Next Article in Journal
Selection Interface for Promoting User Selection Diversity by Presenting Positive/Negative Review Text and Video to Evoke Product Impression and User Emotion
Next Article in Special Issue
An In-Phase/Quadrature Index Modulation-Aided Spread Spectrum Communication System for Underwater Acoustic Communication
Previous Article in Journal
Impact of Parameter Mismatch on Three-Phase Dual-Active-Bridge Converters
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Rate-Compatible Protograph LDPC Codes for Source Coding in Joint Source—Channel Coded Modulation Systems

1
Xiamen Key Laboratory of Mobile Multimedia Communications, College of Information Science and Engineering, Huaqiao University, Xiamen 361021, China
2
The School of Ocean Information Engineering, Jimei University, Xiamen 361021, China
*
Author to whom correspondence should be addressed.
Electronics 2023, 12(12), 2610; https://doi.org/10.3390/electronics12122610
Submission received: 24 April 2023 / Revised: 4 June 2023 / Accepted: 6 June 2023 / Published: 9 June 2023

Abstract

:
Using the source residual redundancy in a joint source and channel coded modulation (JSCCM) system to achieve a shaping gain has proven to be a good solution for probabilistic amplitude shaping. In a JSCCM system, rate-compatible source codes are essential for adapting to dynamically changing source probabilities. However, conventional rate-compatible source codes are not appropriate for JSCCM systems, since they may yield a loss in the shaping gain. Moreover, a code design that depends solely on the source decoding threshold appears to be ill suited, thus complicating the search for good source codes. In this paper, we propose a rate-compatible family of source codes for JSCCM systems based on an achievable system rate analysis and the source protograph extrinsic information transfer (PEXIT) algorithm. The proposed codes not only have good source decoding thresholds but also obtain shaping gains over the whole considered range of source probabilities. Numerical results show that the proposed rate-compatible family of source codes can significantly improve the bit-error-rate (BER) performance of the JSCCM system.

1. Introduction

Shannon stated that the capacity of an additive white Gaussian noise (AWGN) channel is achieved when the transmitted signal follows a Gaussian distribution. However, many communication systems utilize uniformly distributed symbols, resulting in a shaping loss of up to 1.53 dB [1,2]. To overcome this loss, geometric shaping (GS) and probabilistic shaping (PS) have been proposed by imitating the capacity that achieves the symbol distribution. GS uses equiprobable symbols on a non-equispaced constellation, which was extensively studied in [3,4,5,6,7]. PS approaches, which assign equispaced constellation points with different probabilities, have been demonstrated to be effective means of achieving shaping gains [8,9,10,11,12]. To integrate PS with bit-interleaved coded modulation (BICM) systems [13], a probabilistic amplitude shaping (PAS) scheme with a symbol-level distribution matcher (DM) [14] was introduced in [8]. Subsequently, a bit-level DM was proposed to improve the throughput of distribution matching [9]. The complexity of a binary DM was reduced by utilizing simplified sign-bit shaping for high-spectral-efficiency coding [10]. The design of protograph low-density parity-check (LDPC) and non-binary codes for PAS systems can be found in [11,12].
In general, the input source bit sequence of a PAS scheme is assumed to be uniformly distributed, and a DM is utilized to generate non-uniformly distributed symbols from uniformly distributed input data bits. However, redundancy often resides in natural sources, such as a non-uniform distribution of source symbols and source memory. Moreover, redundancy is also found in the source encoder’s outputs due to the suboptimality of the compression scheme. Various solutions have been proposed for non-uniform sources, including constellation mappings [15] and optimized protograph low-density parity-check (LDPC) codes with unequal power allocation [16]. For the residual source redundancy after source coding, in [17], a novel PAS strategy was proposed for a joint source and channel coded modulation (JSCCM) system. By using source encoders to transform the non-uniform source bit sequence directly into bitstreams with the desired distribution, the PAS strategy for JSCCM systems avoids the rate loss and the high latency of traditional PAS schemes. Additionally, it is important to match source codes with source probabilities in JSCCM systems to effectively use the residual redundancy. Considering some communication applications with dynamically changing source statistics, rate-compatible source codes in JSCCM systems are essential for adaptive coding.
Substantial efforts have been invested in the source code design for JSCC. In [18], a source protograph extrinsic information transfer (PEXIT) algorithm was proposed, which utilizes the source decoding threshold to evaluate the error-floor level. Further, a rate-compatible family of source codes with good source decoding thresholds was proposed for JSCC systems in [19]. Moreover, several optimized source-linking matrices have been suggested to further improve the error-floor performance [20]. However, the source code designs above only focus on improving the source decoding threshold for the JSCC system, which would yield a loss in the shaping gap for the JSCCM system due to the mismatch between the source probabilities and the source codes. In [17], the source codes in JSCCM systems were optimized for a specific source probability, but they may fail to ensure the PAS performance for source probabilities with slight variations. Consequently, these source codes may not be suitable for adaptive coding in JSCCM systems with dynamically changing source probabilities.
In this paper, we present a study on the construction of a family of rate-compatible source codes for JSCCM systems. The main contributions of this paper are as follows:
  • In contrast to the design of source code parameters for a specific source probability, a searching algorithm for the source code parameters is proposed to obtain high shaping gains across the whole considered range of source probabilities for a given source coding rate.
  • Combining the achievable system rate analysis and the source decoding thresholds, some design principles for source codes are proposed to simultaneously improve the error-floor quality and guarantee the PAS performance of JSCCM systems for a range of source probabilities.
  • A family of source codes with rates ranging from 1/3 to 3/4 is proposed for a JSCCM system by code lengthening; these codes have good source decoding thresholds and obtain shaping gains for different source probabilities, which are attractive for adaptive coding in systems with changing source statistics.
The remainder of the paper is organized as follows. Section 2 presents the JSCCM system model, as well as the encoding and decoding algorithms. Section 3 proposes the design method of a rate-compatible family of source codes. The simulation results and comparisons for the system with the proposed rate-compatible source codes are discussed in Section 4. Finally, Section 5 concludes the paper.

