Next Article in Journal
Exploiting Dynamic Vector-Level Operations and a 2D-Enhanced Logistic Modular Map for Efficient Chaotic Image Encryption
Previous Article in Journal
Stability of Delay Hopfield Neural Networks with Generalized Riemann–Liouville Type Fractional Derivative
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Design and Optimization of Linking Matrix for a JSCC System Based on DP-LDPC Codes

Department of Information and Communication Engineering, Xiamen University, Xiamen 361005, China
*
Author to whom correspondence should be addressed.
Entropy 2023, 25(8), 1145; https://doi.org/10.3390/e25081145
Submission received: 13 June 2023 / Revised: 16 July 2023 / Accepted: 27 July 2023 / Published: 31 July 2023
(This article belongs to the Section Information Theory, Probability and Statistics)

Abstract

:
Although extensive optimization of encoding and decoding schemes for joint source-channel coding (JSCC) systems has been conducted, efficient optimization schemes are still required for designing and optimizing the linking matrix between variable nodes of the source code and check nodes of the channel code. A scheme has been proposed for design and optimization of linking matrix with multi-edges by analyzing the performance of the JSCC system using the joint protograph extrinsic information transfer algorithm to calculate decoding thresholds. The proposed scheme incorporates structural constraints and is effective in designing and optimizing the multi-edges in linking matrix for the JSCC system. Experimental results have demonstrated that the designed and optimized linking matrix significantly improves the performance of the JSCC system. Furthermore, the proposed scheme reduces the complexity of the solution space for the optimized example.

1. Introduction

Shannon introduced a channel code that ensures reliable communication, provided that the information rate of the code is below the channel capacity [1]. However, the application of Shannon theory in separate source-channel optimization imposes limitations on the performance of practical digital communication systems [2,3,4]. This results in elevated decoding errors due to the underutilization of residual redundancy present at the output of the source decoder [5]. Moreover, the source-channel separation scheme, which involves sequential source decoding and channel decoding operations without the exchange of extrinsic information, leads to a degradation in performance [6].
The joint source-channel coding (JSCC) system solves the drawbacks of the standard source-channel separation coding system described above [5,6]. In order to improve the performance of the JSCC system, a technique called joint protograph extrinsic information transfer (JPEXIT) chart has been used in conjunction with two tandem protograph low-density parity-check (LDPC) codes [7,8]. Two tandem protograph LDPC codes in combination can facilitate hardware implementation in a structure that is also referred to as double protograph LDPC (DP-LDPC) codes [9,10]. Another JSCC method based on concatenated spatially coupled low-density parity-check codes has also been proposed [11]. A study has investigated the relationship between the check nodes (CNs) of the source and the variable nodes (VNs) of the channel [12]. The performance of the JSCC system has been enhanced through the utilization of a multi-objective optimization technique that considers the optimization of single-edge in linking matrix [13]. Through an analysis of the linking matrix between VNs in the source code and CNs in the channel code (i.e., B L 2 ), it has been confirmed that multi-edges in linking matrix provide a significant improvement to the performance of the JSCC system compared to single-edge in linking matrix [14,15,16,17]. Although it has been demonstrated that the presence of linking matrix with multi-edges can effectively improve the performance of JSCC systems, existing design and optimization schemes have only utilized partially multi-edges in linking matrix and lack an effective optimization scheme.
The main contributions of this paper are as follows. The effect of the linking matrix on the performance of JSCC systems is analyzed by calculating the decoding threshold through the joint protograph extrinsic information transfer algorithm. A scheme with structural constraints has been proposed for designing and optimizing linking matrix with multi-edges. The proposed optimization scheme for the linking matrix effectively improves the performance of the JSCC system while reducing the complexity of the search space.
The organizational structure of this paper is as follows: Section 2 provides a detailed introduction to the JSCC system. Section 3 presents a scheme for the design and optimization of linking matrix. Section 4 presents the experimental results and the summary. Finally, the conclusions of the experiments in this paper are given.

