Method and apparatus for detecting a desired signal in the presence of an interfering signal

Information

  • Patent Grant
  • 9025708
  • Patent Number
    9,025,708
  • Date Filed
    Tuesday, July 15, 2014
    10 years ago
  • Date Issued
    Tuesday, May 5, 2015
    9 years ago
Abstract
In accordance with an embodiment, there is provided a method comprising receiving, at a receiver, a desired signal and an interfering signal, wherein the interfering signal was transmitted with a modulation unknown to the receiver; identifying a likely modulation corresponding to the modulation with which the interfering signal was transmitted; and decoding the desired signal using a modulation dependent multiple-input multiple output (MIMO) detection, wherein the modulation dependent MIMO detection is based at least in part on the identified likely modulation corresponding to the modulation with which the interfering signal was transmitted, wherein the modulation dependent MIMO detection includes maximum likelihood (ML) detection.
Description
TECHNICAL FIELD

This disclosure relates to multiple-input multiple-output (MIMO) systems, and more specifically, to receivers implemented in MIMO systems.


BACKGROUND

The background description provided herein is for the purpose of generally presenting the context of the disclosure. Work of the presently named inventors, to the extent it is described in this background section, as well as aspects of the description that may not otherwise qualify as prior art at the time of filing, are neither expressly nor impliedly admitted as prior art against the present disclosure.


In wireless communication systems, multiple-input and multiple-output (MIMO) refers to an use of multiple antennas at both a transmitter and a receiver to improve communication performance. MIMO technology has attracted attention in wireless communications, because MIMO offers significant increase in data throughput and link range without additional bandwidth or increased transmit power. MIMO achieves this by, for example, spreading the same total transmit power over the antennas to achieve an array gain that improves the spectral efficiency (e.g., more bits per second per hertz of bandwidth) or to achieve a diversity gain that improves a link reliability (e.g., reduced fading). Because of these properties, MIMO is an important part of various modern wireless communication systems.


SUMMARY

In accordance with an embodiment, there is provided a method comprising receiving, at a receiver, a desired signal and an interfering signal, wherein the interfering signal was transmitted with a modulation unknown to the receiver; identifying a likely modulation corresponding to the modulation with which the interfering signal was transmitted; and decoding the desired signal using a modulation dependent multiple-input multiple output (MIMO) detection, wherein the modulation dependent MIMO detection is based at least in part on the identified likely modulation corresponding to the modulation with which the interfering signal was transmitted, wherein the modulation dependent MIMO detection includes maximum likelihood (ML) detection.


There is also provided, in accordance with an embodiment, a system comprising one or more antennas configured to receive a desired signal and an interfering signal, wherein the interfering signal was transmitted with a modulation unknown to the system; and a data processing unit coupled to the one or more antennas, wherein the data processing unit is configured to (i) identify a likely modulation or the likelihood of a modulation corresponding to the modulation with which the interfering signal was transmitted, and (ii) decode the desired signal using a modulation dependent detection, wherein the modulation dependent detection is based at least in part on the identified likely modulation or the identified likelihood of the modulation corresponding to the modulation with which the interfering signal was transmitted, wherein the modulation dependent detection includes maximum likelihood (ML) detection.





BRIEF DESCRIPTION OF THE DRAWINGS

Embodiments of the present disclosure will be readily understood by the following detailed description in conjunction with the accompanying drawings. To facilitate this description, like reference numerals designate like elements.



FIG. 1 is a block diagram illustrating a communications system.



FIG. 2 is a flowchart illustrating a method of decoding a desired signal using maximum likelihood detection.



FIG. 3 is a block diagram illustrating a method of decoding a desired signal using interference cancelation.





DETAILED DESCRIPTION

Described herein are example systems, components, and methods that may be used in conjunction with MIMO (multiple-input/multiple-output) and/or MU-MIMO (multi-user MIMO) techniques. The following description merely provides examples and is in no way intended to limit the disclosure, its application, or uses.


A MIMO receiver (also referred to herein more generally as a “receiver”) typically receives a signal that carries a plurality of effective data signals, only some of which is intended for the receiver. The effective data signal intended for the receiver, referred to herein as the desired signal, may be decoded using a corresponding channel transfer matrix, also referred to as a channel matrix. Other effective data signals, referred to as interfering signals, are associated with different channel matrices. In some cases, the channel matrices of interfering signals may be known or may be estimated.


The effective signals described above may be transmitted using different modulations. Available modulations may include, for example, various implementations of quadrature amplitude modulation (QAM), quadrature phase shift keying (QPSK), and others. In some situations, the modulations used by interfering signals may not be known to a receiver. This may be the case, for example, when interfering signals are the result of multi-user MIMO or co-channel interference.


This disclosure is directed to mitigating interference in an MIMO environment in which a receiver is able to identify presence of interfering signals and their corresponding channel matrices, but in which the modulations of the interfering signals are not known to the receiver.



FIG. 1 illustrates an example multiple-user multiple-input/multiple-output (MU-MIMO) communication system 100. Three mobile devices (e.g., mobile devices that communicate data by way of radio transmissions) U1, U2, and U3 are interfacing with the system 100. The system 100 includes two base stations (e.g., cellular telephone transmitter/receivers towers) BS1 and BS2. An approximate boundary for each base station's range, referred to as the base station's “cell”, is shown as a circle surrounding the base station. While the systems and methods herein will be described in the context of a multiuser MIMO environment, the systems and method may be used in any communication system in which a signal detection technique accounts for the potential existence of a number of interfering communication channels.


Base station BS1 communicates with the mobile device U1 by way of an effective signal, which is defined or characterized by a channel matrix h1,1. BS1 also communicates with the mobile device U2 by way of effective signal defined or characterized by a channel matrix h2,2. The signal being transmitted to U2 may interfere with the signal being transmitted to U1. This intra-cell interfering signal travels along an effective channel characterized by a channel matrix h1,2 to U1.


Because many modern wireless communication systems have adjacent cells transmitting in the same frequency bands, mobile devices are also subject to inter-cell interference. The base station BS2 exchanges signals with the mobile device U3 by way of an effective channel characterized by the channel matrix h3,3. This signal also interferes with the signal being transmitted by BS1 to U1.


