METHOD OF JOINT USER ACTIVITY DETECTION AND CHANNEL INFORMATION ESTIMATION IN EXTRA-LARGE MIMO (XL-MIMO) SYSTEMS WITH NON-STATIONARITIES

20240356589 ยท 2024-10-24

Assignee

Inventors

Cpc classification

International classification

Abstract

Joint user activity detection and channel information estimation in extra-large MIMO (XL-MIMO) systems with non-stationarities proceeds by: receiving signals and initialization of a channel estimation; performing soft interference cancel check, whereby, if the soft interference cancel check result is negative, the calculation of residual mean and variance is performed; whereby, if the soft interference cancel check result is positive, the extrinsic mean and variance is calculated directly; whereby, if the soft interference cancel check result is negative, the calculation of residual mean and variance is used, whereby the calculation of tentative estimation includes activity factors calculation; if reaching the maximum is not fulfilled, soft interference cancel check is performed; whereby, if reaching the maximum is fulfilled, the proceeding ends.

Claims

1. A method of joint user activity detection and channel information estimation in extra-large Multiple-Input Multiple-Output (XL-MIMO) systems with non-stationarities, comprising: receiving signals and initialization of a channel estimation; performing a soft interference cancel check, whereby, if the soft interference cancel check result is negative, the calculation of residual mean and variance is performed and whereby, if the soft interference cancel check result is positive, the extrinsic mean and variance is calculated directly; calculating the extrinsic mean and variance, whereby, if the soft interference cancel check result is negative, the calculation of residual mean and variance is used; calculating tentative estimates, whereby the calculation of tentative estimation includes activity factors calculation; determining whether a condition of reaching a maximum is fulfilled whereby, if the condition of reaching the maximum fulfilled check result is negative, soft interference cancel check is performed and whereby, if the condition of reaching the maximum fulfilled check result is positive, performance of the method ends.

2. The method of claim 1, wherein after ending a preamble and uplink data transmission via a grant-free random access is proceeded.

3. The method of claim 1, wherein a point process, which models randomly located clusters within a given area, defines an area where antenna arrays are embedded.

4. The method of claim 1 characterized by a modification to an iterative shrinkage-thresholding algorithm (ISTA) via boxing with range limiting and hard-thresholding is proceeded.

5. The method of claim 1, using a boxed-hard iterative shrinkage-thresholding algorithm (ISTA), a greedy selection of the positions of the antennas index and the symbol estimates, and their independent decoding of the corresponding antenna modulated and symbol modulated bits is determined.

6. The method of claim 1, wherein process working parallel to the greedy detections, to ensure valid estimates of the index vectors from the given finite set of index vectors are produced at the output of the method, and to apply interference cancellation with the confirmed values, while keeping track of which indices have been retrieved from the greedy selections, before every iteration a check is performed whether from the currently decoded indices, a final confirmation can be made, and, if the final confirmation cannot be made, remove the interference by the previous greedy selection and the next iteration is proceeded.

7. A receiver of a communication system having a processor, volatile and/or non-volatile memory, at least one interface adapted to receive a signal in a communication channel, wherein the non-volatile memory stores computer program instructions which, when executed by the microprocessor, configure the receiver to perform operations comprising: receiving signals and initialization of a channel estimation; performing a soft interference cancel check, whereby, if the soft interference cancel check result is negative, the calculation of residual mean and variance is performed and whereby, if the soft interference cancel check result is positive, the extrinsic mean and variance is calculated directly; calculating the extrinsic mean and variance, whereby, if the soft interference cancel check result is negative, the calculation of residual mean and variance is used; calculating tentative estimates, whereby the calculation of tentative estimation includes activity factors calculation; determining whether a condition of reaching a maximum is fulfilled whereby, if the condition of reaching the maximum fulfilled check result is negative, soft interference cancel check is performed and whereby, if the condition of reaching the maximum fulfilled check result is positive, performance of the operations ends.

8. (canceled)

9. (canceled)

10. The receiver of claim 7, wherein after ending a preamble and uplink data transmission via a grant-free random access is proceeded.

11. The receiver of claim 7, wherein a point process, which models randomly located clusters within a given area, defines an area where antenna arrays are embedded.

12. The receiver of claim 7 characterized by a modification to an iterative shrinkage-thresholding algorithm (ISTA) via boxing with range limiting and hard-thresholding is proceeded.

13. The receiver of claim 7, using a boxed-hard iterative shrinkage-thresholding algorithm (ISTA), a greedy selection of the positions of the antennas index and the symbol estimates, and their independent decoding of the corresponding antenna modulated and symbol modulated bits is determined.

14. The receiver of claim 7, wherein process working parallel to the greedy detections, to ensure valid estimates of the index vectors from the given finite set of index vectors are produced at the output of the method, and to apply interference cancellation with the confirmed values, while keeping track of which indices have been retrieved from the greedy selections, before every iteration a check is performed whether from the currently decoded indices, a final confirmation can be made, and, if the final confirmation cannot be made, remove the interference by the previous greedy selection and the next iteration is proceeded.

Description

BRIEF DESCRIPTION OF THE DRAWINGS

[0038] For a fuller understanding of the nature of the present invention, reference should be had to the following detailed description taken in connection with the accompanying drawings. So that the manner in which the above-recited features of the present disclosure can be understood in detail, a more particular description, briefly summarized above, may be had by reference to aspects, some of which are illustrated in the drawings. It is to be noted, however, that the appended drawings illustrate only certain aspects of this disclosure and are therefore not to be considered limiting of its scope, for the description may admit to other equally effective aspects.

[0039] FIG. 1: Illustration of the uplink of a multiuser XL-MIMO system with spatial non-stationarity, whereby each user independently activates different subarrays of the XL-MIMO array depending propagation conditions.

[0040] FIG. 2: NMSE performance with respect to SNR with N=400 and M=200 for different pilot lengths.

[0041] FIG. 3: AER performance with respect to SNR with N=400 and M=200 for different pilot lengths.

[0042] FIG. 4: Resilience of the proposed algorithm against different sub-array activity indicators in perce.

[0043] FIG. 5: Convergence behavior of the proposed algorithm with respect to the number of algorithmic iterations.

[0044] FIG. 6: MCPP-based subarray activity.

[0045] FIG. 7: Uniformly random subarray activity.

[0046] FIG. 8: NMSE Performance with respect to SNR with N=400, M=200, and L=70 with MCPP for different .

[0047] FIG. 9: AER Performance with respect to SNR with N=400, M=200, and sL=70 with MCPP for different .

[0048] FIG. 10: NMSE performance of the proposed method for different cluster intensities. The actual array activity ratios for =3, 6 and 9 are annotated by allows.

[0049] FIG. 11: NMSE performance of the proposed method for different cluster radius sizes. The actual array activity ratios for =3, 6 and 9 are annotated by allows.

[0050] FIG. 12: Describing the Flowchart of the inventive method.

[0051] FIG. 13: Illustrates the Grand Free Random Access.

DETAILED DESCRIPTION

[0052] Extra large MIMO (XL-MIMO) systems are subject to spatial non-stationarity which leads to a doubly-sparse and user-specific structure of received signals, such that the activity of each user at each sub-array can be characterized by a nested Bernoulli-Gaussian distribution. This application considers the joint activity and channel estimation (JACE) problem in XL-MIMO systems subject to spatial non-stationarity, offering two major embodiments solving this problem.

