# Bipolar chaotic pulse position modulation communication system based on cyclic LDPC

- Hui Li
^{1}Email author, - Hanyu Liu
^{1}Email author and - Sina Vafi
^{2}

**2014**:105

https://doi.org/10.1186/1687-1499-2014-105

© Li et al.; licensee Springer. 2014

**Received: **4 December 2013

**Accepted: **12 June 2014

**Published: **22 June 2014

## Abstract

To overcome the error propagation and improve the communication efficiency of the chaotic pulse position modulation (CPPM) system, the bipolar chaotic pulse position modulation (BCPPM) communication system is proposed here. In BCPPM, every two-bit data are set as a group. The first bit and the discrete chaotic map determine the position of sent pulse, while the second bit determines the polarity of sent pulse. Each pulse in the channel contains two-bit information, so this scheme improves the communication efficiency. A (255,175) cyclic low-density parity-check code (LDPC) was designed, and its generator matrix and parity check matrix are cycled. Furthermore, the constructed BCPPM communication system is utilized in the cyclic LDPC aiming to mitigate the effect of noise. In the transmitter, it uses the encoder structure of cyclic codes while the min-sum algorithm is deployed to decode in the receiver. The analysis indicates that the proposed system is secure, insensitive to the channel distortion and convenient for multiple access communication. The simulation results show that in the additive white Gaussian noise (AWGN) channel, multipath channel, multiuser model, and hybrid communication environment, the BCPPM system has lower bit error rate (BER) compared with those of the CPPM and chaotic pulse on-off-keying (CPOOK). In addition, using cyclic LDPC codes, the system is more suitable for hardware implementation.

### Keywords

Chaotic pulse position modulation Multipath channel Multiuser Cyclic-LDPC## 1 Introduction

The ultra wideband (UWB) communication system is widely used in communication systems especially in military applications. This technique not only meets the requirements of traditional communication system, but also provides a secure transmission. Due to the flexible working environment, such as indoor or outdoor, it can overcome the multipath propagation and interference from other devices effectively [1, 2].

Chaotic communication offers high security and a low probability of intercept [3]. However, since the chaotic synchronization is very sensitive to the signal distortion, filtering and channel noise, utilizing the chaotic communication systems encounters many difficulties in practical applications [4]. In view of the good robust performance of UWB communication on filtering and channel noise, some scholars combined the UWB with chaotic communication and proposed a model of communication system, named as chaotic pulse position modulation (CPPM) [5]. In the CPPM system, the intervals between pulses are chaotically changed based on the chaotic map. This communication scheme protects information from interception. Besides, the status information of the chaotic system is completely contained in the time intervals of the pulses with the same shape. The distortion caused by filter and channel will only destroy the shape of pulses and will not affect the intervals between them. In this case, the CPPM system is insensitive to the multipath channel distortion [6]. This makes the chaotic pulse signal much easier to be reused and achieve multiple access communication than continuous chaotic signal [7].

Although CPPM has many advantages, it induces additional delay into the chaotic map that not only causes the chaotic map to diverge easily, but also leads to error propagation. A method was proposed as the chaotic pulse on-off keying (CPOOK) [8], which does not have any feedback loop in its structure. Therefore, it has lower bit error rate (BER) than the CPPM system in the case of non-ideal timing. But each bit signal needs to transmit extra synchronization pulse in this scheme, which reduces the efficiency of the transmitter. A method of MCPPM was proposed in [9], where the delay block, which is decided by the data, is sent outside the feedback loop. In this way, the communication system overcomes the error propagation phenomenon. In order to further improve the efficiency of communication, a bipolar chaotic pulse position modulation (BCPPM) communication system was put forward in this paper. It sends two-bit data in each pulse. While retaining the advantages of the CPPM system, such as high safety, insensitivity to the channel distortion, and simplicity for multiple-access communication, the BCPPM system has higher communication efficiency and lower BER.

