Method for detecting transmission symbols in multiple antenna system

Information

  • Patent Grant
  • 8135099
  • Patent Number
    8,135,099
  • Date Filed
    Tuesday, May 27, 2008
    16 years ago
  • Date Issued
    Tuesday, March 13, 2012
    12 years ago
Abstract
The present invention relates to a transmission symbol detection method in a multiple antenna system. In the present invention, when a channel matrix is estimated through channel estimation, a receiving side calculates a Q matrix and an R matrix through QR decomposition that is more simplified than a typical QR decomposition from an augmented channel matrix that includes the estimated channel matrix. In addition, the receiving side detects symbols having the minimum Euclidean metric by using the two matrixes, as transmission symbols.
Description
CROSS-REFERENCE TO RELATED APPLICATION

This application claims priority to and the benefit of Korean Patent Application No. 10-2007-0128430 filed in the Korean Intellectual Property Office on Dec. 11, 2007, the entire contents of which are incorporated herein by reference.


BACKGROUND OF THE INVENTION

(a) Field of the Invention


The present invention relates to a transmission symbol detection method in a multiple antenna system. Particularly, it relates to a transmission symbol detection method in a multiple antenna system including a plurality of transmitting antennas.


(b) Description of the Related Art


For a mobile communication system such as IEEE 802.16e that uses four transmitting antennas, three usable space-time codes are defined for transmission. The three space-time codes are denoted as three matrixes A, B, and C, and each has a different symbol transmission rate and a different diversity gain. Particularly, the space-time code B has good tradeoff performance in symbol transmission rate and diversity gain, and can be represented as shown in Equation 1.









B
=

[




s
1




-

s
2
*





s
5




-

s
7
*







s
2




s
1
*




s
6




-

s
8
*







s
3




-

s
4
*





s
7




s
5
*






s
4




s
3
*




s
8




s
6
*




]





[

Equation





1

]







Here, the vertical axis denotes an antenna, and four symbols are simultaneously transmitted from four antennas. The horizontal axis denotes time or carrier frequency.


When symbols are transmitted by using the above-given space-time codes, the symbols are simultaneously received at a receiving side, and therefore the entire performance of the system greatly depends on a detection method of the receiving side. Among many conventional detection methods, the maximum likelihood (ML) detection method results in the best performance.


However, the ML detection method is very complex. Particularly, the ML detection method has a drawback of being incapable of real-time detection since the system complexity increases as the size of the constellation (e.g., 16-QAM or 64-QAM) increases.


Accordingly, in order to reduce system complexity while providing the best performance (i.e., ML performance), a sphere decoding method has been proposed. The sphere decoding method detects constellation points that are close to a received signal, and therefore the system complexity is lower than a simple ML detection method. However, the sphere decoding method has a problem of complexity, and, in the worst case, the sphere decoding method causes exponential functional complexity so that there still exists a problem in application of the sphere decoding method to an actual system.


Therefore, in order to fundamentally decrease the system complexity, methods that can provide suboptimal performance need to be considered, and the methods include zero-forcing (ZF), minimum mean squared error (MMSE), ZF with successive interference cancellation (ZF-SIC), and MMSE with SIC. However, those methods provide suboptimal performance that is more deteriorated than the performance of the ML detection method.


The above information disclosed in this Background section is only for enhancement of understanding of the background of the invention and therefore it may contain information that does not form the prior art that is already known in this country to a person of ordinary skill in the art.


SUMMARY OF THE INVENTION

The present invention has been made in an effort to provide a transmission symbol detection method having advantages of reducing complexity and improving performance.


An exemplary transmission symbol detection method in a multiple antenna system that includes a plurality of transmission antennas according to one embodiment of the present invention includes: estimating a first matrix that is a channel matrix including a plurality of channel gains respectively corresponding to the plurality of transmission antennas by using a received signal; calculating a second matrix that is an upper-triangle matrix and a third matrix that is a unitary matrix from the first matrix; and detecting a plurality of transmission symbols by performing successive interference cancellation (SIC) based on the second and third matrixes. The second matrix includes a first component that corresponds to a first channel gain of the first matrix and a second component that is calculated based on the first channel gain and a second channel gain that is different from the first channel gain as diagonal components. The second matrix further includes a plurality of components using the first channel gain and a plurality of channel gains that are different from the first channel gain.


According to the exemplary embodiment of the present invention, a transmission symbol detection method that can reduce complexity in a receiving side and improve performance can be realized.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 is a schematic diagram of a system according to an exemplary embodiment of the present invention.



FIG. 2 is a flowchart of a transmission symbol detection method at a receiving side according to the exemplary embodiment of the present invention.



FIG. 3 shows a successive interference cancellation (SIC) detection method in a case of employing a typical BPSK algorithm.



FIG. 4 shows an SIC detection method in case of using a binary phase shift keying (BPSK) algorithm according to an exemplary embodiment of the present invention.



FIG. 5 shows a determination area for a feedback detection value determination when the SIC detection method is applied to 16-QAM according to the exemplary embodiment of the present invention.



FIG. 6 compares a bit error rate (BER) of the transmission detection method according to the exemplary embodiment of the present invention and a typical ZF-SIC and MMSE-SIC method.





DETAILED DESCRIPTION OF THE EMBODIMENTS

In the following detailed description, only certain exemplary embodiments of the present invention have been shown and described, simply by way of illustration. As those skilled in the art would realize, the described embodiments may be modified in various different ways, all without departing from the spirit or scope of the present invention. Accordingly, the drawings and description are to be regarded as illustrative in nature and not restrictive. Like reference numerals designate like elements throughout the specification.


