Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Research on channel-related polar code with an optimum code length for wireless ultraviolet communications

Open Access Open Access

Abstract

In this paper a polar coding scheme for ultraviolet communication (UVC) systems is proposed and experimentally implemented to address the high path loss propagation, which severely deteriorates the communication performance. Firstly, we analyze the property of the path loss in the optical domain by applying the particle-wave duality to the existing path loss model. Considering the characteristic of the UV channel, we design a polar code with specific channel correlations, and study the computational complexity in terms of the code length. A new theoretical Bhattacharyya upper-bound for the general polar codes is introduced and applied to the UV channel in order to derive a minimum code length without impairing a required bit error rate performance. Numerical simulations and off-line experimental investigations validate the proposed polar coding scheme, which can effectively combat path loss induced performance deterioration with a relatively low computational complexity.

© 2017 Optical Society of America

Corrections

8 November 2017: A typographical correction was made to the author listing.

1. Introduction

Recent advances made in constructing low-cost semiconductor devices [1, 2], together with the scattered phenomenon [3], and the solar-blind (SB) feature [4, 5] have increased growing research activities on ultraviolet communications (UVCs), ranging from theoretical investigations (e.g., single-scatter model [6, 7], multi-scatter model [8,9]) to applications (e.g., networks [10], and military communications [11]).

In the context of applicative scenarios of UVC systems, two main factors may heavily deteriorate the communication performance, i.e., the inter-symbol-interference (ISI), and the path loss propagation. In applications of relatively long-distance and high-rate communications, ISI should be inevitably considered as a significant factor [12]. Increasing efforts have been spent on studying the ISI issue. For instance, [6] provide a single scatter model to describe the channel response function of ISI. In [12], a multi-antenna receiver has been designed to combat the ISI distortion.

In situations where the transmission span is shorter (e.g. < 100m), and the bit rate is lower, the ISI is not significant to have a noticeable impact on the communication performance. In such scenarios, the path loss propagation becomes the major factor [13–15]. To address this problem, a number of schemes utilizing space, frequency, and time resources - based on Shannon famous channel coding theorem - have been proposed [16,17]. However, the space and frequency schemes may be restricted because of the space-resource constrained scenarios and the narrow band of the solar-blind UV channel (i.e., 1.4 MHz).

Therefore, the time-resource schemes, whereby reduce the bit rate at relatively lower comparative to the channel capacity, would be a better option for UVC. In this scheme, channel coding schemes have been adopted to reduce the bit rate via the introduction of additional correlations between information bits, and consequently improve the communication performance. Several channel coding schemes, adopted from the traditional RF wireless communications, have been investigated in UVC. For example, Reed-solomon (RS) and the state-of-the-art low density parity check (LDPC) codes were adopted in [15] and achieved communication distance increase about 32% and 78% respectively. However, in these coding schemes the generator matrix did not consider the UV channel, which is different from the RF wireless channel. In [18] the performance of two improved belief propagation based decoding algorithms for LDPC codes based on the density evolution for the additive white Gaussian noise and Rayleigh channel was reported, which is widely adopted in RF wireless systems. In [19–21] the polar codes, which are based on channel polarization, with low encoding and decoding complexity were investigated with applications in multiple access channels, relay channels, quantum channels and quantum key distribution.

However, to the best of our knowledge, no related research works on the application of polar codes in UVC have been reported. In this paper, we investigate polar codes, with a relatively low computational complexity, in UVC to combat the path loss propagation induced attenuation. In general, the main contributions can be summarized as follows:

  1. By exploiting the UV channel characteristics, we re-generate the widely adopted 2 × 2 matrix-base polar code scheme. To be specific, the path loss UV channel is firstly characterized by computing statistical densities of the UV photons. Then, we re-arrange the code correlations via selecting the “good” splitting channels given the computed channel densities. For the sequential cancelation (SC) decoder, initialization is pursued, relying on the correct UV channel error rate, which can prevent error propagation. In this way, the revised polar code scheme in this investigation is suitable for UVC systems.
  2. We provide an optimum code length that can achieve the required code performance with reduced computational complexity. More specifically for the first time, we show a recursive Bhattacharyya upper-bound for the general polar code, which can accurately reflect the code performance (i.e., BER). Then, we apply the proposed upper-bound to the UV channel and derive the minimum code length, which results in reduced computation without impairing the required code performance.
  3. We develop a single input single output (SISO) UVC experimental platform in order to validate the proposed scheme. Both simulative results and off-line data illustrate that the proposed polar code outperforms the state-of-the-art LDPC scheme.

The rest of this paper is arranged as follows. Section II gives a path loss photon model by introducing the particle-wave duality. Section III provides the UV channel-related polar code. Numerical simulations and off-line experiments are described in section IV. We finally conclude this paper in Section V.

2. Problem and system formulation

In this section, we outline a SISO-UVC employing the polar codes as the channel coding method. The composition of the intensity modulated - direct detection (IM-DD) SISO-UV system can be divided into three parts; the Tx, the UV channel, and the Rx, as shown in Fig. 1.

 figure: Fig. 1

Fig. 1 Schematic diagram of the SISO-UVC system.

