METHOD OF JOINT USER ACTIVITY DETECTION AND CHANNEL INFORMATION ESTIMATION IN EXTRA-LARGE MIMO (XL-MIMO) SYSTEMS WITH NON-STATIONARITIES
20240356589 ยท 2024-10-24
Assignee
Inventors
- David Gonzalez Gonzalez (Egelsbach, DE)
- Osvaldo Gonsa (Frankfurt, DE)
- Andreas Andrae (Frankfurt am Main, DE)
- Giuseppe Thadeu Freitas de Abreu (Bremen, DE)
- Hiroki Iimori (Yokahama, JP)
Cpc classification
H04B7/0456
ELECTRICITY
International classification
H04B7/0456
ELECTRICITY
H04L25/02
ELECTRICITY
H04L25/03
ELECTRICITY
Abstract
Joint user activity detection and channel information estimation in extra-large MIMO (XL-MIMO) systems with non-stationarities proceeds by: receiving signals and initialization of a channel estimation; performing soft interference cancel check, whereby, if the soft interference cancel check result is negative, the calculation of residual mean and variance is performed; whereby, if the soft interference cancel check result is positive, the extrinsic mean and variance is calculated directly; whereby, if the soft interference cancel check result is negative, the calculation of residual mean and variance is used, whereby the calculation of tentative estimation includes activity factors calculation; if reaching the maximum is not fulfilled, soft interference cancel check is performed; whereby, if reaching the maximum is fulfilled, the proceeding ends.
Claims
1. A method of joint user activity detection and channel information estimation in extra-large Multiple-Input Multiple-Output (XL-MIMO) systems with non-stationarities, comprising: receiving signals and initialization of a channel estimation; performing a soft interference cancel check, whereby, if the soft interference cancel check result is negative, the calculation of residual mean and variance is performed and whereby, if the soft interference cancel check result is positive, the extrinsic mean and variance is calculated directly; calculating the extrinsic mean and variance, whereby, if the soft interference cancel check result is negative, the calculation of residual mean and variance is used; calculating tentative estimates, whereby the calculation of tentative estimation includes activity factors calculation; determining whether a condition of reaching a maximum is fulfilled whereby, if the condition of reaching the maximum fulfilled check result is negative, soft interference cancel check is performed and whereby, if the condition of reaching the maximum fulfilled check result is positive, performance of the method ends.
2. The method of claim 1, wherein after ending a preamble and uplink data transmission via a grant-free random access is proceeded.
3. The method of claim 1, wherein a point process, which models randomly located clusters within a given area, defines an area where antenna arrays are embedded.
4. The method of claim 1 characterized by a modification to an iterative shrinkage-thresholding algorithm (ISTA) via boxing with range limiting and hard-thresholding is proceeded.
5. The method of claim 1, using a boxed-hard iterative shrinkage-thresholding algorithm (ISTA), a greedy selection of the positions of the antennas index and the symbol estimates, and their independent decoding of the corresponding antenna modulated and symbol modulated bits is determined.
6. The method of claim 1, wherein process working parallel to the greedy detections, to ensure valid estimates of the index vectors from the given finite set of index vectors are produced at the output of the method, and to apply interference cancellation with the confirmed values, while keeping track of which indices have been retrieved from the greedy selections, before every iteration a check is performed whether from the currently decoded indices, a final confirmation can be made, and, if the final confirmation cannot be made, remove the interference by the previous greedy selection and the next iteration is proceeded.
7. A receiver of a communication system having a processor, volatile and/or non-volatile memory, at least one interface adapted to receive a signal in a communication channel, wherein the non-volatile memory stores computer program instructions which, when executed by the microprocessor, configure the receiver to perform operations comprising: receiving signals and initialization of a channel estimation; performing a soft interference cancel check, whereby, if the soft interference cancel check result is negative, the calculation of residual mean and variance is performed and whereby, if the soft interference cancel check result is positive, the extrinsic mean and variance is calculated directly; calculating the extrinsic mean and variance, whereby, if the soft interference cancel check result is negative, the calculation of residual mean and variance is used; calculating tentative estimates, whereby the calculation of tentative estimation includes activity factors calculation; determining whether a condition of reaching a maximum is fulfilled whereby, if the condition of reaching the maximum fulfilled check result is negative, soft interference cancel check is performed and whereby, if the condition of reaching the maximum fulfilled check result is positive, performance of the operations ends.