Throughout this specification and the claims which follow, unless explicitly described to the contrary, the word “comprising” and variations such as “comprises” will be understood to imply the inclusion of stated elements but not the exclusion of any other elements.


A transmission symbol detection method in a multiple antenna system that includes a plurality of transmitting antennas according to an exemplary embodiment of the present invention will be described in detail with reference to the drawings.


When four transmitting antennas are used, it is assumed that the time-space code B uses the 4×4 matrix as given in Equation 1, and the third and fourth columns of the 4×4 matrix transmit transmission symbols that are different from transmission symbols transmitted at the first and second columns. Since a receiving terminal receive space-time codes at different time slots or different frequencies, it is assumed that the space-time code includes the first and second columns as shown in Equation 2 for better comprehension and ease of description.









X
=

[




x
1




-

x
2
*







x
2




x
1
*






x
3




-

x
4
*







x
4




x
3
*




]





[

Equation





2

]







With such an assumption, a transmission symbol detection method according to an exemplary embodiment of the present invention will be described in further detail.



FIG. 1 is a schematic diagram of a system according to the exemplary embodiment of the present invention.


It is assumed in FIG. 1 that nR receiving antennas exist in the receiving terminal (i.e., detector). Under this assumption, signals received at the first and second time-slots in a receiving side are given as Equation 3.

r1j=hj,1x1+hj,2x2+hj,3x3+hj,4x4+n1j
r2j=−hj,1x*2+hj,2x*1−hj,3x*4hj,4x*3n2j  [Equation 3]


Where hj,i denotes a channel gain between the i-th transmitting antenna and the j-th receiving antenna, and ntj denotes a white noise at the t-th time slot of the j-th receiving antenna.


A received signal r received at the receiving side can be represented as a matrix as shown in Equation 4.











[

Equation





4

]












r
=

Hs
+
n













r
=


[




[

r
1
1

]


,



[

r
1
1

]


,



[

r
2
1

]


,



[

r
2
1

]


,





,



[

r
1

n
r


]


,



[

r
1

n
r


]


,





[

r
2

n
r


]


,



[

r
2

n
r


]



]

T








H
=

[






[

h

1
,
1


]





-



[

h

1
,
1


]








[

h

1
,
2


]





-



[

h

1
,
2


]








[

h

1
,
3


]





-



[

h

1
,
3


]








[

h

1
,
4


]





-



[

h

1
,
4


]










[

h

1
,
1


]







[

h

1
,
1


]







[

h

1
,
2


]







[

h

1
,
2


]







[

h

1
,
3


]







[

h

1
,
3


]







[

h

1
,
4


]







[

h

1
,
4


]









[

h

1
,
2


]







[

h

1
,
2


]





-



[

h

1
,
1


]






-



[

h

1
,
1


]








[

h

1
,
4


]







[

h

1
,
4


]





-



[

h

1
,
3


]






-



[

h

1
,
3


]










[

h

1
,
2


]





-



[

h

1
,
2


]






-



[

h

1
,
1


]








[

h

1
,
1


]







[

h

1
,
4


]





-



[

h

1
,
4


]






-



[

h

1
,
3


]








[

h

1
,
3


]



































[

h


n
r

,
1


]





-



[

h


n
r

,
1


]








[

h


n
r

,
2


]





-



[

h


n
r

,
2


]








[

h


n
r

,
3


]





-



[

h


n
r

,
3


]








[

h


n
r

,
4


]





-



[

h


n
r

,
4


]










[

h


n
r

,
1


]







[

h


n
r

,
1


]







[

h


n
r

,
2


]







[

h

1
,
2


]







[

h


n
r

,
3


]







[

h


n
r

,
3


]







[

h


n
r

,
4


]







[

h


n
r

,
4


]









[

h


n
r

,
2


]







[

h


n
r

,
2


]





-



[

h


n
r

,
1


]






-



[

h

1
,
1


]








[

h


n
r

,
4


]







[

h


n
r

,
4


]





-



[

h


n
r

,
3


]






-



[

h


n
r

,
3


]










[

h


n
r

,
2


]





-



[

h


n
r

,
2


]






-



[

h


n
r

,
1


]








[

h

1
,
1


]







[

h


n
r

,
4


]





-



[

h


n
r

,
4


]






-



[

h


n
r

,
3


]








[

h


n
r

,
3


]





]















s
:=




[




[

x
1

]


,



[

x
1

]


,



[

x
2

]


,



[

x
2

]


,



[

x
3

]


,



[

x
3

]


,



[

x
4

]


,



[

x
4

]



]

T










=:



[


s
1

,

s
2

,

s
3

,

s
4

,

s
5

,

s
6

,

s
7

,

s
8


]

T














n
=


[




[

n
1
1

]


,



[

n
1
1

]


,



[

n
2
1

]


,



[

n
2
1

]


,





,



[

n
1

n
,


]


,



[

n
1

n
,


]


,



[

n
2

n
,


]


,



[

n
2

n
,


]



]

T






Here, r denotes a received signal, H denotes a channel matrix, and n denotes noise. In addition, custom character[•] denotes a real part and custom character[•] denotes an imaginary part. That is, each transmission symbol includes a real part and an imaginary part.


A transmission symbol detection method for the above-stated system model will be described in further detail with reference to equations.