Download Full Size | PDF

2.1. System structure

At the Tx, a binary stream is applied to a polar codes encoder, the output of which is passed through an arbitrary express software and an arbitrary waveform generator. Then the signal (in on and off keying format) is generated via the intensity modulation of an encapsulated LED array (e.g., 4 × 9) which is supplied by DC level.

Following propagation through the free space, at the Rx the received photons are detected by a high sensitivity photon multiplier tube (PMT), with a narrow-band UV filter in front of it. The output of PMT is captured using a real time digital oscilloscope for off-line processing. Finally, the received signals are demodulated and decoded to recover the transmitted bit stream.

2.2. Path loss UV photon model

In a general UV channel, the path loss L, which is defined as a ratio between the emitted energy Et and the residue intensity received by the receiver Er, is usually employed to describe the average energy loss, and can be specified according to an empirical model, i.e. [14],

LEtEr=ξrαexp(βr),
where r is the transmission distance. α and β are the path loss exponent and the attenuation factor, respectively that are dependent on the elevation angles of the Tx and the Rx. ξ is the path loss factor, which depends on the atmospheric environment.

On the other hand, this energy loss can be also characterized by the photons statistics [22], where photon’s received status is governed by an independent and identically distributed (i.i.d) Binomial distribution, i.e., (Nt,pr) where Nt is the number of emitted photons, and the received probability, which is given by:

pr=NrNt=NrEpNtEp=ErEt=1L,
where Nr is the number of received photons. Ep = h · f is the photon’s energy, h is the Planck’s constant and f represents the frequency of UV light.

Next, we consider the UV channel model in terms of the transitional probability matrix (TPM). In the case of sending 1-bit, the transitional probability, p(0|1) can be determined according to the Binomial distribution (Nt,pr), i.e.:

p(0|1)=Nthn=0CNtnprn(1pr)Ntn,
where Nth is the computed detection threshold. When transmit 0-bit, the intensities detected at the receiver can be assumed to be a Gaussian type noise, with expectation µϵ and variance σϵ2, i.e, ϵ~N(μϵ,σϵ2). In this case, the transitional probability can be computed as follows:
p(1|0)=+Vth12πσ2exp((Vμ)22σ2)dV,
where Vth is the voltage threshold. µ = M · µϵ denotes the accumulative expectation of ϵ by sampling M times of signals. σ2=Mσϵ2 represents the accumulative variance of ϵ. Note that, the relation between the two thresholds in Eqs. (3)(4), i.e., Nth, Vth can be given as:
Nth=VthTbhfηfGampGSc,
where ηf represents the transmissivity of narrow bandpass filter, Gamp and G are the gains of transimpedance amplifier and PMT respectively, and Sc is sensitivity of the cathode radiant of the PMT. As a result, we can determine Nth and Vth by minimizing the erroneous probability of the UV channel.

3. UV channel-related polar code

In this section we elaborate the polar code for UVC in terms of the BER performance and the computational complexity. As for the BER performance, we re-compute the error probabilities of the split channels premised on the UV channel, in order to strengthen the code correlations of the 2 × 2 core matrix-based polar code. In this way, the proposed channel-related polar code scheme differs from the existing polar schemes used in traditional wireless communications. Then, to further improve the BER performance, initialization for the SC decoder is operated based on the computed UV channel error rate. Furthermore, we consider the trade-off between the code performance and the computational complexity, which are directly related to the code length N = 2n, where n > 0 is the channel combination step. A relatively long N leads to improved performance at the cost of increased computational complexity. In order to determine the optimum N, we compute a Bhattacharyya upper-bound by inferring on the constructed binary tree, and fit it to the specific UV channel.

3.1. Polar code encoder

Assuming K input bits, denoted as u1K=[u1,u2,,uK]T, the polar encoded symbol y1N=[y1,y2,,yN]T can be derived as:

y1N=GNx1N,x1N=(SKN)Tu1K,
where GN is the N × N generator matrix. SKN is a K × N matrix relied on the selection of splitting channels, by which the information bits u1K can be expanded into x1N=[x1,x2,,xN]T.

The generator matrix GN is from the nth Kronecker power G2=F=[1011], generating an N-input N-output channel (i.e., WN:XNGNYN, where X={0,1}, and Y={0,1}) via combining two N/2-input N/2-output channels (i.e., WN/2). In this way, the recursive flow of GN can be described as follows: i) N-input sequentially pass through N/2 F-matrix; ii) the results are permutated by ΠN, whereby the 1st and 2nd N/2-element are those with original indexes assigned as odd and even, respectively; iii) the rearranged elements are passed through two WN/2 with generator matrixes of GN/2. Therefore, we have [23]:

GN=(IN/2F)N(I2GN/2),
where IN is an N × N identity matrix, ⊗ is kronecker product. Note that, for n = 0 we have G1 = I1.

The combination channel WN can be equivalently seen as the composition of N splitting channels i.e., WN={WN(i):XY×Xi1,1iN} with every splitting channel composed of a scaler input, which corresponds to the input of GN, and a hybrid vector output. That is, for K < N information bits K number of noiseless splitting channels needs to be selected, which are determined by Bhattacharyya parameters Z(W1(1)) of the actual channel W. For a discrete memory less channel, Z(W1(1)) is given by, i.e., [23]:

Z(WN(i))yY×Xi1p(y|0)p(y|1),
where p(y|x) is the channel transitional probability.

