The present application claims the benefit of Korean Patent Application No. 10-2008-0044665, filed May 14, 2008, the contents of which are hereby incorporated herein by reference in their entirety.
The present invention relates to preceding techniques and, more particularly, a preceding technique based on an iterative tree search capable of efficiently eliminating interference between multiple users from a multi-user multi-input multi-output downlink channel.
Typically, a broadcast channel refers to transmitting information from a base station having a plurality of antennas to all multiple users within one cell.
Here, each user owns a terminal having a single antenna. In this environment, the users cannot cooperate with each other, and thus it is difficult to eliminate interference between the users.
For this reason, many studies have recently been made of precoding techniques capable of eliminating interference between users in advance on the assumption that a base station can use channel information of all users.
Among these techniques, Sphere Encoding (SE) algorithm based on Vector Perturbation (VP) technique capable of driving optimal performance has been proposed.
Here, the SE algorithm exerts maximum performance, but it has high complexity and distribution, which serve as great obstacle factors on designing a system.
Generally, since the broadcast channel transmits signals to all the users who cannot cooperate with each other through a plurality of transmission antennas, there is a demand for a technique capable of efficiently eliminate the interference between the users in advance at a transmitting end.
First, a signal “y” transmitted from a base station 1 to multiple users at the same time is transmitted to receiving ends, i.e., user terminals 2, after previous elimination of the interference between the users and power normalization.
This signal can be expressed by Equation 1:
where H is the Rayleigh flat-fading channel matrix, n is the Gaussian noise vector, P is the precoding matrix for eliminating the interference between the users, s is the symbol vector of data to be transmitted, and γ is the normalized transmission power.
Among the techniques proposed to overcome this interference, the simplest technique is linear technique that includes channel inversion technique based on Zero-Forcing (ZF) technique, regularized channel inversion technique based on Minimum-Mean Square Error (MMSE) technique, and so forth.
The linear technique distorts a signal simply using an inverse matrix of the channel matrix “H” as the preceding matrix, and then transmits the distorted signal.
However, as well known through a linear detection technique of Multi-Input Multi-Output (MIMO) receiver, when an eigenvalue of the channel matrix is small, an eigenvalue of its inverse matrix increases.
This phenomenon increases the normalized transmission power “γ.”
Accordingly, Signal-to-Noise Ratio (SNR) of the receiving end is lowered to degrade performance.
In order to prevent this power loss, Tomlinson-Harashima Precoding (THP) is proposed which restores to original information by expanding an existing constellation to infinity to select a point corresponding to low power loss and by using a modulo technique at the receiving end, i.e., the user terminal.
This THP technique considerably improves performance compared to the existing linear technique, but it still does not obtain the optimal performance.
Afterwards, Vector Perturbation (VP) is proposed which derives optimal performance by adding a distortion value that expands the constellation to infinity on the basis of the THP technique and minimizes the transmission power.
This technique can be divided into a ZF-VP based on the ZF, and MMSE-VP based on the MMSE rather than minimum transmission power, wherein it is known that the latter shows better performance than the former.
Further, Lattice Reduction (LR) technique is introduced that can improve performance through channel orthogonalization on the assumption that a channel environment gradually varies.
Among these techniques, the linear techniques have low complexity and difficulty in obtaining the maximum performance, the non-linear techniques have maximum diversity gain of the system, and improvement in performance. In the case of the SE algorithm, the complexity is increased due to search for a maximum approximation lattice point in an infinite lattice space, and shows a characteristic that it is irregular depending on a channel environment. In other words, the SE algorithm has a characteristic that a search frequency varies depending upon a channel state, and encounters the following problems due to a long delay time when the channel state is bad.
In the event of downlink, the channel of which the transmitting end, i.e., the base station, is aware obtains information through feedback of the terminal. In this case, as the delay time increases, an error in channel information increases due to time variation of the channel.
Further, irregularity of the delay time makes it difficult to correct the error in channel information or to use, for instance, a buffer.
To address the above-discussed deficiencies of the prior art, it is a primary object to reconfigure an iterative tree search technique applied to signal detection at the receiver of an existing multi-antenna communication system so as to be suitable for a preceding technique capable of previously eliminating interference between users by applying the iterative tree search technique to a transmitting end.
Exemplary embodiments are also directed to limit a search candidate domain according to the state of a channel, calculate a reference value, and prevent expansion to a node having a value greater than this reference value in addition to the technique of the receiver, thereby improving complexity.
Exemplary embodiments are also directed to grafting a precoding technique onto the iterative tree search technique of a receiver, thereby accomplishing nearly maximum performance and low complexity that are advantageous to establishment of a real system. According to an aspect of the present invention, there is provided an iterative tree search-based preceding device for a multi-user MIMO communication system. The iterative tree search-based preceding device includes at least one receipt terminal; and a base station transmitting a pilot signal to the receipt terminal, previously eliminating interference with respect to a signal to be transmitted to the receipt terminal using information about a channel state provided from the receipt terminal, performing power normalization on the signal, and transmitting the signal, which is distorted by a distortion value to be used for modulo operation at the receipt terminal, to the receipt terminal.
According to another aspect of the present invention, there is provided an iterative tree search-based preceding method for a multi-user MIMO communication system. The iterative tree search-based preceding method includes transmitting, by a base station, a pilot signal to at least one receipt terminal, previously eliminating interference with respect to a signal to be transmitted to the receipt terminal using information about a channel state provided from the receipt terminal, and performing power normalization on the signal; and transmitting, by the base station, the signal, which is distorted by a distortion value to be used for modulo operation at the receipt terminal, to the receipt terminal.
According to exemplary embodiments, the iterative tree search-based precoding device and method for a multi-user MIMO communication system have a low complexity and an excellent performance compared to an existing SE technique.
Further, the iterative tree search-based preceding device and method limit an overall search range. Thereby, as illustrated in
Further, as illustrated in
Before undertaking the DETAILED DESCRIPTION OF THE INVENTION below, it may be advantageous to set forth definitions of certain words and phrases used throughout this patent document: the terms “include” and “comprise,” as well as derivatives thereof, mean inclusion without limitation; the term “or,” is inclusive, meaning and/or; the phrases “associated with” and “associated therewith,” as well as derivatives thereof, may mean to include, be included within, interconnect with, contain, be contained within, connect to or with, couple to or with, be communicable with, cooperate with, interleave, juxtapose, be proximate to, be bound to or with, have, have a property of, or the like; and the term “controller” means any device, system or part thereof that controls at least one operation, such a device may be implemented in hardware, firmware or software, or some combination of at least two of the same. It should be noted that the functionality associated with any particular controller may be centralized or distributed, whether locally or remotely. Definitions for certain words and phrases are provided throughout this patent document, those of ordinary skill in the art should understand that in many, if not most instances, such definitions apply to prior, as well as future uses of such defined words and phrases.
For a more complete understanding of the present disclosure and its advantages, reference is now made to the following description taken in conjunction with the accompanying drawings, in which like reference numerals represent like parts:
An iterative tree search-based precoding device and method for a multi-user MIMO communication system according to exemplary embodiments of the invention will be described below in detail with reference to the accompanying drawings. Further, the term “user terminal” as used herein shall be construed to include a mobile station, a receipt terminal, a personal digital assistant, or the like.
First, the present invention is based on Minimum—MMSE VP technique.
Therefore, upon considering the multi-user multi-antenna downlink channel, signals that are transmitted from the base station 1 to the multiple users and at the same time eliminate interference between the users in advance through the preceding device 10, are subjected to power normalization and transmitted to the user terminals 2.
This can be expressed by Equation 1 above and reproduced below.
In Equation 1, H denotes the Rayleigh flat-fading channel matrix, n denotes the Gaussian noise vector, P denotes the preceding matrix for eliminating the interference between the users, s denotes the symbol vector of data to be transmitted, and γ denotes the normalized transmission power.
The preceding device 10 employs VP technique that adds a distortion value to a modulated symbol so as to be able to minimize the normalization factor “γ.”
The VP technique has to be transformed into an integer system because it searches for an integer lattice, and thus, transforms all complex systems into integer systems.
Thus, the preceding device 10 adds the distortion value “τt′” to an original signal so as to have a minimum normalization factor “γ”. This process is given by Equation 2:
where γ is the normalized transmission power, P is the preceding matrix for eliminating the interference between the users, s is the symbol vector of data to be transmitted, and τt′ is the distortion value.
The signal transmitted from the base station 1, the transmitting end, through this process can restore a value “s” of original data as in Equation 9 by eliminating the distortion value “τt′” through modulo operation by the same value “τ” at the user terminal 2.
The VP technique adds the intended distortion value by shifting a constellation so much at the transmitting end because it is assumed that the receiving end employs the modulo operation.
However, Zero-Forcing (ZF)-VP in which the precoding matrix “P” is expressed into an inverse matrix of the channel matrix “H” is subjected to reduction in Signal-to-Interference and Noise Ratio (SINR) of the receiving end that is responsible for degradation of performance.
Thus, the SINR of the receiving end is increased by applying MMSE-VP technique considering noise and interference as in Equation 3:
P=HH(HHH+αI)−1 [Eqn. 3]
where P denotes the precoding matrix for eliminating the interference between the users, and H denote the Rayleigh flat-fading channel matrix.
The preceding device 10 divides channel response into an eigenvalue and an eigenvector through Singular Value Decomposition (SVD) according to Optimum MMSE-VP technology, and can search for a vector “t” that can minimize noise and interference power and maximize the SINR of the receiving end using these eigenvalues. For example, the preceding device minimizes total MSE rather than transmission power. Finally, a cost function is given by Equation 4:
where Λ denotes the channel matrix, H denotes the diagonal matrix with the eigenvalues, Q denotes the matrix with the eigenvectors according to the eigenvalues. These matrices can be obtained through SVD (i.e., HHH=QΛQH).
It is important to determine the distortion value “τt′” so as to have MMSE. This determines an optimum value of the vector “t” through SE so as to detect a maximum approximation lattice point in an integer lattice space.
The present invention includes a tree structure as illustrated in
The reference value setup section 100 determines a reference value of a cumulative branch metric of a candidate symbol. In detail, the reference value setup section 100 determines a value, which is smaller than a square ∥{tilde over (y)}∥2 the transmitted signal using a characteristic of the VP method, as the reference value of the cumulative branch metric of the candidate symbol.
Meanwhile, the metric processing section 300 performs QR decomposition the vector “t” expressed by Equation 4 in order to form a tree structure, to limit coverage of the candidate symbol, and to represent a type used in the receiving end for smooth operation of the algorithm, and its result is given by Equation 5:
The branch metric of the candidate symbol satisfying Equation 5 can be expressed by Equation 6. In Equation 5, the QR decomposition is performed on −τ√{square root over (Ω)}QH in order to make the form of a triangular matrix for a smooth tree search, and thus {tilde over (Q)}{tilde over (R)} is obtained. The, both sides are multiplied by {tilde over (Q)}H is a unitary matrix, so that the remaining portions can be expressed by {tilde over (Q)}H√{square root over (Ω)}QHs−{tilde over (R)}{tilde over (t)}′, which is briefly expressed by {tilde over (y)}={tilde over (Q)}H√{square root over (Ω)}QHs for convenience of expression.
where {circumflex over (t)} the infinite integer lattice.
The branch metric of the candidate symbol generally has the integer lattice “{circumflex over (t)}”. However, in this embodiment, the branch metric of the candidate symbol is limited to the integer lattice, i.e., the coverage of the candidate symbol, as illustrated in
As described above, in order to limit the integer lattice, the coverage setup section 200 determines the coverage of the candidate symbol so as to be fitted to the channel state. Here, the coverage setup section 200 determines the coverage of the candidate symbol on the basis of the condition number of a channel satisfying Equation 7:
where λ is the singular value of the channel matrix.
For example, as illustrated in
The coverage setup section 200 employs Cumulative Distribution Function (CDF) of the condition number of the channel in order to partition the coverage of the candidate symbol according to the channel state. The cumulative distribution function is expressed by Equation 8, and is as illustrated in
In detail, the coverage setup section 200 determines the maximum coverage of the candidate symbol, selects one within a range from “1” to a value of the maximum coverage of the candidate symbol, and adjusts the coverage of the candidate symbol by equally partitioning the coverage of the candidate symbol using the maximum coverage of the candidate symbol in determining the coverage of the candidate symbol.
Further, the metric processing section 300 eliminates candidates having the cumulative branch metric values, which exceed a reference value of the cumulative branch metric of the determined candidate symbol, and registers candidate values of the cumulative branch metric, which do not exceed a reference value of the cumulative branch metric of the determined candidate symbol, as entries.
The metric processing section 300 determines whether or not the value of the cumulative branch metric of the candidate symbol is greater than the reference value of the cumulative branch metric of the symbol of a preset candidate when the candidate symbol is expanded first. As a result, when the value of the cumulative branch metric of an arbitrary candidate symbol is greater than the reference value of the cumulative branch metric of the symbol of the preset candidate, the metric processing section 300 eliminates a path connected to the next candidate regardless of the next candidate. In contrast, when the value of the cumulative branch metric of an arbitrary candidate symbol is smaller than the reference value of the cumulative branch metric of the symbol of the preset candidate, the metric processing section 300 determines whether or not the next candidate symbol exists. When no next candidate symbol exists, the metric processing section 300 registers the value of the cumulative branch metric of the corresponding candidate symbol as an entry.
Further, when the next candidate symbol exists, the metric processing section 300 determines whether or not the next candidate symbol exceeds the coverage of the candidate symbol. As a result, when no next candidate symbol exceeds the coverage of the candidate symbol, the metric processing section 300 determines whether or not the value of the cumulative branch metric of the next candidate symbol is greater than the reference value of the cumulative branch metric of the symbol of the preset candidate. As a result, when the value of the cumulative branch metric of the next candidate symbol is greater than the reference value of the cumulative branch metric of the symbol of the preset candidate, the metric processing section 300 eliminates a path connected to the next candidate regardless of the next candidate.
When the next candidate symbol exceeds the coverage of the candidate symbol, the metric processing section 300 registers the value of the cumulative branch metric of the corresponding candidate symbol as an entry regardless of the next candidate.
Further, when the value of the cumulative branch metric of an arbitrary candidate symbol is smaller than the reference value of the cumulative branch metric of the symbol of the preset candidate, the metric processing section 300 determines whether or not the next candidate symbol exists. When the next candidate symbol exists, the metric processing section 300 proceeds to the process of determining whether or not the value of the cumulative branch metric of an arbitrary candidate symbol is greater than the reference value of the cumulative branch metric of the symbol of the preset candidate. In contrast, when no other next candidate symbol exists, the metric processing section 300 registers the value of the cumulative branch metric of the corresponding candidate symbol as an entry.
Then, the metric selecting section 400 selects the least value of the cumulative branch metric of the candidate symbol from the values of the cumulative branch metric of the candidate symbol which are registered as the entries.
General functions and detailed operations of the aforementioned components will not be described. Instead, the inventive operations will be described.
First, the description will be made in consideration of the multi-user multi-antenna downlink channel as illustrated in
The signal “y” transmitted from the base station 1 to the multiple users that at the same time eliminate interference between the users in advance through the preceding device 10, are subjected to power normalization and transmitted to the user terminals 2.
This signal can be expressed by Equation 1 above and reproduced below.
where H is the Rayleigh flat-fading channel matrix, n is the Gaussian noise vector, P is the preceding matrix for eliminating the interference between the users, s is the symbol vector of data to be transmitted, and γ is the normalized transmission power.
In this embodiment, the VP technique, which transforms a complex system into an integer system in order to search for an integer lattice, is used to add a distortion value to a modulated symbol so as to be able to minimize the normalization factor “γ.”
Thus, in this embodiment, all the complex systems are transformed into the integer systems.
Afterwards, the distortion value “τt′” is added to an original signal so as to have a minimum normalization factor “γ”, and this process is given by Equation 2 above and reproduced below:
where γ is the normalized transmission power, P is the preceding matrix for eliminating the interference between the users, s is the symbol vector of data to be transmitted, and τt′ is the distortion value.
Meanwhile, the signal transmitted through this process can restore a value of original data through modulo operation by the same value “τ” at the user terminal 2, i.e., the receiving end.
However, the ZF-VP in which the precoding matrix “P” is expressed into the inverse matrix of the channel matrix “H” is subjected to reduction in SINR of the user terminal 2, i.e., the receiving end that is responsible for the degradation of performance.
Thus, the SINR of the receiving end can be increased by applying the MMSE-VP technique considering noise and interference as in Equation 3 above and reproduced below:
P=HH(HHH+αI)−1 [Eqn. 3]
According to Optimum MMSE-VP technology, the channel response is divided into an eigenvalue and an eigenvector through SVD, and it is possible to search for the vector “t” that can minimize noise and interference power and maximize the SINR of the receiving end using these eigenvalues.
The total MSE rather than the transmission power is minimized. Finally, the cost function is given by Equation 4 above and reproduced below:
where Λ denotes the channel matrix, H denotes the diagonal matrix with the eigenvalues, Q denotes the matrix with the eigenvectors according to the eigenvalues. These matrices can be obtained through SVD (i.e. HHH=QΛQH).
It is important to determine the distortion value “τt′” so as to have MMSE. This determines an optimum value of the vector “t” through SE so as to detect the maximum approximation lattice point in the integer lattice space.
Meanwhile, the metric processing section 300 performs the QR decomposition on the vector “t”, which can maximize the SINR of the receiving end and is expressed by Equation 4 by dividing the channel response into the eigenvalue and vector through SVD, and minimizing noise and interference power and using these eigenvalues, in order to form the tree structure, to limit the coverage of the candidate symbol, and to represent the type used in the receiving end for smooth operation of the algorithm, and its result is given by Equation 5 as above and reproduced below:
The branch metric of the candidate symbol satisfying Equation 5 can be expressed by Equation 6 below. In Equation 5, the QR decomposition is performed on −τ√{square root over (Ω)}QH in order to make the form of a triangular matrix for a smooth tree search, and thus {tilde over (Q)}{tilde over (R)} is obtained. Both sides are multiplied by {tilde over (Q)}H, which is a unitary matrix, so that the remaining portions can be expressed by {tilde over (Q)}H√{square root over (Ω)}QHs−{tilde over (R)}{tilde over (t)}′, which is briefly expressed by {tilde over (y)}={tilde over (Q)}H√{square root over (Ω)}QHs for convenience of expression.
where {circumflex over (t)} the infinite integer lattice.
In setting the reference value of the branch metric of this candidate symbol, as illustrated in
In detail, the reference value setup section 100 sets the value of a cumulative metric of a full-length sequence where a total length is NT (equal to the number of the transmitting antennas) to the reference value, Γref=∥√{square root over (Ω)}QHs∥2 of the cumulative branch metric of this candidate symbol.
Meanwhile, since the user terminal 2, the receiving end, has no reference, the algorithm starts by setting the reference value to infinity (Γref=∞). However, since the base station 1, the transmitting end, adds the distortion value in order to set a value becoming smaller than ∥√{square root over (Ω)}QHs∥2, the base station can set an initial reference. Thus, it is not necessary to expand a node greater than ∥√{square root over (Ω)}QHs∥2 at a first depth using this initial reference.
Further, the metric processing section 300 has the infinite integer lattice with respect to the integer latter “{circumflex over (t)}” of the branch metric of the candidate symbol. This infinite integer lattice is limited through the coverage setup section 200.
Continuously, the coverage setup section 200 determines the coverage of the candidate symbol on the basis of the condition number of the channel satisfying Equation 7:
where λ is the singular value of the channel matrix.
In other words, since the base station has a possibility of performing an unnecessary search, the base station searches for the channel according to the channel state. For example, the base station searches for the channel having small candidates with respect to the channel having a good state, whereas base station searches for the channel having many candidates with respect to the channel having a bad state.
Further, the coverage setup section 200 employs the CDF of the condition number of the channel in order to partition the coverage of the candidate symbol according to the channel state. The CDF is expressed by Equation 8 as follows:
The coverage setup section 200 employs a method of partitioning the coverage of the candidate symbol with the same ratio in order to find a critical value on the basis of the CDF given by Equation 8.
For example, in the case of the system meeting NT=4, and K=4, when the maximum coverage of the candidate symbol is limited to 3, the coverage can be partitioned into three equal parts, and the resulting critical values are 33% and 66% respectively, and are set to Pr(CH≦7.63)=0.33 and Pr(Ch≦12.55)=0.66. Thus, in order to perform the search, when the condition number of the current channel is smaller than 7.63, the coverage of the candidate symbol is set to “1.” When the condition number of the current channel is greater than 12.55, the coverage of the candidate symbol is set to “3.”
Accordingly, as described above, the reference value of the cumulative branch metric of the candidate symbol and the maximum coverage of the candidate symbol are set through the reference value setup section 100 and the coverage setup section 200, and then the metric processing section 300 determines whether or not the value of the cumulative branch metric of the candidate symbol is greater than the reference value of the cumulative branch metric of the symbol of the preset candidate when the candidate symbol is expanded first. In other words, Early Termination Technique (ETT) for improving the complexity is used to perform the tree searching process.
With reference to
As shown in
When the value of the cumulative branch metric of the arbitrary candidate symbol is greater than a reference value of a cumulative branch metric of a preset candidate symbol, the metric processing section 300 prunes or eliminates a path connected to a next candidate irrespective whether or not the next candidate is present.
In contrast, when the value of the cumulative branch metric of the arbitrary candidate symbol is smaller than a reference value of a cumulative branch metric of a preset candidate symbol, the metric processing section 300 determines whether or not a symbol of the next candidate is present. Specifically, it is determined whether or not the next candidate is present when a first node has the values of the cumulative branch metric 2.72, 8.25, and 9.12, which are smaller than the cumulative branch metric reference value 9.88 of the candidate symbol.
When the symbol of the next candidate is not present, the metric processing section 300 registers the value of the cumulative branch metric of the candidate symbol as an entry. That is, when the next candidate is not present, a node having the values of the cumulative branch metric 8.25 and 9.25 is registered as an entry.
Conversely, when the symbol of the next candidate is present, the metric processing section 300 determines whether or not the symbol of the next candidate exceeds the coverage of the candidate symbol 3.
When the symbol of the next candidate 2 does not exceed the coverage of the candidate symbol, the metric processing section 300 determines whether or not the value of the cumulative branch metric of the next candidate symbol is greater than the reference value of value of the cumulative branch metric of the preset candidate symbol. In the case where the next candidate is present, a node having a metric value 2.72 is not registered as an entry, and the process is expanded to the next candidate.
Here, when the value of the cumulative branch metric of the next candidate is greater than the reference value of the cumulative branch metric of the preset candidate symbol, the metric processing section 300 eliminates a path connected to the next candidate irrespective whether or not the next candidate is present.
The values of the cumulative branch metric of the next candidate symbol can be acquired by adding the value of the cumulative branch metric 2.72 of the first node with the values of the cumulative branch metric 10.49, 8.29, and 12.49 of the second node.
The values of the cumulative branch metric of the second node symbol are then determined to be 13.21, 10.01, and 15.21, which are greater than the reference value of the cumulative branch metric of the preset candidate symbol. Therefore, the corresponding node is eliminated.
When the value of the cumulative branch metric of the next candidate symbol exceeds the coverage of the candidate symbol, the metric processing section 300 registers the value of the cumulative branch metric of the corresponding candidate symbol as an entry irrespective whether or not the next candidate is present. In the case of registration, the value of the cumulative branch metric of the corresponding candidate symbol is required to be smaller than the reference value of the cumulative branch metric of the candidate symbol.
Conversely, when the value of the cumulative branch metric of the next candidate symbol is smaller than the reference value of the cumulative branch metric of the preset candidate symbol, the metric processing section 300 determines whether or not the next candidate symbol is present.
When the next candidate symbol is present, the metric processing section 300 proceeds to the process of determining whether or not the value of the cumulative branch metric of an arbitrary candidate symbol is greater than the reference value of the cumulative branch metric of the symbol of the preset candidate.
When the next candidate symbol is not present, the metric processing section 300 registers the values of the cumulative branch metric of the corresponding symbol as entries.
Thus, the values of the cumulative branch metric of the candidate symbol registered as entries are 8.25 and 9.12.
Thereafter, the metric selecting section 400 selects smallest one 8.25 of the values of the cumulative branch metric of the candidate symbol registered as entries.
As shown in
First expansion is carried out on candidate symbols, which are arranged in the order, as shown in
Then, as shown in
The first full-length sequence searched as above can be assumed to have a cumulative branch metric Γ1. When the cumulative branch metric Γ1 is smaller than the initially-determined value Γref, update is executed. The initially-determined value Γref is a reference value for determining whether or not to repeat the process.
By comparing this value with the branch metric value bN
This is because it is impossible to exclude a probability that the full-length sequence found in the second repetition might have a value of the cumulative branch metric smaller than that of the full-length sequence found in the first branch.
In the case of Γ1<bN
In this case, an extended search algorithm of the corresponding node is terminated as shown in
Below, with reference to
First, a reference value of a cumulative branch metric of a candidate symbol is determined (in step S1). Below, with reference to
Equation 4 representing vector t is formed in a tree structure, wherein vector t can divide a channel response into unique value and vector through conventional Singular Value Decomposition (SVD), and then minimize noise and interference power as well as maximizing reception SINR using the divided values, and the metric processing section 300 performs QR decomposition in order to transform Equation 4 expressing the vector “t” into a tree structure, to limit coverage of the candidate symbol, and to represent a type used in the receiving end for smooth operation of the algorithm (in step S11). The result is given by Equation 5 below:
The branch metric of the candidate symbol satisfying Equation 5 above is expressed as in Equation 6 below (S12). In Equation 5, the QR decomposition is performed on −τ√{square root over (Ω)}QH in order to make the form of a triangular matrix for a smooth tree search, and thus {tilde over (Q)}{tilde over (R)} is obtained. Then, both sides are multiplied by {tilde over (Q)}H, which is a unitary matrix, so that the remaining portions can be expressed by {tilde over (Q)}H√{square root over (Ω)}QHs−{tilde over (R)}{tilde over (t)}′, which is briefly expressed by {tilde over (y)}={tilde over (Q)}H√{square root over (Ω)}QHs for convenience of expression.
where {circumflex over (t)} is the infinite integer lattice.
In order to determine the coverage of the candidate symbol so as to be fitted to the channel condition, the coverage of the candidate symbol is determined on the basis of the condition number of a channel satisfying Equation 7:
where λ is a singular value of a channel matrix.
The Cumulative Distribution Function (CDF) of the condition number of the channel for partitioning the coverage of the candidate symbol according to the channel condition is expressed by Equation 8:
Accordingly, the step of determining the coverage of the candidate symbol so as to be fitted to the channel condition determines the maximum coverage of the candidate symbol, and selects one within a range from “1” to a value of the maximum coverage of the candidate symbol.
The coverage of the candidate symbol is adjusted by equally portioning it using the maximum coverage of the candidate symbol.
Subsequently, candidate values of the cumulative branch metric, which exceed a reference value of the cumulative branch metric of the determined candidate symbol, are eliminated and candidate values of the cumulative branch metric, which do not exceed a reference value of the cumulative branch metric of the determined candidate symbol, are registered as entries (in step S2).
Below, with reference to
Firstly, it is determined whether or not a value of a cumulative branch metric of an arbitrary candidate symbol is greater than the reference value of the cumulative branch metric of the preset candidate symbol when the candidate symbol is expanded first (in step S201).
As a result of the step S201 of determining whether or not a value of a cumulative branch metric of an arbitrary candidate symbol is greater than the reference value of the cumulative branch metric of the preset candidate symbol, when the value of the cumulative branch metric of the arbitrary candidate symbol is greater than the reference value of the cumulative branch metric of the preset candidate symbol (e.g., YES), a path connected to the next candidate is eliminated regardless whether or not the next candidate symbol is present (in step S202).
In contrast, as a result of the step S201 of determining whether or not a value of a cumulative branch metric of an arbitrary candidate symbol is greater than the reference value of the cumulative branch metric of the preset candidate symbol, when the value of the cumulative branch metric of the arbitrary candidate symbol is not greater than the reference value of the cumulative branch metric of the preset candidate symbol (e.g., NO), it is determined whether or not the next candidate symbol is present (in step S203).
As a result of the step S203 of determining whether or not the next candidate symbol is present, when the next candidate symbol is not present (e.g., NO), the value of the cumulative branch metric of the corresponding symbol is registered as an entry (S204).
In contrast, as a result of the step S203 of determining whether or not the next candidate symbol is present, when the next candidate symbol is present (e.g., YES), it is determined whether or not the next candidate symbol exceeds the coverage of the candidate symbol (S205).
As a result of the step S205 of determining whether or not the next candidate symbol exceeds the coverage of the candidate symbol, when the next candidate symbol does not exceed the coverage of the candidate symbol (e.g., NO), it is determined whether or not the value of the cumulative branch metric of the next candidate symbol is greater than the reference value of the cumulative branch metric of the preset candidate symbol (S206).
As a result of the step S206 of determining whether or not the value of the cumulative branch metric of the next candidate symbol is greater than the reference value of the cumulative branch metric of the preset candidate symbol, when the value of the cumulative branch metric of the next candidate symbol is greater than the reference value of the cumulative branch metric of the preset candidate symbol (YES), a path connected to the next candidate is eliminated regardless whether or not the next candidate symbol is present (S207).
In contrast, as a result of the step S205 of determining whether or not the next candidate symbol exceeds the coverage of the candidate symbol, when the next candidate symbol exceeds the coverage of the candidate symbol (e.g., YES), the value of the cumulative branch metric of the corresponding candidate symbol is registered as an entry regardless whether or not the next candidate symbol is present (in step S208).
Conversely, a result of the step S206 of determining whether or not the value of the cumulative branch metric of the next candidate symbol is greater than the reference value of the cumulative branch metric of the preset candidate symbol, when the value of the cumulative branch metric of the next candidate symbol is greater than the reference value of the cumulative branch metric of the preset candidate symbol (e.g., NO), it is determined whether or not the next candidate symbol is present (in step S209).
As a result of the step S209 of determining whether or not the next candidate symbol is present, when the next candidate symbol is present (e.g., YES), the process returns to the step S206 of determining whether or not the value of the cumulative branch metric of the next candidate symbol is greater than the reference value of the cumulative branch metric of the preset candidate symbol. Conversely, when the next candidate symbol is not present (e.g., NO), the value of the cumulative branch metric of the corresponding candidate symbol is registered as an entry (in step S210).
Next, least one of the values of the cumulative branch metric of the candidate symbol, which are registered as entries, is selected (in step S3).
Although the present disclosure has been described with an exemplary embodiment, various changes and modifications may be suggested to one skilled in the art. It is intended that the present disclosure encompass such changes and modifications as fall within the scope of the appended claims.
Number | Date | Country | Kind |
---|---|---|---|
10-2008-0044665 | May 2008 | KR | national |
Number | Name | Date | Kind |
---|---|---|---|
5388124 | Laroia et al. | Feb 1995 | A |
7580445 | Wang et al. | Aug 2009 | B2 |
8130862 | Forenza et al. | Mar 2012 | B2 |
20080247489 | Kou et al. | Oct 2008 | A1 |
20090122854 | Zhu et al. | May 2009 | A1 |
Entry |
---|
B.M. Hochwald, et al.: “A Vector-Perturbation Technique for Near—Capacity Multiantenna Multiuser Communication—Part II: Perturbation”, IEEE Transactions on Communications, vol. 53, No. 3, pp. 537-544, Mar. 2005. |
C.B. Peel, et al.: “A Vector-Perturbation Technique for Near-Capacity Multiantenna Multiuser Communication—Part I: Channel Inversion and Regularization”, IEEE Transactions on Communications, vol. 53, No. 1, pp. 195-202, Jan. 2005. |
Eun Yong Kim, et al.: “Optimum Vector Perturbation Minimizing Total MSE in Multiuser MIMO Downlink”, in proc. International Conference Communications (ICC) 2006, pp. 4242-4247, Jun. 2006. |
A. Edeman: “Eigenvalues and Condition Numbers of Random Matrices”, Ph.D. thesis, Massachusetts Institute of Technology, 1989, pp. 1-98. |
Korean Publication No. 10-2009-0020767, entitled “Low-Complexity Apparatus and Method for Detecting Signal Based on UITS in MIMO System”, published Feb. 27, 2009 18 pages. |
A. Edelman: “On the Distribution of a Scaled Condition Number”, Math. Comp. 58 (1992) 185.190, Department of Mathematics, University of California, pp. 1-10. |
H. Artés, et al.: “Efficient Detection Algorithms for MIMO Channels: A Geometrical Approach to Approximate ML Detection”, IEEE Transactions on Signal Processing, vol. 51 pp. 2808-2820 Nov. 2003. |
J. Cha, et al: “Low-Complexity Iterative QRD-M Detection Algorithm for V-BLAST Systems,” Electronics Letters, vol. 43, Issue 24, Nov. 2007. |
Number | Date | Country | |
---|---|---|---|
20090286494 A1 | Nov 2009 | US |