置k。一具体示例中,u=[u0,u1,…,uN-1]=[0,…,0,a0,a1,…,aK-1],初始k=N-K,即a0所在位置,对于i=0,1,...,N-1,如果k≤N-1且F=1,则ui=uk,k=k+1,i=i+1;否则,ui=0,i=i+1。F=1表示第i个子信道为信息比特,F=0表示第i个子信道为冻结比特。
在一示例中,编码比特信息存储器270中存储信息比特序列a、信息与冻结比特序列u、编码数据d。一示例中,编码比特信息存储器270中初始输入信息比特序列,一具体示例中u=[0,…,0,a0,a1,…,aK-1];一示例中,Stage索引j=-1,在i从0开始计数至N-1后,或i从N-1开始递减计数至0后,编码比特存储器270中获得信息与冻结比特序列u=[u0,u1,…,uN-1];一示例中,Stage索引j=n-1,从编码比特存储器270中输出编码数据d=[d0,d1,…,dN-1]。
在一示例中,串行编码器280对编码比特信息存储器270中信息与冻结比特序列数据进行编码获得编码数据。一具体示例中,i为偶数子信道索引编号,表示为二进制i=Bn-1Bn-2...Bj+1BjBj-1...B2B10,k0=Bn-1Bn-2...Bj+10Bj-1...B2B1Bj,k1=Bn-1Bn-2...Bj+11Bj-1...B2B1Bj,串行编码器280对编码比特信息存储器270中的信息与冻结比特序列u=[u0,u1,…,uN-1]执行至少以下操作:uk0=(uk0+uk1)mod 2。更新后的数据uk0写入编码比特信息存储器270第k0个位置。
在本申请所提供的几个实施例中,应该理解到,所揭露的装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述模块或单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个装置,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
需要说明的是,上述装置/单元之间的信息交互、执行过程等内容,由于与本申请方法实施例基于同一构思,其具体功能及带来的技术效果,具体可参见方法实施例部分,此处不再赘述。
进一步可以理解的是,本申请实施例中尽管在附图中以特定的顺序描述操作,但是不应将其理解为要求按照所示的特定顺序或是串行顺序来执行这些操作,或是要求执行全部所示的操作以得到期望的结果。在特定环境中,多任务和并行处理可能是有利的。
请参见图12,本申请实施例的第四方面提供一种电子设备,该电子设备900包括但不限于:
至少一个处理器910;
至少一个存储器920,用于存储至少一个程序;
当至少一个程序被至少一个处理器910执行时执行如上任意实施例描述的数据处理方法。
应能理解的是,上述处理器910和存储器920可以通过总线或者其他方式连接。
应能理解的是,该处理器910可以采用中央处理单元(Central Processing Unit,CPU)。该处理器还可以是其它通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现场可编程门矩阵(Field Programmable Gate Array,FPGA)或者其它可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。或者该处理器910采用一个或多个集成电路,用于执行相关程序,以实现本申请实施例所提供的技术方案。
存储器920作为一种非暂态计算机可读存储介质,可用于存储非暂态软件程序以及非暂态性计算机可执行程序,如本申请任意实施例描述的电子设备侧执行的数据处理方法。处理器910通过运行存储在存储器920中的非暂态软件程序以及指令,从而实现上述的数据处理方法。
存储器920可以包括存储程序区和存储数据区,其中,存储程序区可存储操作***、至少一个功能所需要的应用程序;存储数据区可存储执行上述的数据处理方法。此外,存储器920可以包括高速随机存取存储器,还可以包括非暂态存储器,比如至少一个磁盘存储器件、闪存器件、或其他非暂态固态存储器件。 在一些实施方式中,存储器920可选包括相对于处理器910远程设置的存储器,这些远程存储器可以通过网络连接至该处理器910。上述网络的实例包括但不限于互联网、企业内部网、局域网、移动通信网及其组合。
实现上述的数据处理方法所需的非暂态软件程序以及指令存储在存储器920中,当被一个或者多个处理器910执行时,执行本申请任意实施例提供的数据处理方法。
本申请实施例还提供了一种计算机可读存储介质,计算机可读存储介质存储有处理器可执行的程序,处理器可执行的程序被处理器执行时用于实现如上任意实施例描述的数据处理方法。
本申请实施例的计算机存储介质,可以采用一个或多个计算机可读的介质的任意组合。计算机可读介质可以是计算机可读信号介质或者计算机可读存储介质。计算机可读存储介质比如可以是,但不限于,电、磁、光、电磁、红外线、或半导体的***、装置或器件,或者任意以上的组合。计算机可读存储介质的更具体的例子(非穷举)包括:具有一个或多个导线的电连接、便携式计算机磁盘、硬盘、随机存取存储器(RAM)、只读存储器(ROM)、可擦式可编程只读存储器(EPROM或闪存)、光纤、便携式紧凑磁盘只读存储器(CD-ROM)、光存储器件、磁存储器件、或者上述的任意合适的组合。在本文件中,计算机可读存储介质可以是任何包含或存储程序的有形介质,该程序可以被指令执行***、装置或者器件使用或者与其结合使用。
计算机可读的信号介质可以包括在基带中或者作为载波一部分传播的数据信号,其中承载了计算机可读的程序代码。这种传播的数据信号可以采用多种形式,包括但不限于电磁信号、光信号或上述的任意合适的组合。计算机可读的信号介质还可以是计算机可读存储介质以外的任何计算机可读介质,该计算机可读介质可以发送、传播或者传输用于由指令执行***、装置或者器件使用或者与其结合使用的程序。
计算机可读介质上包含的程序代码可以用任何适当的介质传输,包括、但不限于无线、电线、光缆、RF等等,或者上述的任意合适的组合。
可以以一种或多种程序设计语言或其组合来编写用于执行本申请操作的计算机程序代码,程序设计语言包括面向对象的程序设计语言——诸如Java、Smalltalk、C++,还包括常规的过程式程序设计语言—诸如“C”语言或类似的程序设计语言。程序代码可以完全地在用户计算机上执行、部分地在用户计算机上执行、作为一个独立的软件包执行、部分在用户计算机上部分在远程计算机上执行、或者完全在远程计算机或服务器上执行。在涉及远程计算机的情形中,远程计算机可以通过任意种类的网络,包括局域网(LAN)或广域网(WAN),连接到用户计算机,或者,可以连接到外部计算机(比如利用因特网服务提供商来通过因特网连接)。
本申请实施例提供一种计算机程序产品,计算机程序产品存储有程序指令,程序指令在计算机上运行时,使得计算机实施如上任意实施例描述的数据处理方法。
以上是对本申请的一些实施进行了具体说明,但本申请并不局限于上述实施方式,熟悉本领域的技术人员在不违背本申请范围的共享条件下还可作出种种等同的变形或替换,这些等同的变形或替换均包括在本申请所限定的范围内。

Claims (25)

  1. 一种数据处理方法,所述方法包括以下步骤:
    获取信息比特序列,所述信息比特序列包括K个信息比特,K是大于0的整数;
    根据第一编码参数、量化权重值序列和可靠度阈值中的至少之一,对所述信息比特序列进行编码,得到编码数据序列,其中,所述编码数据序列包括N个编码数据,N是大于K的整数,所述量化权重值序列包括n个量化权重值,N表示极化子信道数量,N小于或等于2的n次幂;
    发送所述编码数据序列。
  2. 根据权利要求1所述的方法,其中,所述量化权重值序列中的n个所述量化权重值按照升序或者降序排列。
  3. 根据权利要求1所述的方法,其中,所述量化权重值序列中的第j个量化权重值表示子信道索引编号的二进制形式中第j个比特位对应的量化权重值,j为0至(n-1)中的任一整数。
  4. 根据权利要求3所述的方法,其中,所述量化权重值序列中所有量化权重值之和小于第一数值,其中,所述第一数值为2的正整数次幂。
  5. 根据权利要求4所述的方法,其中,所述第一数值包括以下之一:256、512、1024、2048或者4096。
  6. 根据权利要求4所述的方法,其中,所述量化权重值序列通过以下至少之一确定:
    预先设定所述量化权重值序列;或者,
    根据通过所述量化权重值序列获得的量化极化权重序列与极化权重序列的差别数不大于第二数值的约束条件确定,其中,所述第二数值为大于等于0且小于等于N的整数。
  7. 根据权利要求4所述的方法,其中,所述量化权重值序列包括以下之一:
    β=[96,81,68,57,48,40,34,28,24,20];或者,
    β=[197,165,139,116,98,82,68,58,49,41];或者,
    β=[389,327,275,231,194,163,137,115,97,82];或者,
    β=[780,656,552,464,390,328,276,232,195,164];或者,
    β=[51,43,36,30,25,21,18,15,13];或者,
    β=[101,85,71,60,50,42,35,30,25];或者,
    β=[206,173,145,122,102,86,73,61,51];或者,
    β=[480,404,340,286,240,202,170,143,120];
    其中,β表示所述量化权重值序列。
  8. 根据权利要求1所述的方法,其中,所述可靠度阈值根据索引值从预设的映射关系中获得,所述索引值根据K的取值、N的取值和码率R的取值中的至少之一确定,所述映射关系包括以下至少之一:映射公式、映射表格或者映射图。
  9. 根据权利要求8所述的方法,其中,所述可靠度阈值根据所述索引值从所述映射表格中获得,其中,所述索引值根据K的取值和N的取值确定。
  10. 根据权利要求9所述的方法,其中,对于任意取值的N,分别具有对应的K1和K2,K1和K2表示K的两个不同的取值,在K1小于K2的情况下,存在wK1,N大于wK2,N,所述wK1,N表示与K1的取值和N的取值对应的可靠度阈值,所述wK2,N表示与K2的取值和N的取值对应的可靠度阈值;
    对于任意取值的K,分别具有对应的N1和N2,N1和N2表示N的两个不同的取值,在N1小于N2的情况下,存在wK,N1小于wK,N2,所述wK,N1表示与K的取值和N1的取值对应的可靠度阈值,所述wK,N2表示与K的取值和N2的取值对应的可靠度阈值。
  11. 根据权利要求9所述的方法,其中,所述可靠度阈值根据以下确定:
    根据量化权重值序列β和各个所述极化子信道分别对应的子信道索引编号i计算所述极化子信道对应的子信道可靠度值,根据N个所述极化子信道对应的子信道可靠度值得到子信道可靠度序列,从所述子信道可靠度序列中选取K个最大的子信道可靠度值,从所述K个最大的子信道可靠度值选取最小的子信道可靠度值作为所述可靠度阈值。
  12. 根据权利要求8所述的方法,其中,所述可靠度阈值根据所述索引值从所述映射表格中获得,其中,所述索引值根据K的取值和R的取值确定。
  13. 根据权利要求12所述的方法,其中,对于任意取值的K,分别具有对应的R1和R2,R1和R2表示R的两个不同的取值,在R1小于R2的情况下,存在wK,R1大于wK,R2,所述wK,R1表示与K的取值和R1的取值对应的可靠度阈值,所述wK,R2表示与K的取值和R2的取值对应的可靠度阈值。
  14. 根据权利要求12所述的方法,其中,所述可靠度阈值根据以下确定:
    根据K的取值和R的取值,确定N的取值,根据量化权重值序列β和N个所述极化子信道分别对应的子信道索引编号i计算各个所述极化子信道对应的子信道可靠度值,根据N个所述极化子信道对应的子 信道可靠度值得到子信道可靠度序列,从所述子信道可靠度序列中选取K个最大的子信道可靠度值,从所述K个最大的子信道可靠度值选取最小的子信道可靠度值,并将所述最小的子信道可靠度值作为所述可靠度阈值。
  15. 根据权利要求1所述的方法,其中,所述根据第一编码参数、量化权重值序列和可靠度阈值中的至少之一,对所述信息比特序列进行编码,得到编码数据序列,包括:
    所述根据第一编码参数、量化权重值序列和可靠度阈值中的至少之一,在所述信息比特序列中添加冻结比特,得到信息与冻结比特序列,其中,所述信息与冻结比特序列包括N个比特;
    对所述信息与冻结比特序列进行编码,得到所述编码数据序列。
  16. 根据权利要求15所述的方法,其中,所述信息比特序列的表示公式为a=[a0,a1,…,aK-1],所述信息与冻结比特序列的表示公式为u=[u0,u1,…,uN-1],所述信息比特序列和所述信息与冻结比特序列满足以下映射关系:uf1(j)=af2(j),其中,f1(j)∈{0,1,…,N-1},f2(j)∈{0,1,…,K-1},j=0,1,…,K-1。
  17. 根据权利要求16所述的方法,其中,所述f1是j的函数,根据f2(j)、信息与冻结比特指示、信息索引编号确定;所述f2是j的函数,包括f(j)=j或者f(j)=K-j。
  18. 根据权利要求15所述的方法,其中,所述根据第一编码参数、量化权重值序列和可靠度阈值中的至少之一,在所述信息比特序列中添加冻结比特,得到信息与冻结比特序列,包括:
    根据预设规则在所述信息比特序列中添加冻结比特,得到初始的信息与冻结比特序列,其中,所述信息与冻结比特序列包括N个比特;
    按照子信道索引编号由大到小或者由小到大的顺序,依次对N个极化子信道进行遍历,并针对当前遍历到的极化子信道,执行以下处理:根据所述量化权重值序列确定当前遍历到的极化子信道的子信道可靠度值,根据所述可靠度阈值和所述子信道可靠度值确定当前遍历到的极化子信道对应的冻结比特指示,根据所述冻结比特指示确定所述信息与冻结比特序列中与当前遍历到的极化子信道对应的比特的取值,并根据所述比特的取值更新所述信息与冻结比特序列。
  19. 根据权利要求15所述的方法,其中,所述对所述信息与冻结比特序列进行编码,得到所述编码数据序列,包括:
    获取n阶串行编码器,所述n阶串行编码器用于执行n阶串行编码,在每一阶串行计算中,将所述信息与冻结比特序列中的两个比特划分为一组进行编码计算;其中,所述两个比特分别表示为第k0个比特和第k1个比特,k0表示子信道i的第j比特和最低位交换后得到的十进制数,k1表示子信道i+1的第j比特和最低位交换后得到的十进制数,i∈{0,2,4,...,N-2},j表示串行编码阶段,j∈{0,1,2,...,n-1},n=log2N;
    通过所述n阶串行编码器对所述信息与冻结比特序列进行编码,得到所述编码数据序列。
  20. 根据权利要求1所述的方法,其中,所述第一编码参数包括以下至少之一:信息比特序列大小、码率、极化子信道数量、信息索引编号、子信道索引编号、极化编码阶段索引编号、传输块比特数量、循环冗余校验位比特数量或者奇偶校验位比特数量。
  21. 一种数据处理方法,所述方法包括以下步骤:
    接收由发送端发送的编码数据序列,其中,所述编码数据序列通过以下方式获得:根据第一编码参数、量化权重值序列和可靠度阈值中的至少之一对信息比特序列进行编码以得到所述编码数据序列,所述信息比特序列包括K个信息比特,K是大于0的整数,所述编码数据序列包括N个编码数据,N是大于K的整数,所述量化权重值序列包括n个量化权重值,N表示极化子信道数量,N小于或等于2的n次幂。
  22. 一种数据处理装置,所述装置包括以下至少之一:
    可靠度阈值存储器,用于存储可靠度阈值;
    子信道与阶段计算器,用于输出当前的子信道索引编号和阶段索引编号;
    量化权重值序列存储器,用于存储量化权重值序列;
    子信道可靠度计算器,用于根据所述量化权重值序列和所述子信道索引编号确定子信道可靠度值;
    可靠度比较器,用于将所述子信道可靠度值与所述可靠度阈值进行比较,并根据比较结果输出信息与冻结位指示;
    信息比特索引计算器,用于根据所述信息比特数量、所述极化子信道数量和所述信息与冻结位指示输出信息比特索引;
    编码比特信息存储器,用于接收并存储输入的信息比特序列,根据所述信息比特序列、所述信息与冻结位指示,确定并存储信息与冻结比特序列;
    串行编码器,用于根据信息与冻结比特序列进行串行编码,输出编码数据序列;
    所述编码比特信息存储器还用于存储所述编码数据序列。
  23. 一种电子设备,包括:
    至少一个处理器;
    至少一个存储器,用于存储至少一个程序;
    当至少一个所述程序被至少一个所述处理器执行时实现如权利要求1至21任意一项所述的数据处理方法。
  24. 一种计算机可读存储介质,其中存储有处理器可执行的程序,所述处理器可执行的程序被处理器执行时用于实现如权利要求1至21任意一项所述的数据处理方法。
  25. 一种计算机程序产品,包括计算机程序或计算机指令,所述计算机程序或所述计算机指令存储在计算机可读存储介质中,计算机设备的处理器从所述计算机可读存储介质读取所述计算机程序或所述计算机指令,所述处理器执行所述计算机程序或所述计算机指令,使得所述计算机设备执行如权利要求1至21任意一项所述的数据处理方法。
PCT/CN2023/132939 2022-12-06 2023-11-21 数据处理方法、设备和存储介质 WO2024120181A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202211557955.8 2022-12-06
CN202211557955.8A CN118157687A (zh) 2022-12-06 2022-12-06 数据处理方法、设备和存储介质

Publications (1)

Publication Number Publication Date
WO2024120181A1 true WO2024120181A1 (zh) 2024-06-13

Family

ID=91290824

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/132939 WO2024120181A1 (zh) 2022-12-06 2023-11-21 数据处理方法、设备和存储介质

Country Status (2)

Country Link
CN (1) CN118157687A (zh)
WO (1) WO2024120181A1 (zh)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107666370A (zh) * 2016-07-29 2018-02-06 华为技术有限公司 编码方法和设备
CN108347301A (zh) * 2017-01-25 2018-07-31 华为技术有限公司 数据的传输方法和装置
CN108809333A (zh) * 2017-05-05 2018-11-13 华为技术有限公司 极化码编译码的方法、发送设备和接收设备
CN114157309A (zh) * 2021-12-23 2022-03-08 华中科技大学 极化码译码方法、装置及***

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107666370A (zh) * 2016-07-29 2018-02-06 华为技术有限公司 编码方法和设备
CN108347301A (zh) * 2017-01-25 2018-07-31 华为技术有限公司 数据的传输方法和装置
CN108809333A (zh) * 2017-05-05 2018-11-13 华为技术有限公司 极化码编译码的方法、发送设备和接收设备
CN114157309A (zh) * 2021-12-23 2022-03-08 华中科技大学 极化码译码方法、装置及***

Also Published As

Publication number Publication date
CN118157687A (zh) 2024-06-07

Similar Documents

Publication Publication Date Title
US20210234631A1 (en) Method For Encoding Information In Communication Network
WO2018028351A1 (zh) 用于极化编码的方法、装置和设备
WO2017092543A1 (zh) 用于极化码的速率匹配的方法和装置
WO2017101631A1 (zh) 用于处理极化码的方法和通信设备
WO2018049951A1 (zh) 信息传输的方法、发送端设备和接收端设备
WO2018166423A1 (zh) 极化码编码的方法和装置
US10924210B2 (en) Method, apparatus, and device for determining polar code encoding and decoding
CN108282259B (zh) 一种编码方法及装置
US11323205B2 (en) Polar code encoding method and apparatus
WO2018137518A1 (zh) 数据的传输方法和装置
CN108696333B (zh) Polar码编解码的方法、装置和设备
WO2021254422A1 (zh) Polar码编码方法、Polar码译码方法及其装置
TW201832476A (zh) 用於資訊編碼的刪餘和重複
Huang et al. Performance analysis and improvement of online fountain codes
KR102520788B1 (ko) 채널 상태 정보 인코딩 방법 및 장치, 저장 매체 및 프로세서
WO2018201983A1 (zh) 极化码信道编码方法、设备以及通信***
WO2021136400A1 (zh) 上行信号压缩传输方法、***、计算机设备和存储介质
WO2024120181A1 (zh) 数据处理方法、设备和存储介质
WO2018028469A1 (zh) 一种ldpc编码方法、编码装置及通信设备
WO2018127069A1 (zh) 一种编码方法及装置
US20200083908A1 (en) Polar Code Encoding Method and Apparatus
WO2024120182A1 (zh) 数据处理方法、装置、设备和存储介质
CN113794479B (zh) 极化调节卷积码的生成方法及相关设备
WO2018171777A1 (zh) 一种构造编码序列的方法,装置
Tang et al. Analysis for rank distribution of BATS codes under time-variant channels