The recursive properties of splitting channels can be determined by the iteration of Bhattacharyya values, which is given as [23]:

Z(WN(i))={2Z(WN/2(i/2+1))Z2(WN/2(i/2+1))iis odd,Z2(WN/2(i/2))iis even.

Note that, the splitting channel selection process highly depends on the initialization of Z(W1(1)). If Z(W1(1)) cannot characterize the property of a specific UV channel, then the propagating Bhattacharyya values will be considered unreliable, which will subsequently affect the code correlations and the BER performance. For correct initialization of Z(W1(1)) we introduce the UV TPM by substituting (3)(4) into Eq. (8), i.e.:

Z(W1(1))=(1p(1|0))p(0|1)+p(1|0)(1p(0|1)).
The selection of splitting channels can be seen as identifying those with relatively low Bhattacharyya values. With the help of (10), it is straight forward to select K = ⌊R · N⌋ splitting channels for the information bits, where R is code rate. That is, denoting as An={a1,a2,aK} is the index set whose elements are indexes of selected noiseless splitting channels. Thereby we can produce the SKN matrix as:
SKN=(si,j),si,j={1j=ai,0jai.
Therefore, taking (11) into (6), we can derive x1N from u1K, and subsequently the y1N.

3.2. Successive cancelation polar decoder

Considering the selection process of K splitting channels, there exist code correlations in the received data, therefore a SC decoding can be adopted as a baseline algorithm with a very low complexity. The SC decoder can estimate and decide the information bits based on the recursive structure of polar encoder. Note that, SC decoding is a suboptimal algorithm due to its susceptibility to error propagation. However, its error probability can be made arbitrarily small provided N is sufficiently long and R is less than the capacity. Here, we define the likelihood density per each splitting channel WN(i) as:

LN(i)(r1N,u^1i1)p(r1N,u^1i1|u^i=0)p(r1N,u^1i1|u^i=1),
where r1N=[r1,r2,,rN]T is the vector of received data, and u^1i1=[u^1,u^2,,u^i1]T is the vector of estimation of transmitted data. The recursive expression for LN(i)(r1N,u^1i1) can be given as [23]:
LN(2i1)(r1N,u^12i1)=LN/2(i)(r1N/2,u^1,12i2u^1,22i2)LN/2(i)(rN/2+1N,u^1,22i2)+1LN/2(i)(r1N/2,u^1,12i2u^1,22i2)+LN/2(i)(rN/2+1N,u^1,22i2),
and
LN(2i)(r1N,u^12i1)=[LN/2(i)(r1N/2,u^1,12i2u^1,22i2)]12u^2i1LN/2(i)(rN/2+1N,u^1,22i2),
where ⊕ is modulo-2 operation, and ab is the remainder of (a + b)/2. u^1,12i2=[u^1,u^3,,u^2i3]T and u^1,22i2=[u^2,u^4,,u^2i2]T represents the odd and even vectors extracted from u^12i2, respectively.

Note that, initialization of L1(1)(r1) in (13)(14) is important, since an improper L1(1)(r1) that cannot characterize the stochastic of the UV channel, thus leading to the further propagative likelihood error, and thereby deterioration of the decoding performance. According to (12), the computation of L1(1)(r1) can be given as:

L1(1)(r1)={p(1|0)1p(0|1)r1=1,1p(1|0)p(0|1)r1=0.

Therefore, the SC decoding scheme can be operated by recursively computing the likelihood density of each splitting channels in (13) and (14).

3.3. Optimum polar code length for an UV channel

To determine the optimum N we need to analyze the relations between N and the BER performance. First, we deduce a newly recursive Bhattacharyya upper-bound with respect to n. Such an upper-bound can reflect the BER performance of a general formed polar code. Next, considering the upper-bound in an UV channel we determine the suitable value for n, which trade-offs the computational burden with the code performance.

3.3.1. Bhattacharyya upper-bound of polar code

Here, we focus on analyzing the general form of polar code, and compute a new Bhattaharyya upper-bound. That is, the Bhattacharyya values of the selected splitting channels (i.e., An) corresponds to the BER of the polar code defined in terms of sum of Bhattacharyya values (SBV) as given by [23]:

BERnWN(i)AnZ(WN(i)).

Note that, (16) intuitively outlines that the BER of polar code is composed of the erroneous probabilities of the total selected splitting channels. However, form (16) it is difficult to compute the BER upper-bound for higher values of N, e.g., N = 220. Therefore, a computational approach that can be used to determine N is needed. More specifically, we show a recursive upper-bound for SBV investigating the generating process of each splitting channels.

