U.S. patent application number 15/288739 was filed with the patent office on 2017-01-26 for signal processing method.
This patent application is currently assigned to ALi Europe Sarl. The applicant listed for this patent is ALi Europe Sarl. Invention is credited to Matteo Butussi, Stefano Rosati, Stefano Tomasin.
Application Number | 20170026222 15/288739 |
Document ID | / |
Family ID | 46750316 |
Filed Date | 2017-01-26 |
United States Patent
Application |
20170026222 |
Kind Code |
A1 |
Butussi; Matteo ; et
al. |
January 26, 2017 |
SIGNAL PROCESSING METHOD
Abstract
A signal method of processing in a receiver a signal that has
been encoded and interleaved in a transmitter comprising: receiving
a signal, process the signal to obtain a stream of soft metrics
representing bit probability of symbols in a predetermined
constellation; applying to said soft metric a compression operation
that preserves the total length of each group of soft metrics
relative to a same constellation symbol; rearranging the stream of
compressed soft metrics so as to inverse the interleaving done in
the transmitter.
Inventors: |
Butussi; Matteo;
(Grand-Saconnex, CH) ; Tomasin; Stefano; (Padova,
IT) ; Rosati; Stefano; (Ecublens, CH) |
|
Applicant: |
Name |
City |
State |
Country |
Type |
ALi Europe Sarl |
Plan-les-Ouates |
|
CH |
|
|
Assignee: |
ALi Europe Sarl
Plan-les-Ouates
CH
|
Family ID: |
46750316 |
Appl. No.: |
15/288739 |
Filed: |
October 7, 2016 |
Related U.S. Patent Documents
|
|
|
|
|
|
Application
Number |
Filing Date |
Patent Number |
|
|
14422149 |
Feb 17, 2015 |
9491023 |
|
|
PCT/EP2012/066286 |
Aug 21, 2012 |
|
|
|
15288739 |
|
|
|
|
Current U.S.
Class: |
1/1 |
Current CPC
Class: |
H03M 13/27 20130101;
H03M 7/30 20130101; H03M 13/45 20130101; H03M 13/6588 20130101;
H04L 1/0036 20130101; H04L 1/0045 20130101; H03M 13/2792 20130101;
H03M 13/6505 20130101; H04L 25/067 20130101; H04L 27/2649 20130101;
H03M 7/40 20130101; H03M 13/6577 20130101; H03M 13/6312 20130101;
H04L 1/0071 20130101 |
International
Class: |
H04L 27/26 20060101
H04L027/26; H04L 1/00 20060101 H04L001/00; H03M 13/27 20060101
H03M013/27; H03M 13/45 20060101 H03M013/45; H04L 25/06 20060101
H04L025/06; H03M 7/40 20060101 H03M007/40 |
Claims
1. A method of compressing a stream of fixed-point representations
of soft metrics in a receiver, comprising demultiplexing the soft
metrics so as to obtain a plurality sub-streams having distinct
statistics distributions. applying to each sub-stream an entropy
code adapted to its statistic distribution.
2. The method of claim 1, further comprising reconstruct a
transmitted message according to each of the sub-stream which is
applied with the entropy code adapted to its statistic
distribution.
3. The method of claim 1, comprising a step of quantizing the soft
metrics prior to the step of demultiplexing the soft metrics.
4. The method of claim 1, wherein said soft metrics are represented
as fixed-point numbers.
5. The method of claim 3, wherein the quantizing operation
generates a constant number of bits for each group of soft metrics
relative to a same constellation symbol.
6. The method of claim 3, wherein the quantizing operation
generates different number of bits for each soft metric relative to
a same constellation symbol.
Description
CROSS-REFERENCE TO RELATED APPLICATION
[0001] This application is a divisional application of and claims
the priority benefits of U.S. non-provisional application Ser. No.
14/422,149, filed on Feb. 17, 2015, now allowed. The prior U.S.
non-provisional application Ser. No. 14/422,149 is a 371
application of the International PCT application serial no.
PCT/EP2012/066286, filed on Aug. 21, 2012. The entirety of each of
the above-mentioned patent applications is hereby incorporated by
reference herein and made a part of this specification.
FIELD OF THE INVENTION
[0002] The present invention relates to methods for representing
and compressing soft metrics in communication systems based on
channel coding. In particular, but not exclusively, the present
invention relates to signal de-interleaving in a receiver, for
example an OFDM receiver.
DESCRIPTION OF RELATED ART AND DEFINITIONS
[0003] All modern digital communication systems use channel coding
to protect data and allow a better reception. Such is the case, to
name just a few examples, of the several Digital Audio and Video
Broadcast standards available (DAB and DVB), of wireless networks,
including WiFi and Bluetooth in their various implementations, and
of modern cellular phone communication systems.
[0004] It is customary, in these communication systems, to apply
several permutation operators to the data stream. Such
permutations, generally indicated as interleaving, are often
introduced at the transmitter side and have in general the effect
of improving the communication bandwidth and reducing the error
rate. According to the cases, interleaving can take place at bit or
symbol level, or both. Interleaving introduced in at the
transmitter side must in general be undone by a corresponding
inverse operation of deinterleaving in the receiver to allow the
reconstruction of the original signal.
[0005] Known implementation of interleaving and deinterleaving
require storing in a memory a sequence of data whose length is
equal to the period of the interleaving operator. Since newly
proposing communication standards advocate the use of interleaving
operator of increasing complexity and length, interleaving and
deinterleaving operation place a heavy burden on the memory
resources. There is therefore a need of a interleaving and/or
deinterleaving method that is less memory demanding than the
methods of the art.
