Next Article in Journal
Exploring ISAC: Information-Theoretic Insights
Next Article in Special Issue
Mutual Information Neural-Estimation-Driven Constellation Shaping Design and Performance Analysis
Previous Article in Journal
A Family of Optimal Linear Functional-Repair Regenerating Storage Codes
Previous Article in Special Issue
Restart Mechanisms for the Successive-Cancellation List-Flip Decoding of Polar Codes
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Bit-Level Construction for Multiplicative-Repetition-Based Non-Binary Polar Codes †

1
The State Key Laboratory of ISN, Xidian University, Xi’an 710071, China
2
The Guangzhou Institute of Technology, Xidian University, Guangzhou 510555, China
*
Author to whom correspondence should be addressed.
This work is an extended version of our conference paper: Improved construction for multiplicative repetition based non-binary polar codes. In Proceedings of the IEEE Information Theory Workshop, Shenzhen, China, 24–28 November 2024.
Entropy 2025, 27(4), 377; https://doi.org/10.3390/e27040377
Submission received: 4 March 2025 / Revised: 30 March 2025 / Accepted: 31 March 2025 / Published: 2 April 2025
(This article belongs to the Special Issue Advances in Modern Channel Coding)

Abstract

:
In this paper, we discuss non-binary polar codes using a 2 × 2 matrix over a Galois field GF( 2 q ) as the kernel. Conventional construction of non-binary polar codes divides the synthesized channels into frozen channels and information channels. Each information channel carries one symbol, i.e., q bits. However, there are many middle channels with insufficient polarization, which cannot carry one symbol of q bits but only i bits, 1 i < q , i Z , at finite block length. In this paper, we consider bit-level construction for multiplicative repetition (MR)-based non-binary polar codes and propose a bit-level construction based on the two following methods. We first calculate the error probability and channel capacity lower bound of each synthesized channel based on the channel degradation method, and then determine both the number and index of the carried bits for each synthesized channel according to the symbol error probability and capacity. To reduce complexity, we also introduce a Monte-Carlo method. We compute the error probability of each synthesized channel carrying i information bits and select the optimal construction that can minimize the union bound of the error probability. Finally, an improved construction-based probabilistic shaping method for MR-based non-binary polar codes is considered. Simulation results show that the proposed construction significantly improved the decoding performance compared with the conventional construction scheme.

1. Introduction

Binary polar codes, proposed by Arıkan, can achieve symmetric capacity of binary-input discrete memoryless channels (BI-DMCs) [1]. However, the performance of polar codes at finite block lengths is unsatisfactory with the successive cancellation (SC) decoding algorithm. In order to improve the performance of polar codes in the finite length regime, the cyclic redundancy check (CRC)-aided successive cancellation list (CA-SCL) decoding algorithm was proposed in [2,3]. In practice, the CRC-polar concatenation scheme has shown excellent performance at short to medium code lengths with CA-SCL decoding compared with low-density-parity-check (LDPC) codes and Turbo codes. Due to their superior performance, CRC-polar codes have been selected as the coding standard for the control channel in the fifth generation (5G) wireless communication system [4].
It was proved in [5,6] that non-binary polar codes with arbitrary finite input-alphabet sizes can achieve symmetric capacity. It was also shown that all discrete memoryless channels (DMCs) can be polarized by randomized constructions [5]. Subsequently, Mori and Tanaka [7] proposed non-binary polar codes based on an l × l matrix of Reed–Solomon (RS) codes over GF(p), where p is the power of a prime. They also proved that the exponent of their non-binary polar codes is log ( l ! ) / ( l log ( l ) ) for all l p , and this exponent can become arbitrarily close to 1 as l increases. In 2016, Cheng et al. [8] introduced four-dimensional polar codes based on the RS kernel of GF(4) (RS4). Simulation results demonstrated that non-binary polar codes based on the RS kernel outperformed their binary counterparts. Moreover, binary and RS4-based non-binary kernels were mixed in [9] to reduce the decoding complexity of RS4-based polar codes. However, decoder implementations are not easily generalizable across different field sizes. To overcome this limitation, a novel multiplicative repetition (MR)-based non-binary code was proposed in [10,11,12,13,14]. The conventional decoding algorithm for binary polar codes can be easily extended to this class of non-binary polar codes. In [12], Chen and Bai introduced the concept of two-stage polarization to construct non-binary polar codes, which exhibited comparable performance with RS4-based non-binary polar codes. In [13], Yuan and Steine proposed a kernel selection method to maximize the polarization effect, where the kernel had a fixed multiplicative factor.
For binary polar codes over a binary-input additive white Gaussian noise (BI-AWGN) channel, several construction algorithms exist, including the Monte-Carlo (MC) algorithm [1], Gaussian approximation (GA) algorithm [15], polarized weight (PW) algorithm [16], and others [17,18]. For MR-based non-binary polar codes, the Monte-Carlo construction and channel degradation (CD) construction [19] are mainly used. In 2022, M. Chiu [20] proposed a new construction algorithm for non-binary I-polar codes based on the polarization effect and the block error rate (BLER) upper bound.
To achieve high spectral efficiency, non-binary polar codes combined with multilevel coding (MLC) and bit-interleaved coded modulation (BICM) were proposed in [11,20,21,22]. However, uniformly distributed symbols were considered in these schemes, resulting in a shaping loss up to 1.53 dB in AWGN channels [23,24]. A classical scheme to mitigate this loss is combining probabilistic shaping technique with high-order modulation [25,26]. In 2023, a method for constructing RS-kernel-based non-binary polar codes with shaping was proposed in [27].
This work aimed to improve the performance of MR-based non-binary polar codes at finite block lengths. For  polar codes over GF( 2 q ), the capacity of many synthesized channels ranges from 0 to q bits per channel used at finite block lengths. A single symbol in a synthesized channel may not carry q bits, but can carry i bits, where 1 i < q . Inspired by this, we consider bit-level construction for MR-based non-binary polar codes and propose an improved construction based on the CD method and MC method.
The main contributions of this paper are summarized as follows:
First, we revisit CD construction for non-binary polar codes. We then calculate the lower bound of the channel capacity and the symbol error probability for each synthesized channel, which are then used to determine the number of bits each channel can carry. Additionally, we compute the error probability for all transmission patterns and select the optimal pattern that minimizes the error probability of the synthesized channels. Compared with the conventional symbol-level construction, the proposed bit-level construction achieves better BLER performance with the same complexity.
Second, due to the high complexity of CD construction, we also explore the MC method to reduce construction complexity. We compute the error probability of each synthesized channel carrying i information bits, 1 i q . Based on this, we select the optimal information channels ( i = q ) and partial information channels ( i < q ) to minimize the error probability of the non-binary polar code. Recently, we noticed that the construction in the appendix of [14] is a special case of our bit-level construction-based MC method. Simulation results demonstrated that the proposed construction method improved the BLER performance compared with the original construction and the scheme in [12].
Third, for high spectral efficiency,  MR-based non-binary polar codes combined with BICM and a hybrid MLC and BICM framework [28] are also considered. To improve BLER performance, we integrate probabilistic shaping with BICM and introduce a bit-level construction for shaping MR-based non-binary polar codes.
The article significantly extends the work presented in preliminary form in [29], where we demonstrated the potential of bit-level construction for non-binary polar codes. We provide a more detailed description of bit-level CD and MC constructions. Furthermore, we propose a novel framework combining non-binary polar codes with hybrid MLC and BICM coded modulation, along with a bit-level construction for shaping MR-based non-binary polar codes.
The rest of this paper is organized as follows: Section 2 introduces the notations, definitions, and preliminaries of non-binary polar codes. Section 3 presents the improved construction scheme. In Section 4, the probabilistic shaping method based on the improved construction for multiplicative repetition non-binary polar codes is described. Section 5 provides simulation results for our scheme. Finally, the conclusions are given in Section 6.