2. JSCC System Description

JSCC system employs a combination of source and channel codes to compress data and ensure reliable transmission. The system utilizes double LDPC codes, with DP-LDPC codes optimizing the performance of the waterfall and error floor [14]. The JSCC matrix representation is defined as (1).
B J = B S B L 1 B L 2 B C ,
where B J has a dimension of ( m s + m c ) · ( n s + n c ) , the source code matrix B S has a dimension of m s · n s , the channel code matrix B C has a dimension of m c · n c , the B L 1 has a dimension of m s · n c , and the B L 2 has a dimension of m c · n s . The Tanner graph represented by the joint base matrix B J is depicted in Figure 1. The figure contains eight types of mutual information.

2.1. Encoder

The given source sequence is assumed to be independently and identically distributed according to a binomial Bernoulli distribution with probability p, where p ( p 1 / 2 ) represents the probability of a ’1’ occurring. The entropy of the source can be calculated using the formula:
H = p log 2 p ( 1 p ) log 2 ( 1 p ) ,
Two tandem LDPC codes are used to represent the JSCC system.
c = [ p t , o ] · G L C = [ p t , p t · H S C T ] · G L C ,
where p t is the source output, o is the source compressed sequence, G L C ( n c + l m c · n c + l ) (the quantities within the parentheses denote the dimensions or sizes of the matrices) is the generation matrix obtained from the algebraic transformation of the check matrix H L C m c · n c + l , and l is the number of columns in B L 2 that contain non-zero elements. The two tandem codes are under the following condition
n c m c = m s .

2.2. Decoder

Simulation of binary sequence under additive white Gaussian noise (AWGN) channel after binary phase-shift keying (BPSK) modulation. The joint belief propagation (JBP) algorithm uses the sequence on the receiver side to recover the sequence on the sender side. The initial source information J S L is given by ln ( ( 1 p ) / p ) . The initial channel information is J C L = 2 y / σ 2 , where y = ( 1 2 s i ) + n G , and n G 0 , σ 2 is Gaussian noise.

3. Design and Optimization

3.1. JEXIT Analysis

To analyze the effect of B L 2 on the performance of JSCC system, the source code, the channel code, and B L 1 are fixed. The e L 2 i , j term in (5) indicates the presence of a link between the j-th VN of the source code and the i-th CN of the channel code.
B L 2 = e L 2 1 , 1 e L 2 1 , 2 e L 2 1 , 3 e L 2 1 , 4 e L 2 1 , 5 e L 2 1 , 6 e L 2 1 , 7 e L 2 1 , 8 e L 2 2 , 1 e L 2 2 , 2 e L 2 2 , 3 e L 2 2 , 4 e L 2 2 , 5 e L 2 2 , 6 e L 2 2 , 7 e L 2 2 , 8 e L 2 3 , 1 e L 2 3 , 2 e L 2 3 , 3 e L 2 3 , 4 e L 2 3 , 5 e L 2 3 , 6 e L 2 3 , 7 e L 2 3 , 8
The joint base matrix in Equation (6) is composed of the source matrix B S , the channel matrix B C , B L 1 and B L 2 . The decoding threshold is −0.568 dB when B L 2 is an all-zero matrix. As the weight of an element in B L 2 increases, the decoding threshold variation is depicted in Figure 2. The decoding threshold decreases as the weight of the element increases, and reaches a minimum when the weight increases to 21. After that, the decoding threshold increases as the weight of the element increases.
B J = 3 1 3 1 3 1 1 1 0 0 0 1 0 1 2 1 3 1 3 1 2 0 0 0 0 1 e L 2 1 , 1 e L 2 1 , 2 e L 2 1 , 3 e L 2 1 , 4 e L 2 1 , 5 e L 2 1 , 6 e L 2 1 , 7 e L 2 1 , 8 1 0 1 2 0 e L 2 2 , 1 e L 2 2 , 2 e L 2 2 , 3 e L 2 2 , 4 e L 2 2 , 5 e L 2 2 , 6 e L 2 2 , 7 e L 2 2 , 8 0 1 0 3 1 e L 2 3 , 1 e L 2 3 , 2 e L 2 3 , 3 e L 2 3 , 4 e L 2 3 , 5 e L 2 3 , 6 e L 2 3 , 7 e L 2 3 , 8 1 1 2 0 2
The decoding thresholds of different elements in B L 2 are listed in Table 1 when all elements have a weight of 5. From Table 1, it can be concluded that the addition of edge connections in B L 2 may not necessarily enhance the waterfall region of the JSCC system. In actuality, adding elements to the linking matrix may lead to the degradation of the system performance. The analysis also reveals that the third row of B L 2 is a critical area where adding edge connections may cause performance degradation. Therefore, to simplify the solution space and optimize the performance of JSCC system, it is advisable to avoid adding edge connections in the third row of B L 2 .