BRIEF SUMMARY OF THE INVENTION
[0006] According to the invention, these aims are achieved by means
of the object of the appended claims.
BRIEF DESCRIPTION OF THE DRAWINGS
[0007] The invention will be better understood with the aid of the
description of an embodiment given by way of example and
illustrated by the figures, in which:
[0008] FIG. 1 shows in a schematic fashion a generic communication
system using channel coding techniques.
[0009] FIG. 2 shows in a schematic fashion a more detailed
description of the modulator 3 of FIG. 1.
[0010] FIGS. 3 and 4 represent schematically two possible
constellations used by communication system.
[0011] FIG. 5 shows in a schematic fashion one possible
implementation of demodulator 5 of FIG. 1.
[0012] FIGS. 6 and 7 illustrates schematically a diversity
transmission system in which a transmitter transmits a signal that
is received by two receivers and combined to improve the system
reception quality.
[0013] FIG. 8 represents schematically a variant of the
invention.
[0014] FIG. 9 shows in a schematic fashion a possible
representation of the compression unit 302 of FIG. 8.
[0015] FIG. 10 represents schematically a possible structure of
decompression unit 304 of FIG. 8.
[0016] FIGS. 11 and 12 are schematic examples of possible
integrations of the invention in the demodulation process, for
example in the demodulator 5 of FIG. 1.
[0017] FIGS. 13 and 14 shows in a schematic fashion the integration
of the invention in a diversity system akin to those represented in
FIGS. 6 and 7.
[0018] FIG. 15 is a flow chart depicting a method of processing in
a receiver a signal that has been encoded and interleaved in a
transmitter in one embodiment of the invention.
DETAILED DESCRIPTION OF POSSIBLE EMBODIMENTS OF THE INVENTION
[0019] This invention concerns methods and devices to represent,
compress, de-compress and de-represent data that must be processed
by a channel that allows data to be de-compressed, such as, for
example: (a) a channel that permutes the order of an incoming
signal, (b) a memory where the data are written and then read in
another given order, (c) a communication channel.
[0020] FIG. 1 shows a possible schematic representation of a
digital communication system that is composed by a data source 1
generating data belonging to a given finite set. The finite set is
usually a binary-valued set. In the following the data generated by
the data source will be denoted by d.
[0021] Functional block 2, or encoder, is adapted to map the d-data
generated by source 1 on words of a given error correcting code. In
the field of digital communication system many error correcting
codes can be used as: Low Density Parity Check Codes (LDPC),
convolutional codes, block codes, etc. The mapping of d in words of
error-correction code field is named encoding. In the following the
output of block 2 will be indicated by c. The encoded data c are
modulated by modulator 3. The transmitter 8 comprises the sequence
of the three blocks 1, 2 and 3. Its output, denoted as x, goes
through a transmission channel 4 that could be a radio propagation
process, a cable transmission, or also a generic operator. The
signal emerging from the other side of channel 4 is collected by
receiver 9, the received signal is denoted by r. The received
signal is processed by block 5 that performs the demodulation of
the received signal. The output of Block-5 is then processed by
block 6, which performs decoding. The output of Block-6 is an
estimate of the transmitted data d
[0022] The c-stream is transformed by modulator block 3 in another
format suitable for transmission. In the following the process
performed by Block-3 will be also named modulation. Many techniques
can be used for addressing this goal. Nevertheless most of them can
be represented as reported in FIG. 2 that illustrates schematically
one of the possible implementations of the modulation process.
[0023] FIG. 2 shows in a schematic fashion a possible structure of
the modulator 3 in the transmitter of FIG. 1. Block-3 can be
modelled as the cascade of four sub-blocks. The fist sub-block 31
performs the interleaving process. Block-31 performs a permutation
of the input signal. The output of Block-31, denoted by a, is
processed by mapping block 32. Block-32 maps signal a on the point
of a defined constellation that depends on the transmission system
in use. The output of Block-32, denoted by z, is processed by the
interleaver 33. Block-33 performs a permutation over z and
generates signal w that is transformed by Block-34 into a physical
signal carrying that constitutes the output x of the transmitter 8
and will be also named transmitted signal. Block 34 could be for
example an OFDM modulator, and possibly include a suitable RF
interface.
[0024] The interleaver block 31 takes a set of the values carried
by the c-stream and performs a permutation on it. Denoting the
output of Block-30 by a the interleaving rule can be written as
follows:
a.sub.j=c.sub.i, j=.pi.(i), (1)
where c.sub.i is the i-th value carried by the c-stream, a.sub.j is
the j-th value carried by the a stream and .pi. is a function
specific to the chosen modulation standard that defines the
permutation performed by Block-30 and it. Since at this stage both
signals, c and a, carry binary values (bits), the process performed
by Block-31 is also named bit-interleaving.
[0025] The schema represented in FIG. 2 is not the only available
way to perform the modulation process and different solutions are
possible. For this reason, the blocks 31, 32, 33 and 34 can be
optional and their sequence can be rearranged in different way.
[0026] The mapper block 32 maps the bit carried by the a stream to
a finite set of complex numbers also named constellation. Block-32
takes subsets of values carried by a and associates to them a value
of a given constellation. Let z be the output of block 32 and
z.sub.k its k-th element. z.sub.k is an element of a specific
constellation set that can differ from standard to standard and
from transmission to transmission. Indicating with m the rule used
in block 32, the relation between a and z can be written as
follows:
z.sub.k=m(a.sub.i, a.sub.i+1, ia.sub.i+M-1) where a.sub.i,
a.sub.i+1, a.sub.i.+-.M-1 .di-elect cons. B and z.sub.k .di-elect
cons. C. (2)
a.sub.i, a.sub.{i+1}, a.sub.{i+M-1} is the sub-set of values
carried by the a-stream and z.sub.k is the value in which they are
mapped. In most digital communication systems, z.sub.k is a complex
number. Possible values of z.sub.k depend on the considered digital
communication system.
