Abstract

In this paper, upper bound on the probability of maximum a posteriori (MAP) decoding error for systematic binary linear codes over additive white Gaussian noise (AWGN) channels is proposed. The proposed bound on the bit error probability is derived with the framework of Gallager’s first bounding technique (GFBT), where the Gallager region is defined to be an irregular high-dimensional geometry by using a list decoding algorithm. The proposed bound on the bit error probability requires only the knowledge of weight spectra, which is helpful when the input-output weight enumerating function (IOWEF) is not available. Numerical results show that the proposed bound on the bit error probability matches well with the maximum-likelihood (ML) decoding simulation approach especially in the high signal-to-noise ratio (SNR) region, which is better than the recently proposed Ma bound.

1. Introduction

Upper bounds on the maximum a posteriori (MAP) decoding error probability, as a key technique for evaluating the performance of the binary linear codes over additive white Gaussian noise (AWGN) channels, bring a profound impact on the reliable transmission of the next-generation mobile communication systems since they can be used to not only predict the performance without resorting to computer simulations but also guide the design of coding [1]. In order to improve the looseness of the union bound in the low signal-to-noise ratio (SNR) region, many improved upper bounds, on the bit error probability [25] and on the frame error probability [24, 615], are proposed. As surveyed in [1], the improved upper bounds on the bit error probability [24] are based on Gallager’s first bounding technique (GFBT):in which denotes the event that represents an error in one of the information bits of the decoded codeword, denotes the received signal vector, and denotes an arbitrary region around the transmitted signal vector (called the Gallager region). Divsalar [2] chose the region to be an Euclidean sphere centered at the point along the line connecting the origin to the transmitted signal vector. Sason and Shamai [3] chose the region to be a circular cone whose central line passes through the origin and the transmitted signal vector. The upper bounds [2, 3] on the bit error probability based on equation (2) can be considered to be simply replaced by the weight spectra in the upper bound on the frame error probability bywhere denotes the number of code words of Hamming weight d encoded by information bits of Hamming weight i and k denotes the dimension of the linear code. However, as noted by Zangl and Herzog [4], computing the expression by the factor 1.0 in (2) means that the worst case of k bit errors is assumed if falls outside the good region , and then Zangl and Herzog [4] improved the tangential-sphere bound (TSB) on the bit error probability [3] by computing this probability in a more accurate way. The upper bounds on the bit error probability [24] require the whole input-output weight enumerating function (IOWEF), which can be applied to both systematic codes and nonsystematic codes. The upper bound on the bit error probability by Ma et al. [16] can be evaluated by calculating partial IOWEF with truncated information weight (, where is a positive integer), which holds only for systematic codes. However, for most codes, the IOWEF is usually not computable. In contrast, it is reasonable to assume that the weight spectra of codes are available, such as the BCH code [17]. In this paper, different from most of the existing bounds, we derive a tighter upper bound on the bit error probability of systematic binary linear codes via their weight spectra.

The main results as well as the structure of this paper are summarized as follows:(1)In Section 2, we present the preliminaries and necessary notation. The conventional union bound and four reported upper bounds based on GFBT are also reviewed in Section 2.(2)In Section 3, in a detailed way, we rederive the recently proposed bound on the bit error probability by Liu [5], in which the union bound is firstly truncated and then amended for the systematic linear codes over AWGN channels. In this paper, the proposed upper bound on the bit error probability is derived in a much more detailed way by considering more information of the Gallager region and the truncated IOWEF of the code. Finally, with the framework of GFBT, we derive the upper bound on the bit error probability which requires only the knowledge of weight spectra of the code.(3)In Section 4, numerical examples are given to show that the proposed bound is helpful to evaluate the performance of the systematic binary linear codes which can predict the performance of the code in the high-SNR region, avoiding the time-consuming computer simulations.(4)Section 5 concludes this paper.