2. System Model

In the JSCCM system, we employ protograph low-density parity-check (LDPC) codes as both source and channel codes. Specifically, let us denote the base matrix of source protograph LDPC codes by B s and the base matrix of channel protograph LDPC codes by B c . Then, we utilize the progressive edge-growth (PEG) algorithm to generate the sparse binary parity-check matrices H s and H c [21]. Later, H c is converted into a parity-check matrix with a systematic form of H c = [ I | P T ] , where I is the identity matrix, and P is a matrix obtained by transforming H c . After that, a systematic generator matrix of the channel protograph LDPC code G c can be constructed from H c , which is represented by G c = P I .
The block diagram of the JSCCM system is illustrated in Figure 1. The source we consider in this paper is a binary independent and identically distributed Bernoulli source s , where the probability of “1” is represented as p ( p > 0.5 ). The entropy of s can be obtained by
H ( p ) = p log 2 p ( 1 p ) log 2 ( 1 p ) < 1 .
On the transmitter side, a rate- R s source protograph LDPC encoder and a rate- R c channel protograph LDPC encoder are serially concatenated. The source information bit sequence s is fed to the source encoder to calculate the syndrome b T = H s s T , which is also the compressed sequence.
Then, the channel protograph LDPC is utilized to protect b for transmission through the AWGN channel, which generates a vector of the parity bit sequence c = b P . Assuming systematic channel encoding, the channel codeword x can be composed of a parity bit sequence c and a compressed bit sequence b as x = [ c b ] .
For one-dimensional 2 m -ary amplitude-shift keying (ASK) modulation, every m consecutive coded bits are converted into an ASK symbol X { ± 1 , ± 3 , , ± ( 2 m 1 ) } . Then, we set the channel code rate R c to be ( m 1 ) / m , contributing to the overall system rate as
R = m 1 R s .
By employing an interleaver, the channel codeword x = [ c b ] can be organized as
M x ( 1 ) = c 1 b 1 1 b 1 2 b 1 m 1 c 2 b 2 1 b 2 2 b 2 m 1 c N b N 1 b N 2 b N m 1 , b 0 b 1 b 2 b m 1
where N is the lifting factor, and each column forms a bit level b i for 0 i m 1 . By row-wise mapping with binary-reflected Gray code (BRGC) labeling, the ASK symbol sequence X = X 1 , X 2 , , X N for transmission is generated.
On the receiver side, after demodulation and de-interleaving, we employ joint source and channel (JSC) decoding to reconstruct the source bit sequence. The concatenated Tanner graph corresponding to the JSC decoder is shown in Figure 2, where circles denote variable nodes (VNs), and check nodes (CNs) are denoted by squares. The numbers of CNs and VNs are determined by the dimensions of source–channel protomatrices ( B s , B c ), denoted as m s , m c and n s , n c , respectively. Since the output of the source encoder is the input of the channel encoder, each VN in the systematic part of B c , denoted by an empty circle, is connected to a CN in B s . Thus, in each JSC iteration, extrinsic information is exchanged not only between the VNs and CNs in B s or B c but also between B s and B c through those connections. In this way, the residual source redundancy after source coding can be utilized in JSC decoding to improve the performance of the channel decoder.

3. Design of Source Codes

In this section, we propose the design of a rate-compatible family of source codes for the JSCCM system with the objective of jointly optimizing the error-floor performance and the PAS performance for a range of source probabilities.