2. Preliminaries for Non-Binary Polar Codes

2.1. Notation and Conventions

Throughout this paper, matrices and vectors are represented by upper-case and lower-case letters in bold, respectively. An N-tuple u is denoted as u = [ u 1 , u 2 , . . . , u N ] . The notation u a b means the sub-vector [ u a , u a + 1 , . . . , u b ] if b a and a null vector otherwise. The calligraphic letter A is used to denote sets, and the complement of set A is A c . The cardinality of A is denoted as | A | . In this paper, we consider the Galois fields of characteristic 2, i.e., GF( 2 q ), where q is a positive integer.

2.2. Binary Polar Codes

Given a BI-DMC W : X Y with input alphabet X and output alphabet Y , where X { 0 , 1 } , the channel transition probabilities can be defined as W ( y | x ) , x X , y Y . If W is a symmetric channel, the symmetric capacity and the Bhattacharyya parameter of the B-DMC W can be defined as
C ( W ) y Y x X 1 2 W ( y x ) log W ( y x ) 1 2 W ( y 0 ) + 1 2 W ( y 1 )
and
Z ( W ) y Y W ( y | 0 ) W ( y | 1 ) ,
respectively.
Assume that the code length is N = 2 n , the information sequence length is K. With the channel polarization, the K most reliable synthesized channels W N ( i ) , i A are used to transmit information bits, and the others are used to transmit the frozen bits, where | A | = K . The encoding of a polar code can be described by
x 1 N = u 1 N F N = u 1 N F 2 n B N ,
where the input sequence u 1 N contains K information bits and N K frozen bits, the matrix F N is the N × N generator matrix, B N is a permutation matrix [1], ⊗ denotes the Kronecker operation, and the Arıkan kernel F 2 is given by
F 2 = 1 0 1 1 .
The channel splitting operation splits the vector channel W N into N polarized channels W N ( j ) : X Y × X j 1 , 1 j N . The transition probability of the j-th polarized channel W N ( j ) is defined as
W N ( j ) ( y 1 N , u 1 j 1 | u j ) u j + 1 N X N j 1 2 N 1 W N ( y 1 N | u 1 N ) .

2.3. MR-Based Non-Binary Polar Codes

We extend binary polar codes to non-binary polar codes by considering the following 2 × 2 kernel G 2 over GF( 2 q ), which is given by
G 2 = 1 0 α t 1 ,
where α is the primitive element of GF( 2 q ) and 0 t < 2 q 1 . Note that, in the case of α t = 1 , G 2 has the same form as the Arıkan kernel F 2 . In the case of α t 1 , we call G 2 an MR-based matrix for convenience. In this paper, the generator matrix with code length N = 2 n symbols is given by
G N = G 2 n = G 2 ( n 1 ) 0 α n G 2 ( n 1 ) G 2 ( n 1 ) , n 2 ,
where α n = α 2 n 1 and t = 1 in the matrix G 2 .
The encoding of non-binary polar codes can be described as
x 1 N = v 1 N G N = v 1 N G 2 n B N ,
where v 1 N denotes the N input symbols of GF( 2 q ). Let u 1 N b = u 1 N × q represent the binary representation of v 1 N . The factor graph of the G 8 MR-based polar codes over GF(4) is shown in Figure 1.
W l ( 2 j 1 ) y 1 2 l , v 1 2 j 2 v 2 j 1 = v 2 j 1 2 q W l 1 ( j ) y 1 2 l 1 , v 1 , odd 2 j 2 + α h v 1 , even 2 j 2 v 2 j 1 + α h v 2 j W l 1 ( j ) y 2 l 1 + 1 2 l , v 1 , even 2 j 2 v 2 j ,
W l ( 2 j ) y 1 2 l , v 1 2 j 1 v 2 j = 1 2 q W l 1 ( j ) y 1 2 l 1 , v 1 , odd 2 j 2 + α h v 1 , even 2 j 2 v 2 j 1 + α l v 2 j W l 1 ( j ) y 2 l 1 + 1 2 l , v 1 , even 2 j 2 v 2 j ,
Let W ( y v ) represent the channel conditional probability and v 1 , o d d j , v 1 , e v e n j represent the subvector with odd and even indices, respectively. Due to the similar structure to binary polar codes, the recursive formulas of the symbol-level SC decoding algorithm are given by (9) and (10), where 1 j 2 l , α h = α 2 h 1 , h = n l + 1 , 1 l n , and  W 0 ( 1 ) ( y v ) = W ( y v ) . Assuming that the transmission probabilities of all symbols are equal, for the conventional symbol-level construction with the information symbol set A and frozen symbol set F , the SC decoder generates its decision v ^ i by
v ^ i = arg max β GF ( 2 q ) W n i ( y 1 N , v 1 i 1 β ) , i A value of the frozen symbol v i , i F .

3. Bit-Level Construction for Non-Binary Polar Codes

In this section, we introduce the bit-level construction for MR-based non-binary polar codes and propose improved bit-level constructions based on the CD method and the MC method, respectively.