The low-density parity-check code (LDPC) [10] demonstrates a good performance close to the Shannon limit and also low decoding complexity and flexible structure. These factors make it an appropriate option in the research field of channel coding [11, 12]. Cyclic codes are an important subclass of linear codes, which have the general properties of linear codes and also the circulation. The cyclic shift of any code word in the code group is still a code word in this code group [13]. The characteristic of circulation is such that its encoding and concomitant formula can be achieved by a feedback shift register circuit, which is easily implemented on hardware. With the characteristics of cyclic codes and LDPC codes, the generator matrix and parity-check matrix of the cyclic LDPC code are cyclic, so the encoder can be realized by the feedback shift register to improve the speed of hardware system. A (255,175) cyclic-LDPC code designed, and it is used for the BCPPM system to reduce the system BER.

## 2 Bipolar chaotic pulse position modulation communication system

### 2.1 CPRG and CPPM

*T*reaches the value of delay

*T*

_{ n }for the

*n*th round, the comparator will send an enabled signal to trigger:

- a)
The function

*F*(*x*) calculates the delay value*T*_{n+ 1}for the next round; - b)
The timer resets and starts timing for the next round;

- c)
The pulse generator outputs a narrow pulse whose width is

*T*_{ w }≪*T*_{ n }(*n*= 1, 2, …).

The sequence of time intervals {*T*_{
n
}} represents the iterations of a chaotic process. It can be calculated by the function *F*(*x*) which is always a nonlinear function, *T*_{
n
} = *F*(*T*_{n − 1}, *T*_{n − 2}, …, *T*_{1}). From the formula, we know that *T*_{
n
} is determined by the former *n* − 1 delay value. When *n* = 1, it is just a function of one variable. Through the *F*(*x*), the output of CPRG feedbacks to itself directly, constituting a feedback loop. Some studies on such CPRG can be found in [9, 10].

*T*

_{ n }. When transmitting ‘0’, the CPRG will output the pulse immediately, while transmitting ‘1’, the pulse will delay for a fixed time

*T*

_{ d }

*T*

_{ d }≪

*T*

_{ n }(

*n*= 1, 2, …). At this time, the

*F*(

*x*) function can be expressed as

*T*

_{ n }=

*F*(

*T*

_{n − 1},

*T*

_{n − 2}, …,

*T*

_{1},

*T*

_{ d }). And in this way, the CPRG output waveform contains the binary information. The block diagram of classical CPPM is shown in Figure 2.

### 2.2 BCPPM modulator

*T*

_{ n }; the timer starts timing; the comparator compares its two inputs constantly. When CPRG outputs the enable signal, the system reads the first bit data to decide whether to add the

*T*

_{ d }before entering later modules. After that, it reads the second bit data to choose the polarity of the narrow pulse for output.

In Figure 3, we can see that the sent data are grouped in every two bits. In each round, the first bit data and the chaotic map determine the position of pulse and the second bit determines its polarity. The delay module is moved outside of the feedback loop compared with that of CPPM. It makes the signal intervals of CPRG only relevant to the states of nonlinear function which is inside the CPRG. They are independent of the information sequence. Here, we get *T*_{
n
} = *F*(*T*_{n − 1}). In this way, it avoids the possible adverse effects of information sequence to the chaotic map and keeps the no regularity of output pulse intervals sequence of CPRG. Besides, it eliminates the possibility of divergence. In each transmission period, the BCPPM modulator outputs a bipolar pulse, which contains two-bit information under the same conditions with CPPM. So, the BCPPM scheme doubles the information rate.

*ω*(

*t*) is the baseband transmission signal.

where *t*_{0} is the initial delay for system.

*b*

_{ j }is the data to be transmitted:

### 2.3 BCPPM demodulator

Pulse sequence with delay and polarity modulation becomes the signal to be transmitted in the channel. If an unauthorized receiver does not know the interval information of pulse sequence, it is impossible to judge whether a received pulse was delayed. Therefore, it cannot judge whether ‘0’ or ‘1’ is transmitted at this moment. If there is an ideal synchronization between the transmitter's CPRG and the receiver's CPRG, it will output the same signal with the sent signal in channel except some of the pulses delayed due to the data modulation. By estimating the received signal and the time when CPRG outputted the corresponding pulse, the first bit data can be restored. On this basis, according to the polarity information of pulse, the second bit data can be judged. While the CPRGs of both sides of the transceiver are not enough to match, it will generate a large number of errors. Therefore, the initial parameters of CPRG act like a private key and play a decisive role in the transmission.

