METHOD FOR OPTIMAL AND SCALABLE QUADRATURE SPACE-TIME MODULATION
20240372648 ยท 2024-11-07
Assignee
Inventors
- David Gonzalez Gonzalez (Egelsbach, DE)
- Osvaldo Gonsa (Frankfurt, DE)
- Hiroki Iimori (Yokahama, JP)
- Giuseppe Thadeu Freitas de Abreu (Bremen, DE)
- Hyeon Seok Rou (Bremen, DE)
Cpc classification
International classification
Abstract
Scalable space-time quadrature spatial modulation for multidimensional wireless systems is performed by configuring a plurality of transmit antennas to each represent an in-phase spatial constellation symbol within an in-phase spatial constellation, and a quadrature spatial constellation symbol within a quadrature spatial constellation, mapping source data to the in-phase spatial constellation symbols and the quadrature spatial constellation symbols represented by the plurality of transmit antennas, wherein the method constructs the set which has equal multiplicities of the transmit antenna activation, which ensures maximum possible transmit diversity and reduces the required complexity, making this feasible for larger number of antennas.
Claims
1. A computer-implemented optimal and scalable quadrature space-time modulation (OS-QSM) method for configuring a plurality of transmit antennas, the method comprising: configuring the plurality of transmit antennas to each represent an in-phase spatial constellation symbol within an in-phase spatial constellation, and a quadrature spatial constellation symbol within a quadrature spatial constellation, mapping source data to the in-phase spatial constellation symbols and the quadrature spatial constellation symbols represented by the plurality of transmit antennas, wherein the method is applying an optimal and scalable quadrature spatial modulation scheme (OS-QSM) resulting in a maximum possible coding gain in the resultant quadrature spatial modulation.
2. The method of claim 1, wherein a modification to the iterative shrinkage-thresholding algorithm (ISTA) via boxing, range limiting, and hard-thresholding is performed.
3. The method of claim 1, further comprising: proceeding the iterative shrinkage-thresholding algorithm via boxing-hard (ISTA), a greedy selection of the positions of the antennas index and the symbol estimates, and their independent decoding of the corresponding antenna modulated and symbol modulated bits.
4. The method of claim 3, wherein process working parallel to the greedy detections, to ensure valid estimates of the index vectors from the given finite set of index vectors are produced as an output and to apply interference cancellation with the confirmed values, while keeping track of which indices have been retrieved from the greedy selections, before every iteration check whether from the currently decoded indices, a final confirmation can be calculated, if it cannot be made, remove the interference by the previous greedy selection and make the next iteration.
5. The method of claim 1, further comprising: generalization of Golden code and in combination with spatial modulation an operating calculation with a highly sparse received signal is done, without causing large multi-user interference for the overlapping of multiple users.
6. The method of claim 5, further comprising: making the signals per-user more-sparse, again allowing for even more users to be overlapped without increasing effective multi-user interference.
7. A receiver of a communication system having a processor, volatile and/or non-volatile memory, at least one interface adapted to receive a signal in an communication channel, wherein the non-volatile memory stores computer program instructions which, when executed by the microprocessor, configure the receiver to perform operations comprising: configuring a plurality of transmit antennas to each represent an in-phase spatial constellation symbol within an in-phase spatial constellation, and a quadrature spatial constellation symbol within a quadrature spatial constellation, mapping source data to the in-phase spatial constellation symbols and the quadrature spatial constellation symbols represented by the plurality of transmit antennas, wherein applying an optimal and scalable quadrature spatial modulation scheme (OS-OSM) results in a maximum possible coding gain in the resultant quadrature spatial modulation.
8. (canceled)
9. (canceled)
10. (canceled)
11. (canceled)
12. The receiver of claim 7, wherein a modification to the iterative shrinkage-thresholding algorithm (ISTA) via boxing, range limiting, and hard-thresholding is performed.
13. The receiver of claim 7, further comprising: proceeding the iterative shrinkage-thresholding algorithm via boxing-hard (ISTA), a greedy selection of the positions of the antennas index and the symbol estimates, and their independent decoding of the corresponding antenna modulated and symbol modulated bits.
14. The receiver of claim 7, wherein process working parallel to the greedy detections, to ensure valid estimates of the index vectors from the given finite set of index vectors are produced as an output and to apply interference cancellation with the confirmed values, while keeping track of which indices have been retrieved from the greedy selections, before every iteration check whether from the currently decoded indices, a final confirmation can be calculated, if it cannot be made, remove the interference by the previous greedy selection and make the next iteration.
15. The receiver of claim 7, further comprising: generalization of Golden code and in combination with spatial modulation an operating calculation with a highly sparse received signal is done, without causing large multi-user interference for the overlapping of multiple users.