The following discussion focuses on operations performed at a receiver that receives multiple signals, each of which is characterized by a different channel matrix hi, where the suffix i is an index corresponding to an individual signal and channel matrix. Thus, if a receiver receives two effective signals x1 and x2, those effective signals may be characterized by channel matrices h1 and h2, respectively. While the following discussion focuses on the two data streams, the teachings of this disclosure applies to systems that can handle a larger number of data streams.


One embodiment of a wireless signal processing unit 102 is shown in FIG. 1. The wireless signal processing unit 102 is part of the mobile device U1. The wireless signal processing unit 102 includes a MIMO transmitter/receiver radio 104. The radio 104 includes four antennas 106 that are configured to receive a signal r containing multiple effective signals x. The radio 104 provides the signal r to a baseband processor 108. The baseband processor 108 combines performing signal detection and/or filtering based on information about the channels of the received signal to estimate a desired signal meant for the particular mobile device U1.


The signal processing unit 102 from FIG. 1 may be implemented on a chip including one or more integrated circuits configured to perform one or more of the functions described herein. The signal processing unit 102 may be implemented in a computing device, for example, a computer, a laptop, a server, a cell phone, a hand held computing device, or other type of device that uses memory. The baseband processor 108 may be part of the same device as the signal processing unit 102 or may be external to the apparatus. The signal processing unit 102 may be configured by way of instructions stored in associated computer-readable media, which are executable by the processing unit 102 to perform the computations, calculations, and/or operations described below.


The general characteristics of MIMO transmission, assuming a number of users K, may be characterized as follows:







r


(
i
)


=




H


(
i
)




x


(
i
)



+

n


(
i
)



=





H
1



(
i
)





x
1



(
i
)



+




k
=
2

K





H
k



(
i
)





x
k



(
i
)




+


n


(
i
)







1



i

L






r: NR×1 received vector






H
:


N
R

×




k
=
1

K



N

T
,
k









effective MIMO channel, where H=[H1 . . . HK]






x
:




k
=
1

K




N

T
,
k


×
1







transmitted vector


x1: transmitted signal for the desired user of modulation M(1)


xk: transmitted signal for the interferer of modulation M(k), k=2 . . . K


n: white noise at receiver, such that E(nnH)=σ2I


NR: number of receiver antennas


NT,k: number of transmit antennas (number of spatial streams) of each user


i: a transmission instance out of total L transmissions, such as an index of subcarriers.


For ease of explanation, the following discussion will assume two rank-1 users, resulting in the following simplification of Equation 1:

r(i)=H(i)x(i)+n(i)=h1(i)x1(i)+h2(i)x2(i)+n(i)1≦i≦L  Equation 2

    • H: NR×2 effective MIMO channel, where H=[h1 h2]
    • x: 2×1 transmitted vector
    • x1: transmitted signal for the desired user of modulation M(1)
    • x2: transmitted signal for the interferer of modulation M(2), M(2)εΨ


The channel or channel matrix associated with the desired signal x1 is represented as h1. The channel or channel matrix associated with the interfering signal x2 is represented as h2.


It is assumed in the following discussion that the existence of the interfering signal is known, and that the channel matrix h2 of the interfering channel has been obtained from advanced channel estimation techniques. For example, the channel matrix h2 may be calculated as the orthogonal RS sequence of transmission mode 8 of the “Long Term Evolution” (LTE) Rel. 9 specification.


It is further assumed that the modulation M(2) of the interfering signal x2 is chosen from a finite set ψ of possible modulations, and that the composition of this set is known by the receiver. For example, if the receiver knows the wireless system from which the interference comes from, the receiver may also know a set of all possible modulations for the interference. However, the particular modulation M(2) being used by the interfering signal x2 is not known at the receiver.


The interfering effective signal may be associated with a co-scheduled MU-MIMO channel, or may be associated with a co-channel in a neighboring system (e.g., a neighboring cell for a cellular system, or a nearby access point for a WiFi system).


Generally, an MMSE receiver can be applied to detect a received signal x1, without knowledge of the modulation of an interfering signal x2, as follows:

{tilde over (x)}1=[HH(HHH2I)−1](1,:)r=h1H(HHH2I)−1rcustom character{circumflex over (x)}1=Q({tilde over (x)}1;M(1))  Equation 3


The MMSE receiver of Equation 3 works regardless of the modulation used in the interfering signal, and is a conventional solution for interference mitigation. In Equation 3, Q(.;M) is a slicer based on the modulation M, as an example for decision. In some embodiments, a hard slicer is replaced by a soft decision (e.g., a bit-wise log-likelihood-ratio, or LLR) calculator taking the MMSE receiver output {tilde over (x)}1 as input.


In cases where the modulation M(2) of an interfering signal is known, a modulation-dependent receiver may outperform a modulation independent receiver such as the MMSE receiver, in which the interference is treated as Gaussian noise. For example, ML detection as an example of modulation-dependent receiver can be applied as follows:











x
^

1

=



arg





min




x
1



Ω

(

M

(
1
)


)



,


x
2



Ω

(

M

(
2
)


)










r
-


h
1



x
1


-


h
2



x
2





2






Equation





4








Equation 4 shows an example of hard decision using ML cretirion. A soft decision (such as bit-wise LLR) can also be used in some embodiments following ML cretirion. Other examples of modulation dependent receiver include decision-feedback equalizer, interference cancellation, and/or the like. In some of the embodiments discussed herein later, ML detection is used as an example.


However, the modulation M(2) of the interfering effective signal x2 is often unknown. Described below are various methods, techniques, and enhancements for performing ML detection even in situations where the modulation M(2) of the interfering signal is unknown.



FIG. 2 illustrates an example of decoding a desired signal x1 associated with a receiver channel h1, in the presence an interfering signal x2 associated with an interfering channel h2. Although the example shows a single interfering signal, the described techniques may be used in a similar fashion to decode the desired signal x1 in the presence of multiple interfering channels.


An action 202 comprises receiving the desired signal x1 and the interfering signal x2. The signals may be generated by different transmitters or base stations, and/or from different antennas of a single transmitter or base station. The modulation of the interfering signal x2 is unknown to the receiver.


An action 204 comprises identifying a likely modulation of the interfering signal x2. This may be performed in a number of different ways, as will be described below. In certain embodiments, the action 204 may comprise estimating, calculating, or otherwise determining a modulation {circumflex over (M)}(2) that is assumed to be used by the interfering channel h2.


The action 204 may be generally characterized by the following equation:

{circumflex over (M)}(2)=ƒ(h1,h2,r,M(1)2)  Equation 5


An action 206 comprises applying maximum likelihood (ML) detection, based at least in part on the assumed modulation {circumflex over (M)}(2), in order to obtain the desired signal x1. An example of ML detection to determine a hard estimate of x1 is generally characterized by the following equation:











x
^

1

=



arg











min




x
1



Ω

(

M

(
1
)


)



,


x
2



Ω

(

M

(
2
)


)










r
-


h
1



x
1


-


h
2



x
2





2






Equation





6








where Ω is the set of possible or available modulations that may have been used by the desired signal and the interfering signal. A bit-wise soft decision can also be determined in some embodiments in a similar fashion with the assumed modulation {circumflex over (M)}(2). In the following discussion and as an example, hard decision is used without excluding the application of the techniques to soft decision.


The actions 204 and 206 may in some cases be combined, using calculations that jointly determine both the desired signal x1 and the assumed modulation {circumflex over (M)}(2) as follows:

{{circumflex over (x)}1,{circumflex over (M)}(2)}=G(h1,h2,r,M(1)2)  Equation 7


The calculations of Equations 5, 6, and 7 are implemented to minimize a cost function over all possible modulations:











M
^


(
2
)


=


min


M

(
2
)



Ψ





f

M

(
2
)





(


h
1

,


h
2


r

,

M

(
1
)


,

σ
2


)







Equation





8








Joint ML Sequence and Modulation Detection


An example of applying Equation 7 is that the actions 204 and 206 may be performed jointly, by evaluating the a-posteriori probabilities of the different available modulations of the set ψ in combination with the decoded desired signal x1. Evaluation of a-posteriori probabilities may be performed in several different ways, as indicated along the right side of FIG. 2, under the heading “Joint”.


Log-MAP


A method referred to herein as “Log-MAP” may be used to maximize the a-posteriori probability of the desired signal x1 and the assumed modulation {circumflex over (M)}(2) of the interfering signal x2, given the signal r, as follows:










{





x
^

1



(
1
)




















x





^


1



(
L
)


,


M
^


(
2
)



}

=

arg







max


M

(
2
)



Ψ




P


(




x
1



(
1
)















x
1



(
L
)



,


M

(
2
)


|
r


)








Equation





9








Where L is the number of signals in the sequence.


Eq. 9 may be implemented, in an embodiment, as follows:










{





x
^

1



(
1
)





















x





^


1



(
L
)



,


M
^


(
2
)



}

=



arg











max



M

(
2
)


,

x
1

,

x
2






(

1

M

(
2
)



)

L






l
=
1

L







(




m
=
1


M

(
1
)








n
=
1


M

(
2
)





exp


(

-






r


(
i
)


-



h
1



(
i
)




x
1

(
m
)



-



h
2



(
i
)




x
2

(
n
)






2


σ
2



)




)







Equation





10







Equation 10 assumes that any residual noise is Gaussian, and that each of the available modulations has an equal a-priori probability of being used by the interfering channel. Equation 10 finds the a-posteriori probabilities of all possible modulations, and then selects the modulation having the highest a-posteriori probability.


In some situations, certain modulations are more likely to be used than others. In these situations, Eq. 9 may be implemented as follows, to account for the differing a-priori probabilities of each modulation:










{





x
^

1



(
1
)





















x

^

1



(
L
)



,


M
^


(
2
)



}

=



arg











max



M

(
2
)


,

x
1

,

x
2





P


(

M

(
2
)


)





(

1

M

(
2
)



)

L






l
=
1

L







(




m
=
1


M

(
1
)








n
=
1


M

(
2
)





exp


(

-






r


(
i
)


-



h
1



(
i
)




x
1

(
m
)



-



h
2



(
i
)




x
2

(
n
)






2


σ
2



)




)







Equation





11








In the following discussion and as an example, the equal a-priori probabilities of each modulation is used without excluding the scenarios of unequal a-priori probabilities of each modulation.


Sum-Max-Log-MAP


The Log-MAP method of maximizing the a-posteriori probability of the desired signal x1 and the modulation {circumflex over (M)}(2) of the interfering channel may be refined using a method referred to herein as “Sum-Max-Log-MAP”. Specifically, equations 10 and 11 can be implemented in a less complex fashion by approximating the sum of the a-posteriori probabilities, where a core part of Equations 10 and 11 is replaced by a simplification. In particular, the term







1

M

(
2
)








m
=
1


M

(
1
)








n
=
1


M

(
2
)





exp


(

-






r


(
i
)


-



h
1



(
i
)




x
1

(
m
)



-



h
2



(
i
)




x
2

(
m
)






2


σ
2



)









of Equations 10 and 11 may be replaced by the following expression:










1

M

(
2
)




exp






(

-


min










r


(
i
)


-



h
1



(
i
)




x
1

(
m
)



-



h
2



(
i
)




x
2

(
n
)






2



σ
2



)





Equation





12








The Approximation Leads to Little Performance Loss, for Example, when Signal to Noise Ratio (SNR) is Relatively High.


For example, when the probability of each M2 is equal, the desired signal x1 and the modulations {circumflex over (M)}(2) of the interfering signal x2 are then obtained by comparing the average minimum distance per modulation with an offset:










{





x
^

1



(
1
)





















x





^


1



(
L
)



,


M
^


(
2
)



}

=




arg





max



M

(
2
)


,

x
1

,

x
2






(

1

M

(
2
)



)

L



exp
(





-




l
=
1

L




min






r


(
i
)


-



h
1



(
i
)




x
1

(
m
)



-



h
2



(
i
)




x
2

(
n
)






2



σ
2




)


=

arg






min
(







1
L






l
=
1

L




min






r


(
i
)


-



h
1



(
i
)




x
1

(
m
)



-



h
2



(
i
)




x
2

(
n
)






2



σ
2




+

log


(

M

(
2
)


)



)







Equation





13








Mean-Max-Log-MAP


Alternatively, for example, when the SNR is relatively low, Equations 10 and 11 can be implemented using a method referred to herein as “Mean-Max-Log-MAP”, which comprises approximating the mean probability by the maximum probability. Specifically, the term







1

M

(
2
)








m
=
1


M

(
1
)








n
=
1


M

(
2
)





exp


(

-






r


(
i
)


-



h
1



(
i
)




x
1

(
m
)



-



h
2



(
i
)




x
2

(
n
)






2


σ
2



)









of Equations 10 and 11 is replaced by the following expression:









exp






(

-


min










r


(
i
)


-



h
1



(
i
)




x
1

(
m
)



-



h
2



(
i
)




x
2

(
n
)






2



σ
2



)





Equation





14







For example, when the probability of each M2 is equal, the desired signal x1 and modulation {circumflex over (M)}(2) of the interfering signal are then obtained as follows:










{





x
^

1



(
1
)
















x
^

1



(
L
)



,


M
^


(
2
)



}

=



arg











max



M

(
2
)


,

x
1

,

x
2





(


1
L






i
=
1

L




min






r


(
i
)


-



h
1



(
i
)




x
1

(
m
)



-



h
2



(
i
)




x
2

(
m
)






2



σ
2




)






Equation





15








Max-Log-MAP-Scale


In cases where it is difficult or impractical to make a decision regarding SNR, the Equations 10 and/or 11 may be implemented as follows, independently of SNR values:










{





x
^

1



(
1
)





















x





^


1



(
L
)



,


M
^


(
2
)



}

=




arg





max



M

(
2
)


,

x
1

,

x
2






(

1

M

(
2
)



)

L






l
=
1

L







(



1
+

α


(

H
,

M

(
1
)


,

M

(
2
)


,

σ
2


)




M

(
2
)



·

exp


(

-


min






r


(
i
)


-



h
1



(
i
)




x
1

(
m
)



-



h
2



(
i
)




x
2

(
n
)






2



σ
2



)



)



=




arg





max



M

(
2
)


,

x
1

,

x
2









1
L






l
=
1

L



(



min






r


(
i
)


-



h
1



(
i
)




x
1

(
m
)



-



h
2



(
i
)




x
2

(
n
)






2



σ
2


-

log


(

1
+

α


(

H
,

M

(
1
)


,

M

(
2
)


,

σ
2


)



)



)



+

log


(

M

(
2
)


)








Equation





16







In Equation 16, the term

1+α(H,M(1),M(2),σ)/M(2)

is a scaling factor that is used to scale the subsequent exponential term of Equation 16. The scaling factor can be approximated and stored as a lookup table to lessen the complexity of calculating Equation 16. The desired signal x1 and the modulation {circumflex over (M)}(2) of the interfering channel x2 may be calculated in this scenario as follows:










{





x
^

1



(
1
)
















x
^

1



(
L
)



,


M
^


(
2
)



}

=




arg





max



M

(
2
)


,

x
1

,

x
2





1
L






i
=
1

L



(


min






r


(
i
)


-



h
1



(
i
)




x
1

(
m
)



-



h
2



(
i
)




x
2

(
m
)






2



σ
2


)



+

I


(


r
;

x
1


,


x
2

|

M

(
1
)



,

M

(
2
)


,
H

)







Equation





17








Log-MAP-Best-K


As yet another example, a balance between accuracy and complexity may be obtained when calculating Equations 10 and 11 using a method referred to herein as “log-MAP-Best-K”, which comprises computing only the largest K terms in the sum of conditional probabilities, as follows:










{





x
^

1



(
1
)
















x
^

1



(
L
)



,


M
^


(
2
)



}





arg











max



M

(
2
)


,

x
1

,

x
2





1

M

(
2
)








k
=
1


K


(

M

(
2
)


)






exp


(

-






r


(
i
)


-



h
1



(
i
)




x
1

(

k
,
m

)



-



h
2



(
i
)




x
2

(

k
,
n

)






2


σ
2



)




s
.
t
.





r


(
i
)


-



h
1



(
i
)




x
1

(

1
,
m

)



-



h
2



(
i
)




x
2

(

1
,
n

)






2











r


(
i
)


-



h
1



(
i
)




x
1

(

2
,
m

)



-



h
2



(
i
)




x
2

(

2
,
n

)






2













r


(
i
)


-



h
1



(
i
)




x
1

(



M

(
1
)




M

(
2
)



,
m

)



-



h
2



(
i
)




x
2

(



M

(
1
)




M

(
2
)



,
n

)






2





Equation





18








The depth of this calculation may be dependent on one or more factors including modulation, SNR, and/or the like, and may be adjusted in the real-time.


Sequential Modulation and Sequence Detection


In certain embodiments, the assumed modulation M(2) may be initially determined, and may then be used as the basis for decoding the desired signal x1. This is referred to herein as sequential modulation and sequence detection. The assumed modulation M(2) may be calculated or estimated in various ways, as indicated on the left side of FIG. 2 under the heading “Sequential”.


The techniques for joint ML sequence and modulation detection mentioned above can also be implemented in the fashion of sequential modulation and sequence detection discussed hereafter. For example, the modulation of M2 can be detected by maximizing the a-posteriori probability of the desired signal x1 and the assumed modulation {circumflex over (M)}(2) of the interfering signal x2, given the signal r, as follows:











M
^

2

=



arg





max



M
2


ψ








P


(




x
1



(
1
)















x
1



(
L
)



,


M
2


r


)







Equation





19








And then the determined M2 is used for a ML detection of the desired sequence. That is,








x
^

1

=



arg





min




x
1



Ω

(

M
1

)



,


x
2



Ω

(


M
^

2

)










r
-


h
1



x
1


-


h
2



x
2





2







The equations [9] to [18] can be similarly implemented in the sequential fashion. Additionally, some specific examples for sequential modulation and sequence detection are discussed as follows.


Fixed Modulation


As an example of sequentially determining M(2) and x1, the action 204 may be performed by arbitrarily or randomly assuming a modulation {circumflex over (M)}(2) of the interfering signal. In this case, {circumflex over (M)}(2)=K, where K is an arbitrarily assumed modulation belonging to the known set ψ of available modulations. The desired signal x1 may be calculated in the action 206 by performing ML detection based on this assumption of a fixed modulation for the interfering signal, as follows:











x
^

1

=



arg





min




x
1



Ω

(

M

(
1
)


)



,


x
2



Ω

(
K
)










r
-


h
1



x
1


-


h
2



x
2





2






Equation





20







As another example of sequentially determining M(2) and x1, the action 204 may be performed by assuming the superposition of all possible modulations of the interfering signal. Thus, assuming that the known set ψ of modulations comprises, for example, QPSK, QAM16, and QAM64 modulations, the action 206 of calculating the desired signal x1 can be calculated by performing ML detection as follows:











x
^

1

=



arg





min




x
1



Ω

(

M
1

)



;


x
2




Ω

(
QPSK
)




Ω

(

QAM





16

)




Ω

(

QAM





64

)











r
-


h
1



x
1


-


h
2



x
2





2






Equation





21








Linear Receiver with Modulation Detection


Sequential determination of M(2) and x1 may also be performed by implementing a linear receiver for the interfering signal x2, to detect the modulation {circumflex over (M)}(2) of x2. The action 204 may be performed by a linear receiver using MMSE, zero-forcing (ZF), maximal ratio combining (MRC), and/or other types of linear detection schemes. In an embodiment, an MMSE receiver may implemented as follows:












x
~

2

=



C
linear



r
MMSE


=


α








h
2
H



(


HH
H

+


σ
2


I


)



-
1



r

=


x
2

+
z











σ
s
2

=


E


[



z


2

]


=

1

SINR
MMSE








Equation





22







Based on Equation 22, a modulation detector may be implemented to determine an assumed modulation {circumflex over (M)}(2) of the interfering signal x2 as follows:











M
^


(
2
)


=




arg





min








M

(
2
)



Ψ




J


(





x
~

2



(
1
)
















x
~

2



(
L
)



,

M

(
2
)


,

σ
z
2


)







Equation





23








The optimization function J(.) can be derived from the counterpart equations [9] to [18]. The analogy between the optimization functions is that h1 and x1 equal to 0, and h2 equal to 1, also r equal to {tilde over (x)}2. In other word, the relationship between the transmitted and received signals in Equation [1] and [2] is reduced to a single user case, where the received signals are the output of the linear receiver {tilde over (x)}2 and the transmitted signal x2 travels through an AWGN channel in absence of x1. By applying the principle of modulation detection, or a-posteriori probability determination in Equation [9] to [18] for the new input-output relationship, the modulation of x2 may be determined accordingly. For example, the log-MAP style function is as follows:








M
^

2

=



arg





max



M
2


ψ









(

1

M

(
2
)



)

L






i
=
1

L







(




n
=
1


M

(
2
)





exp


(

-








x
~

2



(
i
)


-

x
2

(
n
)





2


σ
z
2



)



)








The technique of sum-max-log-MAP, mean-max-log-MAP, max-log-MAP-scale, log-MAP-best-K can be applied similarly.


After determining the assumed modulation of the interfering signal in this manner, the desired signal x1 may be calculated in the action 206 by using ML detection as follows:











x
^

1

=



arg





min




x
1



Ω

(

M

(
1
)


)



,


x
2



Ω

(


M
.


(
2
)


)










r
-


h
1



x
1


-


h
2



x
2





2






Equation





24








LLR-Based Modulation Detection


The modulation of the interfering signal may also be determined or estimated in the action 204 based on a soft decision or log-likelihood ratio (LLR) of each bit at the output of a receiver, as follows:










LLR
k

=

log






(


P


(



b
1



(
k
)


=

1
|
r


)



P


(



b
1



(
k
)


=

0
|
r


)



)






Equation





25







Instead of examining the probability of each symbol in a transmitted sequence, this technique evaluates the probability of each coded bit:










LLR
k

(

M

(
2
)


)


=

log


(


P


(




b
1



(
k
)


=

1

r


,

M

(
2
)



)



P


(




b
1



(
k
)


=

0

r


,

M

(
2
)



)



)






Equation





26








M
^


(
2
)


=



arg





max



M

(
2
)



Ψ




J


(


LLR
k

,

M

(
2
)



)















For example, the following metric can represent the probability of a correctly decoded bit sequence:










J


(

M

(
2
)


)


=




k
=
1


L









1

1
+

exp


(

-



LLR
k

(

M

(
2
)


)





)









Equation





27







Alternatively, an approximate and simpler solution is as follows:










J


(

M

(
2
)


)


=




k
=
1


L







LLR
k

(

M

(
2
)


)









Equation





28








Joint Decoding and Modulation Detection


In cases where signals x comprise coded symbols, modulation detection and decoding can be performed jointly or concurrently to determine the most probable modulation {circumflex over (M)}(2) of the interfering signal x2. For example, multiple ML detection may be performed in parallel or in sequence, based on all possible M(2) modulations. The resulting outputs may then be fed to channel decoders to produce decoded sequences. Assuming that the symbols of the sequences have error encoding, such as cyclical redundancy check (CRC) encoding, the decoded sequences may be examined to determine whether they exhibit errors. The output sequence exhibiting the lowest error rate or the highest accuracy may then be selected, and the modulation M resulting in that output sequence may be assumed to be the modulation M(2) of the interfering signal.


When CRC is not available, other approaches may be used to select the output sequence that is most likely to be correctly decoded. For example, the mean of the absolute information bit LLR may be used to determine whether an output stream has been correctly decoded.


After determining M(2) in this manner, ML detection may be applied in the action 206 to determine the desired signal x1 based on the determined modulation M(2) of the interfering signal.


Hard Decision Distribution Metric


In an embodiment, the constellation distribution of hard decisions in an MMSE receiver, applied to the interfering channel x2, may be evaluated to determine the likely validity of the previously described decisions regarding M(2). For example, the hard decisions regarding the interfering channel x2 may be evaluated to determine whether they exhibit expected constellation distributions for the assumed modulation {circumflex over (M)}(2).


For example, a hard slicer may be applied at the output of a linear receiver such as an MMSE receiver, as follows:

{tilde over (x)}2=Qh2H(HHH2I)−1r;M(2))  Equation 29


A typical transmitted signal uniformly occupies the constellation. If the hard deicision at the output of hard slicer shows a non-uniform distribution in the assumed constellation, the likelyhood of this assumed modulation, P(M(2)), may decrease, or this assumption may become invalid.


For example, for M(2)>4, the numbers of hard decisions in different subsets of the constellation of the assumed modulation {circumflex over (M)}(2) are calculated, and these numbers are compared to expected distributions within the assumed modulation {circumflex over (M)}(2). As an example, the constellation of the assumed modulation {circumflex over (M)}(2) may be partitioned into two subsets, and the following ratio may be calculated:










ρ

(

M
2

)


=




{




x
^

2



(
i
)


:



x
^

2



(

i


Ω
1



Ω

(

M

(
2
)





)



}






{




x
^

2



(
i
)


:



x
^

2



(

i


Ω
2



Ω

(

M

(
2
)


)



)



}








Equation





30







In Equation 30, subset 1 (Ω1) includes constellation points of the assumed modulation {circumflex over (M)}(2) that are relatively likely if the assumed modulation is actually used by the interfering signal x2. Subset 2 (Ω2) includes the points that relatively likely if the estimated modulation {circumflex over (M)}(2) is not used by the interfering signal x2.


The ratio of Equation 30 can be compared to a threshold to determine whether the observed distribution is incorrectly biased relative to the expected distribution of the assumed modulation {circumflex over (M)}(2) as follows:

ρ(M2)threshold  Equation 30A


The decision based on Equation 30A may be used to qualify or refine decisions regarding {circumflex over (M)}(2) made using the Joint ML Sequence and Modulation Detection or sequential modulation and sequence detection schemes discussed above.


Subsampled Sequences


In the various techniques and methods described above, the interfering channel x2 may be subsampled in order to reduce the number of calculations involved in any given technique. For example, r may be sampled once in every 100 symbols over a received sequence of 10000 symbols, in situations in which the modulation is anticipated to remain constant over at least 10000 symbols.


More particularly, the subsampling may be performed as follows:











Equation





31









M
^


(
2
)


=



arg





max



M

(
2
)


,

x
1

,

x
2






(

1

M

(
2
)



)

L






j
=
1


L





(




m
=
1


M

(
1
)








n
=
1


M

(
2
)





exp
(

-








r


(
i
)


-



h
1



(

i
j

)




x
1

(
m
)



-











h
2



(

i
j

)




x
2

(
n
)





2





σ
2



)



)








In addition to applying to log-MAP in Equation 31, subsampling can be applied to the technique of sum-max-log-MAP, mean-max-log-MAP, max-log-MAP-scale, log-MAP-bests-K similarly. Subsampling can be also be applied in combination with other techniques such as hard decision distribution metric discussed above, and adaptive ML/MMSE hereafter.


Adaptive ML/MMSE


In certain embodiments, the ML detection schemes described above may be used when they produce reliable or accurate results, and MMSE may be used in other situations, where noise dominates or the modulation detection is deemed to be unreliable. Various measures or metrics may be used to determine whether the ML modulation detection is or is likely to be reliable and/or accurate. For example, signal-to-noise ratio (SNR) and/or SINR (signal-to-interference/noise ratio) of the interfering channel x2 may be used as indicators of detection reliability.


As another example, the hard decision matrix metric described above, or any other observed quality metric, may be used in determining the actual accuracy or reliability of modulation detection. More specifically, the ratio of the minimum and maximum metrics may be evaluated and compared to a threshold to indicate the likely reliability of modulation detection, as follows:









θ
=




max


M

(
2
)



Ψ








J


(

M

(
2
)


)





min


M

(
2
)



Ψ








J


(

M

(
2
)


)






θ
0






Equation





32








Interference Cancellation without Modulation Knowledge


Typically, interference cancellation requires knowledge of the modulation of the interfering signal as well as coding information for the interfering signal. However, the following technique can be used in situations in which the modulation information of the interfering signal is not known at the receiver.



FIG. 3 shows an example signal flow, illustrating interference cancelation without knowledge of the modulation of the interfering signal. The signal r is received at block 302, which selects one of the available or possible modulations M(2) for x2. A MIMO receiver 304 is applied to the interfering signal x2 and used as the basis for calculating the a-posteriori probability of the selected M(2). The estimated probabilities for all available modulations are provided to a block 306 that calculations soft estimates of the interfering signal x2. These are subtracted from the incoming signal r, and the resulting signal is provided to a MIMO receiver 308 for x1, and a subsequent channel decoder 310 for x1. If coding information is available for the interfering signal x2, a channel decoder 312 may be used and its output provided to the soft estimation 306.


As an example of this process, assuming that coding information for the interfering signal x2 is not available, a linear MMSE receiver may be applied to equalize the MIMO channel as follows:

{tilde over (x)}2=αh2H(HHH2I)−1r=x2+z  Equation 33


Based on Equation 31, the probability of each available modulation may be calculated as follows:











Equation





34











P


(


M

(
2
)



r

)


=


c
·

P


(

r


M

(
2
)



)






c
1

·

exp


(



-

1
L







i
=
1

L









x
~

2

(

i
-



x
~

2



(
i
)





2




σ
z
2



(
i
)





-

log


(

M

(
2
)


)



)










=


exp


(



-

1
L







i
=
1

L










x
~

2



(
i
)


-



x
~

2



(
i
)





2



σ
z
2



(
i
)





-

log


(

M

(
2
)


)



)







M
2


Ψ




exp


(



-

1
L







i
=
1

L










x
~

2



(
i
)


-



x
~

2



(
i
)





2



σ
z
2



(
i
)





-

log


(

M

(
2
)


)



)











It is to be noted that the Sum-Max-Log-MAP, as described above, is used in Equation 34 to approximate probabilities. Other described methods, such as Log-MAP, Max-Log-MAP-Scale, and so forth can also be applied here.


It is to also be noted that FIG. 3 is an example in which the probability of modulation is calculated after a linear receiver is applied to detect the interfering signal in Equations 33 and 34. The a-posteriori probability of the modulation can also be calculated directly from the received signals, as in the previous examples of Equation 19. Other described methods, such as Log-MAP, Max-Log-MAP-Scale, Sum/Mean-Max-Log-MAP can also be applied here.


The soft estimation for each hypothesized modulation may then be calculated as follows:










E


[




x
2



(
i
)



r

,

M

(
2
)



]


=






x
2



Ω

(

M

(
2
)


)







x
2

·

P


(



x
2



r


(
i
)



,

M

(
2
)



)




=






x
2



Ω

(

M

(
2
)


)






(


x
2



exp


(

-








x
~

2



(
i
)


-


x
~

2




2



σ
z
2



(
i
)




)



)







x
2



Ω

(

M

(
2
)


)






exp


(

-








x
~

2



(
i
)


-


x
~

2




2



σ
z
2



(
i
)




)









Equation





35







Again, the different kinds of Log-MAP techniques described above can be applied to Equation 35 to lower computational complexities of determining the probability of every possible modulated symbol in each modulation.


The soft estimation is then calculated over all possible modulations, as follows:

{circumflex over (x)}2(i)=E[x2(i)|r]=ΣM(2)εΨE[x2|r,M(2)]P(M(2)|r)  Equation 36


Based on the soft estimation of Equation 36, the interference may be canceled from the interfering signal x2, and the desired signal x1 may be decoded as follows:

{tilde over (r)}(i)=r(i)−h2{circumflex over (x)}2(i)custom character{circumflex over (x)}1(i)  Equation 37


Both FIG. 2 and FIG. 3 involve determining a-posteriori probability of the modulation for the interfering signal. An example difference of the techniques of FIGS. 2 and 3 can be interpreted as a hard and soft detection of the modulation. The techniques in FIG. 2 and the associated variations, for example, make a hard decision on the modulation for the interfering signals based on a-posteriori probabilities and then rely on a modulation-dependent MIMO detection (e.g., ML detection) given the modulation of the interfering signals for interference suppression, or performance improvement. The techniques in FIG. 3 and the associated variations, for example, do not need to determine the modulation of the interfering signals. Instead, the expectation of the interfering signal, or a “soft” usage of the modulation of the interfering signals, is used for interference cancellation in FIG. 3.


A combination of hard and soft modulation detection is possible, where the modulation of the interfering signal is determined, and then a soft expectation of the interfering signals is cancelled from the received signal. This can be interpreted as another example of modulation dependent MIMO detection.


Another combination of soft and hard modulation detection is to find a hard estimate of modulated symbols in each modulation, and determine the expected interfering signals as the sum of each modulated symbols weighted by the probability of the modulation. This can be interpreted as the Sum-Max-Log-MAP technique for determining the probability of each modulated symbol given the modulation.


CONCLUSION

The discussion above assumes two rank-1 users for ease of description. However, the described techniques are not limited to the number of users or the ranks of the users. Rather, the described techniques can be extended to arbitrary numbers of users with arbitrary ranks, where the effective channels are available but the modulations of the channels are unknown at the receiver. For example, ML sequence and modulation detection with Sum-Max-Log-Map techniques may be performed with respect to multiple users in accordance with the following:











Equation





38








{





x
^

1



(
1
)
















x
^

1



(
L
)



,



M
^


(
2
)















M
^


(
K
)




}

=





arg





min




M

(
2
)










M

(
K
)



,


x
1









x
2










(



1
L






i
=
1

L







min





r


(
i
)


-



H
1



(
i
)





x
1

(

m
1

)




(
i
)



-



H
2



(
i
)





x
2

(

m
2

)




(
i
)























-


H
K



(
i
)






x
K

(

m
K

)




(
i
)





2

-



H
K



(
i
)





x
K

(

m
K

)




(
i
)






2





σ
2




+




k
=
2

K



log


(

M

(
k
)


)




)







In the case of more than 1 interfering signals, the detection of the modulation for each signal can be done jointly by solving equation 38, for example if Sum-Max-Log-MAP technique is applied. Alternatively (or additionally), the modulation of each signal can be successively detected, treating all the signals with modulations undetected as noise. Another alternative is to detect the modulation of each signal in parallel, treating all the rest signals with modulations as noise. Furthermore, the joint and successive/parallel modulation detection for more than 1 interfering signals can be applied at the same time, for example, by grouping interfering signals, and applying the joint or successive/parallel principle to each group, and then applying the joint or successive/parallel principle within each group.


The discussion above also assume the existence of the interfering signals has been identified. Alternatively, the existence of the interfering signals can be included in the modulation detection by assigning the non-existence of the interfering signals as a special modulation and included in the set of modulations ψ. If the modulation of “non-existence” has been identified as the most likely one, the receiver may deem that the interfering signals are not present.


Note that the description above incorporates use of the phrases “in an embodiment,” or “in various embodiments,” or the like, which may each refer to one or more of the same or different embodiments. Furthermore, the terms “comprising,” “including,” “having,” and the like, as used with respect to embodiments of the present disclosure, are synonymous.


As used herein, the terms “logic,” “component,” and “module” may refer to, be part of, or include an Application Specific Integrated Circuit (ASIC), an electronic circuit, a processor (shared, dedicated, or group) and/or memory (shared, dedicated, or group) that execute one or more software or firmware programs, a combinational logic circuit, and/or other suitable components that provide the described functionality. The logic and functionality described herein may be implemented by any such components.


In accordance with various embodiments, an article of manufacture may be provided that includes a storage medium having instructions stored thereon that, if executed, result in the operations described above. In an embodiment, the storage medium comprises some type of non-transitory memory (not shown). In accordance with various embodiments, the article of manufacture may be a computer-readable medium such as, for example, software or firmware.


Various operations may have been described as multiple discrete actions or operations in turn, in a manner that is most helpful in understanding the claimed subject matter. However, the order of description should not be construed as to imply that these operations are necessarily order dependent. In particular, these operations may not be performed in the order of presentation. Operations described may be performed in a different order than the described embodiment. Various additional operations may be performed and/or described operations may be omitted in additional embodiments.


Although certain embodiments have been illustrated and described herein, a wide variety of alternate and/or equivalent embodiments or implementations calculated to achieve the same purposes may be substituted for the embodiments illustrated and described without departing from the scope of the present disclosure. This application is intended to cover any adaptations or variations of the embodiments discussed herein. Therefore, it is manifestly intended that embodiments in accordance with the present disclosure be limited only by the claims and the equivalents thereof.

Claims
  • 1. A method, comprising: receiving, at a receiver, a plurality of signals, wherein the plurality of signals comprises (i) a desired signal and (ii) an interfering signal, and wherein the interfering signal is transmitted with a modulation that is unknown to the receiver;accessing, by the receiver, a plurality of modulations, wherein one of the plurality of modulations is likely used for transmitting the interfering signal;for each modulation of the plurality of modulations, generating a corresponding estimate of the interfering signal, wherein a plurality of estimates of the interfering signal is generated corresponding to the plurality of modulations;based on the plurality of estimates of the interfering signal, generating a first estimate of the interfering signal; andbased on the first estimate of the interfering signal, estimating the desired signal.
  • 2. The method of claim 1, further comprising: for each modulation of the plurality of modulations, generating a corresponding probability value that represents a probability of the corresponding modulation being used for transmitting the interference signal, wherein a plurality of probability values is generated corresponding to the plurality of modulations.
  • 3. The method of claim 2, wherein generating the first estimate of the interfering signal further comprises: based on (i) the plurality of estimates of the interfering signal and (ii) the plurality of probability values, generating the first estimate of the interfering signal.
  • 4. The method of claim 2, further comprising: based on (i) the plurality of probability values and (ii) the plurality of estimates of the interfering signal, determining a plurality of multiplication values, wherein each multiplication value of the plurality of multiplication values is a product of (i) a corresponding probability value of the plurality of probability values and (ii) a corresponding estimate of the interfering signal of the plurality of estimates of the interfering signal,wherein generating the first estimate of the interfering signal further comprises based on the plurality of multiplication values, generating the first estimate of the interfering signal.
  • 5. The method of claim 4, wherein generating the first estimate of the interfering signal further comprises: generating the first estimate of the interfering signal such that the first estimate of the interfering signal is a sum of each multiplication value of the plurality of multiplication values.
  • 6. The method of claim 1, wherein estimating the desired signal further comprises: based on subtracting a weighted value of the first estimate of the interfering signal from the plurality of signals received by the receiver, estimating the desired signal.
  • 7. The method of claim 6, further comprising: weighting the first estimate of the interfering signal by an interference channel matrix to generate the weighted value of the first estimate of the interfering signal.
  • 8. The method of claim 1, further comprising: based on estimating the desired signal, decoding the desired signal.
  • 9. The method of claim 1, wherein: the interfering signal is a first interfering signal;the plurality of signals comprises (i) the desired signal, (ii) the first interfering signal, and (iii) a second interfering signal;the first estimate of the interfering signal is a first estimate of the first interfering signal;the method further comprises generating a first estimate of the second interfering signal; andestimating the desired signal further comprises, based on (i) the first estimate of the first interfering signal and (ii) the first estimate of the second interfering signal, estimating the desired signal.
  • 10. The method of claim 1, wherein the receiver is a multi-input multi-output (MIMO) receiver.
  • 11. A system comprising: one or more antennas configured to receive a plurality of signals, wherein the plurality of signals comprises (i) a desired signal and (ii) an interfering signal, and wherein the interfering signal is transmitted with a modulation that is unknown to the receiver; anda data processing unit coupled to the one or more antennas, wherein the data processing unit is configured to access a plurality of modulations, wherein one of the plurality of modulations is likely used for transmitting the interfering signal,for each modulation of the plurality of modulations, generate a corresponding estimate of the interfering signal, wherein a plurality of estimates of the interfering signal is generated corresponding to the plurality of modulations,based on the plurality of estimates of the interfering signal, generate a first estimate of the interfering signal, andbased on the first estimate of the interfering signal, estimate the desired signal.
  • 12. The system of claim 11, wherein the data processing unit is further configured to: for each modulation of the plurality of modulations, generate a corresponding probability value that represents a probability of the corresponding modulation being used for transmitting the interference signal, wherein a plurality of probability values is generated corresponding to the plurality of modulations.
  • 13. The system of claim 12, wherein the data processing unit is further configured to generate the first estimate of the interfering signal by: based on (i) the plurality of estimates of the interfering signal and (ii) the plurality of probability values, generating the first estimate of the interfering signal.
  • 14. The system of claim 12, wherein the data processing unit is further configured to: based on (i) the plurality of probability values and (ii) the plurality of estimates of the interfering signal, determine a plurality of multiplication values, wherein each multiplication value of the plurality of multiplication values is a product of (i) a corresponding probability value of the plurality of probability values and (ii) a corresponding estimate of the interfering signal of the plurality of estimates of the interfering signal,wherein the data processing unit is further configured to generate the first estimate of the interfering signal by, based on the plurality of multiplication values, generating the first estimate of the interfering signal.
  • 15. The system of claim 14, wherein the data processing unit is further configured to generate the first estimate of the interfering signal by: generating the first estimate of the interfering signal such that the first estimate of the interfering signal is a sum of each multiplication value of the plurality of multiplication values.
  • 16. The system of claim 11, wherein the data processing unit is further configured to estimate the desired signal by: based on subtracting a weighted value of the first estimate of the interfering signal from the plurality of signals received by the receiver, estimating the desired signal.
  • 17. The system of claim 16, wherein the data processing unit is further configured to: weight the first estimate of the interfering signal by an interference channel matrix to generate the weighted value of the first estimate of the interfering signal.
  • 18. The system of claim 11, wherein the data processing unit is further configured to: based on estimating the desired signal, decode the desired signal.
  • 19. The system of claim 11, wherein: the interfering signal is a first interfering signal;the plurality of signals comprises (i) the desired signal, (ii) the first interfering signal, and (iii) a second interfering signal;the first estimate of the interfering signal is a first estimate of the first interfering signal; andthe data processing unit is further configured to generate a first estimate of the second interfering signal.
  • 20. The system of claim 11, wherein the data processing unit is further configured to estimate the desired signal by: based on (i) the first estimate of the first interfering signal and (ii) the first estimate of the second interfering signal, estimating the desired signal.
CROSS-REFERENCE TO RELATED APPLICATION

This disclosure is a continuation of and claims priority to U.S. patent application Ser. No. 13/659,709, filed Oct. 24, 2012, now U.S. Pat. No. 8,787,483, issued Jul. 22, 2014, which claims priority to U.S. Provisional Patent Application No. 61/551,339, filed Oct. 25, 2011, which are incorporated herein by reference.

US Referenced Citations (10)
Number Name Date Kind
20090016465 Ramesh Jan 2009 A1
20090279442 Rave Nov 2009 A1
20100118921 Abdelmonem et al. May 2010 A1
20110038328 Wang et al. Feb 2011 A1
20120082197 Jonsson et al. Apr 2012 A1
20130028305 Gollakota et al. Jan 2013 A1
20130286867 Davydov et al. Oct 2013 A1
20130301757 Dao et al. Nov 2013 A1
20140079107 Abdelmonem et al. Mar 2014 A1
20140160949 Clausen et al. Jun 2014 A1
Provisional Applications (1)
Number Date Country
61551339 Oct 2011 US
Continuations (1)
Number Date Country
Parent 13659709 Oct 2012 US
Child 14331557 US