*T*

_{ d }, time window ‘0’ and time window ‘1’ , respectively. The signal in time window ‘0’ and time window ‘1’ are transferred to a two-peak detector, then it figures out the two bits of information. The detailed demodulation process can be described as follows:While demodulating the two-bit data, priority should be given to the first bit, then the second one. The first bit, delay information, can be judged from the sampling value in which window it has the larger peak. If the peak is in window ‘0’ , the first bit is ‘0’. Otherwise, it is ‘1’. On this basis, the detector detecting the polarity of pulse in the above time window, if it is positive, the second bit information is ‘0’. Otherwise, it is ‘1’. So, there are a total of four cases for the two-bit data, as it is shown in Figure 5.It is clear that the feedback loop in CPPM was removed in Figure 4. This eliminates the dependence of receiver CPRG synchronization on the accuracy of the demodulator judgment. It also eliminates the asynchronous problem between transmitter's CPRG and receiver's CPRG due to the wrong judgments, thus avoiding the error propagation. Thus, the BCPPM scheme greatly improves the practicability of the system.

### 2.4 Performance of BCPPM

*x*

_{1}= 1, denoting that the demodulation of the first bit is incorrect, and

*x*

_{1}= 0, denoting that the demodulation of the first bit is correct. With the same notation,

*x*

_{2}= 1, which means that the demodulation of the second bit is incorrect; while

*x*

_{2}= 0, which means that the demodulation of the second bit is correct. The first bit and the second bit are dependent in the demodulator of the BCPPM system. The judgment of the second bit depends on the time window which is decided by the first bit. So the output of the first bit will affect the judgment of the second bit. If the demodulation of first bit is incorrect, as a result, the second bit will not fall in the corresponding time window. The sampling value of the signal is the noise level so the judgment is like coin tossing. In this case, the probability of correct demodulation for the second bit is 0.5. So, in the case of ideal timing, the BER of the BCPPM system is the following:

## 3 Cyclic LDPC codes of system

### 3.1 Cyclic LDPC codes

*g*(

*x*) =

*x*

^{8}+

*x*

^{7}+

*x*

^{6}+

*x*

^{4}+ 1. According to the generator polynomial, we get the generator matrix

*G*and check matrix

*H*as follows:

Having the *G* and *H* matrices we can see that this cyclic code is also a LDPC code and irregular one.

Since the *G* matrix satisfies the cyclic characteristics, we can use the feedback shift register to encode the (255,175) cyclic LDPC code at the transmitter, and use the LDPC decoding algorithm at the receiver. Thus, the design combines the hardware (such as FPGA) easy to implement of cyclic codes and low decode BER of LDPC codes. It can obtain high communication quality.

### 3.2 LDPC codes decoding algorithm

The Min-sum decoding algorithm is a simplified approximate algorithm of the log domain belief propagation (BP) decoding algorithm [14]. It uses minimum operation to simplify the function operation and to reduce the computational complexity greatly. What is more, it does not need to estimate the channel noisy and has no complex operations. So it is easy for hardware implementation. But its performance is reduced when compared with the BP decoding algorithm [15]. In general, the Min-sum decoding algorithm is very suitable to the occasion where one has limited hardware conditions. Here, the Min-sum decoding algorithm is used for the BCPPM communication system.