3.1. Achievable System Rate Analysis

As shown in [17], the row weight distribution of the source code plays a critical role in controlling the residual redundancy and optimizing the PAS performance for the JSCCM system. Unlike the approach in [17], this study explores the row weight distribution design for a range of source probabilities, rather than focusing solely on a specific source probability.
For an AWGN channel, the mutual information-maximizing distribution under an average power constraint is a zero-mean Gaussian input X with unit variance, and it yields the capacity C expression
C = 1 2 log 2 ( 1 + 2 R · E s / N 0 ) ,
where R is the system rate, E s is the average energy per source bit, and N 0 is the one-sided noise power spectral density.
For an asymmetric source with entropy H ( p ) , the Shannon limit E s N 0 | s is determined from the condition H ( p ) R < C , where R is the target system rate defined in source bits per channel symbol.
For an ASK-modulated AWGN channel, the channel capacity is subject to the input probability distribution of the modulated symbols, which can be determined by the source probability p and the row weight distribution of the source code in the JSCCM system.
In (3), the bit level b 0 composed of the parity bits is approximately uniformly distributed. Meanwhile, the bit level in block b i ( 1 i m 1 ) composed of the compressed bits can be computed as the modulo-2 sum of the source bits.
Assuming that the bits at the input of the modulator are independent, the probabilities of the ASK symbols X A can be calculated as a function of the row weight distribution W = ( w 1 , w 2 , , w m 1 ) , which is obtained as follows
P W ( X ) = 1 2 i = 1 m 1 1 + ( 1 ) v i ( 1 2 p ) w i 2 ,
where v i { 0 , 1 } represents a specific bit of the symbol X at the bit position b i .
Given the input probability distribution of the modulated symbols P W ( X ) , the channel capacity of the ASK-modulated AWGN channel is calculated as
C W = X A P W ( X ) + P α ( Y | X ) log 2 P α ( Y | X ) X A P W ( X ) P α ( Y | X ) d Y ,
where X is the modulated symbol sequence, Y is the received symbol sequence, P α ( Y | X ) = 1 π N 0 exp ( Y α X ) 2 N 0 , and the associated SNR is calculated as [8,18]
E s N 0 W = X A P W ( X ) α X 2 R N 0 .
As the limit of the ASK constellations, E s N 0 W is larger than E s N 0 s for a given p and R. Thus, the goal of this work is to design the row weight distribution W that achieves reliable transmission close to the capacity–power function (4); i.e., we want to reliably transmit data over the AWGN channel at an SNR E s N 0 W that is close to E s N 0 s .
Instead of designing the row weight distribution W for one specific source probability p as in [17], W with high shaping gains across the whole range of source probabilities is sought using Algorithm 1 for a given source coding rate. To implement this search, we start by identifying the smallest p for a given source coding rate R s according to the lossless source coding theorem ( H ( p ) R s ). Then, we gradually increase the value of p for p < 1 and locate potential candidates W for each p as follows:
W Δ ( p ) = W [ 1 , w m a x ] m 1 : H ( p ) R < C W , E s / N 0 W E s / N 0 S < Δ ,
where w m a x is the maximum row weight value specified for B s , and Δ is the maximum gap in dB. Finally, candidates satisfying (8) over the whole considered range of p for a given R s are chosen, which can maintain a satisfactory PAS performance for varying p.
I s ev i , j = Φ x i , j s J BSC 1 2 k ¬ i x k , j s J 1 I s av k , j 2 + 1 2 x i , j s 1 J 1 I s av i , j 2 , p
I s ec i , j = Φ x i , j s 1 J k ¬ j x i , k s J 1 1 I s ac i , k 2 + x i , j s 1 J 1 1 I s ac i , j 2
I s , APM j = J BSC 1 2 k x k , j s J 1 I s av k , j 2 , p
Note:
  • The choice of Δ influences the system design. On the one hand, a small value of Δ , which means a small gap to the Shannon limit, leads to a small number of candidates and hence limits the search for a source code with good source decoding thresholds. On the other hand, increasing Δ can enlarge the search space for source codes with a good error-floor performance at the expense of the PAS performance. As a consequence, the proposed Algorithm 1 can strike a balance between the PAS performance and the error-floor performance by adjusting the value of Δ .
  • The value of δ is related to the step size of p in Algorithm 1. We use δ = 0.02 in our search process based on trial and error.
Algorithm 1 Search for the row weight distribution of the source code
Require:  p i n i = 0.5 , δ , R , m s , n s , e s , A , Δ
  1:
while  H ( p i n i ) R s  do
  2:
    p i n i p i n i + δ ;           \∗find the lowest p for R s ∗\
  3:
end while
  4:
compute R using (2);           \∗target system rate∗\
  5:
for  p = p i n i ; p < 1  do
  6:
   E s N 0 max 2 2 H ( p ) R 1 ( 2 R ) · 10 Δ / 10 ;
  7:
    W Δ ( p ) ;
  8:
   for every W [ 1 , n s e s ] m s 1 do
  9:
     compute P W ( X ) using (5) for all X A ;
  10:
      α R N 0 · E s N 0 max X A P W ( X ) | X | 2 1 / 2 ;      \∗scaling amplitudes∗\
  11:
     compute C W using (6) with P W ( X ) and P α ( Y | X ) ;
  12:
     if C W C then
  13:
       W Δ ( p ) W Δ ( p ) { W } .
  14:
     end if
  15:
   end for
  16:
   p p + δ ;
  17:
end for
  18:
Selecting the common elements W Δ in all W Δ ( p )
  19:
return  W Δ .