(a) Binary tree model

The generation process of splitting channels best illustrated with reference to the binary tree model as shown in Fig. 2. As depicted the root node is the channel W1(1) with Bhattacharyya value of Z(W1(1)), which branches out into the upper and lower channels W2(1) and W2(2), respectively with Bhattacharyya values of Z(W2(1))=2Z(W1(1))Z2(W1(1)) accordingly. This proves of channel branching continuous. Note that, Z(W2(2))=Z2(W1(1)) is located at the level nth kevel of the tree with node numbering in ascending order from the top. The natural indexing of nodes in the tree is based on the bit sequences: i) the root node is indexed with the null sequence; ii) the upper and lower nodes at the level 1 are indexed as 0 and 1, respectively; iii) for a given node at the level n with index of b1b2bn, the proceeding upper and lower nodes will have the sequences of b1, b2,·⋯ bn0 and b1b2bn1, respectively. Based on this process, W2n(i) is located at the node b1b2bn with i=1+nj=1bj2nj, and labelled as Wb1b2bn.

 figure: Fig. 2

Fig. 2 Binary tree based process of the UV channel splitting. Each branch denotes a unique formulation of one splitting channel, and links between any two nodes represents the dependence of two channels.

Download Full Size | PDF

Using the binary tree, Bhattacharyya value upper-bound can be determined by selecting K-sequence with K smallest Bhattacharyya values. E.g., the channel W11⋯1 with a sequence of N-element of 1 assigned with the lowest Bhattacharyya value must be selected; whilst W00⋯0 with the highest Bhattacharyya value should not be selected. However, by doing so there will error i.e., for a given relatively large R which satisfies R < I(W) selecting channels becomes an issue. This is because when assigning Bhattacharyya value the order of N-elements of 0 and 1 must also be considered. E.g., in channels with n/2 number of 1, Wb1=0bn/2=0bn/2+1=1bn=1 will have a larger Bhattacharyya value than Wb1=1bn/2=1bn/2+1=0bn=0.

(b) Recursive upper-bound

Assume a known channel selection at n step as An, accompanying with its SBV as ε(An)WN(i)AnZ(WN(i)). We will build a channel selection, denoted as A˜n+2 for the n + 2 step from the known An. Note that the SBV of A˜n+2 must be greater than the real selected An+2, i.e.,

ε(A˜n+2)>ε(An+2).
Hence, a recursive upper-bound can be specified by properly constructing A˜n+2. One proposal of A˜n+2 can be specified with following Remarks.

Remark 1 For some Wb1b2bnAn with relatively small Z(Wb1b2bn), Wb1b2bn11, Wb1b2bn10, Wb1b2bn01 and Wb1b2bn00 should belong to A˜n+2. In this case, all Z(Wb1b2bn11), Z(Wb1b2bn10),Z(Wb1b2bn01) and Z(Wb1b2bn00) are small, we use (2Z(Wb1b2bn)Z2(Wb1b2bn))2 to approximate the sum, i.e.,

(2Z(Wb1b2bn)Z2(Wb1b2bn))2Z(Wb1b2bn11)+Z(Wb1b2bn10)+Z(Wb1b2bn01)+Z(Wb1b2bn00).

Remark 2 For other Wb1*b2*bn*An whose Z(Wb1* b2*bn*) are larger, we firstly select Wb1* b2*bn*11, and Wb1* b2*bn*10, given the smaller Bhattacharyya values than their siblings i.e., Wb1* b2*bn*01, and Wb1* b2*bn*00. Then, in order to keep the SBV of A˜n+2 low, we replace the selection of Wb1* b2*bn*01 or Wb1* b2*bn*11, depending on whether there exists a Wb1b2bnAn whose Z(Wb1* b2*bn*11)<Z(Wb1* b2*bn*01) or Z(Wb1* b2*bn*11). In this way, we also use (2Z(Wb1b2bn)Z2(Wb1b2bn01))2 to approximate the sum, i.e.,

(2Z(Wb1b2bn)Z2(Wb1b2bn))2Z(Wb1b2bn11)+Z(Wb1b2bn10)+Z(Wb1b2bn01)+Z(Wb1b2bn00).

Given the Remark 1, and Remark 2, the SBV of A˜n+2, i.e., ε(A˜n+2) can be computed with the approximations in Eqs. (18)(19), i.e.,

ε(A˜n+2)WN(i)An(2Z(WN(i)Z2(WN(i)))2.

It is noteworthy that a function extracted from the right-hand of (20), i.e., f(z) = (2z − z2)2 is a convex formula, in the range z ∈ (0, 1). According to the convex characteristic, the right-hand of (20) can be thereby re-written as:

 WN(i)An(2Z(WN(i))Z2(WN(i)))2<|An|(2 WN(i)AnZ(WN(i))|An|( WN(i)AnZ(WN(i))|An|)2)2<(a)(2WN(i)AnZ(WN(i))( WN(i)AnZ(WN(i)))2)2<(2ε(An)ε2(An))2
where (a) holds for the condition  WN(i)AnZ(WN(i))<2(11/|An|)/(11/|An|3/2), that can be easily achieved since  WN(i)AnZ(WN(i)) is normally lesser than 0.5. Taking (20)(21) into (17), the recursive upper-bound can be given by
ε(An+2)<(2ε(An)ε2(An))2.

In Eq. (22), the initial n is relevant with the speed of polarization given different F [24]. Typically with F=[1011], the initial n should be no lesser than 4 to ensure stability of channel polarization, i.e., we assigned the initial values of n as 4 and 5 for even and odd indexes respectively given by:

ζ={ε(A4)nis evenε(A5)nis odd,
where ζ is the initial value.