[0053] The first is a novel bilinear Bayesian inference method capable of jointly estimating sub-array activity patterns (a.k.a. spatial non-stationarity), user activity patterns, and associated channel coefficients, boosted by expectation maximization (EM)-based auto-parameterization.

[0054] The second embodiment is the introduction of realistic Poisson point process (PPP) and Matern-cluster point process (MCPP) stochastic-geometry (SG) models to simulate sub-array activity patterns, which enables the performance assessment of both the proposed and state-of-the-art (SotA) XL-MIMO JACE solutions under different conditions in a structured manner. The efficiency of the proposed bilinear JACE method is confirmed by numerical simulations, which shows that the proposed method not only significantly outperforms the SotA but also can reach the performance of a genie-aided (theoretical) scheme over wide signal-to-noise-ratio (SNR) ranges.

[0055] A Matrn cluster point process is a type of cluster point process, meaning that its randomly located points tend to form random clusters. Using techniques from spatial statistics, it is possible to make the definition of clustering more precise. This point process is an example of a family of cluster point processes known as Neyman-Scott point processes, which have been used in spatial statistics and telecommunications.

[0056] The Matrn cluster point process should not be confused with the Matrn hard-core point process, which is a completely different type of point process. Bertril Matrn proposed at least four types of point processes, and his name also refers to a specific type of covariance function used to define Gaussian processes.

[0057] Simulating a Matrn cluster point process requires first simulating a homogeneous Poisson point process with an intensity >0 on some simulation window, such as a rectangle, which is the simulation window I will use here. Then for each point of this underlying point process, simulate a Poisson number of points with mean >0 uniformly on a disk with a constant radius r>0. The underlying point process is sometimes called the parent (point) process, and its points are centres of the cluster disks.

[0058] The subsequent point process on all the disks is called daughter (point) process and it forms the clusters. It has been known about simulating the homogeneous Poisson point processes on a rectangle and a disk, so those posts are good starting points, and it won't not be focused too much on details for these steps.

[0059] The main challenge behind sampling this point process, is that it's possible for daughter points to appear in the simulation window that come from parents points outside the simulation window. In other words, parents points outside the simulation window contribute to points inside the window. To remove these edge effects, the point processes must be simulated on an extended version of the simulation window. Then only the daughter points within the simulation window are kept and the rest are removed. Consequently, the points are simulated on an extended window, but we only see the points inside the simulation window.

[0060] To create the extended simulation window, you can add a strip of width r all around the simulation window. The distance r is the maximum distance from the simulation window that a possibly contributing parent point (outside the simulation window) can exist, while still having daughter points inside the simulation window. This means it is impossible for a hypothetical parent point beyond this distance (outside the extended window) to generate a daughter point that can fall inside the simulation window.

[0061] Simulate the underlying or parent Poisson point process on the rectangle with NP points. Then for each point, simulate a Poisson number of points, where each disk now has Di number of points. Then the total number of points is simply N=D1+ . . . +DP=NPi=1 Di. The random variables P and Di are Poisson random variables with respective means A and , where A is the area of the rectangular simulation window. To simulate these random variables in MATLAB, the poissrnd function is used. To do this in R, use the standard function rpois. In Python, it can be used either functions scipy.stats.poisson or numpy.random.poisson from the SciPy or NumPy libraries.

[0062] The points of the parent point process are randomly positioned by using Cartesian coordinates. For a homogeneous Poisson point process, the x and y coordinates of each point are independent uniform points, which is also the case for the binomial point process, covered in a previous post. The points of all the daughter point process are randomly positioned by using polar coordinates. For a homogeneous Poisson point process, the and coordinates of each point are independent variables, respectively with uniform and triangle distributions, which was covered in a previous post. Then we convert coordinates back to Cartesian form, which is easily done in MATLAB with the pol2cart function. In programming languages without such a function: x= cos () and y= sin ().

[0063] In practice, all the daughter points are simulated in a disk with its centre at the origin. Then for each cluster disk, all the points have to be shifted to the origin is the center of the cluster, which completes the simulation step.

[0064] To use vectorization in the code, the coordinates of each cluster point are repeated by the number of daughters in the corresponding cluster by using the functions repelem in MATLAB, rep in R, and repeat in Python.

[0065] FIG. 1 shows an illustration of the uplink of a multiuser XL-MIMO system with spatial non-stationarity, whereby each user independently activates different subarrays of the XL-MIMO array depending propagation conditions.

Sytem Model Description

[0066] Consider an XL-MIMO system consisting of S sub-arrays, each equipped with N.sub.s antenna elements, such that the total number of antenna array elements is given by N=.sub.s=1.sup.SN.sub.s, and let GC.sup.NM be the effective channel matrix between the XL-MIMO array and M single-antenna users, which jointly depicts user activities, sub-array VRs, and the fading gains. Then, the corresponding system model as shown in FIG. 1 is given by

[00001] Y = GX + W , ( 1 ) [0067] where XC.sup.ML is a pilot matrix collecting the L signals transmitted by each user, while WC.sup.NL denotes zero-mean unit-variance independent and identically-distributed (iid) additive white Gaussian noise (AWGN) such that vec(W)custom-character(0, .sup.2I).

[0068] In equation (1), it is assumed that only a small fraction of the M users is active, while the rest remains silent during the time interval of L transmissions. Letting K be a random variable that denotes the number of active users at a given time interval, the average user-activity probability can be expressed as custom-charactercustom-character[K/M].

[0069] Furthermore, owing to non-stationarities observed in the XL-MIMO setting, the channel matrix G possesses block-sparsity that captures both user activity and the sub-arrays in their VRs (i.e. active sub-arrays), such that the m-th column of G, relative to the m-th user, can be modeled as

[00002] g m = a m .Math. g m p m , ( 2 ) [0070] where denotes the Hadamard (element-wise) product, a.sub.m{0,1} is the user activity indicator, {tilde over (g)}.sub.m is the channel response vector, and p.sub.mcustom-character[p.sub.1m, . . . , p.sub.Sm]custom-character denotes a sub-array activity indicator defined by

[00003] p sm = { 1 N s 1 if the s - th sub - array is in the VR of the m - th user , 0 N s 1 if the s - th sub - array is outside the VR of the m - th user . ( 3 )

[0071] Assuming that {tilde over (g)}.sub.m is Gaussian, as typically, the distribution of g.sub.m can be written as

[00004] g m ~ p g m ( g m ) = ( 1 - ) ( g m ) + .Math. s = 1 S f ( g ( s ) m .Math. sm , 0 , sm ) captures fading and sub - array activity , jointing all sub - arrays ( 4 ) [0072] where () denotes the Dirac delta function, .sub.sm is the covariance matrix of the m-th user's channel to the s-th sub-array, .sub.sm depicts the mean activity of the s-th sub-array, with respect to the m-th user and

[00005] f ( ) | , , ) = ( 1 - ) ( z ) + .Math. ( , ) . ( 5 ) [0073] where is an active probability, denotes a certain mean, and is a given covariance matrix.

