The present invention relates to the field of decoding digital communications in overloaded channels.
In advanced spatial modulation (SM) schemes, only a fraction of transmit antennas are activated per symbol slot, via dispersion matrices which determine the activation patterns. This selection is determined by so-called index vectors which hold integer values corresponding to the index of the dispersion matrix to be simultaneously activated. The construction of the set index vectors is done naïvely in combinatorial order up to the state-of-the-art (SotA), however this leads to unequal allocations for the transmit antennas and hence a degradation in transmit diversity
Spatial modulation (SM) technique is a well-known technique for MIMO systems for which the present invention introduces a novel method to transmit additional information bits via transmit antenna selection (spatial dimension) on top of the traditional information bits via symbol selection (constellation dimension). From the traditional SM which selected only one antenna which restricted the total antenna number to a power of two, the generalized SM was developed to allow any number of total antennas by selecting a combination of multiple antennas out of the available transmit antennas.
Then transmit diversity is introduced to SM by combining the notion of space-time code (STC) with SM-MIMO, adding the temporal dimension by allowing multiple symbol periods within the code design. Significant works include the space-time shift keying (STSK) schemes based on a linear dispersion (LD) code by Sugiura et al, and space-time block coding (STBC) based schemes such as STBC-SM and STBC-CSM.
In parallel, a contrasting technique to improve the transmit diversity is introduced through the quadrature spatial modulation (QSM) scheme, where the traditional SM idea is applied separately in each of the real and complex components of the transmit signal.
The idea is supplemented with increased transmit diversity in diversity-achieving quadrature spatial modulation (DA-QSM). Finally, very recently, incorporating the STBC-SM idea to the DA-QSM, an Enhanced Diversity-Achieving Quadrature Spatial Modulation (EDA-QSM), which is shown to outperform all its predecessors
The SotA EDA-QSM scheme has the following limitations:
Through this approach, the vast stationary sources associated with massive MIMO systems can be efficiently utilized the fault requiring an equally large number of radiofrequency (RF) chain components. This efficient utilization of RF-chains makes SM schemes attractive for future wireless systems such as beyond fifth generation (B5G), which will continue to make extensive use of millimeter-wave (mmWave) bands, and sixth generation (6G) networks [6], which are expected to also incorporate Terahertz and visible light communications (VLC) bands.
A major drawback of early SM schemes is, however, that only one antenna is selected per transmission, which severely limits achievable SEs. In order to circumvent this limitation, a generalized spatial modulation (GSM) scheme was later developed, where multiple antennas are selected at each transmission, leading to substantial increase in SE. But another drawback of early SM methods including GSM schemes, was the exclusive focus on increasing SE without a matching effort to reduce BER, e.g., via the exploitation of transmit diversity. That limitation motivated the idea of combining SM with space-time coding (STC), examples of which are the space-time shift keying (STSK) schemes based on linear dispersion (LD) coding, the methods incorporating space-time block coding (STBC) and the spatial modulation with cyclic structure (CSM).
Based on this knowledge then it was proceeded for further optimize the SM transmitter design, leading to the discovery of quadrature spatial modulation (QSM) approaches in which the SM concept is independently applied to each of the real and imaginary components of the modulated signals, via dedicated spatial-temporal dispersion matrices. The idea was further developed in a succession of QSM techniques with progressively enhanced dispersion matrix designs, which include the diversity-achieving quadrature spatial modulation (DA-QSM) scheme by the incorporation of Alamouti codes, and the more recent enhanced diversity-achieving quadrature spatial modulation (EDA-QSM) method in which dispersion matrices are constructed using the full-diversity full-rate (FDFR) codes with block-by-block sphere-decodability of [24]. Among all aforementioned schemes, the EDA-QSM is the best QSM scheme known today, both in terms of BER and SE performance.
Despite these advantages, the EDA-QSM scheme, and as a consequence preceding QSM schemes, still have two major shortcomings. The first is that the dispersion matrices used in QSM schemes proposed so far are based on 2×2 STBCs, which limits both the diversity and coding gains achieved by the methods. With regards to that first limitation, we will in fact show in this article that QSM designs based on STBCs of a size T that does not scale with nT are fundamentally sub-optimal in the SE sense. The second shortcoming is that current QSM detection schemes are based either on exhaustive maximum likelihood (ML) or, at best, sphere detectors. Here, it is worth noting that it has actually been, contrary to previous claims, that sphere decoding has an average complexity that still grows exponentially with the number of jointly decoded symbol periods. That result was corroborated by some findings, where a cubic closed-form expression for the expected complexity of sphere detectors was derived, as well as, where it was shown that lattice-reduction does not improve the tail exponent of the complexity distribution of sphere detectors. With regards to that second limitation, it will be shown in this application that in fact the complexity of ML- and sphere detection (SD)-based QSM receivers are both geometric on nT and T, with P as exponent, such that these techniques are fundamentally non-scalable in the context of QSM systems. In other words, a severe and two-folded scalability challenge exists among current QSM schemes, namely, the absence of scalable transmitter and receiver designs.
Motivated by this challenge, in this application a new QSM solution that is both, at the transmitter side, scalable to arbitrary block sizes i.e., with no limits on nT, T and P, and, at the receiver side, decodable in polynomial time i.e., practical for large nT and T, with moderate P is contributed. As a bonus, which can be seen is that the proposed QSM scheme with every possibility to optimize SE, diversity and coding gains. To that end, we first introduce the optimal FDFR Golden STBC code of in the design of the QSM dispersion matrices. The Golden code is a fast-decodable STBC known to be optimal i.e., FDFR with highest coding gain over Gaussian constellations, and which was shown in to be constructible generally for arbitrary block sizes. The resulting optimized scalable QSM (OS-QSM) scheme is the first method proposed so far which has this feature.
The new OS-QSM design is further enhanced with a new algorithm to select the indices of the dispersion matrices employed in the scheme, which ensures that all transmit antennas are utilized as often and with the same likelihood over the transmission of multiple blocks, thus ensuring optimally diverse utilization of all spatial-temporal resources. Finally, in order to also ensure feasible decodability to the scalable transmitter design, a new greedy boxed iterative shrinkage thresholding algorithm (GB-ISTA) QSM detector based on sparse recovery methods is proposed.
Thanks to its sparse signal processing approach, the proposed decoding scheme does not require any restriction on the core code design, unlike preceding sphere-detection methods which requires block-diagonal fast-decodability. But in addition and most importantly, a major advantage of the new proposed GB-ISTA QSM receiver is that it does not require a search over the large codebook space, unlike the ML and state codewords matched block-by-block sphere decoding (SCMB-SD). In fact, the complexity order of the proposed receiver is shown to be cubic on T, quadratic on P, and only linear on nT.
All in all, the contributions of the article can be summarized as follows: Spectral Efficiency-Optimality: A closed form expression for the optimum number of encoded symbols P required for a QSM to achieve SE optimality are given, which combined to the rate-optimality condition of STBCs, highlights the importance of systematic scalability of the STBC size T in the design of SE-optimal QSM schemes.
In future wireless communication systems of beyond-fifth generation (B5G) and sixth generation (6G), one of the main expectations is that in the multiple-input multiple-output (MIMO) set-up, the number of transmit and receive antennas will be increased greatly to support the requirements.
The main issue or challenge with existing solutions arises when the system scales to the relevant large MIMO, which by the nature of the tree-searching algorithms, can make the SCMB-SD scheme impractical.
In other words, when the number of antennas increases, i.e., larger MIMO systems, spatial modulation becomes problematic/unfeasible.
The proposed (Greedy ISTA decoding) method is designed to decode the (Golden) Enhanced Diversity-Achieving Quadrature Spatial Modulation (EDAQSM) signal for higher order MIMO systems with an affordable complexity.
As indicating, spatial modulation is in practice not feasible when the number of antennas increases, i.e., larger MIMO systems. Therefore, all its benefits are not attainable in practice. The propose method reduces significantly the required complexity, making this feasible in practice for larger number of antennas (16×16 systems).
This invention has a significant impact for mmW-based communications, which is a direction of the growth field Advanced Connectivity Technologies.
The previous, in more simple terms, will enable communication systems with more capacity, more users per bandwidth unit to allow hyper-dense communication scenarios.
These and other objects, features and advantages of the present invention will become clearer when the drawings as well as the detailed description are taken into consideration.
These and other objects, features and advantages of the present invention will become clearer when the drawings as well as the detailed description are taken into consideration.
This problem was not addressed in any previous spatial modulation schemes leading up to the enhanced diversity-achieving quadrature spatial modulation (EDA-QSM), which is the SotA and no previous solution found.
In order to address the aforementioned problem and to remove the limitations of the SotA scheme (EDA-QSM), an optimal and scalable quadrature spatial modulation scheme (OS-QSM) is proposed. Specifically, the design regards the highlighted section of the QSM signal generation flowchart.
The OS-QSM leverages the full-diversity full-rate (FDFR) Golden STC and its generalization to FDFR Perfect STC, which achieves optimal coding gains upto T=6. By using these STCs in replacement of the Sezginer-Sari-Biglier (SSB) STBC utilized in the EDA-QSM, and applying necessary power adjustments and extensions to construct the final dispersion matrices of the QSM.
Specifically, in the dotted highlighted section of the QSM signal generation flowchart/block diagram in
The OS-QSM can be equally used for any systems and situations in replacement of previous SM schemes. Systems which is only able to support a fraction of RF-chains than the number of antennas would specifically benefit, as the nature of SM. Cellular network and V2X communications can be performed with better efficiency and data rate (eMBB).
Complex matrices and vectors are denoted in bold-face uppercase and lowercase letters, with their elements denoted by indexed normal lowercase letters, as in X, x and xi, respectively. The real and the imaginary parts of a complex number x are respectively denoted by xR and xI, respectively, and for the sake of future convenience we define for a complex vector x=[x1, x2, . . . , xn]T the associated decoupled vector x≙[x1R, x1I, . . . , xnR, xnI]T and corresponding quadrature representation
The quadrature operator (·) will also be applied to m×n complex matrices X, for which it yields the corresponding 2m×2n matrix,
In turn, the complex conjugate, transpose, Hermitian, trace, vectorization, and the diagonalization operators are denoted by (·)*, (·)T, (·)H, tr(·), ver (·), and dias (·) respectively, while the n x n identity and the m×n-sized all-zero and all-one matrices are respectively denoted by In, Om×n, and 1m×n. The p-norm p≥0 is denoted ∥·∥l, while |·| denotes either element-wise absolute value operation (for vectors) or cardinality (for sets), respectively, and the sets of real, complex, and integer numbers are denoted by ,
, and
, respectively. Expectation is denoted as
[·]. the floor to the nearest power of 2 is represented by [·]2, the conversion operation of a left-most-significant binary vector to the corresponding base-10 integer is denoted by [·](10). The binomial coefficient is denoted by (PQ), and ⊗ denotes the Kronecker product. The projection of a scalar v onto the set χ is denoted by
χ(ν) the complex Gaussian distribution with mean u and variance σ2 is denoted by ˜
(μ, σ2).
All the previous State of the Art spatial modulation (SM) schemes use ML such as in most spatial modulation (SM) or modified tree-search algorithms such as in the state of the art SM scheme of EDA-QSM to decode SM signals and no notable attempts on sparse detection or greedy approaches.
The tree-search algorithm is extremely unrealistic due to the highly combinatoric nature of the SM and the resulting search space size. Furthermore, the SM imposes various restrictions on the structure of the decoded signal such that naïve low-complexity decoding is impossible.
The problem associated with prior art is that there is no sparse detection solution for the problem. Solutions using other approaches features prohibitive complexity.
Massive multiple-input multiple-output (MIMO) systems in beyond-fifth generation (B5G) and sixth generation (6G) wireless communications expect incorporation of many transmit and receive antennas.
Utilization of Spatial Modulation (SM) and its variants such as quadrature spatial modulation (QSM) is one promising candidate for massive MIMO systems. However, as the system size grows, the classic decoding complexity of the SM schemes becomes infeasible (i.e., complexity is not affordable) as the SotA uses maximum likelihood (ML) decoding or ML based tree-search algorithms.
The method constructs the set which has equal multiplicities of the transmit antenna activation, which ensures maximum possible transmit diversity, like it is shown in
All existing spatial modulations schemes benefit, as all spatial modulation schemes already utilize index vector selection (or can be reformulated such). The scheme can be used to increase data rate and increase efficiency in cellular networks and V2X communications (eMBB).
These and other objects, features and advantages of the present invention will become clearer when the drawings as well as the detailed description are taken into consideration.
The proposed decoder possesses significantly low complexity compared to the existing ML and tree-search algorithms. The decoder possesses a quadratic complexity on the number of transmit antennas.
Furthermore, the proposed decoder also does not require design restrictions such as block-diagonality or orthogonality in the transmission scheme, only the sparsity which is inherent with spatial modulation schemes, therefore providing larger freedom in transmitter development as well. In other words, the proposed decoder is capable of coping with many different encoding structures (flexibility).
The decoder can be used in any MIMO system where the number of antennas is expected to be large, such that ML approaches are infeasible. The scheme can be used to increase efficiency in cellular networks and V2X communications (eMBB).
These and other objects, features and advantages of the present invention will become clearer when the drawings as well as the detailed description are taken into consideration.
