Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
TRANSMITTER AND RECEIVER FOR WIRELESS COMMUNICATIONS BASED ON MULTIDIMENSIONAL CODEBOOKS, AND METHODS OF OPERATING THE SAME
Document Type and Number:
WIPO Patent Application WO/2021/115548
Kind Code:
A1
Abstract:
The present disclosure relates generally to the field of wireless communications and, in particular, to techniques for supporting pilotless transmission of information bits from a transmitter to a receiver. The techniques described herein allow constructing families of multidimensional codebooks for non-prime power dimensions in order for them to be able to accommodate to any possible allocation of resource elements (REs). Briefly speaking, each codeword of a multidimensional codebook is generated by multiplying at least one mask sequence with one of an orthogonal set of vectors. Each of the at least one mask sequence is obtained by using the exponentiation operation involving a base and an exponent. According to the present disclosure, the base is defined by at least two different prime factors of a given number N RE of the REs and the exponent e is defined by a quadratic polynomial having a number m of variables, where m is equal to a total number of prime factors constituting N RE. The resulting multidimensional codebooks are characterized by a large minimum chordal distance d c , which guarantees good performance.

Inventors:
PITAVAL RENAUD-ALEXANDRE (SE)
QIN YI (SE)
Application Number:
PCT/EP2019/084179
Publication Date:
June 17, 2021
Filing Date:
December 09, 2019
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
HUAWEI TECH CO LTD (CN)
PITAVAL RENAUD ALEXANDRE (SE)
International Classes:
H04L5/00; H04L1/00; H04L27/00
Domestic Patent References:
WO2018236078A12018-12-27
WO2016070829A12016-05-12
Foreign References:
US20190260418A12019-08-22
Other References:
S. BOZTASR. HAMMONSP. Y. KUMAR: "4-phase sequences with near-optimum correlation properties", IEEE TIT, 1992
P. Y. KUMART. HELLESETHA. R. CALDERBANKR. HAMMONS: "Large Families of Quaternary Sequences with Low Correlation", IEEE TIT, 1996
P. Y. KUMART. HELLESETHA. R. CALDERBANK: "An Upper Bound for Weil Exponential Sums over Galois Rings and Applications", IEEE TIT, 1995
Attorney, Agent or Firm:
KREUZ, Georg (DE)
Download PDF:
Claims:
CLAIMS

1. A transmitter (500) for wireless communications, configured to: obtain prime factors for a number NRE of time-frequency resources (512), at least two of the prime factors being different; generate a codebook (510) comprising at least one codeword, wherein each of the at least one codeword is generated by multiplying at least one mask sequence with one of an orthogonal set of vectors, and each of the at least one mask sequence is obtained by using an exponentiation operation involving a base and an exponent, the base being defined by the at least two different prime factors and the exponent being defined by a quadratic polynomial having a number m of variables, where m is equal to a total number of the prime factors constituting NRE ; and provide, to a receiver (700), information bits (514) in at least one of the at least one codeword (518) over the NRE time-frequency resources (512).

2. The transmitter (500) of claim 1 , wherein the orthogonal set of vectors is configured as a generalized Hadamard matrix comprising elements that are defined by the prime factors constituting NRE.

3. The transmitter (500) of claim 1 or 2, wherein the base is defined as a q-th root of unity, where q is a product of the at least two different prime factors, and wherein the quadratic polynomial is a quadratic form defined by using an m x m symmetric matrix

S.

4. The transmitter (500) of claim 3, wherein the symmetric matrix S comprises diagonal elements represented by integers modulo q or integers modulo q divided by 2, and off-diagonal elements represented by integers modulo q divided by 2.

5. The transmitter (500) of claim 3, wherein the symmetric matrix S comprises a main diagonal constituted by blocks, wherein each block has a size corresponding to an order of respective one of the prime factors constituting NRE , and comprises elements each being (i) the product of an integer modulo said prime factor and q divided by said prime factor if said prime factor is odd, or (ii) the product of an integer modulo said prime factor and q divided by the product of 2 and said prime factor if said prime factor is two, and wherein the symmetric matrix S comprises off-diagonal-block elements set to zero or to integer multiples of one of the prime factors constituting NRE ,

6. The transmitter (500) of claim 3, wherein the symmetric matrix S comprises a main diagonal constituted by a first block and a second block, wherein the first block comprises a binary matrix selected from a Delsarte-Goethals (DG) set of binary matrices, and wherein the second block comprises a ternary number that is fixed or associated with the first block.

7. The transmitter (500) of any one of claims 1 to 6, further configured to: generate control information comprising the number NRE of the time-frequency resources (512) and a number NCB of the codewords in the generated codebook (510); and provide, to the receiver (700), the control information prior to said providing the information bits (514).

8. A receiver (700) for wireless communications, configured to: receive control information (710) comprising a number NRE of time-frequency resources (512) and a number NCB of codewords in a codebook (510) to be generated; find prime factors for NRE , at least two of the prime factors being different; generate the codebook (510) comprising the NCB codewords, wherein each codeword is generated by multiplying at least one mask sequence with one of an orthogonal set of vectors, and each of the at least one mask sequence is obtained by using an exponentiation operation involving a base and an exponent, the base being defined by the at least two different prime factors and the exponent being defined by a quadratic polynomial having a number m of variables, where m is equal to a total number of the prime factors constituting NRE ; receive at least one transmitted codeword (518) having information bits (514) encoded therein; retrieve the information bits (514) by calculating chordal distances between the at least one transmitted codeword (518) and each of the NCB codewords.

9. The receiver (700) of claim 8, wherein the orthogonal set of vectors is configured as a generalized Hadamard matrix comprising elements that are defined by the prime factors constituting NRE .

10. The receiver (700) of claim 8 or 9, wherein the base is defined as a q-th root of unity, where q is a product of the at least two different prime factors, and wherein the quadratic polynomial is a quadratic form defined by using an m x m symmetric matrix S.

11. The receiver (700) of claim 10, wherein the symmetric matrix S comprises diagonal elements represented by integers modulo q or integers modulo q divided by 2, and off-diagonal elements represented by integers modulo q divided by 2.

12. The receiver (700) of claim 10, wherein the symmetric matrix S comprises a main diagonal constituted by blocks, wherein each block has a size corresponding to an order of respective one of the prime factors constituting NRE , and comprises elements each being (i) the product of an integer modulo said prime factor and q divided by said prime factor if said prime factor is odd, or (ii) the product of an integer modulo said prime factor and q divided by the product of 2 and said prime factor if said prime factor is two, and wherein the symmetric matrix S comprises off-diagonal-block elements set to zero or to integer multiples of one of the prime factors constituting NRE .

13. The receiver (700) of claim 10, wherein the symmetric matrix S comprises a main diagonal constituted by a first block and a second block, wherein the first block comprises a binary matrix selected from a Delsarte-Goethals (DG) set of binary matrices, and wherein the second block comprises a ternary number that is fixed or associated with the first block.

14. A method (600) for wireless communication, comprising: finding (S602) prime factors for a number NRE of time-frequency resources (512), at least two of the prime factors being different; generating (S604) a codebook (510) comprising at least one codeword, each of the at least one codeword being generated by multiplying at least one mask sequence with one of an orthogonal set of vectors, each of the at least one mask sequence being obtained by using an exponentiation operation involving a base and an exponent, the base being defined by the at least two different prime factors, and the exponent being defined by a quadratic polynomial having a number of m variables, where m is equal to a total number of the prime factors constituting NRE ; and providing (S606), to a receiver (700), information bits (514) in at least one of the at least one codeword (518) over the NRE time-frequency resources (512).

15. A method (800) for wireless communication, comprising: receiving (S802) control information (710) comprising a number NRE of time- frequency resources (512) and a number NCB of codewords in a codebook (510) to be generated; finding (S804) prime factors for NRE , at least two of the prime factors being different; generating (S806) the codebook (510) comprising NCB codewords, each codeword being generated by multiplying at least one mask sequence with one of an orthogonal set of vectors, each of the at least one mask sequence being obtained by using an exponentiation operation involving a base and an exponent, the base being defined by the at least two different prime factors, and the exponent being defined by a quadratic polynomial having a number m of variables, where m is equal to a total number of the prime factors constituting NRE ; receiving (S808) at least one transmitted codeword (518) having information bits (514) encoded therein; retrieving (S810) the information bits (514) by calculating chordal distances between the at least one transmitted codeword (518) and each of the NCB codewords.

Description:
TRANSMITTER AND RECEIVER FOR WIRELESS COMMUNICATIONS BASED ON MULTIDIMENSIONAL CODEBOOKS, AND METHODS OF OPERATING THE SAME

TECHNICAL FIELD The present disclosure relates generally to the field of wireless communications and, in particular, to techniques based on multidimensional codebooks, e.g. for supporting pilotless transmission of information bits from a transmitter to a receiver.

BACKGROUND In current communication technologies, such as the 3rd Generation Partnership Project (3GPP) Long Term Evolution (LTE) and the 5th generation (5G) New Radio (NR), information-bearing symbols are demodulated at a receiver based on a channel estimation acquired via training signals. In practice, the channel estimation is obtained by using pilot symbols, such as a Demodulation Reference Signal (DM-RS), that are known to the receiver. As a rule, the pilot symbols are time- and/or frequency-division multiplexed with the information-bearing symbols, meaning that the pilot symbols and the information-bearing symbols are transmitted on different time slots and/or frequency bands. Therefore, specific time and frequency resources need to be reserved for the pilot symbols in the vicinity of the resources for the information-bearing symbols, so that the precise channel estimation could be provided. However, if a communication channel changes too rapidly in time and/or frequency, compared to the periodicity of pilot transmission, such training of the receiver can become much more resource-intensive. On the other hand, a large channel-estimation error can adversely affect the quality of the demodulation of the information-bearing symbols.

Furthermore, the 5G NR technology will enable new use scenarios which are infeasible in the 4G technology, such, for example, as Ultra-Reliable Low-Latency Communication (URLLC) applications and/or machine type communications (MCT). Depending on particular application, the MCT may require only sporadic short-packet transmission, sometimes with ultra-reliability and low latency. In such context, the practical cost of acquiring the channel estimation at the receiver becomes more predominant and must not be neglected. Unavoidable rate losses caused by the resource-intensive training based on the channel estimation and/or by the imperfect acquisition of the channel estimation become more significant for such short-packet transmissions. SUMMARY

This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the detailed description. This summary is not intended to identify key features or essential features of the present disclosure, nor is it intended to be used to limit the scope of the present disclosure.

It is an object of the present disclosure to provide a technical solution that enables pilotless transmission of information bits from a transmitter to a receiver by using a codebook e.g. in the form of a multidimensional codebook generated in advance at both the transmitter and the receiver.

The object above is achieved by the features of the independent claims in the appended claims. Further embodiments and examples are apparent from the dependent claims, the detailed description and the accompanying drawings.

According to a first aspect, a transmitter for wireless communications is provided. The transmitter is configured to obtain prime factors for a number N RE of time-frequency resources such that at least two of the prime factors are different. The transmitter is further configured to generate a codebook comprising at least one codeword. The codebook is to be understood as a multidimensional codebook for this first aspect and also in the disclosure of embodiments of the invention. Each of the at least one codeword is generated by multiplying at least one mask sequence with one of an orthogonal set of vectors. Each of the at least one mask sequence is obtained by using an exponentiation operation involving a base and an exponent, with the base being defined by the at least two different prime factors and the exponent being defined by a quadratic polynomial having a number m of variables, where m is equal to a total number of the prime factors constituting N RE . The transmitter is further configured to provide, to a receiver, information bits in at least one of the at least one codeword over the N RE time-frequency resources. By so doing, it is possible to provide the pilotless transmission of the information bits in at least one codeword from the transmitter to the receiver. Moreover, this embodiment of the transmitter may provide a high-performance codebook that is accommodated for any number N RE of time-frequency resources.

In one embodiment of the first aspect, the orthogonal set of vectors is configured as a generalized Hadamard matrix comprising elements that are defined by the prime factors constituting the number N RE of the time-frequency resources. This may allow one to obtain an orthogonal structure of the codebook itself that is relevant for rate adaptation and generalization to a multi-antenna system. In one embodiment of the first aspect, the base is defined as a q-th root of unity, where q is a product of the at least two different prime factors, and the quadratic polynomial is a quadratic form defined by using an m x m symmetric matrix S. By constructing the mask sequence this way, one may generate the codebook of any size, with entries of each codeword being defined by a Phase-Shift Keying (PSK) alphabet.

In one embodiment of the first aspect, the symmetric matrix S comprises diagonal elements represented by integers modulo q or integers modulo q divided by 2, and off-diagonal elements represented by integers modulo q divided by 2. This embodiment may allow one to maximize a minimum chordal distance between the codewords constituting the codebook, thereby increasing the efficiency of decoding the codewords at the receiver.

In one other embodiment of the first aspect, the symmetric matrix S comprises a main diagonal constituted by blocks. Each block has a size corresponding to an order of respective one of the prime factors constituting N RE , and comprises elements each being (i) the product of an integer modulo said prime factor and q divided by said prime factor if said prime factor is odd, or (ii) the product of an integer modulo said prime factor and q divided by the product of 2 and said prime factor if said prime factor is two. At the same time, the symmetric matrix S comprises off-diagonal-block elements set to zero or to integer multiples of one of the prime factors constituting N RE . This embodiment may allow one to maximize the minimum chordal distance between the codewords constituting the codebook, thereby increasing the efficiency of decoding the codewords at the receiver.

In one more other embodiment of the first aspect, the symmetric matrix S comprises a main diagonal constituted by a first block and a second block. The first block comprises a binary matrix selected from a Delsarte-Goethals (DG) set of binary matrices, and the second block comprises a ternary number that is fixed or associated with the first block. This embodiment may allow one to maximize the minimum chordal distance between the codewords constituting the codebook, thereby increasing the efficiency of decoding the codewords at the receiver.

In one embodiment of the first aspect, the symmetric matrix S for the quadratic polynomial of each of the at least one mask sequence is selected such that a rank of a difference between the equally-indexed diagonal blocks of any two symmetric matrices S is as large as possible. This embodiment may allow one to maximize the minimum chordal distance between the codewords constituting the codebook, thereby increasing the efficiency of decoding the codewords at the receiver. In one embodiment of the first aspect, the transmitter is further configured to generate control information comprising the number N RE of the time-frequency resources and a number N CB of the codewords in the generated codebook, and provide, to the receiver, the control information prior to said providing the information bits. By so doing, one may make the transmitter according to the first aspect more flexible in use.

According to a second aspect, a receiver for wireless communications is provided. The receiver is configured to receive control information comprising a number N RE of time- frequency resources and a number N CB of codewords in a codebook to be generated. The receiver is further configured to find prime factors for N RE such that at least two of the prime factors are different. The receiver is further configured to generate the codebook comprising the N CB codewords. Each codeword is generated by multiplying at least one mask sequence with one of an orthogonal set of vectors. Each of the at least one mask sequence is obtained by using an exponentiation operation involving a base and an exponent, with the base being defined by the at least two different prime factors and the exponent being defined by a quadratic polynomial having a number m of variables, where m is equal to a total number of the prime factors constituting N RE . The receiver is further configured to receive at least one transmitted codeword having information bits encoded therein, and retrieve the information bits by calculating chordal distances between the at least one transmitted codeword and each of the N CB codewords. By so doing, it is possible to provide pilotless transmission of the information bits in at least one codeword from the transmitter to the receiver. Moreover, this embodiment of the receiver may provide a high-performance codebook that is accommodated for any number N RE of time-frequency resources used by the transmitter for the pilotless transmission of the information bits.

In one embodiment of the second aspect, the orthogonal set of vectors is configured as a generalized Hadamard matrix comprising elements that are defined by the prime factors constituting the number N RE of the time-frequency resources. This may allow one to obtain an orthogonal structure of the codebook that is relevant for rate adaptation and generalization to a multi-antenna system.

In one embodiment of the second aspect, the base is defined as a q-th root of unity, where q is a product of the at least two different prime factors, and the quadratic polynomial is a quadratic form defined by using an m x m symmetric matrix S. By constructing the mask sequence this way, one may generate the codebook of any size.

In one embodiment of the second aspect, the symmetric matrix S comprises diagonal elements represented by integers modulo q or integers modulo q divided by 2, and off- diagonal elements represented by integers modulo q divided by 2. This embodiment may allow one to maximize a minimum chordal distance between the codewords constituting the codebook, thereby increasing the efficiency of decoding the codewords at the receiver.

In one other embodiment of the second aspect, the symmetric matrix S comprises a main diagonal constituted by blocks. Each block has a size corresponding to an order of respective one of the prime factors constituting N RE , and comprises elements each being (i) the product of an integer modulo said prime factor and q divided by said prime factor if said prime factor is odd, or (ii) the product of an integer modulo said prime factor and q divided by the product of 2 and said prime factor if said prime factor is two. At the same time, the symmetric matrix S comprises off-diagonal-block elements set to zero or to integer multiples of one of the prime factors constituting N RE . This embodiment may allow one to maximize the minimum chordal distance between the codewords constituting the codebook, thereby increasing the efficiency of decoding the codewords at the receiver.

In one more other embodiment of the second aspect, the symmetric matrix S comprises a main diagonal constituted by a first block and a second block. The first block comprises a binary matrix selected from a Delsarte-Goethals (DG) set of binary matrices, and the second block comprises a ternary number that is fixed or associated with the first block. This embodiment may allow one to maximize the minimum chordal distance between the codewords constituting the codebook, thereby increasing the efficiency of decoding the codewords at the receiver.

In one embodiment of the second aspect, the symmetric matrix S for the quadratic polynomial of each of the at least one mask sequence is selected such that a rank of a difference between the equally-indexed diagonal blocks of any two symmetric matrices S is as large as possible. This embodiment may allow one to maximize the minimum chordal distance between the codewords constituting the codebook, thereby increasing the efficiency of decoding the codewords at the receiver.

According to a third aspect, a method for wireless communication is provided. The method comprises the step of finding prime factors for a number N RE of time-frequency resources such that at least two of the prime factors are different. The method further comprises the step of generating a codebook comprising at least one codeword. Each of the at least one codeword is generated by multiplying at least one mask sequence with one of an orthogonal set of vectors. Each of the at least one mask sequence is obtained by using an exponentiation operation involving a base and an exponent, with the base being defined by the at least two different prime factors, and the exponent being defined by a quadratic polynomial having a number of m variables, where m is equal to a total number of the prime factors constituting N RE . The method further comprises the step of providing, to a receiver, information bits in at least one of the at least one codeword over the N RE time-frequency resources. By so doing, it is possible to provide pilotless transmission of the information bits in at least one codeword from the transmitter to the receiver. Moreover, in this embodiment of the method, a high- performance codebook may be provided, which is accommodated for any number N RE of time-frequency resources used for the pilotless transmission of the information bits.

According to a fourth aspect, a method for wireless communication is provided. The method comprises the step of receiving control information comprising a number N RE of time- frequency resources and a number N CB of codewords in a codebook to be generated. The method further comprises the step of finding prime factors for N RE such that at least two of the prime factors are different. The method further comprises the step of generating the codebook comprising N CB codewords. Each codeword is generated by multiplying at least one mask sequence with one of an orthogonal set of vectors. Each of the at least one mask sequence is obtained by using an exponentiation operation involving a base and an exponent, with the base being defined by the at least two different prime factors, and the exponent being defined by a quadratic polynomial having a number m of variables, where m is equal to a total number of the prime factors constituting N RE . The method further comprises the steps of receiving at least one transmitted codeword having information bits encoded therein, and retrieving the information bits by calculating chordal distances between the at least one transmitted codeword and each of the N CB codewords. By so doing, it is possible to provide pilotless transmission of the information bits in at least one codeword from the transmitter to the receiver. Moreover, in this embodiment of the method, a high-performance codebook may be provided, which is accommodated for any number N RE of time-frequency resources used by the pilotless transmission of the information bits.

Other features and advantages of the present disclosure will be apparent upon reading the following detailed description and reviewing the accompanying drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

The essence of the present disclosure is explained below with reference to the accompanying drawings in which:

FIG. 1 shows a general block-scheme of a wireless communication system deployed within a geographic area of interest;

FIG. 2 shows a general scheme for the construction of a multidimensional codebook based on the second-order Reed-Muller codes; FIGs. 3 and 4 shows show dependences of a chordal distance d c on a codebook size for different number N RE of resource elements;

FIG. 5 shows a block-scheme of a transmitter capable of performing pilotless transmission in accordance with one example;

FIG. 6 shows a flowchart of a method for operating the transmitter shown in FIG. 5 in accordance with one example;

FIG. 7 shows a block-scheme of a receiver capable of receiving and processing at least one codeword from the transmitter shown in FIG. 5 in accordance with one example;

FIG. 8 shows a flowchart of a method for operating the receiver shown in FIG. 7 in accordance with one example;

FIG. 9 shows a flowchart explaining how to generate a codebook used in the methods shown in FIGs. 6 and 8 in accordance with one example;

FIGs. 10-14 show the minimum chordal distance d c as a function of the codebook size for different N RE = 6, 12, 14, 15, and 24;

FIG. 15 shows a method of operating the transmitter shown in FIG. 5 in accordance with one other example;

FIG. 16 shows a method of operating the receiver shown in FIG. 7 in accordance with one other example;

FIG. 17 shows a flow diagram explaining the interaction between the transmitter shown in FIG. 5 and the receiver shown in FIG. 7 in accordance with one example.

DETAILED DESCRIPTION

Various embodiments of the present disclosure are further described in more detail with reference to the accompanying drawings. However, the present disclosure can be embodied in many other forms and should not be construed as limited to any certain structure or function discussed in the following description. In contrast, these embodiments are provided to make the description of the present disclosure detailed and complete.

According to the detailed description, it will be apparent to the ones skilled in the art that the scope of the present disclosure encompasses any embodiment thereof, which is disclosed herein, irrespective of whether this embodiment is implemented independently or in concert with any other embodiment of the present disclosure. For example, the apparatuses and methods disclosed herein can be implemented in practice by using any numbers of the embodiments provided herein. Furthermore, it should be understood that any embodiment of the present disclosure can be implemented using one or more of the elements presented in the appended claims.

The word “exemplary” or example is used herein in the meaning of “used as an illustration”. Unless otherwise stated, any embodiment described herein as “exemplary” or an example should not be construed as preferable or having an advantage over other embodiments.

In some embodiments described herein, each of a transmitter and a receiver may refer to an individual device or be part of a complex device. In other embodiments described herein, one of the transmitter and the receiver may refer to an individual device, while another of the transmitter and the receiver may be part of a complex device. Such a complex device may be implemented, for example, as a user equipment (UE) or a base station (BS).

The UE may refer to a mobile device, a mobile station, a terminal, a subscriber unit, a mobile phone, a cellular phone, a smart phone, a cordless phone, a personal digital assistant (PDA), a wireless communication device, a laptop computer, a tablet computer, a gaming device, a netbook, a smartbook, an ultrabook, a medical device or medical equipment, a biometric sensor, a wearable device (for example, a smart watch, smart glasses, a smart wrist band), an entertainment device (for example, an audio player, a video player, etc.), a vehicular component or sensor, a smart meter/sensor, industrial manufacturing equipment, a global positioning system (GPS) device, an Internet-of-Things (loT) device, a machine-type communication (MTC) device, a group of Massive loT (MloT) or Massive MTC (mMTC) devices/sensors, or any other suitable device configured to support wireless communications.

The BS may relate to a fixed point of communication for the UEs in a particular carrier network. The BS may be referred to as a base transceiver station (BTS) in terms of the 2G communication technology, a NodeB in terms of the 3G communication technology, an evolved NodeB (eNodeB) in terms of the 4G communication technology, and a gNB in terms of the 5G NR communication technology. The BS may be implemented as a basic service set (BSS) representing a set of all base stations communicating with each other, or an extended service set (ESS) representing a set of connected BSSs. The BS may serve different cells, such as a macrocell, a microcell, a picocell, a femtocell, and/or other types of cells. The macrocell may cover a relatively large geographic area (for example, at least several kilometers in radius). The microcell may cover a geographic area less than two kilometers in radius, for example. The picocell may cover a relatively small geographic area, such, for example, as offices, shopping malls, train stations, stock exchanges, etc. The femtocell may cover an even smaller geographic area (for example, a home). Correspondingly, the BS serving the macrocell may be referred to as a macro BS, the BS serving the microcell may be referred to as a micro BS, and so on.

FIG. 1 shows a general block-scheme of a wireless communication system 100 deployed within a geographic area of interest, such, for example, as any of the above-mentioned macrocell, microcell, picocell, and femtocell. The communication system 100 comprises a transmitter 102, a receiver 104, and a communication channel 106 via which the transmitter 102 and the receiver 104 may communicate with each other. The transmitter 102 may be part of any of the above-mentioned types of the UEs, while the receiver 104 may be part of any of the above-mentioned types of the BSs, or vice versa. Let us now assume that the transmitter 102 needs to transmit a multidimensional symbol 108 of length N RE towards the receiver 104. To perform such transmission, the transmitter 102 should use N RE time- frequency resources, also known as resource elements (REs), which are available at the moment. As a rule, the REs are grouped into Physical Resource Blocks (PRBs). Each PRB consists of 12 subcarriers. In time, the REs are grouped into slots, where each slot are constituted by 7 or 14 REs. When the N RE REs are allocated, the transmitter 102 modulates certain subcarriers with the multidimensional symbol 108, thereby generating a modulated signal. The transmitter 102 comprises a transmitting antenna 110 configured to transmit the modulated signal to the receiver 104. In turn, the receiver 104 comprises a receiving antenna 112 configured to receive the modulated signal. Since it is impossible to make the communication channel 106 absolutely noiseless and to provide error-free signal demodulation at the receiver 104, the modulated signal received at the receiver 104 may be conditionally presented as a received signal 114 in the form: y = sh + noise, where y is the received signal 114, s is the multidimensional symbol 108, h is the channel coefficient that is a scalar. The channel coefficient h is constant over the PRB constituted by N re REs but can change from PRB to PRB.

If pilotless transmission is used in the communication system 100, the channel coefficient h is then unknown, neither at the transmitter 102 nor the receiver 104. For this reason, the transmitter 102 cannot try to adapt to and compensate for channel distortion peculiar to the communication channel 106. As a result, the receiver 104 cannot detect if the received signal 114 is purely s or any other signal 1 16 of the form as, a being any complex number that has been transmitted, as a cannot be separated from the channel distortion. One possible way to resolve the above-mentioned problem consists in using multidimensional codebooks each representing a collection of codewords. Such a multidimensional codebook can achieve a higher transmission rate than pilot-based transmission. The multidimensional codebook and its constituents-codewords may also be referred to as a multidimensional constellation and constellation points, respectively, in the art. In general, the multidimensional codebook may be considered as a look-up table providing the mapping between input data, such as information bits or the multidimensional symbol 108, and certain one or more codewords. It should also be noted that the multidimensional codebook may be mentioned further as a codebook, just for the sake of convenience and simplicity; but whenever the codebook is used, one should understand that it is exactly the multidimensional codebook or constellation.

There is a plethora of known multidimensional codebooks that could be used for the pilotless transmission. Such codebooks may be classified in the following two groups depending on construction methods: computer search and analytical designs. The codebooks constructed based on the computer-search method often do not have a specific structure that may be relevant for practical purposes. Moreover, the computer-search method itself is limited by computer capabilities, i.e. its application to generating large codebooks in size and/or in dimensionality becomes prohibitively complex. The codebooks constructed based on the analytical designs have a typical drawback to be provided for very limited scenarios either in size or dimensionality. The analytical designs are very often based on the Galois field (GF) theory, and thus derived for dimensions which are prime-powers or functions of a prime- power, which is not well adapted to the 5G NR technology.

At the same time, the analytical designs of specific interest are related to the Kerdock, Delsarte-Goethals, and second-order Reed-Muller codes in powers-of-two dimensions. The codebook constituted by any of these codes is a collection of orthogonal sets of codewords, where each set is constructed from a Hadamard matrix multiplied by a cover or mask sequence. The orthogonal and nested structure of such a codebook is relevant for rate adaptation and generalization to multi-antenna system.

Let us now recall how the multidimensional codebooks may be constructed based on the Kerdock, Delsarte-Goethals, and second-order Reed-Muller codes in powers-of-two dimensions. Assuming that the number N RE of the available (allocated) REs is equal to N RE = 2 m , with the order m ≥ 1. The multidimensional codebook is constructed from an orthogonal set of vectors which are all a covered version of the Hadamard matrix. Each orthogonal set of vectors is an 2 m x 2 m unitary matrix whose rows and columns are indexed by m-binary vectors. For example, with m = 3, the rows and columns are indexed with an element in the Galois field GF(8), i.e. with intergers 0 to (2 3 - 1) = 7 represented by the following binary mapping (where the superscript T is the transpose sign):

0 → (0,0, 0) T 4 → (1,0, 0) T

1 → (0,0, 1) T 5 → (0,0, 1) T

2 → (0,1, 0) T 6 → (1,1, 0) T

3 → (0,1, 1) T 7 → (0,1, 1) T .

More specifically, each codebook is a set of column vectors {c S,k } whose elements are defined by where GF(2 m ) is the Galois field defined by 2 m , l e GF(2 m ) is the binary vector indexing the rows, k ∈ GF(2 m ) and S are the binary vector and symmetric matrix, respectively, indexing the columns. Given S and k thus defined, the vector is a codeword in the second-order quaternary Reed-Muller code. By rewriting it as and omitting the constant which is just a normalization applied to the codewords, one may see that the codewords are constructed by an element-wise product of the Hadamard matrix and the mask sequence . The mask sequence is obtained by using an exponentiation operation, with the quadratic form being an exponent and the 4-th root of unity being a base.

FIG. 2 shows a general scheme for the construction of a multidimensional codebook 200 based on the second-order Reed-Muller codes, as described above. More specifically, each codeword of the codebook 200, which is represented by a properly-shaded column, is an element-wise product of one of columns of an Hadamard matrix 202 and one of mask sequences 204a, 204b, 204c. The number of the mask sequences and the number of the columns of the Hadamard matrix 202 are given only as an example and may change if required. As shown in FIG. 2, the codewords of the codebook 200 may be obtained by using the different mask sequences 204a, 204b, 204c. In turn, each of the mask sequences 204a, 204b, 204c is characterized by its own symmetric matrix. The correlation between two codewords c s,k and c s',k' constructed from two different symmetric matrices S and S' is given by where the superscript H indicates the complex conjugate transpose, and R = rank[(S - S') mod 2 ] is the rank of the difference between the symmetric matrices S and S'. An equivalent chordal distance d c between the codewords c s,k and c s',k' is thus

It should be noted that the chordal distance d c is used to measure the maximum likelihood decoding rule and pairwise-error rate on the receiving side, i.e. at the receiver 104. A good codebook design is obtained by maximizing the chordal distance d c .

There is a maximum of 2 m(m+1)/2 possible binary symmetric matrices S. This full set of binary matrices can be constructed as a nested subspace S m of symmetric matrices, known as the Delsarte-Goethals (DG) sets,

For any DG(m, r) is a (r + 1)m-dirnentional binary subspace leading to a collection of 2 (r+1)m symmetric matrices such that any non-zero matrix in the set DG(m,r) has a rank at least equal to R = m - 2r. The first set K m = DG(m, 0) is called the Kerdock set such that, at a given S ∈ DG(m, 0), the vector is a codeword in the quaternary Kerdock code. The Kerdock set is a subspace of full-rank binary matrices.

The codebook construction described above relies on using almost all possible quadratic polynomials defined over the ring of integers modulo 4 with the binary multidimensional variable l. Some quadratic polynomials are not considered in this codebook construction but can be used to increase a codebook size, as described below.

For example, let us consider the case m = 2, so that and . By expansion and observing that x 2 = x for a binary variable (precisely 0 2 = 0 and 1 2 = 1) we have Hence, with binary symmetric matrices, we are able to list all possible coefficients modulo 4 for the first-degree terms of the quadratic polynomial, while the coefficient of the second- degree term of the quadratic polynomial can only be 0 or 2. This results in a codebook with 32 codewords and the chordal distance By considering also s 12 = 1/2 and

3/2, we are able to construct other possible quadratic polynomials, which extend the codebook to 64 codewords with the chordal distance

The observation above may extend to any m, where larger codebooks are obtained by considering symmetric matrices with binary diagonal elements but off-diagonal elements equal to 0, 1/2, 1 or 3/2. Let the extended DG set containing all these matrices be denoted by which is of size 2 m2 . This means that the maximum codebook size may be increased from 2 m/2(m+3) to 2 m(m+3)

FIGs. 3 and 4 show dependences of the chordal distance d c on the codebook size for the cases with m = 2 (which corresponds to N RE = 4) and m = 3 (which corresponds to N RE = 8), respectively. The upper bound shown is a composite bound which is the minimum of the simplex/Welch, Levenshtein, and Hamming bounds. In FIGs. 3 and 4, there are points 300, 400 which correspond to the codebook constructed based on the orthogonal Hadamard matrix only, points 302, 402 which correspond to the codebook constructed based on the Kerdock codes (K 2 = DG(2,0) and K 3 = DG(3,0), respectively), points 304, 404 which correspond to the codebook constructed based on the DG codes (DG(2,1) = S 2 and DG(3,1) = S 3 , respectively), and points 306, 406 which correspond to the codebook constructed based on the extended DG sets (S 2 + and S 3 + , respectively). In the case with m = 2, the codebook size increases from 2 bits to 6 bits, where the chordal distance 0.61. In the case with m = 3, the codebook size increases from 3 bits to 12 bits, where the chordal distance In FIG. 4, there is also a point 408 corresponding to an intermediate codebook with the size of 11 bits and the chordal distance which is obtained by limiting the three off-diagonal elements of the symmetric matrix S such that always two of them are either 1/2 or 3/2, and the remaining one is either 0 or 1.

However, the above-described constructions of the multidimensional codebooks based on the Kerdock, DG, and second-order Reed-Muller codes are limited to power-of-a-prime dimensions. Other prior art construction methods, such as those based on Zadoff-Chu (ZC) sequences, are limited to using single-variable quadratic polynomials to obtain the mask sequences. All of this do not provide a satisfactory codebook size and correlation properties (i.e. proper chordal distances between the codewords) in case of using the non-prime number of the REs. The exemplary embodiments disclosed herein provide a technical solution that allows mitigating or even eliminating the above-sounded drawbacks peculiar to the prior art. In particular, the technical solution disclosed herein allows constructing families of multidimensional codebooks for non-prime power dimensions in order for them to be able to accommodate to any possible RE allocation. Briefly speaking, each codeword of the multidimensional codebook is generated by multiplying at least one mask sequence with one of an orthogonal set of vectors. Each of the at least one mask sequence is obtained by using the exponentiation operation, which may be mathematically expressed as b e , where b and e are the base and exponent, respectively, of the exponentiation operation. The technical solution relies on the base b defined by at least two different prime factors of a given number N RE of the REs and the exponent e defined by a quadratic polynomial having a number m of variables, where m is equal to a total number of the prime factors constituting N RE . The resulting multidimensional codebooks are characterized by the large minimum chordal distance d c , which guarantees good performance. Moreover, the technical solution disclosed herein allows generating a family of nested codebooks, which is desirable for rate adaptation. On top of that, the resulting multidimensional codebooks can potentially be exploited to define quasi-Gray bit mapping, simpler decoding and log-likelihood computation.

The above-mentioned prime factors are derived from the prime factorization or prime decomposition of the number N RE of the REs. As used herein, the prime factorization of a given number, such as N RE , may refer to determining a set of prime factors whose product gives the number itself. The prime factors themselves are prime numbers (i.e. those numbers which can be divided by themselves and 1 only). In the context of the prime factorization, the word “different” or “unique” means the prime factors which do not repeat each other. For example, the prime factorization of 12 looks as follows: 12 = 2 x 2 x 3, where 2 and 3 are different or unique prime factors.

FIG. 5 shows a block-scheme of a transmitter 500 capable of performing the pilotless transmission in accordance with one exemplary embodiment. As noted earlier, the transmitter 500 may be either an individual device or part of the UE or the BS. As shown in FIG. 5, the transmitter 500 comprises at least the following constructive elements: a processor 502, a storage 504, and a transmitting means 506. The storage 504 is coupled to the processor 502 and stores processor-executable instructions 508 which, when executed by the processor 502, cause the processor 502 to generate a multidimensional codebook 510 based on a number 512 N RE of the REs and use the multidimensional codebook 510 in the pilotless transmission of information (or coded) bits 514. The storage 504 further comprises a database 516 configured to store the multidimensional codebook 510 once generated. It should be noted that the number, arrangement and interconnection of the constructive elements constituting the transmitter 500, which are shown in FIG. 5, are not intended to be any limitation of the present disclosure, but merely used to provide a general idea of how the constructive elements may be implemented within the transmitter 500. In one other exemplary embodiment, the transmitter 500 may further comprise at least one receiver configured to receive the number 512 N RE of the REs and the information (or coded) bits 514 and provide them, as inputs, to the processor 502 for further processing. It is also implied that the transmitting means 506 is configured to perform different operations required to perform the pilotless transmission of the information bits 514 in at least one codeword 518 of the codebook 510, including the modulation of certain subcarrier(s) with the at least one codeword 518.

The processor 502 may be implemented as a central processing unit (CPU), general-purpose processor, single-purpose processor, microcontroller, microprocessor, application specific integrated circuit (ASIC), field programmable gate array (FPGA), digital signal processor (DSP), complex programmable logic device, etc. It should be also noted that the processor 502 may be implemented as any combination of one or more of the aforesaid. As an example, the processor may be a combination of two or more microprocessors.

The storage 504 may be implemented as a nonvolatile or volatile memory used in the modern electronic computing machines. As an example, the nonvolatile memory may include Read- Only Memory (ROM), ferroelectric Random-Access Memory (RAM), Programmable ROM (PROM), Electrically Erasable PROM (EEPROM), solid state drive (SSD), flash memory, magnetic disk storage (such as hard drives and magnetic tapes), optical disc storage (such as CD, DVD and Blu-ray discs), etc. As for the volatile memory, examples thereof include Dynamic RAM, Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDR SDRAM), Static RAM, etc.

The processor-executable instructions 508 stored in the storage 504 may be configured as a computer executable code which causes the processor 502 to perform the aspects of the present disclosure. The computer executable code for carrying out operations or steps for the aspects of the present disclosure may be written in any combination of one or more programming languages, such as Java, C++, or the like. In some examples, the computer executable code may be in the form of a high level language or in a pre-compiled form, and be generated by an interpreter (also pre-stored in the storage 504) on the fly.

FIG. 6 shows a flowchart of a method 600 for operating the transmitter 500 in accordance with one exemplary embodiment. Each of the steps of the method 600 is performed by corresponding one of the above-described constructive elements constituting the transmitter 500. The method 600 starts with a step S602, in which the processor 502 finds prime factors for the number 512 N RE of the REs. Such prime factorization should be performed such that two or more prime factors are different, which may be written as follows: where p 1 < ··· < p n are the n different prime factors, each of the order m 1; There is a total of prime factors (including the repeating ones) constituting N RE .

Further, the method 600 proceeds to a step S604, in which the processor 502 generates the codebook 510 comprising N CB codewords. Each of the N CB codewords is generated by multiplying at least one mask sequence with one of an orthogonal set of vectors, like it was done above with reference to FIG. 2. At the same time, the difference is that each of the at least one mask sequence is obtained by using the exponentiation operation, in which the base is defined by the n different prime factors and the exponent is defined by a quadratic polynomial having a number m of variables (i.e. the number of variables in the quadratic polynomial is equal to the total number of the prime factors constituting N RE ).

In the embodiments disclosed herein, the orthogonal set of vectors may refer to any subset of vectors (v 1 , ... , v k ) in a vector space V, which is such that a scalar product of any two different vectors of the subset is equal to zero, i.e. (v i ,v j ) = 0 at i ≠ jj That is, the vectors of the subset are mutually perpendicular. The type or pattern of such an orthogonal set of vectors may be pre-defined in the transmitter 500, i.e. the processor 502 may be preconfigured to use a certain type of the orthogonal set of vectors in the step S604. One nonlimiting example of such a type of the orthogonal set of vectors is a generalized Hadamard matrix, and the processor 502 may either construct it or use its pre-stored (in the storage 504) pattern in the step S604.

After that, the method 600 ends up with a step S606, in which the transmitting means 506 performs the pilotless transmission of the information bits 514 in at least one codeword 518 over the N RE REs. It should be noted that the at least one codeword 518 to be used for the pilotless transmission of the information bits 514 may be selected by the processor 502 based on any known mapping techniques, such as bits-to-codeword mapping or look-up tables, for which reason their description is omitted therein.

FIG. 7 shows a block-scheme of a receiver 700 capable of receiving and processing the at least one transmitted codeword 518 from the transmitter 500 in accordance with one exemplary embodiment. Similarly, the receiver 700 may be either an individual device or part of the UE or the BS. As shown in FIG. 7, the receiver 700 comprises at least the following constructive elements: a processor 702, a storage 704, and a receiving means 706. The storage 704 is coupled to the processor 702 and stores processor-executable instructions 708 which, when executed by the processor 702, cause the processor 702 to generate the same multidimensional codebook 510 as the processor 502 of the transmitter 500, and use the multidimensional codebook 510 to retrieve the information bits 514 from the at least one transmitted codeword 518. To generate the multidimensional codebook 510, the receiver 700 needs to know the number 512 N RE of the REs and the number N CB of the codewords in the codebook 510 to be generated. These parameters may be combined into control information 710. In one embodiment, the control information 710 may be communicated directly by the transmitter 500 to the receiver 700 prior to performing the step S506. In one other embodiment, the receiver 700 may be pre-configured to store the control information 710 in the storage 704, i.e. before the initiation of its interaction with the transmitter 500. In one more other embodiment, the transmitter 500 may configured to provide the control information 710 to any intermediate device that, in turn, is configured to communicate the control information 710 to the receiver 700 before the initiation of its interaction with the transmitter 500. The storage 704 further comprises a database 712 configured to store the multidimensional codebook 510 once generated. Again, the number, arrangement and intercommunication of the constructive elements constituting the receiver 700, which are shown in FIG. 7, are not intended to be any limitation of the present disclosure, but merely used to provide a general idea of how the constructive elements may be implemented within the receiver 700.

It should also be noted that each of the processor 702, the storage 704 and the processor- executable instructions 708 may be implemented in the same or similar manner as corresponding one of the processor 502, the storage 504 and the processor-executable instructions 508 of the transmitter 500 shown in FIG. 5. As for the receiving means 706, it is implied to be configured to perform different operations required to perform the receipt of the at least one transmitted codeword 518 of the codebook 510, including the demodulation of certain subcarrier(s) carrying the at least one transmitted codeword 518.

FIG. 8 shows a flowchart of a method 800 for operating the receiver 700 in accordance with one exemplary embodiment. Each of the steps of the method 800 is performed by corresponding one of the above-described constructive elements constituting the receiver 700. The method 800 starts with a step S802, in which the receiving means 706 receives the control information 710 comprising the number 512 N RE of the REs and the number N CB of codewords in the codebook 510 to be generated. As noted above, the control information 710 may be communicated to the receiving means 706 of the receiver 700 directly from the transmitting means 506 of the transmitter 500 or any other intermediate device, orthe storage 704 of the receiver 700 may be pre-configured to store the control information 710 before the initiation of the interaction between the transmitter 500 and the receiver 700. In the latter case, the receiving means 706 may be used only to receive the at least one transmitted codeword 518. Anyway, the control information 710 should then be provided to the processor 702 for further processing.

More specifically, in a step S804, the processor 702 proceeds to find the prime factors for N RE such that at least two of the prime factors are different. Then, in a step S806, the processor 702 generates the codebook 510 comprising the N CB codewords in the same or similar manner as it is done by the processor 502 in the step S504 of the method 500. Similarly, the type or pattern of the orthogonal set of vectors may be pre-defined in the receiver 700, i.e. the processor 702 may be pre-configured to use a certain type of the orthogonal set of vectors, such, for example, as the generalized Hadamard matrix, in the step S806. Moreover, in one embodiment, both the transmitter 500 and the receiver 700 may further be pre-configured to use the same type or pattern of the base and the exponent in the exponentiation operation. By so doing, the control information 710 may be represented by the above-mentioned parameters N RE and N CB only. In another (more resource-intensive) embodiment, the type or pattern of the base and the exponent may also be transmitted to the receiver 700, i.e. the processor 702, in the control information 710.

After that, the method 800 proceeds to a step S808, in which the receiving means 706 further receives the at least one transmitted codeword 518 from the transmitter 500 and provides it to the processor 702. The method 800 ends up with a step S810, in which the processor 702 retrieves the information bits 514 by calculating the chordal distances d c between the at least one transmitted codeword 518 and each of the N CB codewords. The chordal distances d c may be used to compute likelihood values to be used in a decoder which may be further included in the receiver 700.

The performance of the codebook 510 generated in each of the steps S604 and S806 of the methods 600 and 800, respectively, is characterized by its pairwise distance distribution, i.e. any codebook with the same chordal distance distribution can be considered equivalent. It is worth noticing that, according to the above-given definition of the chordal distance d c , any phase rotation of the codewords, or any unitary rotation of the whole codebook leads to an equivalent codebook. That is, a codebook {¾,s 2 , ... , c NcB ] is equivalent to any codebook of the form for an arbitrary set of phases {Φ 1 2 , - , Φ Ncb

Additionally, the codebook is equivalent to any codebook of the form {Uc 1 , Uc 2 , ... , UC Ncb ] where U is the arbitrary N RE x N RE unitary matrix.

FIG. 9 shows a flowchart 900 of how each of the steps S604 and S806 in the methods 600 and 800, respectively, may be implemented in accordance with one exemplary embodiment. Correspondingly, each step included in the flowchart 900 may be executed by each of the processors 502 and 702. The flowchart 900 starts with a step S902, in which it is determined whether the condition n 1 is met. In other words, the step S902 is aimed at determining whether there is more than 1 different prime factor in the prime factorization of N RE . If the result of such determination is “No”, the flowchart 900 goes to the right branch represented by a step S904. Once the step S904 is initiated, one of the prior art construction methods, such, for example, as those based on the Kerdock, DG, second-order Reed-Muller codes or the Zadoff-Chu sequences, may be selected to construct a certain codebook. After that, the flowchart 900 is terminated. However, if “Yes” is provided in the step S902, the flowchart 900 goes to the left branch represented by steps S906-910, which are all aimed at generating the codebook 510. Each of the steps S906-S910 will now be described in more detail.

More specifically, the step S906 is executed to generate at least one mask sequence and comprises several substeps S906-1 - S906-4. In the substep S906-1 , a symmetric matrix S of size m x m is constructed, which may be performed by using one of the following three possible ways:

1) Diagonal elements of the symmetric matrix S may be set to integers modulo q or integers modulo q divided by 2, where is the product of the different prime factors in the prime factorization of N RE . In turn, off-diagonal elements of the symmetric matrix S may be set to integers modulo q divided by 2.

2) The symmetric matrix S may be implemented as a block diagonal matrix. As used herein, the block diagonal matrix may refer to a block matrix that is a square matrix such that blocks on its main diagonal are square matrices too. In this embodiment, each block has a size corresponding to the order of respective one of the prime factors constituting N RE , and comprise elements each being (i) the product of an integer modulo said prime factor and q divided by said prime factor if said prime factor is odd, or (ii) the product of an integer modulo said prime factor and q divided by the product of 2 and said prime factor if said prime factor is two. As for the off-diagonal-block elements of the symmetric matrix S, they may be set to zero or integer multiples of one of the prime factors constituting N RE .

Let us give one example of this embodiment. Assuming that N RE = 36 = 2 2 x 3 2 and Then, the first block S 1 is a square matrix of size m 1 x m 1 = 2 x 2, and the second block S 2 is a square matrix of the same size m 2 x m 2 2 x 2. Moreover, since the first prime is 2, the first block S 1 comprises elements each represented by the product of an integer modulo 2 and 3/2 (which is obtained as follows: q/(2 x 2) = (3 x 2)/(2 x 2) = 3/2). The second prime is odd, i.e. 3, for which reason the second block S 2 comprises elements each represented by the product of an integer modulo 3 and 2 (which is obtained as follows: q/3 = (3 x 2)/3 = 2).

3) The symmetric matrix S may comprise a main diagonal constituted by a first block and a second block. The first block may comprise a binary matrix selected from the DG set of binary matrices, while the second block may comprise a ternary number that is fixed or associated with the first block.

Once the symmetric matrix S is constructed (for example, by using any of the three embodiments given above), substep S906-2 is initiated, in which a quadratic polynomial P(x 1 ,x 2 , ... , Xm) in m variables is defined based on the symmetric matrix S. As used herein, the quadratic polynomial P(x 1 , x 2 , ... , x m ) may refer to a polynomial function with m variables, in which the highest-degree term is of the second order or degree. In general, the quadratic polynomial P(x 1 , x 2 , ... , x m ) may be written as follows: where a ij are the coefficients of a symmetric m-dirnensional matrix, b i are the coefficients of an m-dirnensional vector, and c is the constant. The symmetric matrix S defines all coefficients of the second-order terms in the quadratic polynomial P(x 1 ,x 2 , ... ,x m ). In other words,

In a preferred embodiment, the quadratic polynomial P(x 1 ,x 2 ,... ,x m ) is given as a quadratic form Q(x 1 , x 2 , ... , x m ) in which all terms are of the second degree, i.e.

Further, a next substep S906-3 is executed, in which the base used in the exponentiation operation is defined based on the different prime factors of N RE . In a preferred embodiment, the base may be defined as follows: where W is the base, and is the q-th root of unity in the field of complex numbers. In some embodiments, the base W may be represented by some random roots of unity. In particular, a small scaling of the root of unity in the base W is also possible, say, in the interval [0.5, 2], In other embodiments, the base W may be represented by different trigonometric functions such that or , (where j is the imaginary unit), ^ , etc., or any combinations of such trigonometric functions.

When the quadratic polynomial P(x 1 ,x 2 , ... ,x m ) and the base W are defined, a next substep S906-4 is initiated, in which the base W is exponentiated by the quadratic polynomial

P(x 1 ,x 2 , ... ,X m ), i.e. w P(x 1 , x 2 , ... ,x m ) thereby generating the mask sequence. After that, the substeps S906-1 - S906-4 are repeated until all mask sequences are generated. In one embodiment, only one mask sequence may be used to generate the codebook 510. The number of the mask sequences to be used depends on particular applications.

The step S908 of the flowchart 900 may be executed in parallel with the step S906. The step S908 is aimed at generating the pre-defined type of the orthogonal set of vectors. In other words, each of the processor 502 and 702 is pre-aware of how the orthogonal set of vectors should look like, thereby proceeding to its generation in the same manner. In a preferred embodiment, the orthogonal set of vectors is configured as the generalized Hadamard matrix comprising elements that are defined by the prime factors constituting N RE . In other words, each vector of the orthogonal set of vectors may be set to be respective one of the columns constituting such a generalized Hadamard matrix. In one embodiment, each column of the generalized Hadamard matrix can be found by computing the exponentiation of the q-th root of unity by a first-order polynomial with m variables.

The left branch of the flowchart 900 ends up with the step S910. In the step S910, the codebook 510 is generated by multiplying element-by-element the orthogonal set of vectors with the at least one generated mask sequence.

Let us give one example of how the codebook 510 may be constructed by using the flowchart 900. Assuming that n > 1, i.e. , and only one mask sequence is required. Let us further consider one-to-one mapping from a set Z NRE of intergers modulo N RE to a cartesian product of the Galois fields with the orders of the prime factors from the prime factorization of N RE :

Consistently, elements in Z NRE will be represented by m-dimensional vectors, which gives the m variables to be used in the quadratic polynomial. One example of such mapping is given below for N RE = 12, where each number x ∈ TL NKE can be represented by m = 3 variables [b 2 ,b 1 ,t] T , where b 1 and b 2 are two binary variables and t is a ternary variable, i.e. x = t x 2° · 2° · 3° + b 1 x 2° · 2° · 3 1 + b 2 x 2 0 · 2 1 · 3 1 . Explicitly, this mapping is given as follows: Z 1 2 → GF(2 2 ) x GF(3):

0 → (0,0, 0) T 4 → (0,1, 1) T 8 → (1,0, 2) T

1 → (o,o, 1) T 5 → (0,1, 2) T 9 → (1,1, 0) T

2 → (0,0, 2) T 6 → (1,0, 0) T 10 → (1,1, 1) T

3 → (0,1, 0) T 7 → (1,0, 1) T 11 → (1,1, 2) T

According to the step S910 of the flowchart 900, each codeword c s,k of the codebook 510 should be defined as the element-wise product of the mask sequence and one of the orthogonal set of vectors. Let us also assume that the orthogonal set of vectors is configured as a unitary Hadamard matrix U. Then, where ʘ is the sign of the elementwise product, also known as the Hadamard product,

- u k is the fc-th column, k ∈ Z NRE , of the matrix which is generated in the step S908 of the flowchart 900,

- w s is the mask sequence, which is generated in the step S906 of the flowchart 900.

Given that the mask sequence w s is obtained by using the quadratic form Q(x 1 ,x 2 , ...,x m ), which, in turn, is defined by the m x m symmetric matrix S, one may write the Zth element, l ∈ Z Nre , of the mask sequence w s as follows:

By setting the base W to the q-root of unity, one may have

As for the fc-the column u k of the matrix U, its element is given by with m x m diagonal matrix D is given by where l n is the n x n identity matrix for any integer n, and blkdiag ( M 1 ,M 2 , ... ,M n ) is the block diagonal matrix with the matrices M 1 ,M 2 , ... ,M n along its diagonal. Thus, the elements of each codeword in the codebook 510 are defined by where l, k ∈ ZN RE , S is the m x m symmetric matrix, D is the m x m diagonal matrix as defined above. The advantage of such design of the codebook 510 is that it allows constructing the codebooks of any size.

Given below are different exemplary embodiments of how to construct the symmetric matrix S, which may be used by the processors 502 and 702 in the step S906 of the flowchart 900.

General Construction 1 (GC1)

Restricting the elements of the symmetric matrix S to integers modulo q enables the construction of the multidimensional codebooks in a controlled manner. Similar to the prior art, the elements in S related to the second-order terms in the binary field, i.e. the m 1 coefficients if = 2, must be divided by 2 to avoid ambiguity with the one-order terms already generated in the generalized Hadamard matrix. This is because x 2 = x only in the binary field. Hence, the elements of the codewords are not q-root of unity but 2q-root of unity.

Putting all together, the diagonal elements of S may be restricted to be integers modulo q, except for p 1 = 2 where m 1 corresponding diagonal elements of S are integers modulo p divided by 2. The off-diagonal elements of S are integers modulo q divided by 2 - the division by two here is used to account that S is a symmetric matrix. As such, it is possible to construct a total codewords. This number is rather large, e.g. « 10 and 19 bits with N RE = 6 and 12, respectively, for which the codebook 510 will inevitably have a small minimum distance d c . It therefore is relevant to find smaller subcodebooks with larger possible minimum distances d c . Finding such subcodebooks with the larger minimum distances d c is not a trivial problem. Several constructions that result in generating smaller codebooks with large minimum distances d c are described below. General Construction 2 (GC2)

In this embodiment, the m x m symmetric matrix S is made of n blocks on its main diagonal, where the fc-th block is of size m k x m k with integer elements modulo p k (and divided by two if p 1 = 2) times all other prime factors, or equivalently times q divided by p k . In other words, the k-th block is constructed as where S k is p k - ary symmetric matrix of size m k x m k , and as , where Such a choice of elements enables the construction of many codewords with not-too small minimum distances d c . This construction may also be extended to the case p 1 = 2 and m 1 > 1, by considering all S Block diagonal (BD) constructions

In this embodiment, the off-block-diagonal elements of the symmetric matrix S are set to zero such that where each S k is a p k - ary symmetric matrix of size m k x m k . In the case p 1 = 2, the first block S 1 may also be extended to to have off-diagonal elements equal to 0, 1/2, 1 or 3/2.

By setting the off-block-diagonal elements to zero, the correlation between two codewords from two different symmetric matrices (used to define two different mask sequences), say, S as above and is defined by where . Let us remind that the corresponding chordal distance is given by

Moreover, the codewords are the Kronecker products in the codewords in subdimensions , which may be beneficial from implementation perspective. The maximum codebook size with the p k - ary symmetric matrix S k is then with the maximum correlation With such construction, the maximum minimum distance d c is therefore never less than

It desirable to construct even smaller subcodebook with the nested structure and largest possible distance d c . To do this, the S k symmetric matrices should be selected carefully. Specific exemplary embodiments for N RE = q = p 1 p 2 and N RE = 2 m1 3 are given below.

Block diagonal constructions for N re = p 1 p 2

In this case, the number N RE of the REs is the product of two prime factors p 1 and p 2 . Some relevant constructions with different sizes N CB and minimum distances (which is expressed via the maximum correlation Q between the codewords) are summarized in

Table 1. In this case, the S k symmetric matrices on the diagonal of the symmetric matrix S reduce to a scalar in the set Z Pk of integers modulo p k . In embodiment BD1 , the same scalar is used in each diagonal element, this enable the achievement of the maximum possible rank difference between the matrices. In embodiment BD2, all values in Z P2 for the second diagonal elements are considered such that they all have a rank one difference. In embodiment BD3, all possible values in both diagonal elements are considered such that they have least a rank one difference in one of the two elements.

Table 1: Block diagonal constructions for N RE = p 1 p 2 Block diagonal constructions for N RE = 2 m 1 · 3

In the case, N RE = 2 m 1 · 3, the first block is a m 1 x m 1 matrix, while the second block is a scalar. Good codebooks are found by limiting the choice of the first block inside the corresponding Kerdock set or cosets of the Kerdock set. These constructions are summarized in Table 2 provided with their sizes N CB and minimum chordal distances d c .

In embodiment BD4, the symmetric matric S is made of two diagonal blocks. The first block is a m 1 x m 1 binary matrix from the Kerdock set K mi = DGOn^ O). The second block is a ternary number uniquely associated to the first block such each block is used only once.

In embodiment BD5, the first block is any binary matrix from the Kerdock set K mi = OG(m 1 , 0), while the second block is a fixed ternary value, for example, 0.

The embodiment BD6 is specific to N RE = 12. In this case, the first block is any binary matrix from the Kerdock set K 2 = DG(2,0) or in a coset of this Kerdock set, where one coset leader is taken from the next DG set S 2 = DG(2,1) and another coset leader is taken from the symmetric matrix in the extension not in S 2 . Here, DG(2,1) contains only one coset of the Kerdock set so that a second coset can only be found in the extension The second block is a ternary number uniquely associated to the coset leader in the first block.

In embodiment BD7, the first block is any binary matrix from the Kerdock set K mi = DG(m 1 , 0) or in a coset of this Kerdock set, where a coset leader is taken from the next DG set DG(m 1 , 1). The second block is a ternary number uniquely associated to the coset leader in the first block.

The embodiment BD8 is the largest of such type of construction as described above, and embodiment BD9 is its extension to

Table 2: Block diagonal constructions for N RE = 2 m 1 · 3

Extended BD (EBD) constructions

The smallest BD constructions above lead to good codebooks, notably for the smallest size cases. The following embodiments show that it is possible to subsequently enlarge some of these previous constructions without significantly affecting the minimum distance d c by considering some specific non-zero diagonal elements.

A good choice for the off-diagonal elements of symmetric matric S is to limit them to multiples of the first prime factor as (r · c · p 1 / 2), where c ∈ Z q/P1 and r can be any integer such that (r mod q/P1 ) ≠ 0 . Without loss of generality, one may select r = 2 such that the off-diagonal elements are any integer multiples of c · p 1 where the multiple c is an interger modulo the product of all prime factors. Similarly, the fc-th good choice for the off-diagonal elements are (c · p k ), where c e 1 q/Pk .

Two embodiments of such constructions for N RE = p 1 p 2 are given in Table 3. Embodiment EBD1 extends embodiment BD2. Embodiment EBD2 extends embodiment BD3. Table 3: Extended block diagonal constructions for N RE = p 1 p 2 Other embodiments of such constructions for N RE = 12 = 2 2 x 3 and N RE = 24 = 2 3 x 3 are given in Table 4 and Table 5, respectively. Embodiments EBD4 and EBD9 are counterpart constructions in their respective dimension, based on Kerdock set matrices in the first diagonal block. Embodiments EBD6 and EBD11 are also counterpart constructions, based on all possible symmetric matrices in the first diagonal block. Embodiment EBD10 only selects 3 cosets of the Kerdock set for the first block, which are uniquely associated with a value in the second diagonal block.

Table 4: Extended block diagonal constructions forN RE = 12

Table 5: Extended block diagonal constructions for N RE = 24

FIGs. 10-14 show the minimum chordal distance d c as a function of the codebook size for different N RE = 6, 12, 14, 15, and 24. All the codebooks obtained are compared to a composite bound (shown as a solid line in FIGs. 10-14) made of the simplex/Welch, Levenshtein, and Hamming bounds. None of these bounds are met and the gap increases as the codebook size increases. This is expected because these bounds are known to become loose for the large codebook size. For N RE = 6, 12, 14, 15, and 24 (see FIGs. 10-14, respectively), the codebooks 510 constructed by using the above-described different embodiments of S are compared to single-variate quadratic polynomial phase ZC sequences.

For N RE = 12, the codebooks 510 are also compared to the computer search over a Quadrature Phase Shift Keying (QPSK) alphabet, such that the codebooks are also collections of unitary bases nested in size. The computer-search codebooks larger than 11 bits are not available due to search complexity.

For N RE = 14 and 15 (see FIGs. 12 and 13), the prior art nested codebook family 000 with a Phase-Shift Keying (PSK) alphabet for the non-prime dimension of the form 2(2 r - 1) and (2 r - 1) is also displayed. The construction of this prior art nested codebook family can be found in the following documents: 1) S. Boztas, R. Hammons and P. Y. Kumar, "4-phase sequences with near-optimum correlation properties," IEEE TIT 1992; 2) P. Y. Kumar, T. Helleseth, A. R. Calderbank, and R. Hammons "Large Families of Quaternary Sequences with Low Correlation," IEEE TIT 1996; 3) P. Y. Kumar, T. Helleseth, A. R. Calderbank, “An Upper Bound for Weil Exponential Sums over Galois Rings and Applications,” IEEE TIT 1995.

Thus, the above-described construction of the codebook 510 by using different S, in general, shows the highest minimum chordal distance d c and/or the largest codebook size. Nevertheless, it should be noted that, ultimately, more general computer search without any restriction on the codebook design should provide better codebooks at least for some small enough codebook sizes and not too large N RE , where the search complexity is manageable. Some exotic analytical constructions in the prior art may also be better for some given N RE and codebook sizes. However, there is no construction in the prior art which would generate families of codebooks that outperforms the codebook 510 constructed as describe above for any codebook size and N RE .

FIG. 15 shows a method 1500 of operating the transmitter 500 in accordance with one other exemplary embodiment. In general, the method 1500 may be considered as an extension of the method 600, since it involves the steps S602-S606. In particular, the method 1500 starts with a step S1502, in which the processor 502 of the transmitter 500 determines the number N RE of the REs available for the pilotless transmission, and a transmission rate by selecting the proper size N CB of the codebook 510 to be generated. The values N RE and N CB may be derived from scheduling parameters and/or channel quality information provided to the transmitter 500 from, for example, the receiver 700 or any other network device configured to estimate the quality of communications via the communication channel used by the transmitter 500 and the receiver 700 for their interaction. Next, the method 1500 proceeds to steps S1504 and S1506, which may be performed by the processor 502 in parallel. In the step S1504, the processor 502 receives the information bits 514 and split them into the same segments, for example, into segments each of size log 2 (N RE ). In the step S1506, the processor 502 performs the steps S602 and S604 of the method 600, thereby generating the codebook 510. After that, the method 1500 proceeds to a step S1508, in which the processor 502 maps each of the segments to respective one of the codewords constituting the codebook 510, whereupon modulates the subcarrier(s) provided by the N RE REs with the codeword(s) 518 thus selected for their transmission to the receiver 700.

FIG. 16 shows a method 1600 of operating the receiver 700 in accordance with one other exemplary embodiment. Similarly, the method 1600 may be considered as an extension of the method 800, since it involves the steps S802-S810. In particular, the method 1600 starts with a step S1602, in which the processor 702 of the receiver 700 performs the steps S802- S806 of the method 800, thereby generating the same codebook 510 as the processor 502 of the transmitter 500. To do this, the processor 702 needs to know at least the values N RE and N CB ; other parameters that may be required for generating the codebook 510, such as the type of the orthogonal set of vectors and the base W used in the exponentiation operation, may be pre-stored in the storage 704 of the receiver 700.

Next, the method 1600 proceeds to step S1604, in which the processor 702 performs the steps S808 and S810 of the method 800, concurrently demodulating the modulated subcarrier(s). For example, the step S1604 may yield likelihood values rather than the information bits. The likelihood values may then be used in a step S1606 for decoding the transmitted codeword(s) 518, thereby yielding the retrieved information bits 714.

FIG. 17 shows a flow diagram 1700 showing the interaction between the transmitter 500 and the receiver 700 in accordance with one exemplary embodiment. It is assumed that the transmitter 500 is part of the BS, while the receiver 700 is part of the UE. The flow diagram 1700 starts with a step S1702, in which the transmitter 500 of the BS and receiver 700 of the UE communicate different synchronization signals and control parameters to each other; such synchronization signals and control parameters may be used to properly establish the communication channel therebetween. During this process, the transmitter 500 of the BS also prepares a resource grant for the receiver 700 of the UE in a step S1704, and sends the resource grant to the receiver 700 of the UE via the control parameters in S1702. Further, in a step S1704, the transmitter 500 sends a reference signal in a step S1706, such as a Channel State Information Reference Signal (CSI-RS) or Cell-specific Reference Signal (C- RS). The receiver 700 receives the reference signal and starts estimating channel quality in a step S1708, whereupon the receiver 700 sends channel quality feedback to the transmitter 500 in a step S1710. The transmitter 500 receives the channel quality feedback and, based thereon, determines the number N RE of the REs to be allocated and the size N CB of the codebook 510 to be generated in a step S1712 which corresponds to the rate of the transmission the communication channel can support according to the channel quality feedback. Once N RE and N CB are determined, the transmitter 500 generates, in a step S1714, the codebook 510 by using the method 600. Parallel to and after the step S1714, the transmitter 500 sends the control information 710 comprising N RE and N CB to the receiver 700 in a step S1716. The receiver 700 receives the control information 710 and use it to generate the same codebook 510 in a step S1718 by using the method 800. After the step S1718, the pre-configuration of the receiver 700 is finished, i.e. the receiver 700 is ready for the pilotless transmission from the transmitter 500.

When the transmitter 500 has the information bits 514 to be transmitted, it maps them to at least one codeword of the codebook 510 and modulates at least one subcarrier provided by the N RE REs with the at least one codeword in a step S1720. In other words, the step S1720 yields the at least one transmitted codeword 518, which is then transmitted by the transmitter 500 to the receiver 700 in a step S1722. The step S1720 is performed without any pilot, such as the DM-RS, that would enable equalization at the receiver 700. The receiver 700, in turn, receives the at least one transmitted codeword 518, demodulates it and obtain the retrieved information bits 710 therefrom in a step S1724. After that, the flowchart 1700 ends up.

It should be noted that each step or operation of the methods 600, 800, 1500, 1600, the flowchart 900 and the flow diagram 1700, or any combinations of the steps or operations, can be implemented by various means, such as hardware, firmware, and/or software. As an example, one or more of the steps or operations described above can be embodied by processor executable instructions, data structures, program modules, and other suitable data representations. Furthermore, the processor-executable instructions which embody the steps or operations described above can be stored on a corresponding data carrier and executed by the processors 502 and 702. This data carrier can be implemented as any computer- readable storage medium configured to be readable by said at least one processorto execute the processor executable instructions. Such computer-readable storage media can include both volatile and nonvolatile media, removable and non-removable media. By way of example, and not limitation, the computer-readable media comprise media implemented in any method or technology suitable for storing information. In more detail, the practical examples of the computer-readable media include, but are not limited to information-delivery media, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile discs (DVD), holographic media or other optical disc storage, magnetic tape, magnetic cassettes, magnetic disk storage, and other magnetic storage devices.

Although the exemplary embodiments of the present disclosure are described herein, it should be noted that any various changes and modifications could be made in the embodiments of the present disclosure, without departing from the scope of legal protection which is defined by the appended claims. In the appended claims, the word “comprising” does not exclude other elements or operations, and the indefinite article “a” or “an” does not exclude a plurality. The mere fact that certain measures are recited in mutually different dependent claims does not indicate that a combination of these measures cannot be used to advantage.