3.2. Design and Optimization

The following structural constraints need to be satisfied for the design and optimization of the linking matrix:
C o n d i t i o n 1 : E W r n s = E p 1 ,
where the number of non-zero elements in the row is E W r , the number of columns in the matrix is n s , and the probability of non-zero elements in a specific row of the matrix is E p .
C o n d i t i o n 2 : E W D D = E D p < 1 ,
where the number of non-zero elements in the matrix is E W D , the dimension of the matrix is D, and the probability of non-zero elements in the matrix is E D p .
C o n d i t i o n 3 : i = 1 n s R W i R W max ( m s + n s + m c + n c ) ,
where the weight of the i-th element in the row is R W i and the maximum value of the row weight is R W max .
C o n d i t i o n 4 : j = 1 m c C W j C W max n s ,
where the weight of the j-th element in the column is C W j and the maximum value of the column weight is C W max .
C o n d i t i o n 5 : W i , j W max , i = 1 m c , j = 1 n s ,
where the weight of the element in the matrix is W i , j and the maximum value of non-zero element is W max .
The objective function of the differential evolution algorithm is formulated as
min ψ B J , s . t . Ω B J = 1 ,
where ψ B J denotes the joint source-channel decoding threshold and Ω B J = 1 indicates that conditions 1–5 are satisfied.
Required algorithm parameters:
1.
Number of population P.
2.
Dimension D of the linking matrix B L 2 (i.e., the product of the number of rows and the number of columns) and the maximal value W max of a single element in B L 2 .
3.
The maximum number of generations G.
4.
Crossover probability value p c .
5.
Non-zero element probability E p .
6.
Non-zero element probability E D p .
Differential evolution algorithm is described as follows:
Step 1: Constructing a population P of dimension D, the number of elements of D is m c · n s . The value of each element is less than or equal to W m a x . Construct the population P repeatedly until each individual in the population satisfies conditions 1–5;
Step 2: The mutation produces the next generation under the following condition
B M i g + 1 = B r 1 g + F B r 2 g B r 3 g .
In Equation (13), r 1 , r 2 , r 3 are arbitrary values in [ 1 , P ] , where [ 1 , P ] represents all individuals in the population of the differential evolution algorithm. B r 1 g , B r 2 g , and B r 3 g denote randomly chosen individuals from the population, which are involved in the mutation process to generate the next generation individual B M i g + 1 . The values of B M i g + 1 are rounded to integers, and F is the scaling factor;
Step 3: According to the probability p c , crossover B M i g + 1 , and the previous B i g :
B i g + 1 = B M r 1 g + 1 , if rand 0 , 1 p c ; B r 1 g , else .
In Equation (14), rand 0 , 1 represents a randomly generated number between 0 and 1. This random number is used in the context of the crossover operation within the differential evolution algorithm. If the generated random number is less than the crossover probability p c , the mutated individual is selected; otherwise, the parent individual is chosen for the crossover operation.
Step 4: Calculate the decoding threshold for every B i g + 1 , then select the decoding threshold that satisfies the requirements;
Step 5: Return to Step 2 until the calculation of the Gth generation is completed, and the optimal decoding threshold is given.
The corresponding pseudocode of the algorithm is presented in Algorithm 1.
Algorithm 1: Design and optimization of B L 2 by differential evolution algorithm.
Require:
1:
P: Population
2:
B: Linking matrix, number of rows m c and columns n s
3:
W m a x : Maximum value
4:
D: Dimension, m c multiplied by n s
5:
G: Generation
6:
p c : Crossover probability
7:
E p : Non-zero element probability
Ensure:
8:
Begin
9:
Initialization
10:
for i = 1 : P   do
11:
   while Condition 1–5 are not satisfied do
12:
     for  j = 1 : D  do
13:
         e i j = r a n d 0 , W m a x ;
14:
        ⊳ Random generate B i . e i j is the j-th element of B i .
15:
     end for
16:
   end while
17:
end for
18:
Calculation
19:
while   g G do
20:
   ⊳ g is initialized before its first use in the algorithm. This initialization ensures that g accurately records the generation count in the differential evolution process.
21:
   for  i = 1 : P  do
22:
      B i g + 1 = Mutation B i g ;
23:
     ⊳ The mutation function refers to the process described in Step 2 of the differential evolution algorithm.
24:
     Three individuals are randomly selected from the population, and the scaling factor is taken.
25:
      B i g + 1 = Crossover B i g + 1 , B i g ;
26:
     ⊳ The crossover function refers to the process described in Step 3 of the differential evolution algorithm.
27:
     Crossover with probability p c .
28:
     if  S a t i s f y C o n d i t i o n 1–5 then
29:
        if  ψ B i g + 1 ψ B i g  then
30:
          ⊳ ψ ( · ) represents the calculation of the decoding threshold values.
31:
           B i g + 1 B i g + 1 ;
32:
          ⊳ B i g + 1 has the minimum value of the JSCC decoding threshold.
33:
        else
34:
           B i g + 1 B i g ;
35:
        end if
36:
     end if
37:
   end for
38:
    g = g + 1 ;
39:
end while
40:
End

4. Results and Summary

The experiments in this paper were simulated under the AWGN channel. The source code and channel code were obtained via ’copy and permute’ from a progressive edge-growth (PEG) algorithm [18]. Simulation results were obtained by BPSK modulation and JBP iterative decoding. The maximum number of iterations was 100 and the maximum number of frames with errors was 100 for all the signal-to-noise ratios (SNRs). In Figure 3, Figure 4 and Figure 5, the source with p = 0.02 is used, whereas in Figure 6, the source with p = 0.04 is used. The value of W max is set to 5 in order to reduce the space complexity of the differential evolution algorithm, which is O ( P · D · G ) .
The study focuses on finding the ideal scheme with few calculations or approximating the ideal scheme at the minimum cost while constructing B L 2 , because B L 2 has a unique effect on the performance of JSCC systems. B L 2 OPT is designed and optimized by differential evolution algorithm. Because the edge connections of the third row in B L 2 OPT may cause the performance degradation of the JSCC system, the elements of the third row are preset to zero. Non-zero elements with different probabilities are added to the first and second row of B L 2 . The decoding threshold values corresponding to the probability of non-zero elements are depicted in Figure 7. When adding elements to a row with a probability of 0.875, it is necessary to ensure that the percentage of non-zero elements in at least one row of the matrix is at least 0.875, i.e. the percentage of elements in other rows is less than or equal to 0.875. The decoding threshold for this probability is −0.935 dB and the corresponding linking matrix is given by Equation (15). It is not the case that the more edges in linking matrix, the better the performance of the JSCC system.
B J ( 0.875 ) OPT = 3 1 3 1 3 1 1 1 0 0 0 1 0 1 2 1 3 1 3 1 2 0 0 0 0 1 3 2 0 5 1 3 1 3 1 0 1 2 0 1 1 1 3 0 2 1 2 0 1 0 3 1 0 0 0 0 0 0 0 0 1 1 2 0 2
B J ( 0.75 ) OPT = 3 1 3 1 3 1 1 1 0 0 0 1 0 1 2 1 3 1 3 1 2 0 0 0 0 1 1 0 0 1 3 2 2 5 1 0 1 2 0 1 3 0 0 2 0 1 0 0 1 0 3 1 0 0 0 0 0 0 0 0 1 1 2 0 2
A simulation performance comparison between JSCC and separate source-channel coding is presented in Figure 3. At a BER of 10 5 , the JSCC system demonstrates a gain of 1.96 dB compared to its separate scheme. In order to improve the performance of the JSCC system, the maximum probability of non-zero elements in each row of B L 2 is 75 percent. The maximum number of the bits in a frame is 6400, i.e., the maximum length of the source sequence is 6400. The optimized matrix is in Equation (16). The decoding threshold value of B J ( 0.75 ) OPT is −1.126 dB, whereas the unoptimized linking matrix decoding threshold value is −0.568 dB. Thus, it yields a gain of 0.558 dB. Equation (16) gives that if there are too many non-zero elements in any row, it is necessary to reduce the number of non-zero elements in other rows to increase the overall system performance. Figure 4 shows BER performance comparison of unoptimized linking matrix, optimized B J ( 0.75 ) OPT , and optimized B J ( 0.875 ) OPT . At a BER level of 10 6 , there has an approximately 0.69 dB gain between unoptimized linking matrix and optimized B J ( 0.75 ) OPT . The performance of the optimized matrix B J ( 0.875 ) OPT gives to an about 0.45 dB gain.