16. The receiver of claim 15, further comprising: making the signals per-user more-sparse, again allowing for even more users to be overlapped without increasing effective multi-user interference.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0068] For a fuller understanding of the nature of the present invention, reference should be had to the following detailed description taken in connection with the accompanying drawings in which:
[0069] Quadrature spatial modulation (QSM) schemes are considered, which are capable of conveying large numbers of bits while a combination of transmitting a relatively small number P all M-ary modulated symbols from a dynamic selection of n transmit into mass, according to a designed dispersion pattern.
[0070]
[0071]
[0072]
[0073]
[0074]
[0075]
[0076]
[0079]
[0080]
[0084]
[0085]
[0086]
[0087]
[0088]
[0089]
[0090]
[0091]
[0092]
[0093]
[0094]
DETAILED DESCRIPTION
[0095] Following are detailed descriptions of concepts, system/network architectures, and detailed designs for many aspects of a wireless communications network targeted to address the requirements and use cases for 5G. The terms requirement. need, or similar language are to be understood as describing a desirable feature or functionality of the system in the sense of an advantageous design of certain embodiments, and not as indicating a necessary or essential element of all embodiments. As such, in the following each requirement and each capability described as required, important, needed, or described with similar language, is to be understood as optional.
[0096] In the discussion that follows, this wireless communications network, which includes wireless devices, radio access networks, and core networks, is referred to as NX. It should be understood that the term NX is used herein as simply a label, for convenience. Implementations of wireless devices, radio network equipment, network nodes, and networks that include some or all of the features detailed herein may, of course, be referred to by any of various names. In future development of specifications for 5G, for example, the terms New Radio, or NR, or NR multi-mode may be usedit will be understood that some or all of the features described here in the context of NX may be directly applicable to these specifications for NR. Likewise, while the various technologies and features described herein are targeted to a 5G wireless communications network, specific implementations of wireless devices, radio network equipment, network nodes, and networks that include some or all of the features detailed herein may or may not be referred to by the term 5G. The present invention relates to all individual aspects of NX, but also to developments in other technologies, such as LTE, in the interaction and interworking with NX. Furthermore, each such individual aspect and each such individual development constitutes a separable embodiment of the invention.
[0097]
A. System Model
[0098] Consider a point-to-point (P2P) MIMO communication system in which a transmitter equipped with n.sub.T transmit antennas exchanges information with a receiver equipped with n.sub.R receive antennas employing SM. The received signal corresponding to T consecutive time slots during which the channel is assumed to be constant can be compactly written as
[0099] Where Y.sup.n.sup.
.sup.n.sup.
(0, 1), X
.sup.n.sup.
.sup.n.sup.
(0, N.sub.0) where N.sub.0 is the noise variance.
[0100] It is assumed hereafter that the quasi-static Rayleigh fading channel matrix H is known at the receiver but not at the transmitter, and it is remarked that since the channel power per matrix entry is unitary, the fundamental signal-to-noise ratio (SNR) is given by
In turn, in accordance with related QSM literature and as illustrated in
[0101] where s.sub.p=s.sub.p.sup.R+js.sub.p.sup.I, with p={1, . . . , P}, are transmit symbols chosen from a complex constellation constellation S of cardinality |S|=M; A.sub.K.sub.={A.sub.q}.sub.q=1.sup.Q
.sup.n.sup.
={B.sub.q}.sub.q=1.sup.Q
.sup.n.sup.
={k.sub.n}.sub.n=1.sup.N
.sup.P, with N[(.sub.P.sup.Q)].sub.2X.
[0102] With regards to equation (2), and again referring to
[0103] In view of the above, it can be said that the design of a specific QSM scheme amounts essentially to the method employed in the construction of each of the Q dispersion matrices A.sub.q and B.sub.q in the sets A and B, and the selection of the set K containing the index vectors k.sup.R and k.sup.I which inform the choices of dispersion matrices used in each transmission.
[0104] To exemplify how state-of-the-art (SotA) QSM schemes can be cast into the general framework described by equation (2), consider first the QSM scheme. In this case, the dispersion matrices reduce to dispersion vectors (i.e., T=1 and Q=n.sub.T) which are given by
where e.sub.q is the q-th column of I.sub.Q, and no specific design criteria are given for the selection of the indices in the index vectors k.sup.R and k.sup.I.
[0105] In turn, in the DA-QSM scheme, two-column dispersion matrices (i.e., T=2 and Q=n.sub.T) are employed so as to exploit transmit diversity. In particular, in this scheme
with
where M.sub.n is an nn cyclic lower-shift matrix, M.sub.n Is obtained by circularly shifting the bottom row of I.sub.n to the top, such that, e.g.,
such that its (q-1)-th power pre-multiplied to a given matrix results in a shift of the bottom (q-1) rows of the latter to the top.
[0106] From the above it is visible that the DA-QSM scheme improves over the QSM scheme essentially by adding diversity, i.e., by extending the transmission instances from T=1 to T=2. However, the dispersion matrices of the DA-QSM method are still real, just as those of the QSM scheme, implicating that no additional multiplexing capability is aggregated, and that coding gains is not optimized.