2. Preliminaries

Let be the binary field. Let be a systematic binary linear block code of dimension k and length n with a generator matrix G = [, P], where is the identity matrix. Let be the information vector and be the associated codeword. We have the encoding function as follows:

Considering the binary phase shift keying (BPSK) mapping, we have by for . Suppose that is transmitted over an AWGN channel. Let be the received vector, where is a vector of independent Gaussian random variables with zero mean and variance . We have the decoding function as follows:

Without loss of generality, assume that the all-zero codeword is transmitted. The conventional union bound and four reported upper bounds based on GFBT are also reviewed in the following sections.

2.1. Union Bound

The simplest upper bound on the bit error probability is the union bound:where is the event that there exists at least one codeword of Hamming weight d encoded by information bits of Hamming weight i that is nearer than to , and is the pairwise error probability with

However, the above conventional union bound is loose and even diverges in the low-SNR region. Then, the improved upper bounds on the bit error probability based on GFBT were proposed, such as the Divsalar bound [2], the tangential-sphere bound (TSB) [3], the improved tangential-sphere bound (ITSB) [4], and the Ma bound [16].

2.2. The Divsalar Bound

In 1999, Divsalar derived a simple upper bound [2] on the bit error probability based on GFBT, where the region is chosen to be an n-dimensional sphere centered at a scaled transmitted signal vector. Both the radius and the center of the sphere can be optimized. Let denote the minimum Hamming weight. Taking into account the definition of in (3), we have the Divsalar bound on the bit error probability:where

2.3. The Tangential-Sphere Bound

In 2000, Sason and Shamai [3] derived the tangential-sphere bound on the bit error probability based on GFBT, where the region is chosen to be an n-dimensional circular cone whose central line passes through the origin O and the transmitted signal. Letdenote the normalized incomplete gamma function. Taking into account the definition of in (3), we have the TSB with a parameter r on the bit error probability:where

The parameter r in the TSB can be optimized by a numerical solution of the following equation:where

2.4. The Improved Tangential-Sphere Bound

In 2001, Zangl and Herzog [4] derived the improved tangential-sphere bound on the bit error probability based on GFBT by computing the expression in a more accurate way. We have the ITSB with a parameter on the bit error probability:

The parameter in the ITSB can be optimized by a numerical solution of the following equation:where

2.5. The Ma Bound

In 2018, Ma et al. [16] derived the upper bound on the bit error probability under maximum a posteriori (MAP) decoding. The Ma bound can be evaluated by calculating partial IOWEF with truncated information weight. We have the Ma bound with a parameter on the bit error probabilitywhere

3. Upper Bound on the Bit Error Probability Based on GFBT

3.1. The Gallager Region

We define the region by the Hamming distance based on a list decoding algorithm which is shown in Figure 1, resulting in an irregular high-dimensional geometry (Algorithm 1).

(1)We denote
in which
and
Make hard decisions on the information part of the received vector , resulting in a vector of length k. Then, the channel becomes a memoryless binary symmetric channel (BSC) with cross probability
(2)List all sequences of length k within the Hamming sphere with center at of radius , where is a positive integer. The resulting list is denoted as .
(3)Encode each sequence in by the encoding algorithm of the systematic code, resulting in a list of code words, denoted as .
(4)Find the codeword that is closest to . Output the information part of as the decoding result.

The list decoding algorithm is similar to but different from the algorithm presented in [14]. The list region in [14] is an n-dimensional Hamming sphere with center at the hard decision of the whole received sequence, while the list region here is a k-dimensional Hamming sphere with center at the hard decision of the information part of the received sequence.

The Gallager region can be defined by

3.2. Upper Bound on the Bit Error Probability via IOWEF

We assume that and denote all the code words of Hamming weight d encoded by information bits of Hamming weight i by , . Let be the event that is nearer than to .

With the framework of GFBT, we have

As shown in Figure 1(b), we have

As shown in Figure 1(a), we havewhich means that the decoder outputs at most erroneous bits.