To demonstrate the performance degradation of the waterfall region in JSCC system, the linking matrix with a decoding threshold of 0.338 dB in Table 1 was selected for the simulation experiment. Figure 5 presents a comparison of BER values between all-zero elements and non-zero elements in the third row. The simulation results indicate that adding unnecessary elements in the third row leads to performance degradation of the JSCC system. It is mainly because of the unnecessary non-zero elements, i.e., adding unnecessary edge connections, which disrupt the transmission of mutual information.
The proposed scheme for design and optimization of linking matrix is further verified. We have optimized the code pair B J - new 1 0.04 in [17] when the probability of non-zero elements is 0.75. Figure 6 shows the BER performance of [17] and the optimized scheme. When the BER is 10 6 , there is an approximate 0.22 dB gain between the proposed optimization scheme and that presented in [17]. This comparison experiment results verify the effectiveness of the proposed scheme for optimizing B L 2 .

5. Conclusions

This paper discusses the impact of the linking matrix structure on the waterfall region of the JSCC system. Linking matrix with multi-edges can significantly improve the performance of a JSCC system, as compared to linking matrix with single-edge. However, effective principles are necessary for designing and optimizing linking matrix with multi-edges. An effective scheme for designing and optimizing linking matrix with multi-edges has been proposed based on the analysis of decoding thresholds. The proposed scheme achieves cost-effective design and optimization of the linking matrix and improves the performance of the JSCC system. Furthermore, JSCC exhibits brittleness, as it is optimized for particular combinations of source and channel coding and thus requires a redesign if either is changed.

Author Contributions

Conceptualization, Y.L., S.H. and L.W.; methodology, Y.L. and S.H.; software, Y.L.; validation, Y.L.; data curation, Y.L.; writing—original draft preparation, Y.L.; writing—review and editing, S.H. and L.W.; supervision, Y.L., S.H. and L.W.; funding acquisition, S.H. All authors have read and agreed to the published version of the manuscript.

Funding

This work is supported by the National Natural Science Foundation of China under Grant 61671395, Natural Science Foundation of Fujian Province under Grant 2020J01003 and Key Program of Marine Economy Development Special Foundation of Department of Natural Resources of Guangdong Province (GDNRC [2023]24).

Institutional Review Board Statement

Not applicable.