3.1. Capacity-Based Bit-Level Construction

As for the symbol-level construction of non-binary polar codes over GF( 2 q ), the K most reliable channels are used to carry the information symbols, and each channel carries one symbol of q bits. However, at finite block lengths, the capacities of considerably many synthesized channels lie in the range [ 1 , q 1 ] ; i.e., they are not bad enough to be frozen but are not good enough to carry q bits per symbol. Through simulations, we found that they are capable of carrying i-bit partial symbols for a certain integer 1 i < q , where i is determined by the channel capacity of each synthesized channel, as shown in Figure 2. For the 2 q -ary erasure channel with erasure probability ϵ , the erasure probability of each synthesized channel can be calculated by
ϵ W N ( 2 j ) = ϵ W N / 2 ( j ) 2 ϵ W N ( 2 j 1 ) = 2 ϵ W N / 2 ( j ) ϵ W N / 2 ( j ) 2 ,
with ϵ ( W 1 1 ) = ϵ . The channel capacity of each synthesized channel is C ( W N ( j ) ) = q ( 1 ϵ ( W N ( j ) ) ) bits. As an example, Figure 2 shows the synthesized channel capacities of 16-ary polar codes over the erasure channel, where N = 32 and the erasure probability ϵ = 0.4 . For a conventional symbol-level construction, we choose K synthesized channels with the largest capacity C ( W N ( j ) ) to carry the information symbols. In order to make full use of every synthesized channel, it is reasonable to make the j-th channel carry i bits if  C ( W N ( j ) ) i . We propose a bit-level construction that considers both performance and complexity. Assuming that I ( j ) is the number of bits carried over the j-th channel, we set
I ( j ) = C ( W N ( j ) ) ,
where C = max { m Z | m C } . Then, we sort each synthesized channel in descending order based on C ( W N ( j ) ) and generate the information symbol set A 1 for bit-level construction, such that | A 1 | K and
j A 1 I ( j ) = K q ( b i t s ) .
Note that Equation (14) always holds if K q information bits can be transmitted correctly at a given channel state.
Although the constructions developed for erasure channels remain functionally valid in AWGN channels, their performance is suboptimal. For enhanced accuracy, we use the CD method [18,19] to obtain the lower bound of the channel capacity of each synthesized channel. Since the kernel matrix G 2 is different from that in [19], the channel transformations W and W + can be defined by
W ( y 1 , y 2 v 1 ) 1 2 q v 2 = 0 2 q 1 W ( y 1 v 1 + α h v 2 ) W ( y 2 v 2 ) ,
W + ( y 1 , y 2 , v 1 v 2 ) 1 2 q W ( y 1 v 1 + α h v 2 ) W ( y 2 v 2 ) .
Let W : X Y be a DMC, and let y 1 , y 2 be two output symbols. Define the channel Q : X Y { y 1 , y 2 } { y merge } and the transition probabilities
Q ( y | x ) = W ( y | x ) , if y y { y 1 , y 2 } W ( y 1 | x ) + W ( y 2 | x ) , if y = y merge .
Q is obtained from W by replacing { y 1 , y 2 } with a new symbol y m e r g e . Then, Q W denote that Q is degraded with respect to W [18,19]. For MR-based non-binary polar codes, we need to optimize the degraded channel by attaining the smallest rate loss over all Q :
inf Q : Q W output Q μ C ( W ) C Q .
Let j N = 2 n be a nonnegative integer with binary representation b j , 1 , b j , 2 , , b j , n 2 . The degradation procedure is described in more detail in Algorithms 1 and 2, where GetOutputwithMinDeltaC(Q) is a search function that finds y 1 and y 2 with the smallest capacity difference from Q. After that, we obtain the transition probability Q N ( j ) ( y | v ) of the j-th synthesized channel. We define
Q N ( j ) ( v y ) = Q N ( j ) ( y v ) v 0 GF ( 2 q ) Q N ( j ) ( y v 0 ) ,
and
P Q N ( j ) ( y ) = 1 2 q v 0 GF ( 2 q ) Q N ( j ) ( y v 0 ) .
Then, we have
C ( Q N ( j ) ) = H ( V ) y Y H ( V | Y = y ) P Q N ( j ) ( y ) .
Since the C ( Q N ( j ) ) in (21) is the lower bound of the j-th synthesized channel, we set I ( j ) = C ( Q N ( j ) ) + δ , where δ represents the difference between the capacity and the lower bound, 0 δ 0.1 . Then, we sort each synthesized channel in descending order based on C ( W N ( j ) ) and generate the symbol information set A 1 , | A 1 | K and j A 1 I ( j ) = K q ( b i t s ) .
In addition, we need to determine which bit index carries information when 0 < i < q . Let T m ( j ) = 1 represent the information bit carried by the m-th index of the j-th synthesized channel, and T ( j ) = ( T 1 ( j ) , T 2 ( j ) , , T q ( j ) ) represents the pattern of j-th synthesized channel carrying i information bits, where w t ( T ( j ) ) = i represents the number of ones in T ( j ) . According to the conditional probability Q N ( j ) ( y | v ) of the j-th synthesized channel, the error probability under the maximum likelihood decoding of pattern T ( j ) can be calculated by
P T ( j ) = 1 2 i y Y v v v max Q N ( j ) ( y v ) ,
where
v max = arg max v Q N ( j ) ( y v ) ,
denotes the decoding result. The pattern T ( j ) with the minimum error probability will be selected, and if T m ( j ) = 1 , the  ( ( j 1 ) × q + m ) -th bit is an information bit. The details are shown in Algorithms 3 and 4, where b k , m 2 is the binary representation of a nonnegative integer k, and P max represents the probability that Q N ( j ) ( y v max ) , P min is the smallest error probability when the synthesized channel is carrying i bits. The encoder of bit-level-construction-based non-binary polar codes is the same as for symbol-level construction. At the decoder, Algorithm 4 is also used to search for a valid decoding symbol when decoding the synthesized channel carrying i bits.
Algorithm 1 Degrading procedure of synthesized channels
Input: DMC W, a bound of output size μ , code length N = 2 n , channel index j with binary representation b j , 1 , b j , 2 , , b j , n 2 .
Output: A DMC Q N ( j ) that is degraded with respect to the synthesized channel W N ( j ) .
  1:   Q degrade ( W , μ )
  2:  for  i = 1 : n  do
  3:      if  b j , i = 0  then
  4:          W Q
  5:      else
  6:          W Q +
  7:      end if
  8:       Q degrade ( W , μ )
  9:  end for
10:  return Q
Algorithm 2 The degrade function
Input: DMC W : X Y , where | Y | = L , a bound of output size μ .
Output: A degrade channel Q : X Y , where | Y | μ .
for  i = 1 : L  do
2:   for  j = 0 : 2 q 1  do
      d [ i ] [ j ] W ( y i j )
4:   end for
end for
6: Y Y
while  | Y | > μ  do
8:    { y 1 , y 2 } GetOutputwithMinDeltaC ( Q )
   for  j = 0 : 2 q 1  do
10:      d [ y merge ] [ j ] = d [ y 1 ] [ j ] + d [ y 2 ] [ j ]
   end for
12:    Y y merge
    Y Y { y 1 , y 2 }
14:end while
Construct Q according to the probabilities.
16:return Q
Example: Given an N = 8 , K = 4 , MR-based non-binary polar code over GF(8) and the quantization level μ = 8 . Table 1 lists the transition probabilities of the 6-th synthesized channel Q 8 6 ( y v ) . Assuming that C ( Q 8 6 ) = 2 bits, there are three patterns for the 6-th channel to carry two information bits, ( 1 , 1 , 0 ) , ( 1 , 0 , 1 ) , and ( 0 , 1 , 1 ) . When T ( 6 ) = ( 1 , 1 , 0 ) , v { 0 , 1 , 2 , 3 } , according to Equations (22) and (23), we can calculate that P ( 1 , 1 , 0 ) = 0.134275 . Similarly, when T ( 6 ) = ( 1 , 0 , 1 ) , v { 0 , 1 , 4 , 5 } , P ( 1 , 0 , 1 ) = 0.1346 , and when T ( 6 ) = { 0 , 1 , 1 } , v { 4 , 5 , 6 , 7 } , P ( 0 , 1 , 1 ) = 0.13455 . Therefore, the 18-th and 19-th bits are selected as information bits.
Figure 3 shows the synthesized channel capacities of 16-ary polar codes over the AWGN channel with binary phase shift keying (BPSK) modulation, where N = 32 , the signal-to-noise ratio (SNR) is 3.0 dB, and  μ = 32 . Since the sum capacities of each synthesized channel in Figure 2 and Figure 3 are equal, we can directly compare the differences in their symbol channel capacities. Obviously, the two approaches produce different results. The capacity calculation under the erasure channel is simple but not precise. On the contrary, the CD construction is more complex but yields more accurate results.
Algorithm 3 Obtain information bit set of j-th synthesized channel
Input: The transition probability Q N ( j ) ( y | v ) of j-th synthesized channel, where y Y , | Y | = μ , v GF ( 2 q ) , j-th synthesized channel carried information bits i.
Output:  T ( j ) .
P T 0
P m a x 0
3: P m i n 1
for  k = 0 : 2 q 1  do
   if  m = 1 q b k , m = i  then
6:      P T 0
     for  y = y 1 : y μ  do
         P max 0
9:        for  v = 0 : 2 q 1  do
          if  I s V l e g a l ( v , k ) = 1  then
             if  Q N ( j ) ( y | v ) > P max  then
12:                P T P T + P max
                P max = Q N ( j ) ( y v )
             else
15:                P T P T + P max
             end if
          end if
18:        end for
     end for
      P T P T / 2 i
21:     if  P T < P min  then
         P min P T
        for  m = 1 : q  do
24:           T m ( j ) b k , m
        end for
     end if
27:   end if
end for
return  T ( j )
Algorithm 4 IsVlegal
Input:  v , k .
Output:  r e s u l t .
r e s u l t 1
for  m = 1 : q  do
   if  b k , m = 0  then
4:     if  b v , m 0  then
         r e s u l t 0
        break
     end if
8:   end if
end for
return  r e s u l t