8. (canceled)
9. (canceled)
10. The receiver of claim 7, wherein after ending a preamble and uplink data transmission via a grant-free random access is proceeded.
11. The receiver of claim 7, wherein a point process, which models randomly located clusters within a given area, defines an area where antenna arrays are embedded.
12. The receiver of claim 7 characterized by a modification to an iterative shrinkage-thresholding algorithm (ISTA) via boxing with range limiting and hard-thresholding is proceeded.
13. The receiver of claim 7, using a boxed-hard iterative shrinkage-thresholding algorithm (ISTA), a greedy selection of the positions of the antennas index and the symbol estimates, and their independent decoding of the corresponding antenna modulated and symbol modulated bits is determined.
14. The receiver of claim 7, wherein process working parallel to the greedy detections, to ensure valid estimates of the index vectors from the given finite set of index vectors are produced at the output of the method, and to apply interference cancellation with the confirmed values, while keeping track of which indices have been retrieved from the greedy selections, before every iteration a check is performed whether from the currently decoded indices, a final confirmation can be made, and, if the final confirmation cannot be made, remove the interference by the previous greedy selection and the next iteration is proceeded.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0038] For a fuller understanding of the nature of the present invention, reference should be had to the following detailed description taken in connection with the accompanying drawings. So that the manner in which the above-recited features of the present disclosure can be understood in detail, a more particular description, briefly summarized above, may be had by reference to aspects, some of which are illustrated in the drawings. It is to be noted, however, that the appended drawings illustrate only certain aspects of this disclosure and are therefore not to be considered limiting of its scope, for the description may admit to other equally effective aspects.
[0039]
[0040]
[0041]
[0042]
[0043]
[0044]
[0045]
[0046]
[0047]
[0048]
[0049]
[0050]
[0051]
DETAILED DESCRIPTION
[0052] Extra large MIMO (XL-MIMO) systems are subject to spatial non-stationarity which leads to a doubly-sparse and user-specific structure of received signals, such that the activity of each user at each sub-array can be characterized by a nested Bernoulli-Gaussian distribution. This application considers the joint activity and channel estimation (JACE) problem in XL-MIMO systems subject to spatial non-stationarity, offering two major embodiments solving this problem.
[0053] The first is a novel bilinear Bayesian inference method capable of jointly estimating sub-array activity patterns (a.k.a. spatial non-stationarity), user activity patterns, and associated channel coefficients, boosted by expectation maximization (EM)-based auto-parameterization.
[0054] The second embodiment is the introduction of realistic Poisson point process (PPP) and Matern-cluster point process (MCPP) stochastic-geometry (SG) models to simulate sub-array activity patterns, which enables the performance assessment of both the proposed and state-of-the-art (SotA) XL-MIMO JACE solutions under different conditions in a structured manner. The efficiency of the proposed bilinear JACE method is confirmed by numerical simulations, which shows that the proposed method not only significantly outperforms the SotA but also can reach the performance of a genie-aided (theoretical) scheme over wide signal-to-noise-ratio (SNR) ranges.
[0055] A Matrn cluster point process is a type of cluster point process, meaning that its randomly located points tend to form random clusters. Using techniques from spatial statistics, it is possible to make the definition of clustering more precise. This point process is an example of a family of cluster point processes known as Neyman-Scott point processes, which have been used in spatial statistics and telecommunications.
[0056] The Matrn cluster point process should not be confused with the Matrn hard-core point process, which is a completely different type of point process. Bertril Matrn proposed at least four types of point processes, and his name also refers to a specific type of covariance function used to define Gaussian processes.
[0057] Simulating a Matrn cluster point process requires first simulating a homogeneous Poisson point process with an intensity >0 on some simulation window, such as a rectangle, which is the simulation window I will use here. Then for each point of this underlying point process, simulate a Poisson number of points with mean >0 uniformly on a disk with a constant radius r>0. The underlying point process is sometimes called the parent (point) process, and its points are centres of the cluster disks.
[0058] The subsequent point process on all the disks is called daughter (point) process and it forms the clusters. It has been known about simulating the homogeneous Poisson point processes on a rectangle and a disk, so those posts are good starting points, and it won't not be focused too much on details for these steps.
