The present invention relates to the field of decoding digital communications in overloaded channels.
Spatial modulation (SM) as a promising technique that can reduce the hardware complexity and the costs and massive multiple-input multiple-output (MIMO) wireless communication systems without sacrificing a bit error rate (BIR) spectrum efficiency (SE) performances. In particular, in SM schemes, information bits are embedded not only in the selection of transmit symbols (a.k.a consolation dimension), but also in the selection of the transmitted antennas utilized during transmission (a.k.a spatial dimension).
Through this approach, the vast stationary sources associated with massive MIMO systems can be efficiently utilized the fault requiring an equally large number of radiofrequency (RF) chain components. This efficient utilization of RF-chains makes SM schemes attractive for future wireless systems such as beyond fifth generation (B5G), which will continue to make extensive use of millimeter-wave (mmWave) bands, and sixth generation (6G) networks [6], which are expected to also incorporate Terahertz and visible light communications (VLC) bands.
A major drawback of early SM schemes is, however, that only one antenna is selected per transmission, which severely limits achievable SEs. In order to circumvent this limitation, a generalized spatial modulation (GSM) scheme was later developed, where multiple antennas are selected at each transmission, leading to substantial increase in SE. But another drawback of early SM methods including GSM schemes, was the exclusive focus on increasing SE without a matching effort to reduce BER, e.g., via the exploitation of transmit diversity. That limitation motivated the idea of combining SM with space-time coding (STC), examples of which are the space-time shift keying (STSK) schemes based on linear dispersion (LD) coding, the methods incorporating space-time block coding (STBC) and the spatial modulation with cyclic structure (CSM).
Based on this knowledge then it was proceeded for further optimize the SM transmitter design, leading to the discovery of quadrature spatial modulation (QSM) approaches in which the SM concept is independently applied to each of the real and imaginary components of the modulated signals, via dedicated spatial-temporal dispersion matrices. The idea was further developed in a succession of QSM techniques with progressively enhanced dispersion matrix designs, which include the diversity-achieving quadrature spatial modulation (DA-QSM) scheme by the incorporation of Alamouti codes, and the more recent enhanced diversity-achieving quadrature spatial modulation (EDA-QSM) method in which dispersion matrices are constructed using the full-diversity full-rate (FDFR) codes with block-by-block sphere-decodability of [24]. Among all aforementioned schemes, the EDA-QSM is the best QSM scheme known today, both in terms of BER and SE performance.
Despite these advantages, the EDA-QSM scheme, and as a consequence preceding QSM schemes, still have two major shortcomings. The first is that the dispersion matrices used in QSM schemes proposed so far are based on 2×2 STBCs, which limits both the diversity and coding gains achieved by the methods. With regards to that first limitation, we will in fact show in this article that QSM designs based on STBCs of a size T that does not scale with nT are fundamentally sub-optimal in the SE sense. The second shortcoming is that current QSM detection schemes are based either on exhaustive maximum likelihood (ML) or, at best, sphere detectors. Here, it is worth noting that it has actually been, contrary to previous claims, that sphere decoding has an average complexity that still grows exponentially with the number of jointly decoded symbol periods. That result was corroborated by some findings, where a cubic closed-form expression for the expected complexity of sphere detectors was derived, as well as, where it was shown that lattice-reduction does not improve the tail exponent of the complexity distribution of sphere detectors. With regards to that second limitation, it will be shown in this application that in fact the complexity of ML- and sphere detection (SD)-based QSM receivers are both geometric on nT and T, with P as exponent, such that these techniques are fundamentally non-scalable in the context of QSM systems. In other words, a severe and two-folded scalability challenge exists among current QSM schemes, namely, the absence of scalable transmitter and receiver designs.
Motivated by this challenge, in this application a new QSM solution that is both, at the transmitter side, scalable to arbitrary block sizes i.e., with no limits on nT, T and P, and, at the receiver side, decodable in polynomial time i.e., practical for large nT and T, with moderate P is contributed. As a bonus, which can be seen is that the proposed QSM scheme with every possibility to optimize SE, diversity and coding gains. To that end, we first introduce the optimal FDFR Golden STBC code of in the design of the QSM dispersion matrices. The Golden code is a fast-decodable STBC known to be optimal i.e., FDFR with highest coding gain over Gaussian constellations, and which was shown in to be constructible generally for arbitrary block sizes. The resulting optimized scalable QSM (OS-QSM) scheme is the first method proposed so far which has this feature.
The new OS-QSM design is further enhanced with a new algorithm to select the indices of the dispersion matrices employed in the scheme, which ensures that all transmit antennas are utilized as often and with the same likelihood over the transmission of multiple blocks, thus ensuring optimally diverse utilization of all spatial-temporal resources. Finally, in order to also ensure feasible decodability to the scalable transmitter design, a new greedy boxed iterative shrinkage thresholding algorithm (GB-ISTA) QSM detector based on sparse recovery methods is proposed.
Thanks to its sparse signal processing approach, the proposed decoding scheme does not require any restriction on the core code design, unlike preceding sphere-detection methods which requires block-diagonal fast-decodability. But in addition and most importantly, a major advantage of the new proposed GB-ISTA QSM receiver is that it does not require a search over the large codebook space, unlike the ML and state codewords matched block-by-block sphere decoding (SCMB-SD). In fact, the complexity order of the proposed receiver is shown to be cubic on T, quadratic on P, and only linear on nT.