3.2. Error-Probability-Based Bit-Level Construction

Although the CD construction achieves high accuracy with a large quantization level μ , it also leads to a high complexity. To reduce the complexity of the construction algorithm, we consider an error-probability-based bit-level construction for MC construction. Meanwhile, we make all the synthesized channels carry information bits with the same pattern. For example, if the j-th synthesized channel carries 0 < i < q bits, its input symbol v j { 0 , 1 , , 2 i 1 } .
Consider an ( N , K , A ) non-binary polar code over GF( 2 q ). The set of block error events under SC decoding is defined as
E v 1 N , y 1 N : v ^ A v 1 N , y 1 N v A .
Let P e ( N , K , A ) = P ( E ) denote the BLER of the ( N , K , A ) polar code. The set of block error events can be enlarged as E j A E j , where the single-symbol error event E j is defined as
E j v 1 N , y 1 N : W N ( j ) y 1 N , v 1 j 1 v j W N ( j ) y 1 N , v 1 j 1 v j , v j v j .
Let P e , i ( j ) denote the symbol error probability when the j-th synthesized channel carries i bits. Obviously, P e , i 1 ( j ) P e , i 2 ( j ) for any i 1 < i 2 and 0 j < N . P e , i ( j ) can be easily obtained by the MC method and the CD method. For the CD method, a DMC is obtained from the synthesized channel Q N ( j ) , and  P e , i ( j ) can be calculated by
P e , i ( j ) = 1 2 i y Y v = 0 , v v max 2 i 1 Q N ( j ) ( y v ) ,
where
v max = arg max v { 0 , 1 , 2 i 1 } Q N ( j ) ( y v ) .
The BLER for bit-level construction under the SC decoding can be upper bounded as
P e ( N , K , A 1 ) = P ( E ) j A 1 P ( E j ) j A 1 P e , I ( j ) ( j ) ,
subject to (14).
Our scheme aims to obtain an optimal information symbol set A 1 and number of carried bits I ( j ) to minimize the upper bound of the total probability P e . To address this problem, we compute a probability P b ( s ) , which represents the contribution to the upper bound of the error probability when selecting the s-th bit, namely A 1 .
P b ( s ) = P e , i + 1 ( j ) P e , i ( j ) 1 P e , i ( j )
where s = ( j 1 ) q + i + 1 , 1 s N q , and  P e , 0 ( j ) = 0 . In the case of 0 < i < q , P b ( s ) is a conditional probability P ( u ^ s u s | u ^ s 1 = u s 1 , , u ^ s i = u s i ) when the j-th synthesized channel carries i + 1 bits. Consequently, the BLER under SC decoding can be further upper bounded as
P ( E ) j A 1 P e , I ( j ) ( j ) = j A 1 s B P b ( s ) = P U B ,
where B is the information bit set and | B | = K q , and  P U B is the BLER upper bound under the SC decoding. We can use the upper bound of the error probability as a metric to generate A 1 and B by choosing K q bit indexes with the smallest P b ( s ) . Note that for some s 1 > s 2 , s 1 = ( j 1 ) q + i 1 + 1 , s 2 = ( j 1 ) q + i 2 + 1 , 0 i 2 < i 1 < q , there are P b ( s 1 ) P T < P b ( s 2 ) , where P T is the K q -th smallest probability. This means that s 1 B , s 2 B , which means the construction result does not satisfy the fixed carry pattern. Therefore, we must ensure that, for this case, s 2 is selected earlier than s 1 when we choose the K q smallest P b ( s ) , which is different from the construction scheme in [12,14]. The overall procedure of the error-probability-based bit-level construction algorithm is shown in Algorithm 5.
Figure 4 shows the error probability of each decoding bit under the SC decoder, where N = 64 symbols, K = 32 symbols over GF(16), and the E b / N 0 = 2.0 dB.
Algorithm 5 Error-Probability-Based Bit-Level Construction for Non-binary Polar Codes
Input:  N , K , q , { P e , i ( j ) : 1 i q , 1 j N } .
Output:  A 1 , B , I .
A 1 , B
for  s = 1 : N q  do
   Calculate P b ( s ) according to (29).
end for
5:Generate B by selecting the K q indices s with the smallest P b ( s ) values.
for  j = 1 : N  do
    I ( j ) = 0
   for  i = 0 : q 1  do
     if  ( ( j 1 ) q + i + 1 ) B  then
10:         I ( j ) = I ( j ) + 1
     end if
   end for
   if  I ( j ) 0  then
      A 1 j
15:   end if
end for
B
for  j = 1 : N  do
   for  i = 0 : q 1  do
20:     if  j A 1   &   ( i + 1 ) I ( j )  then
         B ( ( j 1 ) q + i + 1 )
     end if
   end for
end for