Assuming a binary vector of total length passes through a BSC with cross error probability p, we denote to be the probability that the number of bit errors occurring ranges from to , that is,

Then, we define

Theorem 1. We have the upper bound on the bit error probability of systematic binary linear codes under MAP decoding

Proof. Without loss of generality, we denoteNotice that a necessary condition for the event is that the corresponding input information sequence of the codeword is in the list . Hence,We haveAlso notice that, for ,We haveBy combining (30) and (32), we can verify thatBy the union bounds, we havefor from (33).
Since the event is independent of and , we haveThen, by substituting (38) in (23), we haveTherefore, it can be verified by substituting (24) and (39) in (1) to complete the proof.

Corollary 1. The proposed upper bound on the bit error probability (Theorem 1) can improve the conventional union bound on the bit error probability.

Proof. As to the proposed bound (Theorem 1), note thatby settingwe haveSince , the proof is completed.

Corollary 2. The proposed upper bound on the bit error probability (Theorem 1) can improve the Ma bound on the bit error probability (18).

Proof. Assuming that we know only partial IOWEF with truncated information weight , the parameter in the proposed bound (Theorem 1) is optimized in the interval . Theorem 1 can be written asSince is the probability that the number of bit errors occurring in a binary vector of total length , when passing through a BSC with cross error probability , it ranges from 0 to . Then, it can be verified byto complete the proof.

The objective of this paper is to derive the upper bound on bit error probability with only knowing of the weight spectrum.

3.3. Upper Bound on the Bit Error Probability via Weight Spectra

In this section, we focus on how to derive the upper bound on the bit error probability via weight spectra. The IOWEF is usually not computable, but the weight spectra of the code are usually available, such as the BCH code [17]. Let be a positive integer that is relatively small. Assuming that we know only the truncated IOWEF {, , } which can be obtained by using a brute-force method and the weight spectrum .

Definefor .

Then, we focus on how to obtain the upper bound on the bit error probability by using the IOWEF {, , } and the weight spectrum . We derive the upper bound in the two following cases.Case 1: if the radius of the Hamming sphere in Figure 1, we can get the IOWEF {, , } by using a brute-force method, and we havewhich can be verified by Theorem 1.Case 2: if the radius of the Hamming sphere in Figure 1, we can derive the upper bound on the bit error probability by employing both the IOWEF {, , } and the weight spectrum .

From Theorem 1, we havein which

Note that

Firstly, it is easy to verify that the first term in the right-hand side (RHS) of (49)

Sincefor and i is obviously not greater than , we have

Therefore,for

Secondly, it is easy to verify that the second term in the RHS of (49)

Sincefor and i is obviously not greater than , we have

Therefore,for .

Then, we haveby combining (53) and (58) with (59).

Finally, we haveby combining (48) and (59) with (47).

Then, we have the following theorem.

Theorem 2. We have the upper bound on the bit error probability of systematic binary linear codes via their weight spectrawhere

Proof. We can complete the theorem by combining (46) and (60).

Corollary 3. The proposed upper bound on the bit error probability (Theorem 2) can improve the proposed upper bound on the bit error probability (Theorem 1).

Assuming that we know only the truncated IOWEF {, , } and the proof weight spectrum , Theorem 1 can be written asimplying that . Theorem 2 needs a minimization over if the optimal parameter is in the interval , and Theorem 2 is exactly Theorem 1; if is in the interval , Theorem 2 is tighter than Theorem 1. Therefore, we claim that Theorem 2 can improve Theorem 1 to complete the proof.

Corollary 4. The proposed upper bound on the bit error probability (Theorem 2) can improve the Ma bound on the bit error probability (18).

Proof. It can be verified by combining Corollaries 2 and 3.

Remark. The proposed bound (Theorem 2) has a little higher computational loads than the conventional union bound. Firstly, the overhead is caused by recursively computing and . The probability and is the summation with at most k summands, which are independent of the IOWEF and hence can be calculated and stored for use. Secondly, the overhead is caused by minimizing over . A brute-force method can be implemented by computing the bound for each , which can be done recursively.