[0059] The main challenge behind sampling this point process, is that it's possible for daughter points to appear in the simulation window that come from parents points outside the simulation window. In other words, parents points outside the simulation window contribute to points inside the window. To remove these edge effects, the point processes must be simulated on an extended version of the simulation window. Then only the daughter points within the simulation window are kept and the rest are removed. Consequently, the points are simulated on an extended window, but we only see the points inside the simulation window.
[0060] To create the extended simulation window, you can add a strip of width r all around the simulation window. The distance r is the maximum distance from the simulation window that a possibly contributing parent point (outside the simulation window) can exist, while still having daughter points inside the simulation window. This means it is impossible for a hypothetical parent point beyond this distance (outside the extended window) to generate a daughter point that can fall inside the simulation window.
[0061] Simulate the underlying or parent Poisson point process on the rectangle with NP points. Then for each point, simulate a Poisson number of points, where each disk now has Di number of points. Then the total number of points is simply N=D1+ . . . +DP=NPi=1 Di. The random variables P and Di are Poisson random variables with respective means A and , where A is the area of the rectangular simulation window. To simulate these random variables in MATLAB, the poissrnd function is used. To do this in R, use the standard function rpois. In Python, it can be used either functions scipy.stats.poisson or numpy.random.poisson from the SciPy or NumPy libraries.
[0062] The points of the parent point process are randomly positioned by using Cartesian coordinates. For a homogeneous Poisson point process, the x and y coordinates of each point are independent uniform points, which is also the case for the binomial point process, covered in a previous post. The points of all the daughter point process are randomly positioned by using polar coordinates. For a homogeneous Poisson point process, the and coordinates of each point are independent variables, respectively with uniform and triangle distributions, which was covered in a previous post. Then we convert coordinates back to Cartesian form, which is easily done in MATLAB with the pol2cart function. In programming languages without such a function: x= cos () and y= sin ().
[0063] In practice, all the daughter points are simulated in a disk with its centre at the origin. Then for each cluster disk, all the points have to be shifted to the origin is the center of the cluster, which completes the simulation step.
[0064] To use vectorization in the code, the coordinates of each cluster point are repeated by the number of daughters in the corresponding cluster by using the functions repelem in MATLAB, rep in R, and repeat in Python.
[0065]
Sytem Model Description
[0066] Consider an XL-MIMO system consisting of S sub-arrays, each equipped with N.sub.s antenna elements, such that the total number of antenna array elements is given by N=.sub.s=1.sup.SN.sub.s, and let GC.sup.NM be the effective channel matrix between the XL-MIMO array and M single-antenna users, which jointly depicts user activities, sub-array VRs, and the fading gains. Then, the corresponding system model as shown in
(0, .sup.2I).
[0068] In equation (1), it is assumed that only a small fraction of the M users is active, while the rest remains silent during the time interval of L transmissions. Letting K be a random variable that denotes the number of active users at a given time interval, the average user-activity probability can be expressed as [K/M].
[0069] Furthermore, owing to non-stationarities observed in the XL-MIMO setting, the channel matrix G possesses block-sparsity that captures both user activity and the sub-arrays in their VRs (i.e. active sub-arrays), such that the m-th column of G, relative to the m-th user, can be modeled as
[p.sub.1m, . . . , p.sub.Sm]
denotes a sub-array activity indicator defined by
[0071] Assuming that {tilde over (g)}.sub.m is Gaussian, as typically, the distribution of g.sub.m can be written as
Joint Estimation Strategy
[0074] In this section, we propose a novel bilinear message passing method for joint activity and channel estimation in XL-MIMO systems subjected to spatial non-stationarity. To this end, a decomposition of the system model given in equation (1) is carried out, followed by detailed derivations of message passing rules.
[0075] We remark that for the sake of generality, throughout the section it is assumed that the elements of the channel vectors {tilde over (g)}.sub.m are independently but not identically distributed, which is equivalent to saying that the covariance matrices .sub.sm are all diagonal, but have different norms. This is motivated by the fact that the VRs of each user at the XL-MIMO array in general result from the impinging of signals from different propagation paths, as illustrated in
[0076] For the sake of future convenience, let us first reformulate equation (4) as
HA
, where H
is the block fading channel matrix and the MM diagonal matrix A, with diag(A)=[a.sub.1, a.sub.2, . . . , a.sub.M]{0,1}.sup.M, captures user activity indicators.