4. Construction for MR-Based Non-Binary Polar Codes with High-Order Modulation and Probabilistic Shaping

To achieve high spectral efficiency, MR-based non-binary polar codes combined with high-order modulation are considered. It is well known that the optimal input distribution for AWGN channels is Gaussian. As the spectral efficiency increases, the performance loss caused by the use of uniform signaling can be up to 1.53 dB [23,24]. Probabilistic shaping is a technique developed to mitigate this loss. In this section, we introduce the code construction for MR-based non-binary polar codes with BICM and probabilistic shaping.

4.1. Hybrid MLC and BICM Coded Modulation Framework

Yuan et al. proposed a hybrid MLC and BICM coded modulation framework based on Ungerboeck set partitioning, to meet requirements for higher spectral efficiency and higher throughput in future 6G communications in [28]. Figure 5 shows the hybrid MLC-BICM coded modulation system model combined with non-binary polar codes. MLC incorporates Ungerboeck set partitioning, which divides the signal constellation X into 2 q 1 subsets through q 1 partitioning steps. Let d j , ( j = 0 , 1 , , q 1 ) denote the minimum square Euclidean distances of the j-th level subsets, where the average energy of the original constellation is normalized to 1. The j-th level bit error rate (BER) of the intra-subset can be calculated by
P ( d j ) 1 2 erfc E s d j 4 N 0 = 1 2 erfc ρ E b d j 4 N 0 ,
where E s is the average energy of the constellation X , E b is the average energy of each information bit [30], and ρ is the corresponding spectral efficiency (SE) in bits/two-dimensional (2D) symbol. Therefore, at a certain level of the subset partitioning chain, the signals within the subset can be detected by a hard decision with high reliability, because the BER is reliable enough, such as a BER 10 5 . We divide the index bits of the transmitted signal into two groups: the high-level bits (HLBs) used to index the subset, and the low-level bits (LLBs) used to index the signal in the subset. To achieve better performance, we apply Gray labeling for both LLBs and HLBs.

4.2. Probabilistic Shaping for MR-Based Non-Binary Polar Codes

Figure 6 depicts a block diagram of shaping non-binary polar codes with the BICM scheme. Suppose that a two-dimensional signal constellation X of size | X | = 2 q is used. In other words, the field matches the modulation order. In order to ensure that the transmitted symbols follow a carefully optimized distribution, such as the Maxwell–Boltzmann distribution
P X ( x ) = exp λ x 2 x ˜ X exp λ x ˜ 2 ,
where λ 0 , the information sequence d = d 1 , d 2 , , d K needs to contain some shaping symbols. After inserting the shaping symbols and frozen symbols, the input sequence v = v 1 , v 2 , , v N can be obtained. The codewords are generated by c 1 N = v 1 N G N . A signal mapper π maps the polar coded symbols c i , 1 i N to modulated symbols x i = π ( c i ) X . We define a symbol set S , A F S = { 1 , 2 , , N } . By reformulating (8) as v 1 N G N + π 1 ( x 1 N ) = 0 , we can regard this as a polar codeword c 1 N transmitted over a 2 q -ary symmetric channel with transition probability P X ( x ) , where π 1 ( x 1 N ) is the noise sequence and the channel output is the all-zero vector. Therefore, we can use symbol-level or bit-level construction to obtain the shaping set S and use the SC decoder to obtain the shaping symbol value. Note that | S | = N ( 1 H 2 q ( P X ( x ) ) ) symbols, where H ( P X ( x ) ) = x X P X ( x ) log 2 q ( P X ( x ) ) . At the decoder, the initial probabilities are generated based on the channel output y 1 N as
W ( x i y i ) W AWGN ( y i x i ) P X ( x i ) ,
where W AWGN ( y i | x i ) is the transition probability over the AWGN channel.
For a hybrid MLC and BICM coded modulation framework, since the LLBs are without channel coding, probabilistic shaping can only be achieved at the HLBs. Based on the results of (32), we can calculate the probability of each subset. However, the probability distribution of each subset is close to a uniform distribution.

4.3. Code Design

In this part, we introduce the code design of the MR-based non-binary polar codes with high-order modulation and probabilistic shaping in detail, as illustrated in Figure 7.
For the symbol-level shaping method, we first calculate the number of shaping symbols | S | according to the optimal distribution P X ( x ) . Then, we use the symbol-level construction over the 2 q -ary symmetric channel to obtain the shaping symbol set S . Note that both methods mentioned above can be used. Then, for the AWGN channel, we calculate the capacities or error probabilities for each synthesized channel and assign the best synthesized channels (excluding the ones in S ) to A . The remaining synthesized channels are assigned to F . Once the symbol sets S , A , F are known, we can use the SC decoder to calculate the values of the shaping symbols. For this purpose, we regard v j , j A F as frozen symbols and P X ( x ) as the channel observation of an all-zero vector.
For the bit-level shaping method, we define a shaping bit set S bit and a frozen bit set F bit , S bit B F bit = { 1 , 2 , , N q } . The number of shaping bits can be calculated by | S bit | = N ( q H 2 ( P X ( x ) ) ) . The shaping bit set S bit , the information bit set B , and the frozen bit set F bit can be obtained through the bit-level construction. Due to the bit-level construction, a synthetic channel may contain both information bits and shaping bits simultaneously, which is the main difference compared with the symbol-level shaping method.