[0027] FIGS. 3 and 4 show two constellations used in the DVB-C2
Standard. The constellation reported in FIG. 3 is well known as
QPSK. In QPSK, the parameter M, defined in Eq. (2), is equal to 2
and the m-function, introduced in FIG. 3 is defined by the
correspondence table:
TABLE-US-00001 (a.sub.i, a.sub.i+1) z (0, 0) 1 + j (0, 1) 1 - j (1,
0) -1 + j (1, 1) -1 - j
where j is the imaginary unit. The map of FIG. 4 maps 4-uples of
bits in complex numbers. (1 0 0 0), for example is mapped in -3+j3,
(0 1 1 1) i is mapped in 1-j, and so on. It is worth noting that
these constellations are being superseded, in more recent
transmission standards, by larger ones.
[0028] The z stream is then processed by the interleaving block 33,
which performs, similarly to Block-31, a permutation on values
carried by the z stream. The process performed by Block-33 can be
written in mathematical form as follows:
w.sub.j=z.sub.i, j=r(i), (3)
where z.sub.i is the i-th element of the input, w.sub.j is the i-th
element of the output and .tau. is a given permutation specific to
the considered system.
[0029] The transmitted signal is modified by the environment or
channel 4 visible in FIG. 1 before reaching the receiver. In
general, the channel introduces distortions of the transmitted
signal and noise. It is usually described as a time-varying filter
applied to the transmitted signal and the output of the filtering
process is then added to an external signal describing noise and
interference from other sources.
[0030] In the receiver 9 the received signal r emerging from the
channel 4 is presented to demodulator block 5. FIG. 5 shows one
possible implementation of the demodulation process implementer by
block 5. The received signal, r, is processed by three blocks:
Block-53, Block-52 and Block-51. Optional block-51 can transform or
refine the received signal, change its representation and/or
domain, and/or apply other operators, not described here. In OFDM
systems the received signal is transformed time-domain to frequency
domain. The output of Block-51 will be denoted by r. Preferably the
receiver performs also in block 52 a channel estimation. The output
of the channel estimation is an estimate of the filter frequency or
time response that characterizes the channel and will be denoted by
h.
[0031] Preferably the receiver performs also noise estimation in
block-53. The output of Block-53 estimates the power of the noise
that affects the receiver signal and will be denoted by
.sigma..sup.2.
[0032] The meaning of the three signals r, h and .sigma..sup.2 can
be summarized by the following equation:
r.apprxeq.hw+n E[n.sup.2]=.sigma..sup.2, (4)
where n is a Gaussian variable having power equal to .sigma..sup.2,
(E[n.sup.2]=.sigma..sup.2).
[0033] The three signals r, h and .sigma..sub.2 are processed by
Block-54 that introduces a given permutation on each of input
signals. Block-54 generates three different outputs: r.sub..tau.,
the permuted version of the r signal; h.sub..tau., the permuted
version of the h signal; and .sigma..sub..tau..sup.2, the permuted
version of the .sigma..sup.2 signal. The outputs of Block-54 are
used in demapper block 55 to generate estimates of the
probabilities of the transmitted signal a. The output of Block-54
will be denoted by P. Signal P is processed by interleaver
Block-56, which performs a permutation of the values carried by a
and generates signal P.
[0034] In practical implementations r, h and .sigma..sub.2 are
signal represented by a finite number of bits. Let B.sub.r, B.sub.h
and B.sub..sigma..sub.2 the number of bits used to represent
respectively signal r, h and .sigma..sup.2. This means that the
connection between Block-51 and Block-54 carries B.sub.r-bits, the
connection between Block-52 and Block-54 carriers B.sub.h-bits and
the connection between Block-53 and Block-54 carries
B.sub..sigma..sub.2-bits. The three-ple (r, h, .sigma..sup.2) is
processed by Block-54 as reported in the following equation:
r.sub..tau.(i)=r(j); h.sub.r(i)=h(j);
.sigma..sub..tau..sup.2(i)=.sigma..sup.2(j); i=.tau..sup.-1(j).
(5)
where r.sub..tau., h.sub..tau. and .sigma..sub..tau..sup.2 are the
three signals generated by Block-54, .tau..sup.-1 is the inverse of
the .tau. permutation used at the transmitter side by Block-33.
[0035] The three-ple (r.sub..tau., h.sub..tau. and
.sigma..sub..tau..sup.2) is processed by the demapper 55 whose goal
is the computation that a given transmitted bit in a received
symbol be `0` or `1`. More formally, the demapper 55 provides the
probability of .sigma..sub.i= for every i and for every .di-elect
cons. B:
P(a.sub.i= |r.sub..tau.(k), h.sub..tau.(k),
.sigma..sub..tau..sup.2(k)) .A-inverted. .di-elect cons.B
.A-inverted.i. (6)
In the following for the sake of simplicity the above reported
probability we will be also denoted by P.sub.i( ).
[0036] In the usual case of binary transmitted values ={0,1},
block-55 must compute two probability values for each a.sub.i
transmitted value: P.sub.i(0) and P.sub.i(1). Probabilities
P.sub.i(0) and P.sub.i(1) are commonly indicated as `soft metrics`
and in case of binary values they can be represented by a unique
value named Log Likelihood Ratio:
LLR i = ln P i ( 0 ) P i ( 1 ) ( 7 ) ##EQU00001##
Before starting the decoding in block-6, the receiver 9 must
re-organize the sequence {P.sub.i( )}.sub.i. Block-56 re-arranges
the sequence in the following way:
P.sub.j( )=P.sub.i( ) j=.pi..sup.-1(i), (8)
where .pi..sup.-1(i) is the inverse of the .pi.-permutation used at
the transmitter side by Block-31.