- a)Initialization$\mathit{L}\left({\mathit{q}}_{\mathit{i},\mathit{j}}\right)=\mathit{L}\left({\mathit{P}}_{\mathit{i}}\right)$(8)
- b)Check to bit$\mathit{L}\left({\mathit{r}}_{\mathit{ji}}\right)={\displaystyle \prod _{{\mathit{i}}^{\text{'}}\in {\mathit{R}}_{\mathit{j}}\backslash \mathit{i}}\mathrm{sign}\left(\mathit{L}\left({\mathit{q}}_{{\mathit{i}}^{\text{'}}\mathit{j}}\right)\right)}\times \underset{{\mathit{i}}^{\text{'}}\in {\mathit{R}}_{\mathit{j}}\backslash \mathit{i}}{min}\left(\left|\mathit{L}\left({\mathit{q}}_{{\mathit{i}}^{\text{'}}\mathit{j}}\right)\right|\right)$(9)
- c)Code word test$\mathit{L}\left({\mathit{q}}_{\mathit{i}}\right)=\mathit{L}\left({\mathit{P}}_{\mathit{i}}\right)+{\displaystyle \sum _{\mathit{j}\in {\mathit{C}}_{\mathit{i}}}\mathit{L}\left({\mathit{r}}_{\mathit{ji}}\right)}$(10)$\begin{array}{l}\mathit{L}\left({\mathit{q}}_{\mathit{i}}\right)>0,\phantom{\rule{1em}{0ex}}{\widehat{\mathit{c}}}_{\mathit{i}}=0\\ \mathit{L}\left({\mathit{q}}_{\mathit{i}}\right)\le 0,\phantom{\rule{1em}{0ex}}{\widehat{\mathit{c}}}_{\mathit{i}}=1\end{array}$

*Hc*

^{ T }= 0 or the iteration count is equal to the maximum number of iterations, system will output the decoding results.

- d)
bit to Check

Then, return to step b.

## 4 Simulation and analysis

### 4.1 Additive white Gaussian noise channel

- 1)For simplicity, we use the one-dimensional logistic maps:${\mathit{T}}_{\mathit{n}}={\mathit{a}}_{\mathit{n}}{\mathit{T}}_{\mathit{n}-1}\left(1-{\mathit{T}}_{\mathit{n}-1}\right)$(12)

*a*

_{ n }= 3.99,

*T*

_{0}= 0.68;

- 2)
The (255,175) cyclic LDPC has been described in section 3.2. We can figure out the system rate is $\frac{35}{51}$ when using the LDPC code.

### 4.2 Multipath channel

- 1)
Gain of the path 1 is

*α*_{1}= 0.8 and path 2 is*α*_{2}= 0.6; - 2)
The path delays are

*τ*_{1}= 0 and*τ*_{2}= 2 respectively; - 3)
The rest are same with section 4.1.From the simulation results in Figure 7, we find that BCPPM has stronger multipath tolerance than CPPM and CPOOK. The reason is that the status information of chaotic system is completely contained in the time intervals of the pulses with the same shape. The distortion caused by the filter and the channel will only destroy the shape of pulses, and not affect the intervals between them.

### 4.3 Multiuser model

- 1)
Initial value for the chaotic map of user 1 is ${\mathit{x}}_{0}^{\left(1\right)}=0.68$, the value of user 2 is ${\mathit{x}}_{0}^{\left(2\right)}=0.78$;

- 2)
The rest are same with section 4.1.The simulation results are shown in Figure 8. The figure shows that though the BCPPM system multiple access mode is simple, it still has low BER performance when using the LDPC codes. That is because the synchronization of the CPRG is between the transmitter and the receiver. Every user's receiver will be kept locked outside its time windows. If the pulses of different users are outputs in different time windows, there will be no multiuser interference from each other.

### 4.4 Multipath channel and multiuser model

## 5 Conclusion

In this paper, we proposed a BCPPM communication system, described the structure of transmitter and receiver, and then discussed the possibility of combining cyclic LDPC code with the system. The BCPPM system has the advantage of high security, insensitivity to channel distortion and simplicity of deploying in multiuser communication. The simulation results show that BCPPM system has a lower BER compared with the CPPM and CPOOK systems. Besides, the use of cyclic LDPC codes is more conductive for the hardware implementation and has better BER performance.

## Declarations

### Acknowledgements

This work was supported by the National Natural Science Foundation of China (Grant No. U1304523), the Young Scientists Fund of the National Natural Science Foundation of China (Grant No. 11105042) and the Henan Provincial Department of Education Science and Technology Research key project (No.13A510330).

## Authors’ Affiliations

## References

- Shen YS, Ueng FB, Jeng LD: A new time-hopping/direct-sequence biorthogonal PPM UWB communication system.
*EURASIP J. Wirel. Commun. Netw.*2011, 149: 1-11.View ArticleGoogle Scholar - Tran LC, Mertins A, Wysocki TA: Unitary differential space-time-frequency codes for MB-OFDM UWB wireless communications.
*IEEE Trans. Wirel. Commun.*2013, 12(2):862-876.View ArticleGoogle Scholar - Jin LS, Zhang Y, Li LJ: One-to-many chaotic synchronization with application in wireless sensor network.
*IEEE Commun. Lett.*2013, 17(9):1782-1785.View ArticleGoogle Scholar - Yang H, Jiang GP: Reference-modulated DCSK: a novel chaotic communication scheme.
*IEEE Trans. Circuits Syst. II Expr. Briefs*2013, 60(4):232-236.View ArticleGoogle Scholar - Sushchik M, Rulkov N, Larson L, Tsimring L, Abarbanel H, Yao K, Volkovskii A: Chaotic pulse position modulation: a robust method of communication with chaos.
*IEEE Commun. Lett.*2000, 4(4):128-130.View ArticleGoogle Scholar - Rulkov N, Sushchik M, Tsimring L, Volkovskii A: Digital communication using chaotic-pulse-position modulation.
*IEEE Trans. Circuits Syst.*2001, 12(48):1436-1444.View ArticleGoogle Scholar - Torikai H, Saito T, Schwarz W: Multiplex communication scheme based on synchronization via multiplex pulse-trains. In
*Proceedings of the 1998 IEEE International Symposium on Circuits and Systems*. Monterey, CA, USA; 1998:554-557.Google Scholar - Yang H, Jiang GP, Deng P: Chaotic pulse On-off-keying modulation scheme for ultra-wide bandwidth communications.
*J. Electron. Inform. Technol.*2007, 29(3):677-680.Google Scholar - Yang H, Jiang GP: A modified, chaotic pulse position modulation scheme for ultra-wide bandwidth communication.
*J. Nanjing Univ. Posts Telecommun.*2006, 26(2):47-50.Google Scholar - Gallager RG: Low-density parity-check codes.
*IRE Trans. Inform. Theor.*1962, 8(1):21-28. 10.1109/TIT.1962.1057683MathSciNetView ArticleMATHGoogle Scholar - Zhang GH, Sun R, Wang XM: Several explicit constructions for (3, L) QC-LDPC codes with girth at least eight.
*IEEE Commun. Lett.*2013, 17(9):1822-1825.MathSciNetView ArticleGoogle Scholar - Rong B, Wu YY, Gagnon G: Multi-layer iterative LDPC decoding for broadband wireless access networks: a recursive shortening algorithm.
*IEEE Trans. Wirel. Commun.*2013, 12(3):1320-1327.View ArticleGoogle Scholar - Li SX, Hu SH, Feng T, Ge GN: The weight distribution of a class of cyclic codes related to Hermitian forms graphs.
*IEEE Trans. Inf. Theory*2013, 59(5):3064-3067.MathSciNetView ArticleGoogle Scholar - Mackay DJC: Good error-correcting codes based on very spares matrices.
*IEEE Trans. Inf. Theor.*1999, 45: 399-431. 10.1109/18.748992MathSciNetView ArticleMATHGoogle Scholar - Li EB, Declercq D, Gunnam K: Trellis-based extended min-sum algorithm for non-binary LDPC codes and its hardware structure.
*IEEE Trans. Commun.*2013, 61(7):2600-2611.View ArticleGoogle Scholar

## Copyright

This article is published under license to BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly credited.