5. Simulation Results

In this section, the performance of the proposed construction scheme based on the CD method and MC method for MR-based non-binary polar codes is evaluated. Assume that binary phase shift keying (BPSK) modulation is used over the AWGN channel. For comparison, the performance of the original Monte-Carlo construction [8], binary polar codes, and the construction scheme in [12] are also provided. Note that the binary polar codes were constructed based on the 5G construction [4]. The design SNR of all constructions was 2.0 dB, the CRC length and the list size were both set to 8. At the decoder, the symbol-level decoding algorithm was used for the non-binary polar codes. Therefore, the decoding complexity of the proposed construction scheme was the same as that of the symbol-level construction scheme.
Figure 8 depicts the performance comparison between the symbol-level construction and the bit-level construction when N = 32 and R = 1 / 4 over GF(16). The SC decoding and CA-SCL decoding algorithms were used. When using the SC decoder, the bit-level MC construction and the bit-level CD construction proposed in this work exhibited the same performance, which was 0.2 dB better than the symbol-level MC construction. When using the CA-SCL decoder, the bit-level CD construction also achieved the best BLER performance, outperforming the MC method by 0.2 dB. Since the quantization level μ = 32 , the performance loss of the CD scheme increased with the code length and rate.
With regard to Figure 9, when N = 64 , R = 1 / 4 over GF(16), and the SC decoding algorithm was used, the symbol-level construction scheme had a similar BLER performance compared with the binary polar code, and the bit-level construction scheme performed 0.5 dB better than the above two schemes at BLER = 1 × 10 5 . The proposed scheme and the exhaustive search scheme had the same BLER performance, but the proposed scheme had a lower complexity. When N = 128 , the proposed bit-level construction scheme and symbol-level construction scheme had the same BLER performance, which was 0.75 dB better than that of the binary polar codes.
Figure 9 also shows the performance comparison using the CA-SCL decoding algorithm. Since the CRC bits occupied the information sub-channels, the error probability upper bound of the proposed construction scheme increased. When N = 64 , the bit-level construction scheme achieved a performance gain of 0.25 dB and 0.15 dB compared with symbol-level construction and binary polar codes. When N = 128 , the bit-level construction scheme also achieved a gain of 0.15 dB compared with the symbol-level construction scheme, which was 0.25 dB better than the binary polar code in the high SNR region.
In Figure 10, when N = 64 , R = 1 / 2 , with the symbol-level construction scheme, the bit-level construction and the exhaustive search scheme had the same BLER performance under the SC decoding algorithm, which was 0.7 dB better than the binary polar code. Using the CA-SCL decoding with the CRC length of 24, the proposed scheme had the same BLER performance as the binary polar code, and outperformed the symbol-level construction by 0.2 dB at BLER = 10 4 .
Figure 11 shows the performance comparison between the proposed construction scheme and the scheme in [12], where N = 128 , R = 1 / 2 , and the list size was 16. The proposed scheme was 0.1 dB better than the scheme in [12] and 0.2 dB better than the symbol-level construction scheme and the binary polar code at BLER = 2 × 10 4 . Since the input symbols in our scheme satisfy v j { 0 , 1 , . . . , 2 i 1 } , the decoding search space was reduced compared with that in [12].
We now evaluate the code performance under 16-QAM modulation. Two codes of length N = 512 over GF(16) with code rates 1/4 and 1/2, respectively, were evaluated. Assume that the CA-SCL decoding algorithm was used. The performance of both non-binary polar codes and binary polar codes with bit interleaved coded modulation (BICM) is shown in Figure 12. When R = 1 / 4 , the proposed scheme achieved performance gains of 0.25 and 1 dB compared with the symbol-level construction and binary polar codes. When R = 1 / 2 , our scheme had performance gains of 0.2 dB and 0.5 dB, respectively.
The performance of the probabilistic shaped MR non-binary polar codes is shown in Figure 13. We compared the shaping gain and coding gain of the bit-level construction and the symbol-level construction schemes. When N = 512 , R = 1 / 2 , both bit-level construction and symbol construction had 0.1 dB shaping gain at BLER = 1 × 10 3 , while the coding gain was 0.2 dB. When N = 512 , R = 3 / 4 , both the bit-level construction and symbol-level construction had a 0.25 dB shaping gain at BLER = 1 × 10 3 , while the coding gain was 0.1 dB. In a word, the bit-level construction had a significant shaping gain with a high coding rate.
A coded modulation performance comparison between BICM and hybrid MLC-BICM with 64-QAM modulation is shown in Figure 14. For the BICM system, the code length N = 256 , R = 5 / 6 , the crc length was 12, and the list size was 8. For the hybrid MLC and BICM system, the signal constellation was partitioned into subsets of size 4, which meant that 512 out of 1280 information bits were uncoded and the rest of the information bits were protected using a non-binary (binary) polar code with a rate of 3/4. The simulation results show that the hybrid MLC-BICM scheme was about 0.4 dB better than the BICM scheme at a bit error rate (BER) = 1 × 10 4 . Meanwhile, for the BICM system, the bit-level construction achieved a 0.25 dB gain at BER = 1 × 10 4 .

6. Conclusions

This paper presents an improved bit-level construction for MR-based non-binary polar codes, incorporating both CD and MC methods. The number of transmitted bits is determined by evaluating the error probability of each synthesized channel and the lower bound of its capacity, thereby minimizing the symbol error probability. For practical implementation, MC-based bit-level construction is additionally proposed to reduce computational complexity. The simulation results showed that the proposed construction scheme outperformed binary polar codes and conventional non-binary polar codes with BPSK under both SC and CA-SCL decoding algorithms. Furthermore, we incorporate probabilistic shaping within our bit-level construction framework to address shaping loss in high-order modulation systems. The simulation results demonstrated that the proposed architecture achieved substantial shaping gains for high coding rates, while maintaining notable coding gains at lower coding rates.