[0037] To perform the permutations .pi..sup.-1(i) and
.tau..sup.-1(i), Blocks 54 and 56 need memory. In all the systems
the permutations .pi. and .tau. are applied on a finite
sequence:
.pi.(i) and .pi..sup.-1(i) are defined for i=1, . . . , N.sub..pi.
(9)
.tau.(i) and .tau..sup.-1(i) are defined for i=1, . . . ,
N.sub..tau. (10)
[0038] The memory used by Block-54 and Block-56 depends on
N.sub..pi. and N.sub..tau.. Assuming to efficiently implement the
de-interleavers performed by Block-54 and Block-56, the memory used
by Block-54 and by Block-56 is respectively composed by N.sub..pi.
and N.sub..tau. words.
[0039] For Block-54 one word is represented by three-ple (r, h,
.sigma..sup.2). Hence the memory used by Block-54 depends on the
number of bits used to represent the three signals r, h and
.sigma..sup.2. Let B.sub.r, B.sub.h and B.sub..sigma. be the number
of bits used to represent the three signals, it follows that the
memory used by Block-54 is equal to:
M.sub.54=(B.sub.r+B.sub.h+B.sub..sigma.).times.N.sub..pi. bits.
(11)
[0040] For Block-56 one word is represented by the a K-dimensional
vector or K-uple [(P.sub.i( .sub.i), P.sub.i( .sub.2), . . .
P.sub.i( .sub.k)], where K is the cardinality of and .sub.1,
.sub.2, . . . .sub.k are all the possible elements of . Using
B.sub.P bits for the representation of the generic P.sub.i( )
value, it follows that the memory used by Block-56 is equal to:
M.sub.56=B.sub.P.times.K.times.N.sub..tau. bits. (12)
[0041] In the case of a binary -alphabet and using the LLR
representation it follows that the deinterleaving operation
performed by Block-56 is based on words of one single value.
Assuming B.sub.LLR bits for the representation of the LLR, it
follows that the memory used by Block-56 is equal to:
M.sub.56=B.sub.LLR.times.N.sub..tau. bits. (13)
[0042] Another field in which the invention is intended to be used
is illustrated in schematic form in FIG. 6 and in FIG. 7. FIGS. 6
and 7 show in a schematic fashion a family of process known as
Diversity Combining.
[0043] FIG. 6 illustrates schematically a diversity transmission
system in which a transmitter 104, transmits a given signal 105
that goes through the channel 103, is received by two receivers 100
and 101 that transmit information useful for the reception to the
combiner 102. Block-100 and Block-101 can be arranged to transmit
and/or receive one or more of the signal present in the demodulator
5 of FIG. 5, for example the de-interleaved sequence P generated by
de-interleaver 56, the received signal r, the processed signal r,
the signal r.sub..tau. provided by de-interleaver 54 or the
demapped stream P. The combiner 102, receives these signals and
estimates the transmitted data d. FIG. 7 shows an alternative
architecture in which one receiver 200, transmits information
useful for the reception to an unit 201 that unites the roles of
receiver and combiner. The information transmitted by Block-200 is
the same kind of information transmitted by Block-100 and Block-101
to Block-102. Block-201 uses this information to estimate the
transmitted data d.
[0044] Block-54 and Block-56 of FIG. 5 are two different examples
of applications of the invention. Another examples of channels to
which the invention is applicable are, in FIGS. 6 and 7, the
transmission of information from Block-100 and from Block-101 to
Block-102, respectively from Block-200 to Block-201.
[0045] FIG. 7 shows another diversity transmission system in which
a transmitter, 204 transmits a given signal 206 through the channel
203. The information, differently altered by the channel 203, is
received by blocks 200 and 201. Block-200 transmits to Block-201
information about Signal-205. Block-201, analyzing Signal-202 and
the information received by Block-200, performs an estimation of
the transmitted information.
[0046] FIG. 8 shows in a schematic fashion a possible variant of
the invention that encompasses four different phases.
[0047] In the inventive signal processing method an input signal
305 is fed to a representation conversion block-301 that changes
representation of the values carried by signal 305 in another
format. The format change can be a permutation, an interleaving, a
mapping, or a general conversion operation, represented by a
suitable operator, and may also in cases cause information
loss.
[0048] The first phase, see Block-301, is the change of the
representation used of the incoming signal. Signal-305 is
represented using a given number of bits. In most of the systems
each element of Signal-305 is represented using a constant number
of bits. Indicating with S.sub.n.sup.(305) the generic n-th element
of Signal-305 and by B.sub.n.sup.(305) the number of bits used to
represent it, it follows that:
B.sub.i.sup.(305)=B.sub.j.sup.(305)=B.sup.(305) .A-inverted.i,j.
(14)
[0049] Block-301 changes the representation used for Signal-305 and
generates Signal-306. Possibly, the number of bits used for the
representation of Signal-306 is not constant through the stream.
Denoting by S.sub.n.sup.(306) the generic n-th element of
Signal-306 and by B.sub.n.sup.(306) the number of bits used to
represent it, it can happen that:
B.sub.n.sup.(306).noteq.B.sub.m.sup.(306). (15)
[0050] Relaxing the constraint on the constant number of bits used
for the signal entering Block-301 allows to optimize the total
number of bits used of the representation of Signal-305. The
optimization of the used bits depends on the nature of Signal-305.