3.3.2. Deducing code length

Based on the Bhattacharyya recursive upper-bound, the suitable code length N in UVC can be determined via it’s exponent (n = log2 N), as follow: (i) we firstly initialize ζ by Eq. (23) i.e., ε(A4)=iA4Z(W16(i)) and ε(A5)=iA5Z(W32(i)), with respective |A4|=16R and |A5|=32R. For instance, in the case R = 1/2, we have ε(A4)=Z16(W1(1))+278Z8(W1(1))+28Z4(W1(1)) and ε(A5)=Z32(W1(1))+65814Z16(W1(1))+71548Z8(W1(1)); (ii) for a given allowable BER value ϱ (i.e., BERn ϱ), we can obtain a proper n by inferring an inequality, i.e.,

BERn<ε(An)ϱ.

According to the upper-bound in (22), relations in (24) can be subsequently described as:

ε(An)(2ε(An2)ε2(An2))2<4ε2(An2)<14(4ζ)2g(n)ϱ,
where
g(n)={n42nis even,n52nis odd,

By solving (25), the appropriate step n can be derived as:

n=g1(log2(2+log2(ϱ)2+log2(ζ))),
where g−1(·) denotes the inverse function of g(·). Based on (27), the optimum code length N = 2n can be determined.

4. Numerical and experimental results

In this section, numerical simulations and off-line experimental investigations are performed to evaluate the proposed polar coding scheme from both the communication performance and the complexity perspectives. First of all, we examine the statistical characteristics of the UV channel, which is served as the basis for subsequent designs of the polar code. Next, verification of the appropriate code length is provided. Finally, we evaluate the communication performance as well as the computational complexity of the proposed UV channel-related polar code.

The experimental test-bed is shown in Fig. 3. At the Tx, the emitted power of the UV LED array is assigned as Pt = 0.1mW at the wavelength of 265nm. The data bit duration Tb is 8us. For the path loss model, we assign α = 2.117, β = 0, and ξ = 285.6 in accordance with the measured channel parameters. At the Rx, the transmissivity ηf is 0.2, the transimpedance amplifier gain Gamp = 22 × 103Ω, the PMT gain G = 1.0 × 107, and the sensitivity of the cathode radiant Sc = 62 × 10−3A/W. The signal was captured using a real time oscilloscope with a sampling time is Ts = 0.4µs. The expectation and variance of the thermal noise are µ = 0.0220356 and σ2 = 8.87294 × 10−5, respectively.

 figure: Fig. 3

Fig. 3 Experimental test-bed of UVC system: (a) Tx, and (b) Rx.

Download Full Size | PDF

4.1. Statistical characteristic of the path loss based photon channel

In order to examine statistics of the UV path loss channel, we have to validate the use of Binomial distribution on characterizing the number of received photons. To do this, the theoretical expectation of the number Nr is firstly compared with the experimental value (i.e., N¯r) in Fig. 4(a). The experimental N¯r is calculated by averaging J = 104 samples of Nr,j, j = 1, …, J, which can be transformed via the voltage Vr,j measured by the oscilloscope, i.e.,

N¯r=1JJj=1Nr,j=1JJj=1Vr,jTbhfηfGampGSc.
It is observed from Fig. 4(a) that the experimental N¯r is closed to the theoretical Nr, with the respect to various distance r. For instance, at r = 40m, Nr = 150 is approaching with N¯r=145.

 figure: Fig. 4

Fig. 4 Verification of the statistical characteristics of the UV path loss model.

Download Full Size | PDF

Then, we build a histogram of Nr,j in Fig. 4(b) to test the statistics density of the number of received photons. It can be found that the histogram is almost a Binomial distribution, with expectation as Nr. Therefore, these two results provide a verification of the statistics characteristic of the UV channel model, which can be used for designing channel-related polar coding scheme.

4.2. Optimum polar code length for UV channel

In the second experiments, we verify the proposed theoretical code length of the UV channel-related polar code by following steps. Firstly, the proposed recursive Bhattacharyya upper-bound for general polar codes is tested. Then, given the correctness of general cases, we testify the appropriate code length in the UV scenarios.

(a) Test of recursive Bhattacharyya upper-bound

The proposed recursive Bhattacharyya upper-bound given by Eqs. (22)(23) is shown in Fig. 5, compared with the real SBV in Eq. (16) and a popular used bound in [24]. We can firstly notice that as the code length N = 2n rises, the Bhattacharyya values decrease, illustrating the fact that the larger code length gives a lower BER. Then, a lower initial Z(W1(1)), meaning a better channel environment, leads to a lower Bhattacharyya values (reflecting a lower BER). Thirdly, with the increment of the code rate (e.g., from R = 0.5 to R = 0.75), the Bhattacharyya value is increasing, which suggests a worse BER performance as the code rate rises.

 figure: Fig. 5

Fig. 5 Demonstration of the proposed recursive Bhattachaeyya upper-bound, which can be used as an easily computed version as real SBVs, reflecting the BER performance.

Download Full Size | PDF

More intriguingly, it is seen that the proposed upper-bound matches well with the real SBV; whilst the popular used bound deviates the real SBV, suggesting the proposed upper-bound can be adopted as an easily computed version of the real SBV that reflects the BER of general polar codes. Hence, we can use this proposed recursive upper-bound to compute a proper code length in the context of UVCs.

(b) Test of proper code length in UVCs

We further evaluate the appropriate code length of the polar code under UV scenarios. In Fig. 6(a), the BER performances of the channel-related polar code with respect to the the changes of code length N = 2n is illustrated. We can easily observe that the BER decreases with the increase of the code length. Then, it is seen that as the distance increases (e.g., from r = 45m, to r = 55m), the BER rises up drastically. Therefore, it is worthy to determine proper code length under different communication distances. And there comes the Fig. 6(b).

 figure: Fig. 6

Fig. 6 Verification of appropriate code length for UV channel.

Download Full Size | PDF

Given a requested BER performance as ϱ = 10−6, theoretical proper code length given by Eq. (27) as well as simulated ones is provided in Fig. 6(b), with respect to the changes of distance r. We can observe that theoretical one almost matches the simulated result, suggesting that we can use the theoretical computation to determine a minimum code length without raising the BER larger than the requested performance. Therefore, a lower complexity of coding and decoding process in realizing the UV channel-related polar code can be achieved.

4.3. Performance of UV channel-related polar code

In this experiment, we compare the BER performances of the UV channel-related polar code with the existing LDPC scheme [15]. As configured, code rate is assigned as R = 0.5 for both the polar code and LDPC code, with code length as 512 and 960 respectively. It can be observed from Fig. 7 that, both polar code and LDPC can lower the BER in the UV scenarios. Moreover, the proposed polar code outperforms the LDPC scheme. From both simulative and experimental results, we can see that the polar code can enhance an extra 15% communication distance at the requested BER as ϱ = 10−6, in contrast with the LDPC scheme. This result gives a great promising value of the proposed polar code on addressing the UV path loss propagation.

 figure: Fig. 7

Fig. 7 Measured and simulated BER comparison as a function of the transmission span for the polar code, LDPC, and un-code OOK.

Download Full Size | PDF

Next, we evaluate the computational complexity by means of the number of multiplications. For the encoder, the number of multiplications for the channel-related polar code is 512 × 512 = 262144; whilst the LDPC scheme takes 480 × 960 = 460800 [18]. For the soft-decision decoder, the number of multiplications for the SC-decoder of polar code is 512 × log2 512 = 4608, which is much lower than 921600 for the LDPC.

Therefore, these two comparisons show the promising prospective of this channel-related polar code in UVC systems in order to improve transmission performance.

5. Conclusion

In communication systems, it is advantageous to achieve the desired system performance with a low level of computational complexity. In low data rate and short distance UVC systems the path loss propagation is a major limiting factor. In this paper, we have outlined the design of an UV channel-related polar coding scheme, which is ideal for UVC in addressing the path loss. We considered the complexity issue in terms of the code length. By theoretically deducing Bhattacharyya upper-bound of the general polar code, and fitting it into UV channels, we derived a minimal code length without impairing on the required code performance. Numerical simulations and experimental investigations were performed to validate the proposed polar code scheme. We showed that, the proposed scheme offered an improve performance with reduced computational complexity compared with existing schemes, therefore illustrating the suitability of the proposed scheme for future short distance UVC systems.

Funding

National Natural Science Foundation of China (NSFC) (61471052); Royal Society Newton International Exchanges between U.K. and China under Grant NI140188; Shenzhen Technology Creation and Research Foundation (20160080).

References and links

1. M. Shatalov, J. Zhang, A. Chitnis, V. Adivarahan, J. Yang, G. Simin, and M. A. Khan, “Deep ultraviolet light-emitting diodes using quaternary alingan multiple quantum wells,” IEEE J. Sel. Top. Quantum Electron. 8(2), 302–309 (2002). [CrossRef]  

2. S.-C. Shen, Y. Zhang, D. Yoo, J.-B. Limb, J.-H. Ryou, P. D. Yoder, and R. D. Dupuis, “Performance of deep ultraviolet gan avalanche photodiodes grown by mocvd,” IEEE Photon. Technol. Lett. 19(21), 1744–1746 (2007). [CrossRef]  

3. H. Ding, G. Chen, A. K. Majumdar, B. M. Sadler, and Z. Xu, “Modeling of non-line-of-sight ultraviolet scattering channels for communication,” IEEE J. Sel. Areas Commun. 27(9), 1535–1544 (2009). [CrossRef]  

4. E. Trakhovsky, A. Ben-Shalom, U. P. Oppenheim, A. D. Devir, L. S. Balfour, and M. Engel, “Contribution of oxygen to attenuation in the solar blind uv spectral region,” Appl. Optics 28(8), 1588–1591 (1989). [CrossRef]  

5. Z. Xu and B. M. Sadler, “Ultraviolet communications: potential and state-of-the-art,” IEEE Commun. Mag. 46(5), 67–73 (2008).