3.2. Source PEXIT Chart Analysis

As is shown in [18], the source PEXIT analysis can be exploited to evaluate the source decoding threshold. In contrast to the channel decoding threshold, the source decoding threshold represents the maximum compressible entropy as the source code length approaches infinity. Equivalently, the source decoding threshold can also be interpreted as the minimum source distribution p t h acceptable for the source code when p > 0.5 .
Let c i and v j represent the ith CN and the jth VN in B s (size m s × n s ), respectively. Five types of mutual information (MI) are first defined, including a priori mutual information (AMI), extrinsic mutual information (EMI), and a posteriori mutual information (APM), as follows:
  •    I s av ( i , j ) denotes the AMI from c i to v j ;
  •    I s ev ( i , j ) denotes the EMI from v j to c i ;
  •    I s ac ( i , j ) denotes the AMI from v j to c i ;
  •    I s ec ( i , j ) denotes the EMI from c i to v j ;
  •    I s , APM ( j ) denotes the APM for v j .
In [22], the function J ( σ ) calculating the MI between a binary bit and the corresponding LLR value following the Gaussian distribution N ( σ 2 / 2 , σ 2 ) is given as
J ( σ ) = 1 1 2 π σ 2 e ( ξ σ 2 / 2 ) 2 2 σ 2 log 2 1 e ξ d ξ .
The function J BSC μ , p is defined as follows:
J BSC μ , p = 1 p × 1 E log 2 1 + e s i g n V χ ( 1 p ) + p × 1 E log 2 1 + e s i g n V χ ( p ) ,
where V represents the source VN in B s , μ represents the average LLR value, and χ ( 1 p ) N ( μ + ln ( ( 1 p ) / p ) , 2 μ ) , χ ( p ) N ( μ ln ( ( 1 p ) / p ) , 2 μ ) .
In addition, an indicator function is defined as
Φ ( x ) = 0 , if x = 0 1 , otherwise .
The algorithm for calculating the source decoding threshold is specified in Algorithm 2. We use n m a x = 100 as the maximum iteration number and δ = 0.02 as the step size. The source decoding threshold p t h is the lowest value that makes I APM ( j ) = 1 hold for all j [ 1 , n s ] .
Algorithm 2 Source decoding threshold
Require:  B s , p = 0.5 , δ , n m a x
  1:
for  j [ 1 , n s ] do
  2:
    I APM ( j ) = 0.0 ;
  3:
end for
  4:
while  j = 1 n s I APM ( j ) n s  do
  5:
    p p + δ ;
  6:
    n i t r = 0 ;
  7:
   while  n i t r < n m a x  do
  8:
     for  ( i , j ) [ 1 , m s ] × [ 1 , n s ]  do
  9:
        Compute I s ev ( i , j ) using (9);
  10:
        Set I s ac ( i , j ) = I s ev ( i , j ) ;
  11:
     end for
  12:
     for  ( i , j ) [ 1 , m s ] × [ 1 , n s ]  do
  13:
        Compute I s ec ( i , j ) using (10);
  14:
        Set I s av ( i , j ) = I s ec ( i , j ) ;
  15:
     end for
  16:
     for  j [ 1 , n s ]  do
  17:
        Compute I APM ( j ) using (11);
  18:
     end for
  19:
      n i t r = n i t r + 1 ;
  20:
   end while
  21:
end while
  22:
p t h = p ;
  23:
return  p t h .

