Polar codes are channels for transmitting binary information through noisy channels. The noisy channels are characterized by statistical models like the Discrete Memoryless Systems (DMS) and Additive White Gaussian Noise Channel (AWGN). The models represent the distributions of noise that can exist in real time [1].
The major focus of polar codes is to provide a platform for the binary inputs of the transmission channels. That involves the transmission of bits of the transmission channels and receiving the noise version of the bits in the receiving end [1]. Therefore, the process of polar coding involves recording the original version of the transmitted bits from the noisy versions of the transmitted information bits [1].
Mathematically, polar coding is applied to improve the efficiency of transmission or the transmission rate of the bits. Similarly, the coding will also improve the quality of the channel as well as post-processing the information that is being transmitted over the channel [1].
The pre-processing of polar codes involves improving the efficiency of the inputs by adding redundancy. Improving efficiency of the inputs involves taking the k- bits, converting them into N- bits and transmitting those N- bits through the channel and getting them in the original form of k- bits [1].
The whole process described in the preceding paragraph involves receiving the noisy versions of N- bits and making an estimation to convert them back to the original K- bits [1]. That simply means that the process is about encoding and decoding. The process of decoding and encoding could also be described as the process of taking the bits, transmitting them through a channel and estimating their original format [1].
Therefore, the polar coding blocks are the encoding blocks, the transmission blocks, and the decoding blocks. The blocks can be described theoretically as follows;
Let binary input discrete memoryless channel (BI- DMS) be a channel with a capacity C, with a value between 0 and 1. When the code word is Tx in N channel- uses, then the polarization converts;
The assumption in the above model is that N approaches infinity. Polarizing the channel in the two extremes involves making the inputs to be extremely noisy or completely noiseless [1]. Therefore, the overall strategy in polar coding is to get the capacity that will use only the good channels (completely noiseless channels) for transmitting the information bits while the remaining channels (extremely noisy channels) are frozen or simply not left unused [1].
Unique features of polar codes are that they are not- versatile, they can change significantly with different choices of designs and as well as the fact that they as they have more accurate construction algorithms [1].
The history of polar coding is well articulated in the publication by Erdal [1] in the year 2015. Erdal records that the idea of polar coding was initially started as a way of providing a boost to the cutoff rate of sequential decoding. The boosting was required along the original lines of Massey and Pinsker [1]. The main idea, in this case, is to take a matrix channel that can be built artificially or can be given. The matrix is then split into some sub channels that are correlated [1].
The original design of polar coding was meant to be a low- complexity recursive channel that could combine and split any operation of this type [1]. The original one was to be used as the inner code in a concatenated scheme that has an outer convolutional coding and sequential decoding [1]. However, the inner code of the polar code became so efficient that there was no need for the outer code to achieve the original objective of boosting the rate of cutoff capacity of the channel [1].
The following are some of the powerful strengths of polar codes [1]:
The weaknesses of polar codes are outlined below [1]:
Polar coding is just one of the numerous contenders of service classes that are providing a serious challenge to channel coding in future wireless networks [2]. The reason why polar coding looks promising in the is that it provides many features than the other competitors [2]. For example, the rate adaptation is naturally provided, and the length adaptation can be achieved by puncturing and shortening [2]. Moreover, polar coding provides a fast successive cancellation decoding that is essential for future wireless technology. Polar coding has been adopted for developing 5 G networks that are set to be launched in the year 2020 [2].
Polar codes are anticipated to be used in the 5G networks and beyond. The comprehensive polar coding solutions suggested in the publication [2] outlines a number of possible uses of polar codes. Polar codes is anticipated to be used in calculation of the reliability, calculation of matching and checking for parity. Polar coding is also anticipated to be used in judging the transmission channel design from the view point of the industry [2].
Polar codes also have a future in the maritime industry. The maritime industry anticipate using polar codes to anticipate the potential risks in the industry in a more modest manner so that they can be mitigated to reduce the risks associated with such risks. The specific areas of possible application off the polar codes include designing the ship structure and the ship signal system [2].
The mathematical theory of polar codes can be explained under the three blocks of code construction, encoding and decoding [1]. Code construction involves selecting k out of N indices in the range {0, 1,…, N-1). The value of N must be a power of 2, i.e., N = 2^n. There are many algorithms that exist [1]. The simplest algorithm, however, is to use recursion in the form Z → {z^2, z^2}. In the case, the channel is an additive white Gaussian channel (AWGN) [1].
The idea is that, given a single value, we are going to generate two values using two different functions [1]. Consequently, we can recursively the same function and use the two values to generate four vales [1]. Again, using the same function, the four values will generate eight values and so on until the number of values equal to N [1].
After the N values have been generated, the recursion stops and k least values are picked from the N values. Now, let the indices of the leas values be in the set J [1].
A successive Cancellation Decoding (SCD) is a very fundamental and simple decoder that is proposed as a recursive algorithm [3]. Even though SCD may seem to be similar to a plain vanilla decoder, it is relatively inferior to other decoders [3]. It is a greedy algorithm that will get you all that you ever needed regarding decoding the inputs to get a meaningful output out of it [3]. The SCD decoding can be represented in many ways such as the two-way decoding. The two-way decoding algorithm involves N likelihood of selecting the element X. The N likelihoods of the bits are sequentially transformed into message bits d [3]. The message bits have both the noisy and non-noisy channels embedded in it. The mathematical theory behind SCD decoding can be summarized as follows [3].
For a better experience of decoding, the numerical underflows are natural logs using likelihood ratios [3].
Now, assuming we have two likelihoods (i. e N= 2), the following transformation will occur in the matrix of the two likelihood [3].
Let the two likelihoods be f (L1, L2) and g (L1, L2). Now, the transformation that will occur in g (L1, L2) is determined by g (L1, L2). Similarly, f (l1, L2) will define the function that will be used on g (L1, L2). The process is called broadcasting of bits from a branch [3].
The suggested method is to use log likelihood instead of standard numbers. The likelihoods are used because they give a more efficient solution [3].
The computation tree consists of N input likelihoods. The N iterations and the N computational trees form an overall tree that will produce the final values [3]. This implies that there are N output likelihoods. For each combination of trees, there will be a unique tree branch [3]. The N trees are naturally embedded in an N by (n-1) matrix [3]. The function g (L1, L2) is only used in the last section of the recursion, or sometimes it is never used at all. In the whole process, the maximum number of active level is three [3]. Therefore, if he number of active levels exceed this number, then it has to be truncated to three [3].
The following code provides the MATLAB encoding of polar codes. The output of the codes is provided in the appendix section. The codes have been developed based on the knowledge from a publication by Erdal [1].
N1=128; K1=64; Ec=1; N0=2; %Initializing of N1, K1
initPC(N1,K1,Ec,N0);
% Standard polar coding
u= (rand(K1,1)>0.5);% initializing the value of u
x= pencode(u); %polar encoding
y= (2*x-1)*sqrt(Ec) + sqrt(N0/2)*randn(N1,1); % defining AWGN
end
%the following MATLAB code can be used to decode a polar code using the Successive Cancellation Decoding. The codes have been developed based on the knowledge from the publication by [3]. The output of the codes is outlined in the appendix section.
U1 = (rand (k, 1)>0.5; % initializing the value of u
X1 = pencode(u); % Polar coding
Y1 = (2*x-1)*sqrt(Ec) + sqrt (N0/2)*randn(N11); %Defining the AWGN
a_decoded = pdecode(y); % The successive cancellation Decoding
logical(sum(u==a_decoded) % the code for checking if the succeive decoding has been done properly end
References
A. Erdal, “Channel Polarization: A Method for ConstructingCapacity-Achieving Codes for Symmetric Binary- Input Memoryless Channels,” Journal of IEEE Transmission in Information Technology, 2009. as, “Polar coding for future Networks: Theory and Practice,” in IEEE Wireless Communications and Networking Conference, Barcelona, 2018.
Chen, Kai, Niu, Kai, Lin, and Jiaru, “Improved Successive Cancellation Decoding of Polar Codes,” Journal of IEEE Transactions on Communications, vol. 61, no. 8, 2013.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download