[0078] For notation simplicity, we hereafter introduce the quantity (s).sub.i=1.sup.sN.sub.i, with (0)
0, to denote the cumulative collection of sub-array antenna indices at the s-th sub-array. In order to gain a closer insight into the effect of non-stationarity onto the column vectors of the channel matrix H, consider the anatomized m-th column of H, which is given by
(0, .sub.sm), and (s)
{(s1)+1, (s1)+2, . . . , (s)} is a set of antenna indices corresponding to the s-th sub-array.
[0080] More conveniently, the m-th column and s-th sub-array of the channel matrix can be modeled as the Bernoulli-Gaussian random variable, that is,
[0082] From the above, one can readily notice that the problem of jointly estimating users and subarrays activity indicators, as well as channel coefficients, belongs to the class of bilinear inference problems. More precisely, given the received signal matrix Y and the predetermined reference signal matrix X, our goal is to jointly estimate a.sub.m, p.sub.ms and h.sub.(s)m for all m{1,2, . . . , M} and s{1,2, . . . , S}, which are linearly multiplied by one another. In the next subsections we proceed to derive message passing rules designed to tackle this challenging problem, proposing a new joint activity and channel estimation for XL-MIMO subject to non-stationarity.
[0083] Focusing on the received signal element y.sub.nl at the n-th row and l-th column of Y, the received signal after soft interference cancellation (Soft-IC) using tentative estimates can be written as
and
are generated in variable nodes at the previous iteration, while
denotes the noise element at the n-th row and
-th column of the AWGN matrix W.
[0085] Assuming that the residual interference plus noise component of equation (9) can be approximated as a complex Gaussian random variable in conformity to the central limit theorem, the conditional probability density function (PDF) of equation (9) for given h.sub.nm can be written as
for future convenience.
[0088] Similarly, the conditional PDF of given a.sub.m can be approximated as
Variable Node
[0091] Taking advantage of the Soft-IC mechanism and its resultant statistics shown above, the beliefs corresponding to the s-th sub-array combined over all available time resources except the -th time index, yields the PDF of the extrinsic belief
given h.sub.(s)m, which is given by
[0094] In turn, the PDF of the extrinsic belief .sup.a.sub.nl,m given a.sub.m can be similarly obtained as
[0096] Combining the PDF in equation (14) with the prior channel PDF in equation (8) yields the posterior distribution of the channel. Therefore, taking the expectation of h.sub.(s)m over the latter yields the corresponding soft estimate .sub.(s)m at the
-th variable node, which is given by
[0098] The error covariance associated with .sub.(s)m is given by
[0099] In turn, the soft replica of the user activity indicator can be similarly obtained as
[0101] In order to compute equations (19)-(22) above, it is essential to analyze the effective distributions .sub.|h.sub.
|h.sub.(s)m)p.sub.h.sub.
(
|)p.sub.a.sub.
[0102] Thus, the corresponding normalization factor can be written as
is given by
[0104] Taking advantage of equations (23) and (24), the soft replica of h.sub.(s)m at the -th node can be re-written as
diag (
, . . . ,
) can be expressed as
[0106] In turn, the effective distribution (
|)p.sub.a.sub.
[0108] Thus, the soft replica of .sub.m can be obtained as
.
Activity Detection Policy
[0111] Finally, in this subsection the last step is discussed, corresponding to the refinement of the user activity estimates according to a pre-defined user activity policy. Different approaches to perform this step can be considered. Here, the new log-likelihood ratio (LLR)-based approach is discussed taking both H{circumflex over ()} and A{circumflex over ()} into consideration.
[0112] To that end, first recognize that the user activity pattern captured by the binary quantities on the diagonal elements of A{circumflex over ()} can equivalently be expressed as column-sparsity of H{circumflex over ()}, which implies that an activity detection policy must jointly consider H{circumflex over ()} and A{circumflex over ()} for AUD. Denoting the estimated eftive channel matrix G{circumflex over ()}H{circumflex over ()}A{circumflex over ()}, the element-wise LLR can be written as
[0113] From the above, the user activity can be detected by combining the LLRs .sub.nm for all the receive antenna dimensions N. However, such a detection policy ignores the presence of the block-wise sparsity due to spatial non-stationarity, leading to detection performance degradation. To address this issue, the following sub-array activity aware AUD policy is considered.