According to the exemplary embodiment of the present invention, a sub-optimal detection method based on minimum mean squared error (MMSE)-zero-forcing successive interference cancellation (ZF-SIC) is used for transmission symbol detection.


To use the suboptimal detection method, an augmented channel matrix {tilde over (H)} shown in Equation 5 is used. In addition, the augmented channel matrix {tilde over (H)} is QR-decomposed as shown in Equation 5 so that matrixes {tilde over (Q)} and {tilde over (R)} are generated.










H
~

:=


[



H






1

γ




I

8
×
8






]

=



Q
~



R
~


=


[





Q
~

1







Q
~

2




]



R
~








[

Equation





5

]







Here, {tilde over (Q)} denotes a (4nR+8)×8 unitary matrix, and {tilde over (R)} is a (8×8) upper-triangle matrix. In addition, {tilde over (Q)}1 is a (4nR×8) sub-matrix of {tilde over (Q)}, and {tilde over (Q)}2 is a (8×8) sub-matrix of {tilde over (Q)}.


Conventionally, the matrixes {tilde over (Q)}1 and {tilde over (R)} are calculated by using a numerical method, and the Gram-Schmidt method which is the representative numerical calculation method is used. However, such a numerical calculation method gives good theoretical performance, but it is not appropriate for actual use because an actual output matrix {tilde over (Q)}1 and an expected unitary matrix may differ from each other. Therefore, a modified Gram-Schmidt scheme is actually applied to the system, but it has a problem of increasing complexity more than the existing Gram-Schmidt scheme. Particularly, the modified Gram-Schmidt scheme should be performed twice to achieve satisfactory performance when a given matrix is ill-conditioned, and, accordingly, complexity is doubled.


Therefore, for solving the numerical calculation method, a method for mathematically calculating the QR decomposition and calculating matrixes {tilde over (Q)}1 and {tilde over (R)} by using a closed-form formula according to the exemplary embodiment of the present invention will now be described.


First, assume that {tilde over (h)}i, i=1, 2, . . . , 8, and denotes the i-th column of the matrix {tilde over (H)}. Then the augmented channel matrix {tilde over (H)} can be represented as Equation 6.

{tilde over (H)}=[{tilde over (h)}1,{tilde over (h)}2,{tilde over (h)}3,{tilde over (h)}4,{tilde over (h)}5,{tilde over (h)}6,{tilde over (h)}7,{tilde over (h)}8]  [Equation 6]


In addition, the matrix {tilde over (R)} that is QR-decomposed from the augmented channel matrix {tilde over (H)} can be represented by using a closed form formula as shown in Equation 7.










R
~

=

[





R
~


1
,
1




0


0


0




R
~


1
,
5






R
~


1
,
6






R
~


1
,
7






R
~


1
,
8






0




R
~


2
,
2




0


0




R
~


2
,
5






R
~


2
,
6






R
~


2
,
7






R
~


2
,
8






0


0




R
~


3
,
3




0




R
~


3
,
5






R
~


3
,
6






R
~


3
,
7






R
~


3
,
8






0


0


0




R
~


4
,
4






R
~


4
,
5






R
~


4
,
6






R
~


4
,
7






R
~


4
,
8






0


0


0


0




R
~


5
,
5




0


0


0




0


0


0


0


0




R
~


6
,
6




0


0




0


0


0


0


0


0




R
~


7
,
7




0




0


0


0


0


0


0


0




R
~


8
,
8





]





[

Equation





7

]







Here, each element of the matrix {tilde over (R)} can be represented as shown in Equation 8.













R
~


1
,
1


=




h
~

1




;



R
~


1
,
2


=



1


R
~


1
,
1






h
~

1
T




h
~

2


=
0


;










R
~


1
,
3


=



1


R
~


1
,
1






h
~

1
T




h
~

3


=
0


;



R
~


1
,
4


=



1


R
~


1
,
1






h
~

1
T




h
~

4


=
0












R
~


1
,
5


=


1


R
~


1
,
1






h
~

1
T




h
~

5



;



R
~


1
,
6


=


1


R
~


1
,
1






h
~

1
T




h
~

6



;










R
~


1
,
7


=


1


R
~


1
,
1






h
~

1
T




h
~

7



;



R
~


1
,
8


=


1


R
~


1
,
1






h
~

1
T




h
~

8













R
~


2
,
2


=





h
~

2



=


R
~


1
,
1




;



R
~


2
,
3


=



1


R
~


2
,
2






h
~

2
T




h
~

3


=
0


;










R
~


2
,
4


=



1


R
~


2
,
2






h
~

2
T




h
~

4


=
0


;



R
~


2
,
5


=



1


R
~


2
,
2






h
~

2
T




h
~

5


=

-


R
~


1
,
6















R
~


2
,
6


=



1


R
~


2
,
2






h
~

2
T




h
~

6


=


R
~


1
,
5




;










R
~


2
,
7


=



1


R
~


2
,
2






h
~

2
T




h
~

7


=

-


R
~


1
,
8





;



R
~


2
,
8


=



1


R
~


2
,
2






h
~

2
T




h
~

8


=


R
~


1
,
7














R
~


3
,
3


=





h
~

3



=



R
~


1
,
1


=


R
~


2
,
2





;



R
~


3
,
4


=



1


R
~


3
,
3






h
~

3
T




h
~

4


=
0


;









R
~


3
,
5


=



1


R
~


3
,
3






h
~

3
T




h
~

5


=



R
~


1
,
7


=

-


R
~


2
,
8















R
~


3
,
6


=



1


R
~


3
,
3






h
~

3
T




h
~

6


=



R
~


1
,
8


=


R
~


2
,
7





;









