The present invention relates generally to wireless communication. More particularly, the present invention relates to techniques for detection of multiple-input multiple-output (MIMO) and multi-user code division multiple access (CDMA) signals.
Wireless communications have become ubiquitous. Improving the performance and capacity of wireless communications systems is highly desirable.
Code division multiple access (CDMA) and multiple-input multiple-output (MIMO) communications techniques share a number of common aspects. In a CDMA system, a number of users transmit simultaneously, with each user being identified by a different spreading code. The spreading codes can be mutually orthogonal, although this is often not the case. For example, in an “overloaded” system, more users are supported than orthogonal codes are available, and thus some cross-correlation exists between users. In a MIMO system, on the other hand, a number of different sub-streams (e.g. a data stream that has been demultiplexed into parallel sub-streams) are transmitted through separate antennas. At the receiver, different sub-streams are differentiated through their signatures (e.g., differing channel gains between each transmit antenna and a set of received antennas). Generally, the different substreams are received with a high degree of cross-correlation at individual receive antennas. In either a CDMA system or a MIMO system, the different users/sub-streams are transmitted in the same frequency band. Hence, in general, system capacity can increase with increasing number of users/sub-streams. In practice, however, interference between users/sub-streams can occur, and as the number of users/sub-streams increases, the complexity of a receiver tends to grow exponentially. While theoretically-optimal solutions are known in some situations, practical implementation considerations have motivated a search for sub-optimal, yet efficient, detectors.
It has been recognized that it would be advantageous to develop computationally efficient techniques for calculating log likelihood ratios in a receiver.
In some embodiments of the invention, a method for estimating log likelihood ratios in a receiver includes receiving a multi-dimensional signal comprising a plurality of transmitted data bits. A first symbol estimate is formed, and the first symbol estimate has a first distance from an observation of the multi-dimensional signal. This first symbol estimate can be a minimum distance solution or an estimate of a minimum distance solution. The method can include initializing a plurality of Markov chain Monte Carlo simulations using a plurality of differing second symbol estimates. Each one of the second symbol estimates is constrained so that a differing one of its data bits is inverted relative to the corresponding data bit of the first symbol element. The Markov chain Monte Carlo simulations are run to stochastically search for constrained minimum second distances. Log likelihood ratios corresponding to each of the transmitted data bits can be calculated using the first distance and the constrained minimum second distances.
In some embodiments of the invention, a receiver system can include a signal storage having an input configured to accept digital samples of a multi-dimensional signal. The multi-dimensional signal can include a plurality of transmitted data bits. The system can also include a symbol estimator coupled to the signal storage and configured to estimate a first symbol estimate from the digital samples. A plurality of Markov chain Monte Carlo simulators can stochastically search for corresponding ones of a plurality of second symbol estimates, wherein each one of the second symbol estimates is constrained so that a differing bit is inverted relative to a corresponding bit of the first symbol estimate. A log likelihood calculator can output log likelihood ratio estimates corresponding to each of the plurality of transmitted data bits.
Additional features and advantages of the invention will be apparent from the detailed description which follows, taken in conjunction with the accompanying drawings, which together illustrate, by way of example, features of the invention.
Reference will now be made to the exemplary embodiments illustrated in the drawings, and specific language will be used herein to describe the same. It will nevertheless be understood that no limitation of the scope of the invention is thereby intended. Alterations and further modifications of the inventive features illustrated herein, and additional applications of the principles of the inventions as illustrated herein, which would occur to one skilled in the relevant art and having possession of this disclosure, are to be considered within the scope of the invention.
In describing the present invention, the following terminology will be used:
The singular forms “a,” “an,” and “the” include plural referents unless the context clearly dictates otherwise. Thus, for example, reference to a symbol includes reference to one or more symbols.
As used herein, a plurality of items may be presented in a common list for convenience. However, these lists should be construed as though each member of the list is individually identified as a separate and unique member. Thus, no individual member of such list should be construed as a de facto equivalent of any other member of the same list solely based on their presentation in a common group without indications to the contrary.