Method 1 Bilinear Message Passing for JACE in XL-MIMO with Non-Stationarity
[0114] Inputs: Y and X, and initializers and {circumflex over ()}.sup.h, [0115] Outputs: and [0116] Internal Parameters: .sub.sm, {circumflex over ()}.sub.sm, .sup.2, , and t.sub.max
Method Description
[0117] In this section several remarks on the message passing and consensus mechanisms for JACE proposed above are described, which for convenience is concisely summarized in method 1. Referring to method 1, first notice that the procedure requires two initialization quantities, namely, initial values of the channel matrix H{circumflex over ()} and error covariance matrix {circumflex over ()}.sup.h, which can be obtained via a number of state-of-the art methods, such as the AUD-aware approximate BP algorithm, adopted here due to its complexity-performance tradeoff advantages. Besides that, the proposed JACE mwthod takes as inputs the received signal matrix Y and the pilot matrix X; to which it outputs estimates of the channel matrix H{circumflex over ()} and of the user activity matrix A{circumflex over ()}.
[0118] The algorithm has two essential stages, the iterative stage described by lines 3 to 18 within which the beliefs are propagated and exchanged between factor and variable nodes, and the consensus stage where the output quantities are finally determined based on the obtained beliefs, as summarized in lines 19 to 24. Notice that lines 17 and 18 correspond to a well-known damping procedure which aims to avoid estimates being trapped at a local optimum, especially at the early stage of the iterations by allowing a slow update of the quantities ,
,
, and
.
[0119] This is due to the fact that at the early stage of the iterative process, the Gaussian approximation assumed in equation (9) may not capture the actual statistics of the effective noise, which might lead to convergence to a local optimum point.
[0120] Notice also that the consensus stage includes in line 22 a self-feedback step in which the sum operation without its performed index exclusion so as to yield the desired dimension of the variables of interest. It is also worth-noting that the number of iterations is fixed here to t.sub.max only for the sake of the complexity analysis to be offered later. In practice, the process can be terminated at a fewer (also adaptively-determined) number of iterations, resulting in lower total complexity. The possibility of reducing the number of iterations is studied later via the convergence behavior of the algorithm, where it is shown that approximately 9 iterations are sufficient for convergence, regardless of signal-to-noise-ratio (SNR) levels.
Simulation Results
[0121] In this part, the estimation performance of the proposed bilinear inference method under various system setups are assessed. In particular, the normalized mean square error (NMSE) and activity error rate (AER) are considered as key performance metrics to measure, respectively, the estimation accuracy of channel coefficients, as well as user activity indicators.
[0122] The NMSE and AER are respectively defined as
denotes the true activity index set, || denotes the cardinality of a given set, and the operator \ denotes the relative complement, such that |
|M, |
|M, and |
\
|M.
[0124] Throughout the section, the following parameters are utilized, unless specified otherwise. The number of total antenna elements and sub-arrays are respectively assumed to be N=400 and S=100, indicating that each sub-array possesses N.sub.s=4 antenna elements. This setup can be interpreted as an XL-MIMO system consisting of multiple sub-arrays with each being a 22 patch antenna array, for instance. The total number of time indices and potential users is set to L={50,70} and M=200, respectively. The user activity ratio is assumed to be =0.1, while the number of active users at each channel realization is modeled as a binomial random variable with mean M. The variance of channel coefficients is assumed to be identical and modeled as =.sub.sm=1/M for all m and s, whereas different models for the non-stationarity phenomena are considered.
[0125] As for the algorithmic parameters, the maximum number of iterations is assumed to be t.sub.max=32, while the damping factor is set to 0.5. The sub-array activity indicator is automatically learned over iterations via the EM framework presented in Section III-D. It is assumed that initial estimates (i.e., , {circumflex over ()}.sup.h) are obtained via the low-complexity multiple measurement approximate belief propagation (MMVABP) algorithm.