Data Availability Statement

The data that support the findings of this study are available from the corresponding author upon reasonable request.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Shannon, C.E. A mathematical theory of communication. Bell Syst. Tech. J. 1948, 27, 379–423. [Google Scholar] [CrossRef] [Green Version]
  2. Wu, G.; Lv, Y.; He, J. Design of high-rate LDPC codes based on matroid theory. IEEE Commun. Lett. 2019, 23, 2146–2149. [Google Scholar] [CrossRef]
  3. Thorpe, J. Low-density parity-check (LDPC) codes constructed from protographs. Ipn Prog. Rep. 2003, 42, 42–154. [Google Scholar]
  4. Cabarcas, F.; Souza, R.D.; Garcia-Frias, J. Turbo coding of strongly nonuniform memoryless sources with unequal energy allocation and PAM signaling. IEEE Trans. Signal Process. 2006, 54, 1942–1946. [Google Scholar] [CrossRef]
  5. Fresia, M.; Perez-Cruz, F.; Poor, H.V. Optimized concatenated LDPC codes for joint source-channel coding. In Proceedings of the IEEE International Symposium on Information Theory, Seoul, Republic of Korea, 28 June–3 July 2009; pp. 2131–2135. [Google Scholar]
  6. Fresia, M.; Perez-Cruz, F.; Poor, H.V.; Verdu, S. Joint source and channel coding. IEEE Signal Process. Mag. 2010, 27, 104–113. [Google Scholar] [CrossRef]
  7. Bourtsoulatze, E.; Kurka, D.B.; Gündüz, D. Deep Joint Source-Channel Coding for Wireless Image Transmission. IEEE Trans. Cogn. Commun. Netw. 2019, 5, 567–579. [Google Scholar] [CrossRef] [Green Version]
  8. Chen, Q.; Lau, F.C.; Wu, H.; Chen, C. Analysis and improvement of error-floor performance for JSCC scheme based on double protograph LDPC codes. IEEE Trans. Veh. Technol. 2020, 69, 14316–14329. [Google Scholar] [CrossRef]
  9. He, J.; Li, Y.; Wu, G.; Qian, S.; Xue, Q.; Matsumoto, T. Performance improvement of joint source-channel coding with unequal power allocation. IEEE Wirel. Commun. Lett. 2017, 6, 582–585. [Google Scholar] [CrossRef] [Green Version]
  10. Chen, C.; Wang, L.; Lau, F.C. Joint optimization of protograph LDPC code pair for joint source and channel coding. IEEE Trans. Commun. 2018, 66, 3255–3267. [Google Scholar] [CrossRef]
  11. Golmohammadi, A.; Mitchell, D.G. Concatenated Spatially Coupled LDPC Codes With Sliding Window Decoding for Joint Source-Channel Coding. IEEE Trans. Commun. 2022, 70, 851–864. [Google Scholar] [CrossRef]
  12. Liu, S.; Chen, C.; Wang, L.; Hong, S. Edge connection optimization for JSCC system based on DP-LDPC codes. IEEE Wireless Commun. Lett. 2019, 8, 996–999. [Google Scholar] [CrossRef]
  13. Liu, S.; Wang, L.; Chen, J.; Hong, S. Joint component design for the JSCC system based on DP-LDPC codes. IEEE Trans. Commun. 2020, 68, 5808–5818. [Google Scholar] [CrossRef]
  14. Neto, H.B.; Henkel, W. Multi-edge optimization of low-density parity-check codes for joint source-channel coding. In Proceedings of the SCC 2013: 9th International ITG Conference on Systems, Communications and Coding, Munich, Germany, 21–24 January 2013; pp. 1–6. [Google Scholar]
  15. Hong, S.; Chen, Q.; Wang, L. Performance analysis and optimisation for edge connection of JSCC system based on double protograph LDPC codes. IET Commun. 2018, 12, 214–219. [Google Scholar] [CrossRef]