6. M. R. Luettgen, D. M. Reilly, and J. H. Shapiro, “Non-line-of-sight single-scatter propagation model,” J. Opt. Soc. Am. A 8(12), 1964–1972 (1991). [CrossRef]  

7. M. A. Elshimy and S. Hranilovic, “Non-line-of-sight single-scatter propagation model for noncoplanar geometries,” J. Opt. Soc. Am. A 28(3), 420–428 (2011). [CrossRef]  

8. R. J. Drost, T. J. Moore, and B. M. Sadler, “Uv communications channel modeling incorporating multiple scattering interactions,” J. Opt. Soc. Am. A 28(4), 686–695 (2011). [CrossRef]  

9. D. Han, X. Fan, K. Zhang, and R. Zhu, “Research on multiple-scattering channel with monte carlo model in uv atmosphere communication,” Appl. Opt. 52(22), 5516–5522 (2013). [CrossRef]   [PubMed]  

10. L. Wang, Y. Li, and Z. Xu, “On connectivity of wireless ultraviolet networks,” J. Opt. Soc. Am. A 28(10), 1970–1978 (2011). [CrossRef]  

11. J. Y. Li and K. N. Qui, “Military application of uv communication [j],” Opt. Optoelectr. Technol. 007, TN9291 (2005).

12. H. Qin, Y. Zuo, F. Li, R. Cong, L. Meng, and J. Wu, “Analytical link bandwidth model based square array reception for non-line-of-sight ultraviolet communication,” Opt. Express 25(19), 22693–22703 (2017). [CrossRef]  

13. P. Luo, M. Zhang, D. Han, and Q. Li, “Performance analysis of short-range nlos uv communication system using monte carlo simulation based on measured channel parameters,” Opt. Express 20(21), 23489–23501 (2012). [CrossRef]  

14. G. Chen, Z. Xu, H. Ding, and B. M. Sadler, “Path loss modeling and performance trade-off study for short-range non-line-of-sight ultraviolet communications,” Opt. Express 17(5), 3929–3940 (2009). [CrossRef]   [PubMed]  

15. M. Wu, D. Han, X. Zhang, F. Zhang, M. Zhang, and G. Yue, “Experimental research and comparison of ldpc and rs channel coding in ultraviolet communication systems,” Opt. Express 22(5), 5422–5430 (2014). [CrossRef]   [PubMed]  

16. L. Guo, X. Mu, X. Pan, K. Liu, D. Meng, and D. Han, “DSTBC experimental research on uv communication system,” Photon. Netw. Commun. 33, 1–8 (2016).

17. D. Kedar, “Multiaccess interference in a non-line-of-sight ultraviolet optical wireless sensor network,” Appl. Opt. 46(23), 5895–5901 (2007). [CrossRef]   [PubMed]  

18. J. Chen and M. P. Fossorier, “Density evolution for two improved bp-based decoding algorithms of ldpc codes,” IEEE Commun. Lett. 6(5), 208–210 (2002). [CrossRef]  

19. Z. Wei, B. Li, and C. Zhao, “On the polar code for the 60-ghz millimeter-wave systems,” Eur. J. Wirel. Commun. 2015(1), 31 (2015). [CrossRef]  

20. P. Shi, W. Tang, S. Zhao, and B. Wang, “Performance of polar codes on wireless communication channels,” in 14th International Conference on Communication Technology (ICCT2012), pp. 1134–1138.

21. K. Niu, K. Chen, J. Lin, and Q. Zhang, “Polar codes: Primary concepts and practical decoding algorithms,” IEEE Commun. Mag. 52(7), 192–203 (2014). [CrossRef]  

22. M. A. El-Shimy and S. Hranilovic, “Binary-input non-line-of-sight solar-blind uv channels: Modeling, capacity and coding,” J. Opt. Commun. Netw. 4(12), 1008–1017 (2012). [CrossRef]  

23. E. Arikan, “Channel polarization: A method for constructing capacity-achieving codes for symmetric binary-input memoryless channels,” IEEE Trans. Inf. Theory 55(7), 3051–3073 (2009). [CrossRef]  

24. S. B. Korada, E. Sasoglu, and R. Urbanke, “Polar codes: Characterization of exponent, bounds, and constructions,” IEEE Trans. Inf. Theory 56(12), 6253–6264 (2010). [CrossRef]  

Cited By

Optica participates in Crossref's Cited-By Linking service. Citing articles from Optica Publishing Group journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (7)

Fig. 1
Fig. 1 Schematic diagram of the SISO-UVC system.
Fig. 2
Fig. 2 Binary tree based process of the UV channel splitting. Each branch denotes a unique formulation of one splitting channel, and links between any two nodes represents the dependence of two channels.
Fig. 3
Fig. 3 Experimental test-bed of UVC system: (a) Tx, and (b) Rx.
Fig. 4
Fig. 4 Verification of the statistical characteristics of the UV path loss model.
Fig. 5
Fig. 5 Demonstration of the proposed recursive Bhattachaeyya upper-bound, which can be used as an easily computed version as real SBVs, reflecting the BER performance.
Fig. 6
Fig. 6 Verification of appropriate code length for UV channel.
Fig. 7
Fig. 7 Measured and simulated BER comparison as a function of the transmission span for the polar code, LDPC, and un-code OOK.