The following notations are adhered to throughout this application. Vectors are in column form and denoted by lowercase bold letters. Matrices are denoted by uppercase bold letters. Scalar quantities are denoted by lowercase non-bold letter, while scalar constants are denoted by uppercase non-bold letters. Thus, for example, the ij-th element of a matrix, e.g., A is denoted by aij. The superscripts T and H are used to denote matrix or vector transpose and Hermitian, respectively. The norm of a complex-valued vector x is defined as ∥x∥=xHx. Integer subscripts are used to distinguish different channels. Integer time indices are put in brackets. For example, dk(i) is used to denote the ith symbol of the channel k. In most expressions, the time index, i, is omitted for brevity. The notations P(·) and p(·) denote the probability of a discrete random variable and the probability density of a continuous random variable, respectively.
In multi-channel communications systems, powerful channel codes can be used, including for example convolutional codes, turbo codes, and low-density parity check codes. The input to a decoder can be provided as log-likelihood ratio (LLR) values of the coded bits. Exact computation of LLR values tends to grow exponentially in complexity with the number of simultaneously transmitted bits. For example, in a MIMO system with 4 transmit antennas using 64-state quadrature amplitude modulation (64-QAM) symbols transmitted from each antenna, each symbol carries 6 bits and thus a total of 24 bits are transmitted simultaneously. Thus, there are 224 combinations of transmitted bits or 16,777,216 possible combinations of data. In other words, the signal can be represented in a multi-dimensional signal space. Calculating exact LLR values can involve examining all of these possible combinations (exploring the entire multi-dimensional signal space), resulting in prohibitive complexity.
One approach to a reduced complexity sub-optimal detector is to select a subset of all the possible combinations of data which are used for computation of the log likelihood ratios. For example, a deterministic search through the possible combinations can be performed using sphere decoding and other tree search methods. Unfortunately, although the subset may be significantly smaller than the entire signal space, the complexity of this type of searching tends to grow exponentially with the number of bits.
An alternate approach, as discussed in the above-referenced applications, is using Markov chain Monte Carlo (MCMC) methods to generate the subset of data. MCMC is a stochastic search, and provides benefits in that the growth of the search list and hence the complexity tends to grow only slightly faster than linear. Thus, a significant computational benefit can be achieved for high dimension signals.
As discussed in the above-referenced applications, however, at high signal to noise ratio, the performance of MCMC methods can degrade. This is because the underlying distribution being simulated by the MCMC method tends to have a number of regions of high probability separated by regions of low probability at high signal to noise ratio. The transition probabilities in the underlying Markov chain thus tend to cause the simulation to become trapped in certain states. Thus, the MCMC simulation can fail to explore portions of the signal space which have high likelihood of being the correct signal. A number of measures to address this are described in the above-referenced applications.
It has been recognized by the present inventor that certain properties of the log-likelihood ratio calculation can be used to further simplify the operation of a multi-channel receiver and reduce degradation at high signal to noise ratio. When calculating log-likelihood ratios, a max-log approximation can be used, for which the log-likelihood is approximated as the differences between a minimum unconstrained distance (common to all bits is each channel use) and a minimum constrained distance (one for each bit). The minimum constrained distances can be found (or approximately found) efficiently by a using a number of MCMC simulations initialized with differing data vectors. For example,
Explanation of the operation of the process will be made with reference to a mathematical model of one example of a communication system in which some embodiments of the present invention can be practiced. A block diagram of an Nt-by-Nr MIMO transceiver system is shown in
At the transmitter, the information word s is encoded by the channel encoder 202. The output of the channel encoder after passing through an interleaver 204 is divided into the blocks of M bits. These blocks form a vector sequence b(n)=[b1(n)b2(n) . . . bM(n)]T, where n is the time index. Each b(n) is then mapped to the transmit symbol d(n)=[d1 (n) d2(n) . . . dN
For a flat fading channel, the received signal at the antennas 210 can be modeled as
y=Hd+n, (1)
where Y=[y1 y2 . . . yN
The receiver can include a MIMO detector 212 that generates LLR values (soft information) of b1 through bM, and passes them to the channel decoder 214 for further processing. The channel decoder can further improve the soft information of the coded bits, i.e., b, and feed the result back to the MIMO detector. After a few iterations between MIMO detector and channel decoder, the final decision about the transmitted uncoded bits is made by the channel decoder. For later reference, λ1 and λ2 denote the LLR values generated by the MIMO detector and channel decoder, respectively, and λ1e and λ2e are the respective extrinsic LLR values, i.e, after subtracting the incoming LLR values using substractors 216, 218 as in
The LLR value of an information bit b can be defined as:
where P(b=+1) means the probability of b=+1 (equivalent of logical 1), and P(b=−1) means the probability of b=−1 (equivalent of logical 0). Although not shown here, the probabilities are typically conditioned on the received signal value and other parameters (e.g., extrinsic information from other parts in the receiver) and, as a result, exact calculation of the LLR values is lengthy and complex. The above-referenced applications describe some techniques that can be used to approximate the LLR values.
According the some embodiments of the present invention, to reduce the complexity of computation of LLR values, an approximation known as max-log can be used. In the case of a MIMO detector, when there is no extrinsic information from channel decoder, the max-log approximation is given by:
The definition of dk
Accordingly, using MCMC to search a small subset of values of b, yet find a good sample set such that good estimates of the two minimum norms on the right hand side of equation (3) can significantly reduce complexity of estimating the LLR values.
As described in the above-referenced applications, an MCMC uses a Markov chain in which the states are specified by various choices of the vector b (or, equivalently, d). The transition between the states can be constrained and, depending on the imposed constraints, different choices of the Markov chain are obtained. A particular choice that lends itself to a very simple method of collecting samples for LLR computation, called Gibbs Sampling (GS), is when the transitions between the states are constrained to those that differ by only one bit. The GS is described in the above-referenced applications.
GS is effectively a random walk through the states of the underlying Markov chain. The detector will provide good probability estimates provided that GS visits the states that correspond to the desired minimum norms on the right-hand side of equation (3). According to the theory of MCMC, as long as the underlying Markov chain remains irreducible, i.e., all the states are connected together through one or more transitions, the GS, if run for a sufficiently large number of iterations, almost always visits all the states, thus finds the desired minimum norms. However, the number of required iterations of the GS for successful operation of the MIMO detector may be prohibitively large when some of the transition probabilities become very low as discussed further below.
As noted in the above-referenced applications, at high signal to noise ratios, the GS can sometimes fail to find the desired minimum norms on the right-hand side of equation (3). This can be mitigated by using parallel GSs that are initialized from independently chosen random initial starting states. Another approach is using higher noise variances than the true noise variance, and adjusting for this when calculating the LLR values.
Note that
i.e., the smaller of the two norms on the right-hand side of equation (3), is equal to the minimum value of ∥y−Hd∥2 over all possible choices of d (or, equivalently, b). Recall that the choice of d that minimizes ∥y−Hd∥2 is called the maximum likelihood (ML) estimate of d. Talking note of this, for convenience of reference to the two norms in equation (3), the smaller of the two norms is referred to as ML term and the larger one is referred to as non-ML (N-ML) term.
The GS searches for the states that correspond to the smaller values of ∥y−Hd∥2. As a result, there is a good chance that at least one of the parallel GSs finds the ML term correctly. While this may not be guaranteed, success can be enhanced if the GS is initialized to a state which corresponds to a small norm ∥e∥2=∥y−Hd∥2. One simple, yet effective, initialization that achieves this goal is to first calculate the non-quantized symbol vector
It has been noted, however, that the GS is likely to miss a fair percentage of the N-ML terms due to stalling at high probability states. Randomly initialized GSs can serve the purpose of trying other parts of the Markov chain which possibly results in a good estimates of at least a fair percentage of the N-ML terms,
The states in a Markov chain are connected together via links (often called edges) whose strength is given by the probability of transition between various states. Hence, stalling can happen if all the incoming edges to a state are strong, and all the outgoing edges from the same state are weak. This can happen in MCMC detectors in high SNR regime. To elaborate, let S0 and S1 be a pair of adjacent/connected states in the underlying Markov chain of an MCMC MIMO detector. Also, let d0 and d1 be the associated symbol vectors, respectively. Assuming that there is no extrinsic information, following the Gibbs sampling procedure, the transition probabilities between the states S0 and S1 are obtained as
When ∥y−Hd0∥2<∥y−Hd1⊕2, P(S1→S0)>P(S0→S1), meaning that the GS with a higher chance selects S0 over S1. Moreover, the difference between P(S1→S0) and P(S0→S1) increases as σn2 decreases, i.e., as one moves into high SNR regime. This shows that as SNR increases, while incoming edges to a state become stronger, the outgoing edges may become excessively weak, increasing the chance of stalling.
Clearly, improving the estimates of the N-ML terms can be of significant benefit in improving the overall likelihood estimates. Based on the ML term found above, N-ML terms can be searched for as follows. Starting with the ML solution obtained from the ZF-initialized GS or through any other method, an additional set of M GSs are run, each with one of the bits of b constrained to remain fixed at the value opposite to its value in the ML solution and the rest of the bits are allowed to vary according to the Gibbs sampling procedure. This, with a judicious initialization of d, can result in improved estimates of the desired N-ML terms.
For example, one reasonable choice for initialization of d is to make sure that simulation begins with a constrained b that is chosen to correspond to a relatively small value of ∥y−Hd∥2; what constrained b means will become clear below.
Let {circumflex over (d)}ML denote the ML estimate of d obtained through the ZF-initialized GS (or through any other effective method). Also, let {circumflex over (b)}ML be the bit vector associated with {circumflex over (d)}ML Note that by the norm {circumflex over (D)}ML=∥y−H{circumflex over (d)}ML∥2 is generally small; a value equal to or close to DML. Moreover, a small disturbance in {circumflex over (d)}ML will result in a small variation in the norm ∥y−Hd∥2. Noting this, while searching for the N-ML terms, the set of parallel GSs can be initialized with choices of d that are close to {circumflex over (d)}ML and satisfy the required constraints on the elements of b. When the mapping from b to d is through partitioning of b into 2Nt blocks which in turn are mapped to the real and imaginary parts of the elements of d, the process of finding the closet values of d to {circumflex over (d)}ML is a straightforward task. To initialize d for finding the N-ML term that corresponds to, say, bk, first the block that bk belongs to is identified. Then the same block in {circumflex over (b)}ML is identified and converted to a new block in which bk is inverted and the rest of the bits are adjusted such that the element of d that is affected by this change experiences minimal variation. Other elements of d are intact. This can be described as bit flipping with minimum disturbance. Note that flipping bk is the constraint, and keeping the minimum disturbance assures starting with a good initial value of b (and, thus, d) and results in a fair N-ML term/distance. Running the associated constrained GS subsequently improves the N-ML term further.
As a specific example, consider the case where data symbols are taken from a 64-QAM alphabet and mapping from bits to symbols follows gray coding. Table 1 illustrates Gray mapped patterns of three bits to 8 PAM (pulse amplitude modulated) levels and note that a pair of PAM symbols are used as real and imaginary parts of a QAM symbol (note, 8×8=64). As an example, let the block of {circumflex over (b)}ML that bk belongs to be b1b2b3=010. According to Table 1, this corresponds to the PAM level d=−1. Also, from Table 1, observe that if the bit of interest is b1, the nearest PAM level with b1=1 (flipped version of b1=0) is d=+1, with the corresponding bits b1b2b3=110. Similarly, if the bit of interest is b3, the nearest PAM level with b3=1 (flipped version of b3=0) is d=−3 with the corresponding bits b1b2b3=011. Note that in both cases the target bit has simply been inverted. This is not generally true. For instance, in the present example, if the bit of interest is b2, the nearest PAM level with b2=0 (flipped version of b2=1) is d=−5 with the corresponding bits b1b2b3=001, in which b3 is also flipped. Following the same logic, it is straightforward to find the nearest neighbors of other bit combinations as well. Such neighbors can be tabulated and a table look-up method can be used for an efficient implementation.
Another illustration of bit flipping with minimized disturbance can be explained in conjunction with
Thus, to summarize, a process 100 (
The process can include forming 104 a first symbol estimate. The first symbol estimate has a distance from an observation of the multi-dimensional signal. For example, the distance may be a minimum distance found by searching using ZF, MMSE, MCMC, SIC, PIC, SD, or similar techniques. The first symbol estimate includes a plurality of first data bits.
Another operation of the process can be initializing 106 a plurality of MCMC simulations using a plurality of differing second symbol estimates. For example, each of the MCMC simulations can be a GS. The second symbol estimates can each include a plurality of second data bits. In each of the second symbol estimates, one bit can be constrained to be inverted relative to a corresponding one of the first data bits. A different bit can be constrained in each second symbol. The second symbol estimates can also be initialized to minimize disturbance, as described above.
The process 100 can also include running the plurality of MCMC simulations to stochastically-search for constrained minimum second distances. A constrained minimum second distance is found corresponding to each of the inverted second data bits. These minimum second distances correspond to estimates of the non-ML terms as described above. Log likelihood ratios corresponding to each of the transmitted data bits can be calculated 110 using the first distance and the constrained minimum second distances. For example, a difference between the first distance and each of the constrained minimum second distances can be obtained and scaled to form the log likelihood ratios. For example, the first distance can be subtracted from each of the constrained minimum second distances to form the log likelihood ratios.
Performance of the process has been simulated, and results in the form of bit error rate curves are shown in
The lower bound shown in a dotted line was obtained from a max-log maximum a posteriori probability obtained by performing an exhaustive search. By comparison, the upper most performance curve (solid line plus triangles) is obtained using 5 MCMC simulations, where four are initialized randomly and one is initialized using a zero forcing solution.
The curve labeled “MCMC CNTRL FLIP” (solid line plus stars) illustrates the performance of a process of decoding using bit flipping with minimized disturbance as described above. It can be seen this results in improved performance. For comparison, another curve labeled “MCMC CNTRL FLIP INIT with ML” (solid line plus open circles) shows where the ML terms are found exactly (using an exhaustive search) and then the DML obtained is used to initialize the bit flipped MCMC simulations.
Various ways of implementing the present techniques in a receiver can be used. For example, the necessary calculations can be implemented using adders, subtractors, lookup tables, and comparators, and thus may be implemented efficiently in digital hardware. For example, the techniques can be implemented in a field programmable gate array (FPGA) or application specific integrated circuit (ASIC).
For example,
A plurality of MCMC simulators 410 are coupled to the signal storage and stochastically search for corresponding ones of a plurality of second symbol estimates. The MCMC simulators are initialized with constrained second symbol estimates, for example, as described above. The MCMC simulators output second symbol estimates 412.
A log likelihood 414 calculator is coupled to the symbol estimator 406 and the plurality of MCMC simulators 410 and outputs log likelihood ratio estimates 416 corresponding to each of the plurality of transmitted data bits. The log likelihood ratio estimates can be obtained by subtracting distance of the first symbol estimate from distances of the second symbol estimates, for example as described above.
As another example, some or all of the above techniques may be implemented in software or firmware. For example,
The processor can execute instructions provided on computer readable media, such as on a memory 506, a removable memory, a magnetic hard disk, a removable magnetic disk, a magnetic cassette, an optical disk, or from a communication connection, which may also be viewed as a computer readable medium.
The memory 506 can include one or more computer readable media that can be configured to include or includes thereon data or instructions for manipulating data, and can be accessed by the computer device 502 through the bus 504. The memory can include, for example, ROM, used to permanently store information, and/or RAM, used to temporarily store information. ROM may include a basic input/output system (“BIOS”) having one or more routines that are used to establish communication, such as during start-up of the computer device 502. RAM may include one or more program modules, such as one or more operating systems, application programs, and/or program data.
The input/output interface 508 can provide for exchange of data between the computer device and other system components, including for example, analog to digital converters, other computer devices, hardware components, and the like.
Some embodiments of the invention can include a computer readable media having computer executable instructions stored thereon. The computer executable instructions can include data structures, objects, programs, routines, or other program modules that may be accessed by a processing system, such as one associated with a general-purpose computer capable of performing various different functions or one associated with a special-purpose computer capable of performing a limited number of functions. Computer executable instructions can cause the processing system to perform a particular function or group of functions and are examples of program code means for implementing steps for methods disclosed herein. Furthermore, a particular sequence of the executable instructions provides an example of corresponding acts that may be used to implement such steps. Examples of computer readable media include random-access memory (“RAM”), read-only memory (“ROM”), programmable read-only memory (“PROM”), erasable programmable read-only memory (“EPROM”), electrically erasable programmable read-only memory (“EEPROM”), compact disk read-only memory (“CD-ROM”), and other devices or components that are capable of providing data or executable instructions that may be accessed by a processing system. Memories can be implemented in various technologies, including without limitation static memory cells, dynamic memory cells, magnetic memory, optical memory, and similar technologies.
As yet another example, some embodiments of the present invention may include portions implemented in hardware and portions implemented in software. For example, some modules may be implemented in hardware and interface to other modules implemented in software. Individual modules may include a mixture of hardware and software.
Summarizing and reiterating to some extent, statistical search techniques for estimation of log likelihood ratios have been developed that can be applied to MIMO and CDMA communications systems. While MCMC simulations can run into difficulties at high signal to noise ratio, techniques for initializing the simulations using bit flipping with minimized disturbance can help to avoid these difficulties. The estimated log likelihood ratios can be used, for example, in forward error correction decoding. It has been shown that performance (e.g., simulated bit error rates) can be improved relative to alternate MCMC techniques.
It is to be understood that the above-referenced arrangements are illustrative of the application for the principles of the present invention. It will be apparent to those of ordinary skill in the art that numerous modifications can be made without departing from the principles and concepts of the invention as set forth in the claims.
The present application is a continuation in part of co-pending U.S. patent application Ser. No. 11/593,899 filed Nov. 6, 2006 and entitled “Multi-Channel Communication Method and Apparatus using Plural Markov Chain Monte Carlo Simulations” which claims the benefit of U.S. Provisional Patent Application Ser. No. 60/734,665 filed Nov. 7, 2005 of the same title. The present application is also a continuation in part of co-pending U.S. patent application Ser. No. 11/177,938 filed Jul. 7, 2005, entitled “Detector and Method for Estimating Data Probability in a Multi-Channel Receiver” which claims the benefit of U.S. Provisional Patent Application Ser. No. 60/586,360 filed Jul. 7, 2004 entitled “Detector and Method for Estimating User Data Probability in a Multi-Channel Receiver” The disclosure of each of the above applications is incorporated by reference herein for all purposes.
Number | Name | Date | Kind |
---|---|---|---|
6064703 | Cusani et al. | May 2000 | A |
6725025 | Schmidl et al. | Apr 2004 | B1 |
7076000 | Rodriguez | Jul 2006 | B2 |
20020110206 | Becker et al. | Aug 2002 | A1 |
20040010399 | Kadane et al. | Jan 2004 | A1 |
20040014445 | Godsill et al. | Jan 2004 | A1 |
20040022336 | Yu et al. | Feb 2004 | A1 |
20040161059 | Andrieu | Aug 2004 | A1 |
20040174939 | Wang | Sep 2004 | A1 |
20050105682 | Heumann et al. | May 2005 | A1 |
20060023636 | Farhang-Boroujeny et al. | Feb 2006 | A1 |
20070076669 | Boroujeny et al. | Apr 2007 | A1 |
20070116143 | Bjerke et al. | May 2007 | A1 |
20080019468 | Ammer et al. | Jan 2008 | A1 |
20080225974 | Prasad et al. | Sep 2008 | A1 |
Number | Date | Country |
---|---|---|
WO 2008063183 | Nov 2008 | WO |
Number | Date | Country | |
---|---|---|---|
20080273632 A1 | Nov 2008 | US |
Number | Date | Country | |
---|---|---|---|
60734665 | Nov 2005 | US | |
60586360 | Jul 2004 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 11593899 | Nov 2006 | US |
Child | 12172771 | US | |
Parent | 12172771 | US | |
Child | 12172771 | US | |
Parent | 11177938 | Jul 2005 | US |
Child | 12172771 | US |