METHOD OF JOINT USER ACTIVITY DETECTION AND CHANNEL INFORMATION ESTIMATION IN EXTRA-LARGE MIMO (XL-MIMO) SYSTEMS WITH NON-STATIONARITIES

Information

  • Patent Application
  • 20240356589
  • Publication Number
    20240356589
  • Date Filed
    July 20, 2022
    2 years ago
  • Date Published
    October 24, 2024
    3 months ago
Abstract
Joint user activity detection and channel information estimation in extra-large MIMO (XL-MIMO) systems with non-stationarities proceeds by: receiving signals and initialization of a channel estimation; performing soft interference cancel check, whereby, if the soft interference cancel check result is negative, the calculation of residual mean and variance is performed; whereby, if the soft interference cancel check result is positive, the extrinsic mean and variance is calculated directly; whereby, if the soft interference cancel check result is negative, the calculation of residual mean and variance is used, whereby the calculation of tentative estimation includes activity factors calculation; if reaching the maximum is not fulfilled, soft interference cancel check is performed; whereby, if reaching the maximum is fulfilled, the proceeding ends.
Description
FIELD

The present invention relates to the field of decoding digital communications in overloaded channels.


BACKGROUND

There are three main challenges that need to be addressed by a so-called 5G wireless communication system to enable a truly “networked society,” where information can be accessed and data shared anywhere and anytime, by anyone and anything. These are:

    • a) A massive growth in the number of connected devices.
    • b) A massive growth in traffic volume.
    • c) An increasingly wide range of applications with varying requirements and characteristics.


To handle massive growth in traffic volume, wider frequency bands, new spectrum, and in some scenarios denser deployment are needed. Most of the traffic growth is expected to be indoor and thus indoor coverage is important.


The throughput and user capacity of wireless communication networks have improved exponentially over the last decade thanks to multiple-input multiple-output (MIMO) technologies, which will continue to play a key role in future systems. Indeed, only part of the attractiveness of massive MIMO systems in terms of spatial degrees of freedom (DoF), channel hardening, spectrum efficiency, inherent channel orthogonality, and massive array gains, are achieved in currently deployed systems. As the scale and density of MIMO systems grow towards truly massive setups, however, besides infrastructure costs and various physical limitations, ideal assumptions such as antenna separation in the order of several wavelengths, full channel state information (CSI) knowledge, and perfectly spatially uncorrelated and abundantly diverse channels will become increasingly distant to reality.


Aiming at addressing these challenges, new concepts of distributed massive MIMO have been recently proposed, among which are cell-free MIMO (CF-MIMO) [4] and extra large MIMO (XL-MIMO) systems. In a cell-free massive MIMO system, which can be seen as an instance of spatially distributed MIMO concept, a large number of access points (APs) geographically scattered over a certain service area and connected via fronthaul links to a common central processing unit (CPU), simultaneously serve multiple user equipments (UEs). Thanks to its spatial diversity, CF-MIMO are inherently robust to spatial correlation, but pay to that end the price of requiring either high-capacity fronthaul links or compression techniques, or both to mitigate the effects of limited fronthaul connections.


In contrast, XL-MIMO systems can be said to follow the strategy of forming a “MIMO continuum”, in which a vastly large number of antennas are directly integrated into the ambient, by embedding them on the walls and ceilings of buildings, stadiums, train stations and airports. Since XL-MIMO systems rely on the use of large-aperture sub-arrays employed on a wide-ranging surface, XL-MIMO systems have to cope with its peculiarilities including spatial non-stationarity, i.e., the fact that the signal from each user is apparent only to distributed portions of the XL-MIMO antenna array, referred to as its visibility region (VR).


One of the early attempts on capturing such effects is, where an analytical spherical-wave propagation model was considered to describe the non-planar wavefront due to the proximity between users and scatterers, relative to the Rayleigh distance of the entire array. Following the above, several works have been proposed. To mention a few, a user-grouping based approximated zero-forcing (ZF) precoding design was proposed for XL-MIMO beamforming, which was shown to offer reasonable performance-complexity tradeoff.


Besides the above, another bottleneck of XL-MIMO systems has been argued in the literature, which is the fact that due to the geographically distributed nature of XL-MIMO, only a portion of the total antennas can observe the signal from each user. Several studies have been presented to address this spatial non-stationarity in XL-MIMO from different aspects. The channel estimation (CE) problem in XL-MIMO subjected to non-stationarity, while implicitly assuming a grant-based access protocol is known. An expectation propagation (EP)-based multiuser data detection mechanism for XL-MIMO systems was already proposed, while an array selection method for higher energy efficient communications in XL-MIMO settings was also proposed. From an access viewpoint, a grant-based random access strategy for XL-MIMO systems was described assuming perfect knowledge of active user indices. A theoretical interpretation of achievable throughput in uplink XL-MIMO systems was also presented. Turning our attention away from system, back to access perspectives, let us also consider the key role to be played by grant-free (GF) access technology in enabling future ultra reliable low latency communications (URLLC) and massive machine type communications (mMTC). Indeed, GF access schemes can significantly reduce overhead compared to conventional (grant-based) access schemes, requiring on the other hand joint activity and channel estimation (JACE) to be feasible. A popular approach to design JACE schemes is the covariance-based method, where active user detection (AUD) is carried out by taking advantage of the sample covariance of the instantaneous received signal, followed by conventional CE, given the estimated active user indices. Another major approach is the machine learning (ML)-aided method, an example of which is the scheme proposed where a deep neural network (DNN) was employed to perform JACE. The other promising approach is the Bayesian-based JACE mechanism, in which an approximated (linear) loopy belief propagation (BP) algorithm is leveraged to accomplish the JACE task. The inventors recently showed that emerging bilinear Bayesian inference frameworks can be employed to perform Bayesian-based JACE for GF access, with advantages over earlier linear Bayesian inference methods. In this application a contribution to both aforementioned topics by proposing a novel JACE method for GF XL-MIMO systems. In particular, a bilinear inference method to jointly estimate channel coefficients is designed as well as user and sub-array activities (i.e., non-stationarity) in an XL-MIMO setting.


Massive MIMO technology has been considered one of the key enablers for 5G wireless communication systems thanks to abundant in its spatial degrees of freedom. It will certainly be a key technology component in 6G. The core idea of massive MIMO is the use of many antenna elements equipped at a base station serving multiple users simultaneously, which brings practical benefits including higher data rate and spatial (orthogonal) separation between users. However, employing hundreds of antennas at the same geometrical space may lead to undesirable channel properties such as spatial correlation, lack of degrees of freedom, and spatial non-orthogonality.


To overcome this fundamental issue, distributed massive MIMO systems such as Network MIMO, Cell-Free MIMO (CF-MIMO), and Extra-Large MIMO (XL-MIMO) have attracted attention from both academia and industry due to its cost efficiency and performance gains.


The impact of expanding the physical array dimension motivated new types of deployment of communication infrastructure, such as integrating arrays along the wall or ceiling of buildings, imposing its unique challenges and opportunities. One of such challenges is called non-stationarities, where different parts of the array may face different propagation paths. In particular, signals from a user may arrive only at a portion of the (large) array, which causes channel sparsity in the array domain. In addition, an emerging access technology to reduce the communication overhead is grant-free random access, where only a portion of the users becomes active during a given time interval. The difficulty of grant-free access is to jointly estimate the user activity (i.e., to determine which users are active) and its channel state information.


Although channel estimation schemes for XL-MIMO and receiver design for grant-free access in massive MIMO have been proposed, to the best of our knowledge, a joint user activity and channel estimation scheme for XL-MIMO subject to non-stationarities has not been considered yet. Thus, the proposed invention provides a solution to address this challenging problem.


Existing solutions are complex and imply a restrictive latency as the two process user activity and channel estimation are executed independently.


The proposed method aims at reducing the communication overhead and latency for the random access of future wireless networks with extra-large Multiple-Input Multiple-Output (XL-MIMO) in scenarios subject to partial sub-array blockages, i.e., non-stationarities. In these cases, only a (varying) fraction of users accesses the system at a time, and in these cases, joint user activity detection and channel estimation would be beneficial to reduce the access latency and signaling overhead.


A detection method for joint [user activity]+[channel estimation] in extra-large massive MIMO systems subject to non-stationarities is proposed. The solution is based on the bilinear Bayesian inference framework relying on the Gaussian approximation in conformity to the central limit theorem. The challenge of the problem was that it involves two correlated random variables that result in a bilinear estimation problem, which is then tackled via a recently proposed powerful inference framework to address such bilinear inference. The solution provides the following required information: an estimate of active users and an estimate of their channel state information.


The method is illustrated in the flow chart FIG. 12. In the previous file/diagram, the specific calculations associated with each block/step are indicated in the method where a detailed description of the solution and its theoretical foundation is presented in the description part.


With respect to the aforementioned file, a key step of the method can be identified where the matrix A has been introduced to explicitly capture user's activity. In Prior-Art A is implicitly captured in H (i.e., the channel matrix). In other words, with previous methods it is impossible to separate or isolate sub-arrays associated to active users. Thus, the method relies in split the “effective channel matrix” into H and A.


The estimation of H and A is solved by Bilinear inference.


The proposed method could find application in future wireless systems where XL-MIMO is applied, e.g., 6G.


The possibility of applying the principles used in the proposed method to other “similar problems” in the field of wireless communications, where both user detection and channel estimation is required is also possible. Thus, the proposed scheme can be adapted or extended with minor modifications that can be covered by the features to be claimed.


