2018
DOI: 10.1109/access.2018.2801561
|View full text |Cite
|
Sign up to set email alerts
|

Entropy Coding Aided Adaptive Subcarrier-Index Modulated OFDM

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
24
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 15 publications
(24 citation statements)
references
References 47 publications
0
24
0
Order By: Relevance
“…• Different from the adaptive Huffman coded OFDM-IM schemes proposed in [23] and [24] that focus on the optimization of the architecture of the Huffman tree, we instead focus on the optimization of the bijective mapping relation between all legitimate SAPs and leaves on a given Huffman tree, i.e., the variable-length bit sequences. Therefore, EHC-OFDM-IM can be applied on top of the optimized systems constructed in [23] and [24] to further enhance their error performance.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…• Different from the adaptive Huffman coded OFDM-IM schemes proposed in [23] and [24] that focus on the optimization of the architecture of the Huffman tree, we instead focus on the optimization of the bijective mapping relation between all legitimate SAPs and leaves on a given Huffman tree, i.e., the variable-length bit sequences. Therefore, EHC-OFDM-IM can be applied on top of the optimized systems constructed in [23] and [24] to further enhance their error performance.…”
Section: Introductionmentioning
confidence: 99%
“…over {G n (ξ n )} N n=1 when the allocated power for active subcarriers is independent of H, which yields(23), where (a) follows from by the independence among subcarriers and Γ( ) = ∞ 0 u −1 exp(−u)du is the complete gamma function. Substituting(23) into(17) gives the approximate BLER when x(s, m) is transmitted.Finally, according to(6),(14) and the Huffman encoding rules, it is evident that there exist M K legitimate OFDM blocks adopting the same SAP. Hence, it is straightforward to explicitly express the average BLER asPe = 1 M K x(s,m)∈X p(s)P e (x(s, m)).(24)V.…”
mentioning
confidence: 99%
“…• Different from the classic Huffman coded OFDM-IM scheme proposed in [22] that does not rely on any channel feedback, we employ CSI at the transmitting side to provide an adaptive optimization mechanism. • Different from the adaptive Huffman coded OFDM-IM schemes proposed in [23] and [24] that focus on the optimization of the architecture of the Huffman tree, we instead focus on the optimization of the bijective mapping relation between all legitimate SAPs and leaves on a given Huffman tree, i.e., the variable-length bit sequences. Therefore, EHC-OFDM-IM can be applied on top of the optimized systems constructed in [23] and [24] to further enhance their error performance.…”
Section: Introductionmentioning
confidence: 99%
“…To address these issues related to the mapping of source bit sequences to permutation patterns, a few recent contributions have focused on the adaptation of binary Huffman coding [19] for permutation/index codebook design [11], [17], [20]- [23]. Here, a bijective mapping between information bit sequences and the permutation/index patterns is constructed with the aid of a full binary tree; patterns are associated with leaves in the tree, and corresponding bit sequences are defined according to a labeling rule (used in the Huffman algorithm) pertaining to the respective paths from each leaf to the root.…”
Section: Introductionmentioning
confidence: 99%
“…Binary-tree encoding for permutation modulation schemes enables one to choose the probability distribution of the arXiv:1901.01736v1 [cs.IT] 7 Jan 2019 permutation patterns to achieve certain design criteria, e.g., achievable rate maximization [11], [17], [21], [23] or symbolerror rate (SER) minimization [21], [23]. However, existing works along this direction fall short in a number of ways.…”
Section: Introductionmentioning
confidence: 99%