2022
DOI: 10.1109/lcomm.2022.3144695
|View full text |Cite
|
Sign up to set email alerts
|

Rate-Compatible Punctured Polar Codes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 12 publications
0
7
0
Order By: Relevance
“…This operator is demonstrated to exhibit a phenomenon known as the straight path effect, where its output on the straight path has reduced reliability compared to the incoming messages. 8 Every new arrangement of the punctured bits will produce different rated polar code sequences, that is,…”
Section: Preliminariesmentioning
confidence: 99%
See 3 more Smart Citations
“…This operator is demonstrated to exhibit a phenomenon known as the straight path effect, where its output on the straight path has reduced reliability compared to the incoming messages. 8 Every new arrangement of the punctured bits will produce different rated polar code sequences, that is,…”
Section: Preliminariesmentioning
confidence: 99%
“…It is known from Reference 13 that a square operator, which can approximate the bit‐wise XOR operation as Lfalse(y1false)Lfalse(y2false)prefix≈sign()Lfalse(y1false)·sign()Lfalse(y2false)·min()||Lfalse(y1false),||Lfalse(y2false)$$ L\left({y}_1\right)\square L\left({y}_2\right)\approx \operatorname{sign}\left(L\left({y}_1\right)\right)\cdotp \operatorname{sign}\left(L\left({y}_2\right)\right)\cdotp \min \left(\left|L\left({y}_1\right)\right|,\left|L\left({y}_2\right)\right|\right) $$. This operator is demonstrated to exhibit a phenomenon known as the straight path effect, where its output on the straight path has reduced reliability compared to the incoming messages 8 …”
Section: Preliminariesmentioning
confidence: 99%
See 2 more Smart Citations
“…The 5G framework demands various code lengths and code rates. The rate-matching schemes [4], [5] are proposed to address this limitation. However, a priori performance and optimality evaluation of these methods are hard.…”
Section: Introductionmentioning
confidence: 99%