R
~


3
,
7


=



1


R
~


3
,
3






h
~

3
T




h
~

7


=



R
~


1
,
5


=


R
~


2
,
6













R
~


3
,
8


=



1


R
~


3
,
3






h
~

3
T




h
~

8


=


-


R
~


1
,
6



=


R
~


2
,
5














R
~


4
,
4


=





h
~

4



=



R
~


1
,
1


=



R
~


2
,
2


=


R
~


3
,
3






;









R
~


4
,
5


=



1


R
~


4
,
4






h
~

4
T




h
~

5


=


-


R
~


1
,
8



=



R
~


2
,
7


=

-


R
~


3
,
6
















R
~


4
,
6


=



1


R
~


4
,
4






h
~

4
T




h
~

6


=


-


R
~


1
,
7



=



R
~


2
,
8


=

-


R
~


3
,
5







;









R
~


4
,
7


=



1


R
~


4
,
4






h
~

4
T




h
~

7


=



R
~


1
,
6


=


-


R
~


2
,
5



=

-


R
~


3
,
8















R
~


4
,
8


=



1


R
~


4
,
4






h
~

4
T




h
~

8


=



R
~


1
,
5


=



R
~


2
,
6


=


R
~


3
,
7














R
~


5
,
5


=






h
~

5



2

-


1


R
~


1
,
1

2




(






(



h
~

1
T




h
~

5


)

2

-


(



h
~

2
T




h
~

5


)

2

-








(



h
~

3
T




h
~

5


)

2

-


(



h
~

4
T




h
~

5


)

2





)












R
~


6
,
6


=











h
~

6

-


(



q
~

1
T




h
~

6


)




q
~

1


-


(



q
~

2
T




h
~

6


)




q
~

2


-


(



q
~

3
T




h
~

6


)




q
~

3


-


(



q
~

4
T




h
~

6


)




q
~

4





2

=




R
~


5
,
5









R
~


7
,
7



=







h
~

7

-


(



q
~

1
T




h
~

7


)




q
~

1


-


(



q
~

2
T




h
~

7


)




q
~

2


-


(



q
~

3
T




h
~

7


)




q
~

3


-


(



q
~

4
T




h
~

7


)




q
~

4





2

=



R
~


5
,
5


=




R
~


6
,
6









R
~


8
,
8



=







h
~

8

-


(



q
~

1
T




h
~

8


)




q
~

1


-


(



q
~

2
T




h
~

8


)




q
~

2


-


(



q
~

3
T




h
~

8


)




q
~

3


-


(



q
~

4
T




h
~

8


)




q
~

4





2

=



R
~


5
,
5


=



R
~


6
,
6


=


R
~


7
,
7















[

Equation





8

]







Therefore, the matrix {tilde over (R)} of Equation 7 can be represented by using a closed-form formula as shown in Equation 9. Equation 8 and Equation 9, which are equations that are newly derived according to the exemplary embodiment of the present invention, can simply calculate the matrix {tilde over (R)} by reducing the number of matrix elements to be calculated.










R
~

=

[





R
~


1
,
1




0


0


0




R
~


1
,
5






R
~


1
,
6






R
~


1
,
7






R
~


1
,
8






0




R
~


1
,
1




0


0



-


R
~


1
,
6







R
~


1
,
5





-


R
~


1
,
8







R
~


1
,
7






0


0




R
~


1
,
1




0



-


R
~


1
,
7







R
~


1
,
8






R
~


1
,
5





-


R
~


1
,
6







0


0


0




R
~


1
,
1





-


R
~


1
,
8






-


R
~


1
,
7







R
~


1
,
6






R
~


1
,
5






0


0


0


0




R
~


5
,
5




0


0


0




0


0


0


0


0




R
~


5
,
5




0


0




0


0


0


0


0


0




R
~


5
,
5




0




0


0


0


0


0


0


0




R
~


5
,
5





]





[

Equation





9

]







In addition, if {tilde over (q)}i, i=1, 2, . . . , 8, and denotes the i-th column of the matrix {tilde over (Q)}1, her matrix {tilde over (Q)}1 can be represented as shown in Equation 10 and each element of the matrix {tilde over (Q)}: can be represented as shown in Equation 11.

{tilde over (Q)}1=:[{tilde over (q)}1,{tilde over (q)}2,{tilde over (q)}3,{tilde over (q)}4,{tilde over (q)}5,{tilde over (q)}6,{tilde over (q)}7,{tilde over (q)}8]  [Equation 10]













q
~

1

=



1




h
~

1







h
~

1


=


1


R
~


1
,
1






h
~

1




;










q
~

2

=


1


R
~


2
,
2






h
~

2



;



q
~

3

=


1


R
~


3
,
3






h
~

3



;



q
~

4

=


1


R
~


4
,
4






h
~

4












q
~

5

=


1


R
~


5
,
5





(



h
~

5

-



R
~


1
,
5





q
~

1


-



R
~


2
,
5





q
~

2


-



R
~


3
,
5





q
~

3


-



R
~


4
,
5





q
~

4



)











q
~

6

=


1


R
~


6
,
6





(



h
~

6

-



R
~


1
,
6





q
~

1


-



R
~


2
,
6





q
~

2


-



R
~


3
,
6





q
~

3


-



R
~


4
,
6





q
~

4



)











q
~

7

=


1


R
~


7
,
7





(



h
~

7

-



R
~


1
,
7





q
~

1


-



R
~


2
,
7





q
~

2


-



R
~


3
,
7





q
~

3


-



R
~


4
,
7





q
~

4



)











q
~

8

=


1


R
~


8
,
8





(



h
~

8

-



R
~


1
,
8





q
~

1


-



R
~


2
,
8





q
~

2


-



R
~


3
,
8





q
~

3


-



R
~


4
,
8





q
~

4



)







[

Equation





11

]







When the matrixes {tilde over (Q)}1 and {tilde over (R)} are calculated in the above-described manner, the Equation 2 can be developed as Equation 12 by multiplying both sides of Equation 2 by {tilde over (Q)}1.