3.3. Design of Rate-Compatible Source Codes for JSCCM systems

The base matrix of the source protograph LDPC code can be defined as B s = ( B i , j ) , where all B i , j variables represent edges connecting c i and v j . A good source protograph LDPC code for the JSCCM system should have two properties:
(1) Asmentioned in [18], the source decoding threshold indicates the performance of the error-floor level, which is the lowest BER when E s / N 0 approaches infinity. The protograph LDPC codes with low source decoding thresholds p t h for p > 0.5 are preferred for source coding. In [19], it is shown that some degree-2 VNs in protograph LDPC codes can improve the source decoding threshold and thus lower the error floor. Additionally, it is worth noting that the degree-2 nodes cannot form a cycle among themselves.
(2) According to the analysis (see Section 3.1), the source code with an appropriate row weight distribution can help to close the shaping gap to the Shannon limit. Thus, the row weight distribution candidates identified by Algorithm 1 are utilized as constraints in the design of source codes to ensure the PAS performance.
With all of that in mind, consider the following example for the design of a rate-3/4 base matrix, which has 4 VNs and 3 CNs, i.e., size 3 × 4 . Firstly, we institute one degree-2 variable node (column of weight 2) for a good source decoding threshold. Therefore, the base matrix is:
B s = B 1 , 1 B 1 , 2 B 1 , 3 0 B 2 , 1 B 2 , 2 B 2 , 3 1 B 3 , 1 B 3 , 2 B 3 , 3 1 ,
The variables B i , j designate the remainder of the protograph to be designed. Then, candidates for the row weight distribution W are sought via Algorithm 1. The imposed constraints on the elements are
B 1 , 1 + B 1 , 2 + B 1 , 3 = w 1 B 2 , 1 + B 2 , 2 + B 2 , 3 = w 2 1 B 3 , 1 + B 3 , 2 + B 3 , 3 = w 3 1 B 1 , j , B 2 , j , B 3 , j ] [ 0 , 1 , 1 ] for j { 1 , 2 , 3 }
where W = [ w 1 , w 2 , w 3 ] is one of the candidates for the row weight distribution. For R s = 3/4, m = 4, Δ = 0.5 dB, and δ = 0.02 , the optimized row weight distribution is ( 3 , 3 , 3 ) . According to the constraints in (15), we search for the source code with the lowest p t h by using the PEXIT analysis in Section 3.2, and we find:
B s = 1 1 1 0 1 0 1 1 1 1 0 1 .
This code has a source decoding threshold of p t h = 0.829 , and thus, H t h = 0.66 with a gap of R s H t h = 0.09 to the source coding rate.
It is instructive to note that if we increase the value of Δ , such as Δ = 0.6 dB, the number of the row weight distribution candidates increases, and we have ( 3 , 3 , 3 ) , ( 3 , 3 , 5 ) , ( 3 , 5 , 3 ) , and ( 5 , 3 , 3 ) . Then, we can find the base matrix with a better source decoding threshold ( p t h = 0.812 , H t h = 0.697 ) as
B s 3 / 4 = 2 0 1 0 0 2 0 1 0 3 1 1 .
In Figure 3, the BER performance of JSCCM systems with those two source codes is provided. Even though the source code B s 3 / 4 yields a slight loss in the shaping gain, it achieves a competitive advantage over B s in the high-SNR region when the value of p decreases. For instance, the code B s suffers from an error floor close to a BER of 4 × 10 3 for p = 0.84 , while B s 3 / 4 does not show any error floors down to a BER of 10 5 . Thus, B s 3 / 4 is more attractive for dynamically changing p.
A low-rate source code can be constructed from the proposed rate-3/4 protograph found in (17) by code lengthening. Specifically, a base matrix with rate- R s 2 is constructed by lengthening the base matrix of a rate- R s 1 ( R s 1 > R s 2 ) source code (a base code) in the form of
B s R s 2 = B s R s 1 | B e ,
where B s R s 1 is the base matrix of the rate- R s 1 source code, and B e is an extension matrix.
Similarly, row weight distribution candidates for different source coding rates are sought via Algorithm 1 with m = 4, Δ = 0.6 dB, and δ = 0.02 , which are presented in Table 1. With the same setting of m, the target system rates R are dominated by the source coding rates according to (2). Then, we impose the row weight constraints on the elements of the extension matrix and search for the base matrix with the lowest source decoding threshold for each source coding rate. Finally, we obtain a rate-compatible family of source codes with rates from 1/3 to 3/4.
B s 3 / 5 = 2 B s 3 / 4 2 0 .
B s 1 / 2 = 2 B s 3 / 5 2 2 .
B s 1 / 3 = 3 0 1 B s 1 / 2 3 0 1 3 2 1 .
Table 2 shows the source decoding thresholds of the rate-compatible codes. It is found that the proposed codes exhibit threshold gaps between 0.0512 and 0.0702 to the corresponding source coding rates.

4. Experimental Results

In this section, an analysis of the achievable system rates and the BER results are presented to illustrate the advantage of the proposed codes.
Figure 4, Figure 5, Figure 6 and Figure 7 plot the achievable system rates for the proposed codes with different source probabilities. For instance, in Figure 6, the achievable system rates R = C W / H ( p ) versus E s / N 0 with four typical source probabilities p (0.9, 0.92, 0.94, 0.96) for the proposed code B s 1 / 2 are provided. In addition, the curves for B s 0.94 , which is proposed for p = 0.94 in [17], are also provided for comparison. Note that p = 0.9 ( H ( p ) = 0.469 ) is the smallest probability that satisfies the lossless source coding theorem ( H ( p ) R s ) for R s = 0.5 when δ = 0.02 . It can be found that B s 1 / 2 and B s 0.94 have similar shaping gaps to the Shannon limits for p = 0.94 and p = 0.96 at the target system rate R = 6 . However, as the source probability decreases, the proposed B s 1 / 2 can achieve an advantage over B s 0.94 . Specifically, for p = 0.9 , the JSCCM system with the proposed B s 1 / 2 can obtain a 0.19 dB shaping gain over B s 0.94 , reducing the gap to the Shannon limit. Thus, for the whole considered range of source probabilities, the proposed source code can obtain a better PAS performance than B s 0.94 . Furthermore, in Figure 4, Figure 5, Figure 6 and Figure 7, observe that in a range of source probabilities, the gaps to the Shannon limits for the proposed codes are all within 0.6 dB at the target system rates, which can ensure the PAS performance for varying source probabilities.
To further verify the merits of the proposed source codes, we present some bit-error-rate (BER) results of JSCCM systems with 16ASK for different source probabilities. For all simulations, an AWGN channel was assumed, and the information block length was fixed at 3600 bits. Additionally, the maximum number of iterations was set to 100. For source codes with different coding rates, the same protograph LDPC code (3/4-rate- B c U [23]) was employed as the channel code. The existing source code with a good PAS performance for JSCCM systems (1/2-rate- B s 0.94 [17]), the code with a good source decoding threshold (1/3-rate- B s L F l o o r [19]), and 3/5-rate regular LDPC were utilized as benchmark codes. The base matrices for these benchmark codes are provided as follows:
B s 0.94 = 1 1 3 3 1 0 1 0 5 2 0 1 1 2 3 3 1 1 .
B s L F l o o r = 3 2 1 1 0 1 0 0 2 0 2 0 2 3 1 0 1 0 1 0 3 2 0 0 3 3 0 0 0 0 0 1 3 0 0 1 3 0 1 2 2 1 1 1 2 2 1 2 .
B s r e g u l a r = 2 1 1 1 0 1 0 1 2 1 0 2 1 0 2 .
The BER curves of JSCCM systems with the proposed source codes for different source probabilities are depicted in Figure 3 and Figure 8, Figure 9 and Figure 10.
Figure 8 provides the BER comparison of B s 3 / 5 and B s r e g u l a r with different source probabilities. Despite having the same row weight distribution ( W = [ 5 , 5 , 5 ] ), the proposed B s 3 / 5 performs better than B s r e g u l a r for different source probabilities. For instance, B s 3 / 5 achieves coding gains in all five different source statistics. Furthermore, it is obvious that B s r e g u l a r has a higher error floor than the proposed code for p = 0.9 and p = 0.91 .
In Figure 9, even though B s 0.94 has a slightly better performance in the waterfall region than the proposed code for p = 0.95 and p = 0.96 , the proposed B s 1 / 2 achieves a significant advantage at high E s / N 0 . Specifically, B s 1 / 2 obtains 2 dB, 0.59 dB, 0.42 dB, and 0.23 dB gains over B s 0.94 at a BER of 10 4 for p = 0.93 , p = 0.94 , p = 0.95 , and p = 0.96 , respectively. For p = 0.92 , our proposed code achieves a lower error floor ( 8 × 10 4 ) than B s 0.94 ( 7 × 10 3 ).
In Figure 10, it can be found that the source code B s 1 / 3 outperforms B s L F l o o r by 1.5 dB and 2.4 dB at a BER of 10 4 for p = 0.97 and p = 0.98 , respectively.
The above observations imply that the proposed rate-compatible source codes are expected to provide a better system performance for JSCCM systems with varying source probabilities than conventional source codes.