Section "LLR Quantization" reports a possible bit-width
optimization in case of Signal-305 carrying LLR values.
[0051] The representation conversion is followed by a compression
step carried out by Block-302 that generates Signal-307.
[0052] Signal-306 is then compressed by Block-302. The compression
is designed taking into account the statistic of the elements of
Signal-306. It can be applied on each value S.sub.n.sup.(306) or on
words composed by M elements of Signal-306. Let w.sub.i.sup.(306)
be the generic word composed by M elements of Signal-306, which can
be expressed in the mathematical form as follows:
w i ( 306 ) = [ S j 1 ( i ) ( 306 ) , S j 2 ( i ) ( 306 ) , , S j M
( i ) ( 306 ) ] , ( 16 ) ##EQU00002##
where w.sub.i.sup.(306) is a vector composed M by elements and
j.sub.1(i), j.sub.2(i), . . . j.sub.M(i) are the indices of the
S.sup.(306)-values that compose the word w.sub.i.sup.(306). A
simple solution to generate the word w.sub.i.sup.(306) could be to
take M consecutive elements of Signal-306. In that case the word
can be written as follows:
w i ( 306 ) = [ S iM ( 306 ) , S iM + 1 ( 306 ) , , S iM + M - 1 (
306 ) ] . ( 17 ) ##EQU00003##
Moreover the compression code applied on the n-th value,
S.sub.n.sup.(306), is in general different from the compression
code applied on the m-th values S.sub.m.sup.(306).
[0053] FIG. 9 reports in a schematic fashion a possible
implementation of Block-302. Block-302 can perform C different
compressions. This means that Block-32 is able to apply C different
compression codes. Each compression code can be pre-computed or
dynamically adapted to the incoming signal. Each compression code
is designed for a signal having a given statistical
description.
[0054] Selector block-3021 is the first stage of the compressor
Block-302. It assigns the values carried by Signal-306 to the C
different compression codes available, each represented by one of
the blocks 3022 to 3024. The outputs v.sup.(1), v.sup.(2), . . .
v.sup.(C) of the compression codes are merged in a single signal by
de-selector block-3025. The generated signal, Signal-307, is the
output of Block-302.
[0055] In case of pre-computed compression codes, the assignment
performed by Block-3021 is done in such a way that the signal, at
the input of the n-th compression code, fits as much as possible
the statistical description for which the n-th compression code has
been designed. In case of adaptive compression codes the assignment
is done in such a way that the signal at the input of each
compression code will be as much as possible non-uniformly
distributed. The goal of Block-3021 is to guarantee a signal, at
the input of each compression, having a statistical description
suitable for an efficient compression code design.
[0056] In the following, the input of i-th compression code will be
denoted by v.sup.i, and its n-th element by v.sup.i(n). Signal
v.sup.i can be composed by a sequence of elements of
S.sup.(306)-values or by a sequence of elements of w.sup.(306). The
output of the compression codes is then rearranged by Block-3025 in
the inverse order used by Block-3021 to assigned the values of
Signal-306 to the different compression codes.
[0057] Different kinds of compression codes can be used for the
compression, including (but not only) entropy coding algorithms and
dictionary-based algorithms. If the distribution of the symbol
values is known beforehand, arithmetic coding (or Huffman coding)
is very well suited.
[0058] Some compression codes, in particular entropy coding
generate code words of variable length, and it is difficult to
guarantee that code words generated in correspondence to unusual
combinations of input do not exceed a given maximum length.
Preferably the present invention proposes a process to limit the
length of the word generated by the compression code.
[0059] Let V.sub.i be the alphabet of the words at the input of the
i-th compression code. Let .sub.i the rule used the i-th code to
generate the output words:
v.sup.(i)(n)=C.sub.i(v.sup.(i)(n)) v.sup.(i)(n) .di-elect cons.
V.sub.i. (18)
where v.sup.(i)(n) is the n-th word at the input of the i-th
compression code.
[0060] Let V.sub.i be the set of the words generated using the
above reported rule:
V.sub.i={v.sup.(i)(n)|v.sup.(i)(n)=C.sub.i(v.sup.(i)(n))
.A-inverted. v.sup.(i)(n) .di-elect cons. V.sub.i} (19)
[0061] The i-th compression code is designed to compress as much as
possible the input v.sup.(i). Nevertheless it could happen that
some words of the set V.sub.i exceed the maximum length
L.sub.i:
V.sub.i.sup.(L)={v|v .di-elect cons. V.sub.i and
length[C.sub.i(v)].ltoreq.L.sub.i}. (21)
[0062] Let V.sub.i.sup.(L) be the subset of V.sub.i that does not
generate words exceeding the maximum length:
V.sub.i.sup.(L)={v|v .di-elect cons. V.sub.i and
length[C.sub.i(v)].ltoreq.L.sub.i}. (21)
[0063] The i-th code analyzes the output generated by v.sup.(i)(n)
using the rule .sub.i; if the output exceeds the maximum length the
code modifies the input, from v.sup.(i)(n) to {circumflex over
(v)}.sup.(i)(n), in such a way that the output, generated by
{circumflex over (v)}.sup.(i)(n), has the wanted length. That means
that {circumflex over (v)}.sup.i(n) must be in V.sub.i.sup.(L).
[0064] The generation of {circumflex over (v)}.sup.(i)(n) must take
into account system performance and length constraints. The use of
{circumflex over (v)}.sup.(i)(n) in place v.sup.(i)(n) must
generate the performance loss as small as possible. The technique
used to map a given v.sup.(i)(n) into {circumflex over
(v)}.sup.(i)(n) depends on the system on which the present
invention is applied. The impact of using {circumflex over
(v)}.sup.(i)(n) in place v.sup.(i)(n) can be represented as a cost
function that must be minimized. It follows that {circumflex over
(v)} is selected using the following rule:
v ^ ( i ) ( n ) = arg min x .di-elect cons. V i ( L ) f ( x , v ( i
) ( n ) ) , ( 22 ) ##EQU00004##
where f is a generic cost function and {circumflex over
(v)}.sup.(i)(n) is the element of V.sub.i.sup.(L) that minimizes
the cost function given v.sup.(i)(n).
[0065] A simple example of cost function is the distance
function.
[0066] Another constraint can be imposed on the total lengths of
the words generated by the C compression codes. At a given instant
n the sum of the length of the words generated by the C compression
codes cannot exceed a given value. This constraint can be written
in a mathematical form as follows:
i = 1 C length [ v _ ( i ) ( n ) ] .ltoreq. L . ( 23 )
##EQU00005##
[0067] It could happen that a given instant n the above reported
constraint is not verified. In that case the invention changes the
values v.sup.(1)(n), . . . , v.sup.(C)(n), that have generated the
too long sequence v.sup.(1)(n), . . . , v.sup.(C)(n) in such a way
that the new generated sequence will have the right length. The
change of the sequence v.sup.(1)(n), . . . , v.sup.(C)(n) must take
into account the system performance and the length constraint.
[0068] A compression method subject to the constraint expressed by
equation (23) is particularly useful in de-interleaving a stream of
soft metrics in a receiver, for example. In this case, as it will
be seen further on, the constraint 23 can be enforced to ensure
that the total length of each group of compressed soft metrics
relative to a same constellation symbol be preserved. Thanks to
this feature, the compressed soft metrics can be de-interleaved as
easily as the uncompressed ones, albeit with reduced memory
usage.
[0069] The goal of both Block-301 and Block-302 is to reduce the
number of bits used to represent the values carried by Signal-305.
A set of M values carried by Signal-305 is represented using:
[B.sup.(305).times.M] bits. (24)
[0070] The number of bits used by Signal-307 to carry the same
information can be difficulty written in close form.
[0071] Nevertheless, considering the worst case, in which all the
words generated by the i-th code have maximum length, it follows
that the number of bit used by Signal-307 to carry the same
information is upper bounded by the following equation:
[ i = 1 C B ( L i ) M i ] bits , ( 25 ) ##EQU00006##
where M.sub.i is the number of words generated by the i-th
compression code for the process associated to the M values carried
by Signal-305 and B.sup.(L.sup.i.sup.) are the number of bits used
to represent to longest code word generated by i-th compression. A
good constraint to guarantee that the invention generates less bits
than the bits used in Signal-305 is to impose that:
i = 1 C B ( L i ) M i .ltoreq. B ( 305 ) M . ( 26 )
##EQU00007##
[0072] The compressed signal-307 goes then through a channel 303
that might be a physical propagation channel, but also a generic
operation on the signal, for example a non-distortion process, from
which it emerges as signal 308, and is further processed by
Block-304. Block-304 performs inverts the compression step
previously applied by Block-302 in order to generate Signal-309 in
the same format as Signal-306.
[0073] Signal-308 is decompressed by Block-304, Block-304 performs
the inverse of process previously performed by Block-302. FIG. 10
reports in a schematic fashion a possible implementation of
Block-308. Analogously to the compressor of FIG. 9, there are C
de-compression codes: Block-3042, Block-3043, . . . Block-3044. The
assignment rules applied by Block-3041 are the inverse of the rules
used by Block-3025. The outputs of the de-compression codes are
merged in a single signal by Block-3045. The assignment rules
applied by Block-3045 are the inverse of the rules used by
Block-3021.
[0074] Signal-308 is split in C different signals: .sub.1, .sub.2,
. . . , .sub.C. The rules used by Block-308 permit to re-build at
input of the i-th de-compression code (Block-3042, Block-3043, . .
. Block-3044) the code words previously coded by the i-th
compression code.
[0075] The generic signal .sup.(i) processed by the i-th
de-compression code. The i-th de-compression code performs the
inverse of the mapping performed by the i-th compression code.
Denoting by .sup.(i)(n) and by e.sup.(i)(n) the input and the
output of the i-th de-compression, the process performed by
Block-3042, Block-3043, . . . Block-3044, can be written in
mathematical form as follows:
e.sup.(i)(n)=C.sub.i.sup.-1( .sup.(i)(n)), (27)
where .sub.i.sup.-1 is the inverse of the .sub.i-function reported
in Eq. 18.
[0076] The e.sup.i signals are reordered by Block-3045 which
performs the inverse of the process previously executed by
Block-3021. The output of Block-3045 is the Signal-309.
[0077] The last step is to represent Signal-309 in a format
coherent with the representation used for Signal-305. This task is
performed by Block-305 which performs the inverse of the process
previously performed by Block-301.
LLR Quantization
[0078] This section focuses on Block-301 in case of a Signal-305
carrying LLR values. In such case Signal-305 is a sequence of LLR
values. The n-th value of Signal-305 is a LLR value associated to a
transmitted/received bit.
[0079] All the LLR are represented using the same number of bits.
Block-301 changes the representation of the n-th LLR values.
[0080] The change of the representation is based on the position in
the constellation of the bit carried by the LLR value.
[0081] Signal-305 can be divided into groups of M elements,
S.sub.jk.sup.(305), with k=1, 2, . . . , M, where M is the number
of bits associated at each received constellation point. The
set:
{S.sub.j.sub.1.sup.(305), S.sub.j.sub.2.sup.(305) . . . ,
S.sub.j.sub.M.sup.(305)} (28)
is the set of the LLRs of the bits associated at the same
received/transmitted constellation point.
[0082] Block-301 quantizes Signal-305 by a quantizer, where to each
input value S.sub.jk.sup.(305), one of the G.sub.k=2.sup.l.sup.k
quantized values--where l.sub.k=B.sub.j.sub.k.sup.(306) is the
number of bits used to describe each level--is associated. Various
techniques can be adopted for this quantization procedure. The
process performed by Block-301 can be based on uniform or
non-uniform quantization techniques.
[0083] In a possible embodiment, each quantized value is associated
to a quantization interval [v.sub.k,v-,v.sub.k,v], where
v.sub.k,0=-.infin. and
[0084] v.sub.k,G.sub.k=.infin. and the intervals are a partition of
the real numbers. In the case of a uniform quantizer,
v{k,v}=.DELTA..sub.kv for v=1, . . . , G.sub.k-1 where .DELTA. is a
positive real number representing the quantization step.
[0085] Then, the value associated to S.sub.j.sub.k.sup.(305) is the
index of the interval in which S.sub.j.sub.k.sup.(305) falls. The
quantized LLR is therefore
S.sub.j.sub.k.sup.(306)={v*:S.sub.j.sub.k.sup.(305) .di-elect cons.
[v.sub.k,v*-1,v.sub.k,v*]}=Q(S.sub.j.sub.k.sup.(305)), (29)
where Q is the quantization function, denoting the process
performed by Block-301.
[0086] Various approaches can be followed for the choice of the
quantization interval edges v.sub.k,v. One possible implementation
provides that they are chosen according to the statistics of
Signal-305 in order to maximize the generalized mutual information
between the transmitted bits and Signal-306, which provides the
maximum achievable for given quantization choice. Considering a
decoder having as input the quantized LLR, and assuming
equiprobable inputs, the generalized mutual information can be
written as
S j k ( 306 ) = { v * : S j k ( 305 ) .di-elect cons. [ v k , v * -
1 , v k , v * ] } = Q ( S j k ( 305 ) ) , ( 30 ) with GMI n ( B n (
306 ) ) = 1 - v = 1 G k - 1 1 2 p ( S j k ( 306 ) = v , b j , k = 0
) log ( 1 + - .lamda. ( v ) s ) + + 1 2 p ( S j k ( 306 ) = v , b j
, k = 1 ) log ( 1 + .lamda. ( v ) s ) , ( 31 ) ##EQU00008##
where P(S.sub.j.sub.k.sup.(306)=v,b.sub.j,k=b) is the joint
probability that S.sub.j.sub.k.sup.(306)=v and b.sub.j,k=b, and
.lamda.(v) is the quantized value associated with v. The maximum
GMI is achieved when
.lamda. ( v ) = c p ( S j k ( 306 ) = v , b j , k = 0 ) p ( S j k (
306 ) = v , b j , k = 1 ) , ( 32 ) ##EQU00009##
for any c>0, and in this case the generalized mutual information
coincides with the mutual information and the corresponding
transmitted bit, i.e.
GMI n ( B n ( 306 ) ) = MI n ( B n ( 306 ) ) = b = 0 1 v = 1 G k -
1 p ( S j k ( 306 ) = v , b j , k = b ) log 2 p ( S j k ( 306 ) = v
, b j , k = b ) p ( S j k ( 306 ) = v ) , ( 33 ) ##EQU00010##
where P(S.sub.j.sub.k.sup.(306)=v) is the probability that S_(j_k)
((306))=v.
[0087] In a possible embodiment, the quantization process could be
designed in such a way that it maximizes the sum of the mutual
information of the LLR associated to the same transmitted/receiver
constellation point, under a constraint on the total bits used for
the set reported in Eq. (28):
max Q { k = 1 M MI j k ( B j k ( 306 ) ) } and k = 1 M B j k ( 306
) .ltoreq. B tot . ( 34 ) ##EQU00011##
[0088] Assuming an uniform quantization, the solution of the above
reported problem needs the computation of M quantization steps,
.DELTA..sub.1, . . . , .DELTA..sub.M, and M bit-width, l.sub.1, . .
. , l.sub.M. Different techniques can be used to solve Eq. (34).
The quantizing operation generates a constant number of bits for
each group of soft metrics relative to a same constellation symbol
or different number of bits for each soft metric relative to a same
constellation symbol.
[0089] Assuming to use a 16-QAM constellation, each constellation
point carries 4 bits (M-4). Let's assume that B.sub.tot, the number
reported in Eq. (34) is equal to 16, (B.sub.tot=16). In case of
constant bit-width it follows that:
B.sub.j1=B.sub.j2=B.sub.j3=B.sub.j4=4. Note that
B.sub.j1+B.sub.j2+B.sub.j3+B.sub.j4=16. Otherwise, it could happen,
that maximising the mutual information, see Eq (34), the bit-width
is not constant, example: B.sub.j1=5, B.sub.j2=5, B.sub.j3=3 and
B.sub.j4=3. Note, that also in this second case the constraint is
satisfied, B.sub.j1+B.sub.j2+B.sub.j3+B.sub.j4=16.
Compression
[0090] As an embodiment of compression, Block-302 provides the use
of Huffman coding on each element S.sub.j.sub.k.sup.(306). In this
case the size of the word associated with v is
m k , v = log 1 p k ( v ) , ( 35 ) ##EQU00012##
where P(v.sub.k) is the probability that
S.sub.j.sub.k.sup.(306)=v.
If
[0091] length[v].ltoreq.L.sub.i (36)
then {circumflex over (v)}.sub.i=v and in this case we have
lossless compression and the only penalty for the system
performance is the quantization process. Otherwise, when length
[v]>L.sub.i, we replace some quantized LLR value. In this case,
the compression introduces a further distortion in the
representation of the LLR, beyond that of the quantizer.
[0092] The choice of the LLRs to be substituted and their
replacement will have an impact on the system performance. Note
that while quantization and entropy coding are performed for each
bit separately, the compression is done on the ensemble of the LLRs
of all the bits. This problem can be seen as a multidimensional
multiple choice knapsack problem. Unfortunately, this problem is NP
hard problem, thus a possible embodiment of provides the use of a
greedy approach for the compression.
[0093] We consider the following iterative procedure:
[0094] 1. Let v ((1)) (n) be the quantized indices values obtained
by Block-301.
[0095] 2. Initialize {circumflex over (v)}.sup.(i)(n)=v.sup.(i)(n),
i=1, . . . , M.
[0096] 3. If (36) is satisfied, terminate the process.
[0097] 4. Otherwise, find
v ^ ( i ) ( n ) = arg min i , x .di-elect cons. V i ( L ) \ v ^ ( i
) ( n ) f ( x , v ^ ( i ) ( n ) ) , ( 37 ) ##EQU00013##
[0098] A possible expression of the cost function f is the MI loss,
i.e.
f ( x , v ^ ( i ) ( n ) ) = b = 0 1 v = 1 G k - 1 p ( S j k ( 306 )
= v ^ ( i ) ( n ) , b j , k = b ) log 2 p ( S j k ( 306 ) = v ^ ( i
) ( n ) , b j , k = b ) p ( S j k ( 306 ) = v ^ ( i ) ( n ) ) - b =
0 1 v = 1 G k - 1 [ p ( S j k ( 306 ) = v ^ ( i ) ( n ) , b j , k =
b ) + p ( S j k ( 306 ) = x , b j , k = b ) ] log 2 [ p ( S j k (
306 ) = x , b j , k = b ) + p ( S j k ( 306 ) = v ^ ( i ) ( n ) , b
j , k = b ) ] [ p ( S j k ( 306 ) = x ) + p ( S j k ( 306 ) = v ^ (
i ) ( n ) ] ( 38 ) ##EQU00014##
In this case, among all quantized value that have a given length,
the one providing the highest MI is selected.
EXAMPLE I
[0099] The invention can be applied to the demodulation process.
FIG. 11 shows in schematic fashion a variant of the demodulation
process of FIG. 5. Demapper 55 generates a stream P of soft metrics
representing, for example the probability that a bit in the
transmitted signal stream be `0` or `1`.
[0100] Optional block 301 represents a quantizer unit, or any other
suitable process block that transforms the representation of the
soft metrics generated by the demapper, and then compressed by
compressor unit 02. The output of Block-32 is then processed by
Block-56. Since the number of bits used to represent Signal-307 are
less than the number of bit used for the P signal, the
de-interleaver 56 of this variant of the invention uses less
memory. The output of the de-interleaver 56 is then decompressed by
Block-304 and optionally further processed by Block-305, for
example to change or adapt its representation, according to the
needs.
[0101] FIG. 12 represents a further variant in which the quantizer
301 directly integrated in the demapper, Block-550.
EXAMPLE II
[0102] The invention can be applied to a diversity receiver akin to
that represented in FIG. 6. FIG. 13 shows in a schematic fashion a
this variant of the invention. The two receivers, Block-1000 and
Block-1011, apply the representation conversion and the
decompression to the signals before transmission. In this way, the
receivers decrease the total amount of information to transmit to
Block-1020. Signal-1090 and Signal-1080 are first applied to
Block-304 and Block-305. The generated signal is denoted
Signal-1022. Signal-1080 is processed by a second block chain, as
Signal-1090. The generated signal is denoted Signal-1021.
Signal-1022 and Signal-1021 are equivalent to Signal-109 and
Signal-108 of FIG. 6). The combiner must re-convert Signal-1022 and
Signal-1021 in a format suitable for Block-102. This is why both
received signals are first processed by Block-304 and then by
Block-305.
[0103] The invention can also be applied to the system reported in
FIG. 7. FIG. 14 shows in a schematic fashion a new version of that
system. The receiver, Block-2000, changes the representation and
compress the information before transmission. The representation
conversion is performed by Block-301 and the compression by
Block-302. The transmitted signal is received by Block-2010, that
must re-convert the signal into a format equivalent to that of
Signal-207. This is why Block-2010 must apply on the received
signal the process performed by Block-304 and by Block-305.
[0104] FIG. 15 is a flow chart depicting a method of processing in
a receiver a signal that has been encoded and interleaved in a
transmitter in one embodiment of the invention. Referring to FIG.
15, in step S1510, the signal is received. In step S1520, the
signal is processed to obtain a stream of soft metrics representing
bit probability of symbols in a predetermined constellation,
wherein the stream of the soft metrics are divided into a plurality
of groups of the soft metrics. In step S1530, a compression
operation is applied to the groups of the soft metrics to preserve
a total length of the groups of soft metrics, wherein the groups of
the soft metrics are related to a same constellation symbol and the
compression operation generates a plurality of compressed codes. In
step S1540, the compressed codes is substituted with other codes of
shorter length representing a different symbol in the predetermined
constellation when the total length of the groups of the soft
metrics exceeds a determined value. In step S1550, the stream of
compressed soft metrics is rearranged so as to inverse the
interleaving done in the transmitter.
* * * * *