BRIEF SUMMARY

The systems, methods, and devices of the disclosure each have several aspects, no single one of which is solely responsible for its desirable attributes. Without limiting the scope of this disclosure as expressed by the claims which follow, some features will now be discussed briefly. After considering this discussion, and particularly after reading the section entitled “Detailed Description” one will understand how the features of this disclosure provide in order to medelling XL-MIMO systems.


A new XL-MIMO Model is described. Non-stationarity, user activity patterns, and channel fading jointly imposes a new estimation problem of random variables following a nested Bernoulli-Gaussian distribution, which is captured in the system model part of this application. To the best of our knowledge, this formulation appears for the first time in the literature.


A new Tractable JACE Approach is disclosed. Owing to the nested nature of the variables of interest, the JACE problem is decoupled into a tractable bilinear inference problem.


A new efficient JACE Solution is disclosed. In order to solve the reformulated bilinear estimation problem, a novel message passing rule has been derived, in which estimates are obtained in closed-form. Based on the derived message passing rules, an iterative JACE algorithm is proposed for GF XL-MIMO systems subject to non-stationarity.


New XL-MIMO Non-stationarity Model is described. In order to capture the cluster-like nature of subarray activities, unlike the existing literature, we introduce a Matern-cluster point process (MCPP)-based sub-array activity model, based on which the estimation performance of different approaches is compared.


In one preferred embodiment the method of Joint User Activity Detection and Channel Information Estimation in Extra-Large MIMO (XL-MIMO) Systems with Non-Stationarities characterized by proceeding the steps: Receiving signals and initialization of a channel estimation; Proceeding soft interference cancel check, whereby if the soft interference cancel check result is negative the calculation of residual mean and variance is proceeded; whereby if the soft interference cancel check results is positive the extrinsic mean and variance is calculated directly; Calculation extrinsic mean and variance, whereby if the soft interference cancel check result is negative the calculation of residual mean and variance is used Calculation of tentative estimates; whereby the calculation of tentative estimation includes activity factors calculation; Check if the condition of reaching the maximum is fulfilled whereby if the condition of reaching the maximum fulfilled check result is negative soft interference cancel check is proceed; whereby if the condition of reaching the maximum fulfilled check result is positive the proceeding ends.


Another preferred embodiment of the inventive method is characterized by after ending a preamble and uplink data transmission via a grant-free random access is proceeded.


Another preferred embodiment of the inventive method is characterized by the point process, which models randomly located clusters within a given area defines the area where antenna arrays are embedded.


Another preferred embodiment of the inventive method is characterized by a modification to the iterative shrinkage-thresholding algorithm (ISTA) via boxing with range limiting and hard-thresholding is proceeded.


Another preferred embodiment of the inventive method is characterized by using the boxed-hard iterative shrinkage-thresholding algorithm (ISTA), a greedy selection of the positions of the antennas index and the symbol estimates, and their independent decoding of the corresponding antenna modulated and symbol modulated bits is determined.


Another preferred embodiment of the inventive method is characterized by processing working parallel to the greedy detections, to ensure valid estimates of the index vectors from the given finite set of index vectors are produced at the output of the method, and to apply interference cancellation with the confirmed values, while keeping track of which indices have been retrieved from the greedy selections, before every iteration a check is performed whether from the currently decoded indices, a final confirmation can be made, if the final confirmation cannot be made, remove the interference by the previous greedy selection and the next iteration is proceeded.


Another preferred embodiment is characterized by receiver (R) of a communication system having a processor, volatile and/or non-volatile memory, at least one interface adapted to receive a signal in a communication channel, wherein the non-volatile memory stores computer program instructions which, when executed by the microprocessor, configure the receiver to implement the method of one or more of claims 1-6


Another preferred embodiment is characterized by computer program product comprising computer executable instructions, which, when executed on a computer, cause the computer to perform the method of any of claims 1-6.


Another preferred embodiment is characterized by computer-readable medium storing and/or transmitting the computer program product of claim 8.





BRIEF DESCRIPTION OF THE DRAWINGS

For a fuller understanding of the nature of the present invention, reference should be had to the following detailed description taken in connection with the accompanying drawings. So that the manner in which the above-recited features of the present disclosure can be understood in detail, a more particular description, briefly summarized above, may be had by reference to aspects, some of which are illustrated in the drawings. It is to be noted, however, that the appended drawings illustrate only certain aspects of this disclosure and are therefore not to be considered limiting of its scope, for the description may admit to other equally effective aspects.



FIG. 1: Illustration of the uplink of a multiuser XL-MIMO system with spatial non-stationarity, whereby each user independently activates different subarrays of the XL-MIMO array depending propagation conditions.



FIG. 2: NMSE performance with respect to SNR with N=400 and M=200 for different pilot lengths.



FIG. 3: AER performance with respect to SNR with N=400 and M=200 for different pilot lengths.



FIG. 4: Resilience of the proposed algorithm against different sub-array activity indicators in perce.



FIG. 5: Convergence behavior of the proposed algorithm with respect to the number of algorithmic iterations.



FIG. 6: MCPP-based subarray activity.



FIG. 7: Uniformly random subarray activity.



FIG. 8: NMSE Performance with respect to SNR with N=400, M=200, and L=70 with MCPP for different μ.



FIG. 9: AER Performance with respect to SNR with N=400, M=200, and sL=70 with MCPP for different μ.



FIG. 10: NMSE performance of the proposed method for different cluster intensities. The actual array activity ratios for μ=3, 6 and 9 are annotated by allows.



FIG. 11: NMSE performance of the proposed method for different cluster radius sizes. The actual array activity ratios for μ=3, 6 and 9 are annotated by allows.



FIG. 12: Describing the Flowchart of the inventive method.



FIG. 13: Illustrates the Grand Free Random Access.





DETAILED DESCRIPTION

Extra large MIMO (XL-MIMO) systems are subject to spatial non-stationarity which leads to a doubly-sparse and user-specific structure of received signals, such that the activity of each user at each sub-array can be characterized by a nested Bernoulli-Gaussian distribution. This application considers the joint activity and channel estimation (JACE) problem in XL-MIMO systems subject to spatial non-stationarity, offering two major embodiments solving this problem.


The first is a novel bilinear Bayesian inference method capable of jointly estimating sub-array activity patterns (a.k.a. spatial non-stationarity), user activity patterns, and associated channel coefficients, boosted by expectation maximization (EM)-based auto-parameterization.


The second embodiment is the introduction of realistic Poisson point process (PPP) and Matern-cluster’ point process (MCPP) stochastic-geometry (SG) models to simulate sub-array activity patterns, which enables the performance assessment of both the proposed and state-of-the-art (SotA) XL-MIMO JACE solutions under different conditions in a structured manner. The efficiency of the proposed bilinear JACE method is confirmed by numerical simulations, which shows that the proposed method not only significantly outperforms the SotA but also can reach the performance of a genie-aided (theoretical) scheme over wide signal-to-noise-ratio (SNR) ranges.


A Matérn cluster point process is a type of cluster point process, meaning that its randomly located points tend to form random clusters. Using techniques from spatial statistics, it is possible to make the definition of clustering more precise. This point process is an example of a family of cluster point processes known as Neyman-Scott point processes, which have been used in spatial statistics and telecommunications.


The Matérn cluster point process should not be confused with the Matérn hard-core point process, which is a completely different type of point process. Bertril Matérn proposed at least four types of point processes, and his name also refers to a specific type of covariance function used to define Gaussian processes.


Simulating a Matérn cluster point process requires first simulating a homogeneous Poisson point process with an intensity λ>0 on some simulation window, such as a rectangle, which is the simulation window I will use here. Then for each point of this underlying point process, simulate a Poisson number of points with mean μ>0 uniformly on a disk with a constant radius r>0. The underlying point process is sometimes called the parent (point) process, and its points are centres of the cluster disks.


The subsequent point process on all the disks is called daughter (point) process and it forms the clusters. It has been known about simulating the homogeneous Poisson point processes on a rectangle and a disk, so those posts are good starting points, and it won't not be focused too much on details for these steps.


The main challenge behind sampling this point process, is that it's possible for daughter points to appear in the simulation window that come from parents points outside the simulation window. In other words, parents points outside the simulation window contribute to points inside the window. To remove these edge effects, the point processes must be simulated on an extended version of the simulation window. Then only the daughter points within the simulation window are kept and the rest are removed. Consequently, the points are simulated on an extended window, but we only see the points inside the simulation window.


To create the extended simulation window, you can add a strip of width r all around the simulation window. The distance r is the maximum distance from the simulation window that a possibly contributing parent point (outside the simulation window) can exist, while still having daughter points inside the simulation window. This means it is impossible for a hypothetical parent point beyond this distance (outside the extended window) to generate a daughter point that can fall inside the simulation window.


Simulate the underlying or parent Poisson point process on the rectangle with NP points. Then for each point, simulate a Poisson number of points, where each disk now has Di number of points. Then the total number of points is simply N=D1+ . . . +DP=ΣNPi=1 Di. The random variables P and Di are Poisson random variables with respective means λA and μ, where A is the area of the rectangular simulation window. To simulate these random variables in MATLAB, the poissrnd function is used. To do this in R, use the standard function rpois. In Python, it can be used either functions scipy.stats.poisson or numpy.random.poisson from the SciPy or NumPy libraries.