5. Conclusions

In this paper, a rate-compatible family of source codes is proposed based on an achievable system rate analysis and the PEXIT algorithm. Simulation results demonstrate that the proposed source codes exhibit good source decoding thresholds as well as high shaping gains for the JSCCM system across a wide range of source probabilities, making them well suited for practical applications with changing source probabilities.

Author Contributions

Conceptualization, C.C. and Z.X.; methodology, C.C.and S.L.; software, C.C.; validation, S.L. and Z.X.; formal analysis, C.C. and S.L.; investigation, C.C.; resources, S.L.; data curation, C.C.; writing—original draft preparation, C.C.; writing—review and editing, Z.X. and Q.C.; visualization, C.C.; supervision, Z.X.; project administration, C.C. and Q.C.; funding acquisition, C.C. and Z.X. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the National Natural Science Foundation of China under Grants 61901182 and 62101195, the Science Foundation of the Fujian Province, China (Grant No. 2020J05056), the Fujian Province Young and Middle-aged Teacher Education Research Project (No. JAT220182), the Fundamental Research Funds for the Central Universities (ZQN-1008), the Scientific Research Funds of Huaqiao University (19BS206, 20BS105, and 21BS118), the Jimei University Startup Research Project (No. ZQ2022039), and the Scientific Research Foundation of Jimei University (No. XJ2022000201).

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
ASKamplitude-shift keying
AMIa priori mutual information
APMa posteriori mutual information
AWGNadditive white Gaussian noise
BERbit-error rate
BICMbit-interleaved coded modulation
BSCbinary symmetric channel
CNcheck nodes
DMdistribution matcher
EMIextrinsic mutual information
GSgeometric shaping
JSCCjoint source–channel coding
JSCCMjoint source–channel coded modulation
LDPClow-density parity-check
MImutual information
PASprobabilistic amplitude shaping
PSprobabilistic shaping
PEXITprotograph extrinsic information transfer
PEGprogressive edge growth
QAMquadrature amplitude modulation
SNRsignal-to-noise ratio
VNvariable node