4. Numerical Examples

In this section, we need to point out that the weight spectra of the compared BCH codes can be found in [17]. For all the upper bounds on the bit error probability except the Ma bound, we need the whole IOWEF. Then, in this paper, the compared bounds are the Ma bound (18) and the proposed bound (61) in Theorem 2 on the bit error probability, which are also compared with the simulation results under the maximum-likelihood (ML) decoding.

Figures 2 and 3 show the comparisons between the upper bounds of BCH codes [127, 106] and [127, 113], respectively, which are also compared with the simulation results under ML decoding. A partial IOWEF {, , } with of the BCH codes [127, 106] and [127, 113] can be obtained by using a brute-force method, respectively. The computed IOWEF {, , } of the BCH code [127, 106] is given in Table 1. The Ma bound is obtained by this truncated IOWEF according to (18). The proposed upper bound is obtained by this truncated IOWEF and the weight spectrum according to (61) in Theorem 2 (note that (61) is different from [5], (23)) since Theorem 2 here is derived in a much more detailed way when the Hamming weight . As pointed out in [18], multidimensional signal processing plays a very important role in effective data analytics and interpretation. In this paper, we tighten the upper bound by analysing the k-dimensional vector. We can see that the proposed bound is tighter than the Ma bound. We can also see that, for the same code length n, the higher the code rate is, the tighter the Ma bound is. The proposed bound is always tighter whatever the code rate is.

Figure 4 shows the comparisons between the upper bounds on the bit error probability of the BCH code [255, 239], which are also compared with the simulation results under ML decoding. A partial IOWEF {, , } with of the BCH code [255, 239] can be obtained by using a brute-force method. The Ma bound is obtained by this truncated IOWEF according to (18). The proposed upper bound is obtained by this truncated IOWEF and the weight spectrum according to (61). We can see that the proposed bound is tighter than the Ma bound. We can also see that, the proposed bound coincides nicely with the ML decoding results in the high-SNR region when we only know less IOWEF {, , } of the BCH code [255, 239].

Figure 5 shows the comparisons between the upper bounds on the bit error probability of the BCH code [31, 21], which are also compared with the simulation results under ML decoding. The whole IOWEF , , } of the BCH code [31, 21] can be obtained by using a brute-force method. The Ma bound is obtained by the whole IOWEF according to (18), where . The proposed upper bound is obtained by the whole IOWEF and the weight spectrum according to (61). We can see that the proposed bound is tighter than the Ma bound in the low-SNR region when we know the whole IOWEF. We can also see that, the proposed bound and the Ma bound coincide nicely with the ML decoding results in the high-SNR region.

5. Conclusions

In this paper, upper bound on the bit error probability of systematic binary linear codes under MAP decoding is derived. The proposed bound just requires the weight spectra of the code, which is helpful when the whole IOWEF of the code is not available. The proposed bound (Theorem 2) is proved to be tighter than the recently proposed Ma bound. The numerical results show that the proposed bound on the bit error probability via weight spectra coincides nicely with the ML decoding results in the high-SNR region, which can predict the BER performance without resorting to computer simulations since the simulation is time-consuming in high-SNR region.

Data Availability

The data used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest

The authors declare that they have no conflicts of interest.

Acknowledgments

This work was supported by the Scientific Research Planning Project of Education Department of Jilin Province (JJKH20200180KJ), the Doctoral Initiated Research Foundation Project (BSKJ201820, BSKJ201821, and BSKJ201822), the Science and Technology Planning Project of Jilin Province in 2020 named Research on Key Technologies of Wireless Wearable Health Monitoring Equipment, the Distinctive Innovation of Ordinary Universities of Guangdong Province (2018KTSCX120), and the PhD Start-up Fund of Natural Science Foundation of Guangdong Province (2016A030310335).