A RECEIVER, A PLURALITY OF TRANSMITTERS, A METHOD OF RECEIVING USER DATA FROM MULTIPLE TRANSMITTERS, AND A METHOD OF TRANSMITTING USER DATA

Abstract
A method is provided of receiving user data from multiple transmitters, the user data from each transmitter having been encoded as a Low Density Lattice codeword, and the multiple Low Density Lattice codewords having been transmitted so as to be received as a combined signal at a receiver, the method of receiving comprising the steps of: (i) receiving the signal, (ii) calculating coefficients of linear combinations of the codewords from the multiple transmitters, (iii) calculating a scaling factor to be applied to the signal based on the coefficients, (iv) applying the scaling factor to the signal to provide a linear combination of the codewords, (v) decoding the linear combination of the codewords based on channel state information to obtain an optimal independent linear combination of user data, (vi) repeating steps (ii), (iii) (iv) and (v) to obtain at least as many optimal independent linear combinations as the number of transmitters, and recovering the user data from the optimal independent linear combinations.
Description
FIELD OF THE INVENTION

The present invention relates to telecommunications, in particular to wireless telecommunications.


DESCRIPTION OF THE RELATED ART

There is a drive towards greater capacity beyond what is available in 3G and 4G systems. As shown in FIG. 1, when signal to interference/noise ratio (SINR) is high, there is a substantial gap between the capacity possible if not limited by the modulation scheme used (in other words the Shannon Bound) and the capacities available using the modulations schemes (QPSK, 8PSK, 16QAM) available in 4G networks


Fifth generation (5G) wireless networks are now under development with the aim of better quality of service, higher data throughput and lower latency. To this end, Third Generation Partnership Project (3GPP) telecommunications standards bodies are targeting unprecedentedly high capacity densities, for example of up to 25 Gbits/second/square kilometre. In 3GPP there are discussions about 5G radio access technology, in the context of which a radio access technology and physical layer waveform for uplink communications is proposed based on sparse code multiple access (SCMA), see H. Nikopour and H. Baligh, “Sparse code multiple access,” in Personal Indoor and Mobile Radio Communications (PIMRC), 2013 IEEE 24th International Symposium on, 2013, pp. 332-336. The known SCMA encoder is shown in FIG. 2.


In this SCMA approach, each user's binary data is mapped onto an n-dimensional real or complex-valued codeword that is then transmitted by using multiple physical resources (for example n symbol periods, n OFDM subcarriers or n antennas). Also, each user uses a distinct codebook (a set of codewords that can be understood as a multidimensional constellation which is derived from a lattice based on a sparse code. Furthermore, joint multiuser detection is used to distinguish individual codewords of different users.


The lattice codebook of this known SCMA scheme is generated from the Cartesian product of several independent QAM constellations.


SUMMARY

The reader is referred to the appended independent claims. Some preferred features are laid out in the dependent claims.


An example of the present invention is a method of receiving user data from multiple transmitters, the user data from each transmitter having been encoded as a Low Density Lattice codeword, and the multiple Low Density Lattice codewords having been transmitted so as to be received as a combined signal at a receiver, the method of receiving comprising the steps of:


(i) receiving the signal,


(ii) calculating coefficients of linear combinations of the codewords from the multiple transmitters,


(iii) calculating a scaling factor to be applied to the signal based on the coefficients,


(iv) applying the scaling factor to the signal to provide a linear combination of the codewords,


(v) decoding the linear combination of the codewords based on channel state information to obtain an optimal independent linear combination of user data,


(vi) repeating steps (ii), (iii) (iv) and (v) to obtain at least as many optimal independent linear combinations as the number of transmitters, and


recovering the user data from the optimal independent linear combinations.


Preferred embodiments provide a multi-user medium access based on low density lattice coding. An approach to multi-user medium access is proposed based on multi-dimensional low density lattice codes, which we call low density lattice multiple access (LDLMA).


Preferred embodiments use a low-density lattice code (LDLC) as a basis for data encoding and medium access, in which a multi-dimensional constellation (referred to as a lattice) derived from the LDLC allows network users to asymptotically approach Shannon capacity.


Preferred embodiments use the same LDLC lattice codebook for encoding the binary data of all network users. Accordingly, the receiver receives a combination of all transmitted codewords. Since all users use the same lattice, the received linear combination of multiple codewords is also an element of the lattice codebook employed. Thus, the receiver only needs to decode linear combinations of users' LDLC codewords rather than separating them as would be required in known joint detection schemes.


In preferred embodiments, a single-input-single-output (SISO) LDLC decoder may perform such decoding by exploiting the posterior probability of linearly combined codewords in an iterative manner, which results in a linear decoding complexity even when the number of users is large.


In preferred embodiments, the individual codewords of distinct network users are detected by estimating the best combination coefficients subject to the knowledge of channel state information and the received signal.


Preferred embodiments provide a 5G access technology which we refer to as LDLMA, in which a multi-dimensional lattice constellation is used for encoding user data. The lattice constellation is constructed from the low-density lattice code (LDLC).


In preferred embodiments LDLMA may be implemented in either or both of uplink and downlink. Especially in the downlink, a SISO decoder with linear complexity is usable which reduces the hardware required in a mobile handset and saves battery energy of the handset.


Some preferred embodiments have the advantages that users use the same lattice codebook to encode their data, the low-density lattice has a superior shaping gain and there is less decoding complexity. For example, as mentioned above the lattice codebook of the known SCMA scheme is generated from the Cartesian product of several independent QAM constellations. In contrast to this the Low-Density Lattice is a natural lattice which does not require any transformation from an existing 2-dimensional lattice such as PSK or QAM. Hence it has a superior shaping gain as compared to the multidimensional lattice constellation employed in the known SCMA approach.


Preferred embodiments have linear decoding complexity. In contrast to the known SCMA scheme, preferred embodiments do not require a base station to distinguish each user's codeword by using joint multiuser detection. Instead, the base station estimates the best linear combination of users' codewords and retrieves individual user data by solving a set of linear equations for the estimated best coefficients. The base station does not need to separate each user's codeword, hence a single-in-single-out (SISO) decoder is sufficient. This significantly reduces the decoding complexity compared with the joint multiuser detection used in the known SCMA approach.


Preferably, the calculation of the scaling factor comprises applying a minimum mean square error (MMSE) criterion to minimise variance of effective noise.


Preferably, the calculation of the coefficients comprises maximising a virtual rate of the linear combination (t) of codewords.


Preferably, the decoding the linear combinations comprises iterative cycles, each cycle comprising calculating a variable node message and calculating a check node message. Preferably, obtaining each optimal independent linear combination of user data comprises, after the final iteration, estimating probability density functions of codeword elements.


Preferably, the linear combination of codewords is itself a valid codeword of the Low Density Lattice.


Preferably the recovering user data from the optimal independent linear combinations comprises taking a pseudo-inverse of a matrix of coefficients of the optimal independent linear combinations.


Preferably the transmitters are user terminals for cellular wireless telecommunications.


Examples of the present invention also relates to corresponding receiver.


An example of the present invention relates to a receiver configured to receive user data from multiple transmitters, the user data from each transmitter having being encoded as a Low Density Lattice codeword, and the multiple Low Density Lattice codewords having been transmitted so as to be received as a combined signal at the receiver, the receiver comprising:


a receiving stage configured to receive the signal;


an iterative processing stage configured to provide at least as many optimal independent linear combinations as the number of transmitters, the iterative processing stage comprising:


a processor configured to calculate coefficients of linear combinations of the codewords from the multiple transmitters,


a processor configured to calculate a scaling factor to be applied to the signal based on the coefficients,


a processor configured to apply the scaling factor to the signal to provide a linear combination of the codewords, and


a decoder configured to estimate an optimal linear combination of user data based on channel state information and the linear combination of the codewords;


and the receiver also comprises a recovery stage configured to recover the user data from the optimal independent linear combinations.


Preferably the receiver is a base station for cellular wireless communications.


Preferably the decoder is a Single-Input Single-Output (SISO) decoder.


Examples of the present invention also relates to a method of transmitting. An example of the present invention relates to a method of transmitting user data as codewords of a Low Density Lattice, wherein each transmitter encodes its user data into a respective codeword for transmission and transmits the codeword on a carrier signal over air; wherein a plurality of the transmitters use a shared Low Density Lattice codebook for the encoding.


Preferably, the transmitters are user terminals for wireless cellular telecommunications.


Preferably the codewords are adapted by hypercube shaping for power control.


Examples of the present invention also relates to a plurality of transmitters. An example of the present invention relates to a plurality of transmitters configured to transmit towards a receiver respective data as codewords of a Low Density Lattice, wherein each transmitter encodes its respective data into a respective codeword for transmission and transmits the codeword via a carrier signal over air; wherein the plurality of the transmitters use a shared Low Density Lattice codebook for the encoding.





BRIEF DESCRIPTION OF THE DRAWINGS

An embodiment of the present invention will now be described by way of example and with reference to the drawings, in which:



FIG. 1 is a diagram illustrating the capacity of 4G systems as a function of SINR for various modulation schemes, and the Shannon bound,



FIG. 2 is a diagram illustrating a known Sparse Code Multiple Access (SCMA) encoder (PRIOR ART), and



FIG. 3 is a diagram illustrating a Low Density Lattice Multiple Access (LDLMA) encoder according to a first embodiment for comparison with FIG. 2,



FIG. 4 is a diagram illustrating encoding and decoding procedure according to the first embodiment,



FIG. 5 is a diagram illustrating in more detail the encoding shown in FIG. 4 including generation of an LDLMA codeword from user data, and



FIG. 6 is a flowchart illustrating in more detail the decoding shown in FIG. 4.





DETAILED DESCRIPTION

When considering the known media access method of the SCMA system mentioned above with reference to the Nikopour paper and FIG. 2, the inventors realised that the complexity of the joint multiuser detection used in SCMA quickly grows with the number of users. This essentially inhibits a practical deployment of the proposed technology as operators require scalable solutions.


Low Density Lattice Multiple Access (LDLMA)

The inventors realised that it is possible to provide multi-user medium access, based on multi-dimensional low density lattice codes (LDLC). We refer to this as the low density lattice multiple access (LDLMA)


Low density lattice codes as such are known from the paper by N. Sommer, M. Feder, and O. Shalvi, “Low-density lattice codes,” Information Theory, IEEE Transactions on, vol. 54, no. 4, pp. 1561-1585, April 2008.


As shown in FIGS. 3 and 4, each user terminal (user equipment, UE) 2 includes a respective LDLC encoder 4, and a single LDLC lattice codebook is used for encoding binary data 1 as codewords 9 of all network users.


As shown in FIG. 4, accordingly, a receiver 6 receives a combination 8 of all transmitted codewords 9. Since all users use the same lattice, the received linear combination of multiple codewords 9 is also an element of the lattice codebook used. Thus, the receiver 6 only needs to decode linear combinations 10 of users' LDLC codewords rather than separating them as required by standard joint detection schemes. A single-input-single-output (SISO) LDLC decoder 12 performs this decoding by exploiting the posterior probability of linearly combined codewords in an iterative manner. This results a decoding complexity which is linear even when the number of users is large.


In this approach, the individual codewords of distinct network users are detected by estimating the best combination coefficients 14 subject to the knowledge of channel state information and the received combined codeword.


This approach does not require the receiver 6, for example a base station (BS) 7, to distinguish each user's codeword by using joint-multiuser detection. Instead the receiver 6 estimates the best linear combination of users' codewords then retrieves the individual user's data 16 by solving a set of linear equations for the estimated best coefficients. The base station does not need to separate each user's codeword so a Single-Input Single-Output (SISO) decoder 12 is sufficient.


The encoding and decoding scheme may, of course, be implemented in either or both of uplink and downlink. Especially in the downlink (i.e. towards the user terminal), a SISO decoder may be used (having linear complexity), which reduces the hardware complexity of the mobile handset and saves user terminal battery energy.


The above is an outline. More detail is provided below.


Low Density Lattice Code

An n-dimensional lattice, denoted by Λ, is a set of points in Rn such that if x, y∈Λ, then x+y∈Λ, and if x∈Λ, then −x∈Λ. A lattice can always be written in terms of a lattice generator matrix G∈Rn×n





Λ={x=Gv:v∈Zn}.


A low-density lattice code (LDLC) is constructed by extending the well-known low-density parity check codes (LDPC); this is done by extending the parity check matrix and syndrome of LDPC from operating over finite field to a real or complex field. An n dimensional LDLC is an n-dimensional lattice code with a non-singular generator matrix G satisfying det|G|=1, for which the parity check matrix H=G−1 is sparse.


The row or column degree of H is defined as the number of nonzero elements in row or column, respectively. An n-dimensional LDLC is regular if all the row degrees and column degrees of the parity check matrix are equal to a common degree d. An n-dimensional regular LDLC with degree d is called “Latin square LDLC” if every row and column of the parity check matrix has the same nonzero values, except for a possible change of order and random signs. The sorted sequence of these d values is referred to as the generating sequence of the Latin square LDLC.


For example, a parity check matrix of a real LDLC with dimension n=6, row degree 4, column degree 3 and generating sequence {1,0.8,0.5} is as follows:







H
=

[




-
0.8



0.8


0


0.5


0



-
1





0


0


1



-
0.5



1



-
0.8






-
0.5



1


0



-
0.8



0


0.5




1


0


0.8


0


0.5


0




0



-
0.5



0


1


0.8


0



]


,




Encoding

The encoding scheme is shown in more detail in FIG. 5.


As shown in FIG. 5, encoding in the encoder 4 involves power control 18 by Hypercube shaping, user data encoding 20, and transmission of that data, as described below.


Power Control

In practice, we adopt a power control (i.e. shaping) algorithm so that LDLC codewords meet transmission power constraints. Accordingly, each user terminal 2 uses hypercube shaping, based on a lower triangular parity-check matrix H, to transfer the integer information vector vl to another integer vector v′l such that xl′=Gv′l satisfies the power constraint.


The hypercube shaping operation is given by






v′
l,k
=v
l,k
−Mr
l,k,


where rl,k is calculated as







r

l
,
k


=




1
M



(


v

l
,
k


-




i
=
1


k
-
1





H

k
,
i




x

l
,
i






)








Due to the linearity of LDLC, x′l=xl mod Λ from v′l=vl mod M, where M is constellation size.


User Data Encoding

During user data transmission, binary user data are grouped to represent integers, and then mapped onto n-dimensional codewords of the LDLC lattice.


Transmission

Each codeword can be mapped onto distinct OFDM subcarriers or single antenna element of MIMO system.


Reception and Decoding

The reception and decoding stages are shown in FIG. 6 and with reference to FIG. 4.


As shown in FIG. 6, reception (step a) is followed by signal processing involving calculating (step b) the scaling factor and coefficients to apply and applying them (step c). The next stage is to one of obtaining (step d) the linear combination of users' messages then recovering (step e) the message of each individual user. These stages are considered below then an illustrative example is provided.


Reception of Superimposed Codeword (Step a)

Suppose the base station (BS) 7 serves L users such that the received signal at the base station is given by







y
=





l
=
1

L




h
l



x
l



+
z


,




where xl is the transmitted lattice codeword with dimension n; hl is the channel coefficient; and z□CN(0,σ2In) is the noise.


Signal Processing (Step b, Step c)

In order to form the linear combination of LDLC codewords, the base station 7 scales the received signal by a factor α and expands the scaled signal as








α





y

=






l
=
1

L




a
l



x
l





t


+






l
=
1

L




(


α






h
l


-

a
l


)



x
l



+

α





z





z
eff





,




where t is the linear combination of users' codewords and zeff is the effective noise.


Since the noise depends on the codeword, the optimal scaling factor α is obtained for this purpose by applying a minimum mean square error (MMSE) criterion such that the variance of the effective noise is minimized, as given by








α
opt

=



h
H


a





P






h


2


P

+

σ
2




,




where P is the power of transmitted codeword; and the coefficient vector a=[a1, . . . , aL] is determined by maximizing the virtual rate of t, given by







R


(

h
,
a

)


=


max

a


Z
2







log
2



(

P








α
opt


h

-
a



2


P

+




α
opt





σ
2




)


.






Substituting αopt into the above equation results in:








R


(

h
,
a

)


=


max

a


Z
2






log
2



(

P

aMa
H


)




,




where






M
=


SNRI
L

-




SNR
2



hh
H



(

1
+

SNR




h


2



)


.






Formally, let M=LLH be the Cholesky decomposition of M, where L is some lower triangular matrix. (The existence of L follows from the fact that M is Hermitian and positive-definite.). This gives aMaH=∥aL∥2. Hence, the above rate optimization is equivalent to solving the following shortest vector problem:






M
=


SNRI
L

-



SNR


hh

H


2



(

1
+

SNR




h


2



)


.






Obtaining Linear Combinations of Users' Messages (Step d)

After obtaining aopt, the base station 7 decodes the desired linear combination t. In order to successfully recover L user's messages, the base station has to decode the K optimal and independent linear combinations, where K≥L.


To decode the desired t, the proposed LDLMA scheme has to form the following distribution:







a
opt

=



arg





min



a


Z
2


,

a

0









a





L



2

.






where tj is the j-th component of t; l is the lattice codeword and lj is the j-th component of it; d(l,αy) denotes the Euclidean distance between αy and l; and σ2 (α,a) is the variance of effective noise, given by





σ2(α,a)=∥αh−a∥2P+ασ2.


One expands t as follows







t
=






=
1

L








a




x




=






=
1

L








a




Gv




=

G
·






=
1

L








a




v






r






,




where t itself is a valid codeword of LDLC such that r, which is the linear combination of users' messages, is extracted by passing t through the SISO LDLC decoder 12, given by {circumflex over (r)}=LDLCDecoder(αy), where {circumflex over (r)} is the estimated signal. This is described in more detail as follows.


The decoder 12 iteratively estimates fTj|αY (tj|αy) by using Gallager's message passing algorithm over real or complex field. Messages sent by the variable nodes are probability density functions (PDFs) of the dimensional-wise component of t while the messages sent by the check nodes are the periodic extensions of PDFs of dimensional-wise component of t. Each variable node corresponds to a single element of the lattice codeword. Each check node corresponds to a check equation, in other words a row of matrix H.


Let t1, . . . , tj, . . . , tn and c1, . . . , cj, . . . , cn denote the variable nodes and check nodes respectively. The SISO decoder 12 for the LDLC lattice combination t essentially operates by applying the following method:


Initialization: the variable node t1 sends the message








f
j

(
0
)




(
t
)


=


1


2



σ
2



(

α
,
a

)







exp


(

-






α






y
j


-
t



2


2



σ
2



(

α
,
a

)





)







to all neighbouring check nodes.


Basic iteration of check node message: each check node shares a different message with the neighbouring variable nodes. Suppose there are m (equals the row degree of H) variable nodes connected to the check node cj. Those variable nodes are denoted by tj,ν,ν∈{1, . . . ,m} and we have an appropriate check equation











υ
=
1

m








η
τ



t

j
,
υ





Z

,




where Z is the integer set and ητ is the entry of H. The message that was sent from tj,ν to the check node in the previous half-iteration is denoted as fν(t),ν∈{1, . . . ,m}. The calculation of the message that the check node cj sends back to the variable node tj,τ follows the three basic steps:


1) Convolution step: all messages excluding j, (t) are convolved, where






t

η
υ





will be substituted into fν(t), ν∈{1, . . . ,m}/{τ}:









p
~

τ



(
t
)


=



f
1



(

t

η
1


)


*

*


f

τ
-
1




(

t

η

τ
-
1



)


*


f

τ
+
1




(

t

η

τ
+
1



)


*

*


f
m



(

t

η
m


)







2) Stretching step: {tilde over (p)}τ (t) is stretched by −ητ to pτ(t)={tilde over (p)}τ(−ητt).


3) Periodic extension step: pτ(t) is extended to a periodic function with period






t



η
τ







given by









P
τ



(
t
)


=




i
=

-












p
τ



(

t
-

i

η
τ



)




,




where Pτ(t) is the final message that is sent to the variable node tj,τ.


Basic iteration of variable node message: each variable node sends a message to the neighbouring check node.


Suppose there are e (equals to the column degree of H) check nodes connected to the variable node tj, which are denoted by cj,λ, λ∈{1, . . . ,e}. The message that the check node cj,λ sends back to the variable node tj in the previous half-iteration is denoted by Pλ(t). The calculation of the message that is sent from the variable node tj to the check node cj,τ follows the two basic steps:


1) The product step:









f
~

τ



(
t
)


=


e

-



(


α






y
j


-
t

)

2


2



σ
2



(

α
,
a

)












λ
=
1


λ

τ


e









P
λ



(
t
)


.







2) the normalization step:








f
τ



(
t
)


=





f
~

τ



(
t
)






-









f
~

τ



(
t
)



dt



.





Repetition: The basic iteration is repeated until the iteration threshold is achieved.


Final Decision: To extract the desired linear combination of users' message, r, the final PDF of the codeword elements t1, . . . , tj, . . . , tn should be estimated in the final iteration without excluding any check node message in the product step, given by









f
~


j
,
final




(
t
)


=


e

-



(


α






y
j


-
t

)

2


2



σ
2



(

α
,
a

)











λ
=
1

e









P
λ



(
t
)


.







Then, the estimated codeword element can be obtained from {circumflex over (t)}=arg maxt{tilde over (f)}j,final(t). At last, the desired r is calculated as {circumflex over (r)}=└H·t┐.


Message Recovery (Step e)

Given the channel state information, the base station 7 obtains the best K linear combination {circumflex over (r)}'s, indexed as [{circumflex over (r)}1, . . . , {circumflex over (r)}K], namely, at least as many optimal independent linear combinations are obtained as the number of transmitters. The coefficients of these linear combinations form a matrix






A
=


[




a
1











a
K




]

.





In order to successfully recover the users' messages [v1, . . . , vL], the rank of A should be no less than L. As such, the base station takes the pseudo inverse to recover [v1, . . . , vL], given by







[





v
^

1












v
^

L




]

=



(


A
T


A

)


-
1





A
T

·


[





r
^

1












r
^

K




]

.







Example

Here is a simple example to illustrate the decoding procedure of LDLMA: there are 2 user terminals with access to the base stations. Both user terminals employ the same LDLC codebook Λ, where the codewords are x1=Gv1 and x2=Gv2, respectively. Assume that the channel coefficient vector is h=[h1 h2]T=[1 2.2]T such that the received signal is y=1x1+2.2x2+z. Assuming after the rate optimization, the base station selects, say, α1=5 and α2=4 as the best two scale factors such that we have








5





y

=




5






x
1


+

11






x
2






t
1



+

5





z



,




and










4





y

=




4






x
1


+

8.8






x
2


+

4





z








=






4






x
1


+

9






x
2






t
2



+



(



-
0.2







x
2


+

4





z


)




z

eff
,
2




.









where






A
=

[



5


11




4


9



]





as t1,t2 ∈Λ, the SISO lattice decoder over A iteratively estimates the distributions fT1|Y, (t1|y) and fT2|Y, (t2|y) to extract r1=5v1+11v2 and r2=4v1+9v2 because of the following equalities: 5x1+11x2=G (5v1+11v2) and 4x1+9x2=G(4v1+9v2). Once we have r1, r2 and A, we obtain the users' data v1 and v2 by taking the inverse of A over r1 and r2.


The present invention may be embodied in other specific forms without departing from its essential characteristics. The described embodiments are to be considered in all respects only as illustrative and not restrictive. The scope of the invention is, therefore, indicated by the appended claims rather than by the foregoing description. All changes that come within the meaning and range of equivalency of the claims are to be embraced within their scope.


A person skilled in the art would readily recognize that steps of various above-described methods can be performed by programmed computers. Some embodiments relate to program storage devices, e.g., digital data storage media, which are machine or computer readable and encode machine-executable or computer-executable programs of instructions, wherein said instructions perform some or all of the steps of said above-described methods. The program storage devices may be, e.g., digital memories, magnetic storage media such as a magnetic disks and magnetic tapes, hard drives, or optically readable digital data storage media. Some embodiments involve computers programmed to perform said steps of the above-described methods.

Claims
  • 1. A method of receiving user data from multiple transmitters, the user data from each transmitter having been encoded as a Low Density Lattice codeword, and the multiple Low Density Lattice codewords having been transmitted so as to be received as a combined signal at a receiver, the method of receiving comprising: (i) receiving the signal,(ii) calculating coefficients of linear combinations of the codewords from the multiple transmitters,(iii) calculating a scaling factor to be applied to the signal based on the coefficients,(iv) applying the scaling factor to the signal to provide a linear combination of the codewords,(v) decoding the linear combination of the codewords based on channel state information to obtain an optimal independent linear combination of user data,(vi) repeating the calculating coefficients, calculating a scaling factor, applying and decoding to obtain at least as many optimal independent linear combinations as the number of transmitters, andrecovering the user data from the optimal independent linear combinations.
  • 2. A method of receiving according to claim 1, in which the calculation of the scaling factor comprises applying a minimum mean square error, MMSE, criterion to minimise variance of effective noise.
  • 3. A method of receiving according to claim 1, in which the calculation of the coefficients comprises maximising a virtual rate of the linear combination of codewords.
  • 4. A method according to claim 1, in which the decoding linear combinations comprises iterative cycles, each cycle comprising calculating a variable node message and calculating a check node message.
  • 5. A method according to claim 4, in which obtaining each optimal independent linear combination comprises, after the final iteration, estimating probability density functions of codeword elements.
  • 6. A method according to claim 1, in which the linear combination of codewords is itself a valid codeword of the Low Density Lattice.
  • 7. A method according to claim 1, in which the recovering user data from the optimal independent linear combinations comprises taking a pseudo-inverse of a matrix of coefficients of the optimal independent linear combinations.
  • 8. A method according to claim 1, in which the transmitters are user terminals for cellular wireless telecommunications.
  • 9. A receiver configured to receive user data from multiple transmitters, the user data from each transmitter having being encoded as a Low Density Lattice codeword, and the multiple Low Density Lattice codewords having been transmitted so as to be received as a combined signal at the receiver, the receiver comprising: a receiving stage configured to receive the signal;an iterative processing stage configured to provide at least as many optimal independent linear combinations as the number of transmitters, the iterative processing stage comprising:a processor configured to calculate coefficients of linear combinations of the codewords from the multiple transmitters,a processor configured to calculate a scaling factor to be applied to the signal based on the coefficients,a processor configured to apply the scaling factor to the signal to provide a linear combination of the codewords, anda decoder configured to estimate an optimal linear combination of user data based on channel state information and the linear combination of the codewords; andthe receiver also comprises a recovery stage configured to recover the user data from the optimal independent linear combinations.
  • 10. A receiver according to claim 9, which is a base station for cellular wireless communications.
  • 11. A receiver according to claim 9, in which the decoder is a Single-Input Single-Output, SISO, decoder.
  • 12. A method of transmitting user data as codewords of a Low Density Lattice, wherein each transmitter encodes its user data into a respective codeword for transmission and transmits the codeword on a carrier signal over air; wherein a plurality of the transmitters use a shared Low Density Lattice codebook for the encoding.
  • 13. A method of transmitting according to claim 12, in which the transmitters are user terminals for wireless cellular telecommunications.
  • 14. A plurality of transmitters configured to transmit towards a receiver respective data as codewords of a Low Density Lattice, wherein each transmitter encodes its respective data into a respective codeword for transmission and transmits the codeword via a carrier signal over air; wherein the plurality of the transmitters use a shared Low Density Lattice codebook for the encoding.
Priority Claims (1)
Number Date Country Kind
15306315.1 Aug 2015 EP regional
PCT Information
Filing Document Filing Date Country Kind
PCT/EP2016/069324 8/15/2016 WO 00