The points of the parent point process are randomly positioned by using Cartesian coordinates. For a homogeneous Poisson point process, the x and y coordinates of each point are independent uniform points, which is also the case for the binomial point process, covered in a previous post. The points of all the daughter point process are randomly positioned by using polar coordinates. For a homogeneous Poisson point process, the θ and ρ coordinates of each point are independent variables, respectively with uniform and triangle distributions, which was covered in a previous post. Then we convert coordinates back to Cartesian form, which is easily done in MATLAB with the pol2cart function. In programming languages without such a function: x=ρ cos (θ) and y=ρ sin (θ).


In practice, all the daughter points are simulated in a disk with its centre at the origin. Then for each cluster disk, all the points have to be shifted to the origin is the center of the cluster, which completes the simulation step.


To use vectorization in the code, the coordinates of each cluster point are repeated by the number of daughters in the corresponding cluster by using the functions repelem in MATLAB, rep in R, and repeat in Python.



FIG. 1 shows an illustration of the uplink of a multiuser XL-MIMO system with spatial non-stationarity, whereby each user independently activates different subarrays of the XL-MIMO array depending propagation conditions.


Sytem Model Description

Consider an XL-MIMO system consisting of S sub-arrays, each equipped with Ns antenna elements, such that the total number of antenna array elements is given by N=Σs=1SNs, and let G∈CN×M be the effective channel matrix between the XL-MIMO array and M single-antenna users, which jointly depicts user activities, sub-array VRs, and the fading gains. Then, the corresponding system model as shown in FIG. 1 is given by










Y
=


GX
+
W




,




(
1
)









    • where X∈CM×L is a pilot matrix collecting the L signals transmitted by each user, while W∈CN×L denotes zero-mean unit-variance independent and identically-distributed (iid) additive white Gaussian noise (AWGN) such that vec(W)˜custom-character(0, σ2I).





In equation (1), it is assumed that only a small fraction of the M users is active, while the rest remains silent during the time interval of L transmissions. Letting K be a random variable that denotes the number of active users at a given time interval, the average user-activity probability can be expressed as λcustom-charactercustom-character[K/M].


Furthermore, owing to non-stationarities observed in the XL-MIMO setting, the channel matrix G possesses block-sparsity that captures both user activity and the sub-arrays in their VRs (i.e. active sub-arrays), such that the m-th column of G, relative to the m-th user, can be modeled as











g
m

=


a
m

·



g
˜

m



p
m




,




(
2
)









    • where ⊙ denotes the Hadamard (element-wise) product, am∈{0,1} is the user activity indicator, {tilde over (g)}m is the channel response vector, and pmcustom-character[p1m, . . . , pSm]∈custom-character denotes a sub-array activity indicator defined by













p
sm


=
Δ



{




1


N
s

×
1






if


the


s
-
th


sub
-
array


is


in


the






VR


of


the


m
-
th


user

,






0


N
s

×
1





if


the


s
-
th


sub
-
array


is


outside


the






VR


of


the


m
-
th



user
.










(
3
)







Assuming that {tilde over (g)}m is Gaussian, as typically, the distribution of gm can be written as











g
m

~


p

g
m


(

g
m

)



=
Δ




(

1
-
λ

)



δ

(

g
m

)


+

λ











s
=
1

S





f

(



g


Φ

(
s
)


m




ϕ
sm


,
0
,

Γ
sm


)




captures


fading


and


sub
-
array


activity



,




jointing


all


sub
-
arrays








(
4
)









    • where δ(⋅) denotes the Dirac delta function, Γsm is the covariance matrix of the m-th user's channel to the s-th sub-array, ϕsm depicts the mean activity of the s-th sub-array, with respect to the m-th user and
















f

(
)

|
ϕ

,
μ
,
Σ

)


=





(

1
-
ϕ

)



δ

(
z
)


+


ϕ
·




(

μ
,
Σ

)

.







(
5
)









    • where ϕ is an active probability, μ denotes a certain mean, and Σ is a given covariance matrix.





Joint Estimation Strategy

In this section, we propose a novel bilinear message passing method for joint activity and channel estimation in XL-MIMO systems subjected to spatial non-stationarity. To this end, a decomposition of the system model given in equation (1) is carried out, followed by detailed derivations of message passing rules.


We remark that for the sake of generality, throughout the section it is assumed that the elements of the channel vectors {tilde over (g)}m are independently but not identically distributed, which is equivalent to saying that the covariance matrices Γsm are all diagonal, but have different norms. This is motivated by the fact that the VRs of each user at the XL-MIMO array in general result from the impinging of signals from different propagation paths, as illustrated in FIG. 1.


For the sake of future convenience, let us first reformulate equation (4) as










Y
=


HAX
+
W




,




(
6
)









    • with Gcustom-characterHA∈custom-character, where H∈custom-character is the block fading channel matrix and the M×M diagonal matrix A, with diag(A)=[a1, a2, . . . , aM]∈{0,1}M, captures user activity indicators.





For notation simplicity, we hereafter introduce the quantity ν(s)custom-characterΣi=1sNi, with ν(0)custom-character0, to denote the cumulative collection of sub-array antenna indices at the s-th sub-array. In order to gain a closer insight into the effect of non-stationarity onto the column vectors of the channel matrix H, consider the anatomized m-th column of H, which is given by











h
m

=


[


p

1

m





h
_



Φ

(
1
)


m



T







1

st


sub

-
array





,



p

2

m





h
_



Φ

(
2
)


m



T








2

nd


sub

-
array





,


,


(




p
Sm




h
_



Φ

(
S
)


m



T



]



S
-

th


sub

-
array




)

T

,




(
7
)









    • where pms∈{0,1}, with s∈{1,2, . . . , S}, denotes the sub-array activity indicator, the vectors hΦ(s)m˜custom-character(0, Γsm), and Φ(s)custom-character{ν(s−1)+1, ν(s−1)+2, . . . , ν(s)} is a set of antenna indices corresponding to the s-th sub-array.





More conveniently, the m-th column and s-th sub-array of the channel matrix can be modeled as the Bernoulli-Gaussian random variable, that is,












h


Φ

(
s
)


m




p

h


Φ

(
s
)


m





(

h


Φ

(
s
)


m


)



=





(

1
-

ϕ


(
s
)


m



)



δ

(

h


Φ

(
s
)


m


)


+


ϕ
sm

·

𝒞𝒩

(

0
,


Γ
sm


)




,




(
8
)









    • where Φsm denotes the mean of pms.





From the above, one can readily notice that the problem of jointly estimating users and subarrays activity indicators, as well as channel coefficients, belongs to the class of bilinear inference problems. More precisely, given the received signal matrix Y and the predetermined reference signal matrix X, our goal is to jointly estimate am, pms and hΦ(s)m for all m∈{1,2, . . . , M} and s∈{1,2, . . . , S}, which are linearly multiplied by one another. In the next subsections we proceed to derive message passing rules designed to tackle this challenging problem, proposing a new joint activity and channel estimation for XL-MIMO subject to non-stationarity.


Focusing on the received signal element ynl at the n-th row and l-th column of Y, the received signal after soft interference cancellation (Soft-IC) using tentative estimates can be written as









=


-






l

m

M




,



Soft
-
IC





=





(
9
)












h
nm



a
m


+






l

m

M



(



h
nl



a
l


-



a


n



,
l


^



)



+



Residual


interference


plus


noise





,






    • where the soft estimates custom-character and custom-character are generated in variable nodes at the previous iteration, while custom-character denotes the noise element at the n-th row and custom-character-th column of the AWGN matrix W.





Assuming that the residual interference plus noise component of equation (9) can be approximated as a complex Gaussian random variable in conformity to the central limit theorem, the conditional probability density function (PDF) of equation (9) for given hnm can be written as













|

h
nm




(

|

h
nm


)




exp
(

-





"\[LeftBracketingBar]"




y
~


m
,

n





-


h
nm





"\[RightBracketingBar]"


2



)


,




(
10
)









    • where the error variance is given by












=


[




"\[LeftBracketingBar]"




(


a
m

-

)



h
nm


+




i

m

M




(



h
ni



a
i


-


)



+



"\[RightBracketingBar]"


2

]

=



γ
nm






"\[LeftBracketingBar]"



"\[RightBracketingBar]"


2


+







i

m

M




(






"\[LeftBracketingBar]"



"\[RightBracketingBar]"


2


+


(





"\[LeftBracketingBar]"



"\[RightBracketingBar]"


2

+

)



)






"\[LeftBracketingBar]"



"\[RightBracketingBar]"


2



+

σ
2


,











(
11
)









    • with γnm denoting the variance of the n-th row and m-th column of H, and where we implicitly defined the residual error variance custom-character for future convenience.





Similarly, the conditional PDF of custom-character given am can be approximated as















a
m




(



a
m


)




exp

(

-





"\[LeftBracketingBar]"


-



"\[RightBracketingBar]"


2



)


,




(
12
)









    • with variance given by

















=

[

|



(


h
nm

-

)



a
m



x

m





+




i

m

M



(



h

n

i




a
i


-


)



+






"\[RightBracketingBar]"


2

]

=


λ





"\[LeftBracketingBar]"



"\[RightBracketingBar]"


2


+




i

m

M




(






"\[LeftBracketingBar]"



"\[RightBracketingBar]"


2


+


(





"\[LeftBracketingBar]"



"\[RightBracketingBar]"


2

+

)



)






"\[LeftBracketingBar]"



"\[RightBracketingBar]"


2



+

σ
2



,




(
13
)









    • where we utilized the fact that E[a2m]=E[am]=λ, since am∈{0, 1}.