Author Contributions

Conceptualization, R.X., P.C. and B.B.; methodology, R.X. and L.L.; software, R.X. and P.C.; validation, R.X., M.Z. and B.B.; formal analysis, R.X. and L.L.; writing—original draft preparation, R.X.; writing—review and editing, R.X., P.C., L.L., M.Z. and B.B.; funding acquisition, M.Z. and B.B. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the National Key R&D Program of China under Grant 2021YFA1000500 and the National Natural Science Foundation of China under Grant 62171356 and 62271380.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
MRMultiplicative Repetition
BI-DMCBinary-input discrete memoryless channels
SCSuccessive cancellation
CRCCyclic redundancy check
CA-SCLCyclic redundancy check-aided successive cancellation list
LDPCLow-density parity check
5Gfifth generation
RSReed–Solomon
AWGNAdditive White Gaussian Noise
MCMonte-Carlo
GAGaussian approximation
PWPolarized weight
CDChannel degradation
BLERBlock error rate
MLCMultilevel coding
BICMBit-interleaved coded modulation
BPSKBinary phase-shift keying
BERBit error rate

References

  1. Arıkan, E. Channel polarization: A method for constructing capacityachieving codes for symmetric binary-input memoryless channels. IEEE Trans. Inform. Theory 2009, 55, 3051–3073. [Google Scholar]
  2. Tal, I.; Vardy, A. List decoding of polar codes. IEEE Trans. Inform. Theory 2015, 61, 2213–2226. [Google Scholar]
  3. Niu, K.; Chen, K. CRC-aided decoding of polar codes. IEEE Commun. Lett. 2012, 16, 1668–1671. [Google Scholar] [CrossRef]
  4. 3rd Generation Partnership Project (3GPP) TS 38.212. Multiplexing and Channel Coding. V.15.1.0. 2018. Available online: https://www.3gpp.org/ftp/Specs/archive/38_series/38.212/ (accessed on 5 April 2018).
  5. Şaşoǧlu, E.; Telatar, E.; Arıkan, E. Polarization for arbitrary discrete memoryless channels. In Proceedings of the 2009 IEEE Information Theory Workshop, Taormina, Italy, 11–16 October 2009; pp. 144–148. [Google Scholar]
  6. Chiu, M. Nonbinary polar codes with channel symbol permutations. In Proceedings of the 2014 International Symposium on Information Theory and Its Applications, Victoria, BC, Canada, 26–29 October 2014; pp. 433–437. [Google Scholar]
  7. Mori, R.; Tanaka, T. Non-binary polar codes using Reed-Solomon codes and algebraic geometry codes. In Proceedings of the 2010 IEEE Information Theory Workshop, Dublin, Ireland, 30 August–3 September 2010; pp. 1–5. [Google Scholar]
  8. Cheng, N.; Zhang, R.; Ge, Y.; Shi, W.; Zhang, Q.; Shen, X.S. Encoder and list decoder of Reed-Solomon kernel based polar codes. In Proceedings of the 2016 8th International Conference on Wireless Communications & Signal Processing (WCSP), Yangzhou, China, 13–15 October 2016; pp. 1–6. [Google Scholar]
  9. Presman, N.; Shapira, O.; Litsyn, S. Mixed-kernels constructions of polar codes. J. Sel. Areas Commun. 2016, 34, 239–253. [Google Scholar]
  10. Kasai, K.; Declercq, D.; Poulliat, C.; Sakaniwa, K. Multiplicatively repeated nonbinary LDPC codes. IEEE Trans. Inform. Theory 2011, 57, 6788–6795. [Google Scholar] [CrossRef]
  11. Chen, P.; Bai, B. Design and performance of the polar coded modulation for high mobility communications. In Proceedings of the 2018 IEEE 87th Vehicular Technology Conference (VTC Spring), Porto, Portugal, 3–6 June 2018; pp. 1–5. [Google Scholar]
  12. Chen, P.; Bai, B.; Ma, X. Nonbinary polar coding with low decoding latency and complexity. J. Inf. Intell. 2023, 1, 36–53. [Google Scholar] [CrossRef]
  13. Yuan, P.; Steiner, F. Construction and decoding algorithms for polar codes based on 2×2 non-binary kernel. In Proceedings of the 2018 IEEE 10th International Symposium on Turbo Codes & Iterative Information Processing (ISTC), Hong Kong, China, 3–7 December 2018; pp. 1–5. [Google Scholar]
  14. Yuan, P. Polar Coding with Complexity-Adaptive Decoding and Time-Varying Channels. Ph.D. Thesis, Technische Universität München, Munich, Germany, 2021. Available online: https://mediatum.ub.tum.de/doc/1613523/1613523.pdf (accessed on 7 July 2023).
  15. Trifonov, P. Efficient design and decoding of polar codes. IEEE Trans. Commun. 2012, 60, 3221–3227. [Google Scholar]
  16. He, G.; Belfiore, J.C.; Land, I.; Yang, G.; Liu, X.; Chen, Y.; Li, R.; Wang, J.; Ge, Y.; Zhang, R.; et al. β-expansion: A theoretical framework for fast and recursive construction of polar codes. In Proceedings of the GLOBECOM 2017—2017 IEEE Global Communications Conference, Singapore, 4–8 December 2017; pp. 1–6. [Google Scholar]
  17. Mori, R.; Tanaka, T. Performance of polar codes with the construction using density evolution. IEEE Commun. Lett. 2009, 13, 519–521. [Google Scholar] [CrossRef]
  18. Tal, I.; Vardy, A. How to construct polar codes. IEEE Trans. Inf. Theory 2013, 59, 6562–6582. [Google Scholar]
  19. Gulcu, T.C.; Ye, M.; Barg, A. Construction of polar codes for arbitrary discrete memoryless channels. IEEE Trans. Inf. Theory 2018, 64, 309–321. [Google Scholar]
  20. Chiu, M. Nonbinary I-polar coded modulation. IEEE Trans. Inform. Theory 2022, 68, 2266–2280. [Google Scholar]
  21. Cayci, S.; Koike-Akino, T.; Wang, Y. Nonbinary polar coding for multilevel modulation. In Proceedings of the 2019 Optical Fiber Communications Conference and Exhibition (OFC), San Diego, CA, USA, 3–7 March 2019; pp. 1–3. [Google Scholar]
  22. Falk, M.; Bauch, G.; Nissen, I. Analysis of non-binary polar codes over GF(3) and GF(5) with phase shift keying for short messages. In Proceedings of the 2020 IEEE 92nd Vehicular Technology Conference (VTC2020-Fall), Victoria, BC, Canada, 18 November–16 December 2020; pp. 1–5. [Google Scholar]
  23. Kschischang, F.R.; Pasupathy, S. Optimal nonuniform signaling forgaussian channels. IEEE Trans. Inform. Theory 1993, 39, 913–929. [Google Scholar] [CrossRef]
  24. Forney, G.; Gallager, R.; Lang, G.; Longstaff, F.; Qureshi, S. Efficientmodulation for band-limited channels. IEEE J. Sel. Areasin Commun. 1984, 2, 632–647. [Google Scholar]
  25. Bocherer, G.; Steiner, F.; Schulte, P. Bandwidth efficient and rate-matched low-density parity-check coded modulation. IEEE Trans. Commun. 2015, 63, 4651–4665. [Google Scholar] [CrossRef]