Equations (28)

Equations on this page are rendered with MathJax. Learn more.

L E t E r = ξ r α exp ( β r ) ,
p r = N r N t = N r E p N t E p = E r E t = 1 L ,
p ( 0 | 1 ) = N t h n = 0 C N t n p r n ( 1 p r ) N t n ,
p ( 1 | 0 ) = + V t h 1 2 π σ 2 exp ( ( V μ ) 2 2 σ 2 ) d V ,
N t h = V t h T b h f η f G amp G S c ,
y 1 N = G N x 1 N , x 1 N = ( S K N ) T u 1 K ,
G N = ( I N / 2 F ) N ( I 2 G N / 2 ) ,
Z ( W N ( i ) ) y Y × X i 1 p ( y | 0 ) p ( y | 1 ) ,
Z ( W N ( i ) ) = { 2 Z ( W N / 2 ( i / 2 + 1 ) ) Z 2 ( W N / 2 ( i / 2 + 1 ) ) i is odd , Z 2 ( W N / 2 ( i / 2 ) ) i is even .
Z ( W 1 ( 1 ) ) = ( 1 p ( 1 | 0 ) ) p ( 0 | 1 ) + p ( 1 | 0 ) ( 1 p ( 0 | 1 ) ) .
S K N = ( s i , j ) , s i , j = { 1 j = a i , 0 j a i .
L N ( i ) ( r 1 N , u ^ 1 i 1 ) p ( r 1 N , u ^ 1 i 1 | u ^ i = 0 ) p ( r 1 N , u ^ 1 i 1 | u ^ i = 1 ) ,
L N ( 2 i 1 ) ( r 1 N , u ^ 1 2 i 1 ) = L N / 2 ( i ) ( r 1 N / 2 , u ^ 1 , 1 2 i 2 u ^ 1 , 2 2 i 2 ) L N / 2 ( i ) ( r N / 2 + 1 N , u ^ 1 , 2 2 i 2 ) + 1 L N / 2 ( i ) ( r 1 N / 2 , u ^ 1 , 1 2 i 2 u ^ 1 , 2 2 i 2 ) + L N / 2 ( i ) ( r N / 2 + 1 N , u ^ 1 , 2 2 i 2 ) ,
L N ( 2 i ) ( r 1 N , u ^ 1 2 i 1 ) = [ L N / 2 ( i ) ( r 1 N / 2 , u ^ 1 , 1 2 i 2 u ^ 1 , 2 2 i 2 ) ] 1 2 u ^ 2 i 1 L N / 2 ( i ) ( r N / 2 + 1 N , u ^ 1 , 2 2 i 2 ) ,
L 1 ( 1 ) ( r 1 ) = { p ( 1 | 0 ) 1 p ( 0 | 1 ) r 1 = 1 , 1 p ( 1 | 0 ) p ( 0 | 1 ) r 1 = 0 .
BER n W N ( i ) A n Z ( W N ( i ) ) .
ε ( A ˜ n + 2 ) > ε ( A n + 2 ) .
( 2 Z ( W b 1 b 2 b n ) Z 2 ( W b 1 b 2 b n ) ) 2 Z ( W b 1 b 2 b n 11 ) + Z ( W b 1 b 2 b n 10 ) + Z ( W b 1 b 2 b n 01 ) + Z ( W b 1 b 2 b n 00 ) .
( 2 Z ( W b 1 b 2 b n ) Z 2 ( W b 1 b 2 b n ) ) 2 Z ( W b 1 b 2 b n 11 ) + Z ( W b 1 b 2 b n 10 ) + Z ( W b 1 b 2 b n 01 ) + Z ( W b 1 b 2 b n 00 ) .
ε ( A ˜ n + 2 ) W N ( i ) A n ( 2 Z ( W N ( i ) Z 2 ( W N ( i ) ) ) 2 .
  W N ( i ) A n ( 2 Z ( W N ( i ) ) Z 2 ( W N ( i ) ) ) 2 < | A n | ( 2   W N ( i ) A n Z ( W N ( i ) ) | A n | (   W N ( i ) A n Z ( W N ( i ) ) | A n | ) 2 ) 2 < ( a ) ( 2 W N ( i ) A n Z ( W N ( i ) ) (   W N ( i ) A n Z ( W N ( i ) ) ) 2 ) 2 < ( 2 ε ( A n ) ε 2 ( A n ) ) 2
ε ( A n + 2 ) < ( 2 ε ( A n ) ε 2 ( A n ) ) 2 .
ζ = { ε ( A 4 ) n is even ε ( A 5 ) n is odd ,
BER n < ε ( A n ) ϱ .
ε ( A n ) ( 2 ε ( A n 2 ) ε 2 ( A n 2 ) ) 2 < 4 ε 2 ( A n 2 ) < 1 4 ( 4 ζ ) 2 g ( n ) ϱ ,
g ( n ) = { n 4 2 n is even , n 5 2 n is odd ,
n = g 1 ( log 2 ( 2 + log 2 ( ϱ ) 2 + log 2 ( ζ ) ) ) ,
N ¯ r = 1 J J j = 1 N r , j = 1 J J j = 1 V r , j T b h f η f G amp G S c .
Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.