Variable Node

Taking advantage of the Soft-IC mechanism and its resultant statistics shown above, the beliefs corresponding to the s-th sub-array combined over all available time resources except the custom-character-th time index, yields the PDF of the extrinsic belief custom-character given hΦ(s)m, which is given by












p



ξℓ
,



Φ

(
s
)


m

|

h


Φ

(
s
)


m







(

|

h


Φ

(
s
)


m



)


=





n
=


v

(

s
-
1

)

+
1



v

(
s
)





L




p


y
~


m
,

ni
|

h
nm





(



y
~


m
,
ni


|

h
nm


)








n
=


v

(

s
-
1

)

+
1



v

(
s
)



exp

(

-





"\[LeftBracketingBar]"



h
nm

-



"\[RightBracketingBar]"


2



)





(

,

)







(
14
)









    • with















,


Φ

(
s
)


m




=





[



,

(


v

(

s
-
1

)

+
1

)



,


,



(
s
)


m



]

T




,




(

15

a

)














=




diag

(

[




(


v

(

s
-
1

)

+
1

)


m


,


,

]

)




,




(

15

b

)









    • where













=




(




i


L



|


â

ni
,
m




x
mi



|
2



v

m
,
ni

h



)


-
1






(

16

a

)













=







i



L






y
˜


m
,
ni




â


n

i

,
m

*



X

m

i

*




v

m
,
ni

h








(

16

b

)







In turn, the PDF of the extrinsic belief ξanl,m given am can be similarly obtained as













|

a
m





(

|

a
m


)


=





j
=
n

N




L




p


y
~


m
,

ji
|

a
m





(



y
~


m
,
ji


|

a
nm


)





exp
(

-





"\[LeftBracketingBar]"



a
m

-



"\[RightBracketingBar]"


2



)




,

(

,

)

,




(
17
)









    • where













=




(




j

n

N





i


L






"\[LeftBracketingBar]"




h
^


i
,
jm




x
mi




"\[RightBracketingBar]"


2


v

m
,
ji

a




)


-
1






(

18

a

)













=







j

n

N




L





y
˜


m
,
ji





h
ˆ


i
,
jm

*



x

m

i

*



v

m
,
ji

a









(

18

b

)







Combining the PDF in equation (14) with the prior channel PDF in equation (8) yields the posterior distribution of the channel. Therefore, taking the expectation of hΦ(s)m over the latter yields the corresponding soft estimate custom-characterΦ(s)m at the custom-character-th variable node, which is given by











h
^



,


Φ

(
s
)


m



=




(
19
)













h


Φ

(
s
)


m





h


Φ

(
s
)


m







,



Φ

(
s
)


m

|

h


Φ

(
s
)


m






(



,


Φ

(
s
)


m



|

h


Φ

(
s
)


m



)




p

h


Φ

(
s
)


m



(

h


Φ

(
s
)


m


)






h


Φ

(
s
)


m







,



Φ

(
s
)


m

|

h


Φ

(
s
)


m






(



,


Φ

(
s
)


m



|

h


Φ

(
s
)


m




)




p

h


Φ

(
s
)


m




(

h


Φ

(
s
)


m



)






,






    • where the denominator in the integrand is introduced for normalization purposes.





The error covariance associated with custom-characterΦ(s)m is given by











=




diag
(




h


Φ

(
s
)


m





h


Φ

(
s
)


m




h


Φ

(
s
)


m

H








Φ

(
s
)


m

|

h


Φ

(
s
)


m





(



,


Φ

(
s
)


m



|

h


Φ

(
s
)


m



)




p

h


Φ

(
s
)


m



(

h


Φ

(
s
)


m


)






h


Φ

(
s
)


m







p

ξℓ
,



Φ

(
s
)


m

|

h


Φ

(
s
)


m






(


ξ


,


Φ

(
s
)


m



|

h


Φ

(
s
)


m




)



p


h


Φ

(
s
)


m



(

h


Φ

(
s
)


m



)








)

-

diag

(



,


Φ

(
s
)


m





,


Φ

(
s
)


m




)



,


such


that






=


diag

(


Ψ


,

(


v

(

s
-
1

)

+
m



h

,

Ψ


,


(


v

(

s
-
1

)

+
2

)


m


h

,


,


,


v

(
s
)


m




)

.






(
20
)







In turn, the soft replica custom-character of the user activity indicator can be similarly obtained as












a
^



n



,
m


=




α


{

0
,
1

}




α
·




p


ξ


n



,
m


|

α
m



(


ξ


n



,
m



α

)




p

a
m


(
α
)










a




{

0
,
1

}






p

ξ


n



,

m
|

α
m





(


ξ


n



,
m


|

α



)




p

a
m


(

α


)






,




(
21
)









    • with pam(⋅) denoting the Bernoulli probability mass function (PMF) with intensity λ, which is accompanied by its mean square error (MSE) given by













ψ


n



,
m

a

=





α


{

0
,
1

}





α
2

·




p


ξ


n



,
m


|

α
m



(


ξ


n



,
m



α

)




p

a
m


(
α
)










a




{

0
,
1

}






p


ξ


n



,
m


|

α
m



(


ξ


n



,
m


|

α



)




p

a
m


(

α


)





-



a
^



n



,
m

2

.






(
22
)







In order to compute equations (19)-(22) above, it is essential to analyze the effective distributions custom-character|hΦ(s)m(custom-character|hΦ(s)m)phΦ(s)m(hΦ(s)m) and custom-character(custom-character|α)pam(α) such that the resultant calculations become tractable. To that end, plugging equations (8) and (14) into the effective distribution of hΦ(s)m yields












p


ξ


,


Φ

(
s
)


m



|

h


Φ

(
s
)


m




(


ξ


,


Φ

(
s
)


m





h


Φ

(
s
)


m



)




p

h


Φ

(
s
)


m



(

h


Φ

(
s
)


m


)


=




(



(

1
-

ϕ

s

m



)



δ

(

h


Φ

(
s
)


m


)


+



ϕ

s

m


·



(

0
,

Γ
sm


)



)

×

(


μ


,


Φ

(
s
)


m


h

,

Θ


,


Φ

(
s
)


m


h


)


=



(

1
-

ϕ

s

m



)



δ

(

h


Φ

(
s
)


m


)





exp



(


-

μ


,


Φ

(
s
)


m


h


,


Θ


,


Φ

(
s
)


m


h




μ


,


Φ

(
s
)


m


h



)



π


N
s





"\[LeftBracketingBar]"


Θ


,


Φ

(
s
)


m


h



"\[RightBracketingBar]"





·

+


ϕ
sm






exp



(


-



μ


,


Φ

(
s
)


m


h

(


Γ
sm

+

Θ


,


Φ

(
s
)


m


h


)


-
1





μ


,


Φ

(
s
)


m


h


)



π


N
s





"\[LeftBracketingBar]"



Γ
sm

+

Θ


,


Φ

(
s
)


m


h




"\[RightBracketingBar]"





×





(





Γ
sm

(


Γ
sm

+

Θ


,


Φ

(
s
)


m


h


)


-
1




μ


,


Φ

(
s
)


m


h


,




Γ
sm

(


Γ
sm

+

Θ


,


Φ

(
s
)


m


h


)


-
1




Θ


,


Φ

(
s
)


m


h



)






=
Δ


f

(



h


Φ

(
s
)


m




μ


,


Φ

(
s
)


m


h


,

Θ


,


Φ

(
s
)


m


h

,

Γ
sm


)









(
23
)







Thus, the corresponding normalization factor can be written as













h


Φ

(
s
)


m






p


ξ


,


Φ

(
s
)


m



|

h


Φ

(
s
)


m




(


ξ


,


Φ

(
s
)


m





h


Φ

(
s
)


m



)




p

h


Φ

(
s
)


m



(

h


Φ

(
s
)


m


)



=






h


Φ

(
s
)


m





(

1
-

ϕ

s

m



)



δ

(

h


Φ

(
s
)


m


)




exp



(


-

μ


,


Φ

(
s
)


m


h



H



Θ


,


Φ

(
s
)


m


h




μ


,


Φ

(
s
)


m


h


)



π


N
s





"\[LeftBracketingBar]"


Θ


,


Φ

(
s
)


m


h



"\[RightBracketingBar]"







+



ϕ
sm




exp



(


-



μ


,


Φ

(
s
)


m


h

(


Γ
sm

+

Θ


,


Φ

(
s
)


m


h


)


-
1





μ


,


Φ

(
s
)


m


h


)



π


N
s

|


Γ
sm

+

Θ


,


Φ

(
s
)


m


h


|









(
24
)
















h


Φ

(
s
)


m




f

(



h


Φ

(
s
)


m




μ


,


Φ

(
s
)


m


h


,

Θ


,


Φ

(
s
)


m


h

,

Γ
sm


)





=
1


=



ϕ
sm




exp



(


-

μ


,


Φ

(
s
)


m


h






H

(


Γ
sm

+

Θ


,


Φ

(
s
)


m


h


)


-
1




μ


,


Φ

(
s
)


m


h


)




π

N
s






"\[LeftBracketingBar]"



Γ
sm

+

Θ


,


Φ

(
s
)


m


h




"\[RightBracketingBar]"






τ


,
ms




,






    • where the activity detection factor custom-character is given by













τ


,
ms



=
Δ


1
+



1
-

ϕ

s

m




ϕ

s

m




exp




(



-


μ


,


Φ

(
s
)


m



h
H


(


Θ


,


Φ

(
s
)


m



h

-
1



-



(


Γ
sm

+

Θ


,


Φ

(
s
)


m


h


)


-
1



)




μ


,


Φ

(
s
)


m


h


+

log



(



"\[LeftBracketingBar]"




Θ


,


Φ

(
s
)


m


h




Γ
sm


+

I

N
s





"\[RightBracketingBar]"


)



)

.