  26. Honda, J.; Yamamoto, H. Polar coding without alphabet extensionfor asymmetric models. IEEE Trans. Inform. Theory 2013, 59, 7829–7838. [Google Scholar] [CrossRef]
  27. Karakchieva, L.; Trifonov, P. Design of non-binary polar codes with shaping. In Proceedings of the 2023 XVIII International Symposium Problems of Redundancy in Information and Control Systems (REDUNDANCY), Moscow, Russia, 24–27 October 2023; 178–182. [Google Scholar]
  28. Yuan, R.; Fang, J.; Xu, R.; Bai, B.; Wang, J. A hybrid MLC and BICM coded-modulation framework for 6G. In Proceedings of the 2021 IEEE Globecom Workshops (GC Wkshps), Madrid, Spain, 7–11 December 2021; pp. 1–6. [Google Scholar]
  29. Xu, R.; Chen, P.; Liu, L.; Zhu, M.; Bai, B. Improved construction for multiplicative repetition based non-binary polar codes. In Proceedings of the 2024 IEEE Information Theory Workshop (ITW), Shenzhen, China, 24–28 November 2024; pp. 407–412. [Google Scholar]
  30. Robertson, P.; Worz, T. Bandwidth-efficient turbo trellis-coded modulation using punctured component codes. IEEE J. Sel. Areas Commun. 1998, 16, 206–218. [Google Scholar]
Figure 1. Factor graph of the MR-based polar codes over GF(4).
Figure 1. Factor graph of the MR-based polar codes over GF(4).
Entropy 27 00377 g001
Figure 2. Synthesized channel capacities of non-binary polar codes over the erasure channel.
Figure 2. Synthesized channel capacities of non-binary polar codes over the erasure channel.
Entropy 27 00377 g002
Figure 3. Synthesized channel capacities of non-binary polar codes over the AWGN channel.
Figure 3. Synthesized channel capacities of non-binary polar codes over the AWGN channel.
Entropy 27 00377 g003
Figure 4. The error probability of each decoding bit under the SC decoder.
Figure 4. The error probability of each decoding bit under the SC decoder.
Entropy 27 00377 g004
Figure 5. System model of shaping non-binary polar codes with hybrid MLC and BICM scheme.
Figure 5. System model of shaping non-binary polar codes with hybrid MLC and BICM scheme.
Entropy 27 00377 g005
Figure 6. System model of shaping non-binary polar codes with BICM scheme.
Figure 6. System model of shaping non-binary polar codes with BICM scheme.
Entropy 27 00377 g006
Figure 7. The code design procedure of MR-based non-binary polar codes with high-order modulation and probabilistic shaping.
Figure 7. The code design procedure of MR-based non-binary polar codes with high-order modulation and probabilistic shaping.
Entropy 27 00377 g007
Figure 8. Performance comparison among the bit-level construction and symbol-level construction.
Figure 8. Performance comparison among the bit-level construction and symbol-level construction.
Entropy 27 00377 g008
Figure 9. Performance comparison among the proposed scheme, conventional scheme, and binary polar codes, where N = 128 , 64 , R = 1 / 4 over GF(16), and the SC and CA-SCL decoding algorithms were used.
Figure 9. Performance comparison among the proposed scheme, conventional scheme, and binary polar codes, where N = 128 , 64 , R = 1 / 4 over GF(16), and the SC and CA-SCL decoding algorithms were used.
Entropy 27 00377 g009
Figure 10. Performance comparison among the proposed scheme, conventional scheme, and binary polar codes, where N = 64 , R = 1 / 2 over GF(16), and the SC and CA-SCL decoding algorithms were used.
Figure 10. Performance comparison among the proposed scheme, conventional scheme, and binary polar codes, where N = 64 , R = 1 / 2 over GF(16), and the SC and CA-SCL decoding algorithms were used.
Entropy 27 00377 g010
Figure 11. Performance comparison among the proposed scheme, conventional scheme, and binary polar codes, and scheme in [12] where N = 128 , R = 1 / 2 over GF(16) and the CA-SCL decoding algorithm was used.
Figure 11. Performance comparison among the proposed scheme, conventional scheme, and binary polar codes, and scheme in [12] where N = 128 , R = 1 / 2 over GF(16) and the CA-SCL decoding algorithm was used.
Entropy 27 00377 g011
Figure 12. Performance with 16-QAM over the AWGN channel.
Figure 12. Performance with 16-QAM over the AWGN channel.
Entropy 27 00377 g012
Figure 13. Probabilistic shaping performance with 16-QAM over the AWGN channel.
Figure 13. Probabilistic shaping performance with 16-QAM over the AWGN channel.
Entropy 27 00377 g013
Figure 14. Performance comparison between the BICM and hybrid MLC-BICM with 64-QAM over the AWGN channel.
Figure 14. Performance comparison between the BICM and hybrid MLC-BICM with 64-QAM over the AWGN channel.
Entropy 27 00377 g014
Table 1. The transition probabilities of the 6-th synthesized channel W ( y v ) .
Table 1. The transition probabilities of the 6-th synthesized channel W ( y v ) .
Q 8 6 ( y v ) v = 0 v = 1 v = 2 v = 3 v = 4 v = 5 v = 6 v = 7
y = y 1 0.83570.02690.02970.03070.02980.01540.01410.0177
y = y 2 0.030.02940.0270.83470.020.01390.0150.03
y = y 3 0.030.03090.83620.0260.0140.01790.02980.0152
y = y 4 0.0180.01390.01560.03030.02990.03020.02660.8355
y = y 5 0.0140.0180.030.0150.0290.030.8370.027
y = y 6 0.0160.03020.0180.0140.02690.83490.030.03
y = y 7 0.0260.83550.030.0310.0160.030.01750.014
y = y 8 0.03030.01520.01350.01830.83440.02770.030.0306
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Xu, R.; Chen, P.; Liu, L.; Zhu, M.; Bai, B. Bit-Level Construction for Multiplicative-Repetition-Based Non-Binary Polar Codes. Entropy 2025, 27, 377. https://doi.org/10.3390/e27040377

AMA Style

Xu R, Chen P, Liu L, Zhu M, Bai B. Bit-Level Construction for Multiplicative-Repetition-Based Non-Binary Polar Codes. Entropy. 2025; 27(4):377. https://doi.org/10.3390/e27040377

Chicago/Turabian Style

Xu, Rongchi, Peiyao Chen, Ling Liu, Min Zhu, and Baoming Bai. 2025. "Bit-Level Construction for Multiplicative-Repetition-Based Non-Binary Polar Codes" Entropy 27, no. 4: 377. https://doi.org/10.3390/e27040377

APA Style

Xu, R., Chen, P., Liu, L., Zhu, M., & Bai, B. (2025). Bit-Level Construction for Multiplicative-Repetition-Based Non-Binary Polar Codes. Entropy, 27(4), 377. https://doi.org/10.3390/e27040377

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop