Lattice-Code based Multiple Access for the Uplink: Algorithms and Optimization

Tao Yang, , Fangtao Yu, Qiuzhuo Chen, Rongke Liu, , and Shanxiang Lyu This work is supported by the National Key R&D Program of China (No.2020YFB1807102 and No. 2022YFB2902604).
Abstract

This paper studies a lattice-code based multiple-access (LCMA) system. In the uplink, K𝐾Kitalic_K users encode their messages with the same 2msuperscript2𝑚2^{m}2 start_POSTSUPERSCRIPT italic_m end_POSTSUPERSCRIPT-ary ring code mapped to 2msuperscript2𝑚2^{m}2 start_POSTSUPERSCRIPT italic_m end_POSTSUPERSCRIPT-PAM, belonging to the ensemble of lattice codes. Each user’s signal is spread with its designated signature sequence, and all users transmit simultaneously. The receiver attempts to compute K𝐾Kitalic_K independent streams of integer-combinations (ICBs) of the users’ messages. For this, 1) we establish and solve a new “bounded independent vectors problem” (BIVP) which identifies a near-optimal set of coefficient vectors w.r.t. the ICBs, outperforming existing LLL and HKZ lattice reduction methods; 2) we put forth new non-linear and linear LCMA soft detection algorithms, which calculate the a posteriori probability w.r.t. the ICB over the lattice. The per-user complexity is of order no greater than O(K)𝑂𝐾O(K)italic_O ( italic_K ), suitable for massive access of K𝐾Kitalic_K being large. The soft detection outputs are forwarded to K𝐾Kitalic_K ring-code decoders to recover the messages. With our developed techniques, LCMA is shown to support a significantly higher load of users and exhibits an improved frame error rate over state-of-the-art interleave-division multiple-access (IDMA) and sparse-code multiple-access (SCMA) schemes. Such advances are achieved with just parallel processing and K𝐾Kitalic_K single-user decoding operations, avoiding the implementation issues of successive interference cancelation and iterative detection.

Index Terms:
Multiple access, multi-user detection, multi-user MIMO, massive access, coded modulation, lattice-codes, compute-forward, physical-layer network coding, iterative decoding, soft detection

I Introduction

The multiple access (MA) problem is about how to support K𝐾Kitalic_K users’ reliable communication within N𝑁Nitalic_N resource blocks in time, frequency and spatial domains. For K𝐾Kitalic_K being very large, it becomes a massive access problem that is essential to “ubiquitous massive connectivity” envisaged for 6G [6GTextbookTongWen].

From 1G to 5G, the MA design was based on orthogonal transmission, where the users are allocated with non-overlap** frequency bands, separated time-slots, orthogonal spreading codes, orthogonal sub-carriers and independent beams, respectively [DTSETextbook]. Orthogonal transmission is fundamentally limited by the following: First, the number of supported users K𝐾Kitalic_K is capped by the number of resource blocks N𝑁Nitalic_N. Second, dynamic resource allocation is required to maintain the orthogonality, where the signaling cost skyrockets as K𝐾Kitalic_K becomes large. This becomes a bottleneck for massive access. Third, despite the orthogonalization at the transmitters, the wireless channel induces signal distortion that can easily destroy the orthogonality. This invokes an orthogonality-restoring process that may subject to an unaffordable cost [Dai18, ding2017application].

Non-orthogonal MA (NOMA) allows collision of multiple users’ packets. As such, the number of users K𝐾Kitalic_K can go beyond the number of resource blocks N𝑁Nitalic_N[CoverTextbook]. Further, one can trade-in a higher K𝐾Kitalic_K by reducing the peak rates of individual users, providing a high flexibility that are very much desired for ubiquitous MA [6GTextbookTongWen]. Moreover, NOMA enables grant-free (GF) transmission, with which the signalling overhead incurred by dynamic resource allocation can be slashed, making it possible to realize massive access in 6G.

A pivotal issue of MA is how to deal with multi-user interference (MUI). Most existing NOMA schemes are based on interference suppression and cancelation that “reject” the MUI, as in power-domain NOMA with successive interference cancelation (SIC) and code-domain NOMA with iterative detection and decoding (IDD) [ten2003design]. In theory, the mechanism of rejecting MUI generally leads to a reduced system load K/N𝐾𝑁K/Nitalic_K / italic_N. In practice, such schemes are subject to issues that have prevented them from being implemented in 5G: 1) The power-domain NOMA with SIC is subject to a fundamental loss in achievable rate, while the processing delay and accumulation of error propagation become drastic as K𝐾Kitalic_K increases. 2) Existing code-domain NOMA schemes require IDD, i.e., iterations between the multi-user detector and a bank of K𝐾Kitalic_K channel-code decoders. In particular, IDD requires a strict matching between the multi-user detector and the decoders, following the principle of extrinsic information transfer (EXIT) [ten2001convergence]. As the system load K/N𝐾𝑁K/Nitalic_K / italic_N increases, the EXIT function of the multi-user detector varies, which would break the matching. This leads to a failure of convergence that destroys the functionality of IDD receiver. Moreover, typically Q=4𝑄4Q=4italic_Q = 4 to 10 IDD iterations are required, which amounts to Q𝑄Qitalic_Q multi-user detection operations implemented in serial, as well as QK𝑄𝐾QKitalic_Q italic_K channel-code decoding operations. This may result in a high processing delay and a complexity that may not be affordable.

I-A Contributions

In this paper, we study a lattice-code based MA (LCMA) system, which is regarded as a practical embodiment of the notion of compute-forward MA [zhu2016gaussian]. In contrast to conventional NOMA schemes that reject MUI, LCMA embraces MUI by exploiting the map** between the structure of K𝐾Kitalic_K users’ superimposed signal and the lattice space. This paper contributes to this subject by develo** a package of techniques involving: 1) efficient nonlinear and linear soft detection algorithms, 2) optimization methods and 3) practical lattice coding for LCMA.

In the uplink, K𝐾Kitalic_K users encode their messages with the same lattice-code. We put forth a simple yet powerful practical lattice coding technique, referred to as 2msuperscript2𝑚2^{m}2 start_POSTSUPERSCRIPT italic_m end_POSTSUPERSCRIPT-ary ring-coded modulation (RCM), suitable for the mainstream 2msuperscript2𝑚2^{m}2 start_POSTSUPERSCRIPT italic_m end_POSTSUPERSCRIPT-PAM or 22msuperscript22𝑚2^{2m}2 start_POSTSUPERSCRIPT 2 italic_m end_POSTSUPERSCRIPT-QAM signaling. Each user’s code-modulated sequence undergoes a spreading process with its signature sequence. The resultant signals of K𝐾Kitalic_K users are transmitted simultaneously.

For the receiver, we propose to identify the optimized map** between the superposition of the K𝐾Kitalic_K users’ signals and the lattice-code space by solving a new bounded independent vector problem (BIVP). The solution to BIVP is optimal in the sense of mean square error (MSE), and outperforms existing Lenstra-Lenstra-Lovász (LLL) and Hermite Korkine-Zolotarev (HKZ) methods. A solution to the optimized spreading sequences is also presented.

We devise efficient LCMA soft detection algorithms to calculate the a posteriori probability (APP) w.r.t. the integer-combination (ICB) of users’ messages. Both non-linear and linear soft LCMA detectors are explicitely studied. The non-linear soft detector goes beyond existing regularized integer-forcing method for the latticed-coded based system. The linear soft detector is carefully devised such that its per-user complexity is of order no greater than O(K)𝑂𝐾O(K)italic_O ( italic_K ). The resultant APP streams are forwarded to K𝐾Kitalic_K ring-code decoders which make decisions on the K𝐾Kitalic_K ICBs in parallel, leading to the recovery of all users’ messages.

We demonstrate that, without using SIC or IDD, LCMA can support a remarkably higher load of users, relative to existing state-of-the-art NOMA schemes. For example, with a 5G NR LDPC code of rate 1/2, LCMA achieves a system load of up to K/N=400%𝐾𝑁percent400K/N=400\%italic_K / italic_N = 400 % in a fading MA channel, which dramatically outperforms baseline NOMA schemes such as IDMA and SCMA. Such advanced functionality and performance are achieved with low-latency parallel processing, low detection complexity of order less than O(K)𝑂𝐾O(K)italic_O ( italic_K ) per-user, and exactly K𝐾Kitalic_K channel-code decoding operations. These features would be desirable for MA and massive access in 6G systems. Beyond the uplink MA setting, our developed techniques of LCMA can also be utilized for the downlink broadcast channel and distributed MIMO systems. Also, considerable performance improvement with the new non-linear soft detector over existing regularized integer-forcing is demonstrated.

I-B Literature Review

I-B1 Multiple-access

MA schemes that are based on interference cancelation and suppression have been extensively studied in the past two decades [islam2016power, ding2017application]. Not long after the discovery of turbo codes in 1993, the “turbo principle” was introduced for the multi-user decoding, first by Wang&Poor [wang1999iterative]. Since 2000, turbo-like IDD has been extensively researched. In “turbo-CDMA” [wang1999iterative], the inner code is a multi-user detector with soft interference cancelation and linear minimum MSE (MMSE) suppression, while the outer code is a bank of K𝐾Kitalic_K convolutional code decoders. Soft probabilities are exchanged among these components iteratively. In 2006, Li et al. introduced a chip-level interleaved CDMA, named after interleave-division multiple-access (IDMA) [LiTWC06]. The chip interleaver enables uncorrelated chip interference, and thus a simple matched filter optimally combines the chip-level signal to yield the symbol-level soft information.

Low-density spreading CDMA and sparse-code MA (SCMA) differ from IDMA in that each symbol-level signal is spread only to a small number of chips, which forms a sparse matrix in the representation of the multi-user signal that can be depicted using a bi-partite factor graph [nikopour2013sparse]. SCMA also supports grant-free (GF) MA mode for the massive-connectivity scenario. Spatially coupled codes were also studied for dealing with the MA problem, yielding improved performance for fading MA channels thanks to the universality [KudekarISIT11]. For IDMA and SCMA, spreading/sparse codes with irregular degree profiles were investigated including the work of ourselves [YangTWC09, nikopour2013sparse], which yielded improved convergence behavior of the multi-user decoding.

Rate-splitting MA (RSMA) was studied for closed-loop systems [RimoldiIT96, MaoTcom19]. The idea is to superimpose a common message on the private messages, which may enlarge the rate-region. Other code-domain NOMA techniques are proposed such as pattern division MA (PDMA), multi-user shared access (MUSA) and etc. [chen2016pattern], which exhibits merits for implementation. For grant-free MA, active user identification based on compressive sensing and coded slotted Aloha protocols are studied [ChengJSAC21, SunTcom17, PaoliniIT15], which enables slashed signaling overhead that is essential to massive access. Here we are not able to list all existing results in the area of MA, and readers are encourage to refer to the excellent survey in [Dai18]. Note that most existing MA schemes rely on the notion of “rejecting MUI”, where the MUI structure is not or insufficiently exploited.

I-B2 Literatures of Lattice-codes and Compute-forward

For general multi-user networks, it has been proved that “structured codes” based on lattices can achieve a larger capacity region compared to conventional “random-like coding” [nazer2007computation]. The proof was based on the idea of “algebraic binning” of codewords, where each bin collects a certain subset of all codewords. The structure of lattice-codes enables efficient generation of the bin-indices as in the source coding with side information (SI) problem, and efficient decoding of the bin-indices as in the channel coding with SI problem[ZamirTIT02]. For the physical-layer network coding (PNC) or compute-forward (CF) problem, by adopting lattice-codes at source nodes, the receiver can directly compute the bin-indices in the form of integer-combinations of all users’ messages[NazerIT11], leading to remarkable coding gain or even multiplexing gain[NamIT10, YuanYangIT13]. The work in [LimTIT20] extended the computation of single integer-combination in the original CF framework to simultaneous computation of more than one integer-combinations. The results on using lattice-codes for tackling MIMO detection and downlink MIMO precoding problems were reported in [ZhanIT14] and [SilvaTWC17] under the name of integer-forcing (IF). The latter borrowed the notion of reverse CF which exploited the uplink-downlink duality [HongIT13, YangTWC17]. Various lattice reductions methods for identifying a “good” coefficient matrix for the integer-combinations have been reported in many works such as [SakzadTWC13]. Recently, CF and IF have been extended to time-varying or frequency-selective fading channels using multi-mode IF and ring CF [YangTWC20, LyuTIT19]. The IF notion was also applied to solve the inter-symbol-interference equalization problem with the help of cyclic linear codes [OrdentlichTIT12]. Here we are not able to list all existing results on lattice-codes, CF and IF, and highly motivated readers are encouraged to refer to [ZamirTIT02] and [LimTIT20].

I-B3 Lattice-codes and MA

From an information theoretic perspective, Zhu and Gastpar showed that any rate-tuple of the entire Gaussian MA capacity region can be achieved using a lattice-code based approach, and the scheme was named compute-forward MA (CFMA) [zhu2016gaussian]. In contrast to random-like coding approaches exploited in existing NOMA schemes, lattice-code based MA exhibits greater capacity region achieved with low-cost single-user decoding. The design of CFMA for the Gaussian MA channel with binary codes was studied in [sula2018compute]. Recently, we extend the result of [zhu2016gaussian] and [sula2018compute] to fading MA channel with practical q𝑞qitalic_q-ary codes[ChenISIT22, ChenTWC22].

To date, most of the related works on lattice-codes for MA have been focusing on achievable rates by proving the existence of “good” nested lattice-codes, whereas the practical aspects are not yet sufficiently researched. The works in [sula2018compute] and [ChenTWC22] do not apply to practical 22msuperscript22𝑚2^{2m}2 start_POSTSUPERSCRIPT 2 italic_m end_POSTSUPERSCRIPT-QAM signaling and MIMO. The impacts of lattice-codes on the key performance indicators such as the system load, FER, latency, complexity and etc., remain not reported in the literature. In addition, for a large K𝐾Kitalic_K, there lacks efficient algorithms for both the soft detection and the identification of the coefficient matrix with realistic implementation costs. This motivates us to develop a package of practical coding, efficient signal processing algorithms and optimization methods for lattice-code based MA.

II Preliminaries of Lattice-codes with Ring-coded Modulation

This section presents the coding and modulation upon which LCMA is built. We suggest a simple yet powerful lattice code, namely 2msuperscript2𝑚2^{m}2 start_POSTSUPERSCRIPT italic_m end_POSTSUPERSCRIPT-ary ring-coded modulation (RCM) with 2msuperscript2𝑚2^{m}2 start_POSTSUPERSCRIPT italic_m end_POSTSUPERSCRIPT-PAM signaling, as the underlying coded-modulation for LCMA. RCM is much simpler than existing low-density lattice-codes [SommerTIT08], which does not apply to mainstream modulation schemes.

Let 𝐛=[b[1],,b[k]]T𝐛superscript𝑏delimited-[]1𝑏delimited-[]𝑘𝑇\mathbf{b=}\left[b\left[1\right],\cdots,b\left[k\right]\right]^{T}bold_b = [ italic_b [ 1 ] , ⋯ , italic_b [ italic_k ] ] start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT denote a q𝑞qitalic_q-ary message sequence111The conversion from a binary message sequence to a q𝑞qitalic_q-ary message sequence is straightforward.. Each entry of 𝐛𝐛\mathbf{b}bold_b belongs to an integer ring q{0,,q1}subscript𝑞0𝑞1\mathbb{Z}_{q}\triangleq\left\{0,\cdots,q-1\right\}blackboard_Z start_POSTSUBSCRIPT italic_q end_POSTSUBSCRIPT ≜ { 0 , ⋯ , italic_q - 1 }. For a prime q𝑞qitalic_q, qsubscript𝑞\mathbb{Z}_{q}blackboard_Z start_POSTSUBSCRIPT italic_q end_POSTSUBSCRIPT becomes a Galois field GF(q)𝑞\left(q\right)( italic_q ). For a non-prime q𝑞qitalic_q, e.g., q=2m,m=1,2,formulae-sequence𝑞superscript2𝑚𝑚12q=2^{m},m=1,2,\cdotsitalic_q = 2 start_POSTSUPERSCRIPT italic_m end_POSTSUPERSCRIPT , italic_m = 1 , 2 , ⋯, the addition and multiplication rules of 2msubscriptsuperscript2𝑚\mathbb{Z}_{2^{m}}blackboard_Z start_POSTSUBSCRIPT 2 start_POSTSUPERSCRIPT italic_m end_POSTSUPERSCRIPT end_POSTSUBSCRIPT are different from those of GF(2m)superscript2𝑚\left(2^{m}\right)( 2 start_POSTSUPERSCRIPT italic_m end_POSTSUPERSCRIPT ). This paper is primarily interested in q=2m𝑞superscript2𝑚q=2^{m}italic_q = 2 start_POSTSUPERSCRIPT italic_m end_POSTSUPERSCRIPT which matches with the mainstream 22msuperscript22𝑚2^{2m}2 start_POSTSUPERSCRIPT 2 italic_m end_POSTSUPERSCRIPT-QAM signaling.

A 2msuperscript2𝑚2^{m}2 start_POSTSUPERSCRIPT italic_m end_POSTSUPERSCRIPT-ary ring-code with generator matrix 𝐆𝐆\mathbf{G}bold_G of size n𝑛nitalic_n-by-k𝑘kitalic_k is employed to encode 𝐛𝐛\mathbf{b}bold_b, given by

𝐜=mod(𝐆𝐛,2m)=𝐆𝐛𝐜m𝑜𝑑𝐆𝐛superscript2𝑚tensor-product𝐆𝐛\mathbf{c}=\mathop{\mathrm{m}od}\left(\mathbf{Gb,}2^{m}\right)=\mathbf{G% \otimes b}bold_c = start_BIGOP roman_m italic_o italic_d end_BIGOP ( bold_Gb , 2 start_POSTSUPERSCRIPT italic_m end_POSTSUPERSCRIPT ) = bold_G ⊗ bold_b (1)

where “tensor-product\mathbf{\otimes}” represents the operation of matrix multiplication modulo-2msuperscript2𝑚2^{m}2 start_POSTSUPERSCRIPT italic_m end_POSTSUPERSCRIPT and 𝐜𝐜absent\mathbf{c\in}bold_c ∈ 2mnsuperscriptsubscriptsuperscript2𝑚𝑛\mathbb{Z}_{2^{m}}^{n}blackboard_Z start_POSTSUBSCRIPT 2 start_POSTSUPERSCRIPT italic_m end_POSTSUPERSCRIPT end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT. Let 𝒞nsuperscript𝒞𝑛\mathcal{C}^{n}caligraphic_C start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT denote the codebook collecting all 2mksuperscript2𝑚𝑘2^{mk}2 start_POSTSUPERSCRIPT italic_m italic_k end_POSTSUPERSCRIPT codewords w.r.t. (1). A random vector 𝐝𝐝\mathbf{d}bold_d \in 2mnsuperscriptsubscriptsuperscript2𝑚𝑛\mathbb{Z}_{2^{m}}^{n}blackboard_Z start_POSTSUBSCRIPT 2 start_POSTSUPERSCRIPT italic_m end_POSTSUPERSCRIPT end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT may be generated and added on 𝐜𝐜\mathbf{c}bold_c for random permutation. For conciseness, the details are omitted, see [ChiuIT10, QiuTcom18].

Each entry of 𝐜𝐜\mathbf{c}bold_c is one-to-one mapped to a symbol that belongs to a constellation of 2msuperscript2𝑚2^{m}2 start_POSTSUPERSCRIPT italic_m end_POSTSUPERSCRIPT points. For 2msuperscript2𝑚2^{m}2 start_POSTSUPERSCRIPT italic_m end_POSTSUPERSCRIPT-PAM constellation (with identical spacing), the map** is

𝐱=δ(𝐜)=1γ(𝐜2m12)1γ{12m2,,2m12}n.𝐱𝛿𝐜1𝛾𝐜superscript2𝑚121𝛾superscript1superscript2𝑚2superscript2𝑚12𝑛\mathbf{x}=\delta\left(\mathbf{c}\right)=\frac{1}{\gamma}\left(\mathbf{c}-% \frac{2^{m}-1}{2}\right)\in\frac{1}{\gamma}\left\{\frac{1-2^{m}}{2},\cdots,% \frac{2^{m}-1}{2}\right\}^{n}.bold_x = italic_δ ( bold_c ) = divide start_ARG 1 end_ARG start_ARG italic_γ end_ARG ( bold_c - divide start_ARG 2 start_POSTSUPERSCRIPT italic_m end_POSTSUPERSCRIPT - 1 end_ARG start_ARG 2 end_ARG ) ∈ divide start_ARG 1 end_ARG start_ARG italic_γ end_ARG { divide start_ARG 1 - 2 start_POSTSUPERSCRIPT italic_m end_POSTSUPERSCRIPT end_ARG start_ARG 2 end_ARG , ⋯ , divide start_ARG 2 start_POSTSUPERSCRIPT italic_m end_POSTSUPERSCRIPT - 1 end_ARG start_ARG 2 end_ARG } start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT . (2)

Here γ𝛾\gammaitalic_γ normalizes the average symbol energy. The rate of RCM is R=knlog2q=kmn𝑅𝑘𝑛subscript2𝑞𝑘𝑚𝑛R=\frac{k}{n}\log_{2}q=\frac{km}{n}italic_R = divide start_ARG italic_k end_ARG start_ARG italic_n end_ARG roman_log start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT italic_q = divide start_ARG italic_k italic_m end_ARG start_ARG italic_n end_ARG bits/symbol. For a complex-valued model, two independent 2msuperscript2𝑚2^{m}2 start_POSTSUPERSCRIPT italic_m end_POSTSUPERSCRIPT-level RCM, one for the inphase part and the other for the quadrature part, form a RCM with 22msuperscript22𝑚2^{2m}2 start_POSTSUPERSCRIPT 2 italic_m end_POSTSUPERSCRIPT-QAM signaling. That is,

𝐜Re=𝐆𝐛Re,𝐜Im=𝐆𝐛Im,formulae-sequencesuperscript𝐜R𝑒tensor-product𝐆superscript𝐛R𝑒superscript𝐜I𝑚tensor-product𝐆superscript𝐛I𝑚\displaystyle\mathbf{c}^{\mathop{\mathrm{R}e}}=\mathbf{G\otimes b}^{\mathop{% \mathrm{R}e}},\mathbf{c}^{\mathop{\mathrm{I}m}}=\mathbf{G\otimes b}^{\mathop{% \mathrm{I}m}},bold_c start_POSTSUPERSCRIPT roman_R italic_e end_POSTSUPERSCRIPT = bold_G ⊗ bold_b start_POSTSUPERSCRIPT roman_R italic_e end_POSTSUPERSCRIPT , bold_c start_POSTSUPERSCRIPT roman_I italic_m end_POSTSUPERSCRIPT = bold_G ⊗ bold_b start_POSTSUPERSCRIPT roman_I italic_m end_POSTSUPERSCRIPT ,
𝐱=(𝐜Re2m12)+j(𝐜Im2m12).𝐱superscript𝐜R𝑒superscript2𝑚12𝑗superscript𝐜I𝑚superscript2𝑚12\displaystyle\mathbf{x}=\left(\mathbf{c}^{\mathop{\mathrm{R}e}}-\frac{2^{m}-1}% {2}\right)+j\left(\mathbf{c}^{\mathop{\mathrm{I}m}}-\frac{2^{m}-1}{2}\right).bold_x = ( bold_c start_POSTSUPERSCRIPT roman_R italic_e end_POSTSUPERSCRIPT - divide start_ARG 2 start_POSTSUPERSCRIPT italic_m end_POSTSUPERSCRIPT - 1 end_ARG start_ARG 2 end_ARG ) + italic_j ( bold_c start_POSTSUPERSCRIPT roman_I italic_m end_POSTSUPERSCRIPT - divide start_ARG 2 start_POSTSUPERSCRIPT italic_m end_POSTSUPERSCRIPT - 1 end_ARG start_ARG 2 end_ARG ) . (3)

Gaussian and Einstein integers for complex-valued model are beyond the scope of this paper [SunTcom13].

Remark 1

[“Good” generator matrices 𝐆𝐆\mathbf{G}bold_G] For m=1𝑚1m=1italic_m = 1, RCM reduces to binary channel coding with BPSK (or QPSK) signaling. Any state-of-the-art binary channel codes, such as LDPC codes and polar codes in 5G NR standards, can be utilized to execute (1) and the associated decoding. For m=2,3,𝑚23m=2,3,\cdotsitalic_m = 2 , 3 , ⋯, repeat-accumulate ring-codes are studied in a separate work of ours [YuTcom22]. By introducing a doubly irregular structure w.r.t. the zero-divisors of the integer ring, our developed 2msuperscript2𝑚2^{m}2 start_POSTSUPERSCRIPT italic_m end_POSTSUPERSCRIPT-ary ring-codes approach the near-capacity of the 2msuperscript2𝑚2^{m}2 start_POSTSUPERSCRIPT italic_m end_POSTSUPERSCRIPT-PAM input AWGN channels. Such codes are ready to be used in a LCMA system.