One embodiments of Optimal and Scalable Quadrature Space-Time Modulation (OS-QSM) method configuring a plurality of transmit antennas configuring a plurality of transmit antennas to each represent an in-phase spatial constellation symbol within an in-phase spatial constellation, and a quadrature spatial constellation symbol within a quadrature spatial constellation, mapping source data to the in-phase spatial constellation symbols and the quadrature spatial constellation symbols represented by the plurality of transmit antennas, wherein the method is applying an optimal and scalable quadrature spatial modulation scheme (OS-QSM) resulting in a maximum possible coding gain in the resultant quadrature spatial modulation.
Another embodiment of the computer-implemented decoding method is characterized by a modification to the iterative shrinkage-thresholding algorithm (ISTA) via boxing, range limiting and hard-thresholding.
Another embodiment of the computer-implemented decoding method is characterized by proceeding the iterative shrinkage-thresholding algorithm via boxing-hard (ISTA), a greedy selection of the positions of the antennas index and the symbol estimates, and their independent decoding of the corresponding antenna modulated and symbol modulated bits.
Another embodiment of the computer-implemented decoding method is characterized by, wherein process working parallel to the greedy detections, to ensure valid estimates of the index vectors from the given finite set of index vectors are produced as an output and to apply interference cancellation with the confirmed values.
Another embodiment is characterized by the generalization of the Golden code and in combination with spatial modulation an operating calculation with a highly sparse received signal is done, without causing large multi-user interference for the overlapping of multiple users.
Another embodiment is characterized by making the signals per-user more-sparse, again allowing for even more users to be overlapped without increasing effective multi-user interference.
Another embodiment is characterized by a receiver (R) of a communication system having a processor, volatile and/or non-volatile memory, at least one interface adapted to receive a signal in a communication channel, wherein the non-volatile memory stores computer program instructions which, when executed by the microprocessor, configure the receiver to implement the decoding method of one or more embodiments cited above.
Another embodiment is characterized by a receiver by computer program product comprising computer executable instructions, which, when executed on a computer, cause the computer to perform the decoding method of one or more embodiments cited above.
Another embodiment is characterized by a computer-readable medium storing and/or transmitting the computer program product cited above.
Another embodiment is characterized by vehicle unit comprising a communication system with a receiver (R) in a vehicle wherein the system is adapted to execute the method according to one or more the decoding method of one or more embodiments cited above.
Another embodiment is characterized by a vehicle having one or more vehicle units cited above.
All aspects in this application can be integrated in a mobile devices, base station and components in wireless systems. All the describes components can be integrated in vehicles.
For a fuller understanding of the nature of the present invention, reference should be had to the following detailed description taken in connection with the accompanying drawings in which:
Quadrature spatial modulation (QSM) schemes are considered, which are capable of conveying large numbers of bits while a combination of transmitting a relatively small number P all M-ary modulated symbols from a dynamic selection of n transmit into mass, according to a designed dispersion pattern.
Following are detailed descriptions of concepts, system/network architectures, and detailed designs for many aspects of a wireless communications network targeted to address the requirements and use cases for 5G. The terms “requirement.” “need,” or similar language are to be understood as describing a desirable feature or functionality of the system in the sense of an advantageous design of certain embodiments, and not as indicating a necessary or essential element of all embodiments. As such, in the following each requirement and each capability described as required, important, needed, or described with similar language, is to be understood as optional.
In the discussion that follows, this wireless communications network, which includes wireless devices, radio access networks, and core networks, is referred to as “NX.” It should be understood that the term “NX” is used herein as simply a label, for convenience. Implementations of wireless devices, radio network equipment, network nodes, and networks that include some or all of the features detailed herein may, of course, be referred to by any of various names. In future development of specifications for 5G, for example, the terms “New Radio,” or “NR,” or “NR multi-mode” may be used—it will be understood that some or all of the features described here in the context of NX may be directly applicable to these specifications for NR. Likewise, while the various technologies and features described herein are targeted to a “5G” wireless communications network, specific implementations of wireless devices, radio network equipment, network nodes, and networks that include some or all of the features detailed herein may or may not be referred to by the term “5G.” The present invention relates to all individual aspects of NX, but also to developments in other technologies, such as LTE, in the interaction and interworking with NX. Furthermore, each such individual aspect and each such individual development constitutes a separable embodiment of the invention.
Consider a point-to-point (P2P) MIMO communication system in which a transmitter equipped with nT transmit antennas exchanges information with a receiver equipped with nR receive antennas employing SM. The received signal corresponding to T consecutive time slots during which the channel is assumed to be constant can be compactly written as
Where Y∈n
n
(0, 1), X∈
n
n
(0, N0) where N0 is the noise variance.
It is assumed hereafter that the quasi-static Rayleigh fading channel matrix H is known at the receiver but not at the transmitter, and it is remarked that since the channel power per matrix entry is unitary, the fundamental signal-to-noise ratio (SNR) is given by
In turn, in accordance with related QSM literature and as illustrated in
where sp=spR+jspI, with p={1, . . . , P}, are transmit symbols chosen from a complex constellation constellation S of cardinality |S|=M; AK={Aq}q=1Q∈
n
={Bq}q=1Q
n
={kn}n=1N ∈
P, with N≙[(PQ)]2X.
With regards to equation (2), and again referring to
In view of the above, it can be said that the design of a specific QSM scheme amounts essentially to the method employed in the construction of each of the Q dispersion matrices Aq and Bq in the sets A and B, and the selection of the set K containing the index vectors kR and kI which inform the choices of dispersion matrices used in each transmission.
To exemplify how state-of-the-art (SotA) QSM schemes can be cast into the general framework described by equation (2), consider first the QSM scheme. In this case, the dispersion matrices reduce to dispersion vectors (i.e., T=1 and Q=nT) which are given by
where eq is the q-th column of IQ, and no specific design criteria are given for the selection of the indices in the index vectors kR and kI.
In turn, in the DA-QSM scheme, two-column dispersion matrices (i.e., T=2 and Q=nT) are employed so as to exploit transmit diversity. In particular, in this scheme
with
where Mn is an n×n cyclic lower-shift matrix, Mn Is obtained by circularly shifting the bottom row of In to the top, such that, e.g.,
such that its (q-1)-th power pre-multiplied to a given matrix results in a shift of the bottom (q-1) rows of the latter to the top.
From the above it is visible that the DA-QSM scheme improves over the QSM scheme essentially by adding diversity, i.e., by extending the transmission instances from T=1 to T=2. However, the dispersion matrices of the DA-QSM method are still real, just as those of the QSM scheme, implicating that no additional multiplexing capability is aggregated, and that coding gains is not optimized.
In contrast, the EDA-QSM method improves over the latter on both aspects. In particular, in this scheme the dispersion matrices are more elaborately designed as
where eI is the I-th column of IL, with L≙nT/2, the indices i∈{1, . . . , 4} and I∈{1, . . , L}, and the core matrices Ci and Di are based on the Sezginer-Sari-Biglieri (SSB) STBC described by
Through the concise description above it becomes easy to see that the fundamental distinction between the DA-QSM and the EDA-QSM methods is that the dispersion matrices of EDA-QSM are complex-valued, such that the orthogonality between the real and imaginary dimensions are better exploited in order to reap multiplexing and coding gains.
Two fair criticisms that can be made of the aforementioned schemes—and in fact, to the best of our knowledge of all existing SotA QSM methods proposed so far—are, however: a) that the scheme does not scale systematically simultaneously over space and time, for arbitrary T>2; and b) that the coding gain achieved is not optimum. Mitigating these two limitations is the objective of our first contribution described in the following section.
Given the number of bits carried by the transmission of each QSM transmit symbol X as per equation (2), and the fact that such transmission requires T successive channel uses, the SEζ of any QSM scheme is given by
where we recall that Q ≙TnT and adopt a notation meant to emphasize that P and T are seen as fundamental QSM design parameters, while M and nT are considered to be system constraints
The presence of the binomial coefficient (PQ) in equation (8) implicates that the SE function ζ(P, T; M, nT) is monotonically descending on T, for a fixed P, and concave on P, for a fixed T, as well as on the ratio P/T. This is well illustrated in the plots offered in
Motivated by the discussion above, we seek analytical expressions for the optimum ratio P/T that maximizes the SE, given nT and M, which in turn can be used to determine the relative SE reduction incurred in setting T<nT for large-scale systems with nT→∞. To this end, consider the upper and lower-bounds on the binomial coefficient, namely
where for future convenience we implicitly defined the upper-bounding function β(P; Q).
Using equation (9) into equation (8) yields the bound
Taking the derivative of the latter expression with respect to P yields
where in the second line we relax the constraint that PεN and expressed more generally P=εQ, introducing the positive quantity ε≤1.
Equating the expression in equation (11) to zero yields the following analytical implicit expression to determine the optimal number of symbols P* that maximizes the SE of a QSM system with Q=TnT spatial-temporal resources and employing an M-ary constellation
where we emphasize that the quantity on the righthand side of the expression is in fact sought after number of transmitted symbols P.
But recalling that the desired P* is also the largest possible, equation (12) implies that
which in turn implies that the optimum ε is such that
i.e., the solution of the quadratic polynomial (M-1)=ε2−2Mε+M, which finally yields, simply
where we introduced the implicitly-defined optimum gradient
We emphasize that the elegant result offered in equation (14) is general for any QSM scheme. From this result it is seen that the optimum ratio P/T that maximizes the SE of the QSM scheme is linear on the number of transmit antennas nT. In other words, for any given M and nT, an SE-optimum QSM must be such that P/T scales linearly with nT, as illustrated and confirmed by the simulation results shown in
This means,
Recall also that QSM dispersion matrices are generally constructed with basis on STBCs characterized by T×T square encoding matrices. Consequently, it follows that if P must scale with nT in order for the QSM to be SE-optimal, so must the size T of the code, in order for the the underlying STBC itself to retain SE-optimality. In other words, equation (14) also implicates that in order to achieve SE-optimality, a QSM scheme conveying M-ary symbols must employ an underlying full-rate STBC of a size that scales proportionally to the number of transmit antennas nT
It must be remarked, that setting T=nT is not a scalable proposition, not only because it implies furbishing the transmitter with an equal number of RF chains, which can be prohibitively expensive, but also because it results in fully dense signals, which in turn require also prohibitively complex ML receivers. This observation motivates the comparisons given in
In view of these results, in the next section it is introduce the a new QSM transmitter design, including both the description of how to construct QSM dispersion matrices based on optimal STBCs of arbitrary size, as well as a new systematic mechanism to obtain the associated set of index vectors used in their selection during transmission. For clarity of explanation, we first take the simpler example of the 2×2 case, to introduce the construction of dispersion index set for optimal diversity gain. The extension of the scheme to generalized T follows subsequently.
Before describing the proposed dispersion matrix construction let us, without loss of generality and to facilitate comparison with existing methods, impose the assumption that the transmit signal matrix X as per equation (2) satisfies the unity average transmission power constraint for each active transmit antenna, such that [tr(XHX)]=PT under constellations with unity average power symbols. Then, consider the 2×2 Golden code, which compactly encodes four symbols {s1, s2, s3, s4} into the matrix.
where θ and
The construction of QSM dispersion matrices based on the latter Golden code follows from the decomposition of SG into the auxiliary matrices Ci and Di, which are used to modulate the real part siR and imaginary part siI of each i-th symbol encoded, respectively, such that
where
With
and note that post-multiplying the circular lower-shift matrix Mn to a given matrix X results in a column-wise circular shift of X to the left. In possession of the above auxiliary matrices, the Golden dispersion matrices are then built using the Kronecker product operations following a similar strategy namely
Regarding the scaling factor in equation (18), the denominator 1/sqrt(5) is passed over from the coefficient of the Golden code as in equations (15) and (16), while the numerator sqrt(2) is the result of power scaling required to ensure that the transmit power constraint [tr (XHX)]]=PT is satisfied. To elaborate further, from equations (2) and (18) it follows that
[tr (XHx)]]=PT implies that the dispersion matrices must satisfy tr(AqHAq)=T and tr(BqHBq)=T, for all q∈{1, . . . , Q}, whereas from the construction of the auxiliary matrices Ci and Di as per equations (17) it is evident that tr(CiHCi)=1 and tr(DiHDi)=1, such that a power scaling of T=2 onto Ci and Di, i.e., an amplitude scaling of sqrt (2) onto Ci and Di, is needed.
The Golden codes are known to outperform the SSB codes employed in the EDA-QSM scheme, while having structure very similar to the latter, such that their utilization in the construction of dispersion matrices as described above is, in and of itself, bound to improve the performance of QSM schemes over those briefly described, as shall be demonstrated later via simulated comparisons.
There is, however, another mechanism to improve the performance of QSM schemes employing STBCs, namely, to optimize the selection of the index vectors in ={kn}n=1N∈
P that determine which dispersion matrices are assigned to the real and imaginary parts of each encoded symbol. This is because each index vectors kn is, according to equations (17) and (18), associated with different subsets of spatial-temporal resources utilized by the QSM scheme in the transmission of a given set of spatially encoded bits. To illustrate the issue, define the set K* of all of all (PQ) distinct index vectors for a given pair (P, Q), and consider the corresponding example compiled in Table I for the case P=3 and Q=2nT=8.
Recall also that each dispersion matrix in the transmission of spR or spI uses two given pairs of antennas and time slots, as per equations (17) and (18), such that for the sake of conciseness it is hereafter referred to each pair of one antenna and one time slot simply as a spatial temporal resource rq, defining also for future convenience the set of all available and utilized spatial temporal resources, denoted respectively by R* and R. Then, if resources and dispersion matrix indices are represented by a rectangular and a circular nodes, respectively, a bipartite graph such as the one shown in
As illustrated by the graph, the inclusion of a given index set kn from K* into the set K is associated with the use of certain resources, occasionally with multiplicity, identified by the graph edges intercepted by the enclosure encircling the corresponding indices. We shall therefore use the notation kn⇒rn to indicate that the index set kn implicates the utilization of the set of resources rn, and μkn (rq) to denote the multiplicity of the resource rq in the set kn.
For example, the use of the resources r1={2×(1, 1), (1, 2), (2, 1), 2×(2, 2)} results from having k1=[1, 2, 3] in K, such that it may be written concisely k1⇒r1, with μk1 (1, 1)=μk1 (2, 2)=2. Similarly, k37=[3, 4, 5]⇒r37={(1, 1), (1, 2), (2, 1), (2, 2), (3, 1), (4, 2)}, and k54=[5, 6, 8]⇒r54={(3, 1), 2×(3, 2), 2×(4, 1), (4, 2)}, with μr37 (3, 2)=μr37 (4, 1)=2.
It is evident from all the above that in order to avoid redundancy and uneven utilization of spatial-temporal resources, so as to optimize the performance of QSM schemes, the sets of dispersion matrix indices K (with con (i.e., kn≢km, ∀n≢m,);) must satisfy the following conditions:
As an example, we highlight in Table I the set of index vectors K={k1, k2, k3, k5, . . . , k8, k10, k11, k19, . . . , k23, k26, k27, k28, k35, . . . , k38, k41, k42, k47, k48, k50, . . . , k56}. The reader can verify that by this choice of K, all resources in the associated set R have multiplicity 24. In contrast, a naïve truncation of the first 32 index vectors in Table I, i.e. K={k1, . . . , k32}, leads to an uneven utilization pattern in which μK (1, 1)=μk(2, 2)=32, μk(1, 2)=μk(2, 1)=28, μk(3, 1)=μk(4, 2)=19 and μk(3, 2)=μk(4, 1)=17, which is obviously sub-optimum as it leads to antennas 1 and 2 being used far more often than antennas 3 and 4. The problem of selecting the optimum set K as described and illustrated above relates to a classic problem in combinatorics graph theory known as the Vertex Cover Problem. In the context hereby, however, the problem has the additional difficulties that: a) the graph in question is bipartite, b) coverage with equal multiplicity is required, and c) nodes must be selected in subsets of three at a time.
* and Resources
* (P = 3, nT = 4, T = 2)
*
*
*
*
*.
.
= ∅;
| ≠ └(PQ)┘2× do
of selected index vectors;
;
= ∅ of candidate index vectors;
| = 0 do
of candidate indices with the D lowest multiplicities in
;
of all (PD) index vectors {tilde over (k)}m with indices in k;
all index vectors already in
;
| = 0 then
in
*;
Due to these peculiarities, the problem itself is, to the best of our knowledge, original and cannot be solved by known variations of the Vertex Cover algorithm. Fortunately, the highly symmetric structure of the associated bipartite graph can be exploited to design an efficient method to solve the selection problem at hand. To that end, let us commit a slight abuse of notation and define the multiplicity of a dispersion matrix index (notice that there is no ambiguity with the definition of multiplicity of resources because dispersion matrix indices are single numbers, while spatial temporal resources are pairs) q in the set K as μk (q). Then, by virtue of the symmetry of the graph, as it can be seen in
Due to the greedy optimal index vector selection algorithm described above, which is general on P, T and nT, the last limiting factor preventing the generalization of QSM to arbitrary T is the construction of the dispersion matrices with basis on
STBCs of arbitrary size. This obstacle is eliminated by considering the design of QSM dispersion matrices based on the Perfect FDFR STBC.
A T×T FDFR STBC encodes T2 symbols such that the average energy transmitted per antenna is normalized to unity, an energy efficiency-shaping constraint is enforced, and a SE-preserving lower bound on the coding gain (a.k.a, non-vanishing determinant) is maximized. Ultimately, for given T∈N+ the design can be described by
where st=[s1+(i-1)T, s2+(i-1)T, . . . , sT]T, with t={1, . . . , T} are vectors each carrying T distinct transmit symbols, R is a T×T optimum lattice generating matrix], JT,n is a T×T matrix constructed by replacing the last n diagonal entries of the identity matrix by the elementary complex number j, and NT is a T×T cyclic upper-shift matrix (notice that JT,n generalizes J2,1 used in equation (17). In turn, oppositely to Mn, Nn is obtained by circularly shifting the top row of In to the bottom. Some examples are
such that post-multiplying it to a given matrix X results in a column-wise shift of X to the right.
Notice that the Perfect FDFR STBC fully generalizes the 2×2 Golden code of. To see that, suffice it to consider the case T=2 and with the corresponding lattice generating matrix
such that equation (19) yields
It follows that in order to be employ Perfect FDFR STBCs in the design of QSM, suffice it to decompose the core code structure of equation (19) in terms of corresponding auxiliary dispersion matrices Ci and Di due to symmetry, namely
where the generalized indices i∈{1, . . . , 72} are constructed systematically on t∈{1, . . . , T} and w∈{1, . . . , T}, and et is the t-th column of IT.
Following this, the full set of dispersion matrices A and B can be built, i.e.,
where again q∈{1, . . . , Q}, i∈{1, . . . , T2} as from equation (21), eI is the I-th column of IL, but I∈{1, . . . , L} with L=[nT//T], as well as a generalized scaling factor y determined depending on the specific STBC in order to adjust the powers of the dispersion matrices such that tr(AqHAq)=T and tr(BqHBq)=T.
Next, we turn our attention to the construction of the optimal set of index vectors K, via a straightforward generalization of the method described in Subsection III-B. Indeed, as can be learned by inspecting equation (21), each auxiliary matrix Ci and Di is a T×T sparse matrix obtained from a cyclic rotation of a diagonal matrix containing only T non-zero elements of R.
|, and N = |
| = └(PQ)┘2×;
, optimum lattice generating matrix R,
= {Aq}q=1Q and
= {Bq}q=1Q with Aq and Bq as in eq. (22),
obtained from Algorithm 1.
;
;
, with sp = spR + jspI;
Consequently, the associated dispersion matrices obtained from equation (22) are all sparse matrices with only T non-zero entries, corresponding to the T spatial-temporal resources utilized. In other words, while in the Golden QSM scheme of Subsection III-B each dispersion matrix index q is associated with 2 resources, in the Perfect STBC-based construction here described each index q associates to T resources, such that the corresponding bipartite graph illustrated in
Together, Method 1 and 2 introduced above demonstrate that the design of OS-QSM transmitters is possible and tractable. There is, however, no true scalability without feasibility, such that in order to complete the task it is also necessary to show that the proposed OS-QSM design is effectively decodable at reasonable complexity. To put the challenge into context, for given P, M, T and nT, with Q=T . . . nT, an ML receiver would have to go through ([(PQ)]2×)2·MP combinations of symbols and selected spatial-temporal resources in order to detect a sequence of 2·[log2(PQ)]+P·log2 M. That means that even for the minimal setting of T=2, P=2 and M=4, a system with nT=8 transmit antennas would require the receiver to go through ([(PQ)]2×)2·(4)2=16.777.210 combinations in order to decode the corresponding log 2 (16.777.216)=24 bits. In other words, ML decoding is highly impractical in QSM systems, especially in the context of massive MIMO systems.
We emphasize that this challenge applies not only to the OS-QSM scheme of Subsection III-B, but also to current SotA QSM methods, as the example given above is for T=2, which is the size of the core codes used in the latter. We furthermore stress that the utilization of SD receivers is also not viable in scaled cases, because the nature of tree search algorithms still requires excessive computational complexity in large systems. Finally, it is remarked that since convenient properties such as fast-decodability and block-diagonality are known not to be retainable without sacrifice of optimality for STBC of arbitrary size, a scalable detector for QSM schemes cannot rely on such features.
In light of the above, we introduce hereafter a new detection method for QSM schemes which relies neither on tree-search, nor on specific properties of STBCs, and which is completely independent of the infeasible combinatorial factor [(PQ)]2×. In addition, given prior information on the encoding construction, the proposed decoder is valid to detect any QSM signal.
The core idea of our approach is to take full advantage of a sparse representation of QSM signals over the entire channel (i.e., for all spatial temporal resources available), assumed known at the receiver. The proposed decoding method then leverages the iterative shrinkage thresholding algorithm (ISTA) to greedily extract symbol and dispersion index estimates, resulting in significantly lower complexities compared to ML and SD-based methods. To that end, first combine equations (1) and (2), and consider the vectorized form of the QSM received signal
where we implicitly defined the block-diagonal channel matrix OH and vectorized noise v; the dispersion matrices in A and B are also vectorized into aq-≙vec(Aq) and bq ≙vec (Bq) and concatenated ΞA≙[a1, . . . , ag]∈Q×Q and ΞB=[b1, . . . , bQ]∈
Q×Q respectively; and un∈
Q×1 (respectively uI ∈
Q×1) is set to zero everywhere, except for its elements of indices kR ∈
(respectively kI ∈
), which are set to {S1R, . . . , sPR} (respectively {S1I, . . . , SPI})
Equation (23) can be further simplified by defining the combined and real-imaginary decoupled information and noise vectors
as well as the decoupled versions of aq and bq, namely
which in turn can be combined into a single dispersion matrix ΨD ∈2Q×2Q, namely
such that the vectorized system model of equation (23) can be re-written as
where {hacek over (Φ)}H is the quadrature-operated block diagonal channel matrix ΦH which we implicitly relabeled ΦH, as with the effective channel matrix G≙ΦH·ΨD, for future convenience.
To elaborate on equation (27) with an example, consider a system with P=3, T=2 and nT=4, and assume that for a particular bit sequence b=[bR, bI, bs], the selected index vectors are given by kR=k10=[1, 3, 7] and kI=k47=[4, 5, 7]. Then, the corresponding combined information vector becomes u=[S1R0, 0, 0, S2R, 0, 0, S1I, 0, S2I, 0, 0, S3R, S3I, 0, 0]T Notice that while u carries in the entries sPR and sPI the Plog2 M bits corresponding to the bs subsequence, the remaining 2 log2 N bits corresponding to the subsequences bR and bI are encoded merely by positions of non-zero elements in u, regardless of what the values of SPR and sPI might be, which suggests that the detection of bs could be done separately from that of bR and bI.
In principle, the latter feature could be utilized to design an SD receiver for the OS-QSM method proposed above, similarly to how block-separability was exploited to do so for the EDA-QSM scheme. The problem with that approach is, of course, the prohibitively large number of combinations how the 2P elements of the decoupled symbol vector S=[S1R, S1I, . . . , SPR, SPI] can be placed among the 2Q entries of u. In order to circumvent this challenge, we instead seek to exploit the facts demonstrated in Subsection III-A, namely, that: a) the optimum number P* of symbols maximizing SE is a fraction of the total spatial-temporal resources Q=T·nT, as per equation (12); and b) that in large-scale systems with nT>>1, a significantly smaller block size T suffices to asymptotically achieve SE optimality, as shown in
Taking into account the focus on scalability, which at the receiver side translates to controlling complexity, two suitable candidate methods to be applied for OS-QSM demodulation are the generalized approximate message-passing (GAMP) algorithm, and the iterative shrinkage thresholding algorithm (ISTA), both of which possess quadratic complexity on the size 2TnT of the signal vector u. It is well-known, however, that the GAMP algorithm relies strongly on the particular structure of measurement matrix and the independence of the received signal, which in the case of QSM cannot be generally assumed, as a direct consequence of the utilization of STBCs in the dispersion matrices. In the absence of the required conditions, GAMP receivers yield poor performance, characterized by error-floors at high SNRs.
Motivated by this fact, it is therefore chosen to follow a ISTA-based approach in the design of a low-complexity demodulator for QSM systems, which is described in the sequel. In particular, it is introduced a method to detect QSM signals, which is based on a purpose-built variation of ISTA that incorporates modifications both on the thresholding function and on the index vector estimation process, specifically to QSM detection.
Consider the standard ISTA recursion,
where u ( ) is the estimate of u at the n-th iteration, α=maxeig (GTG) is the shrinkage step size (the actual requirement is that α>maxeig (GTG), however, we will assume the minimum step-size, which is sufficient), λ is the threshold factor, and Λ(s; T) is the soft-thresholding function. A first meaningful modification to such standard ISTA recursions in equation (28) is to account for the fact that the symbols in the real-valued projected constellation SR ≙(S) are finite, such that in addition to the lower limit T in the vicinity of the origin used to enforce sparsity in the solution, an upper limit max (SR) can be introduced into the thresholding function. In other words, for the case at hand we replace ISTA's standard soft-thresholding function Λ(s; T) by a hard-thresholding function leading to the “boxed” hard-thresholding function Π(s; T) illustrated in
Incorporating this modification yields the boxed-hard ISTA (BH-ISTA) receiver described by
Notice that the computational cost of repeatedly evaluating equation (30) is dominated by the term Gû(n), therefore quadratic on the number of non-zero entries (i.e., l0-norm) of û(n), which reduces with the iterations n, as illustrated in
In particular,
It can in fact be seen that as a result of boxing and hard-thresholding, |ûΠ(0)|0<|ûΛ(0)|0, such that the expected order of complexity associated with evaluating equation (28) is lower than that of evaluating (30), which can be bounded both below and above by the lower- and upper-limits (O(4P2) and O(4Q2)).
More details will be given in Section V-A. In turn,
Let us consider that multiple runs of the BH-ISTA iterations described by equation (30) are performed, such that prior to the m-th run a modification is made to y, G and u, which can be expressed by rewriting equation (30) as
where we convene that for the first run (m=1) we set y1=y, G1=G and
Let n* be the last iteration of the m-th run of the latter estimator, with its corresponding outcome denoted by ûm(n*). And finally, let sa {tilde over (s)}qm be the entry of ûm(n*) with the largest amplitude whose position is denoted by {circumflex over (q)}m, such that we may write
where [x]] denotes the I-th element of a generic vector x. It is emphasize that in the greedy procedure summarized by equation (32), two distinct pieces of information on the bit sequence b are obtained, namely, a soft estimate {tilde over (S)}qm of one of the modulated symbols {SPR, sPI}∈S., and a hard estimate {circumflex over (q)}m, of one of the indices contained in the selected index sets {kR, kI}∈K. In possession of such information, the following steps are then executed in order to produce the modified quantities required to perform the next run of the BH-ISTA recursion described by equation (31).
First, a hard-detected version of {tilde over (s)}m is obtained by projecting in onto SR, that is
Then, the remaining quantities are updated following
where I2Q is the identity matrix of size 2Q and e{circumflex over (q)}m its {circumflex over (q)}m column. Recall that due to the quadrature-decomposed structure of the sparse vector u, all odd index estimates q{circumflex over ( )}m correspond to the real parts of modulated symbols, while even {circumflex over (q)}m correspond to the imaginary parts, respectively. It is therefore sensible that, as equations (31) through (35) are evaluated iteratively, the obtained index estimates {{circumflex over (q)}1, {circumflex over (q)}2, . . . , {circumflex over (q)}m} be split and collected accordingly into the subsequences
where mod (x, 2) denotes the modulo-2 operation onto x.
If there are no errors during the detection process, after exactly m=2P runs, the sequences {{circumflex over (q)}mR, {circumflex over (q)}mI} can be perfectly mapped to {kR, kI}, in particular via
such that procedure comes to a stop.
More generally, however, errors may occur, such that either {circumflex over (q)}mR or {circumflex over (q)}mI, or both, contain incorrect indices even with cardinality P. In such cases, the procedure continues until both subsequences contains the first P-tuple of indices included in the dispersion matrix index vector set K, at which point a modification of the update equations is required, which can be described as follows.
Let Pk (q) denote the projection of a sequence q onto the set K, such that either a sequence k∈K or the empty set Ø is returned by the projection, depending on whether or not q contains within it a sequence from K. If multiple valid k∈K exist in the combination of elements in the viable elements with lower indices in q (not of the element values themselves) take priority, such that the notion of greedy selection is coherent. Then, equation (34) can be expanded into
In plain words, equation (37) establishes that after the m-th run of the BH-ISTA detector, the initial state of the estimate vector ûm+1(I) for the next run is either:
Obviously, the only other alternative to those above is when both {circumflex over (k)}R and {circumflex over (k)}I have been acquired, and consequently also the entire set of symbol estimates {S1R, s1I, . . . , sPR, SPI} have been obtained, in which case the procedure is terminated.
Similarly to the above, the updates of ym and Gm must also be revised so as to account for the effect of hard-decisions onto {circumflex over (k)}R and {circumflex over (k)}I, so as to cancel the effect of hard-decided indices and symbols, and to nullify the channel corresponding to confirmed indices, yielding respectively
The procedure described by equations (31) through (33) and (35) through (39) amount to a greedy—i.e., symbol-by-symbol and index set-by-index set—modification of the GB-ISTA detector introduced earlier, for which it is dubbed as the greedy boxed iterative shrinkage thresholding algorithm for QSM demodulation.
Notice that at the end of the process, estimates {circumflex over (k)}R and {circumflex over (k)}I of the selected dispersion matrix index vectors, as well as hard-decision estimates ŝ=[S1R, s1I, . . . , sPR, SPI] of the modulated symbols are obtained, from which the corresponding encoded bits b=[bR, bI, bs] can be retrieved at a fraction of the complexity of sphere detection or exhaustive maximum likelihood searches. A diagram illustrating the proposed GB-ISTA QSM receiver is offered in
R, set of index vectors
(½[qmR + 1]) = ∅ or
(½qml) = ∅ do
and index hard estimate {circumflex over (q)}m via equation (32);
via equation (33);
(½[{circumflex over (q)}mR + 1]) and {circumflex over (k)}l ←
(½{circumflex over (q)}mJ), respectively.
} and {
}.
, Threshold factor: λ
.
= [ ],
= [ ], ŝ = 0
as the unique integer parts of C.
= [
, imax/2],
), as given in Algorithm 2.
= 0, s
= 0
do
= [
, {imax − 1}/2].
=
), as given in Algorithm 2.
=
.
·
,
+
]
= 0
,
indicates data missing or illegible when filed
In the following table the Spectral efficiency n of the n×n generalised EDA-QSM is shown.
Compare the pairs where n and P are increased by the same factor, keeping the same sparsity for a given nT
The striking and novel result is observed when comparing this effect with larger increase in P:
At same ‘average sparsity’ in time, the spectral efficiency increased with n, and more largely for larger nT!!
In this section we analyze the performance of the proposed OS-QSM via computer simulations. Given that our focus is on the scalability of the system, all simulation results to be shown are for relatively large number of transmit antennas (i.e., nT≥6) and for increasing number of transmission slots (i.e., T≥2), with the number of digitally-modulated transmit symbols P and the cardinality of corresponding constellation M adjusted on a case-by-case basis in order to highlight the main finding of each simulated experiment. To the best of our knowledge, simulation results on QSM schemes with such parameters have not appeared so far in the literature, due to the prohibitive computational complexity of existing receivers
In light of the latter remark, let us start by assessing the decoding complexity of scaled QSM systems, in particular by deriving the complexity orders of the conventional ML and SCMB-SD approaches, and of the proposed GB-ISTA algorithm described in Section IV.
For any given nT, T and P, the brute-force ML decoder requires a search among all possible [(PTRP)]2, antenna activation patterns, independently selected according to {kR, kI}∈K to transmit the real and imaginary parts of the P digitally modulated symbols in s∈SP, as well as another search, for each possible activation pattern, of all possible P-tuples of symbols selected from the constellation S of cardinality M. Assuming, idealistically and for simplicity, that each search consumes a single floating point operation (flop), the ML search process alone yields a complexity order lower-bounded by O(4[log
The practical unfeasibility of ML-based detection of QSM systems is clearly highlighted by equation (40), as it exposes the fact that the number of transmit symbols P is a complexity order exponent of all theoretically scalable quantities nT, T and M. Next, let us show that this challenge cannot be satisfactorily mitigated by the SD approach. To that end, consider again idealistically and for simplicity, that SD can reduce the search radius to a single symbol, such that the factor MP in equation (40) can be neglected. In other words, we find that the order of complexity associated to SD-based QSM receivers can, at best, be reduced to
From the latter it can be concluded that, in the context of scalable QSM schemes, the only advantage of SD is to enable scaling of the digital constellation cardinality M, which not only impacts negatively on the corresponding BER, but also is not the most significant factor in increasing the SE of the system, since the total number of bits conveyed by a QSM scheme is B=2·[log2(PTn
Finally, let us address the computation complexity of the proposed GB-ISTA. For starters, observe from equations (31) through (36) that the GB-ISTA receiver obtains the spatially encoded bits bR and bI not from a search, but directly from the sparse-recovery process, i.e., the value and locations of non-zero elements of u{circumflex over ( )}. As a consequence of removing such combinatorial search, the impact of the scalable parameters nT, T and P onto GB-ISTA is significantly smaller, as demonstrated by the following complexity analysis of the steps of method 3.
1) Method 3 takes as input the effective matrix G given in equation (27), whose construction requires evaluating the product of the sparse block-diagonal Matrix ΦH ∈2Tn
2Tn
2) Next, the GB-ISTA receiver performs multiple runs of evaluating equation (31), the first step to which is computing û(n)+1/αGT(y−Gû(n)). The cost of computing a as per line 1 of method 3 are ignored, under the argument that for large systems, the largest eigenvalues GTG converges almost sure to a constant dependent only on the structure and the energy of G.
That operation would cost (2TnT)(2TnR)+(2TnR)+(2TnR)(2TnT)+(2TnR)=ST2nTnR30 4TnR flops to accomplish, but since the sparsity of u{circumflex over ( )}(n) quickly reduces to the actual value 2P, as shown in
3) After convergence of equation (31), the receiver obtains the sparse estimate vector ûm(n*), from which the soft symbol estimate {tilde over (S)}{circumflex over (q)}m is extracted at negligible cost via maximum value search [44], along with the estimate index {circumflex over (q)}m given by the position of {tilde over (s)}{circumflex over (q)}m in ûm(n*), as expressed in equation (32). With these quantities at hand, up to VM flops are consumed to obtain the hard symbol estimate {tilde over (s)}{circumflex over (q)}m as per equation (33).
4) Considering that the cost of the element, interference and column removals expressed by equations (37) through (39) are negligible, the next significant cost of the receiver is the validation of acquired indices. In particular, after at least P runs, when a sufficient number of position indices {circumflex over (q)}m have been detected to construct any or both of the index subsequences {circumflex over (q)}mR and/or {circumflex over (q)}mI, and map them to corresponding estimate index vectors {circumflex over (k)}R and/or {circumflex over (k)}I as per equation (36), said estimates need be validated against the optimal set of index vectors K. Assuming the cost of such operation is of order O(1), this step contributes to the total complexity of the GB-ISTA detector with an additional cost of P flops.
5) Lastly, as described in line 11 of Algorithm 3, the GB-ISTA outputs both the pair of estimate index vectors {circumflex over (k)}R and {circumflex over (k)}I as well as the digitally modulated symbol vector estimate ŝ∈P, which requires the intercalation of the real and imaginary parts, at estimated cost of P flops.
From the above, the total complexity order of the GB-ISTA can be estimated at
The per-bit complexity orders of the ML and the proposed GB-ISTA decoders, obtained by dividing the expressions in equations (40) and (42) by the number of bits detected per transmission B=2[log2 (PTn
Empowered by the significant reduction in complexity obtained by GB-ISTA over ML detection, as shown above, we proceed to assess the BER performance of the proposed OS-QSM scheme, decoded via the GB-ISTA. In general, our simulated experiments aim to further demonstrate that the proposed OS-QSM are feasible with relatively large numbers of transmit antennas, and can achieve very low BER at very low Et/No with rather high spectral efficiencies, whilst using relatively few spatial-temporal resources per transmission.
To that end, our first set of results, shown in
Two important facts can be learned from the results of
One criticism that could be raised about the results of
In any case, in order to dispel any doubts about the ability of the proposed OS-QSM design and of the corresponding GB-ISTA receiver to actually achieve feasible and optimized spectral efficient combined with low BERs, shown in
With these remarks made, turning to the results obtained in
Furthermore, the proposed decoder also does not require design restrictions such as block-diagonality or orthogonality in the transmission scheme, only the sparsity which is inherent with spatial modulation schemes, therefore providing larger freedom in transmitter development as well. In other words, the proposed decoder is capable of coping with many different encoding structures (flexibility).
The decoder can be used in any MIMO system where the number of antennas is expected to be large, such that ML approaches are infeasible. The scheme can be used to increase efficiency in cellular networks and V2X communications (eMBB).
In this application it is a new transmitter and receiver designs for QSM schemes, focusing on their scalability in terms of the number of transmit antennas nT, number of transmit instances T and number of encoded M-ary symbols P, as well as on their performance optimization in terms of SE, diversity and coding gains proposed. The contributions are motivated by the demonstrated fact that, in order for SE optimality to be achieved, QSM schemes must scale nT, T and P, which is not possible with SotA methods. At the transmitter, the newly proposed OS-QSM scheme differs from SotA alternatives in that its dispersion matrices are designed based on the FDFR STBCs, and in that dispersion matrix index selection is performed via a new greedy algorithm given, which ensures that all spatial-temporal resources of the transmitter are utilized evenly over multiple transmissions. In turn, at the receiver, the proposed art contributes with a new ISTA-based receiver, which thanks to its reliance on the sparse structure of QSM signaling, eliminates the combinatorial nature of existing ML- or SD-based approaches, further enabling the scaling of the system from a feasibility perspective. In fact, a complexity analysis is offered, which shows that the proposed GB-ISTA receiver enjoys a complexity order that is cubic on T, quadratic on P, and only linear on nT, in contrast to the ML and SD detectors which have geometric complexities on T and nT, with P as exponent, rendering them unfeasible in the scaled scenario. Simulation results for set-ups of scales never before shown in related literature, corroborate both the high performance and feasibility of the proposed OS-QSM scheme and GB-ISTA receiver.
Number | Date | Country | Kind |
---|---|---|---|
10 2021 207 915.6 | Jul 2021 | DE | national |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/EP2022/070798 | 7/25/2022 | WO |