References

  1. Shannon, C. A mathematical theory of communication. Bell Syst. Tech. J. 1948, 27, 379–423. [Google Scholar] [CrossRef] [Green Version]
  2. Forney, G.D.; Gallager, R.G.; Lang, G.; Longstaff, F.; Qureshi, S. Efficient modulation for band-limited channels. IEEE J. Sel. Areas Commun. 1984, 5, 632–647. [Google Scholar] [CrossRef] [Green Version]
  3. R1-1700679. Non-Uniform Constellations in NR. Sony, 3GPP TSG RAN1 NR Ad Hoc Meeting. 2017, pp. 16–20. Available online: https://www.google.com.hk/url?sa=i&rct=j&q=&esrc=s&source=web&cd=&ved=0CAIQw7AJahcKEwiYwKGP5LL_AhUAAAAAHQAAAAAQBQ&url=https%3A%2F%2Fwww.3gpp.org%2Fftp%2Ftsg_ran%2FWG1_RL1%2FTSGR1_AH%2FNR_AH_1701%2FDocs%2FTDoc_List_Meeting_RAN1-NR%25231.xlsx&psig=AOvVaw1Pxfv9KqWmRZ-3oXRKIcTA&ust=1686283064829716 (accessed on 5 June 2023).
  4. Zoellner, J.; Loghin, N. Optimization of high-order nonuniform QAM constellations. In Proceedings of the International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB) 2013, London, UK, 5–7 June 2013. [Google Scholar]
  5. Barsoum, M.F.; Jones, C.; Fitz, M. Constellation design via capacity maximization. In Proceedings of the 2007 IEEE International Symposium on Information Theory, Nice, France, 24–29 June 2007. [Google Scholar]
  6. A/322:2017; NATSC Proposed Standard: Physical Layer Protocol (A/322). Advanced Television Systems Committee: Washington, DC, USA, 2016.
  7. Digital Video Broadcasting (DVB), Next Generation Broadcasting System to Handheld, Physical Layer Specification (DVB NGH) Tech. Rep. A160, November 2013. Available online: https://dvb.org/wp-content/uploads/2019/12/A160_DVB-NGH_Spec.pdf (accessed on 5 June 2023).
  8. Böcherer, G.; Steiner, F.; Schulte, P. Bandwidth efficient and rate-matched low-density parity-check coded modulation. IEEE Trans. Commun. 2015, 12, 4651–4665. [Google Scholar] [CrossRef] [Green Version]
  9. Pikus, M.; Xu, W. Bit-Level Probabilistically Shaped Coded Modulation. IEEE Commun. Lett. 2017, 21, 1929–1932. [Google Scholar] [CrossRef]
  10. Corlay, V.; Gresset, N. A simple sign-bit probabilistic shaping scheme. IEEE Commun. Lett. 2022, 4, 763–767. [Google Scholar] [CrossRef]
  11. Steiner, F.; Böcherer, G.; Liva, G. Protograph-based LDPC code design for shaped bit-metric decoding. IEEE J. Sel. Areas Commun. 2016, 2, 397–407. [Google Scholar] [CrossRef] [Green Version]
  12. Steiner, F.; Böcherer, G.; Liva, G. Bit-metric decoding of non-binary LDPC codes with probabilistic amplitude shaping. IEEE Commun. Lett. 2018, 11, 2210–2213. [Google Scholar] [CrossRef] [Green Version]
  13. Caire, G.; Taricco, G.; Biglieri, E. Bit-interleaved coded modulation. IEEE Trans. Inf. Theory 1998, 3, 927–946. [Google Scholar] [CrossRef] [Green Version]
  14. Schulte, P.; Böcherer, G. Constant composition distribution matching. IEEE Trans. Inf. Theory 2016, 62, 430–434. [Google Scholar] [CrossRef] [Green Version]
  15. Takahara, G.; Alajaji, F.; Beaulieu, N.C.; Kuai, H. Constellation Mappings for Two-Dimensional Signaling of Nonuniform Sources. IEEE Trans. Commun. 2003, 51, 400–408. [Google Scholar] [CrossRef]
  16. Chen, Q.; He, Y.; Chen, C.; Zhou, L. Optimization of protograph LDPC codes via surrogate channel for unequal power allocation. IEEE Trans. Commun. 2023, 71, 1284–1295. [Google Scholar] [CrossRef]
  17. Chen, C.; Chen, Q.; Wang, L.; He, Y.-C.; Chen, Y. Probabilistic shaping for protograph LDPC-coded modulation by residual source redundancy. IEEE Trans. Commun. 2021, 7, 4267–4281. [Google Scholar] [CrossRef]
  18. Chen, C.; Wang, L.; Xiong, Z.X. Matching criterion between source statistics and source coding rate. IEEE Commun. Lett. 2015, 19, 1504–1507. [Google Scholar] [CrossRef]
  19. Chen, C.; Wang, L.; Liu, S. The design of protograph LDPC codes as source codes in a JSCC system. IEEE Commun. Lett. 2018, 22, 672–675. [Google Scholar] [CrossRef]
  20. Chen, Q.; Lau, F.C.M.; Wu, H.; Chen, C. Analysis and Improvement of Error-Floor Performance for JSCC Scheme Based on Double Protograph LDPC Codes. IEEE Trans. Veh. Technol. 2020, 69, 14316–14329. [Google Scholar] [CrossRef]
  21. Nguyen, V. Design of Capacity-Approaching Protograph-Based LDPC Coding Systems. Ph.D. Thesis, University of Texas at Dallas, Dallas, TX, USA, December 2012. [Google Scholar]
  22. Fresia, M.; Perez-Cruz, F.; Poor, H.V.; Verdú, S. Joint source and channel coding. IEEE Signal Process. Mag. 2010, 27, 104–113. [Google Scholar] [CrossRef]