{tilde over (Q)}1Tr={tilde over (Q)}1THs+{tilde over (Q)}1Tn={tilde over (Q)}1T({tilde over (Q)}1{tilde over (R)})s+{tilde over (Q)}1Tn={tilde over (R)}s+{tilde over (Q)}1Tn  [Equation 12]


Equation 13 can be obtained by applying a minimum Euclidean detection method to the above formula, and a Euclidean metric can be calculated as shown in Equation 14.










S
sol

=

arg







min

S



(

S
M

)

8











Q
~

1
T


r

-


R
~


s




2







[

Equation





13

]













Q
~

1
T


r

-


R
~


s




2

=





y
-


R
~


s




2

=



(


y
8

-



R
~


8
,
8




s
8



)

2

+


(


y
7

-



R
~


7
,
7




s
7



)

2

+


(


y
6

-



R
~


6
,
6




s
6



)

2

+


(


y
5

-



R
~


5
,
5




s
5



)

2

+


(





y
4

-



R
~


4
,
4




s
4


-



R
~


4
,
5




s
5


-









R
~


4
,
6




s
6


-



R
~


4
,
7




s
7


-



R
~


4
,
8




s
8






)

2





+


(





y
3

-



R
~


3
,
3




s
3


-



R
~


3
,
5




s
5


-









R
~


3
,
6




s
6


-



R
~


3
,
7




s
7


-



R
~


3
,
8




s
8






)

2

+


(





y
2

-



R
~


2
,
2




s
2


-



R
~


2
,
5




s
5


-









R
~


2
,
6




s
6


-



R
~


2
,
7




s
7


-



R
~


2
,
8




s
8






)

2

+


(





y
1

-



R
~


1
,
1




s
1


-



R
~


1
,
5




s
5


-









R
~


1
,
6




s
6


-



R
~


1
,
7




s
7


-



R
~


1
,
8




s
8






)

2







[

Equation





14

]







Here, y={tilde over (Q)}1Tr and yi denote the i-th element of y.


In addition, SM denotes constellation and can be represented with M-ary pulse amplitude modulation (PAM) defined by Equation 15.

SM:={−√{square root over (M)}+1,−√{square root over (M)}+3, . . . , −1, 1, . . . , √{square root over (M)}−3, [√{square root over (M)}−1}  Equation 15]


Conventionally, symbols (si, i=1, . . . , 8) that minimize Equation 14 (i.e., Euclidean metric) are simultaneously obtained, but according to the exemplary embodiment of the present invention, the third transmission symbol and the last transmission symbol (i.e., x3 and x4) are detected first in order to reduce complexity. That is, real parts and imaginary parts (si, i=5, . . . , 8) of the symbols x3 and x4 that minimize the metric M1 of Equation 16 are detected first.

M1=(y8−{tilde over (R)}8,8s8)2+(y7−{tilde over (R)}7,7s7)2+(y6−{tilde over (R)}6,6s6)2+(y5−{tilde over (R)}5,5s5)2  [Equation 16]


Here, the four terms are independent, and therefore the real parts and the imaginary parts of the symbols x3 and x4 can be detected as shown in Equation 17.












s
^

k

=



S
M




(


y
k


R

k
,
k



)



,

k
=
5

,
6
,
7
,
8




[

Equation





17

]







Here, custom characterSM(•) denotes a projection function to the above-defined constellation SM. That is, this function searches for the closest constellation point among all constellation points of the constellation SM.


A real part and an imaginary part (si, i=1, . . . , 4) of each of the transmission symbols x1 and x2 are detected by using Equation 18. That is, the transmission symbols x1 and x2 that minimize the next metric M2 are detected.










M
2

=



(





y
4

-



R
~


4
,
4




s
4


-



R
~


4
,
5




s
5


-









R
~


4
,
6




s
6


-



R
~


4
,
7




s
7


-



R
~


4
,
8




s
8






)

2

+


(





y
3

-



R
~


3
,
3




s
3


-



R
~


3
,
5




s
5


-









R
~


3
,
6




s
6


-



R
~


3
,
7




s
7


-



R
~


3
,
8




s
8






)

2

+


(





y
2

-



R
~


2
,
2




s
2


-



R
~


2
,
5




s
5


-









R
~


2
,
6




s
6


-



R
~


2
,
7




s
7


-



R
~


2
,
8




s
8






)

2

+


(





y
1

-



R
~


1
,
1




s
1


-



R
~


1
,
5




s
5


-









R
~


1
,
6




s
6


-



R
~


1
,
7




s
7


-



R
~


1
,
8




s
8






)

2






[

Equation





18

]







A real part and an imaginary part (si, i=1, . . . , 4) of each of the transmission symbols x1 and x2 are calculated as shown in Equation 19.












s
^

k

=



S
M




(






y
k

-


R

k
,
5





s
^

5


-


R

k
,
6





s
^

6


-








R

k
,
7





s
^

7


-


R

k
,
8





s
^

8







R

k
,
k



)



,

k
=
1

,
2
,
3
,
4




[

Equation





19

]








FIG. 2 is a flowchart of a transmission symbol detection method at a receiving side according to the exemplary embodiment of the present invention.


Referring to FIG. 2, when a signal is received through a receiving antenna, a receiving side performs channel estimation by using the received signal in step S101, and generates an augmented channel matrix {tilde over (H)} that includes an estimated channel matrix H.


In Equation 2, the first two transmission symbols x1 and x2 (s1, s2, s3, s4) are received through channels hk,1 and hk,2 of the transmitting antenna 1 and the transmitting antenna 2, and other two transmission symbols x3 and x4 (s5, s6, s7, s8) are received through channels hk,3 and hk,4 of the transmitting antenna 3 and the transmitting antenna 4.


Therefore, the first two transmission symbols x1 and x2 can be more accurately detected when the channels hk,1 and hk,2 of the transmitting antennas 1 and 2 are in good condition, and the other two transmission symbols x3 and x4 can be more accurately detected when the channel hk,3 and hk,4 of the transmitting antennas 3 and 4 are in good condition.


Accordingly, when transmission symbol detection is performed in the above-described manner, the third and fourth transmission symbols x3 and x4 should be accurately detected for accurate detection of the first two transmission symbols x1 and x2. When the channels hk,3 and hk,4 of the transmitting antennas 3 and 4 are in better condition than the channels hk,1 and hk,2 of the transmitting antennas 1 and transmitting antenna 2, the first two transmission symbols x1 and x2 are detected first and then the other two transmission symbols symbol x3 and x4 are detected from better performance.


The receiving side checks channel condition of each transmission antenna, and determines whether Equation 20 is satisfied (S102).













k
=
1


n
r








(





h

k
,
1




2

+




h

k
,
2




2


)







k
=
1


n
r








(





h

k
,
3




2

+




h

k
,
4




2


)






[

Equation





20

]







When Equation 20 is satisfied, the augmented channel matrix {tilde over (H)} is QR-decomposed on the basis of Equation 8 to 11 (S103), the third and fourth transmission symbols x3 and x4 are detected (S104), and then the first two transmission symbols symbol x1 and x2 are detected by using the detected third and fourth transmission symbols x3 and x4 (S105).


When Equation 20 is not satisfied in step 102, the channel matrix H and a transmission signal vector s are rearranged as shown in Equation 21 in step S106, and the QR decomposition is performed on the augmented channel matrix {tilde over (H)} that includes the rearranged channel matrix H in step S107. The first two transmission symbols x1 and x2 are detected first in step S108, and the other two transmission symbols x3 and x4 are detected by using the two detected transmission symbols x1 and x2 in step S109.











[

Equation





21

]








H


=

[






[

h

1
,
3


]





-



[

h

1
,
3


]








[

h

1
,
4


]





-



[

h

1
,
4


]








[

h

1
,
1


]





-



[

h

1
,
1


]








[

h

1
,
2


]





-



[

h

1
,
2


]










[

h

1
,
3


]







[

h

1
,
3


]







[

h

1
,
4


]







[

h

1
,
4


]







[

h

1
,
1


]







[

h

1
,
1


]







[

h

1
,
2


]







[

h

1
,
2


]









[

h

1
,
4


]







[

h

1
,
4


]





-



[

h

1
,
3


]






-



[

h

1
,
3


]








[

h

1
,
2


]







[

h

1
,
2


]





-



[

h

1
,
1


]






-



[

h

1
,
1


]










[

h

1
,
4


]





-



[

h

1
,
4


]






-



[

h

1
,
3


]








[

h

1
,
3


]







[

h

1
,
2


]





-



[

h

1
,
2


]






-



[

h

1
,
1


]








[

h

1
,
1


]



































[

h


n
r

,
3


]





-



[

h


n
r

,
3


]








[

h


n
r

,
4


]





-



[

h


n
r

,
4


]








[

h


n
r

,
1


]





-



[

h


n
r

,
1


]








[

h


n
r

,
2


]





-



[

h


n
r

,
2


]










[

h


n
r

,
3


]







[

h


n
r

,
3


]







[

h


n
r

,
4


]







[

h

1
,
4


]







[

h


n
r

,
1


]







[

h


n
r

,
1


]







[

h


n
r

,
2


]







[

h


n
r

,
2


]









[

h


n
r

,
4


]







[

h


n
r

,
4


]





-



[

h


n
r

,
3


]






-



[

h

1
,
3


]








[

h


n
r

,
2


]







[

h


n
r

,
2


]





-



[

h


n
r

,
1


]






-



[

h


n
r

,
1


]










[

h


n
r

,
4


]





-



[

h


n
r

,
4


]






-



[

h


n
r

,
3


]








[

h

1
,
3


]







[

h


n
r

,
2


]





-



[

h


n
r

,
2


]






-



[

h


n
r

,
1


]








[

h


n
r

,
1


]





]











s


:=




[




[

x
3

]


,



[

x
3

]


,



[

x
4

]


,



[

x
4

]


,



[

x
1

]


,



[

x
1

]


,



[

x
2

]


,



[

x
2

]



]

T







=



:



[


s
1


,

s
2


,

s
3


,

s
4


,

s
5


,

s
6


,

s
7


,

s
8



]

T








In Equation 21, a channel gain order included in the channel matrix H and a location of a transmission symbol included in the transmission signal ( ) are reversed.


With reference to FIG. 3 to FIG. 5, an improved transmission symbol detection method will now be described in more detail.



FIG. 3 shows a typical SIC method in a case of using a binary phase shift key (BPSK) method, and FIG. 4 shows an SIC method in a case of using a BPSK method according to the exemplary embodiment of the present invention. FIG. 5 shows a determination area for determining a feedback detection value when the SCI method is applied to 16-QAM according to the exemplary embodiment of the present invention.


In the exemplary embodiment of the present invention, a successive interference cancellation (SIC) method is used for transmission symbol detection.



FIG. 3 shows a case of using a BPSK method as an exemplary use of the SIC method.


As shown in FIG. 3, when the SIC method is applied, the receiving side detects a transmission symbol by using a received signal, and thus the symbol is determined to be 1 when the received signal s has a value that is greater than 0. Otherwise, the symbol is determined to be −1. The determination value ŝ is a detection value of the symbol s, and this symbol detection value is used for the next symbol detection.


When using such an SIC method, previous accurate determination can result in the next accurate determination. However, previous inaccurate determination has a bad influence on the next determination. Particularly, feeding back an inaccurate determination value to the next determination is worse than feeding back nothing at all. For example, assume that the received signal value is +1 but the symbol is determined to −1. In this assumption, the next determination performance may become worse when the inaccurate symbol value (i.e., −1) is fed back to the next determination than when no value (i.e., 0) is fed back to the next determination. In addition, the probability of detecting an inaccurate detection value at the receiving side decreases as an absolute value of the received signal decreases.


Therefore, in order to improve performance of the SIC method, the determination area is changed as shown in FIG. 4 according to the exemplary embodiment of the present invention. Thus, when an absolute value of a received signal is smaller than a predetermined threshold value in detection value determination, 0 rather than the detection value is fed back. That is, the actual detection value is fed back only when it is greater than the threshold value. In FIG. 4, δ denotes the threshold value, ŝ denotes the actual detection value, and {tilde over (s)} denotes a value that is fed back to the next determination.


Although FIG. 3 and FIG. 4 show the case of using the BPSK modulation method, the present invention can be applied to M-QAM modulation, and FIG. 5 shows a determination area used for determining a detection value to be fed back when the SIC method is applied to 16-QAM. As shown in FIG. 5, when a received signal exists inside dotted lines, the receiving side uses a value given as a solid line between two dotted lines as a feedback value instead of using an actually detected value.


As described, when detection values ({tilde over (s)}k,=1, 2, . . . , 8) are determined for all transmission symbols, all the detection values, excluding {tilde over (s)}8, are substituted to Equation 17 so as to detect the imaginary part s8 of x4 as shown in Equation 22.












s
^

8

=



S
M




(







y
8




R
~


8
,
8



+


u

8
,
4





R
~


4
,
8



+








u

8
,
3





R
~


3
,
8



+


u

8
,
2





R
~


2
,
8



+


u

8
,
1





R
~


1
,
8











R
~


8
,
8

2

+


R
~


4
,
8

2

+


R
~


3
,
8

2

+


R
~


2
,
8

2

+


R
~


1
,
8

2




)










u

8
,
4


=


y
4

-



R
~


4
,
4





s
~

4


-



R
~


4
,
5





s
~

5


-



R
~


4
,
6





s
~

6


-



R
~


4
,
7





s
~

7











u

8
,
3


=


y
3

-



R
~


3
,
3





s
~

3


-



R
~


3
,
5





s
~

5


-



R
~


3
,
6





s
~

6


-



R
~


3
,
7





s
~

7











u

8
,
2


=


y
2

-



R
~


2
,
2





s
~

2


-



R
~


2
,
5





s
~

5


-



R
~


2
,
6





s
~

6


-



R
~


2
,
7





s
~

7











u

8
,
1


=


y
1

-



R
~


1
,
1





s
~

1


-



R
~


1
,
5





s
~

5


-



R
~


1
,
6





s
~

6


-



R
~


1
,
7





s
~

7








[

Equation





22

]







When the imaginary part s8 of x4 is detected, all the detection values, excluding {tilde over (s)}7, are substituted to Equation 17 so as to detect the real part s7 of x4. In the same manner as above, the real part and the imaginary part s6 and s5 of the candidate vector x3 are detected.


In addition, remaining transmission symbols are detected by using Equation 23.












s
^

k

=



S
M




(






y
k

-


R

k
,
5





s
~

5


-


R

k
,
6





s
~

6


-








R

k
,
7





s
~

7


-


R

k
,
8





s
~

8







R

k
,
k



)



,

k
=
1

,
2
,
3
,
4.




[

Equation





23

]







Until now, the transmission symbols have been detected by performing the detection process once at the receiving side. However, according to the exemplary embodiment of the present invention, the above-described transmission symbol detection process is iteratively performed at the receiving side so as to detect more accurate transmission symbols.



FIG. 6 shows an exemplary comparison result of a bit error rate (BER) between the transmission symbol detection method according to the exemplary embodiment of the present invention and typical ZF-SIC and MMSE-SIC methods. In this example, two receiving antennas and 4-QAM are used.



FIG. 6 shows that the transmission symbol detection method (i.e., proposed method) according to the exemplary embodiment of the present invention results in performance that is much closer to the ML detection method that the conventional detection methods (i.e., (ZF-SIC and MMSE-SIC). For example, in the BER of 10−3, performance of the proposed method is improved by 2 dB with zero iteration and 2.5 dB with one iteration.


The following Table 1 compares the amount of calculation in the two cases with the assumption of using two transmitting antennas and QPSK. One case uses the transmission symbol detection method (proposed) according to the exemplary embodiment of the present invention, and the other case uses typical ZF-SIC and MMSE-SIC methods.














TABLE 1






Floating


Floating




point
Floating
Floating
point



Addition/
point
point
Square
Total



Sub-
Multipli-
Divi-
root
CPU


Method
traction
cation
sion
calculation
cycles




















ZF-SIC
560
604
72
8
7492


MMSE-SIC
1072
1116
136
8
13,892


Proposed(iter = 0)
144
154
20
2
1934


Proposed(iter = 1)
276
286
40
6
3706









As shown in Table 1, the transmission symbol detection method according to the exemplary embodiment of the present invention requires much less calculation compared to the conventional methods (i.e., ZF-SIC and MMSE-SIC). For example, compared to the MMSE-SIC method, the proposed method requires an amount of CPU calculation of 14% with no iteration and requires an amount of CPU calculation of 27% with one iteration. That is, the proposed method according to the exemplary embodiment of the present invention can provide better performance with low complexity compared to the existing detection methods.


The above-described embodiments can be realized through a program for realizing functions corresponding to the configuration of the embodiments or a recording medium for recording the program in addition to through the above-described device and/or method, which is easily realized by a person skilled in the art.


While this invention has been described in connection with what is presently considered to be practical exemplary embodiments, it is to be understood that the invention is not limited to the disclosed embodiments, but, on the contrary, is intended to cover various modifications and equivalent arrangements included within the spirit and scope of the appended claims.

Claims
  • 1. A transmission symbol detection method of a multiple antenna system including a plurality of transmission antennas, the method comprising: estimating a first matrix comprising a channel matrix including a plurality of channel gains respectively corresponding to the plurality of transmission antennas by using a received signal;calculating a second matrix comprising an upper-triangle matrix and a third matrix comprising a unitary matrix from the first matrix; anddetecting a plurality of transmission symbols by performing successive interference cancellation (SIC) based on the second and third matrixes,checking a channel condition of each of the plurality of transmission antennas; anddetermining a detection order of the plurality of transmission symbols based on the channel condition,wherein the second matrix comprises a first component and a second component as diagonal components, where the first component corresponds to a first channel gain of the first matrix and the second component is calculated based on the first channel gain and on a second channel gain that is different from the first channel gain, and the second matrix further comprises a plurality of components determined by using the first channel gain and a plurality of channel gains that are different from the first channel gain,wherein the plurality of transmission symbols corresponds to a first symbol group including a pair of first and second symbols and a second symbol group including a pair of third and fourth symbols,wherein the determining of the detection order detects the first symbol group first before the second symbol group when a channel condition of the first symbol group is determined to be better than a channel condition of the second symbol group and comprises detecting of a plurality of transmission symbols that represent a minimum Euclidean metric by using the second and third matrixes, andwherein the detecting of the plurality of transmission symbols comprises detecting the first symbol group that minimizes a first metric and detecting the second symbol group that minimizes a second metric.
  • 2. The method of claim 1, wherein the determining of the detection order further comprises rearranging the first matrix and a transmission signal based on the detection order.
  • 3. The method of claim 1, wherein the detecting of the plurality of transmission symbols further comprises: detecting a plurality of detection values through successive interference cancellation (SIC);re-detecting the plurality of detection values by using the plurality of detection values; anddetecting the plurality of transmission symbols by iteratively performing the re-detecting of the plurality of detection values.
  • 4. The method of claim 3, wherein the detecting of the plurality of detection values comprises: detecting a first detection value that includes at least one value among first, second, and third values based on an absolute value of the received signal; anddetecting a second detection value by using the first detection value.
  • 5. The method of claim 3, wherein the detecting of the plurality of detection values comprises: checking a location of the received signal within a determination area that includes a plurality of areas respectively corresponding to the plurality of detection values and a plurality of boundaries respectively partitioning the plurality of areas;determining a value that corresponds to a location of a boundary as a detection value when the received signal is placed within a predetermined area from the corresponding boundary; anddetermining a value of an area where the received signal is placed outside the predetermined area from the corresponding boundary.
  • 6. The method of claim 1, wherein the second and third matrixes are obtained by QR-decomposing the first matrix.
Priority Claims (1)
Number Date Country Kind
10-2007-0128430 Dec 2007 KR national
US Referenced Citations (13)
Number Name Date Kind
7535970 Park et al. May 2009 B2
7720169 Reuven et al. May 2010 B2
7907677 Li et al. Mar 2011 B2
20050249302 Leshem et al. Nov 2005 A1
20060251061 Kim et al. Nov 2006 A1
20070086549 Kim et al. Apr 2007 A1
20070230628 You et al. Oct 2007 A1
20080049862 Dean et al. Feb 2008 A1
20080049863 Heiskala Feb 2008 A1
20080069262 Prasad et al. Mar 2008 A1
20080137782 Bahng et al. Jun 2008 A1
20080187066 Wang et al. Aug 2008 A1
20080279299 Reuven et al. Nov 2008 A1
Foreign Referenced Citations (5)
Number Date Country
10-2006-0108450 Oct 2006 KR
10-0659281 Dec 2006 KR
1020070057616 Jun 2007 KR
10-2007-0092872 Sep 2007 KR
2007064131 Jun 2007 WO
Related Publications (1)
Number Date Country
20090147894 A1 Jun 2009 US