All in all, the contributions of the article can be summarized as follows: • Spectral Efficiency-Optimality: A closed form expression for the optimum number of encoded symbols P required for a QSM to achieve SE optimality are given, which combined to the rate-optimality condition of STBCs, highlights the importance of systematic scalability of the STBC size T in the design of SE-optimal QSM schemes. • Optimal Diversity and Coding Gains: A new Golden code-based quadrature spatial modulation (GQSM) transmission scheme is obtained via the design of dispersion matrices based on the 2×2 Golden code, which is known to achieve optimal coding gain over integer symbol constellations. • Scalability of Transmitter: the new GQSM design is generalized via the extension of the 2×2 Golden code into its T×T FDFR STBC variation, yielding the OS-QSM scheme, which is applicable to arbitrary nT, T and P.
Complex matrices and vectors are denoted in bold-face uppercase and lowercase letters, with their elements denoted by indexed normal lowercase letters, as in X, x and xi, respectively. The real and the imaginary parts of a complex number x are respectively denoted by xR and xI, respectively, and for the sake of future convenience we define for a complex vector x=[x1, x2, . . . , xn]T the associated decoupled vector x[x1R, x1I, . . . , xnR, xnI]T and corresponding quadrature representation
The quadrature operator (·) will also be applied to m×n complex matrices X, for which it yields the corresponding 2m×2n matrix,
In turn, the complex conjugate, transpose, Hermitian, trace, vectorization, and the diagonalization operators are denoted by (·)*, (·)T, (·)H, tr (·), vec (·), and diag (·), respectively, while the n×n identity and the m×n-sized all-zero and all-one matrices are respectively denoted by In, 0m×n, and 1m×n. The p-norm with p≥0 is denoted by ∥·∥p, while |·| denotes either element-wise absolute value operation (for vectors) or cardinality (for sets), respectively, and the sets of real, complex, and integer numbers are denoted by , , and , respectively. Expectation is denoted as [·], the floor to the nearest power of 2 is represented by └·┘2×, the conversion operation of a left-most-significant binary vector to the corresponding base-10 integer is denoted by [·](10). The binomial coefficient is denoted by
and ⊗ denotes the Kronecker product. The projection of a scalar v onto the set χ is denoted by χ(v), and the complex Gaussian distribution with mean μ and variance σ2 is denoted by ˜(μ, σ2).
All the previous State of the Art spatial modulation (SM) schemes use ML such as in most spatial modulation (SM) or modified tree-search algorithms such as in the state of the art SM scheme of EDA-QSM to decode SM signals and no notable attempts on sparse detection or greedy approaches.
The tree-search algorithm is extremely unrealistic due to the highly combinatoric nature of the SM and the resulting search space size. Furthermore, the SM imposes various restrictions on the structure of the decoded signal such that naïve low-complexity decoding is impossible.
The problem associated with prior art is that there is no sparse detection solution for the problem. Solutions using other approaches features prohibitive complexity.
Massive multiple-input multiple-output (MIMO) systems in beyond-fifth generation (B5G) and sixth generation (6G) wireless communications expect incorporation of many transmit and receive antennas.
Utilization of Spatial Modulation (SM) and its variants such as quadrature spatial modulation (QSM) is one promizing candidate for massive MIMO systems. However, as the system size grows, the classic decoding complexity of the SM schemes becomes infeasible (i.e., complexity is not affordable) as the SotA uses maximum likelihood (ML) decoding or ML based tree-search algorithms.
Proposed method for detection is presented in a flowchart in
With the highlight of introducing four novel method concepts:
The proposed decoder possesses significantly low complexity compared to the existing ML and tree-search algorithms. The decoder possesses a quadratic complexity on the number of transmit antennas.
Furthermore, the proposed decoder also does not require design restrictions such as block-diagonality or orthogonality in the transmission scheme, only the sparsity which is inherent with spatial modulation schemes, therefore providing larger freedom in transmitter development as well. In other words, the proposed decoder is capable of coping with many different encoding structures (flexibility).
The decoder can be used in any MIMO system where the number of antennas is expected to be large, such that ML approaches are infeasible.
The scheme can be used to increase efficiency in cellular networks and V2X communications (eMBB).
These and other objects, features and advantages of the present invention will become clearer when the drawings as well as the detailed description are taken into consideration.
One embodiments of the computer-implemented decoding method configuring a plurality of transmit antennas is configuring a plurality of transmit antennas to each represent an in-phase spatial constellation symbol within an in-phase spatial constellation, and a quadrature spatial constellation symbol within a quadrature spatial constellation, mapping source data to the in-phase spatial constellation symbols and the quadrature spatial constellation symbols represented by the plurality of transmit antennas, wherein the notion of applying sparse detection, compressed sensing algorithms to decode SM signals is proceeded.
Another embodiment of the computer-implemented decoding method is characterized by a modification to the iterative shrinkage-thresholding algorithm (ISTA) via boxing, range limiting and hard-thresholding.
Another embodiment of the computer-implemented decoding method is characterized by proceeding the iterative shrinkage-thresholding algorithm via boxing-hard (ISTA), a greedy selection of the positions of the antennas index and the symbol estimates, and their independent decoding of the corresponding antenna modulated and symbol modulated bits.
Another embodiment of the computer-implemented decoding method is characterized by, wherein process working parallel to the greedy detections, to ensure valid estimates of the index vectors from the given finite set of index vectors are produced as an output and to apply interference cancellation with the confirmed values,
Another embodiment is characterized by a receiver (R) of a communication system having a processor, volatile and/or non-volatile memory, at least one interface adapted to receive a signal in an communication channel, wherein the non-volatile memory stores computer program instructions which, when executed by the microprocessor, configure the receiver to implement the decoding method of one or more embodiments cited above.
Another embodiment is characterized by a receiver by computer program product comprising computer executable instructions, which, when executed on a computer, cause the computer to perform the decoding method of one or more embodiments cited above.
Another embodiment is characterized by a computer-readable medium storing and/or transmitting the computer program product cited above.
Another embodiment is characterized by vehicle unit comprising a communication system with a receiver (R) in a vehicle wherein the system is adapted to execute the method according to one or more the decoding method of one or more embodiments cited above.