  23. Uchikawa, H. Design of non-precoded protograph-based LDPC codes. In Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, 29 June–4 July 2014; pp. 2779–2783. [Google Scholar]
Figure 1. Block diagram of a JSCCM system.
Figure 1. Block diagram of a JSCCM system.
Electronics 12 02610 g001
Figure 2. Tanner graph for joint source and channel decoding.
Figure 2. Tanner graph for joint source and channel decoding.
Electronics 12 02610 g002
Figure 3. BER performance of JSCCM systems for different source codes ( R s = 3 / 4 ) with different source probabilities.
Figure 3. BER performance of JSCCM systems for different source codes ( R s = 3 / 4 ) with different source probabilities.
Electronics 12 02610 g003
Figure 4. Achievable system rates for the proposed source code B s 3 / 4 (target system rate R = 4 ).
Figure 4. Achievable system rates for the proposed source code B s 3 / 4 (target system rate R = 4 ).
Electronics 12 02610 g004
Figure 5. Achievable system rates for the proposed source code B s 3 / 5 (target system rate R = 5 ).
Figure 5. Achievable system rates for the proposed source code B s 3 / 5 (target system rate R = 5 ).
Electronics 12 02610 g005
Figure 6. Achievable system rates for different source codes ( R s = 1 / 2 , target system rate R = 6 ).
Figure 6. Achievable system rates for different source codes ( R s = 1 / 2 , target system rate R = 6 ).
Electronics 12 02610 g006
Figure 7. Achievable system rates for the proposed source code B s 1 / 3 (target system rate R = 9 ).
Figure 7. Achievable system rates for the proposed source code B s 1 / 3 (target system rate R = 9 ).
Electronics 12 02610 g007
Figure 8. BER comparison of different source codes ( R s = 3 / 5 ) with different source probabilities.
Figure 8. BER comparison of different source codes ( R s = 3 / 5 ) with different source probabilities.
Electronics 12 02610 g008
Figure 9. BER comparison of different source codes ( R s = 1 / 2 ) with different source probabilities.
Figure 9. BER comparison of different source codes ( R s = 1 / 2 ) with different source probabilities.
Electronics 12 02610 g009
Figure 10. BER comparison of different source codes ( R s = 1 / 3 ) with different source probabilities.
Figure 10. BER comparison of different source codes ( R s = 1 / 3 ) with different source probabilities.
Electronics 12 02610 g010
Table 1. Row weight distribution candidates for different source coding rates ( Δ = 0.6 dB).
Table 1. Row weight distribution candidates for different source coding rates ( Δ = 0.6 dB).
Source Coding RateTarget System Rate
(Bits/Symbol)
Size of B s W Δ
R s = 3 / 4 R = 4 3 × 4 ( 3 , 3 , 3 ) , ( 3 , 3 , 5 ) , ( 3 , 5 , 3 ) , ( 5 , 3 , 3 )
R s = 3 / 5 R = 5 3 × 5 ( 5 , 3 , 5 ) , ( 3 , 3 , 3 ) , ( 5 , 5 , 5 )
( 3 , 3 , 5 ) , ( 3 , 5 , 3 ) , ( 5 , 3 , 3 )
R s = 1 / 2 R = 6 3 × 6 ( 5 , 5 , 5 ) , ( 5 , 5 , 7 ) , ( 7 , 5 , 5 ) , ( 5 , 7 , 5 )
( 7 , 7 , 7 ) , ( 7 , 7 , 9 ) , ( 9 , 7 , 7 ) , ( 7 , 9 , 7 )
R s = 1 / 3 R = 9 3 × 9 w i { 9 , 11 , 13 } , for i = 1 , 2 , 3
Table 2. Source decoding thresholds for the proposed source codes.
Table 2. Source decoding thresholds for the proposed source codes.
Source CodesWSource Decoding ThresholdGap
R s H th
B s 3 / 4 ( 3 , 3 , 5 ) p t h = 0.812 , H t h = 0.6973 0.0527
B s 3 / 5 ( 5 , 5 , 5 ) p t h = 0.877 , H t h = 0.5379 0.0621
B s 1 / 2 ( 7 , 7 , 7 ) p t h = 0.912 , H t h = 0.4298 0.0702
B s 1 / 3 ( 11 , 11 , 13 ) p t h = 0.951 , H t h = 0.2821 0.0512
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Chen, C.; Liu, S.; Chen, Q.; Xu, Z. Rate-Compatible Protograph LDPC Codes for Source Coding in Joint Source—Channel Coded Modulation Systems. Electronics 2023, 12, 2610. https://doi.org/10.3390/electronics12122610

AMA Style

Chen C, Liu S, Chen Q, Xu Z. Rate-Compatible Protograph LDPC Codes for Source Coding in Joint Source—Channel Coded Modulation Systems. Electronics. 2023; 12(12):2610. https://doi.org/10.3390/electronics12122610

Chicago/Turabian Style

Chen, Chen, Sanya Liu, Qiwang Chen, and Zhiping Xu. 2023. "Rate-Compatible Protograph LDPC Codes for Source Coding in Joint Source—Channel Coded Modulation Systems" Electronics 12, no. 12: 2610. https://doi.org/10.3390/electronics12122610

APA Style

Chen, C., Liu, S., Chen, Q., & Xu, Z. (2023). Rate-Compatible Protograph LDPC Codes for Source Coding in Joint Source—Channel Coded Modulation Systems. Electronics, 12(12), 2610. https://doi.org/10.3390/electronics12122610

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop