Detector and Method for Estimating Data Probability in a Multi-Channel Receiver

Abstract
A detector and method for estimating channel data probability in a multi-user or multiple-input multiple-output communication system includes summing conditional bit probabilities conditioned on hypothetical channel data patterns over stochastically selected hypothetical channel data patterns. Various detailed hardware structures and circuits are also described.
Description
BACKGROUND OF THE INVENTION

1. Field of the Invention


The present invention relates generally to wireless communication. More particularly, the present invention relates to techniques for joint detection of multiple-input multiple-output (MIMO) and multi-user code division multiple access (CDMA) signals.


2. Related Art


Wireless communications have become ubiquitous. Improving the performance and capacity of wireless communications systems is highly desirable.


Many wireless communications systems make use of code division multiple access (CDMA) to enable multiple users to share a common frequency bandwidth. CDMA can provide high capacity in certain wireless systems, for example cellular networks. In CDMA, users' transmissions are encoded with spreading codes. Ideally, spreading codes for different users allow the transmissions for different users to be separated without interference. In practice, some interference (“multi-user interference”) occurs, which can be eliminated by various multi-user detection algorithms known in the art, including interference cancellation. Performance of interference cancellers has sometimes provided limited performance, in part due to errors in estimating the interference caused between users.


Improved interference cancellation techniques have been developed that use iterative processing. The typical iterative approach uses the output of the interference canceller to estimate user data symbols, which are fed back into the interference canceller to provide improved cancellation of interference and successively refined estimates of the user symbols. This typical approach, however, suffers from various problems, including no guarantee of convergence, and suboptimal performance. Other known approaches frequently realize only a fraction of the potential channel capacity.


An alternate approach to dealing with multi-user interference is to perform joint demodulation of the multiple users. For example, maximum likelihood sequence estimation (MLSE) may be performed which accounts for both multi-user interference and symbol-to-symbol memory introduced by forward error correction (FEC) encoding. Although MLSE can provide excellent performance, MLSE is prohibitively complex when there are a large numbers of users since the complexity of MLSE grows exponentially with the number of users. One method that avoids this exponential complexity, yet results in the same performance as MLSE is minimum mean square error (MMSE) detector with soft cancellation of X. Wang and H. V. Poor, “Iterative (Turbo) Soft Interference Cancellation and Decoding for Coded CDMA”, IEEE Trans. Commun., vol. 47, no. 7, pp. 1046-1061, July 1999. A Kuser system may in general require inversion of a K-by-K matrix for each user symbol and for each iteration. Hence, the processing complexity of suboptimum receivers can be of the order of K3. Although some simplification of the processing can be obtained using iterative steps, such approaches still require processing complexity of the order of K2 or greater per each user symbol for each iteration. Hence industry has continued to search for improved multi-user detection techniques.


New wireless communications techniques, such as multiple-input multiple-output (MIMO) are also being introduced which have the potential to provide high capacity. In MIMO, multiple antennas at a transmitter are used, where different symbols may be transmitted on each antenna, providing increased capacity. Multiple antennas at the receiver are typically required, to allow the separation of the symbols from each transmit antenna. Theoretically, MIMO channels can provide capacity which increases linearly with the number of antennas, but like CDMA, interference between the different symbols from different antennas sets limits on practical application. Hence, handling interference becomes an important aspect of achieving the potential capacity of a MIMO system.


SUMMARY OF THE INVENTION

It has been recognized that it would be advantageous to develop a technique that provides good performance in the presence of multi-channel interference such as that present in CDMA and MIMO systems.


The invention includes a method for estimating channel data bit probabilities of a multi-channel signal received through a communication channel. The method may include summing a conditional bit probability to obtain a channel data bit probability summation. The conditional bit probability may be conditioned on an observation of the multi-channel signal and a hypothetical channel data pattern. The summation may be performed over a subset of hypothetical channel data patterns. The method may include selecting the hypothetical channel data patterns using a Markov chain Monte Carlo simulation to stochastically select the subset of hypothetical channel data patterns. The hypothetical channel data patterns may be selected to correspond to dominant conditional bit probability terms in the channel data bit probability summation.


Additional features and advantages of the invention will be apparent from the detailed description which follows, taken in conjunction with the accompanying drawings, which together illustrate, by way of example, features of the invention.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 is flow chart of a method for estimating channel data bit probabilities of a multi-channel signal received through a communication channel in accordance with an embodiment of the present invention;



FIG. 2 is a flow chart of an alternate method for estimating channel data probabilities in a multi-channel communication system receiver in accordance with an embodiment of the present invention;



FIG. 3 is transition diagram of a Markov chain for a three-channel system in accordance with an embodiment of the present invention;



FIG. 4 is a block diagram of a multi-channel receiver in accordance with an embodiment of the present invention;



FIG. 5 is a block diagram of a detector for estimating channel data probabilities in a multi-channel communication system in accordance with an embodiment of the present invention;



FIG. 6 is a block diagram of a Gibbs sampler circuit in accordance with an embodiment of the present invention;



FIG. 7 is a circuit diagram of a ψ-calculator circuit in accordance with an embodiment of the present invention;



FIG. 8 is a circuit diagram of a ξ-calculator circuit in accordance with an embodiment of the present invention; and



FIG. 9 is a circuit diagram of a log-likelihood calculator circuit in accordance with an embodiment of the present invention.





DETAILED DESCRIPTION

Reference will now be made to the exemplary embodiments illustrated in the drawings, and specific language will be used herein to describe the same. It will nevertheless be understood that no limitation of the scope of the invention is thereby intended. Alterations and further modifications of the inventive features illustrated herein, and additional applications of the principles of the inventions as illustrated herein, which would occur to one skilled in the relevant art and having possession of this disclosure, are to be considered within the scope of the invention.


The following notations are adhered to throughout this application. Vectors are denoted by lowercase bold letters. Matrices are denoted by uppercase bold letters. The ij-th element of a matrix, say, A is denoted by aij. The superscripts T and H are used to denote matrix or vector transpose and Hermitian, respectively. Integer subscripts are used to distinguish different channels. Integer time indices are put in brackets. For example, dk(i) is used to denote the ith symbol of the channel k. In most expressions, the time index, i, is omitted for brevity. The notations P(•) and p(•) denote the probability of a discrete random variable and the probability density of a continuous random variable, respectively.


One aspect of the presently disclosed inventive techniques involves recognizing that a MIMO communication system resembles a CDMA system. The data streams transmitted at each MIMO antenna are thus analogous to users in a CDMA system, and the channel gains between each transmit antenna and the receive antennas is a vector analogous to a spreading codes of a CDMA user. Accordingly, the number of receive antennas plays the same role as the spreading gain, N, in a multi-user system, and the number of transmit antennas plays the same role as the number of users, K. Hence, the methods developed for multi-user detection can be immediately applied to a MIMO system with K transmit and N receive antennas. K/N can thus be referred to as the system load, and the MIMO channel is thus under-loaded when K<N, fully loaded when K=N, and over-loaded when K>N. Accordingly, throughout this application the term multi-channel will thus be used in a general sense to refer to both CDMA and MIMO systems. Within a multi-user CDMA system, for example where individual users are each encoded with a different spreading code, the term channel refers to an individual user within a composite CDMA signal. Within a MIMO system, for example where different data streams are transmitted by transmit antennae, the term channel refers to a particular data stream transmitted on one antenna; such a channel may correspond to one or more users. Of course, variations on these basic types of systems will occur to one of skill in the art, and combinations of CDMA and MIMO techniques are also known to which the disclosed inventive techniques are equally applicable.


A multi-channel CDMA or MIMO communication system with K channels will now be described in general terms. For simplicity, it is assumed that the channels are synchronous, although this is not be essential. Each channel has a spreading sequences of length N, i.e., a spreading gain of N. Using d(i)=[d1(i)d2(i) . . . dK(i)]T to denote data symbols transmitted by the K channels in the ith time slot and A(i) to denote the matrix containing spreading code (scaled with the channel gain) of the kth channel in its kth column, the received signal vector, is given by






y(i)=A(i)d(i)+n(i)  (1)


where n(i) is the channel additive noise. The received signal may be sampled at a chip rate, or another convenient rate as will occur to one of skill in the art.


For simplicity, it is assumed in the derivation that the samples of n(i) are zero-mean, independent, and identically distributed and E[n(i)nH(i)]=σn2I. In practice, noise frequently deviates slightly from this assumption without substantially degrading the performance of communication systems. Data symbols are transmitted and decoded in blocks of length M and for each block the time index i takes the values of 1 to M. Various block sizes will be suitable depending upon the communication system application.


As most receivers include forward error correction decoding, an estimate of the data log-likelihood ratio (LLR) is used, given by












λ
1



(


d
k



(
i
)


)


=

ln



P


(




d
k



(
i
)


=


+
1

|

y


(
i
)




,


λ
2
e



(
i
)



)



P


(




d
k



(
i
)


=


-
1

|

y


(
i
)




,


λ
2
e



(
i
)



)





,




(
2
)







where λ2e(i) is extrinsic information provided by a forward error correction decoder, when present, as discussed further below. Estimating the values of λ1(dk(i)) in a computationally efficient manner is a significant benefit of the presently disclosed inventive techniques. For example, note that












P


(



d
k



(
i
)


=




+
1

|

y


(
i
)




)







=







d

-
k




(
i
)





P


(




d
k



(
i
)


=

+
1


,



d

-
k




(
i
)


|

y


(
i
)




)










=







d

-
k




(
i
)






P


(




d
k



(
i
)


=


+
1

|

y


(
i
)




,


d

-
k




(
i
)



)




P


(



d

-
k




(
i
)


|

y


(
i
)



)





,







(
4
)







where the second identity follows by applying the chain rule, d−k(i)=[d1(i) . . . dk−1(i) dk+1(i) . . . dK(i)]T and the summation is over all possible values of d−k(i). The number of combinations that d−k(i) can take grows exponentially with K and thus becomes prohibitive for large values of K.


A first method which can avoid this prohibitive complexity will now be described. FIG. 1 illustrates a flow chart of a method, shown generally at 100, for estimating a channel data bit probability, e.g. P(dk(i)=+1|y(i)), of a multi-channel signal received through a communication channel. The method includes summing 102 a conditional bit probability, e.g. P(dk(i)=+1|y(i),d−k(i)), conditioned on an observation of the multi-channel signal, e.g. y(i), and a hypothetical data pattern, e.g. d−k(i) to obtain a channel data bit probability summation. Rather than summing the conditional bit probability over all possible data patterns, the summation is performed over a subset of the hypothetical data patterns, e.g. d−k(i). Hence, the method includes selecting 104 the subset of data patterns corresponding to dominant conditional bit probability terms in the channel data bit probability summation. In other words, the summation is performed substantially over terms where the conditional probability is significant, and terms where the conditional probability is significant are substantially omitted.


The selection of hypothetical channel data patterns can be performed using a Markov chain Monte Carlo (MCMC) simulation to stochastically select the subset of data patterns corresponding to dominant conditional bit probability terms in the channel data bit probability summation. By summing a subset of data patterns corresponding to the dominant terms, rather than summing over all possible data values, a significant reduction in the processing can be obtained relative to an exact calculation of the channel data bit probability summation. The MCMC simulation helps to ensure that the subset of data patterns selected correspond to the dominant terms. Dominant terms are those terms in the summation that are relatively large and thus have correspondingly greater impact on the summation than terms that are relatively small. A significant benefit of the method is the ability to obtain an accurate estimate of the channel data bit probability from a relatively small subset of hypothetical channel data patterns, by including primarily dominant terms in the summation. An additional benefit of the method is improved accuracy of the channel data probability estimates relative to some prior art approaches which do not perform probability summations.


Of course, because the conditional probability summation can be normalized, it is not essential that all of the dominant terms are included, or that all non-dominant terms are excluded, in order to obtain a good estimate of the channel data bit probability. The MCMC simulation, being a stochastic process, will not precisely select all the largest terms and exclude all the smallest terms. Instead, the MCMC simulation helps to ensure that most of the hypothetical data patterns included in the summation are dominant terms.


In order to describe in further detail how the MCMC simulation may be used to select dominant conditional bit probability terms, a general description of Bayesian estimation using Monte Carlo integration will be provided. Consider the problem of evaluating the weighted mean of a function h(x) of a random variable X, given a weighting function f(x), viz.






E
f
[h(X)]=∫xh(x)f(x)dx,  (5)


where x is the domain of X and f(•) is a proper density function, i.e., f(x)≧0 for x∈T and ∫xf(x)dx=1. An estimate of (5) can be obtained by evaluating the empirical average











h
_

=


1

N
s







n
=
1


N
s




h


(

x
n

)





,




(
6
)







where xn's are samples from the distribution f(x). Moreover, the speed of convergence of the method can be evaluated by estimating the variance of h which can be obtained by










σ

h
_

2

=


1


N
s



(


N
s

-
1

)








n
=
1


N
s









h


(

x
n

)


-

h
_




2

.







(
7
)







Here, x may be a scalar or a vector variable. When x is a vector, the integral in (5) is a multiple integral whose direct computation may become prohibitive as the dimension of x increases. From (7), the accuracy of the estimate (6) reduces with the square of the number of sample points. Moreover, numerical studies show that the dimension of x and the size N, are very weakly related in the sense that even though the dimension of x may increase, the order of magnitude of N, remains unchanged. Hence, by using a MCMC simulation to select hypothetical data patterns in the channel data probability summation, the exponential growth of computational complexity that is commonly encountered in performing multiple integrals may be avoided.


The Monte Carlo integration include importance sampling. In the method of importance sampling Ef[h(X)] is evaluated by performing the empirical average












E
f



[

h


(
X
)


]





1

N
s







n
=
1


N
s






f


(

x
n

)




f
a



(

x
n

)





h


(

x
n

)






,




(
8
)







where the samples xn are chosen from the auxiliary distribution fa(x). Equation (8) follows from the alternative representation of (5)











E
f



[

h


(
X
)


]


=



X




h


(
x
)





f


(
x
)




f
a



(
x
)






f
a



(
x
)









x







(
9
)







and performing the integral using Monte Carlo integration based on the distribution fa(x). Similar to f(x), fa(x) is preferably a proper density function, i.e., it satisfies the conditions fa(x)≧0 for x∈X and ∫Xfa(x)dx=1. When fa(x)=f(x), (8) reduces to regular Monte Carlo integration.


It turns out that, for a fixed value of Ns, many choices of fa(x) that are different from f(x) may result in more accurate evaluation of Ef[h(x)]. In particular, one auxiliary distribution fa(x) that allows accurate evaluation of Ef[h(x)] with minimum number of samples is fa,o(x)=|h(x)|f(x)/∫X|h(x)|f(x)dx. When available, this auxiliary distribution allows exact evaluation of Ef[h(x)] by using a single sample. However, fa,o(x) depends on the integral ∫X|h(x)|f(x)dx which may not be available. In fact, when h(x)>0 for x∈X, the latter is the integral seeking to be solved. A practical approximation that has been motivated from importance sampling which usually results in a better approximation than (8) is











h
_

=





n
=
1


N
s






f


(

x
n

)




f
a



(

x
n

)





h


(

x
n

)








n
=
1


N
s





f


(

x
n

)




f
a



(

x
n

)






,




(
10
)







where here also, xn is chosen from the distribution fa(x). A special case of (10), of particular interest, is obtained when fa(x) is uniform over a selected range of x. In order to minimize Ns, this range is chosen such that it covers the values of x for which f(x)h(x) is significant. In other words, x is limited to the important samples that contribute to the desired integral. When fa(x) is uniform, (10) simplifies to










h
_

=






n
=
1


N
s





f


(

x
n

)




h


(

x
n

)








n
=
1


N
s




f


(

x
n

)




.





(
11
)







Other auxiliary distribution can be used as well, as discussed further herein. For a general description of Monte Carlo methods, see G. Fishman, Monte Carlo: concepts, algorithms and applications, New York: Springer-Verlag, 1996 and C. P. Robert and G. Casella, Monte Carlo Statistical Methods: Springer-Verlag, New York, 1999.


So, to perform the summation of (4), the MCMC simulation is used to select a subset of terms. For simplicity in notation, the time index ‘i’ is dropped from all the involved variables, e.g., P(dk|y) is a short-hand notation for P(dk(i)|y(i)).


As discussed further below, it may be desirable to incorporate additional information into the conditional bit probability. For example, extrinsic information from a forward error correction decoder may be used to improve the LLR. If such extrinsic information is given by λ2e, the channel data bit probability summation can be expressed as












P


(




d
k



(
i
)


=




+
1

|

y


(
i
)




,


λ
2
e



(
i
)



)







=







d

-
k




(
i
)





P


(




d
k



(
i
)


=

+
1


,



d

-
k




(
i
)


|

y


(
i
)



,


λ
2
e



(
i
)



)










=







d

-
k




(
i
)





P


(




d
k



(
i
)


=


+
1

|

y


(
i
)




,


d

-
k




(
i
)


,


λ
2
e



(
i
)



)




,












λ
2
e



(
i
)


)



P


(




d

-
k




(
i
)


|

y


(
i
)



,


λ
2
e



(
i
)



)



,







(
12
)







This formulation will be used in the following derivations, although one of skill in the art will understand that the presently disclosed inventive techniques can also be applied in the absence of extrinsic information from a forward error correction decoder.


In the subsequent equations the time index “i” is not included for brevity of the presentation.


To obtain a summation similar to (6) for computation of P(dk=+1|y,λ2e), P(d−k|y,λ2e) is used as the density function, f(x), and P(dk=+1|y,d−k2e) is used as the function whose weighted sum is to be obtained, h(x). An estimate of P(dk=+1|y,λ2e) is thus obtained by evaluating the empirical average











P


(



d
k

=


+
1

|
y


,

λ
2
e


)





1

N
s







n
=
1


N
s




P


(



d
k

=


+
1

|
y


,

d

-
k


(
n
)


,

λ
2
e


)





,




(
13
)







where d−k(n) are the samples that are chosen from the distribution P(d−k|y,λ2e), and, when appearing in equations like (13), d−k(n) is the shorthand notation for d−k=d−k(n).


Starting with (11), treat P(d−k|y,λ2e) as f(x),and P(dk=+1|y,d−k2e) as h(x). This gives











P


(



d
k

=


+
1

|
y


,

λ
2
e


)








n
=
1


N
s





P


(



d
k

=


+
1

|
y


,

d

-
k


(
n
)


,

λ
2
c


)




P


(



d

-
k


(
n
)


|
y

,

λ
2
e


)








n
=
1


N
s




P


(



d

-
k


(
n
)


|
y

,

λ
2
e


)





,




(
14
)







where the samples d−k(n) are chosen from a uniform distribution.


Equations (13) and (14) thus present alternate approaches to estimating the channel data bit probabilities; equation (13) using an auxiliary distribution set equal to a conditional channel data bit probability, and equation (14) using a uniform distribution. Various auxiliary distributions may be chosen, as will become apparent to one of skill in the art and having possession of this disclosure.


In accordance with one embodiment of the present invention, using the computation based on (13), P(dk=+1|y,d−k(n)2e) is evaluated for n=1, 2, . . . , Ns. For this, the LLR is defined as











λ
1

(
n
)




(

d
k

)


=

ln



P


(



d
k

=


+
1

|
y


,

d

-
k


(
n
)


,

λ
2
e


)



P


(



d
k

=


-
1

|
y


,

d

-
k


(
n
)


,

λ
2
e


)








(
16
)







and can be expanded as














λ
1

(
n
)




(

d
k

)


=



ln




p


(


y
|

d

-
k


(
n
)



,


d
k

=

+
1



)




P


(


d

-
k


(
n
)


,


d
k

=


+
1

|

λ
2
e




)





p


(


y
|

d

-
k


(
n
)



,


d
k

=

-
1



)




P


(


d

-
k


(
n
)


,


d
k

=


-
1

|

λ
2
e




)











=




ln



p


(


y
|

d

-
k


(
n
)



,


d
k

=

+
1



)



p


(


y
|

d

-
k


(
n
)



,


d
k

=

-
1



)




+


λ
2
e



(

d
k

)









=





1

2






σ
n
2





(

|

y
-


A

-
k




d

-
k



+

a
k




|
2



-

|

y
-


A

-
k




d

-
k



-

a
k




|
2




)


+











λ
2
e



(

d
k

)








=





2

σ
n
2





{


a
k
H




(

y
-


A

-
k




d

-
k




)


}


+


λ
2
e



(

d
k

)









=





2

σ
n
2





{


y
k
MF

-





l
=
0


l

k


K




ρ
kl



d
l




}


+


λ
2
e



(

d
k

)










(
17
)







where {•} denotes the real part, A−k is A with its kth column, ak, removed, ykMF=akHy is the matched filter output for the kth channel and ρkl=akHal is the crosscorrelation between channels k and l. The simplification of the second line follows when the extrinsic information provided by each element of λ2e is independent of those provided by its other elements, for example when there is interleaving as discussed below. If the elements of d are independent of one another this implies that













ln



P


(


d

-
k


(
n
)


,


d
k

=


+
1

|

λ
2
e




)



P


(


d

-
k


(
n
)


,


d
k

=


-
1

|

λ
2
e




)




=




ln



P


(


d

-
k


(
n
)


|

λ

2
,

-
k


e


)



P


(


d

-
k


(
n
)


|

λ

2
,

-
k


e


)




+










ln



P


(


d
k

=


+
1

|


λ
2
e



(

d
k

)




)



P


(


d
k

=


-
1

|


λ
2
e



(

d
k

)




)










=



ln



P


(


d
k

=


+
1

|


λ
2
e



(

d
k

)




)



P


(


d
k

=


-
1

|


λ
2
e



(

d
k

)




)











=




λ
2
e



(

d
k

)



,







(
18
)







where λ2,−ke is λ2e with λ2e(dk) dropped from it and the last identity follows from the definition of L-value. The third line in (17) follows since








p


(

y
|
d

)


=


1


(

2





π






σ
n
2


)


N
/
2









-




y
-
Ad



2


/
2







σ
n
2





,




where |•| denotes the length of a vector. Once λ1(n)(dk) is obtained, recalling that P(dk=−1|y,d−k(n)2e)=1−P(dk=+1|y,d−k(n)2e) and solving (16) for P(dk=+1|y,d−k(n)2e),










P


(



d
k

=


+
1

|
y


,

d

-
k


(
n
)


,

λ
2
e


)


=


1

1
+

exp


(

-


λ
1

(
n
)




(

d
k

)



)




.





(
19
)







This is used in (13) for computation P(dk=+1|y,λ2e). Next, form the LLR by calculating








λ
1



(

d
k

)


=

ln




P


(



d
k

=


+
1

|
y


,

λ
2
e


)



1
-

P


(



d
k

=


+
1

|
y


,

λ
2
e


)




.






If desired, extrinsic LLR information λ1e(dk) may be derived from





λ1e(dk)=λ1(dk)−λ2e(dk).  (15)


For example, extrinsic LLR information may be exchanged with a forward error correction decoder as discussed further below.


In accordance with another embodiment of the present invention, using computation based on (14), the LLR can be estimated from











λ
1



(

d
k

)


=

ln




P


(



d
k

=


+
1

|
y


,

λ
2
e


)



P


(



d
k

=


-
1

|
y


,

λ
2
e


)



.






(
20
)







Substituting (14) and its dual when dk=−1 in (20), yields











λ
1



(

d
k

)


=

ln







n
=
1


N
s





P


(



d
k

=


+
1

|
y


,

d

-
k


(
n
)


,

λ
2
e


)




P


(



d

-
k


(
n
)


|
y

,

λ
2
e


)








n
=
1


N
s





P


(



d
k

=


-
1

|
y


,

d

-
k


(
n
)


,

λ
2
e


)




P


(



d

-
k


(
n
)


|
y

,

λ
2
e


)





.






(
21
)







Using the Bayes rule,













P


(



d

-
k


(
n
)


|
y

,

λ
2
e


)


=




p


(


d

-
k


(
n
)


,

y
|

λ
2
e



)



p


(

y
|

λ
2
e


)









=





p


(


y
|

d

-
k


(
n
)



,

λ
2
e


)





P
e



(

d

-
k


(
n
)


)




p


(

y
|

λ
2
e


)










(
22
)







where Pe(d−k(n)) is short-hand notation for P(d−k(n)2e), i.e., the probability of d−k=d−k(n) given the available extrinsic information. Similarly,










P


(



d
k

=


+
1

|
y


,

d

-
k


(
n
)


,

λ
2
e


)


=




p


(


y
|

d

-
k


(
n
)



,


d
k

=

+
1



)





P
e



(


d
k

=

+
1


)




p


(


y
|

d

-
k


(
n
)



,

λ
2
e


)



.





(
23
)







Substituting (23), the dual of (23) with dk=+1 replaced by dk=−1, and (22) in (21),














λ
1



(

d
k

)


=



ln







n
=
1


N
s





p


(


y
|

d

-
k


(
n
)



,


d
k

=

+
1



)





P
e



(

d

-
k


(
n
)


)








n
=
1


N
s





p


(


y
|

d

-
k


(
n
)



,


d
k

=

-
1



)





P
e



(

d

-
k


(
n
)


)





·



P
e



(


d
k

=

+
1


)




P
e



(


d
k

=

-
1


)











=




ln






n
=
1


N
s





p


(


y
|

d

-
k


(
n
)



,


d
k

=

+
1



)





P
e



(

d

-
k


(
n
)


)








n
=
1


N
s





p


(


y
|

d

-
k


(
n
)



,


d
k

=

-
1



)





P
e



(

d

-
k


(
n
)


)






+



λ
2
e



(

d
k

)


.









(
24
)







Recalling that λ1e(dk)=λ1(dk)−λ2e(dk), from (24),











λ
1
e



(

d
k

)


=

ln







n
=
1


N
s





p


(


y


d

-
k


(
n
)



,


d
k

=

+
1



)





P
e



(

d

-
k


(
n
)


)








n
=
1


N
s





p


(


y


d

-
k


(
n
)



,


d
k

=

-
1



)





P
e



(

d

-
k


(
n
)


)





.






(
25
)







Considering the MCMC simulation in further detail, a Markov chain can be constructed based on the channel model (1) and the a posteriori probability P(d|y,λ2e). It can be shown that this Markov chain is an irreducible, aperiodic and reversible chain. It thus follows that, upon convergence of the chain, its stationary distribution matches that of P(d|y,λ2e). Hence, the method may include constructing a MCMC simulation whose states are determined by different selections of the data vector d=[d1 d2 . . . dK]T. For example, in a system with three channels and binary data, the state assignments may be chosen as shown in TABLE 1. Each state transition occurs as a result of flipping one of the bits in d. The selection of a bit is random and has equal probability for all the bits in d. The probability of transition is based on the a posteriori probability P(dk=+1|y,d−k2e). In other words, the transition probability can be set to correspond to conditional channel data bit probabilities, for example based on a model of the communication channel. Considering the three channel example of TABLE 1, if the current state is s0 and d2 is chosen for examination, the next state will be either s0 or s2. The decision to remain in s0 or move to s2 is made according to the following rule. (i) Calculate the a posteriori probability p+=P(d2=+1|y,d1=−1,d3=−1,λ2e(d2)). Move to state s2 with the probability p+, otherwise remain in state s0.









TABLE 1







Exemplary State Assignments for a System of Three Binary Data Channels












State
d3
d2
d1







s0
−1
−1
−1



s1
−1
−1
+1



s2
−1
+1
−1



s3
−1
+1
+1



s4
+1
−1
−1



s5
+1
−1
+1



s6
+1
+1
−1



s7
+1
+1
+1











FIG. 3 presents a transition graph of this Markov chain. Possible transition between the states are indicated by arrows. These arrows are called edges. Presence of an edge indicates possible transition with a non-zero probability. If the probability of transition from one state to another is zero, no edge will connect the two states.


Note that, as channel noise decreases, the probability of some transitions may diminish to zero and others may approach one. This means, in the absence of the channel noise, some of the edges will be absent, and thus most of the useful properties of the underlying Markov chain may disappear. A practical consequence of this is that the MCMC simulation may exhibit a modal behavior: tendency to stay in certain states for long periods of time, failing to provide a good sampling. Modal behavior may be observed in a MCMC simulator at high signal to noise ratio, for example above 8 dB, in a MIMO system with four transmit antennas and quadrature signaling. In this situation, the Markov chain may have a tendency to spend long periods of time in the same state, causing insufficient variation in the hypothetical channel data samples, in turn causing poor estimates of the channel data probabilities and log likelihood ratios.


This modal behavior can therefore be avoided by running the MCMC simulation as though the signal to noise ratio of the received signal is lower than the actual signal to noise ratio in order to ensure good statistical properties from the MCMC simulation. For example, the auxiliary distribution may be chosen to be a conditional channel data probability estimated at a low signal to noise ratio. Use of an auxiliary distribution corresponding to a low signal to noise ratio, for example below 8 dB, or more particularly below 5 dB, avoids modal behavior of the MCMC simulator helps to prevent this problem by providing more perturbation in the MCMC simulator. Estimation of the channel data probability for higher signal to noise ratio is accomplished by scaling the calculated bit probability distribution to account for the auxiliary distribution. In other words, the correct value of the noise variance is used in calculating the probabilities in (25). Computer simulations reveal that this approach performs well, especially in highly loaded cases when K>2N.


A few observations from FIG. 3 are in order; these generalizations would be understood by one of skill in the art to apply to a system with an arbitrary number of channels:

    • For an observed vector y and given extrinsic information vector λ2e, the a posteriori probabilities P(dk=+1|y,d−k2e) and P(dk=−1|y,d−k2e) and, hence, the elements of the transition matrix for the Markov chain are fixed. This implies that the Markov chain is homogeneous.
    • Any arbitrary pairs of states si and sj are connected through a sequence of edges. This means transition between any arbitrary pairs of states si and sj is possible. This in turn implies that the multi-channel Markov chain is irreducible.
    • There is an edge connecting each state to itself. In other words, for any si, the probability of staying in the state is non zero, i.e. πii>0. This implies that the multi-channel Markov chain is aperiodic.


Since the multi-channel Markov chain is homogeneous, irreducible and aperiodic, it can be proven that it converges to a unique stationary distribution.


Note that the a posteriori probability P(d|y,λ2e) is the stationary distribution of the multi-channel Markov chain: the probability that the multi-channel Markov chain is in the state associated with d. It can be shown that P(d|y,λ2e) satisfies the reversibility rule, and thus, if the multi-channel Markov chain is run for sufficient number of iterations, it converges toward the desired distribution P(d|y|λ2e).


In accordance with an embodiment of the invention, each step of the MCMC simulation may begin with a random selection of one of the state variable, dk. The next state is then determined according to the procedure described above. In accordance with an alternate embodiment of the invention, the state variables may be scheduled such that they each get turn on a regular basis. For example, one possible version of Gibbs sampler for the multi-channel detector is summarized as follows:







Initialize







d

(

-

N
b


)




(
randomly
)



,






for





n

=


-

N
b


+

1





to






N
s










draw





sample






d
1

(
n
)







from






P


(



d
1



d
2

(

n
-
1

)



,





,

d
K

(

n
-
1

)


,
y
,

λ
2
e


)








draw





sample






d
2

(
n
)







from






P


(



d
2



d
1

(
n
)



,

d
3

(

n
-
1

)


,





,

d
K

(

n
-
1

)


,
y
,

λ
2
e


)













draw





sample






d
K

(
n
)







from






P


(



d
K



d
1

(
n
)



,





,

d

K
-
1


(
n
)


,
y
,

λ
2
e


)






In this routine d(−Nb) is initialized randomly, optionally taking into account the a priori information λ2e. The ‘for’ loop examines the state variables, dk's, in order, Nb+Ns times. The first Nb iterations of the loop, called burn-in period, allows the Markov chain to converge to near its stationary distribution. The samples used for LLR computations are those of the last Ns iterations.


Alternately, in accordance with another embodiment of the present invention, a number of Gibbs samplers can be run in parallel. This introduces parallelism in the detector implementation, which in turn allows drawing more Gibbs samples. Such an approach may prove useful when available processing speed is a practical limitation. Moreover, the samples drawn in successive iterations from a single Markov chain are correlated. In contrast, the parallel Gibbs samplers draw a pool of samples which are less correlated; generally only the samples that belong to the same Markov chain are correlated. Although the parallel Gibbs samplers may be inefficient if a large burn-in period, Nb, is used, the parallel Gibbs samplers can also be run with no burn-in period at all, in accordance with yet another embodiment of the present invention. Therefore, the choice between single and parallel Markov chains is application dependent and even for a particular application this choice may vary as the details of the detector implementation vary as will occur to one of skill in the art in possession of this disclosure.


An alternate method for estimating channel data probabilities in a multi-channel communications system receiver is illustrated in FIG. 2 in accordance with an embodiment of the present invention. The method, indicated generally at 200, may include receiving 202 a multi-channel communications signal to form an observed signal. Various techniques for receiving a multi-channel communications signal are known in the art as discussed within, and including for example a down-converting receiver. Another step in the method may include forming 204 a multi-channel data probability estimate from the observed signal. For example, forming a channel data probability estimate may be performed by soft decision estimation in a multi-channel detector. The method may also include simulating 206 a channel data distribution according to an auxiliary distribution using a Markov chain Monte Carlo simulator. For example, simulating a channel data distribution may be performed as discussed above. As discussed above, the auxiliary distribution may correspond to a channel data distribution determined for a low signal to noise ratio, or the auxiliary distribution may be correspond to a uniform distribution.


A final step in the method may include refining 208 the multi-channel data probability estimate using the channel data distribution. For example, refining the multi-channel data probability estimate may be performed as discussed above. Refining the multi-channel data probability estimate may include exchanging extrinsic information with a forward error correction decoder as discussed further below.


As discussed above, reception of a multi-channel signal may involve exchanging information between a detector and a decoder. For example, FIG. 4 illustrates a multi-channel receiver, shown generally at 400, in accordance with an embodiment of the present invention, which includes a detector 402 and a decoder 404 in a turbo decoding loop. The detector provides a set of soft output sequences λ1 (LLRs) 412 for the information sequences d1(i), d2(i), . . . , dK(i), based on the observed input vector sequence y(i) 410 and the extrinsic information (a priori soft information) 418 from the previous iteration of the decoder. After subtracting the extrinsic information from the LLR output 412 of detector, the extrinsic information λ1e 414 (remaining information new to the decoder) is passed to the decoder for further processing. Similarly, the extrinsic information (soft input) to each FEC decoder is subtracted from the decoder output λ2 416 to generate the extrinsic information λ2e 418 before being fed back to the detector. Typically, the turbo decoding loop includes an interleaver 408 and deinterleaver 406 between the detector and decoder. Multiple iterations of exchanging extrinsic information between the detector and decoder may be used to refine estimates of the channel data. It has also been found experimentally that, performance may be enhanced by running the MCMC simulation at a signal to noise ratio below the estimated signal to noise ratio of the received signal and gradually increasing the signal to noise ratio used by the MCMC simulation as the detector and decoder iterate.


For dk(i), λ1(dk(i)) is used to denote the soft output of SISO multi-channel detector, λ2(dk(i)) to denote the soft output of the FEC decoder, and λ1e(dk(i)) and λ2e(dk(i)) to denote the corresponding extrinsic information, respectively. Moreover, the vectors λ2e(i)=[λ2e(d1(i))λ2e(d2(i)) . . . λ2e(dK(i))]T and λ1e(k)=[λ1e(dk(1))λ1e(dk(2)) . . . λ1e(dk(M))]T are defined. Note that λ2e(i) denotes the extrinsic information of all channels at time slot i, while λ1e(k) denotes the extrinsic information of channel k across one data block.


When data symbols are binary, taking values of +1 and −1, each symbol information is quantified by the LLR of a transmitted “+1” and a transmitted “−1”, given the input information, i.e.,












λ
1



(


d
k



(
i
)


)


=

ln








P


(




d
k



(
i
)


=


+
1



y


(
i
)




,


λ
2
e



(
i
)



)




P


(




d
k



(
i
)


=


-
1



y


(
i
)




,


λ
2
e



(
i
)



)





,




and




(
2
)








λ
2



(


d
k



(
i
)


)


=

ln









P


(




d
k



(
i
)


=


+
1




λ
1
e



(
k
)




,
decoding

)




P


(




d
k



(
i
)


=


-
1




λ
1
e



(
k
)




,
decoding

)



.






(
3
)







The L-values in (3) can be obtained, for example, by following a turbo decoding algorithm. The decoder may include, for example, a set of parallel channel decoders, one decoder for each channel, when forward error correction encoded for each channel is performed independently. Alternately, the decoder may include a number of channel decoders operating across multiple channels each. Various suitable decoders for use in this receiver will occur to one of skill in the art having possession of this disclosure. The data need not be limited to binary, as will be discussed further below.


Various implementations of a detector 402 will now be discussed in further detail. For example, FIG. 5 illustrates a detector in accordance with one embodiment of the present invention. The detector 402, may include a receiver 502, a Gibbs sampler circuit 504, and a channel data probability estimator 506. The receiver is configured to receive a multi-channel signal and output an observed signal 510. For example, the receiver may include a matched filter, such as a despreader or correlator for CDMA signals. The Gibbs sampler circuit is coupled to the receiver and accepts the observed signal. The Gibbs sampler is configured to generate stochastically selected channel data hypothesis. For example, channel data hypotheses may be selected based in part on the observed signal and a channel model using a MCMC simulator as discussed above. The channel data probability estimator 506 is coupled to the receiver 502 and the Gibbs sampler circuit 504, and is configured to estimate channel data probabilities 514 from the observed signal 510 and the stochastically selected channel data hypotheses 512. For example, in accordance with another embodiment of the present invention the channel data probability estimator may form the estimates of channel data probabilities by performing a scaled summation of conditional channel data probabilities, where the conditional channel data probabilities are conditioned on the observed signal and channel data samples and the extrinsic information provided by the decoder is taken into account as discussed above. Scaling may be performed by taking into account the auxiliary distribution selected.


In accordance with another embodiment of the present invention, the detector may also include a log likelihood estimator 508 coupled to the channel data probability estimator 506 and configured to estimate channel data log likelihood estimates 516 from the channel data probabilities 514.


As discussed above, the detector 402 provides several advantages over detectors disclosed in the prior art. In particular, the detector may provide more rapid convergence in the receiver than previously known iterative techniques. Additionally, it may be possible to provide a multi-channel MIMO system wherein the number of transmit antennas is greater than the number of receive antennas (a condition often referred to as “overloaded” due to the limited ability of prior art detectors to accommodate such a situation), or a multi-channel CDMA system wherein the number of users is greater than the spreading gain of the system.


Additional detail on certain detailed embodiments of the detector 402 will now be provided. In developing a circuit implementation of the detector, it is helpful to perform the processing in a log domain. By operating in the log domain, numerical stability is improved and lower precision may be used. This allows for smaller chip-size and very fast clock rates. The log-domain formulation also lends itself to a hardware architecture that involves primarily addition, subtraction, and compare operations. Moreover, pipelining can be introduced in the proposed architecture in straightforward manner. Although pipelining induces some delay in the Gibbs sampler loop, the impact of this delay on the behavior of the MCMC simulator has been found to be negligible.


Considering the general case where all the involved variables/constants in the channel model of (1) is written more explicitly as






y
c
=A
c
d
c
+n
c  (1a)


where the subscript ‘c’ is to emphasize the variables are complex-valued. Here, for convenience of formulations that follow, it is assumed that Ac as N/2 rows and K/2 columns. This implies that, in the case of a MIMO system, there are K/2 transmit and N/2 receive antennas and, in the case of a CDMA system, there are K/2 channels with spreading codes of length N/2. Accordingly, dc has a length of K/2 and yc and nc are of length N/2.


The realization of the detection algorithms is simplified by rearranging (1a) in terms of real and imaginary parts of the underlying variables and coefficients. Such rearrangement is straightforward and leads to the equation















y
=

Ad
+
n











where







y
=

[







{

y

c
,
1


}










{

y

c
,
1


}















{

y

c
,

N
/
2



}










{

y

c
,

N
/
2



}





]


,

A
=

[












{

a

c
,
1
,
1


}






-




{

a

c
,
1
,
1


}













{

a

c
,
1
,

K
/
2



}






-




{

a

c
,
1
,

K
/
2



}











{

a

c
,
1
,
1


}









{

a

c
,
1
,
1


}


















{

a

c
,
1
,

K
/
2



}









{

a

c
,
1
,

K
/
2



}























{

a

c
,

N
/
2

,
1


}






-




{

a

c
,

N
/
2

,
1


}
















{

a

c
,

N
/
2

,

K
/
2



}






-




{

a

c
,

N
/
2

,

K
/
2



}
















{

a

c
,

N
/
2

,
1


}









{

a

c
,

N
/
2

,
1


}











{

a

c
,

N
/
2

,

K
/
2



}









{

a

c
,

N
/
2

,

K
/
2



}









]






,

d
=

[







{

d

c
,
1


}










{

d

c
,
1


}















{

d

c
,

K
/
2



}










{

d

c
,

K
/
2



}





]


,

n
=

[







{

n

c
,
1


}










{

n

c
,
1


}















{

n

c
,

N
/
2



}










{

n

c
,

N
/
2



}





]


,






(

2

a

)








{•} and {•} denote the real and imaginary parts of the arguments, ac,i,j is the ijth element of Ac, and yc,i, dc,i and nc,i are the ith elements of y, d and n, respectively. Note that when the elements of dc are from an L×L quadrature amplitude modulated (QAM) constellation, the elements of d are from an L-ary pulse amplitude modulation (PAM) alphabet. Also note that with the sizes specified above, y and n will be vectors of length N, d is a vector of length K, and A will be an N-by-K matrix. Many alternative definitions of (2a) are also possible, including for example defining






y
=

[







{
y
}










{
y
}





]





and selecting A, d, and n accordingly.


The disclosed inventive techniques can also accommodate situations where the transmitted symbols are non-binary (e.g. QPSK modulation). This can be understood by the following derivation. First, define b as an information bit, and P(b=+1) and P(b=−1) as the probabilities of b being equal to +1 and −1, respectively. If L=2M, each element of d represents a set of M coded bits. Accordingly, d may be obtained through a mapping of a set of KM information bits b1, b2, . . . , bKM. Note that the LLR values associated with these bits, can be obtained from the conditional probability P(bk=+1|y,λ2e), for k=1, 2, . . . , KM as discussed above. Here, λ2e is the set of a priori (extrinsic) information (the probabilities or LLR values) associated with information bits b1, b2, . . . , bKM from the channel decoder. Define the vectors b=[b1 b2 . . . bKM]T and b−k=[b1 . . . bk−1 bk+1 . . . bKM]T, and note that













P


(



b
k

=


+
1


y


,

λ
2
e


)


=






b

-
k





P


(



b
k

+
1

,


b

-
k



y

,

λ
2
e


)










=






b

-
k






P


(



b
k

=


+
1


y


,

b

-
k


,

λ
2
e


)




P


(



b

-
k



y

,

λ
2
e


)





,







(

4

a

)







where the second identity follows by applying the chain rule, and the summation is over all possible values of b−k. As discussed above, the number of combinations that b−k takes is equal to 2KM−1, and hence the Gibbs sampler is used as discussed above to select important samples. In accordance with one embodiment of the present invention, the Gibbs sampler may examine the successive elements of b and assign them random values such that the choices of b that result in small difference y−Ad are visited more frequently as discussed generally above.


In accordance with one embodiment of the present invention, to draw bk(n) in the Gibbs sampler, the distribution P(bk|b1(n), . . . , bk−1(n),bk+1(n−1, . . . , bKM(n−1,y,λ2e) is obtained, i.e., P(bk=+1|b1(n), . . . , bk−1(n),bk+1(n−1), . . . , bKM(n−1),y,λ2e) and P(bk=−1|b1(n), . . . , bk−1(n), bk+1(n−1), . . . , bKM(n−1),y,λ2e). To derive equations for these probabilities, define










b

-
k


(
n
)




=
Δ




[



b
1

(
n
)














b

k
-
1


(
n
)




b

k
+
1


(

n
-
1

)













,

b
KM

(

n
-
1

)



]

T





(

5

a

)







and note that










P


(



b
k

=


+
1


y


,

b

-
k


(
n
)


,

λ
2
e


)


=


P


(



b
k

=


+
1


y


,

b

-
k


(
n
)


,

λ
2
e


)







P


(



b
k

=

1

y


,

b

-
k


(
n
)


,

λ
2
e


)


+






P


(



b
k

=


-
1


y


,

b

-
k


(
n
)


,

λ
2
e


)










(

6

a

)







since the summation in the denominator is equal to one. In (6a) and other equations that follow, b−k(n) is the short hand notation for b−k=b−k(n). Note also that










P


(



b
k

=


+
1


y


,

b

-
k


(
n
)


,

λ
2
e


)


=



p


(


y


b

k
+


(
n
)



,

λ
2
e


)




P


(


b

k
+


(
n
)




λ
2
e


)




p


(

y
,

b

-
k


(
n
)


,

λ
2
e


)







(

7

a

)







where bk+(n)=[b1(n) . . . bk−1(n),+1,bk+1(n−1) . . . bKM(n−1)]T. Also define bk+=[b1(n) . . . bk−1(n),−1, bk+1(n−1) . . . bKM(n−1)]T. Noting that p(y|bk+(n)2e)=p(y|bk+(n), since when the data vector b is fully specified the extrinsic information become irrelevant, and substituting (7a) in (6a), after deleting the common terms,










P


(



b
k

=


+
1


y


,

b

-
k


(
n
)


,

λ
2
e


)


=



p


(

y


b

k
+


(
n
)



)





P
e



(


b
k

=

+
1


)









p


(

y


b

k
+


(
n
)



)





P
e



(


b
k

=

+
1


)



+







p


(

y


b

k
-


(
n
)



)





P
e



(


b
k

=

-
1


)











(

8

a

)







where Pe(bk=i)ΔP(bk=i|λ2e(bk)), for i=±1, and the elements of b can be assumed independent of each other, hence,






P(bk+(n)2e)=Pe(b1=b1(n)) . . . Pe(bk−1=bk−1(n))Pe(bk=+1)Pe(bk+1=bk+1(n−1)) . . . Pe(bKM=bKM(n−1).  (9a)


When A is known (or has been estimated) and the noise vector n is Gaussian and satisfies








E


[

nn
H

]


=


1
2



σ
n
2


I


,













p


(

y


b

k
+


(
n
)



)


=


1


(

πσ
n
2

)


N
/
2







-

||

y
-

Ad

k
+


(
n
)





||
2



/

σ
n
2







,




(

10

a

)







where dk+(n) is the vector of transmit symbols obtained through mapping from bk+(n). Although direct substitution of (10a) and a similar equation with bk+(n) replaced by bk(n) in (8a) can be done, the result is computationally involved and may be sensitive to numerical errors procedure. Hence, a log-domain implementation is preferable as will now be described.


Defining











γ

k
+




=
Δ




ln


(


P
e



(


b
k

=

+
1


)


)


-


||

y
-

Ad

k
+


(
n
)





||
2



σ
n
2









and




(

11

a

)







γ

k
-




=
Δ




ln


(


P
e



(


b
k

=

-
1


)


)


-


||

y
-

Ad

k
-


(
n
)





||
2



σ
n
2







(

12

a

)







(8a) may be rearranged as










P


(



b
k

=


+
1


y


,

b

-
k


(
n
)


,

λ
2
e


)


=


1

1
+



-

(


γ

k
+


-

γ

k
-



)





.





(

13

a

)







Using (11a) and (12a), to obtain












γ

k
+


-

γ

k
-



=





λ
2
e



(

b
k

)


-



||

y
-

Ad

k
+


(
n
)





||
2



-

||

y
-

Ad

k
-


(
n
)





||
2





σ
n
2







where











λ
2
e



(

b
k

)


=

ln









P
e



(


b
k

=

+
1


)




P
e



(


b
k

=

-
1


)



.







(

14

a

)







Noting that dk+(n) and dk(n) differ in one term, straightforward manipulations lead to











γ

k
+


-

γ

k
-



=



λ
2
e



(

b
k

)


-


1

σ
n
2




(



(

d


k
+

,
p


(
n
)


)

2

-


(

d


k
-

,
p


(
n
)


)

2


)



r
pp


+


2

σ
n
2




(


d


k
+

,
p


(
n
)


-

d


k
-

,
p


(
n
)



)



(


y
p
mf

-





q
=
1

,

q

p


K




r
pq



d
q

(
n
)





)







(

15

a

)







where ypmf=apTy, rpq is the pq th element of R=ATA, dq(n) is the q th element of d(n), dk+,p(n) and dk,p(n) are the p th element of dk+(n) and dk(n), respectively, and bk is mapped to dp(n). Note that dq(n), depends on bk when q=p, and the above notation reflects this fact. Equation (15a) may be further rearranged as












γ

k
+


-

γ

k
-



=





λ
2
e



(

b
k

)


-


κ
1



r
pp



+


κ
2

(


y
p



mf


-





q
=
1

,

q

p


K




r
pq




d
q

(
n
)





)








where











κ
1

=


1
2



(



(

d


k
+

,
p


(
n
)


)

2

-


(

d


k
-

,
p


(
n
)


)

2


)



,








κ
2

=



(


d


k
+

,
p


(
n
)


-

d


k
-

,
p


(
n
)



)



y
p



mf



=


2

σ
n
2




y
p
mf













and







r
pq


=


2

σ
n
2





r
pq

.










(

16

a

)







Hence, y′pmf and r′pq can be pre-calculated prior to starting the Gibbs sampler and thus be provided as inputs to it.


When transmitted symbols are QPSK, d=b, dk+,p(n)=+1 and dk,p(n)=−1, and accordingly (16a) reduces to











γ

k
+


-

γ

k
-



=



λ
2
e



(

b
k

)


+

2



(


y
p



mf


-





q
=
1

,

q

p


K




r
pq




b
q

(
n
)





)

.







(

17

a

)







Moreover, since bq(n)'s are binary, evaluation of the right-hand side of (17a) involves primarily additions and subtractions.


In the case of more complex modulations, such as QAM, evaluation of (16a) is naturally more involved. However, since dq(n)'s are from a relatively small alphabet, an add/subtract implementation is still feasible as will be apparent to one of skill in the art having possession of this disclosure.


Evaluation of (13a) involves a function of the form 1/(1+ex). Various approaches for implementing this function in hardware are possible, including using a lookup table or using the linear approximation:










1

1
+



-
x







x

2
3


+

1
2






(

18

a

)







When this approximation is used, it is possible that the evaluated value of P(bk=+1|y,b−k(n)2e) exceeds one or becomes negative. When this happens, P(dk=+1|y,b−k(n)2e) may be hard limited to the maximum and minimum values of 1 and 0, respectively.


Using (25) above,

















λ
1
e



(

b
k

)


=

ln






n
=
1


N
s





p


(


y


b

-
k


(
n
)



,


b
k

=

+
1



)





P
e



(

b

-
k


(
n
)


)








n
=
1


N
s





p


(


y


b

-
k


(
n
)



,


d
k

=

-
1



)





P
e



(

b

-
k


(
n
)


)
















where





(

19

a

)








P
e



(

b

-
k


(
n
)


)


=



P
e



(


b
1

=

b
1

(
n
)



)















P
e



(


b

k
-
1


=

b

k
-
1


(
n
)



)





P
e



(


b

k
+
1


=

b

k
+
1


(

n
-
1

)



)
















P
e



(


b
KM

=

b
KM

(

n
-
1

)



)


.






(

20

a

)







To ensure that the samples b(n) are different, repetitions of b(n) may be deleted while running the Gibbs sampler. An efficient implementation can be developed by defining











η

k
+


(
n
)




=
Δ




ln







P
e



(

b

-
k


(
n
)


)



-





y
-

Ad

k
+


(
n
)





2


σ
n
2









and




(

21

a

)







η

k
-


(
n
)




=
Δ




ln







P
e



(

b

-
k


(
n
)


)



-





y
-

Ad

k
-


(
n
)





2


σ
n
2







(

22

a

)







and noting that (19a) can be rearranged as











λ
1
e



(

b
k

)


=


ln
(




n
=
1


N
s






η

k
+


(
n
)




)

-


ln
(




n
=
1


N
s






η

k
-


(
n
)




)

.






(

23

a

)







Additional simplification can be obtained using the definition





max*(x, y)=max(x, y)+ln(1+e−|x−y|), where max*(x, y)Δln(ex+ey),  (24a)


and its recursive extension





max*(x, y, z)=max*[max*(x, y), z], where max*(x, y, z)Δln(ex+ey+ez).  (25a)


Computation of ln(1+e−|x−y|) may be done through the use of a small look-up table. Alternately, the approximation











λ
1
e



(

b
k

)






max
n



η

k
+


(
n
)



-


max
n




η

k
-


(
n
)


.







(

26

a

)







can be used. This approximation significantly simplifies the implementation of the detector. In (23a), each new sample of b is to be compared with the previous elements and deleted if it is a repeat sample. When Ns is large this may be a complexity burden. Implementation of (26a), in contrast, is relatively simple. As samples b are generated, the respective values ηk+(n) and ηk(n) are computed. Each of these are then compared their counterpart from the previous Gibbs samples, i.e., with ηk+(n−1) and ηk(n−1), respectively, and replaced if they are larger or discarded if they are smaller. This also avoids the need to search for repetitions of b; a significant savings since the number of comparisons needed for deleting repetitions grows with the square of Ns.


An intermediate solution that also avoids the complexity burden of (23a), while still performing better than (26a) is to keep a handful largest samples of ηk+(n) and ηk(n) for application in an equation similar to (23a). Implementation of these results in circuit form will now be presented.



FIG. 6 illustrates a Gibbs sampler, in accordance with an embodiment of the present invention. The Gibbs sampler includes front-end processing 602. The front-end processing takes y, A and σn2 as inputs and calculates y′mf and







R


=


2

σ
n
2




R
.






The channel response, A and noise variance σn2, may be known or may be estimated by the receiver using techniques known to one of skill in the art.


Substituting (16a) in (18a),










P


(



b
k

=


+
1


y


,

b

-
k


(
n
)


,

λ
2
e


)











λ
2
e



(

b
k

)


-


κ
1



r
pp



+







κ
2

(


y
p



mf


-





q
=
1

,

q

p


K




r
pq




d
q

(
n
)





)





2
3


+


1
2

.






(

27

a

)







In the Gibbs sampler 504, the next choice of bk is made by selecting bk=+1 with the probability P(bk=+1|y,b−k(n)2e). To realize this in hardware, a random variable, v, with uniform distribution in the interval 0 to 1 may be generated, and bk is set equal to +1 if P(bk=+1|y,b−k(n)2e)−v>0, otherwise bk is set equal to −1. Alternatively, and more conveniently here, the latter inequality can be written as 23(P(bk=+1|y,b−k(n)2e)−0.5)−u>0, where u=23(v−0.5) is a random variable with uniform distribution in the interval −4 to +4. The random variable u can be easily generated using a linear feedback shift register (LFSR) circuit 628. Various LFSR circuits are known in the art.


The R′ register 604 stores a matrix of elements r′pq. The diagonal elements of R′ are forced to zero in order to exclude the case q=p as motivated by (27a). Since in practice di's are from a small alphabet and accordingly the number of possible values of κ1 and κ2 are small, each multiplier 606, 612, 616 can optionally be implemented by add/subtract operations. Hence, the Gibbs sampler can be implemented in a multiplier-free realization. The rest of the operation of the Gibbs sampler thus follows from (27a).


Computation of L-values is done according to (21a), (22a) and (26a) by applying various approximations. Although, here, to simplify the discussion, use of (26a) is emphasized, the developed circuit, with minor modification as will occur to one of skill in the art, is also applicable to (23a).


From (21a) and (22a), note that the computation of κk+(n) and ηk−(n) requires computation of ln Pe(b−k(n)) and











y
-

Ad

(
n
)





2


σ
n
2


.




Continuing with the description of procedures for computation of these terms, note that








λ
2
e



(

b
k

)


=


ln








P
e



(


b
k

=

+
1


)




P
e



(


b
k

=

-
1


)




=

ln








P
e



(


b
k

=

+
1


)



1
-


P
e



(


b
k

=

+
1


)










and using this obtain, for i±1,













ln







P
e



(


b
k

=
i

)



=



ln






1

1
+



-


λ
2
e



(

b
k

)













=




-
max

*

(

0
,


-
i








λ
2
e



(

b
k

)




)












-

max


(

0
,


-
i








λ
2
e



(

b
k

)




)









=




min


(

0
,

i







λ
2
e



(

b
k

)




)


.








(

28

a

)







Using (28a) and ψk(n) as an approximation to ln Pe(bk(n)), where bk(n)=[b1(n) . . . bk(n) bk+1(n−1) . . . bKM(n−1)]T, and noting that because of the interleaving effect the information bits are independent,










ψ
k

(
n
)


=





l
=
1

k



min


(

0
,


b
l

(
n
)





λ
2
e



(

b
k

)




)



+




l
=

k
+
1


KM




min


(

0
,


b
l

(

n
-
1

)





λ
2
e



(

b
k

)




)


.







(

29

a

)







Using (29a), ψk(n) can be updated according to the following rule:





if bk(n)≠bk(n−1) then ψk(n)k(n−1)−bk(n−1)λ2e(bk) else ψk(n)k(n−1).


Note that ψk(n)k(n−1−min(0,bk(n−1)λ2e(bk))+min(0,bk(n)λ2e(bk)), which can be simplified to





ψk(n)k(n−1)−bk(n−1)λ2e(bk)  (29b)


when bk(n)≠bk(n−1). Once ψk(n) is available, ln Pe(b−k(n)) can be calculated by removing the contribution of bk(n), viz.,





ln Pe(b−k(n))=ψk(n)+max(0,bk(n)λ2e(bk)).  (30a)



FIG. 7 illustrates a ψ-calculator circuit 700 based on the above result, in accordance with an embodiment of the present invention. When bk(n)≠bk(n−1), the ψ register 702 is enabled and its content is updated according to (29b) using summer 704 for calculate the new value. Following (30a), ln Pe(b−k(n)) is determined by the present content of ψ register, when bk(n−1)λ2e(bk) is positive, or by the updated ψ, when bk(n−1)λ2e(bk) is negative by selecting the appropriate resulting using a multiplexer 706 (or alternately, multiplexer 706 may be implemented by a switch) controlled by a sign bit extractor 708. Note that ψ is insensitive to a bias since the subtraction of the two terms on the right-hand side of (26a) (and also (23a)) removes such a bias. Hence, ψ can be assigned essentially any arbitrary initial value.


Next, a circuit for computation of











y
-

Ad

n
+


(
n
)





2


σ
n
2







and










y
-

Ad

k
-


(
n
)





2


σ
n
2






is described. Let







ξ

k
+


(
n
)


=







y
-

Ad

k
+


(
n
)





2


σ
n
2







and






ξ

k
-


(
n
)



=





y
-

Ad

k
-


(
n
)





2


σ
n
2







and note that the difference ξk+(n)−ξk(n)=δ is available from the Gibbs sampler. Accordingly, updating ξk+(n) and ξk(n) may be performed according to the rule:

















if bk(n) ≠ bk(n−1)



  if bk(n) = +1



    ξk+(n) = ξ + δ; ξk(n) = ξ; ξ = ξ + δ



  else



    ξk+(n) = ξ; ξk(n) = ξ − δ; ξ = ξ − δ



else



  if bk(n) = +1



    ξk+(n) = ξ; ξk(n) = ξ − δ



  else



    ξk+(n) = ξ + δ; ξk(n) = ξ










Here, ξ is an auxiliary variable that helps with the implementation of the procedure. FIG. 8 illustrates ξ-calculator circuit to calculate ξ, in accordance with an embodiment of the present invention. The content of the ξ register 802 is updated whenever bk(n)≠bk(n−1). It is updated to the value of ξ+δ (computed by adder 804) when bk(n)=+1 and to the value of ξ−δ when bk(n)=−1.


Finally, a log-likelihood calculator circuit for computing the LLR values is shown in FIG. 9 in accordance with an embodiment of the present invention. The log-likelihood calculator 900 uses the ξ-calculator circuit 800 and ψ-calculator circuit 700. The log-likelihood calculator implements (26a).


As shown above, one step of the Gibbs sampler uses one clock cycle. Hence one cycle of the Gibbs samplers use KM clock cycles to execute. In previously known MCMC simulation, the content of b is considered as a sample of the Markov chain at the end of each iteration of the Gibbs sampler. In contrast, here the transitional samples bk(n)=[b1(n) . . . bk(n)bk+1(n−1) . . . bKM(n−1)]T are used. This modification reduces the hardware complexity and increases the speed of operation of the circuit. This modification appears to result in minor impact on the receiver performance.


As will occur to one of skill in the art, each of the above illustrated circuit may include pipelining to increase throughput. For example, a buffer can be placed after each adder. Similiary, the multipliers can also be implemented using a combination of adders and substractors, with pipelining. Accordingly, the clock rate of the circuit can be increased to a rate where one addition is performed each clock period. Of course, it will be recognized that additional delays may be used in order to time align various parameters. For example, the b values may be delayed in order to ensure they time-correspond to values of δ, which have longer pipeline delays in their computation.


A pipelined implementation will introduce a delay in the Gibbs sampler circuit, resulting in the Gibbs sampler drawing samples bk(n) from the distribution P(bk|b1(n), . . . , bk−Δ−1(n), . . . , bk−Δ(n−1), . . . , bk−1(n−1),bk+1(n−1), . . . , bKM(n−1),y,λ2e) rather than the initially discussed distribution P(bk|b1(n), . . . , bk−1(n),bk+1(n−1), . . . , bKM(n−1),y,λ2e). This does not appear to have an appreciate impact of the performance of the detector.


In summary, efficient hardware implementations of the detector using add, subtract and compare operations are illustrated. Such implementations are amenable to pipelining to increase the clock speed of operation. Additional benefits of the implementation are relatively small word lengths (e.g. 8-12 bit precision). Although the above has been described with particular reference to digital components, e.g. as implemented in an application specific integrated circuit or field programmable gate array, it is to be understood that the circuits can equally be implemented using a general purpose processor or digital signal processor.


Finally, it is noted that the mathematical derivation of operation of the presently disclosed inventive techniques made certain assumptions, e.g. Gaussian white noise and independent data. These assumptions are not essential to the operation of the disclosed embodiments, as excellent performance can be obtained in many situations which do not exactly fit these mathematical assumptions.


It is to be understood that the above-referenced arrangements are only illustrative of the application for the principles of the present invention. Numerous modifications and alternative arrangements can be devised without departing from the spirit and scope of the present invention. While the present invention has been shown in the drawings and fully described above with particularity and detail in connection with what is presently deemed to be the most practical and preferred embodiment(s) of the invention, it will be apparent to those of ordinary skill in the art that numerous modifications can be made without departing from the principles and concepts of the invention as set forth herein.

Claims
  • 1.-15. (canceled)
  • 16. A detector for estimating channel data probabilities in a multi-channel communication system comprising: a receiver configured to receive a multi-channel signal and output an observed signal;a Gibbs sampler circuit coupled to the receiver and configured to generate stochastically selected channel data hypotheses based in part on the observed signal and a channel model; anda channel data probability estimator coupled to the receiver and coupled to the Gibbs sampler circuit and configured to estimate channel data probabilities from conditional data probabilities conditioned on the observed signal and the stochastically selected channel data hypotheses.
  • 17. The detector of claim 16, wherein the Gibbs sampler circuit further comprises a Markov chain Monte Carlo simulator coupled to the receiver and configured to generate channel data samples from an auxiliary distribution wherein transition probabilities are based in part on the observed signal.
  • 18. The detector of claim 17 wherein the auxiliary distribution is a uniform distribution.
  • 19. The detector of claim 17 wherein the auxiliary distribution is based on the channel model using a signal to noise ratio below an estimated operating signal to noise ratio of the multi-channel communication system.
  • 20. The detector of claim 16 wherein the channel data probability estimator further comprises a log likelihood ratio estimator coupled to the channel data probability estimator and configured to estimate channel data log likelihood ratios from the channel data probabilities.
  • 21. The detector of claim 16 further comprising a decoder coupled to the channel data probability estimator and configured to exchange extrinsic information with the channel data probability estimator.
  • 22. A method for estimating channel data likelihoods in a multi-channel communications system receiver comprising: receiving a multi-channel communications signal to form an observed signal;generating stochastically-selected channel data hypotheses using a Markov chain Monte Carlo simulation;determining conditional bit probabilities conditioned on the stochastically-selected channel data hypotheses and the observed signal; andforming a channel data likelihood based on the conditional bit probabilities.
  • 23. The method of claim 22, wherein forming a channel data likelihood comprises: summing the conditional bit probabilities to form channel data bit probabilities corresponding to each possible value for a channel data bit; anddetermining a log likelihood ratio for the channel data bit using the channel data bit probabilities.
  • 24. The method of claim 22, wherein forming a channel data likelihood comprises: finding a maximum conditional bit probability for each possible value of a channel data bit; andapproximating a log likelihood ratio for the channel data bit using the maximum conditional bit probability for each possible value of the channel data bit.
  • 25. The method of claim 22, wherein generating stochastically-selected channel data hypotheses using a Markov chain Monte Carlo simulation comprises setting state transaction probabilities for the Markov chain Monte Carlo simulation based on the observed signal.
  • 26. The method of claim 22, wherein generating stochastically-selected channel data hypotheses using a Markov chain Monte Carlo simulation comprises setting state transaction probabilities based on an auxiliary distribution.
Parent Case Info

This application is a continuation of U.S. application Ser. No. 11/177,938 filed on 7 Jul. 2005, currently pending, which claims the benefit of U.S. Application No. 60/586,360 filed on 7 Jul. 2004, each of which is incorporated by reference herein.

Government Interests

This invention was made with government support under NSF Grant # ECS0121389 awarded by the National Science Foundation. The Government has certain rights to this invention.

Provisional Applications (1)
Number Date Country
60586360 Jul 2004 US
Continuations (1)
Number Date Country
Parent 11177938 Jul 2005 US
Child 12209143 US