Another embodiment is characterized by a vehicle having one or more vehicle units cited above.
All aspects in this application can be integrated in a mobile devices, base station and components in wireless systems. All the describes components can be integrated in vehicles.
For a fuller understanding of the nature of the present invention, reference should be had to the following detailed description taken in connection with the accompanying drawings in which:
Quadrature spatial modulation (QSM) schemes are considered, which are capable of conveying large numbers of bits while a combination of transmitting a relatively small number P all M-ary modulated symbols from a dynamic selection of nT transmit into mass, according to a designed dispersion pattern.
Following are detailed descriptions of concepts, system/network architectures, and detailed designs for many aspects of a wireless communications network targeted to address the requirements and use cases for 5G. The terms “requirement,” “need,” or similar language are to be understood as describing a desirable feature or functionality of the system in the sense of an advantageous design of certain embodiments, and not as indicating a necessary or essential element of all embodiments. As such, in the following each requirement and each capability described as required, important, needed, or described with similar language, is to be understood as optional.
In the discussion that follows, this wireless communications network, which includes wireless devices, radio access networks, and core networks, is referred to as “NX.” It should be understood that the term “NX” is used herein as simply a label, for convenience. Implementations of wireless devices, radio network equipment, network nodes, and networks that include some or all of the features detailed herein may, of course, be referred to by any of various names. In future development of specifications for 5G, for example, the terms “New Radio,” or “NR,” or “NR multi-mode” may be used—it will be understood that some or all of the features described here in the context of NX may be directly applicable to these specifications for NR. Likewise, while the various technologies and features described herein are targeted to a “5G” wireless communications network, specific implementations of wireless devices, radio network equipment, network nodes, and networks that include some or all of the features detailed herein may or may not be referred to by the term “5G.” The present invention relates to all individual aspects of NX, but also to developments in other technologies, such as LTE, in the interaction and interworking with NX. Furthermore, each such individual aspect and each such individual development constitutes a separable embodiment of the invention.
Consider a point-to-point (P2P) MIMO communication system in which a transmitter equipped with nT transmit antennas exchanges information with a receiver equipped with nR receive antennas employing SM The received signal corresponding to T consecutive time slots during which the channel is assumed to be constant can be compactly written as
where Y∈n
It is assumed hereafter that the quasi-static Rayleigh fading channel matrix H is known at the receiver but not at the transmitter, and we remark that since the channel power per matrix entry is unitary, the fundamental signal-to-noise ratio (SNR) is given by
In turn, in accordance with related QSM literature and as illustrated in
where sp=spR+jspI, with p={1, . . . , P}, are transmit symbols chosen from a complex constellation constellation of cardinality ||=M; Ak
With regards to equation (2), and again referring to
In view of the above, it can be said that the design of a specific QSM scheme amounts essentially to the method employed in the construction of each of the Q dispersion matrices Aq and Bq in the sets and , and the selection of the set containing the index vectors kR and kI which inform the choices of dispersion matrices used in each transmission.
To exemplify how state-of-the-art (SotA) QSM schemes can be cast into the general framework described by equation (2), consider first the QSM scheme proposed in 119. In this case, the dispersion matrices reduce to dispersion vectors (i.e., T=1 and Q=nT) which are given by
where eq is the q-th column of IQ, and no specific design criteria are given for the selection of the indices in the index vectors kR and kI.
In turn, in the DA-QSM scheme of [20], two-column dispersion matrices (i.e., T=2 and Q=nT) are employed so as to exploit transmit diversity. In particular, in this scheme
with
where Mn is an n×n cyclic lower-shift matrix Mn is obtained by circularly shifting the bottom row of In to the top, such that, e.g.,
such that its (q−1)-th power pre-multiplied to a given matrix results in a shift of the bottom (q−1) rows of the latter to the top.
From the above it is visible that the DA-QSM scheme improves over the QSM scheme of 19 essentially by adding diversity, i.e., by extending the transmission instances from T=1 to T=2. However, the dispersion matrices of the DA-QSM method are still real, just as those of the QSM scheme, implicating that no additional multiplexing capability is aggregated, and that coding gains is not optimized.
In contrast, the EDA-QSM method improves over the latter on both aspects. In particular, in this scheme the dispersion matrices are more elaborately designed as
where el is the l-th column of IL, with LnT/2, the indices i∈{1, . . . , 4} and l∈{1, . . . , L}, and the core matrices Ci and Di are based on the Sezginer-Sari-Biglieri (SSB) STBC of 24 described by
Through the concise description above it becomes easy to see that the fundamental distinction between the DA-QSM and the EDA-QSM methods is that the dispersion matrices of EDA-QSM are complex-valued, such that the orthogonality between the real and imaginary dimensions are better exploited in order to reap multiplexing and coding gains.
Two fair criticisms that can be made of the aforementioned schemes—and in fact, to the best of our knowledge of all existing SotA QSM methods proposed so far—are, however: a) that the scheme does not scale systematically simultaneously over space and time, for arbitrary T>2; and b) that the coding gain achieved is not optimum. Mitigating these two limitations is the objective of our first contribution described in the following section.
Given the number of bits carried by the transmission of each QSM transmit symbol X as per equation (2), and the fact that such transmission requires T successive channel uses, the SE ζ of any QSM scheme is given by
where we recall that QTnT and adopt a notation meant to emphasize that P and T are seen as fundamental QSM design parameters, while M and nT are considered to be system constraints.
The presence of the binomial coefficient
in equation (8) implicates that the SE function ζ(P, T; M, nT) is monotonically descending on T, for a fixed P, and concave on P, for a fixed T, as well as on the ratio P/T. This is well illustrated in the plots offered in
Motivated by the discussion above, we seek analytical expressions for the optimum ratio P/T that maximizes the SE, given nT and M, which in turn can be used to determine the relative SE reduction incurred in setting T<nT for large-scale systems with nT→∞. To this end, consider the upper and lower-bounds on the binomial coefficient, namely
where for future convenience we implicitly defined the upper-bounding function β(P; Q).
Using equation (9) into equation (8) yields the bound
Taking the derivative of the latter expression with respect to P yields
where in the second line we relax the constraint that P∈ and expressed more generally P=εQ, introducing the positive quantity ε≤1
Equating the expression in equation (11) to zero yields the following analytical implicit expression to determine the optimal number of symbols P* that maximizes the SE of a QSM system with Q=TnT spatial-temporal resources and employing an M-ary constellation
where we emphasize that the quantity on the righthand side of the expression is in fact sought after number of transmitted symbols P.
But recalling that the desired P* is also the largest possible, equation (12) implies that
which in turn implies that the optimum ε is such that
i.e., the solution of the quadratic polynomial (M−1)ε2−2Mε+M, which finally yields, simply
where we introduced the implicitly-defined optimum gradient
We emphasize that the elegant result offered in equation (14) is general for any QSM scheme. From this result it is seen that the optimum ratio P/T that maximizes the SE of the QSM scheme is linear on the number of transmit antennas nT. In other words, for any given M and nT, an SE-optimum QSM must be such that P/T scales linearly with nT, as illustrated and confirmed by the simulation results shown in
This means,
Recall also that QSM dispersion matrices are generally constructed with basis on STBCs characterized by T×T square encoding matrices. Consequently, it follows that if P must scale with nT in order for the QSM to be SE-optimal, so must the size T of the code, in order for the the underlying STBC itself to retain SE-optimality. In other words, equation (14) also implicates that in order to achieve SE-optimality, a QSM scheme conveying M-ary symbols must employ an underlying full-rate STBC of a size that scales proportionally to the number of transmit antennas nT.
It must be remarked, that setting T=nT is not a scalable proposition, not only because it implies furbishing the transmitter with an equal number of RF chains, which can be prohibitively expensive, but also because it results in fully dense signals, which in turn require also prohibitively complex ML receivers. This observation motivates the comparisons given in
In view of these results, in the next section it is introduce the a new QSM transmitter design, including both the description of how to construct QSM dispersion matrices based on optimal STBCs of arbitrary size, as well as a new systematic mechanism to obtain the associated set of index vectors used in their selection during transmission. For clarity of explanation, we first take the simpler example of the 2×2 case, to introduce the construction of dispersion index set for optimal diversity gain. The extension of the scheme to generalized T follows subsequently.
Before we proceed to describing the proposed dispersion matrix construction let us, without loss of generality and to facilitate comparison with existing methods, impose the assumption that the transmit signal matrix X as per equation (2) satisfies the unity average transmission power constraint for each active transmit antenna, such that [tr (XHX)]=PT under constellations with unity average power symbols. Then, consider the 2×2 Golden code, which compactly encodes four symbols {s1, s2, s3, s4} into the matrix,
where θ and
The construction of QSM dispersion matrices based on the latter Golden code follows from the decomposition of SG into the auxiliary matrices Ci and Di, which are used to modulate the real part siR and imaginary part siI of each i-th symbol encoded, respectively, such that
where
with
and note that post-multiplying the circular lower-shift matrix Mn to a given matrix X results in a column-wise circular shift of X to the left. In possession of the above auxiliary matrices, the Golden dispersion matrices are then built using the Kronecker product operations following a similar strategy, namely
Regarding the scaling factor in equation (18), the denominator
is passed over from the coefficient of the Golden code as in equations (15) and (16), while the numerator √{square root over (2)} is the result of power scaling required to ensure that the transmit power constraint [tr (XHX)]]=PT is satisfied. To elaborate further, from equations (2) and (18) it follows that [tr (XHX)]]=PT implies that the dispersion matrices must satisfy tr (AqHAq)=T and tr (BqHBq)=T, for all q∈{1, . . . , Q}, whereas from the construction of the auxiliary matrices Ci and Di as per equations (17) it is evident that tr (CiHCi)=1 and tr (DiHDi)=1, such that a power scaling of T=2 onto Ci and Di, i.e., an amplitude scaling of √{square root over (2)} onto Ci and Di, is needed.
The Golden codes are known to outperform the SSB codes employed in the EDA-QSM scheme, while having structure very similar to the latter, such that their utilization in the construction of dispersion matrices as described above is, in and of itself, bound to improve the performance of QSM schemes over those briefly described in Subsection II-B, as shall be demonstrated later via simulated comparisons.
There is, however, another mechanism to improve the performance of QSM schemes employing STBCs, namely, to optimize the selection of the index vectors in ={kn}n=1N∈P that determine which dispersion matrices are assigned to the real and imaginary parts of each encoded symbol. This is because each index vectors kn is, according to equations (17) and (18), associated with different subsets of spatial-temporal resources utilized by the QSM scheme in the transmission of a given set of spatially encoded bits. To illustrate the issue, define the set * of all
distinct index vectors for a given pair (P, Q), and consider the corresponding example compiled in Table π for the case P=3 and Q=2nT=8.
Recall also that each dispersion matrix in the transmission of spR or spI uses two given pairs of antennas and time slots, as per equations (17) and (18), such that for the sake of conciseness we hereafter refer to each pair of one antenna and one time slot simply as a spatial temporal resource rq, defining also for future convenience the set of all available and utilized spatial temporal resources, denoted respectively by * and . Then, if resources and dispersion matrix indices are represented by a rectangular and a circular nodes, respectively, a bipartite graph such as the one shown in
As illustrated by the graph, the inclusion of a given index set kn from * into the set is associated with the use of certain resources, occasionally with multiplicity, identified by the graph edges intercepted by the enclosure encircling the corresponding indices. We shall therefore use the notation kn⇒rn to indicate that the index set kn implicates the utilization of the set of resources rn, and μk
For example, the use of the resources r1={2×(1,1), (1,2), (2,1), 2×(2,2)} results from having k1=[1, 2, 3] in , such that we may write concisely k1⇒r1, with μk
It is evident from all the above that in order to avoid redundancy and uneven utilization of spatial-temporal resources, so as to optimize the performance of QSM schemes, the sets of dispersion matrix indices (with corresponding resource set ) must satisfy the following conditions:
As an example, we highlight in Table I the set of index vectors ={k1, k2, k3, k5, . . . , k8, k10, k11, k19, . . . , k23, k26, k27, k28, k35, . . . , k38, k41, k42, k47, k48, k50, . . . , k56}. The reader can verify that by this choice of , all resources in the associated set have multiplicity 24. In contrast, a naive truncation of the first 32 index vectors in Table I. i.e. ={k1, . . . , k32} as suggested e.g. in 23, leads to an uneven utilization pattern in which μ(1,1)=μ(2,2)=32, μ(1,2)=μ(2,1)=28, μ(3,1)=μ(4,2)=19 and μ(3,2)=μ=17, which is obviously sub-optimum as it leads to antennas 1 and 2 being used far more often than antennas 3 and 4.
The problem of selecting the optimum set as described and illustrated above relates to a classic problem in combinatorics graph theory known as the Vertex Cover Problem. In the context hereby, however, the problem has the additional difficulties that: a) the graph in question is bipartite, b) coverage with equal multiplicity is required, and c) nodes must be selected in subsets of three at a time.
Due to these peculiarities, the problem itself is, to the best of our knowledge, original and cannot be solved by known variations of the Vertex Cover algorithm. Fortunately, the highly symmetric structure of the associated bipartite graph can be exploited to design an efficient algorithm to solve the selection problem at hand. To that end, let us commit a slight abuse of notation and define the multiplicity of a dispersion matrix index □2 q in the set as (q). Then, by virtue of the symmetry of the graph (see
Due to the greedy optimal index vector selection algorithm described above, which is general on P, T and nT, the last limiting factor preventing the generalization of QSM to arbitrary T is the construction of the dispersion matrices with basis on STBCs of arbitrary size. This obstacle is eliminated by considering the design of QSM dispersion matrices based on the Perfect FDFR STBC.
a T×T FDFR STBC encodes T2 symbols such that the average energy transmitted per antenna is normalized to unity, an energy efficiency-shaping constraint is enforced, and a SE-preserving lower bound on the coding gain (a.k.a, non-vanishing determinant) is maximized. Ultimately, for given T∈+ the design can be described by
where st=[s1+(t−1)T, s2+(t−1)T, . . . , stT]T, with t={1, . . . , T} are vectors each carrying T distinct transmit symbols, R is a T×T optimum lattice generating matrix JT,n is a T×T matrix constructed by replacing the last n diagonal entries of the identity matrix by the elementary complex number j, and NT is a T×T cyclic upper-shift matrix (notice that JT,n generalizes J2,1 used in equation 17. In turn, oppositely to Mn, Nn is obtained by circularly shifting the top row of In to the bottom. Some examples are
such that post-multiplying it to a given matrix X results in a column-wise shift of X to the right.
Notice that the Perfect FDFR STBC of fully generalizes the 2×2 Golden code of [28]. To see that, suffice it to consider the case T=2 and with the corresponding lattice generating matrix
such that equation (19) yields
It follows that in order to be employ Perfect FDFR STBCs in the design of QSM. suffice it to decompose the core code structure of equation 19 in terms of corresponding auxiliary dispersion matrices Ci and Di due to symmetry, namely
where the generalized indices i∈{1, . . . , T2} are constructed systematically on t∈{1, . . . , T} and w∈{1, . . . , T}, and et is the t-th column of IT.
Following this, the full set of dispersion matrices and can be built, i.e.,
where again q∈{1, . . . , Q}, i∈{1, . . . , T2} as from equation (21), el is the l-th column of IL, but l∈{1, . . . , L} with L=└nT/T┘, as well as a generalized scaling factor γ determined depending on the specific STBC in order to adjust the powers of the dispersion matrices such that tr (AqHAq)=T and tr (BqHBq)=T.
Next, we turn our attention to the construction of the optimal set of index vectors , via a straightforward generalization of the method described in Subsection III-B. Indeed, as can be learned by inspecting equation (21, each auxiliary matrix Ci and Di is a T×T sparse matrix obtained from a cyclic rotation of a diagonal matrix containing only T non-zero elements of R.
Consequently, the associated dispersion matrices obtained from equation (22) are all sparse matrices with only T non-zero entries, corresponding to the T spatial-temporal resources utilized. In other words, while in the Golden QSM scheme of Subsection III-B each dispersion matrix index q is associated with 2 resources, in the Perfect STBC-based construction here described each index q associates to T resources, such that the corresponding bipartite graph illustrated in
Together, methods 1 and 2 introduced above demonstrate that the design of OS-QSM transmitters is possible and tractable. There is, however, no true scalability without feasibility, such that in order to complete the task it is also necessary to show that the proposed OS-QSM design is effectively decodable at reasonable complexity.
To put the challenge into context, for given P, M, T and nT, with Q=T·nT, an ML receiver would have to go through
combinations of symbols and selected spatial-temporal resources in order to detect a sequence of
bits. That means that even for the minimal setting of T=2, P=2 and M=4, a system with nT=8 transmit antennas would require the receiver to go through
combinations in order to decode the corresponding log2 (16.777.216)=24 bits. In other words, ML decoding is highly impractical in QSM systems, especially in the context of massive MIMO systems.
We emphasize that this challenge applies not only to the OS-QSM scheme of Subsection III-B but also to current SotA QSM methods such as those in [20]-[23], as the example given above is for T=2, which is the size of the core codes used in the latter. We furthermore stress that the utilization of SD receivers is also not viable in scaled cases, because the nature of tree search algorithms still requires excessive computational complexity in large systems. Finally, we also remark that since convenient properties such as fast-decodability and block-diagonality are known not to be retainable without sacrifice of optimality for STBC of arbitrary size, a scalable detector for QSM schemes cannot rely on such features.
In light of the above, we introduce hereafter a new detection method for QSM schemes which relies neither on tree-search, nor on specific properties of STBCs and which is completely independent of the infeasible combinatorial factor
In addition, given prior information on the encoding construction, the proposed decoder is valid to detect any QSM signal.
The core idea of our approach is to take full advantage of a sparse representation of QSM signals over the entire channel (i.e., for all spatial temporal resources available), assumed known at the receiver. The proposed decoding method then leverages the iterative shrinkage thresholding algorithm (ISTA) to greedily extract symbol and dispersion index estimates, resulting in significantly lower complexities compared to ML and SD-based methods. To that end, first combine equations (1) and (2), and consider the vectorized form of the QSM received signal
where we implicitly defined the block-diagonal channel matrix ΦH and vectorized noise v; the dispersion matrices in and are also vectorized into aqvec (Aq) and bqvec (Bq) and concatenated into ΞA[a1, . . . , aQ]∈Q×Q and ΞB=[b1, . . . , bQ]∈Q×Q, respectively; and uR∈Q×1 (respectively uI∈Q×1) is set to zero everywhere, except for its elements of indices kR∈ (respectively kI∈), which are set to {s1R, . . . , sPR} (respectively {s1I, . . . , sPI}).
Equation (23) can be further simplified by defining the combined and real-imaginary decoupled information and noise vectors
as well as the decoupled versions of aq and bq, namely
which in turn can be combined into a single dispersion matrix ΨD∈2Q×2Q, namely
such that the vectorized system model of equation (23) can be re-written as
where {hacek over (Φ)}H is the quadrature-operated block diagonal channel matrix ΦH, which we implicitly relabeled ΦH, as with the effective channel matrix GΦH·ΨD, for future convenience.
To elaborate on equation (27) with an example, consider a system with P=3, T=2 and nT=4, and assume that for a particular bit sequence b=[bR, bI, bS], the selected index vectors are given by kR=k10=[1, 3, 7] and kI=k47=[4, 5, 7]. Then, the corresponding combined information vector becomes u=[s1R, 0, 0, 0, s2R, 0, 0, s1I, 0, s2I, 0, 0, s3R, s3I, 0, 0]T. Notice that while u carries in the entries spR and sPI the P log2 M bits corresponding to the bS subsequence, the remaining 2 log2 N bits corresponding to the subsequences bR and bI are encoded merely by positions of non-zero elements in u, regardless of what the values of spR and sPI might be, which suggests that the detection of bS could be done separately from that of bR and bI.
In principle, the latter feature could be utilized to design an SD receiver for the OS-QSM method proposed above, similarly to how block-separability was exploited in to do so for the EDA-QSM scheme. The problem with that idea is, of course, the prohibitively large number of combinations how the 2P elements of the decoupled symbol vector s=[s1R, s1I, . . . , sPR, sPI] can be placed among the 2Q entries of u. In order to circumvent this challenge, we instead seek to exploit the facts demonstrated in Subsection III-A namely, that: a) the optimum number P* of symbols maximizing SE is a fraction of the total spatial-temporal resources Q=T·nT, as per equation (12); and b) that in large-scale systems with nT>>1, a significantly smaller block size T suffices to asymptotically achieve SE optimality, as shown in
Taking into account the focus on scalability, which at the receiver side translates to controlling complexity, two suitable candidate methods to be applied for OS-QSM demodulation are the generalized approximate message-passing (GAMP) method, and the iterative shrinkage thresholding algorithm [ISTA], both of which possess quadratic complexity on the size 2TnT of the signal vector u. It is well-known, however, that the GAMP algorithm relies strongly on the particular structure of measurement matrix and the independence of the received signal, which in the case of QSM cannot be generally assumed, as a direct consequence of the utilization of STBCs in the dispersion matrices. In the absence of the required conditions, GAMP receivers yield poor performance, characterized by error-floors at high SNRS.
Motivated by this fact, it is therefore chosen to follow a ISTA-based approach in the design of a low-complexity demodulator for QSM systems, which is described in the sequel. In particular, it is introduced a method to detect QSM signals, which is based on a purpose-built variation of ISTA that incorporates modifications both on the thresholding function and on the index vector estimation process, specifically to QSM detection.
Consider the standard ISTA recursion,
where û(η) is the estimate of u at the η-th iteration, α=maxeig (GTG) is the shrinkage step size, (the actual requirement is that α>maxeig (GTG), however, we will assume the minimum step-size, which is sufficient), λ is the threshold factor, and Λ(s; τ) is the soft-thresholding function. A first meaningful modification to such standard ISTA recursions in equation (28) is to account for the fact that the symbols in the real-valued projected constellation R() are finite, such that in addition to the lower limit τ in the vicinity of the origin used to enforce sparsity in the solution, an upper limit max(R) can be introduced into the thresholding function. In other words, for the case at hand we replace ISTA s standard soft-thresholding function Λ(s; τ) by a hard-thresholding function leading to the “boxed” hard-thresholding function Π(s; τ) illustrated in
Incorporating this modification yields the boxed-hard ISTA (BH-ISTA) receiver described by
Notice that the computational cost of repeatedly evaluating equation 30 is dominated by the term Gû(η), therefore quadratic on the number of non-zero entries (i.e., 0-norm) of û(η), which reduces with the iterations η, as illustrated in
In particular,
It can in fact be seen that as a result of boxing and hard-thresholding, |ûΠ(0)|0<|ûΛ(0)|0, such that the expected order of complexity associated with evaluating equation 28 is lower than that of evaluating (30), which can be bounded both below and above by the lower- and upper-limits ((4P2) and (4Q2)).
More details will be given in Section V-A. In turn,
Let us consider that multiple runs of the BH-ISTA iterations described by equation (30) are performed, such that prior to the m-th run a modification is made to y, G and u, which can be expressed by rewriting equation (30) as
where we convene that for the first run (m=1) we set y1=y, G1=G and û0(1)=02Q.
Let η* be the last iteration of the m-th run of the latter estimator, with its corresponding outcome denoted by ûm(η*). And finally, let {tilde over (s)}{circumflex over (q)}
where [x]l denotes the l-th element of a generic vector x. It is emphasized that in the greedy procedure summarized by equation 32, two distinct pieces of information on the bit sequence b are obtained, namely, a soft estimate {tilde over (s)}{circumflex over (q)}
First, a hard-detected version of {tilde over (s)}m is obtained by projecting in onto R, that is
Then, the remaining quantities are updated following
where I2Q is the identity matrix of size 2Q and e{circumflex over (q)}
where mod(x, 2) denotes the modulo-2 operation onto x.
If there are no errors during the detection process, after exactly m=2P runs, the sequences {{circumflex over (q)}mR, {circumflex over (q)}mI} can be perfectly mapped to {kR, kI}, in particular via
such that procedure comes to a stop.
More generally, however, errors may occur, such that either {circumflex over (q)}mR, or {circumflex over (q)}mI, or both, contain incorrect indices even with cardinality P. In such cases, the procedure continues until both subsequences contains the first P-tuple of indices included in the dispersion matrix index vector set , at which point a modification of the update equations is required, which can be described as follows.
Let (q) denote the projection of a sequence q onto the set , such that either a sequence k∈ or the empty set Ø is returned by the projection, depending on whether or not q contains within it a sequence from . If multiple valid k∈ exist in the combination of elements in q, the viable elements with lower indices in q (not of the element values themselves) take priority, such that the notion of greedy selection is coherent. Then, equation (34) can be expanded into
In plain words, equation (37) establishes that after the m-th run of the BH-ISTA detector, the initial state of the estimate vector ûm+1(1) for the next run is either:
Obviously, the only other alternative to those above is when both {circumflex over (k)}R and {circumflex over (k)}I have been acquired, and consequently also the entire set of symbol estimates {ŝ1R, ŝ1I, . . . , ŝPR, ŝpI} have been obtained, in which case the procedure is terminated.
Similarly to the above, the updates of ym and Gm must also be revised so as to account for the effect of hard-decisions onto {circumflex over (k)}R and {circumflex over (k)}I, so as to cancel the effect of hard-decided indices and symbols, and to nullify the channel corresponding to confirmed indices, yielding respectively
The procedure described by equations (31) through (33) and (35) through (39) amount to a greedy—i.e., symbol-by-symbol and index set-by-index set—modification of the GB-ISTA detector introduced earlier, for which it is dubbed as the greedy boxed iterative shrinkage thresholding algorithm for QSM demodulation.
Notice that at the end of the process, estimates {circumflex over (k)}R and {circumflex over (k)}I of the selected dispersion matrix index vectors, as well as hard-decision estimates ŝ=[ŝ1R, ŝ1I, . . . , ŝPR, ŝPI] of the modulated symbols are obtained, from which the corresponding encoded bits b=[bR, bI, bS] can be retrieved at a fraction of the complexity of sphere detection or exhaustive maximum likelihood searches. A diagram illustrating the proposed GB-ISTA QSM receiver is offered in
In this section we analyze the performance of the proposed OS-QSM via computer simulations. Given that our focus is on the scalability of the system, all simulation results to be shown are for relatively large number of transmit antennas (i.e., nT≥6) and for increasing number of transmission slots (i.e., T≥2), with the number of digitally-modulated transmit symbols P and the cardinality of corresponding constellation M adjusted on a case-by-case basis in order to highlight the main finding of each simulated experiment. To the best of our knowledge, simulation results on QSM schemes with such parameters have not appeared so far in the literature, due to the prohibitive computational complexity of existing receivers.
In light of the latter remark, let us start by assessing the decoding complexity of scaled QSM systems, in particular by deriving the complexity orders of the conventional ML and SCMB-SD approaches, and of the proposed GB-ISTA algorithm described in Section IV.
For any given nT, T and P, the brute-force ML decoder requires a search among all possible
antenna activation patterns, independently selected according to {kR, kI}∈ to transmit the real and imaginary parts of the P digitally modulated symbols in s∈P, as well as another search, for each possible activation pattern, of all possible P-tuples of symbols selected from the constellation , of cardinality M.
Assuming, idealistically and for simplicity, that each search consumes a single floating point operation (flop), the ML search process alone yields a complexity order lower-bounded by
in order to detect
bits, which even for moderately small P and M quickly become unfeasible. For example, a search over 16.777.216 combinations is required to detect the 24 bits of each transmit signal in a relatively small system with nT=6, T=3, P=3 and M=4. Just doubling the number of transmit antennas to nT=12, with other parameters unchanged, the complexity of the ML search space already surges to 109 combinations, for a mild increase to 30 bits per transmission, while keeping nT=6 and doubling the number of transmit symbols to P=6 requires a search over more than 1012 combinations in order to detect only 40 bits. Taking the most significant operations required to perform each ML search into account, the order of complexity of the ML receiver to decode each bit of QSM schemes becomes with the lower bound obtained by keeping only the higher-order terms and neglecting coefficients.
The practical unfeasibility of ML-based detection of QSM systems is clearly highlighted by equation (40), as it exposes the fact that the number of transmit symbols P is a complexity order exponent of all theoretically scalable quantities nT, T and M. Next, let us show that this challenge cannot be satisfactorily mitigated by the SD approach. To that end, consider again idealistically and for simplicity, that SD can reduce the search radius to a single symbol, such that the factor MP in equation (40) can be neglected. In other words, we find that the order of complexity associated to SD based QSM receivers can, at best, be reduced to
From the latter it can be concluded that, in the context of scalable QSM schemes, the only advantage of SD is to enable scaling of the digital constellation cardinality M, which not only impacts negatively on the corresponding BER, but also is not the most significant factor in increasing the SE of the system, since the total number of bits conveyed by a QSM scheme is
such that even for mildly large nT, T and P we have
In summary, it can be concluded that sphere detection is not particularly useful as an enabler of spectrally-efficient scalable QSM, from a receiver perspective.
Finally, let us address the computation complexity of the proposed GB-ISTA For starters, observe from equations (31) through (36) that the GB-ISTA receiver obtains the spatially encoded bits bR and bI not from a search, but directly from the sparse-recovery process, i.e., the value and locations of non-zero elements of û. As a consequence of removing such combinatorial search, the impact of the scalable parameters nT, T and P onto GB-ISTA is significantly smaller, as demonstrated by the following complexity analysis of the steps of method 3.
The cost of computing α as per line 1 of method 3 are ignored, under the argument that for large systems, the largest eigenvalues GTG converges almost sure to a constant dependent only on the structure and the energy of G.
That operation would cost (2TnT)(2TnR)+(2TnR)+(2TnR)(2TnT)+(2TnR)=8T2nTnR+4TnR flops to accomplish, but since the sparsity of û(η) quickly reduces to the actual value 2P, as shown in
From the above, the total complexity order of the GB-ISTA can be estimated at
The per-bit complexity orders of the ML and the proposed GB-ISTA decoders, obtained by dividing the expressions in equations (40) and (42) by the number of bits detected per transmission
are compared in
Empowered by the significant reduction in complexity obtained by GB-ISTA over ML detection, as shown above, we proceed to assess the BER performance of the proposed OS-QSM scheme, decoded via the GB-ISTA. In general, our simulated experiments aim to further demonstrate that the proposed OS-QSM are feasible with relatively large numbers of transmit antennas, and can achieve very low BER at very low Eb/N0 with rather high spectral efficiencies, whilst using relatively few spatial-temporal resources per transmission.
To that end, our first set of results, shown in
Two important facts can be learned from the results of
One criticism that could be raised about the results of
In any case, in order to dispel any doubts about the ability of the proposed OS-QSM design and of the corresponding GB-ISTA receiver to actually achieve feasible and optimized spectral efficient combined with low BERs, we shown in
With these remarks made, turning to the results obtained in
With the highlight of introducing four approaches within this application.
The notion of applying sparse detection (compressed sensing) process steps to decode SM signals.
From the above idea of applying sparse detection, a modification to the iterative shrinkage-thresholding process steps (ISTA) [2] via boxing (range limiting) and hard-thresholding.
Using the boxed-hard ISTA from above, a greedy selection of the positions of the antennas index and the symbol estimates, and their independent decoding of the corresponding “antenna modulated” and “symbol modulated” bits.
A process working parallel to the greedy detections, to ensure valid estimates of the index vectors (from the given finite set of index vectors) are produced at the output of the algorithm, and to apply interference cancellation with the confirmed values.
The proposed decoder possesses significantly low complexity compared to the existing ML and tree-search algorithms. The decoder possesses a quadratic complexity on the number of transmit antennas.
Furthermore, the proposed decoder also does not require design restrictions such as block-diagonality or orthogonality in the transmission scheme, only the sparsity which is inherent with spatial modulation schemes, therefore providing larger freedom in transmitter development as well. In other words, the proposed decoder is capable of coping with many different encoding structures (flexibility).
The decoder can be used in any MIMO system where the number of antennas is expected to be large, such that ML approaches are infeasible. The scheme can be used to increase efficiency in cellular networks and V2X communications (eMBB).
In this application it is a new transmitter and receiver designs for QSM schemes, focusing on their scalability in terms of the number of transmit antennas nT, number of transmit instances T and number of encoded M-ary symbols P, as well as on their performance optimization in terms of SE diversity and coding gains. The contributions are motivated by the demonstrated fact that, in order for SE optimality to be achieved, QSM schemes must scale nT, T and P, which is not possible with SotA methods. At the transmitter, the newly proposed OS-QSM scheme differs from SotA alternatives in that its dispersion matrices are designed based on the FDFR] STBCs, and in that dispersion matrix index selection is performed via a new greedy algorithm given, which ensures that all spatial-temporal resources of the transmitter are utilized evenly over multiple transmissions. In turn, at the receiver, the proposed art contributes with a new ISTA-based receiver, which thanks to its reliance on the sparse structure of QSM signaling, eliminates the combinatorial nature of existing ML or SD based approaches, further enabling the scaling of the system from a feasibility perspective. In fact, a complexity analysis is offered, which shows that the proposed GB-ISTA receiver enjoys a complexity order that is cubic on T, quadratic on P, and only linear on nT, in contrast to the ML and SD detectors which have geometric complexities on T and nT, with P as exponent, rendering them unfeasible in the scaled scenario. Simulation results for set-ups of scales never before shown in related literature, corroborate both the high performance and feasibility of the proposed OS-QSM scheme and GB-ISTA receiver.
Number | Date | Country | Kind |
---|---|---|---|
10 2021 207 919.9 | Jul 2021 | DE | national |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/EP2022/070690 | 7/22/2022 | WO |