(
25
)







Taking advantage of equations (23) and (24), the soft replica of hΦ(s)m at the custom-character-th node can be re-written as












h
_



,


Φ

(
s
)


m



=





Γ
sm

(


Γ
sm

+

Θ


,


Φ

(
s
)


m


h


)


-
1



τ


,
ms





μ


,


Φ

(
s
)


m


h



,




(
26
)









    • while its MSE custom-charactercustom-characterdiag (custom-character, . . . , custom-character) can be expressed as














Ψ
_



,


Φ

(
s
)


m


h

=




(


τ


,
ms


-
1

)


diag



(



h
^



,


Φ

(
s
)


m







h
^



,


Φ

(
s
)


m


H


)


+




Θ


,


Φ

(
s
)


m


h






Γ
sm

(


Γ
sm

+

Θ


,


Φ

(
s
)


m


h


)


-
1




τ


,
ms



.






(
27
)







In turn, the effective distribution custom-character(custom-character|α)pam(α) can be simplified to












p


ξ


n



,
m


|

α
m



(


ξ


n



,
m



α

)




p

a
m


(
α
)


=


exp



(

-





"\[LeftBracketingBar]"


α
-

μ


n



,
m

a




"\[RightBracketingBar]"


2


θ


n



,
m

a



)

×




(

λα
+


(

1
-
λ

)



(

1
-
α

)



)

,




Bemoulli


PDF


with


intensity


λ







(
28
)









    • where α∈{0,1} and the associated normalization factor can then be written as
















α


{

0
,
1

}






p


ξ


n



,
m


|

α
m



(


ξ


n



,
m



α

)




p

a
m


(
α
)



=



λexp



(

-





"\[LeftBracketingBar]"


1
-

μ


n



,
m

a




"\[RightBracketingBar]"


2


θ


n



,
m

a



)


+


(

1
-
λ

)


exp



(

-





"\[LeftBracketingBar]"


μ


n



,
m

a



"\[RightBracketingBar]"


2


θ


n



,
m

a



)







(
29
)







Thus, the soft replica of αm can be obtained as












a
^



n



,
m


=




α
·




p


ξ


n



,
m


|

α
m



(


ξ


n



,
m


|
α

)




p

a
m


(
α
)










α




{

0
,
1

}






p


ξ


n



,
m


|

α
m



(


ξ


n



,
m


|

α



)




p

a
m


(

α


)





=



λexp



(

-





"\[LeftBracketingBar]"


1
-

μ


n



,
m

a




"\[RightBracketingBar]"


2


θ


n



,
m

a



)




λexp



(

-





"\[LeftBracketingBar]"


1
-

μ


n



,
m

a




"\[RightBracketingBar]"


2


θ


n



,
m

a



)


+


(

1
-
λ

)


exp



(

-





"\[LeftBracketingBar]"


μ


n



,
m

a



"\[RightBracketingBar]"


2


θ


n



,
m

a



)






,

=




1

1
+



1
-
λ

λ


exp



(

-

(






"\[LeftBracketingBar]"


μ


n



,
m

a



"\[RightBracketingBar]"


2


θ


n



,
m

a


-





"\[LeftBracketingBar]"


1
-

μ


n



,
m

a




"\[RightBracketingBar]"


2


θ


n



,
m

a



)


)







Weighted


Sigmoid


Function







(
30
)









    • and its error variance can be written as














ψ


n



,
m

a

=






α


{

0
,
1

}





α
2

·




p


ξ


n



,
m


|

α
m



(


ξ


n



,
m



α

)




p

a
m


(
α
)










α




{

0
,
1

}






p


ξ


n



,
m


|

α
m



(


ξ


n



,
m




α



)




p

a
m


(

α


)





-


a
^



n



,
m



=





1
-
λ

λ



exp

(

-

(






"\[LeftBracketingBar]"


μ


n



,
m

a



"\[RightBracketingBar]"


2


θ


n



,
m

a


-





"\[LeftBracketingBar]"


1
-

μ


n



,
m

a




"\[RightBracketingBar]"


2


θ


n



,
m

a



)


)




(

1
+



1
-
λ

λ



exp

(

-

(






"\[LeftBracketingBar]"


μ


n



,
m

a



"\[RightBracketingBar]"


2


θ


n



,
m

a


-





"\[LeftBracketingBar]"


1
-

μ


n



,
m

a




"\[RightBracketingBar]"


2


θ


n



,
m

a



)


)



)

2




,




(
31
)









    • from which it is readily found that 0≤custom-character≤¼.





Activity Detection Policy

Finally, in this subsection the last step is discussed, corresponding to the refinement of the user activity estimates according to a pre-defined user activity policy. Different approaches to perform this step can be considered. Here, the new log-likelihood ratio (LLR)-based approach is discussed taking both H{circumflex over ( )} and A{circumflex over ( )} into consideration.


To that end, first recognize that the user activity pattern captured by the binary quantities on the diagonal elements of A{circumflex over ( )} can equivalently be expressed as column-sparsity of H{circumflex over ( )}, which implies that an activity detection policy must jointly consider H{circumflex over ( )} and A{circumflex over ( )} for AUD. Denoting the estimated efcustom-charactertive channel matrix G{circumflex over ( )}H{circumflex over ( )}A{circumflex over ( )}, the element-wise LLR can be written as










Λ
nm

=

log






(

0
,


γ
nm

+


ψ
nm
h




g
^

nm




)




(

0
,


ψ
nm
h




g
^

nm



)



.






(
39
)







From the above, the user activity can be detected by combining the LLRs Λnm for all the receive antenna dimensions N. However, such a detection policy ignores the presence of the block-wise sparsity due to spatial non-stationarity, leading to detection performance degradation. To address this issue, the following sub-array activity aware AUD policy is considered.











a
^

m

=

{



1





if


max
s



(







n


Φ

(
s
)





Λ
nm


)



0

,





0



otherwise
.









(
40
)







Method 1 Bilinear Message Passing for JACE in XL-MIMO with Non-Stationarity





    • Inputs: Y and X, and initializers Ĥ and {circumflex over (Ψ)}h,

    • Outputs: Ĥ and Â

    • Internal Parameters: Γsm, {circumflex over (ϕ)}sm, σ2, λ, η and tmax









For


all



(

n
,
m
,



)









1
:




a
^



n



,
m


(
1
)



0

,



ψ


n



,
m

a

(
1
)


0









2
:




h
^



,
nm


(
1
)





[

H
ˆ

]

nm


,



ψ


,
nm

h

(
1
)




[


Ψ
ˆ

h

]

nm










for


t

=
1

,

,

t
max







For


all



(

n
,
m
,



)











3
:



y
˜


m
,

n









y

n




-







i

m

M




h
^



,
ni





a
^



n



,
i




x

i










Eq
.


(
9
)














4
:


v

m
,

n




y











i

m

M



(






"\[LeftBracketingBar]"



h
ˆ



,
ni




"\[RightBracketingBar]"


2



ψ


n



,
i

a


+


(





"\[LeftBracketingBar]"



a
^



n



,
i




"\[RightBracketingBar]"


2

+

ψ


n



,
i

a


)



ψ


,
ni

h



)






"\[LeftBracketingBar]"


x

i






"\[RightBracketingBar]"


2


+

σ
2






Eq
.


(
11
)











5
:


v

m
,

n




h






ψ


n



,
m

a



γ
nm






"\[LeftBracketingBar]"


x

m






"\[RightBracketingBar]"


2


+

v

m
,

n




y













6
:


v

m
,

n




a






ψ


,
nm

h


λ





"\[LeftBracketingBar]"


x

m






"\[RightBracketingBar]"


2


+

v

m
,

n




y








Eq
.


(
13
)















7
:


θ


,
nm

h






(







i



L




|



a
^


ni
,
m




x
mi



|
2



v

m
,
ni

h



)


-
1




and



μ


,
nm

h






θ


,
nm

h








i



L






y
~


m
,
ni





a
ˆ


ni
,
m

*



x
mi
*



v

m
,
ni

h







Eq
.


(
16
)














8
:


θ


n



,
m

a






(







j

n

N








i



L







"\[LeftBracketingBar]"




h
^


i
,
jm




x

m

i





"\[RightBracketingBar]"


2


v

m
,
ji

a



)


-
1




and



μ


n



,
m

a






θ


n



,
m

a








j

n

N








i



L






y
~


m
,
ji




h

i
,
jm

*



x
mi
*



v

m
,
ji

a







Eq
.


(
18
)














9
:



a
^



n



,
m





(

1
+



1
-
λ

λ



exp

(

-

(






"\[LeftBracketingBar]"


μ


n



,
m

a



"\[RightBracketingBar]"


2


θ


n



,
m

a


-





"\[LeftBracketingBar]"


1
-

μ


n



,
m

a




"\[RightBracketingBar]"


2


θ


n



,
m

a



)


)



)





Eq
.


(
21
)














10
:


ψ


n



,
m

a






1
-
λ

λ



exp

(

-

(






"\[LeftBracketingBar]"


μ


n



,
m

a



"\[RightBracketingBar]"


2


θ


n



,
m

a


-





"\[LeftBracketingBar]"


1
-

μ


n



,
m

a




"\[RightBracketingBar]"


2


θ


n



,
m

a



)


)





(

1
+




1
-
λ

λ



exp

(

-

(






"\[LeftBracketingBar]"


μ


n



,
m

a



"\[RightBracketingBar]"


2


θ


n



,
m

a


-





"\[LeftBracketingBar]"


1
-

μ


n



,
m

a




"\[RightBracketingBar]"


2


θ


n



,
m

a



)


)



)


-
2







Eq
.


(
22
)










For


all



(

m
,
s
,



)











11
:


μ


,


Φ

(
s
)


m


h





[


μ


,


(


v

(

s
-
1

)

+
1

)


m


h

,

,

μ


,


v

(
s
)


m


h


]

T





Eq
.


(
15
)












12
:


Θ


,


Φ

(
s
)


m


h




diag

[


θ


,


(


v

(

s
-
1

)

+
1

)


m


h

,

,


θ


,


v

(
s
)


m


h


]


)










13
:


τ


,
ms






1
+



(

1
-


ϕ
ˆ

sm


)



ϕ
ˆ

sm







"\[LeftBracketingBar]"




Γ
sm

+


Θ
h





,


Φ

(
s
)


m




"\[RightBracketingBar]"





"\[LeftBracketingBar]"



Θ
h

,


Φ

(
s
)


m




"\[RightBracketingBar]"




exp



(


-


μ


,


Φ

(
s
)


m


h

(


Θ


,


Φ

(
s
)


m



h
-
1


-



(


Γ
sm

+

Θ


,


Φ

(
s
)


m


h


)


-
1



)




μ


,


Φ

(
s
)


m


h


)







Eq
.


(
25
)














14
:



ϕ
ˆ

ms


=


ϕ
ˆ




1
MSL









=
1

L








m
=
1

M








s
=
1

S



1

τ


,
ms









Eq
.


(
32
)















15
:



h
¯



,


Φ

(
s
)


m










Γ
sm

(


Γ
sm

+

Θ


,


Φ

(
s
)


m


h


)


-
1



τ


,
ms





μ


,


Φ

(
s
)


m


h








Eq
.


(
26
)















16
:



Ψ
¯



,


Φ

(
s
)


m


h






(


τ


,
ms


-
1

)



diag



(



h
¯



,


Φ

(
s
)


m







h
¯



,


Φ

(
s
)


m


H


)


+




Θ


,


Φ

(
s
)


m


h





Γ
sm

(


Γ
sm

+

Θ


,


Φ

(
s
)


m


h


)


-
1




τ


,
ms








Eq
.


(
27
)











17
:


Damping

[
30
]

:



h
ˆ



,


Φ

(
s
)


m







η



h
¯



,


Φ

(
s
)


m




+


(

1
-
η

)




h
ˆ



,


Φ

(
s
)


m












18
:



Ψ
ˆ



,


Φ

(
s
)


m


h





η



Ψ
¯



,


Φ

(
s
)


m


h


+


(

1
-
η

)




Ψ
ˆ



,


Φ

(
s
)


m


h









end


for







19
:

For



all





(

n
,
m
,


)


,

update



v

m
,

n




h



and



v

m
,

n




a



by


repeating


lines


3


to


6











20
:

For



all





(

n
,
m

)


,


θ
nm
h






(







i
=
1

L







"\[LeftBracketingBar]"




a
ˆ


ni
,
m




x

m

i





"\[RightBracketingBar]"


2


v

m
,
ni

h



)


-
1




and



μ
nm
h





θ
nm
h








i
=
1

L






y
~


m
,
ni





a
ˆ


ni
,
m

*



x
mi
*



v

m
,
ni

h








Eq
.


(
16
)















21
:

For



all





(

m
,
s

)


,



h
ˆ



Φ

(
s
)


m








Γ
sm

(


Γ
sm

+

Θ


Φ

(
s
)


m

h


)


-
1



τ
ms




μ


Φ

(
s
)


m

h




H
ˆ








Eq
.


(
26
)











For


all


m







22
:

Refresh



θ
m
a






(







j
=
1

N








i
=
1

L







"\[LeftBracketingBar]"




h
^


i
,
jm




x
mi




"\[RightBracketingBar]"


2


v

m
,
ji

a



)


-
1




and



μ
m
a






θ
m
a








j
=
1

N








i
=
1

L






y
~


m
,
ji





h
ˆ


i
,
jm

*



x
mi
*



v

m
,
ji

a










23
:

refresh




a
^

m





(

1
+



1
-
λ

λ


exp



(

-

(






"\[LeftBracketingBar]"


μ
m
a



"\[RightBracketingBar]"


2


θ
m
a


-





"\[LeftBracketingBar]"


1
-

μ
m
a




"\[RightBracketingBar]"


2


θ
m
a



)


)



)


-
1













24
:

make


hard


decision


on




a
^

m





A
^

.







Eq
.


(
40
)









Method Description

In this section several remarks on the message passing and consensus mechanisms for JACE proposed above are described, which for convenience is concisely summarized in method 1. Referring to method 1, first notice that the procedure requires two initialization quantities, namely, initial values of the channel matrix H{circumflex over ( )} and error covariance matrix Ψ{circumflex over ( )}h, which can be obtained via a number of state-of-the art methods, such as the AUD-aware approximate BP algorithm, adopted here due to its complexity-performance tradeoff advantages. Besides that, the proposed JACE mwthod takes as inputs the received signal matrix Y and the pilot matrix X; to which it outputs estimates of the channel matrix H{circumflex over ( )} and of the user activity matrix A{circumflex over ( )}.


The algorithm has two essential stages, the iterative stage described by lines 3 to 18 within which the beliefs are propagated and exchanged between factor and variable nodes, and the consensus stage where the output quantities are finally determined based on the obtained beliefs, as summarized in lines 19 to 24. Notice that lines 17 and 18 correspond to a well-known damping procedure which aims to avoid estimates being trapped at a local optimum, especially at the early stage of the iterations by allowing a slow update of the quantities custom-character, custom-character, custom-character, and custom-character.


This is due to the fact that at the early stage of the iterative process, the Gaussian approximation assumed in equation (9) may not capture the actual statistics of the effective noise, which might lead to convergence to a local optimum point.


Notice also that the consensus stage includes in line 22 a self-feedback step in which the sum operation without its performed index exclusion so as to yield the desired dimension of the variables of interest. It is also worth-noting that the number of iterations is fixed here to tmax only for the sake of the complexity analysis to be offered later. In practice, the process can be terminated at a fewer (also adaptively-determined) number of iterations, resulting in lower total complexity. The possibility of reducing the number of iterations is studied later via the convergence behavior of the algorithm, where it is shown that approximately 9 iterations are sufficient for convergence, regardless of signal-to-noise-ratio (SNR) levels.


Simulation Results

In this part, the estimation performance of the proposed bilinear inference method under various system setups are assessed. In particular, the normalized mean square error (NMSE) and activity error rate (AER) are considered as key performance metrics to measure, respectively, the estimation accuracy of channel coefficients, as well as user activity indicators.


The NMSE and AER are respectively defined as











N

M

S

E


=
Δ






HA
-


H
ˆ



A
ˆ





F
2




HA


F
2



,




(
41
)















A

E

R


=
Δ






"\[LeftBracketingBar]"






"\[RightBracketingBar]"


M


1


,






(
42
)










    • where H{circumflex over ( )} and A{circumflex over ( )} denoting estimated channel and user activity matrices, respectively, custom-character denotes the true activity index set, |⋅| denotes the cardinality of a given set, and the operator \ denotes the relative complement, such that |custom-character|≤M, |custom-character|≤M, and |custom-character\custom-character|≤M.





Throughout the section, the following parameters are utilized, unless specified otherwise. The number of total antenna elements and sub-arrays are respectively assumed to be N=400 and S=100, indicating that each sub-array possesses Ns=4 antenna elements. This setup can be interpreted as an XL-MIMO system consisting of multiple sub-arrays with each being a 2×2 patch antenna array, for instance. The total number of time indices and potential users is set to L={50,70} and M=200, respectively. The user activity ratio is assumed to be λ=0.1, while the number of active users at each channel realization is modeled as a binomial random variable with mean λM. The variance of channel coefficients is assumed to be identical and modeled as ϕ=ϕsm=1/M for all m and s, whereas different models for the non-stationarity phenomena are considered.


As for the algorithmic parameters, the maximum number of iterations is assumed to be tmax=32, while the damping factor η is set to 0.5. The sub-array activity indicator ϕ is automatically learned over iterations via the EM framework presented in Section III-D. It is assumed that initial estimates (i.e., Ĥ, {circumflex over (Ψ)}h) are obtained via the low-complexity multiple measurement approximate belief propagation (MMVABP) algorithm.


Comments on Complexity

Before presenting results on the actual performance of the proposed bilinear inference method for JACE, we analyze its computational complexity in terms of the number of floating point operations (flops) required at each iteration of the algorithm. Since all the calculations in Method 1 are scalar-by-scalar and the required inverse operation is performed with a diagonal matrix, the number of multiplication, division, subtraction, and addition operations is of order custom-character(NML), which is linear with respect to each of available resource dimensions. In Method 1, the number of iterations is set to tmax, implying that the total complexity is of order custom-character(tmaxNML).


Similarly, the computational complexity of existing linear inference algorithms is also of order custom-character(tmaxSotANML), where tmaxSotA is the total number of iterations of existing linear inference algorithms. And since both the proposed and existing JACE method are based on the Bayesian message passing approach, the total number of iterations until convergence required by our method is comparable to those of existing alternatives (i.e. tmax≈tmaxSotA), such that it can be concluded that the proposed method has the same order of complexity of existing JACE methods. It will be shown in the sequel, however, that the proposed method outperform existing alternatives in terms of estimation accuracy, measured by NMSE and AER as defined in equations (41) and (42).


Uniformly Random Non-Stationarity

Aiming at evaluating the fundamental performance improvement attained by the proposed JACE algorithm, it is considered in this subsection an XL-MIMO system subjected to uniformly random sub-array activity pattern. In other words, the sub-array activity indicators pms for all m and s are independently generated as a Bernoulli random variable, with the corresponding mean Φsm set to be Φsm=0.2, such that the number of the total active sub-arrays at each channel realization follows the Binomial distribution with order S, and 20% of the total subarrays are active at each channel realization in an average sense.



FIG. 2 shows the NMSE performance with respect to SNR with N=400 and M=200 for different pilot lengths. For the sake of comparison, two state-of-the-art methods are considered, namely the conventional linear minimum mean square error (MMSE) estimator, and an MMVABP scheme, which is a generalization of the multiple measurement vector approximate message passing (MMVAMP) algorithm. Comparing these three algorithms highlights performance gains due to awareness both to column-wise sparsity in the channel matrix resulting from grant free access, and to block-wise sparsity of active columns of the channel matrix, resulting from spatial nonstationarity. For instance, consider the comparison of NMSE performances of the three distinct algorithms as a function of SNR in decibels as shown in FIG. 2, for different pilot lengths (i.e., L∈{50, 70}), with pilot sequences designed via the quadratic complex sequential iterative decorrelation via convex optimization (QCSIDCO) algorithm in order to mitigate pilot contamination due to the non-orthogonal structure of X∈CM×L with M>>L.


For the sake of a further reference, we also include curves (in solid line without markers) corresponding to lower-bounding NMSE performances obtained by the least square (LS) estimator aided by a genie, i.e with perfect knowledge of active user and sub-array activity indicators.


The FIG. 2 clearly illustrates the impact of the two distinct factors which impose structured sparsity upon the channel matrix. In particular, it can be seen that regardless of the length of the pilot sequence, the MMSE estimator suffers from a high error floor in terms of its NMSE performance, while the MMVABP algorithm improves as the SNR increases. The gains of MMVABP over the MMSE method is due to the awareness to column-wise sparsity in the channel matrix—i.e., awareness to user activity—which the MMVABP method incorporates, while the MMSE method does not. A a large gap exists between the performance of MMVABP and the lower-bound. In comparison to the latter two methods, the proposed method exhibits a substantial gain over the MMVABP approach, thanks to the fact that the proposed technique incorporates awareness not only to user activity, but also to the sub-array activity caused by spatial non-stationarity. As a result, the proposed method is found to actually reach the theoretical lower bound over a wide SNR range and starting from relatively low SNRs.


From these comments, one may conclude that the gain between the MMSE and the MMV-ABP methods results from awareness to user activity, while the gain between MMVABP and the proposed method is due to awareness to sub-array activity. It is also worth-mentioning that the sub-array activity indicators Φsm are automatically learned for each channel realization via the EM framework presented in Section III-D, such that estimating such parameters before transmission is not necessary, contributing to improving the efficiency of the XL-MIMO system.



FIG. 3a, b shows the AER performance with respect to SNR with N=400 and M=200 for different pilot lengths. The AER performances of the proposed and the best state-of-the-art methods (namely, the MMVABP) are considered, omitting results for the MMSE scheme as it was found to be inferior to the latter. In addition, notice that showing Genie-aided lower bounding results is not useful, since the Genie-aided LS estimator has perfect knowledge of user and sub-array activities, such that AER performance is always 0.


The results are shown in FIG. 3 for different pilot lengths as done in FIG. 2. As expected, but interestingly, it is found that the proposed method significantly outperforms MMVABP also in terms of the AER performance. For instance, it can be seen that the relative AER gain of the proposed method over MMVABP is more than 4 [dB] in SNR at 10−5 of AER for both short and long pilot scenarios. In addition, it can be seen that the gradient of the AER curve of the proposed algorithm is steeper than that of the MMVABP approach.



FIG. 4: shows the resilience of the proposed method against different sub-array activity indicators in percentage. Having clarified the NMSE and AER gains of the proposed method, the attention to resilience and convergence aspects of the proposed algorithm are taken in account. In FIG. 4 a comparison between the NMSE performance of the MMVABP, the Genie-aided LS, and the proposed estimators as a function of the sub-array activity indicators are proceeded. It has to be remarked that the channel is stationary at 100% sub-array intensity (i.e., at the right edge of the figure), while non-stationarity effects becomes severer as the sub-array intensity decreases. The results suggest that the proposed method is a generalization of the MMVABP method, capturing effects not only from the user activity but also from the sub-array activity. Thus, the performance of the proposed algorithm approaches that of MMVABP in case of a stationary channel (i.e., Φsm=1), while offering significant gains over the latter as the non-stationarity increases.



FIG. 5 shows the convergence behavior of the proposed algorithm with respect to the number of algorithmic iterations. In FIG. 5, the convergence behavior of the proposed algorithm as a function of the number of the algorithmic iterations for different pilot lengths is illustrated. It is shown in the figure that although a relatively large value for the maximum number of iterations (t=32) are assumed, the algorithm converges within 10 iterations under both pilot lengths considered. This implies that the total complexity of the method commented in Subsection IV-A can be further reduced (by more than a half) by setting a certain convergence criterion.


Matern-Cluster Point Process Based Non-Stationarity

The comparison results shown in the previous subsections serve the purpose of quantifying the gains achievable by the proposed method over state-of-the-art alternatives, which stem in particular from the ability of the contributed scheme to detect both user and sub-array activity. It can be argued, however, that the uniformly random sub-array activity pattern is somewhat artificial, since in realistic scenarios, such patterns are characterized by VRs. Indeed, in practice the likelihood of activation of a certain sub-array is highly correlated with that of neighboring sub-arrays, such that VRs tend to occur in clusters. In this subsection, a repetition of the test reported above, utilizing this time a stochastic geometry approach to model the aforementioned geometrical correlation among the activity indicators of sub-arrays, so as to mimic the cluster-like nature of VRs, as illustrated in FIG. 1. To this end, the Matérn-cluster point process (MCPP) is considered—not to be confused with Matérn hardcore point process—to model the non-stationarity effects in XL-MIMO systems.


In order to bring MCPP into the simulation setup, we consider a rectangular area in which sub-arrays are placed following an equispaced grid. Within this area, MCPP is leveraged to generate random clusters with a constant radius r and centers following a homogeneous Poisson point process (PPP) with an intensity μ. Each cluster generated by MCPP is regarded as a VR, and therefore, sub-arrays located in the clusters are considered active, whereas sub-arrays located outside the clusters are assumed to be inactive.



FIG. 6 shows the MCPP-based subarray activity and FIG. 7 shows the uniformly random subarray activity. To visualize the difference between MCPP-based and uniformly random non-stationarity models, in FIGS. 6 and 7 a comparison of sub-array activity patterns for the two different models for a given realization is given, with the number of active antennas set to be identical in both cases. In the figures, white and black squares indicate inactive and active antennas, respectively, where we assumed a 2×2 square sub-array, Height=30 [m], Width=30 [m], μ=4 and r=5. One can observe from the figures that the MCPP-based approach clearly illustrates clustered VRs, capturing more realistically the behavior of the non-stationarity, while the uniformly random counterpart shows a more scattered distribution of VRs


With the stochastic-geometric VR generation model described, we proceed to the performance assessment of the JACE algorithms under this MCPP-based non-stationarity model. In this section, we evaluate the estimation performance of the proposed method in comparison with the two state-of-the-art estimators as well as the Genie-aided ideal performance for different cluster setups, by considering different cluster intensities μ and the radius r and studying the impact of both parameters on the detection performance.



FIG. 8
a, b, c shows the NMSE Performance with respect to SNR with N=400, M=200, and L=70 with MCPP for different μ. In FIG. 8 the NMSE performances of the three distinct detection algorithms are compared for different cluster intensities μ and a fixed radius size r=5 [m], with the Genie-aided ideal performance also included for reference. As expected based on the previous results of FIGS. 2 and 4, the proposed method outperforms both the MMVABP and the conventional linear MMSE methods, although the performance gain diminishes slightly as the cluster intensity increases, which is expected since with for larger cluster intensities the number of active subarrays itself grows. It is also observed that once again the proposed algorithm reaches the Genie-aided ideal performance for a wide range of SNR regardless of the cluster intensity level.



FIG. 9
a, b, c shows the AER Performance with respect to SNR with N=400, M=200, and L=70 with MCPP for different μ. In FIG. 9 the AER performance of the proposed algorithm against that of the MMVABP scheme is compared, again for different cluster intensity levels and as a function of SNR. The figure confirms that the proposed method is effective also in terms of the AER performance.



FIG. 10 shows the NMSE performance of the proposed method for different cluster intensities. The actual array activity ratios for μ=3, 6 and 9 are annotated by allows.



FIG. 11 shows the NMSE performance of the proposed method for different cluster radius sizes. The actual array activity ratios for μ=3, 6 and 9 are annotated by allows.


Having shown the effectiveness of the proposed algorithm even in case of clustered sub-array activity, in FIGS. 10 and 11 the NMSE performance of the proposed algorithm as a function of cluster intensity μ and radius r, respectively, for two different SNR levels are calculated. For ease of interpretation of the results, the actual sub-array activity ratios, defined as the ratio between the number of active sub-arrays and the total number of sub-arrays, are annotated by arrows for μ=3, 6 and 9. The figures illustrate the fact that the performance of the proposed JACE algorithm is mostly dependent on the actual activity indicator, rather than the shape of clusters, implying an inherent robustness against the nature of the spatial non-stationarity.


In this application, a solution of JACE problem in grant-free uplink XL-MIMO systems subject to spatial non-stationarity is solved, where the user activity and the sub-array activity jointly impose structured sparsity onto the channel matrix. For such a system, a new system model is introduced in order to characterize the structured sparsity of the channel, formulating the estimation problem of a variable following a nested Bernoulli-Gaussian distribution. To tackle this intractable estimation problem, we a novel estimation method is proposed based on the bilinear Bayesian inference framework, deriving all the updates in closed-form. The proposed method possesses linear complexity with respect to the dimensions of the receive antenna array, number of users, and time resources, respectively. In order to numerically study the benefits of the proposed method, performance assessments via Monte-Carlo simulations, revealing the effectiveness of the proposed algorithm in terms of the NMSE and AER performance indicators were evaluated. This application also reports one of the first attempts to adopt stochastic geometry (SG) to model the clustered nature of the partial observations at XL-MIMO arrays due to spatial non-stationarity. In particular, the MCPP to model such observed clusters are proposed, showing the superiority of the proposed method regardless of the cluster size, intensity, and sub-array activity ratio.


FIG. 12: Describing the Flowchart of the Inventive Method

The method is able to receive signals and initials the channel estimation. In the following step a soft interference cancel check is proceeded. If the check results in a negative expression the calculation of residual mean and variance is proceeded with the help of the equations in line 4 of the flowchart of the method 1 named Bilinear Message Passing for JACE in XL-MIMO with Non-Stationarity. Afterwards with the help of the equations in line 5-7 of the method 1 named Bilinear Message Passing for JACE in XL-MIMO with Non-Stationarity the extrinsic mean and variance is calculated. If the check results in positive the extrinsic mean and variance is calculated after the check of the software interference cancel. After the calculation of the extrinsic mean and variance is calculated the calculation of tentative estimates are proceed with the equations in line 8 to 11 of the method 1 named Bilinear Message Passing for JACE in XL-MIMO with Non-Stationarity. The tentative estimation includes activity factors calculation with the equation in line 12 of method 1 named Bilinear Message Passing for JACE in XL-MIMO with Non-Stationarity.


The condition of reaching the maximum formed by the proceeding the equations in line 13-19 of the of method 1 named Bilinear Message Passing for JACE in XL-MIMO with Non-Stationarity.


The maximum iteration is not reached it is checked and the result is no to proceeding and returns to the step check the condition the soft interference cancel. If the maximum iteration is reached is check and the result is positive the inventive method is terminated and ends and will be ready for starting uplink transmission.


FIG. 13: Illustrates the Grand Free Random Access

In FIG. 13 grand based random access and grant free random access over the access time is illustrated. Grant-free access has been identified by 3GPP as a potential solution for Industrial Internet-of-Things applications in 5G networks. It allows to decrease overhead and delay, but it is also prone to collisions in the high-load regime. To reduce the effects of collisions, Non-Orthogonal Multiple Access or other Successive Interference Cancellation (SIC) protocols can be applied, allowing to partially recover collisions.


5G networks are expected to satisfy diverse requirements of upcoming Internet of Things (IoT) applications. Especially challenging requirements come from a subset of Industial IoT (IIoT) applications, where ultra-reliable and low-latency communication (URLLC) is needed. IIoT communication patterns are typically sporadic and consist of occasional small packet transmissions. For such communication patterns, purely grant-based communication inherited from LTE becomes inefficient due to high overhead and delays associated with acquisition of a scheduling grant. To overcome this issue, grant-free and hybrid operation modes are considered by 3GPP as potential enablers for low-latency IIoT. In a grant-free mode, User Equipments (UEs) are allowed to use a certain fraction of resources for direct transmissions to the next Generation Node B (gNB) without requesting the scheduling grant prior to transmission. Grant-free mode further considers two options: dedicated mode (semi-persistent scheduling), or shared mode (random access).


In essence, grant-free protocols with shared resources are partially coordinated random access protocols, where collisions between UEs on the same grant-free resources might occur. Therefore, grant-free protocols only work well in low to moderate load scenarios. If load rises above a certain level, collision probability becomes high and the delay rapidly grows. To reduce the effects of collisions and provide higher throughput, novel random access protocols based on Successive Interference Cancellation (SIC) have been proposed, including Non-Orthogonal Multiple Access (NOMA). In general in a grant based random access a packet arrival is proceeded, a random access preamble, a random access response, a radioa resource control request, a radio resource control setup and the scheduling request and uplink grant is continued. After all this steps a uplink data transmission is able to be performed.


The supported grant-free random access with the help the presented inventive is a latency reduction which is a based on the reduced amount of the complexity. After the packet arrival a preamble and uplink data transmission can be proceeded. The reduction of the steps can be easily seen as the amount of proceeding steps over the access time is shown in FIG. 13.

Claims
  • 1. A method of joint user activity detection and channel information estimation in extra-large Multiple-Input Multiple-Output (XL-MIMO) systems with non-stationarities, comprising: receiving signals and initialization of a channel estimation;performing a soft interference cancel check, whereby, if the soft interference cancel check result is negative, the calculation of residual mean and variance is performed and whereby, if the soft interference cancel check result is positive, the extrinsic mean and variance is calculated directly;calculating the extrinsic mean and variance, whereby, if the soft interference cancel check result is negative, the calculation of residual mean and variance is used;calculating tentative estimates, whereby the calculation of tentative estimation includes activity factors calculation;determining whether a condition of reaching a maximum is fulfilled whereby, if the condition of reaching the maximum fulfilled check result is negative, soft interference cancel check is performed and whereby, if the condition of reaching the maximum fulfilled check result is positive, performance of the method ends.
  • 2. The method of claim 1, wherein after ending a preamble and uplink data transmission via a grant-free random access is proceeded.
  • 3. The method of claim 1, wherein a point process, which models randomly located clusters within a given area, defines an area where antenna arrays are embedded.
  • 4. The method of claim 1 characterized by a modification to an iterative shrinkage-thresholding algorithm (ISTA) via boxing with range limiting and hard-thresholding is proceeded.
  • 5. The method of claim 1, using a boxed-hard iterative shrinkage-thresholding algorithm (ISTA), a greedy selection of the positions of the antennas index and the symbol estimates, and their independent decoding of the corresponding antenna modulated and symbol modulated bits is determined.
  • 6. The method of claim 1, wherein process working parallel to the greedy detections, to ensure valid estimates of the index vectors from the given finite set of index vectors are produced at the output of the method, and to apply interference cancellation with the confirmed values, while keeping track of which indices have been retrieved from the greedy selections, before every iteration a check is performed whether from the currently decoded indices, a final confirmation can be made, and, if the final confirmation cannot be made, remove the interference by the previous greedy selection and the next iteration is proceeded.
  • 7. A receiver of a communication system having a processor, volatile and/or non-volatile memory, at least one interface adapted to receive a signal in a communication channel, wherein the non-volatile memory stores computer program instructions which, when executed by the microprocessor, configure the receiver to perform operations comprising: receiving signals and initialization of a channel estimation;performing a soft interference cancel check, whereby, if the soft interference cancel check result is negative, the calculation of residual mean and variance is performed and whereby, if the soft interference cancel check result is positive, the extrinsic mean and variance is calculated directly;calculating the extrinsic mean and variance, whereby, if the soft interference cancel check result is negative, the calculation of residual mean and variance is used;calculating tentative estimates, whereby the calculation of tentative estimation includes activity factors calculation;determining whether a condition of reaching a maximum is fulfilled whereby, if the condition of reaching the maximum fulfilled check result is negative, soft interference cancel check is performed and whereby, if the condition of reaching the maximum fulfilled check result is positive, performance of the operations ends.
  • 8. (canceled)
  • 9. (canceled)
  • 10. The receiver of claim 7, wherein after ending a preamble and uplink data transmission via a grant-free random access is proceeded.
  • 11. The receiver of claim 7, wherein a point process, which models randomly located clusters within a given area, defines an area where antenna arrays are embedded.
  • 12. The receiver of claim 7 characterized by a modification to an iterative shrinkage-thresholding algorithm (ISTA) via boxing with range limiting and hard-thresholding is proceeded.
  • 13. The receiver of claim 7, using a boxed-hard iterative shrinkage-thresholding algorithm (ISTA), a greedy selection of the positions of the antennas index and the symbol estimates, and their independent decoding of the corresponding antenna modulated and symbol modulated bits is determined.
  • 14. The receiver of claim 7, wherein process working parallel to the greedy detections, to ensure valid estimates of the index vectors from the given finite set of index vectors are produced at the output of the method, and to apply interference cancellation with the confirmed values, while keeping track of which indices have been retrieved from the greedy selections, before every iteration a check is performed whether from the currently decoded indices, a final confirmation can be made, and, if the final confirmation cannot be made, remove the interference by the previous greedy selection and the next iteration is proceeded.
Priority Claims (1)
Number Date Country Kind
10 2021 207 876.1 Jul 2021 DE national
PCT Information
Filing Document Filing Date Country Kind
PCT/EP2022/070284 7/20/2022 WO