  16. Chen, Q.; Hong, S.; Chen, Y. Design of linking matrix in JSCC scheme based on double protograph LDPC codes. IEEE Access 2019, 7, 92176–92183. [Google Scholar] [CrossRef]
  17. Hong, S.; Ke, J.; Wang, L. Global Design of Double Protograph LDPC Codes for Joint Source-Channel Coding. IEEE Commun. Lett. 2023, 27, 424–427. [Google Scholar] [CrossRef]
  18. Hu, X.Y.; Eleftheriou, E.; Arnold, D.M. Regular and irregular progressive edge-growth tanner graphs. IEEE Trans. Inf. Theory 2005, 51, 386–398. [Google Scholar] [CrossRef]
Figure 1. JSCC Tanner.
Figure 1. JSCC Tanner.
Entropy 25 01145 g001
Figure 2. Decoding thresholds for an element with different weights in B L 2 .
Figure 2. Decoding thresholds for an element with different weights in B L 2 .
Entropy 25 01145 g002
Figure 3. Comparison of BER values between the JSCC scheme and its separate scheme.
Figure 3. Comparison of BER values between the JSCC scheme and its separate scheme.
Entropy 25 01145 g003
Figure 4. BER performance comparison of unoptimized B J UNO , optimized B J ( 0.75 ) OPT , and optimized B J ( 0.875 ) OPT .
Figure 4. BER performance comparison of unoptimized B J UNO , optimized B J ( 0.75 ) OPT , and optimized B J ( 0.875 ) OPT .
Entropy 25 01145 g004
Figure 5. Comparison of BER values between the third row is all-zero elements and has non-zero elements.
Figure 5. Comparison of BER values between the third row is all-zero elements and has non-zero elements.
Entropy 25 01145 g005
Figure 6. Comparison of BER values between [17] and the proposed optimization scheme.
Figure 6. Comparison of BER values between [17] and the proposed optimization scheme.
Entropy 25 01145 g006
Figure 7. Decoding thresholds for different non-zero element probabilities in B L 2 .
Figure 7. Decoding thresholds for different non-zero element probabilities in B L 2 .
Entropy 25 01145 g007
Table 1. Decoding thresholds (dB) of different elements in B L 2 .
Table 1. Decoding thresholds (dB) of different elements in B L 2 .
DegreeThresholdDegreeThresholdDegreeThreshold
e L 2 1 , 1 = 5 0.598 e L 2 2 , 1 = 5 0.566 e L 2 3 , 1 = 5 0.479
e L 2 1 , 2 = 5 0.505 e L 2 2 , 2 = 5 0.443 e L 2 3 , 2 = 5 0.401
e L 2 1 , 3 = 5 0.613 e L 2 2 , 3 = 5 0.576 e L 2 3 , 3 = 5 0.483
e L 2 1 , 4 = 5 0.568 e L 2 2 , 4 = 5 0.513 e L 2 3 , 4 = 5 0.466
e L 2 1 , 5 = 5 0.593 e L 2 2 , 5 = 5 0.587 e L 2 3 , 5 = 5 0.482
e L 2 1 , 6 = 5 0.556 e L 2 2 , 6 = 5 0.518 e L 2 3 , 6 = 5 0.465
e L 2 1 , 7 = 5 0.453 e L 2 2 , 7 = 5 0.431 e L 2 3 , 7 = 5 0.338
e L 2 1 , 8 = 5 0.536 e L 2 2 , 8 = 5 0.515 e L 2 3 , 8 = 5 0.403
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Lv, Y.; Hong, S.; Wang, L. Design and Optimization of Linking Matrix for a JSCC System Based on DP-LDPC Codes. Entropy 2023, 25, 1145. https://doi.org/10.3390/e25081145

AMA Style

Lv Y, Hong S, Wang L. Design and Optimization of Linking Matrix for a JSCC System Based on DP-LDPC Codes. Entropy. 2023; 25(8):1145. https://doi.org/10.3390/e25081145

Chicago/Turabian Style

Lv, Yijie, Shaohua Hong, and Lin Wang. 2023. "Design and Optimization of Linking Matrix for a JSCC System Based on DP-LDPC Codes" Entropy 25, no. 8: 1145. https://doi.org/10.3390/e25081145

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop