Optimized Distributed Generalized Reed-Solomon Coding with Space-Time Block Coded Spatial Modulation

We present a well-known generalized Reed–Solomon (GRS) code incorporated with space-time block coded spatial modulation (STBC-SM) for wireless networks, which is capable of enjoying coded cooperation between the source and the relay. In the proposed distributed GRS-coded STBC-SM (DGRSC-STBC-SM) scheme, the source and relay nodes use distinct GRS codes. At the relay, we employ the concept of information selection to choose the message symbols from the source for further encoding. Thus, the codewords jointly constructed by the source and relay are generated at the destination. For achieving the best codeword set at the destination, we propose an optimal algorithm at the relay to select partial symbols from the source. To reduce the computational complexity, we propose a more practical algorithm with low complexity. Monte Carlo simulation results show that the proposed scheme using the low-complexity algorithm can achieve near-optimal error performance. Furthermore, our proposed scheme provides better error performance than its corresponding coded non-cooperative counterpart and the existing Reed–Solomon coded cooperative SM (RSCC-SM) scheme under identical conditions.


Introduction
Multiple-input multiple-output (MIMO) techniques have the potential to combat channel fading [1,2]. One famous MIMO technology is Vertical-Bell Lab Layered Space-Time (V-BLAST) [3]. Unfortunately, due to simultaneous transmission from multiple antennas at the same frequency in V-BLAST, high inter-channel interference (ICI) occurs in the destination. One approach to solving the problem is to utilize spatial modulation (SM) [4]. In SM, the ICI is completely avoided since at each time instant only a single active transmitting antenna is utilized to send the modulated symbol. However, SM cannot exploit the transmit diversity. A novel scheme, termed as space-time block coded SM (STBC-SM) [5], integrates the ideas of space-time block codes (STBCs) and SM. By this means, STBC-SM averts the shortcomings of STBCs and SM while retaining the merits of both schemes. Thus, it is capable of removing ICI and taking advantage of transmit diversity.
Coded cooperation is also an efficient technique that combats channel impairments. The concept of coded cooperation is developed as an evolution of cooperative communications [6] and is an amalgamation of channel coding and cooperative schemes such as amplify-and-forward (AF) [7], decode-and-forward (DF) [8] and compress-and-forward (CF) [9]. A typical coded cooperative scheme is comprised of the source, relay and destination nodes, where the relay overhears the signal of the source node and relays the information to the destination. By the mutual cooperation between the source and relay nodes, a distributed channel code is then constructed at the destination, which delivers better decoding capability than the non-cooperative system. Various distributed binary channel codes, such as distributed turbo code [7], distributed polar code [8] and distributed low-density parity-check (LDPC) code [10] have been investigated to provide cooperation.
However, distributed non-binary channel coding has not been widely studied. In recent years, maximum-distance separable (MDS) codes have turned into an interesting topical subject because they can reach the singleton bound and correct the maximum number of errors [11]. As a special MDS code, the non-binary generalized Reed-Solomon (GRS) code [12] can correct the burst errors. Moreover, the GRS code has a good algebraic structure and wide applications and is drawing attention from many scholars. Most of the previous works only focus on the construction of excellent channel codes with the help of the GRS code. For example, in [13], the authors employed GRS codes to construct quasi-cyclic LDPC (QC-LDPC) codes with girth greater than six, and the experimental results show that the constructed QC-LDPC codes exhibit superior error performance. In [14], several new types of q-ary MDS self-dual codes via GRS codes were constructed with an odd q. The literature [15] presented a novel linear complementary-dual MDS code construction through the GRS code and extended the previously known results as well. However, to the best of our knowledge, the achievements about the distributed non-binary GRS coding scheme in cooperative communication scenarios have not been reported. Thus, it is very important and meaningful to investigate the distributed nonbinary GRS coding scheme that makes full use of the advantages of coded cooperation and non-binary GRS codes. Moreover, the authors in [16][17][18] have presented that applying the MIMO technology to the distributed channel coding can effectively enhance the error performance of the distributed channel coding scheme. Therefore, the incorporation of the distributed GRS coding and MIMO technology is studied in this paper. As a recently developed MIMO technique, STBC-SM has many advantages over the traditional MIMO schemes. For example, it completely eliminates the ICI and can take advantage of spatial diversity. Thus, this motivates us to explore the distributed GRS-coded STBC-SM (DGRSC-STBC-SM) scheme that combines distributed GRS codes and STBC-SM. In any distributed coding MIMO system, an appropriate encoding strategy at the relay is vital in generating an optimized code in the destination. This brings motivation to proposing efficient symbolselection algorithms at the relay of the DGRSC-STBC-SM scheme to properly select the partial symbols from the decoded source information symbols.
In this manuscript, the authors propose the DGRSC-STBC-SM scheme. In the proposed DGRSC-STBC-SM scheme, the source and relay employ distinct GRS codes. Compared with the GRS code in the source, the GRS code at the relay has a larger minimum distance. Furthermore, our proposed scheme adopts the principle of symbol selection in the relay to choose partial symbols from the decoded source information symbols. By the cooperation between the source and relay, the destination will generate a joint codeword subset for each selection. In order to obtain the optimized codeword subset with the codewords of a larger minimum weight, two efficient symbol selection algorithms, i.e., the optimal and low-complexity symbol selection algorithms, are proposed at the relay to determine the selection pattern.
Our main contributions are summarized as follows: • The DGRSC-STBC-SM scheme is first proposed, where the source and relay nodes use different GRS codes. In the DGRSC-STBC-SM scheme, the relay selects partial symbols from the decoded source information symbols for further encoding. For each selection at the relay, the destination then generates a codeword set through the mutual cooperation between the source and relay.

•
To construct an optimal codeword set at the destination with the best weight distribution, we propose an optimal symbol selection algorithm at the relay to determine the best selection pattern by which partial symbols are chosen from the decoded source information symbols for further encoding. • However, for a longer block length code, the complexity of the algorithm is very high. Thus, it is not realistic from a practical perspective. To reduce the computational complexity of the optimal symbol selection algorithm, the low-complexity symbol selection algorithm is then proposed. In the low-complexity symbol selection algorithm, partial source information symbol sequences are considered to determine the optimized selection pattern from the local selection patterns at the relay.
The rest of this paper is organized as follows: Section 2 discusses the works related to our proposed scheme. Section 3 introduces the generalized distributed linear block coded STBC-SM by subset method. The system model of DGRSC-STBC-SM, and two efficient information symbol selection algorithms, are presented in Sections 4 and 5, respectively. The designed decoding algorithm at the destination is shown in Section 6. Section 7 discusses the simulation results of the investigated schemes. Finally, the conclusions are included in Section 8.

Related Work
In [19], the RS-coded cooperative system using the adaptive cooperation level was proposed. The authors in [20] presented a distributed RS coding scheme that divides the data into two parts by the use of arithmetic operations. In [21], the authors studied the error performance of the concatenation of RS codes and convolutional codes in cooperative scenarios. In these papers, the designed systems are capable of enjoying the advantages of coded cooperation, but they cannot obtain more spatial diversity. After that, Zhao et al. [16] proposed the RS-coded cooperative SM (RSCC-SM) scheme as the combination of the RS-coded cooperation and the traditional MIMO technology (i.e., SM). Compared to the traditional MIMO techniques, a recently developed STBC-SM [5] has many advantages. For example, it can eliminate the ICI and take advantage of transmit diversity. Based on this reason, Zhao et al. [22] adopted the novel STBC-SM technique [5] and further proposed another RS-coded cooperative STBC-SM scheme (RSCC-STBC-SM) scheme.
As an extension of RS codes, GRS codes have many advantages such as flexible codeword length and parameter vectors. In [12,23], the basic concept of GRS codes was introduced. In [13], Sun et al. used GRS codes to build QC-LDPC codes with a larger girth. In [14], Jin et al. constructed several MDS self-dual codes based on GRS codes. In [15], Chen et al. further extended the work of [14] and constructed a new MDS code. However, in these cases, performance gains generated by the coded cooperation and MIMO technique cannot be obtained. Inspired by the analysis, we propose the DGRSC-STBC-SM scheme. In recent [24], Guo et al. introduced that adopting the appropriate encoding method at the relay helps the destination to generate an optimized codeword set. This motivates us to design an optimized DGRSC-STBC-SM scheme by employing the proper encoding strategy at the relay.
In our proposed DGRSC-STBC-SM scheme, two efficient symbol selection algorithms are presented at the relay to properly select the symbols from the decoded source information symbols for further encoding, such that the destination generates an optimized codeword set with a better weight distribution. Different from the state of the art, the optimized DGRSC-STBC-SM scheme achieves some advancements: (1) The GRS code is first applied in the cooperative systems. (2) The DGRSC-STBC-SM scheme combines the bene-fits of the novel STBC-SM and distributed GRS coding. (3) In the DGRSC-STBC-SM scheme, an optimized codeword set is generated at the destination. Thus, the optimized DGRSC-STBC-SM scheme can achieve performance advantages as compared to the state of the art.

Generalized Distributed Channel Coding Combined with STBC-SM Based on Subset Method
This section introduces the general design of distributed channel coding combined with STBC-SM based on the subset method. The details are discussed as follows. Figure 1 shows a typical coded cooperative scheme with three terminals, i.e., source S, relay R and destination D. The DF relaying technique is considered in the coded cooperative scheme. Two different linear block codes at the source S and relay R are denoted by C S (n 1 , k 1 , d 1 ) and C R (n 2 , k 2 , d 2 ), respectively, where n i , k i and d i (i = 1, 2) denote the codeword length, code dimension and minimum distance, respectively. Furthermore, two time slots are required to complete an overall transmission.  Figure 1 shows a typical coded cooperative scheme with three terminals, i.e., source S, relay R and destination D. The DF relaying technique is considered in the coded cooperative scheme. Two different linear block codes at the source S and relay R are denoted by C S (n 1 , k 1 , d 1 ) and C R (n 2 , k 2 , d 2 ), respectively, where n i , k i and d i (i = 1, 2) denote the codeword length, code dimension and minimum distance, respectively. Furthermore, two time slots are required to complete an overall transmission. In the first time slot, the linear block code C S (n 1 , k 1 , d 1 ) at the source S encodes the information sequence f into the codeword sequence c further given to the modulator. The source broadcasts the generated modulated sequence towards the relay and destination.

Distributed Channel Coding Based on the Subset Method
In the second time slot, the demodulation at the relay is performed to demodulate the accepted signal and generates the estimated codeword sequence c that is fed into the decoder to obtain the estimated information sequence f ̅ with length k 1 . In our proposed scheme, the information selection block is adopted at the relay. By information selection, k 2 (k 2 < k 1 ) symbols are chosen from f ̅ to acquire the information sequence f ̅ j with length k 2 , where f ̅ j relies on f ̅ and j (j = 1, 2, …, C k 1 k 2 ) represents the order of selections with C k 1 k 2 denoting the binomial coefficient. The linear block code C R (n 2 , k 2 , d 2 ) then encodes the sequence f ̅ j into the codeword c j . Through the cooperation between the source and relay, the codeword set generated at the destination D is expressed as where |c| | is the series concatenation of c and . If the code C R (n 2 , k 2 , d 2 ) has additional information ′ f independent of the sequence f ̅ , C R (n 2 , k 2 , d 2 ) will generate the codeword c ∈ C R (n 2 , k 2 , d 2 ). In this case, the code obtained at the destination D is denoted as follows: Based on the above analysis, it is noticed that the codeword set C D ( j ) (n 1 +n 2 , k 1 ) produced in the j-th selection is a subset of code C D (n 1 +n 2 , k 1 ) , i.e., C D ( j ) (n 1 +n 2 , k 1 ) ⊆ C D (n 1 +n 2 , k 1 ). In the first time slot, the linear block code C S (n 1 , k 1 , d 1 ) at the source S encodes the information sequence f into the codeword sequence c further given to the modulator. The source broadcasts the generated modulated sequence towards the relay and destination.
In the second time slot, the demodulation at the relay is performed to demodulate the accepted signal and generates the estimated codeword sequence c that is fed into the decoder to obtain the estimated information sequence f with length k 1 . In our proposed scheme, the information selection block is adopted at the relay. By information selection, k 2 (k 2 < k 1 ) symbols are chosen from f to acquire the information sequence f j with length k 2 , where f j relies on f and j (j = 1, 2, . . . , C k 2 k 1 ) represents the order of selections with C k 2 k 1 denoting the binomial coefficient. The linear block code C R (n 2 , k 2 , d 2 ) then encodes the sequence f j into the codeword c j . Through the cooperation between the source and relay, the codeword set generated at the destination D is expressed as where |c|c j | is the series concatenation of c and c j . If the code C R (n 2 , k 2 , d 2 ) has additional information f independent of the sequence f, C R (n 2 , k 2 , d 2 ) will generate the codeword c ∈ C R (n 2 , k 2 , d 2 ). In this case, the code obtained at the destination D is denoted as follows: Based on the above analysis, it is noticed that the codeword set C ( j ) D (n 1 +n 2 , k 1 ) produced in the j-th selection is a subset of code C D (n 1 +n 2 , k 1 ), i.e., C ( j ) D (n 1 +n 2 , k 1 ) ⊆ C D (n 1 +n 2 , k 1 ).

Incorporation of STBC-SM into Distributed Channel Coding
Coded cooperation is an efficient way to combat channel fading and enlarge network coverage. Moreover, in modern wireless communications, there have been strong demands for superior error performance. Thus, for coded cooperative communication schemes, further improving the system performance becomes urgent.
Many available studies have presented that, by employing the MIMO technology in the cooperative scheme, the system performance is enhanced. Among the existing MIMO schemes, the famous STBC-SM technique not only removes the ICI, but also can take advantage of the transmit diversity. Moreover, it has been reported in [25] that STBC-SM can be easily employed in the DF based cooperative communications. Thus, the STBC-SM technology is considered in our investigated distributed channel coding scheme by subset approach. In this way, the distributed channel coding scheme in conjunction with STBC-SM has a potential to exploit the spatial diversity and cooperation, thus further improving the performance.
As previously stated, the GRS code has many advantages. For instance, it can achieve the singleton bound and correct the maximum number of errors as a special MDS code. Moreover, the GRS code can correct the burst errors and possesses an excellent algebraic structure and extensive applications. Hence, in the distributed coded communication scheme integrated with STBC-SM, the GRS code is utilized to perform error control. We detail the contents in Section 4. Note that, in the following description for the DGRSC-STBC-SM, the codeword lengths at the S and R are assumed to be the same, i.e., n 1 = n 2 .

Distributed GRS-Coded STBC-SM Scheme for Wireless Communications
The DGRSC-STBC-SM scheme is proposed in this section. Figure 2 depicts the system model of the half-duplex DGRSC-STBC-SM scheme, where N t , N t and N r antennas are deployed at the source S, relay R and destination D, respectively. In the coded cooperative Alamouti STBC-SM, it takes two time slots to complete an overall transmission.
Coded cooperation is an efficient way to combat channel fading and enlarge network coverage. Moreover, in modern wireless communications, there have been strong demands for superior error performance. Thus, for coded cooperative communication schemes, further improving the system performance becomes urgent.
Many available studies have presented that, by employing the MIMO technology in the cooperative scheme, the system performance is enhanced. Among the existing MIMO schemes, the famous STBC-SM technique not only removes the ICI, but also can take advantage of the transmit diversity. Moreover, it has been reported in [25] that STBC-SM can be easily employed in the DF based cooperative communications. Thus, the STBC-SM technology is considered in our investigated distributed channel coding scheme by subset approach. In this way, the distributed channel coding scheme in conjunction with STBC-SM has a potential to exploit the spatial diversity and cooperation, thus further improving the performance.
As previously stated, the GRS code has many advantages. For instance, it can achieve the singleton bound and correct the maximum number of errors as a special MDS code. Moreover, the GRS code can correct the burst errors and possesses an excellent algebraic structure and extensive applications. Hence, in the distributed coded communication scheme integrated with STBC-SM, the GRS code is utilized to perform error control. We detail the contents in Section 4. Note that, in the following description for the DGRSC-STBC-SM, the codeword lengths at the S and R are assumed to be the same, i.e., n 1 = n 2 .

Distributed GRS-Coded STBC-SM Scheme for Wireless Communications
The DGRSC-STBC-SM scheme is proposed in this section. Figure    During time slot-1, the source S firstly uses the bits to symbols (B/S) block to convert the binary message bit sequence u into the non-binary symbol sequence where f s is an element of the field F q with q = 2 k and k being a positive natural number. The GRS code C S (n 1 , k 1 , d 1 ) over F q is used at the source S, and the generator matrix G S has the following form ∈ F q being nonzero (but not necessarily distinct) elements. Thus, the information symbol sequence f and the codeword symbol sequence c = [c 0 , c 1 , . . . , c n 1 −1 are related as follows: Note that the codeword length n 1 of the GRS code C S (n 1 , k 1 , d 1 ) is less than q, i.e., n 1 < q. Since GRS code is an MDS code, its minimum distance is d 1 = n 1 −k 1 +1. For the codeword symbol sequence c, each codeword symbol c l can be represented as the binary vector of length k. After the symbols-to-bits (S/B) converter, we obtain a binary codeword bit sequence b. Through the buffer, the sequence b is further divided into multiple short sequences b(τ 1 ) of length k. The length k is mathematically denoted as where τ 1 = 1, 2, . . . , n 1 , . is the floor operation, C 2 N t denotes the binomial coefficient, C 2 N t 2 h is an integer power of two with h being a positive integer and M is the modulation order. Based on Equation (5), we have M 2 = 2 k = q. The sequence b(τ 1 ) then enters the bit splitter and is partitioned into b spa and b modu with lengths l 1 = log 2 ( ) and l 2 = 2 log 2 (M), respectively. The spatial mapper receives the sequence b spa and outputs an active transmit antenna combination (TAC) a 1 = (a 1,1 , a 1,2 ) out of TACs, where a 1,o ∈ {1, 2, . . . , N t } (o = 1, 2) is the active transmit antenna index. Similarly, the M-PSK/QAM modulator takes the sequence b modu and generates a pair of modulated where [ .] T and (.)* denote transpose and complex conjugation, respectively, ϑ a 1 is the rotation angle for the TAC a 1 and B (S) a 1 ∈ ϕ with ϕ being the set of all M 2 transmission matrices. The detailed contents regarding the construction of the STBC-SM codeword, selection of TACs and determination of the optimal rotation angle have been introduced in [5]. Let φ be the set of all active TACs a 1 , and χ is the set of all ϑ a 1 . For example, (3,4), (2, 3), (4, 1)} and χ = χ 4 = {0, 0, 0 .61, 0 .61} for N t = 4 and 4-QAM. To ease understanding, Table 1 clearly lists the mapping procedure for the STBC-SM with codes over F 16 = {0, 1, α, . . . , α 14 }, where α ∈ F 16 is the root of the primitive a 1 is transmitted towards the relay node R that receives the N t × 2 matrix Y S,R mathematically formulated as: where H S, R and N S, R are the N t × N t source-to-relay channel matrix and N t × 2 sourceto-relay noise matrix, respectively. The entries of H S, R and N S, R separately follow the complex Gaussian distributions CN (0, 1) and CN 0, σ 2 with σ 2 being the variance of noise.
During time slot-2, the STBC-SM demodulator performs maximum likelihood detection for received signals and yields the estimated TAC a 1 and symbol pair b given into the bit combiner to output the sequence b (τ 1 ) . Through the buffer, the estimated codeword bit sequence b is generated. The B/S block transforms the bit sequence b into the non-binary codeword symbol sequence c. In the following, the q-ary GRS 1 decoder employing Euclidean iterative decoding algorithm [23] decodes the sequence c and obtains the estimated information symbol sequence f. Then, we select k 2 (k 2 < k 1 ) symbols from f to obtain the information symbol sequence e ∈ F q and j is the order of the selections indexed by Note that each j is one-to-one corresponding to a unique k 2 -dimensional vector, called the selection pattern, to indicate each of the k 2 symbols selected from k 1 information symbols and the related position, i.e., All the selection patterns form a set given as Section 5 will introduce the algorithm determining an optimized selection pattern. The relay R employs the GRS code C R (n 2 , where ∈ F q being nonzero (but not necessarily distinct) elements. Therefore, the information symbol sequence f j and the codeword symbol sequence are related as follows: mial representation of f j . Next, the S/B block converts the codeword symbol sequence c j into the codeword bit sequence b j fed into the STBC-SM mapper to obtain the transmission During the first and second time slots, the destination D receives matrices Y S, D and Y R, D that are formulated as where H S, D and H R, D are the N r × N t channel matrices between the destination and source and relay, respectively, and they are defined like H S, R in Equation (7). Furthermore, N S, D and N R, D are the N r × 2 noise matrices between the destination and source and relay, and their definitions are similar to N S, R in Equation (7). At the destination, the STBC-SM demapper then performs the demodulation for the received signals. After that, the estimated codeword bit sequence b b j | is generated and further converted into the codeword symbol sequence |ĉ|ĉ j | through the B/S block. Finally, the designed decoding algorithm is employed to produce the estimated message bit sequence ∼ u. Section 6 will introduce the contents of the decoding algorithm.

Proposed Efficient Symbol Selection Algorithms
At the source, k 1 symbols are encoded by C S (n 1 , k 1 , d 1 ). The relay needs to select k 2 symbols from k 1 symbols for further encoding by C R (n 2 , k 2 , d 2 ). Through the cooperation between the source and relay, the destination generates a joint codeword set. To acquire the optimized codeword set resulting from the optimized selection, two efficient symbol selection algorithms are proposed. The following algorithms are presented under the assumption that the relay can decode correctly.

Algorithm 1: Optimal Symbol Selection Algorithm
In this subsection, we discuss the proposed optimal symbol selection algorithm. First, we introduce the general description of the algorithm. Then, an example is shown for a better understanding. At the relay, it is required to choose k 2 symbols from k 1 symbols. Thus, there are L = C k 2 k 1 selections in total. For the j-th (j ∈ Λ = {1, 2, . . . , L}) selection, the destination generates the codeword set C ( j ) D (n 1 + n 2 , k 1 ) that is the subset of C D (n 1 + n 2 , k 1 ), as introduced in Section 2. The optimal algorithm aims to find the best selection pattern η (opt) generating the optimal codeword subset C ( j ) D (n 1 + n 2 , k 1 ) with a larger minimum codeword weight from L selection patterns. Assume that the weight distribution of In (16), B ( j ) w represents the number of codewords with weight wt(|c|c j |) = w (d 1 ≤ w ≤ n 1 +n 2 ) at the destination. The general steps of the optimal algorithm are as follows: Step 1: Determine the set ψ (shown in Equation (11)) of all selection patterns: Step 2: Consider all possible codeword weights d 1 ≤ wt(|c|c j |) ≤ n 1 +n 2 generated by all q k 1 source information sequences.
Step 3: Step 4: For each j ∈ Λ t related Ω j ∈ ψ t , we find out the number B ( j ) w of codewords with weight wt(|c|c j |) = w. Choose all the indices j resulting in min Find out the subset ψ t+1 ⊆ ψ t that corresponds to Λ t+1 .

Example 1
To better understand the optimal symbol selection algorithm, an example is then presented. At the source S, the GRS code is C S (n 1 , k 1 , d 1 ) = C S (5, 3, 3). Furthermore, over F 8 = {0, 1, β, . . . , β 6 } are used, where β ∈ F 8 is the root of primitive polynomial 1 + x + x 3 over F 2 . At the relay R, the GRS code C R (n 2 , k 2 , d 2 ) = C R (5, 2, 4) is used, and over F 8 are considered. The generation process of the optimal pattern η (opt) is as follows: Step 1: Determine the set ψ of all selection patterns as Step 2: Determine all possible codeword weights wt(|c|c j |) at the D generated by 512 source information sequences, as shown in Table 2. Table 2. Codeword weight wt(|c|c j |) at the destination in ascending order.
The determined optimal selection pattern η (opt) = Ω 2 = [0, 2] is fixed at the relay, and the k 2 = 2 symbols dictated by Ω 2 are encoded by C R (5, 2, 4). Accordingly, the codeword subset C  Table 3, it is seen that our algorithm may not improve the minimum codeword weight. However, the number of low-weight wt(|c|c j |) = 7 generated by the determined pattern η (opt) = Ω 2 = [0, 2] is less than that generated by the other two patterns. Thus, our algorithm avoids the bad scenarios that a large number of low-weight codewords are results at the destination.

Algorithm 2: Low-Complexity Symbol Selection Algorithm
In the optimal Algorithm 1, all the q k 1 information sequences at the source are considered to search the best selection pattern from all L selection patterns. For a larger block length code, the search complexity is very high. Thus, we propose the symbol selection algorithm (Algorithm 2) with a reduced complexity. Similar to Algorithm 1, we introduce Algorithm 2 by the general description and an example.

General Description of the Low-Complexity Symbol Selection Algorithm
Algorithm 2 has two differences compared to Algorithm 1. The first point is that partial (k b ) information symbol sequences are considered at the source, where k b < q k 1 . The second point is that partial (P) selection patterns are considered at the relay, where P < L. Thus, in Algorithm 2, k b information symbol sequences are considered for determining the pattern η (low) from P patterns. It effectively converts an exhaustive search algorithm into a partial search algorithm. For the j-th (j = 1,2, . . . , P) selection, the destination generates the subset C ( j ) D (n 1 +n 2 , k 1 of C D (n 1 +n 2 , k 1 ). The specific steps of Algorithm 2 are as follows.
Step 1: Determine k b information symbol sequences f. From Equation (4), we see for wt(c) = i (d 1 ≤ i ≤ n 1 ), f(x) has n = n 1 − i various roots in α S of length n 1 . To reasonably obtain the partial information symbol sequences f at the source, the following method is used: (1) Split F q into two parts, where all the n 1 elements of α S form the first part, and the other q − n 1 elements in F q but not in α S form the second part. (2) J (n ≤ J ≤ deg(f (x))) elements are reasonably selected from F q as all roots of f(x).
On the one hand, n elements of J elements are randomly chosen in the first part, and the remaining J − n elements are fixedly selected in the second part, which generates C n n 1 cases. On the other hand, the roles of random and fixed selection are reversed, i.e., we randomly choose J − n elements from the second part, and fixedly choose the n elements from the first part, which yields C J− n q−n 1 cases.
(3) Based on the above process, k b information symbol sequences f are obtained.
Step 2: Determine the set ψ of P selection patterns. < L. Thus, in Algorithm 2, k b information symbol sequences are considered for determ ing the pattern η (low) from P patterns. It effectively converts an exhaustive search alg rithm into a partial search algorithm. For the j-th (j = 1,2, …, P) selection, the destinati generates the subset C D ( j ) (n 1 +n 2 , k 1 ) of C D (n 1 +n 2 , k 1 ). The specific steps of Algorithm 2 a as follows.
Step 1: Determine k b information symbol sequences f. From Equation (4), we see for wt(c) = i (d 1 ≤ i ≤ n 1 ), f(x) has n = n 1i various ro in α S of length n 1 . To reasonably obtain the partial information symbol sequences f the source, the following method is used: (1) Split q into two parts, where all the n 1 elements of α S form the first part, and t other qn 1 elements in q but not in α S form the second part.
(2) J (n ≤ J ≤ deg (f (x)) ) elements are reasonably selected from q as all roots of f(x).
the one hand, n elements of J elements are randomly chosen in the first part, and t remaining Jn elements are fixedly selected in the second part, which generates C cases. On the other hand, the roles of random and fixed selection are reversed, i we randomly choose Jn elements from the second part, and fixedly choose the elements from the first part, which yields C q-n 1 J-n cases.
(3) Based on the above process, k b information symbol sequences f are obtained.
Step 2: Determine the set ψ of P selection patterns. (1) First partition k 1 information symbols at the source into two parts. Scenario (i): t first ⌈ k 1 /2⌉ symbols and the last k 1 -⌈ k 1 /2⌉ symbols form the first and second par respectively, where ⌈ k 1 /2⌉ is the smallest integer larger than or equal to ⌈ k 1 /2⌉. S nario (ii): the first k 1 -⌈ k 1 /2⌉ symbols and the last ⌈ k 1 /2⌉ symbols form the first a second parts, respectively. The symmetric structures of k 1 symbols are shown in F ure 3.  (2) The relay selects k 2 symbols from k 1 symbols. In scenario (i), we select more sy bols in the first part. Specifically, (⌈k 2 /2⌉ ≤ Γ ≤ min ( k 2 , ⌈ k 1 /2⌉) symbols are random chosen in the first part and k 2 -Γ symbols are fixedly chosen in the second pa which generates C ⌈ k 1 /2⌉ Γ cases. In scenario (ii), more symbols are chosen in the seco part. Specifically, randomly choose Γ symbols in the second part and fixedly choo k 2 -Γ symbols in the first part, which also generates C ⌈ k 1 /2⌉ Γ cases.
(3) Obtain the set ψ of P selection patterns by the above process.
Step 4: Other steps refer to the steps 2-5 of Algorithm 1. Finally, we have the op mized selection pattern η (low) from P selection patterns. (2) The relay selects k 2 symbols from k 1 symbols. In scenario (i), we select more symbols in the first part. Specifically, ([k 2 /2 ] ≤ Γ ≤ min ( k 2 , [ k 1 /2)] symbols are randomly chosen in the first part and k 2 − Γ symbols are fixedly chosen in the second part, which generates C Γ [ k 1 /2] cases. In scenario (ii), more symbols are chosen in the second part. Specifically, randomly choose Γ symbols in the second part and fixedly choose k 2 − Γ symbols in the first part, which also generates C Γ [ k 1 /2] cases. (3) Obtain the set ψ of P selection patterns by the above process.
Step 4: Other steps refer to the steps 2-5 of Algorithm 1. Finally, we have the optimized selection pattern η (low) from P selection patterns.
(1) Divide k 1 = 5 information symbols at the source into two parts. Scenario (i): the first three symbols and the last two symbols form the first and second parts, respectively. Scenario (ii): the first two symbols and the last three symbols form the first and second parts, respectively. (2) The relay selects k 2 = 3 symbols from k 1 = 5 symbols. In scenario (i), we randomly select two symbols in the first part and fixedly select one symbol in the second part.

Complexity Comparisons between Two Algorithms
The complexity of the proposed two algorithms is calculated in terms of the addition and multiplication operations. At the source S, ζ × S = n 1 k 1 multiplication operations and ζ + S = n 1 (k 1 −1) addition operations are required to encode an information sequence with length k 1 . Thus, there are ζ S = ζ × S + ζ + S = n 1 (2k 1 −1) elementary operations involved in encoding one information sequence at the source. Similarly, ζ R = ζ × R + ζ + R = n 2 (2k 2 −1) elementary operations are needed to encode one information sequence of length k 2 at the relay R, where ζ × R = n 2 k 2 and ζ + R = n 2 (k 2 −1). In Algorithm 1, all q k 1 information symbol sequences at the source are considered. Assume that, for finding out the number B ( j ) w of codewords |c|c j | with weight wt(|c|c j |) = w (d 1 ≤ w ≤ n 1 +n 2 ) at the destination, the considered number of selection patterns (in the relay) is denoted as N R, n 1 +n 2 , respectively. If the best pattern can be determined in finding out the number of codewords |c|c j with weight wt(|c|c j |) = w (opt) D , the optimal symbol selection algorithm will terminate. The overall computational complexity is expressed as follows: R, ν at the relay. Now we take into account the computational complexity of Algorithm 2. In the algorithm, we consider k b information symbol sequences at the source. Provided that the pattern is determined when finding out the number of codewords |c|c j with weight wt(|c|c j |) = w (low) D . Then, the complexity of Algorithm 2 is R, ν being the considered number of selected patterns for finding out the number B (j) w of codewords |c|c j with weight wt(|c|c j |) = w at the destination.
By Equation (27) and Equation (28), we can calculate the complexity of Algorithm 1 and Algorithm 2, respectively. Table 7 shows that the complexity comparison of the two algo-rithms for different coding configurations (which are used in the above two examples). It can be clearly observed from Table 7 that the computational complexity of Algorithm 2 is significantly decreased over Algorithm 1, which well reflects the low-complexity feature of Algorithm 2. Table 7. Complexity comparison between Algorithm 1 and Algorithm 2.

Decoding Algorithm at the Destination
Step 1: The destination node takes the first partĉ and the second partĉ j of the demodulated codeword symbol sequence |ĉ|ĉ j | as input, and then uses the q-ay GRS 1 and GRS 2 decoders employing the Euclidean iterative decoding algorithm to decode them, respectively.
Step 2: After their respective decoding of the two GRS decoders, the estimated nonbinary message symbol sequencesf with length k 1 , andf i with length k 2 are generated. Then,f andf i are given into the combiner block.
Step 3: Select an appropriate threshold ρ. The threshold is the signal-to-noise ratio (SNR) where the bit error rate (BER) performances of C S (n 1 , k 1 , d 1 ) and C R (n 2 , k 2 , d 2 ) codes cross each other. By pre-simulating these two signals, this threshold ρ is obtained.
Step 4: If SNR ≤ ρ, the output of the combiner block is f =f. If SNR > ρ, the k 2 symbols (placed in the selected k 2 positions) of the non-binary sequencef are replaced with the symbol sequencef j , and the joint output f (the update off) is yielded by the combiner.
Step 5: After the symbols to bits (S/B) block, the non-binary symbol sequence f from the combiner block is transformed into the binary bit sequence u utilized as the estimate of the binary information bit sequence u transmitted by the source node.
This reason for Step 4: because of the larger minimum distance of C R (n 2 , k 2 , d 2 ) at the relay over C S (n 1 , k 1 , d 1 ) at the source, those selected k 2 symbols inf are more credible than all those k 2 symbols in f j at SNR ≤ ρ. However, at SNR > ρ, all the k 2 symbols of f j have more reliability than those selected k 2 symbols inf.

Simulation Results
The simulated results are presented to perform evaluation for the BER performance of the proposed DGRSC-STBC-SM scheme and the reference schemes. The slow Rayleigh fading channel, maximum likelihood (ML) detection and Euclidean iterative decoding algorithm are used in the simulations. To better generalize and analyze our investigated schemes, three distributed GRS codes are considered. In the first case, we adopt the GRS codes C S (10, 5, 6) and C R (10, 3, 8) over F 16 . In the second case, the GRS codes C S (25,19,7) and C R (25, 10, 16) over F 32 are used. In addition, the GRS codes C S (63, 51, 13) and C R (63, 31, 33) over F 64 are employed in the third case. In the first, second and third cases, the code rates are 1/4, 19/50 and 51/126, respectively. The finite fields F 16 , F 32 and F 64 are constructed using the polynomials 1 + x + x 4 , 1 + x 2 + x 5 and 1 + x + x 6 , respectively, with α, γ and χ being the roots of 1 + x + x 4 , 1 + x 2 + x 5 and 1 + x + x 6 , respectively. Table 8 shows the parameter vectors α S , v S , α R and v R corresponding to the three cases. The SNR of source-to-destination, source-to-relay, and relay-to-destination links are denoted by λ S, D , λ S, R and λ R, D , respectively. Furthermore, the condition, i.e., λ R, D = λ S, D +2 is assumed in the proposed DGRSC-STBC-SM scheme. This section depicts the BER performance versus SNR (λ S, D ) for all the investigated schemes. Moreover, let all the corresponding receivers possess perfect channel knowledge. In addition, we list the parameters utilized in the simulation, as shown in Table 9. Table 8. Parameter vectors corresponding to the three cases.

Performance Comparisons of DGRSC-STBC-SM Scheme under Various Symbol Selection Algorithms
This subsection discusses the performance of the DGRSC-STBC-SM scheme using the proposed symbol selection algorithms and random selection in order to demonstrate the effectiveness of our proposed algorithms.
We first discuss the error performance of the DGRSC-STBC-SM under our proposed symbol selection algorithms, i.e., Algorithm 1 and Algorithm 2 for the first case, as depicted in Figure 4. The corresponding selection patterns η (opt) and η (low) are shown in Table 10. Additionally, we investigate the error performance of the DGRSC-STBC-SM scheme with a random selection pattern for a fair comparison. The ideal source-to-relay channel, i.e., λ S, R = ∞ is supposed. The simulated results of Figure 4 show that when N r is identical, at low SNR the performance of the DGRSC-STBC-SM scheme under Algorithm 2 approaches that of the DGRSC-STBC-SM scheme under Algorithm 1, and their performance difference can be negligible at high SNR. This is because Algorithm 1 and Algorithm 2 generate the same minimum codeword weight (i.e., 9) at the destination. It well illustrates that Algorithm 2 is capable of achieving the balance between the complexity and performance, which reveals the effectiveness of Algorithm 2. Moreover, from Figure 4, it is also seen that the error performance advantage of the DGRSC-STBC-SM with Algorithm 1 and Algorithm 2 over the random selection pattern under identical conditions. It is because our proposed algorithms increase the minimum codeword weight at the destination, which implies that the proper selection in the relay has a key role in improving the performance.
Due to the effectiveness of Algorithm 2, we mainly focus on investigating the performance of the DGRSC-STBC-SM (λ S, R = ∞) under Algorithm 2, for the second and third cases with large information sequence length, where the selection patterns η (low) of the second and third cases are exhibited in Table 10. Figures 5 and 6 show that the DGRSC-STBC-SM scheme having Algorithm 2 exhibits better performance over the DGRSC-STBC-SM scheme having the random selection pattern. This is because, by adopting the proposed optimized Algorithm 2, the codeword set generated at the destination has a larger minimum codeword weight (i.e., 30 for the second case and 50 for the third case).

Error Performance of DGRSC-STBC-SM and Non-Cooperative Counterpart
To illustrate the effectiveness of our proposed DGRSC-STBC-SM scheme in coo tive scenarios, we analyze their performance of the DGRSC-STBC-SM and non-coope GRS-coded STBC-SM schemes for three cases under an identical code rate. Note th non-cooperative GRS-coded STBC-SM scheme corresponds to the ideal (λ S, R = ∞) DG STBC-SM scheme that the relay-to-destination link has no SNR gain over the source-t tination link, that is to say, λ S, R = ∞ and λ R, D = λ S, D in the non-cooperative scheme thermore, the source and relay nodes in the non-cooperative scheme adopt the codin rameters shown in Table 9, where the source coding and relay coding have a relatio i.e., the information symbols at the relay are taken from those at the source. Observe Figures 7-9 that, compared with its corresponding non-cooperative counterpar DGRSC-STBC-SM scheme (λ S, R = ∞ and λ R, D = λ S, D + 2) shows better BER perform where the non-cooperative counterpart corresponds to the DGRSC-STBC-SM with λ λ S, D . This is mainly because the relay node is closer to the destination node than the s node, which helps the correct estimation of the information sequence from the source

Error Performance of DGRSC-STBC-SM and Non-Cooperative Counterpart
To illustrate the effectiveness of our proposed DGRSC-STBC-SM scheme in cooperative scenarios, we analyze their performance of the DGRSC-STBC-SM and non-cooperative GRS-coded STBC-SM schemes for three cases under an identical code rate. Note that the non-cooperative GRS-coded STBC-SM scheme corresponds to the ideal (λ S, R = ∞) DGRSC-STBC-SM scheme that the relay-to-destination link has no SNR gain over the source-todestination link, that is to say, λ S, R = ∞ and λ R, D = λ S, D in the non-cooperative scheme. Furthermore, the source and relay nodes in the non-cooperative scheme adopt the coding parameters shown in Table 9, where the source coding and relay coding have a relationship, i.e., the information symbols at the relay are taken from those at the source. Observe from Figures 7-9 that, compared with its corresponding non-cooperative counterpart, the DGRSC-STBC-SM scheme (λ S, R = ∞ and λ R, D = λ S, D +2) shows better BER performance, where the non-cooperative counterpart corresponds to the DGRSC-STBC-SM with λ R, D = λ S, D . This is mainly because the relay node is closer to the destination node than the source node, which helps the correct estimation of the information sequence from the source node.
We also analyze the error performance under the non-ideal source-to-relay channel to better see the impact of practical channel scenarios. The results reveal that if the link between source and relay is the non-ideal (λ S, R = ∞) link with a larger SNR (i.e., 15 dB, 16 dB and 11 dB), as shown in Figures 7-9, respectively, the corresponding error performance is very approximate to that of the ideal DGRSC-STBC-SM scheme. However, if the link between source and relay has a low SNR, i.e., 10 dB, 11 dB and 6 dB, the error performance of the DGRSC-STBC-SM scheme becomes worse, and the error floor is generated at the BER ≈ 4.2 × 10 −4 , 1.4 × 10 − 3 and 3.3 × 10 −4 , as exhibited in Figures 7-9, respectively. The reason for the error floor phenomenon is that the incorrect decoding in the relay brings the error propagation to the common destination. With the aid of cyclic redundancy check (CRC) technology, the error propagation can be further mitigated, and the error performance will show better improvement. Since the detailed contents are beyond the scope of our research, we do not discuss them in this manuscript. Figures 7-9 that, compared with its corresponding non-cooperative counterpart, t DGRSC-STBC-SM scheme (λ S, R = ∞ and λ R, D = λ S, D + 2) shows better BER performan where the non-cooperative counterpart corresponds to the DGRSC-STBC-SM with λ R, D λ S, D . This is mainly because the relay node is closer to the destination node than the sou node, which helps the correct estimation of the information sequence from the source nod      (25,19,7) and C R (25,10,16) and non−cooperative counterpart under Algorithm 2, N t = 3, N r = 4 and 4−QAM. We also analyze the error performance under the non-ideal source-to-relay channel to better see the impact of practical channel scenarios. The results reveal that if the link between source and relay is the non-ideal (λ S, R ≠ ∞) link with a larger SNR (i.e., 15 dB, 16 dB and 11 dB), as shown in Figures 7-9, respectively, the corresponding error performance is very approximate to that of the ideal DGRSC-STBC-SM scheme. However, if the link between source and relay has a low SNR, i.e., 10 dB, 11 dB and 6 dB, the error performance of the DGRSC-STBC-SM scheme becomes worse, and the error floor is generated at the BER ≈ 4.2 × 10 -4 , 1.4 × 10 -3 and 3.3 × 10 -4 , as exhibited in Figures 7-9, respectively. The reason for the error floor phenomenon is that the incorrect decoding in the relay brings

Performance Comparisons between DGRSC-STBC-SM Scheme and Existing Scheme
To confirm the superiority of the proposed DGRSC-STBC-SM scheme, we perform the performance comparison between the proposed scheme and the existing schemes.
Firstly, the authors discuss the performance comparisons between the DGRSC-STBC-SM (λ S, R = ∞) for our considered third case and the existing Reed-Solomon coded cooperative SM (RSCC-SM) [16] under λ S, R = ∞. From Figure 10, we notice that under identical conditions such as the same spectral efficiency k/2 = 3 bits/s/Hz (k is shown in Equation (4)) and receive antenna number N r , the DGRSC-STBC-SM provides better performance than the existing RSCC-SM. The reason behind such an enticing gain can be explained by using the following two aspects: (a) The STBC-SM technique adopted in our proposed DGRSC-STBC-SM scheme combines the ideas of STBC and SM, which is capable of removing the ICI and exploiting the transmit diversity. However, the SM technique used in the existing RSCC-SM scheme can only eliminate the ICI and is unable to exploit the transmit diversity. (b) In our proposed DGRSC-STBC-SM scheme, an efficient information selection Algorithm 2 is used to properly select 31 symbols from 51 symbols. However, in the paper [16], the relay randomly selects 31 symbols from 51 symbols. Thus, employing Algorithm 2 is very helpful for our proposed DGRSC-STBC-SM scheme to construct the codeword set with a larger minimum codeword weight (i.e., 50) due to the proper symbol selection at the relay. Observe from Figure 10 that at BER ≈ 1 × 10 − 4 , the DGRSC-STBC-SM using N r = 4 and 6 achieves SNR gains of about 4.3 dB and 3.9 dB, respectively, compared to the RSCC-SM scheme with N r = 4 and 6. the paper [16], the relay randomly selects 31 symbols from 51 symbols. Thus, employing Algorithm 2 is very helpful for our proposed DGRSC-STBC-SM scheme to construct the codeword set with a larger minimum codeword weight (i.e., 50) due to the proper symbol selection at the relay. Observe from Figure 10 that at BER ≈1×10 -4 , the DGRSC-STBC-SM using N r = 4 and 6 achieves SNR gains of about 4.3 dB and 3.9 dB, respectively, compared to the RSCC-SM scheme with N r = 4 and 6. Additionally, we compare our proposed DGRSC-STBC-SM scheme with the recent state-of-the-art RS-coded cooperative STBC-SM (RSCC-STBC-SM) scheme [22] under identical conditions. In our proposed DRSC-STBC-SM scheme, the optimized Algorithm Additionally, we compare our proposed DGRSC-STBC-SM scheme with the recent state-of-the-art RS-coded cooperative STBC-SM (RSCC-STBC-SM) scheme [22] under identical conditions. In our proposed DRSC-STBC-SM scheme, the optimized Algorithm 2 is adopted at the relay to select 31 symbols from 51 source information symbols for further encoding. However, in the existing RSCC-STBC-SM scheme, 31 symbols are randomly chosen from 51 source information symbols for further encoding. As depicted in Figure 11, the DGRSC-STBC-SM scheme outperforms the existing scheme over the entire SNR under the same receive antenna number N r . The reason for the excellent performance is based on the fact that our proposed system uses an optimized symbol selection algorithm to make the destination node generate an optimized codeword set with a larger minimum codeword weight.
Sensors 2022, 22, x FOR PEER REVIEW 2 2 is adopted at the relay to select 31 symbols from 51 source information symbols fo ther encoding. However, in the existing RSCC-STBC-SM scheme, 31 symbols ar domly chosen from 51 source information symbols for further encoding. As depic Figure 11, the DGRSC-STBC-SM scheme outperforms the existing scheme over the SNR under the same receive antenna number N r . The reason for the excellent p mance is based on the fact that our proposed system uses an optimized symbol sel algorithm to make the destination node generate an optimized codeword set with a minimum codeword weight.

Comparisons of DGRSC-STBC-SM Scheme with Different Numbers of Receiving Ant
To see the effect of receive antenna number on the error performance of the DG Figure 11. Performance comparisons between the DGRSC−STBC−SM scheme (using Algorithm 2) and the existing RSCC−STBC−SM [22] scheme (using random selection) under the conditions of 4−QAM, λ S, R = ∞, C S (63, 51, 13) and C R (63, 31, 33).

Comparisons of DGRSC-STBC-SM Scheme with Different Numbers of Receiving Antennas
To see the effect of receive antenna number on the error performance of the DGRSC-STBC-SM scheme, this subsection demonstrates the performance comparisons of the DGRSC-STBC-SM scheme (λ S, R = ∞) for the first case under different numbers of receiving antennas. From Figure 12, we observe that the effect of receive antenna number on the system error performance is very evident. Figure 12 also shows that the DGRSC-STBC-SM scheme under N r = 6 performs the best BER performance, but the BER performance of the DGRSC-STBC-SM scheme is the worst under N r = 3. The error performance under N r = 4 and 5 lies between the previous two. For example, at an SNR of 11 dB, the error performance under N r = 6 is 1.2 × 10 − 6 . At the same SNR, the error performance under N r = 4 and 5 is 1.2 × 10 − 4 and 1 × 10 − 5 , respectively. However, under N r = 3, poor error performance (i.e., 1.7 × 10 − 3 ) is generated at SNR=11 dB. Thus, this validates the fact that as the number of receiving antennas adds the overall system error performance is improved. The BER performance enhancement is because increasing the value of N r offers more spatial diversity to the DGRSC-STBC-SM scheme.

Conclusions
In this article, we propose the novel DGRSC-STBC-SM scheme with the inform selection at the relay. For each selection at the relay, the destination generates a cod set. To obtain the optimal codeword set (resulted by the best selection pattern) at th tination, we propose the optimal symbol selection algorithm at the relay. We also pr another optimized symbol selection algorithm with the low complexity to reduce th plexity of the optimal symbol selection algorithm. The simulation results demonstra the DGRSC-STBC-SM scheme using the proposed two optimized algorithms has BER performance than that using the random selection pattern, which is because the word set with a larger minimum distance is generated at the destination by using t timized algorithms. Furthermore, the DGRSC-STBC-SM scheme with the low-comp symbol selection algorithm can obtain the near-optimal performance. Additional numerical results confirm the superiority of the DGRSC-STBC-SM scheme over its sponding non-cooperative counterpart. It is mainly because the relay-to-destinatio has a larger SNR gain than the source-to-destination link. Moreover, our pro DGRSC-STBC-SM scheme can significantly outperform the existing schemes by the the proper selection at the relay. Finally, we compare the BER performance of the DG STBC-SM scheme under the varying receive antenna number. The simulation results

Conclusions
In this article, we propose the novel DGRSC-STBC-SM scheme with the information selection at the relay. For each selection at the relay, the destination generates a codeword set. To obtain the optimal codeword set (resulted by the best selection pattern) at the destination, we propose the optimal symbol selection algorithm at the relay. We also propose another optimized symbol selection algorithm with the low complexity to reduce the complexity of the optimal symbol selection algorithm. The simulation results demonstrate that the DGRSC-STBC-SM scheme using the proposed two optimized algorithms has better BER performance than that using the random selection pattern, which is because the codeword set with a larger minimum distance is generated at the destination by using the optimized algorithms. Furthermore, the DGRSC-STBC-SM scheme with the low-complexity symbol selection algorithm can obtain the near-optimal performance. Additionally, the numerical results confirm the superiority of the DGRSC-STBC-SM scheme over its corresponding non-cooperative counterpart. It is mainly because the relay-to-destination link has a larger SNR gain than the source-to-destination link. Moreover, our proposed DGRSC-STBC-SM scheme can significantly outperform the existing schemes by the use of the proper selection at the relay. Finally, we compare the BER performance of the DGRSC-STBC-SM scheme under the varying receive antenna number. The simulation results show that the system performance will be improved as the receive antenna number adds.
Author Contributions: C.Z. conceived the idea. She developed the mathematical models and performed the Monte Carlo simulations. F.Y. checked the mathematical model and the simulated results. D.K.W., C.C. and H.X. revised the manuscript. All authors have read and agreed to the published version of the manuscript.