Joint Estimation Strategy

[0074] In this section, we propose a novel bilinear message passing method for joint activity and channel estimation in XL-MIMO systems subjected to spatial non-stationarity. To this end, a decomposition of the system model given in equation (1) is carried out, followed by detailed derivations of message passing rules.

[0075] We remark that for the sake of generality, throughout the section it is assumed that the elements of the channel vectors {tilde over (g)}.sub.m are independently but not identically distributed, which is equivalent to saying that the covariance matrices .sub.sm are all diagonal, but have different norms. This is motivated by the fact that the VRs of each user at the XL-MIMO array in general result from the impinging of signals from different propagation paths, as illustrated in FIG. 1.

[0076] For the sake of future convenience, let us first reformulate equation (4) as

[00006] Y = HAX + W , ( 6 ) [0077] with Gcustom-characterHAcustom-character, where Hcustom-character is the block fading channel matrix and the MM diagonal matrix A, with diag(A)=[a.sub.1, a.sub.2, . . . , a.sub.M]{0,1}.sup.M, captures user activity indicators.

[0078] For notation simplicity, we hereafter introduce the quantity (s)custom-character.sub.i=1.sup.sN.sub.i, with (0)custom-character0, to denote the cumulative collection of sub-array antenna indices at the s-th sub-array. In order to gain a closer insight into the effect of non-stationarity onto the column vectors of the channel matrix H, consider the anatomized m-th column of H, which is given by

[00007] h m = [ p 1 m h _ ( 1 ) m T 1 st sub - array , p 2 m h _ ( 2 ) m T 2 nd sub - array , .Math. , ( p Sm h _ ( S ) m T ] S - th sub - array ) T , ( 7 ) [0079] where p.sub.ms{0,1}, with s{1,2, . . . , S}, denotes the sub-array activity indicator, the vectors h.sub.(s)mcustom-character(0, .sub.sm), and (s)custom-character{(s1)+1, (s1)+2, . . . , (s)} is a set of antenna indices corresponding to the s-th sub-array.

[0080] More conveniently, the m-th column and s-th sub-array of the channel matrix can be modeled as the Bernoulli-Gaussian random variable, that is,

[00008] h ( s ) m p h ( s ) m ( h ( s ) m ) = ( 1 - ( s ) m ) ( h ( s ) m ) + sm .Math. ( 0 , sm ) , ( 8 ) [0081] where .sub.sm denotes the mean of p.sub.ms.

[0082] From the above, one can readily notice that the problem of jointly estimating users and subarrays activity indicators, as well as channel coefficients, belongs to the class of bilinear inference problems. More precisely, given the received signal matrix Y and the predetermined reference signal matrix X, our goal is to jointly estimate a.sub.m, p.sub.ms and h.sub.(s)m for all m{1,2, . . . , M} and s{1,2, . . . , S}, which are linearly multiplied by one another. In the next subsections we proceed to derive message passing rules designed to tackle this challenging problem, proposing a new joint activity and channel estimation for XL-MIMO subject to non-stationarity.

[0083] Focusing on the received signal element y.sub.nl at the n-th row and l-th column of Y, the received signal after soft interference cancellation (Soft-IC) using tentative estimates can be written as

[00009] = - .Math. l m M , Soft - IC = ( 9 ) h nm a m + .Math. l m M ( h nl a l - a n , l ^ ) + Residual interference plus noise , [0084] where the soft estimates custom-character and custom-character are generated in variable nodes at the previous iteration, while custom-character denotes the noise element at the n-th row and custom-character-th column of the AWGN matrix W.

[0085] Assuming that the residual interference plus noise component of equation (9) can be approximated as a complex Gaussian random variable in conformity to the central limit theorem, the conditional probability density function (PDF) of equation (9) for given h.sub.nm can be written as

[00010] | h nm ( | h nm ) exp ( - .Math. "\[LeftBracketingBar]" y ~ m , n - h nm .Math. "\[RightBracketingBar]" 2 ) , ( 10 ) [0086] where the error variance is given by

[00011] = [ .Math. "\[LeftBracketingBar]" ( a m - ) h nm + .Math. i m M ( h ni a i - ) + .Math. "\[RightBracketingBar]" 2 ] = nm .Math. "\[LeftBracketingBar]" .Math. "\[RightBracketingBar]" 2 + .Math. i m M ( .Math. "\[LeftBracketingBar]" .Math. "\[RightBracketingBar]" 2 + ( .Math. "\[LeftBracketingBar]" .Math. "\[RightBracketingBar]" 2 + ) ) .Math. "\[LeftBracketingBar]" .Math. "\[RightBracketingBar]" 2 + 2 , ( 11 ) [0087] with .sub.nm denoting the variance of the n-th row and m-th column of H, and where we implicitly defined the residual error variance custom-character for future convenience.

[0088] Similarly, the conditional PDF of custom-character given a.sub.m can be approximated as

[00012] .Math. a m ( .Math. a m ) exp ( - .Math. "\[LeftBracketingBar]" - .Math. "\[RightBracketingBar]" 2 ) , ( 12 ) [0089] with variance given by

[00013] = [ | ( h nm - ) a m x m + .Math. i m M ( h n i a i - ) + .Math. "\[RightBracketingBar]" 2 ] = .Math. "\[LeftBracketingBar]" .Math. "\[RightBracketingBar]" 2 + .Math. i m M ( .Math. "\[LeftBracketingBar]" .Math. "\[RightBracketingBar]" 2 + ( .Math. "\[LeftBracketingBar]" .Math. "\[RightBracketingBar]" 2 + ) ) .Math. "\[LeftBracketingBar]" .Math. "\[RightBracketingBar]" 2 + 2 , ( 13 ) [0090] where we utilized the fact that E[a.sup.2.sub.m]=E[a.sub.m]=, since a.sub.m{0, 1}.

Variable Node

[0091] Taking advantage of the Soft-IC mechanism and its resultant statistics shown above, the beliefs corresponding to the s-th sub-array combined over all available time resources except the custom-character-th time index, yields the PDF of the extrinsic belief custom-character given h.sub.(s)m, which is given by

[00014] p , ( s ) m | h ( s ) m ( | h ( s ) m ) = .Math. n = v ( s - 1 ) + 1 v ( s ) .Math. L p y ~ m , ni | h nm ( y ~ m , ni | h nm ) .Math. n = v ( s - 1 ) + 1 v ( s ) exp ( - .Math. "\[LeftBracketingBar]" h nm - .Math. "\[RightBracketingBar]" 2 ) ( , ) ( 14 ) [0092] with

[00015] , ( s ) m = [ , ( v ( s - 1 ) + 1 ) , .Math. , ( s ) m ] T , ( 15 a ) = diag ( [ ( v ( s - 1 ) + 1 ) m , .Math. , ] ) , ( 15 b ) [0093] where

[00016] = ( .Math. i L | ni , m x mi | 2 v m , ni h ) - 1 ( 16 a ) = .Math. i L y m , ni n i , m * X m i * v m , ni h ( 16 b )

[0094] In turn, the PDF of the extrinsic belief .sup.a.sub.nl,m given a.sub.m can be similarly obtained as

[00017] | a m ( | a m ) = .Math. j = n N .Math. L p y ~ m , ji | a m ( y ~ m , ji | a nm ) exp ( - .Math. "\[LeftBracketingBar]" a m - .Math. "\[RightBracketingBar]" 2 ) , ( , ) , ( 17 ) [0095] where

[00018] = ( .Math. j n N .Math. i L .Math. "\[LeftBracketingBar]" h ^ i , jm x mi .Math. "\[RightBracketingBar]" 2 v m , ji a ) - 1 ( 18 a ) = .Math. j n N .Math. L y m , ji h i , jm * x m i * v m , ji a ( 18 b )

[0096] Combining the PDF in equation (14) with the prior channel PDF in equation (8) yields the posterior distribution of the channel. Therefore, taking the expectation of h.sub.(s)m over the latter yields the corresponding soft estimate custom-character.sub.(s)m at the custom-character-th variable node, which is given by

[00019] h ^ , ( s ) m = ( 19 ) h ( s ) m h ( s ) m , ( s ) m | h ( s ) m ( , ( s ) m | h ( s ) m ) p h ( s ) m ( h ( s ) m ) h ( s ) m , ( s ) m | h ( s ) m ( , ( s ) m | h ( s ) m ) p h ( s ) m ( h ( s ) m ) , [0097] where the denominator in the integrand is introduced for normalization purposes.

[0098] The error covariance associated with custom-character.sub.(s)m is given by

[00020] = diag ( h ( s ) m h ( s ) m h ( s ) m H ( s ) m | h ( s ) m ( , ( s ) m | h ( s ) m ) p h ( s ) m ( h ( s ) m ) h ( s ) m p , ( s ) m | h ( s ) m ( , ( s ) m | h ( s ) m ) p h ( s ) m ( h ( s ) m ) ) - diag ( , ( s ) m , ( s ) m ) , such that = diag ( , ( v ( s - 1 ) + m h , , ( v ( s - 1 ) + 2 ) m h , .Math. , , v ( s ) m ) . ( 20 )

[0099] In turn, the soft replica custom-character of the user activity indicator can be similarly obtained as

[00021] a ^ n , m = .Math. { 0 , 1 } .Math. p n , m | m ( n , m .Math. ) p a m ( ) .Math. a { 0 , 1 } p n , m | m ( n , m | ) p a m ( ) , ( 21 ) [0100] with p.sub.a.sub.m() denoting the Bernoulli probability mass function (PMF) with intensity , which is accompanied by its mean square error (MSE) given by

[00022] n , m a = .Math. { 0 , 1 } 2 .Math. p n , m | m ( n , m .Math. ) p a m ( ) .Math. a { 0 , 1 } p n , m | m ( n , m | ) p a m ( ) - a ^ n , m 2 . ( 22 )

[0101] In order to compute equations (19)-(22) above, it is essential to analyze the effective distributions custom-character.sub.|h.sub.(s)m(custom-character|h.sub.(s)m)p.sub.h.sub.(s)m(h.sub.(s)m) and custom-character(custom-character|)p.sub.a.sub.m() such that the resultant calculations become tractable. To that end, plugging equations (8) and (14) into the effective distribution of h.sub.(s)m yields

[00023] p , ( s ) m | h ( s ) m ( , ( s ) m .Math. h ( s ) m ) p h ( s ) m ( h ( s ) m ) = ( ( 1 - s m ) ( h ( s ) m ) + s m .Math. ( 0 , sm ) ) ( , ( s ) m h , , ( s ) m h ) = ( 1 - s m ) ( h ( s ) m ) exp ( - , ( s ) m h , , ( s ) m h , ( s ) m h ) N s .Math. "\[LeftBracketingBar]" , ( s ) m h .Math. "\[RightBracketingBar]" .Math. + sm exp ( - , ( s ) m h ( sm + , ( s ) m h ) - 1 , ( s ) m h ) N s .Math. "\[LeftBracketingBar]" sm + , ( s ) m h .Math. "\[RightBracketingBar]" ( sm ( sm + , ( s ) m h ) - 1 , ( s ) m h , sm ( sm + , ( s ) m h ) - 1 , ( s ) m h ) = f ( h ( s ) m .Math. , ( s ) m h , , ( s ) m h , sm ) ( 23 )

[0102] Thus, the corresponding normalization factor can be written as

[00024] h ( s ) m p , ( s ) m | h ( s ) m ( , ( s ) m .Math. h ( s ) m ) p h ( s ) m ( h ( s ) m ) = h ( s ) m ( 1 - s m ) ( h ( s ) m ) exp ( - , ( s ) m h H , ( s ) m h , ( s ) m h ) N s .Math. "\[LeftBracketingBar]" , ( s ) m h .Math. "\[RightBracketingBar]" + sm exp ( - , ( s ) m h ( sm + , ( s ) m h ) - 1 , ( s ) m h ) N s | sm + , ( s ) m h | ( 24 ) h ( s ) m f ( h ( s ) m .Math. , ( s ) m h , , ( s ) m h , sm ) = 1 = sm exp ( - , ( s ) m h H ( sm + , ( s ) m h ) - 1 , ( s ) m h ) N s .Math. "\[LeftBracketingBar]" sm + , ( s ) m h .Math. "\[RightBracketingBar]" , ms , [0103] where the activity detection factor custom-character is given by

[00025] , ms = 1 + 1 - s m s m exp ( - , ( s ) m h H ( , ( s ) m h - 1 - ( sm + , ( s ) m h ) - 1 ) , ( s ) m h + log ( .Math. "\[LeftBracketingBar]" , ( s ) m h sm + I N s .Math. "\[RightBracketingBar]" ) ) . ( 25 )

[0104] Taking advantage of equations (23) and (24), the soft replica of h.sub.(s)m at the custom-character-th node can be re-written as

[00026] h _ , ( s ) m = sm ( sm + , ( s ) m h ) - 1 , ms , ( s ) m h , ( 26 ) [0105] while its MSE custom-charactercustom-characterdiag (custom-character, . . . , custom-character) can be expressed as

[00027] _ , ( s ) m h = ( , ms - 1 ) diag ( h ^ , ( s ) m h ^ , ( s ) m H ) + , ( s ) m h sm ( sm + , ( s ) m h ) - 1 , ms . ( 27 )

[0106] In turn, the effective distribution custom-character(custom-character|)p.sub.a.sub.m() can be simplified to

[00028] p n , m | m ( n , m .Math. ) p a m ( ) = exp ( - .Math. "\[LeftBracketingBar]" - n , m a .Math. "\[RightBracketingBar]" 2 n , m a ) ( + ( 1 - ) ( 1 - ) ) , Bemoulli PDF with intensity ( 28 ) [0107] where {0,1} and the associated normalization factor can then be written as

[00029] .Math. { 0 , 1 } p n , m | m ( n , m .Math. ) p a m ( ) = exp ( - .Math. "\[LeftBracketingBar]" 1 - n , m a .Math. "\[RightBracketingBar]" 2 n , m a ) + ( 1 - ) exp ( - .Math. "\[LeftBracketingBar]" n , m a .Math. "\[RightBracketingBar]" 2 n , m a ) ( 29 )

[0108] Thus, the soft replica of .sub.m can be obtained as

[00030] a ^ n , m = .Math. .Math. p n , m | m ( n , m | ) p a m ( ) .Math. { 0 , 1 } p n , m | m ( n , m | ) p a m ( ) = exp ( - .Math. "\[LeftBracketingBar]" 1 - n , m a .Math. "\[RightBracketingBar]" 2 n , m a ) exp ( - .Math. "\[LeftBracketingBar]" 1 - n , m a .Math. "\[RightBracketingBar]" 2 n , m a ) + ( 1 - ) exp ( - .Math. "\[LeftBracketingBar]" n , m a .Math. "\[RightBracketingBar]" 2 n , m a ) , = 1 1 + 1 - exp ( - ( .Math. "\[LeftBracketingBar]" n , m a .Math. "\[RightBracketingBar]" 2 n , m a - .Math. "\[LeftBracketingBar]" 1 - n , m a .Math. "\[RightBracketingBar]" 2 n , m a ) ) Weighted Sigmoid Function ( 30 ) [0109] and its error variance can be written as

[00031] n , m a = .Math. { 0 , 1 } 2 .Math. p n , m | m ( n , m .Math. ) p a m ( ) .Math. { 0 , 1 } p n , m | m ( n , m .Math. ) p a m ( ) - a ^ n , m = 1 - exp ( - ( .Math. "\[LeftBracketingBar]" n , m a .Math. "\[RightBracketingBar]" 2 n , m a - .Math. "\[LeftBracketingBar]" 1 - n , m a .Math. "\[RightBracketingBar]" 2 n , m a ) ) ( 1 + 1 - exp ( - ( .Math. "\[LeftBracketingBar]" n , m a .Math. "\[RightBracketingBar]" 2 n , m a - .Math. "\[LeftBracketingBar]" 1 - n , m a .Math. "\[RightBracketingBar]" 2 n , m a ) ) ) 2 , ( 31 ) [0110] from which it is readily found that 0custom-character.

Activity Detection Policy

[0111] Finally, in this subsection the last step is discussed, corresponding to the refinement of the user activity estimates according to a pre-defined user activity policy. Different approaches to perform this step can be considered. Here, the new log-likelihood ratio (LLR)-based approach is discussed taking both H{circumflex over ()} and A{circumflex over ()} into consideration.

[0112] To that end, first recognize that the user activity pattern captured by the binary quantities on the diagonal elements of A{circumflex over ()} can equivalently be expressed as column-sparsity of H{circumflex over ()}, which implies that an activity detection policy must jointly consider H{circumflex over ()} and A{circumflex over ()} for AUD. Denoting the estimated efcustom-charactertive channel matrix G{circumflex over ()}H{circumflex over ()}A{circumflex over ()}, the element-wise LLR can be written as

[00032] nm = log ( 0 , nm + nm h .Math. g ^ nm ) ( 0 , nm h .Math. g ^ nm ) . ( 39 )

[0113] From the above, the user activity can be detected by combining the LLRs .sub.nm for all the receive antenna dimensions N. However, such a detection policy ignores the presence of the block-wise sparsity due to spatial non-stationarity, leading to detection performance degradation. To address this issue, the following sub-array activity aware AUD policy is considered.

[00033] a ^ m = { 1 if max s ( .Math. n ( s ) nm ) 0 , 0 otherwise . ( 40 )

Method 1 Bilinear Message Passing for JACE in XL-MIMO with Non-Stationarity

[0114] Inputs: Y and X, and initializers and {circumflex over ()}.sup.h, [0115] Outputs: and [0116] Internal Parameters: .sub.sm, {circumflex over ()}.sub.sm, .sup.2, , and t.sub.max

[00034] For all ( n , m , ) 1 : a ^ n , m ( 1 ) 0 , n , m a ( 1 ) 0 2 : h ^ , nm ( 1 ) [ H ] nm , , nm h ( 1 ) [ h ] nm for t = 1 , .Math. , t max For all ( n , m , ) 3 : y m , n y n - .Math. i m M h ^ , ni a ^ n , i x i Eq . ( 9 ) 4 : v m , n y .Math. i m M ( .Math. "\[LeftBracketingBar]" h , ni .Math. "\[RightBracketingBar]" 2 n , i a + ( .Math. "\[LeftBracketingBar]" a ^ n , i .Math. "\[RightBracketingBar]" 2 + n , i a ) , ni h ) .Math. "\[LeftBracketingBar]" x i .Math. "\[RightBracketingBar]" 2 + 2 Eq . ( 11 ) 5 : v m , n h n , m a nm .Math. "\[LeftBracketingBar]" x m .Math. "\[RightBracketingBar]" 2 + v m , n y 6 : v m , n a , nm h .Math. "\[LeftBracketingBar]" x m .Math. "\[RightBracketingBar]" 2 + v m , n y Eq . ( 13 ) 7 : , nm h ( .Math. i L | a ^ ni , m x mi | 2 v m , ni h ) - 1 and , nm h , nm h .Math. i L y ~ m , ni a ni , m * x mi * v m , ni h Eq . ( 16 ) 8 : n , m a ( .Math. j n N .Math. i L .Math. "\[LeftBracketingBar]" h ^ i , jm x m i .Math. "\[RightBracketingBar]" 2 v m , ji a ) - 1 and n , m a n , m a .Math. j n N .Math. i L y ~ m , ji h i , jm * x mi * v m , ji a Eq . ( 18 ) 9 : a ^ n , m ( 1 + 1 - exp ( - ( .Math. "\[LeftBracketingBar]" n , m a .Math. "\[RightBracketingBar]" 2 n , m a - .Math. "\[LeftBracketingBar]" 1 - n , m a .Math. "\[RightBracketingBar]" 2 n , m a ) ) ) Eq . ( 21 ) 10 : n , m a 1 - exp ( - ( .Math. "\[LeftBracketingBar]" n , m a .Math. "\[RightBracketingBar]" 2 n , m a - .Math. "\[LeftBracketingBar]" 1 - n , m a .Math. "\[RightBracketingBar]" 2 n , m a ) ) ( 1 + 1 - exp ( - ( .Math. "\[LeftBracketingBar]" n , m a .Math. "\[RightBracketingBar]" 2 n , m a - .Math. "\[LeftBracketingBar]" 1 - n , m a .Math. "\[RightBracketingBar]" 2 n , m a ) ) ) - 2 Eq . ( 22 ) For all ( m , s , ) 11 : , ( s ) m h [ , ( v ( s - 1 ) + 1 ) m h , .Math. , , v ( s ) m h ] T Eq . ( 15 ) 12 : , ( s ) m h diag [ , ( v ( s - 1 ) + 1 ) m h , .Math. , , v ( s ) m h ] ) 13 : , ms 1 + ( 1 - sm ) sm .Math. "\[LeftBracketingBar]" sm + h , ( s ) m .Math. "\[RightBracketingBar]" .Math. "\[LeftBracketingBar]" h , ( s ) m .Math. "\[RightBracketingBar]" exp ( - , ( s ) m h ( , ( s ) m h - 1 - ( sm + , ( s ) m h ) - 1 ) , ( s ) m h ) Eq . ( 25 ) 14 : ms = 1 MSL .Math. = 1 L .Math. m = 1 M .Math. s = 1 S 1 , ms Eq . ( 32 ) 15 : h , ( s ) m sm ( sm + , ( s ) m h ) - 1 , ms , ( s ) m h Eq . ( 26 ) 16 : , ( s ) m h ( , ms - 1 ) diag ( h , ( s ) m h , ( s ) m H ) + , ( s ) m h sm ( sm + , ( s ) m h ) - 1 , ms Eq . ( 27 ) 17 : Damping [ 30 ] : h , ( s ) m h , ( s ) m + ( 1 - ) h , ( s ) m 18 : , ( s ) m h , ( s ) m h + ( 1 - ) , ( s ) m h end for 19 : For all ( n , m , ) , update v m , n h and v m , n a by repeating lines 3 to 6 20 : For all ( n , m ) , nm h ( .Math. i = 1 L .Math. "\[LeftBracketingBar]" a ni , m x m i .Math. "\[RightBracketingBar]" 2 v m , ni h ) - 1 and nm h nm h .Math. i = 1 L y ~ m , ni a ni , m * x mi * v m , ni h Eq . ( 16 ) 21 : For all ( m , s ) , h ( s ) m sm ( sm + ( s ) m h ) - 1 ms ( s ) m h .Math. H Eq . ( 26 ) For all m 22 : Refresh m a ( .Math. j = 1 N .Math. i = 1 L .Math. "\[LeftBracketingBar]" h ^ i , jm x mi .Math. "\[RightBracketingBar]" 2 v m , ji a ) - 1 and m a m a .Math. j = 1 N .Math. i = 1 L y ~ m , ji h i , jm * x mi * v m , ji a 23 : refresh a ^ m ( 1 + 1 - exp ( - ( .Math. "\[LeftBracketingBar]" m a .Math. "\[RightBracketingBar]" 2 m a - .Math. "\[LeftBracketingBar]" 1 - m a .Math. "\[RightBracketingBar]" 2 m a ) ) ) - 1 24 : make hard decision on a ^ m .Math. A ^ . Eq . ( 40 )