Comments on Complexity
[0126] Before presenting results on the actual performance of the proposed bilinear inference method for JACE, we analyze its computational complexity in terms of the number of floating point operations (flops) required at each iteration of the algorithm. Since all the calculations in Method 1 are scalar-by-scalar and the required inverse operation is performed with a diagonal matrix, the number of multiplication, division, subtraction, and addition operations is of order (NML), which is linear with respect to each of available resource dimensions. In Method 1, the number of iterations is set to t.sub.max, implying that the total complexity is of order
(t.sub.maxNML).
[0127] Similarly, the computational complexity of existing linear inference algorithms is also of order (t.sub.max.sup.SotANML), where t.sub.max.sup.SotA is the total number of iterations of existing linear inference algorithms. And since both the proposed and existing JACE method are based on the Bayesian message passing approach, the total number of iterations until convergence required by our method is comparable to those of existing alternatives (i.e. t.sub.maxt.sub.max.sup.SotA), such that it can be concluded that the proposed method has the same order of complexity of existing JACE methods. It will be shown in the sequel, however, that the proposed method outperform existing alternatives in terms of estimation accuracy, measured by NMSE and AER as defined in equations (41) and (42).
Uniformly Random Non-Stationarity
[0128] Aiming at evaluating the fundamental performance improvement attained by the proposed JACE algorithm, it is considered in this subsection an XL-MIMO system subjected to uniformly random sub-array activity pattern. In other words, the sub-array activity indicators p.sub.ms for all m and s are independently generated as a Bernoulli random variable, with the corresponding mean .sub.sm set to be .sub.sm=0.2, such that the number of the total active sub-arrays at each channel realization follows the Binomial distribution with order S, and 20% of the total subarrays are active at each channel realization in an average sense.
[0129]
[0130] For the sake of a further reference, we also include curves (in solid line without markers) corresponding to lower-bounding NMSE performances obtained by the least square (LS) estimator aided by a genie, i.e with perfect knowledge of active user and sub-array activity indicators.
[0131] The
[0132] From these comments, one may conclude that the gain between the MMSE and the MMV-ABP methods results from awareness to user activity, while the gain between MMVABP and the proposed method is due to awareness to sub-array activity. It is also worth-mentioning that the sub-array activity indicators .sub.sm are automatically learned for each channel realization via the EM framework presented in Section III-D, such that estimating such parameters before transmission is not necessary, contributing to improving the efficiency of the XL-MIMO system.
[0133]
[0134] The results are shown in
[0135]
[0136]
Matern-Cluster Point Process Based Non-Stationarity
[0137] The comparison results shown in the previous subsections serve the purpose of quantifying the gains achievable by the proposed method over state-of-the-art alternatives, which stem in particular from the ability of the contributed scheme to detect both user and sub-array activity. It can be argued, however, that the uniformly random sub-array activity pattern is somewhat artificial, since in realistic scenarios, such patterns are characterized by VRs. Indeed, in practice the likelihood of activation of a certain sub-array is highly correlated with that of neighboring sub-arrays, such that VRs tend to occur in clusters. In this subsection, a repetition of the test reported above, utilizing this time a stochastic geometry approach to model the aforementioned geometrical correlation among the activity indicators of sub-arrays, so as to mimic the cluster-like nature of VRs, as illustrated in
[0138] In order to bring MCPP into the simulation setup, we consider a rectangular area in which sub-arrays are placed following an equispaced grid. Within this area, MCPP is leveraged to generate random clusters with a constant radius r and centers following a homogeneous Poisson point process (PPP) with an intensity . Each cluster generated by MCPP is regarded as a VR, and therefore, sub-arrays located in the clusters are considered active, whereas sub-arrays located outside the clusters are assumed to be inactive.
[0139]
[0140] With the stochastic-geometric VR generation model described, we proceed to the performance assessment of the JACE algorithms under this MCPP-based non-stationarity model. In this section, we evaluate the estimation performance of the proposed method in comparison with the two state-of-the-art estimators as well as the Genie-aided ideal performance for different cluster setups, by considering different cluster intensities and the radius r and studying the impact of both parameters on the detection performance.
[0141]
[0142]
[0143]
[0144]
[0145] Having shown the effectiveness of the proposed algorithm even in case of clustered sub-array activity, in
[0146] In this application, a solution of JACE problem in grant-free uplink XL-MIMO systems subject to spatial non-stationarity is solved, where the user activity and the sub-array activity jointly impose structured sparsity onto the channel matrix. For such a system, a new system model is introduced in order to characterize the structured sparsity of the channel, formulating the estimation problem of a variable following a nested Bernoulli-Gaussian distribution. To tackle this intractable estimation problem, we a novel estimation method is proposed based on the bilinear Bayesian inference framework, deriving all the updates in closed-form. The proposed method possesses linear complexity with respect to the dimensions of the receive antenna array, number of users, and time resources, respectively. In order to numerically study the benefits of the proposed method, performance assessments via Monte-Carlo simulations, revealing the effectiveness of the proposed algorithm in terms of the NMSE and AER performance indicators were evaluated. This application also reports one of the first attempts to adopt stochastic geometry (SG) to model the clustered nature of the partial observations at XL-MIMO arrays due to spatial non-stationarity. In particular, the MCPP to model such observed clusters are proposed, showing the superiority of the proposed method regardless of the cluster size, intensity, and sub-array activity ratio.
FIG. 12: Describing the Flowchart of the Inventive Method
[0147] The method is able to receive signals and initials the channel estimation. In the following step a soft interference cancel check is proceeded. If the check results in a negative expression the calculation of residual mean and variance is proceeded with the help of the equations in line 4 of the flowchart of the method 1 named Bilinear Message Passing for JACE in XL-MIMO with Non-Stationarity. Afterwards with the help of the equations in line 5-7 of the method 1 named Bilinear Message Passing for JACE in XL-MIMO with Non-Stationarity the extrinsic mean and variance is calculated. If the check results in positive the extrinsic mean and variance is calculated after the check of the software interference cancel. After the calculation of the extrinsic mean and variance is calculated the calculation of tentative estimates are proceed with the equations in line 8 to 11 of the method 1 named Bilinear Message Passing for JACE in XL-MIMO with Non-Stationarity. The tentative estimation includes activity factors calculation with the equation in line 12 of method 1 named Bilinear Message Passing for JACE in XL-MIMO with Non-Stationarity.
[0148] The condition of reaching the maximum formed by the proceeding the equations in line 13-19 of the of method 1 named Bilinear Message Passing for JACE in XL-MIMO with Non-Stationarity.
[0149] The maximum iteration is not reached it is checked and the result is no to proceeding and returns to the step check the condition the soft interference cancel. If the maximum iteration is reached is check and the result is positive the inventive method is terminated and ends and will be ready for starting uplink transmission.
FIG. 13: Illustrates the Grand Free Random Access
[0150] In
[0151] 5G networks are expected to satisfy diverse requirements of upcoming Internet of Things (IoT) applications. Especially challenging requirements come from a subset of Industial IoT (IIoT) applications, where ultra-reliable and low-latency communication (URLLC) is needed. IIoT communication patterns are typically sporadic and consist of occasional small packet transmissions. For such communication patterns, purely grant-based communication inherited from LTE becomes inefficient due to high overhead and delays associated with acquisition of a scheduling grant. To overcome this issue, grant-free and hybrid operation modes are considered by 3GPP as potential enablers for low-latency IIoT. In a grant-free mode, User Equipments (UEs) are allowed to use a certain fraction of resources for direct transmissions to the next Generation Node B (gNB) without requesting the scheduling grant prior to transmission. Grant-free mode further considers two options: dedicated mode (semi-persistent scheduling), or shared mode (random access).
[0152] In essence, grant-free protocols with shared resources are partially coordinated random access protocols, where collisions between UEs on the same grant-free resources might occur. Therefore, grant-free protocols only work well in low to moderate load scenarios. If load rises above a certain level, collision probability becomes high and the delay rapidly grows. To reduce the effects of collisions and provide higher throughput, novel random access protocols based on Successive Interference Cancellation (SIC) have been proposed, including Non-Orthogonal Multiple Access (NOMA). In general in a grant based random access a packet arrival is proceeded, a random access preamble, a random access response, a radioa resource control request, a radio resource control setup and the scheduling request and uplink grant is continued. After all this steps a uplink data transmission is able to be performed.
[0153] The supported grant-free random access with the help the presented inventive is a latency reduction which is a based on the reduced amount of the complexity. After the packet arrival a preamble and uplink data transmission can be proceeded. The reduction of the steps can be easily seen as the amount of proceeding steps over the access time is shown in