Method Description

[0117] In this section several remarks on the message passing and consensus mechanisms for JACE proposed above are described, which for convenience is concisely summarized in method 1. Referring to method 1, first notice that the procedure requires two initialization quantities, namely, initial values of the channel matrix H{circumflex over ()} and error covariance matrix {circumflex over ()}.sup.h, which can be obtained via a number of state-of-the art methods, such as the AUD-aware approximate BP algorithm, adopted here due to its complexity-performance tradeoff advantages. Besides that, the proposed JACE mwthod takes as inputs the received signal matrix Y and the pilot matrix X; to which it outputs estimates of the channel matrix H{circumflex over ()} and of the user activity matrix A{circumflex over ()}.

[0118] The algorithm has two essential stages, the iterative stage described by lines 3 to 18 within which the beliefs are propagated and exchanged between factor and variable nodes, and the consensus stage where the output quantities are finally determined based on the obtained beliefs, as summarized in lines 19 to 24. Notice that lines 17 and 18 correspond to a well-known damping procedure which aims to avoid estimates being trapped at a local optimum, especially at the early stage of the iterations by allowing a slow update of the quantities custom-character, custom-character, custom-character, and custom-character.

[0119] This is due to the fact that at the early stage of the iterative process, the Gaussian approximation assumed in equation (9) may not capture the actual statistics of the effective noise, which might lead to convergence to a local optimum point.

[0120] Notice also that the consensus stage includes in line 22 a self-feedback step in which the sum operation without its performed index exclusion so as to yield the desired dimension of the variables of interest. It is also worth-noting that the number of iterations is fixed here to t.sub.max only for the sake of the complexity analysis to be offered later. In practice, the process can be terminated at a fewer (also adaptively-determined) number of iterations, resulting in lower total complexity. The possibility of reducing the number of iterations is studied later via the convergence behavior of the algorithm, where it is shown that approximately 9 iterations are sufficient for convergence, regardless of signal-to-noise-ratio (SNR) levels.

Simulation Results

[0121] In this part, the estimation performance of the proposed bilinear inference method under various system setups are assessed. In particular, the normalized mean square error (NMSE) and activity error rate (AER) are considered as key performance metrics to measure, respectively, the estimation accuracy of channel coefficients, as well as user activity indicators.

[0122] The NMSE and AER are respectively defined as

[00035] N M S E = .Math. HA - H A .Math. F 2 .Math. HA .Math. F 2 , ( 41 ) A E R = .Math. "\[LeftBracketingBar]" .Math. "\[RightBracketingBar]" M 1 , ( 42 ) [0123] where H{circumflex over ()} and A{circumflex over ()} denoting estimated channel and user activity matrices, respectively, custom-character denotes the true activity index set, || denotes the cardinality of a given set, and the operator \ denotes the relative complement, such that |custom-character|M, |custom-character|M, and |custom-character\custom-character|M.

[0124] Throughout the section, the following parameters are utilized, unless specified otherwise. The number of total antenna elements and sub-arrays are respectively assumed to be N=400 and S=100, indicating that each sub-array possesses N.sub.s=4 antenna elements. This setup can be interpreted as an XL-MIMO system consisting of multiple sub-arrays with each being a 22 patch antenna array, for instance. The total number of time indices and potential users is set to L={50,70} and M=200, respectively. The user activity ratio is assumed to be =0.1, while the number of active users at each channel realization is modeled as a binomial random variable with mean M. The variance of channel coefficients is assumed to be identical and modeled as =.sub.sm=1/M for all m and s, whereas different models for the non-stationarity phenomena are considered.

[0125] As for the algorithmic parameters, the maximum number of iterations is assumed to be t.sub.max=32, while the damping factor is set to 0.5. The sub-array activity indicator is automatically learned over iterations via the EM framework presented in Section III-D. It is assumed that initial estimates (i.e., , {circumflex over ()}.sup.h) are obtained via the low-complexity multiple measurement approximate belief propagation (MMVABP) algorithm.

Comments on Complexity

[0126] Before presenting results on the actual performance of the proposed bilinear inference method for JACE, we analyze its computational complexity in terms of the number of floating point operations (flops) required at each iteration of the algorithm. Since all the calculations in Method 1 are scalar-by-scalar and the required inverse operation is performed with a diagonal matrix, the number of multiplication, division, subtraction, and addition operations is of order custom-character(NML), which is linear with respect to each of available resource dimensions. In Method 1, the number of iterations is set to t.sub.max, implying that the total complexity is of order custom-character(t.sub.maxNML).

[0127] Similarly, the computational complexity of existing linear inference algorithms is also of order custom-character(t.sub.max.sup.SotANML), where t.sub.max.sup.SotA is the total number of iterations of existing linear inference algorithms. And since both the proposed and existing JACE method are based on the Bayesian message passing approach, the total number of iterations until convergence required by our method is comparable to those of existing alternatives (i.e. t.sub.maxt.sub.max.sup.SotA), such that it can be concluded that the proposed method has the same order of complexity of existing JACE methods. It will be shown in the sequel, however, that the proposed method outperform existing alternatives in terms of estimation accuracy, measured by NMSE and AER as defined in equations (41) and (42).

Uniformly Random Non-Stationarity

[0128] Aiming at evaluating the fundamental performance improvement attained by the proposed JACE algorithm, it is considered in this subsection an XL-MIMO system subjected to uniformly random sub-array activity pattern. In other words, the sub-array activity indicators p.sub.ms for all m and s are independently generated as a Bernoulli random variable, with the corresponding mean .sub.sm set to be .sub.sm=0.2, such that the number of the total active sub-arrays at each channel realization follows the Binomial distribution with order S, and 20% of the total subarrays are active at each channel realization in an average sense.

[0129] FIG. 2 shows the NMSE performance with respect to SNR with N=400 and M=200 for different pilot lengths. For the sake of comparison, two state-of-the-art methods are considered, namely the conventional linear minimum mean square error (MMSE) estimator, and an MMVABP scheme, which is a generalization of the multiple measurement vector approximate message passing (MMVAMP) algorithm. Comparing these three algorithms highlights performance gains due to awareness both to column-wise sparsity in the channel matrix resulting from grant free access, and to block-wise sparsity of active columns of the channel matrix, resulting from spatial nonstationarity. For instance, consider the comparison of NMSE performances of the three distinct algorithms as a function of SNR in decibels as shown in FIG. 2, for different pilot lengths (i.e., L{50, 70}), with pilot sequences designed via the quadratic complex sequential iterative decorrelation via convex optimization (QCSIDCO) algorithm in order to mitigate pilot contamination due to the non-orthogonal structure of XC.sup.ML with M>>L.

[0130] For the sake of a further reference, we also include curves (in solid line without markers) corresponding to lower-bounding NMSE performances obtained by the least square (LS) estimator aided by a genie, i.e with perfect knowledge of active user and sub-array activity indicators.

[0131] The FIG. 2 clearly illustrates the impact of the two distinct factors which impose structured sparsity upon the channel matrix. In particular, it can be seen that regardless of the length of the pilot sequence, the MMSE estimator suffers from a high error floor in terms of its NMSE performance, while the MMVABP algorithm improves as the SNR increases. The gains of MMVABP over the MMSE method is due to the awareness to column-wise sparsity in the channel matrixi.e., awareness to user activitywhich the MMVABP method incorporates, while the MMSE method does not. A a large gap exists between the performance of MMVABP and the lower-bound. In comparison to the latter two methods, the proposed method exhibits a substantial gain over the MMVABP approach, thanks to the fact that the proposed technique incorporates awareness not only to user activity, but also to the sub-array activity caused by spatial non-stationarity. As a result, the proposed method is found to actually reach the theoretical lower bound over a wide SNR range and starting from relatively low SNRs.

[0132] From these comments, one may conclude that the gain between the MMSE and the MMV-ABP methods results from awareness to user activity, while the gain between MMVABP and the proposed method is due to awareness to sub-array activity. It is also worth-mentioning that the sub-array activity indicators .sub.sm are automatically learned for each channel realization via the EM framework presented in Section III-D, such that estimating such parameters before transmission is not necessary, contributing to improving the efficiency of the XL-MIMO system.

[0133] FIG. 3a, b shows the AER performance with respect to SNR with N=400 and M=200 for different pilot lengths. The AER performances of the proposed and the best state-of-the-art methods (namely, the MMVABP) are considered, omitting results for the MMSE scheme as it was found to be inferior to the latter. In addition, notice that showing Genie-aided lower bounding results is not useful, since the Genie-aided LS estimator has perfect knowledge of user and sub-array activities, such that AER performance is always 0.

[0134] The results are shown in FIG. 3 for different pilot lengths as done in FIG. 2. As expected, but interestingly, it is found that the proposed method significantly outperforms MMVABP also in terms of the AER performance. For instance, it can be seen that the relative AER gain of the proposed method over MMVABP is more than 4 [dB] in SNR at 105 of AER for both short and long pilot scenarios. In addition, it can be seen that the gradient of the AER curve of the proposed algorithm is steeper than that of the MMVABP approach.

[0135] FIG. 4: shows the resilience of the proposed method against different sub-array activity indicators in percentage. Having clarified the NMSE and AER gains of the proposed method, the attention to resilience and convergence aspects of the proposed algorithm are taken in account. In FIG. 4 a comparison between the NMSE performance of the MMVABP, the Genie-aided LS, and the proposed estimators as a function of the sub-array activity indicators are proceeded. It has to be remarked that the channel is stationary at 100% sub-array intensity (i.e., at the right edge of the figure), while non-stationarity effects becomes severer as the sub-array intensity decreases. The results suggest that the proposed method is a generalization of the MMVABP method, capturing effects not only from the user activity but also from the sub-array activity. Thus, the performance of the proposed algorithm approaches that of MMVABP in case of a stationary channel (i.e., .sub.sm=1), while offering significant gains over the latter as the non-stationarity increases.

[0136] FIG. 5 shows the convergence behavior of the proposed algorithm with respect to the number of algorithmic iterations. In FIG. 5, the convergence behavior of the proposed algorithm as a function of the number of the algorithmic iterations for different pilot lengths is illustrated. It is shown in the figure that although a relatively large value for the maximum number of iterations (t=32) are assumed, the algorithm converges within 10 iterations under both pilot lengths considered. This implies that the total complexity of the method commented in Subsection IV-A can be further reduced (by more than a half) by setting a certain convergence criterion.

Matern-Cluster Point Process Based Non-Stationarity

[0137] The comparison results shown in the previous subsections serve the purpose of quantifying the gains achievable by the proposed method over state-of-the-art alternatives, which stem in particular from the ability of the contributed scheme to detect both user and sub-array activity. It can be argued, however, that the uniformly random sub-array activity pattern is somewhat artificial, since in realistic scenarios, such patterns are characterized by VRs. Indeed, in practice the likelihood of activation of a certain sub-array is highly correlated with that of neighboring sub-arrays, such that VRs tend to occur in clusters. In this subsection, a repetition of the test reported above, utilizing this time a stochastic geometry approach to model the aforementioned geometrical correlation among the activity indicators of sub-arrays, so as to mimic the cluster-like nature of VRs, as illustrated in FIG. 1. To this end, the Matrn-cluster point process (MCPP) is considerednot to be confused with Matrn hardcore point processto model the non-stationarity effects in XL-MIMO systems.

[0138] In order to bring MCPP into the simulation setup, we consider a rectangular area in which sub-arrays are placed following an equispaced grid. Within this area, MCPP is leveraged to generate random clusters with a constant radius r and centers following a homogeneous Poisson point process (PPP) with an intensity . Each cluster generated by MCPP is regarded as a VR, and therefore, sub-arrays located in the clusters are considered active, whereas sub-arrays located outside the clusters are assumed to be inactive.

[0139] FIG. 6 shows the MCPP-based subarray activity and FIG. 7 shows the uniformly random subarray activity. To visualize the difference between MCPP-based and uniformly random non-stationarity models, in FIGS. 6 and 7 a comparison of sub-array activity patterns for the two different models for a given realization is given, with the number of active antennas set to be identical in both cases. In the figures, white and black squares indicate inactive and active antennas, respectively, where we assumed a 22 square sub-array, Height=30 [m], Width=30 [m], =4 and r=5. One can observe from the figures that the MCPP-based approach clearly illustrates clustered VRs, capturing more realistically the behavior of the non-stationarity, while the uniformly random counterpart shows a more scattered distribution of VRs

[0140] With the stochastic-geometric VR generation model described, we proceed to the performance assessment of the JACE algorithms under this MCPP-based non-stationarity model. In this section, we evaluate the estimation performance of the proposed method in comparison with the two state-of-the-art estimators as well as the Genie-aided ideal performance for different cluster setups, by considering different cluster intensities and the radius r and studying the impact of both parameters on the detection performance.

[0141] FIG. 8a, b, c shows the NMSE Performance with respect to SNR with N=400, M=200, and L=70 with MCPP for different . In FIG. 8 the NMSE performances of the three distinct detection algorithms are compared for different cluster intensities and a fixed radius size r=5 [m], with the Genie-aided ideal performance also included for reference. As expected based on the previous results of FIGS. 2 and 4, the proposed method outperforms both the MMVABP and the conventional linear MMSE methods, although the performance gain diminishes slightly as the cluster intensity increases, which is expected since with for larger cluster intensities the number of active subarrays itself grows. It is also observed that once again the proposed algorithm reaches the Genie-aided ideal performance for a wide range of SNR regardless of the cluster intensity level.

[0142] FIG. 9a, b, c shows the AER Performance with respect to SNR with N=400, M=200, and L=70 with MCPP for different . In FIG. 9 the AER performance of the proposed algorithm against that of the MMVABP scheme is compared, again for different cluster intensity levels and as a function of SNR. The figure confirms that the proposed method is effective also in terms of the AER performance.

[0143] FIG. 10 shows the NMSE performance of the proposed method for different cluster intensities. The actual array activity ratios for =3, 6 and 9 are annotated by allows.

[0144] FIG. 11 shows the NMSE performance of the proposed method for different cluster radius sizes. The actual array activity ratios for =3, 6 and 9 are annotated by allows.

[0145] Having shown the effectiveness of the proposed algorithm even in case of clustered sub-array activity, in FIGS. 10 and 11 the NMSE performance of the proposed algorithm as a function of cluster intensity and radius r, respectively, for two different SNR levels are calculated. For ease of interpretation of the results, the actual sub-array activity ratios, defined as the ratio between the number of active sub-arrays and the total number of sub-arrays, are annotated by arrows for =3, 6 and 9. The figures illustrate the fact that the performance of the proposed JACE algorithm is mostly dependent on the actual activity indicator, rather than the shape of clusters, implying an inherent robustness against the nature of the spatial non-stationarity.

[0146] In this application, a solution of JACE problem in grant-free uplink XL-MIMO systems subject to spatial non-stationarity is solved, where the user activity and the sub-array activity jointly impose structured sparsity onto the channel matrix. For such a system, a new system model is introduced in order to characterize the structured sparsity of the channel, formulating the estimation problem of a variable following a nested Bernoulli-Gaussian distribution. To tackle this intractable estimation problem, we a novel estimation method is proposed based on the bilinear Bayesian inference framework, deriving all the updates in closed-form. The proposed method possesses linear complexity with respect to the dimensions of the receive antenna array, number of users, and time resources, respectively. In order to numerically study the benefits of the proposed method, performance assessments via Monte-Carlo simulations, revealing the effectiveness of the proposed algorithm in terms of the NMSE and AER performance indicators were evaluated. This application also reports one of the first attempts to adopt stochastic geometry (SG) to model the clustered nature of the partial observations at XL-MIMO arrays due to spatial non-stationarity. In particular, the MCPP to model such observed clusters are proposed, showing the superiority of the proposed method regardless of the cluster size, intensity, and sub-array activity ratio.

FIG. 12: Describing the Flowchart of the Inventive Method

[0147] The method is able to receive signals and initials the channel estimation. In the following step a soft interference cancel check is proceeded. If the check results in a negative expression the calculation of residual mean and variance is proceeded with the help of the equations in line 4 of the flowchart of the method 1 named Bilinear Message Passing for JACE in XL-MIMO with Non-Stationarity. Afterwards with the help of the equations in line 5-7 of the method 1 named Bilinear Message Passing for JACE in XL-MIMO with Non-Stationarity the extrinsic mean and variance is calculated. If the check results in positive the extrinsic mean and variance is calculated after the check of the software interference cancel. After the calculation of the extrinsic mean and variance is calculated the calculation of tentative estimates are proceed with the equations in line 8 to 11 of the method 1 named Bilinear Message Passing for JACE in XL-MIMO with Non-Stationarity. The tentative estimation includes activity factors calculation with the equation in line 12 of method 1 named Bilinear Message Passing for JACE in XL-MIMO with Non-Stationarity.

[0148] The condition of reaching the maximum formed by the proceeding the equations in line 13-19 of the of method 1 named Bilinear Message Passing for JACE in XL-MIMO with Non-Stationarity.

[0149] The maximum iteration is not reached it is checked and the result is no to proceeding and returns to the step check the condition the soft interference cancel. If the maximum iteration is reached is check and the result is positive the inventive method is terminated and ends and will be ready for starting uplink transmission.

FIG. 13: Illustrates the Grand Free Random Access

[0150] In FIG. 13 grand based random access and grant free random access over the access time is illustrated. Grant-free access has been identified by 3GPP as a potential solution for Industrial Internet-of-Things applications in 5G networks. It allows to decrease overhead and delay, but it is also prone to collisions in the high-load regime. To reduce the effects of collisions, Non-Orthogonal Multiple Access or other Successive Interference Cancellation (SIC) protocols can be applied, allowing to partially recover collisions.

[0151] 5G networks are expected to satisfy diverse requirements of upcoming Internet of Things (IoT) applications. Especially challenging requirements come from a subset of Industial IoT (IIoT) applications, where ultra-reliable and low-latency communication (URLLC) is needed. IIoT communication patterns are typically sporadic and consist of occasional small packet transmissions. For such communication patterns, purely grant-based communication inherited from LTE becomes inefficient due to high overhead and delays associated with acquisition of a scheduling grant. To overcome this issue, grant-free and hybrid operation modes are considered by 3GPP as potential enablers for low-latency IIoT. In a grant-free mode, User Equipments (UEs) are allowed to use a certain fraction of resources for direct transmissions to the next Generation Node B (gNB) without requesting the scheduling grant prior to transmission. Grant-free mode further considers two options: dedicated mode (semi-persistent scheduling), or shared mode (random access).

[0152] In essence, grant-free protocols with shared resources are partially coordinated random access protocols, where collisions between UEs on the same grant-free resources might occur. Therefore, grant-free protocols only work well in low to moderate load scenarios. If load rises above a certain level, collision probability becomes high and the delay rapidly grows. To reduce the effects of collisions and provide higher throughput, novel random access protocols based on Successive Interference Cancellation (SIC) have been proposed, including Non-Orthogonal Multiple Access (NOMA). In general in a grant based random access a packet arrival is proceeded, a random access preamble, a random access response, a radioa resource control request, a radio resource control setup and the scheduling request and uplink grant is continued. After all this steps a uplink data transmission is able to be performed.

[0153] The supported grant-free random access with the help the presented inventive is a latency reduction which is a based on the reduced amount of the complexity. After the packet arrival a preamble and uplink data transmission can be proceeded. The reduction of the steps can be easily seen as the amount of proceeding steps over the access time is shown in FIG. 13.