[0107] In contrast, the EDA-QSM method improves over the latter on both aspects. In particular, in this scheme the dispersion matrices are more elaborately designed as
where e.sub.I is the I-th column of I.sub.L, with Ln.sub.T/2, the indices i{1, . . . , 4} and I{1, . . , L}, and the core matrices C.sub.i and D.sub.i are based on the Sezginer-Sari-Biglieri (SSB) STBC described by
[0108] Through the concise description above it becomes easy to see that the fundamental distinction between the DA-QSM and the EDA-QSM methods is that the dispersion matrices of EDA-QSM are complex-valued, such that the orthogonality between the real and imaginary dimensions are better exploited in order to reap multiplexing and coding gains.
[0109] Two fair criticisms that can be made of the aforementioned schemesand in fact, to the best of our knowledge of all existing SotA QSM methods proposed so farare, however: a) that the scheme does not scale systematically simultaneously over space and time, for arbitrary T>2; and b) that the coding gain achieved is not optimum. Mitigating these two limitations is the objective of our first contribution described in the following section.
Optimized Scalable Quadrature Spatial Modulation Transmitter Design
A. Spectral Efficiency Optimality of QSM Schemes
[0110] Given the number of bits carried by the transmission of each QSM transmit symbol X as per equation (2), and the fact that such transmission requires T successive channel uses, the SE of any QSM scheme is given by
[0111] where we recall that Q T.sub.nT and adopt a notation meant to emphasize that P and T are seen as fundamental QSM design parameters, while M and n.sub.T are considered to be system constraints
[0112]
[0113] The presence of the binomial coefficient (.sub.P.sup.Q) in equation (8) implicates that the SE function (P, T; M, n.sub.T) is monotonically descending on T, for a fixed P, and concave on P, for a fixed T, as well as on the ratio P/T. This is well illustrated in the plots offered in
[0114] Motivated by the discussion above, we seek analytical expressions for the optimum ratio P/T that maximizes the SE, given n.sub.T and M, which in turn can be used to determine the relative SE reduction incurred in setting T<n.sub.T for large-scale systems with n.sub.T.fwdarw.. To this end, consider the upper and lower-bounds on the binomial coefficient, namely
where for future convenience we implicitly defined the upper-bounding function (P; Q).
[0115] Using equation (9) into equation (8) yields the bound
[0116] Taking the derivative of the latter expression with respect to P yields
where in the second line we relax the constraint that PN and expressed more generally P=Q, introducing the positive quantity 1.
[0117] Equating the expression in equation (11) to zero yields the following analytical implicit expression to determine the optimal number of symbols P* that maximizes the SE of a QSM system with Q=T.sub.nT spatial-temporal resources and employing an M-ary constellation
where we emphasize that the quantity on the righthand side of the expression is in fact sought after number of transmitted symbols P.
[0118] But recalling that the desired P* is also the largest possible, equation (12) implies that
which in turn implies that the optimum is such that
i.e., the solution of the quadratic polynomial (M-1)=.sup.22M+M, which finally yields, simply
where we introduced the implicitly-defined optimum gradient
We emphasize that the elegant result offered in equation (14) is general for any QSM scheme. From this result it is seen that the optimum ratio P/T that maximizes the SE of the QSM scheme is linear on the number of transmit antennas n.sub.T. In other words, for any given M and n.sub.T, an SE-optimum QSM must be such that P/T scales linearly with n.sub.T, as illustrated and confirmed by the simulation results shown in
[0119] This means,
[0120] Recall also that QSM dispersion matrices are generally constructed with basis on STBCs characterized by TT square encoding matrices. Consequently, it follows that if P must scale with n.sub.T in order for the QSM to be SE-optimal, so must the size T of the code, in order for the the underlying STBC itself to retain SE-optimality. In other words, equation (14) also implicates that in order to achieve SE-optimality, a QSM scheme conveying M-ary symbols must employ an underlying full-rate STBC of a size that scales proportionally to the number of transmit antennas n.sub.T
[0121] It must be remarked, that setting T=n.sub.T is not a scalable proposition, not only because it implies furbishing the transmitter with an equal number of RF chains, which can be prohibitively expensive, but also because it results in fully dense signals, which in turn require also prohibitively complex ML receivers. This observation motivates the comparisons given in
[0122]
[0123] In view of these results, in the next section it is introduce the a new QSM transmitter design, including both the description of how to construct QSM dispersion matrices based on optimal STBCs of arbitrary size, as well as a new systematic mechanism to obtain the associated set of index vectors used in their selection during transmission. For clarity of explanation, we first take the simpler example of the 22 case, to introduce the construction of dispersion index set for optimal diversity gain. The extension of the scheme to generalized T follows subsequently.
B. Golden (22) Dispersion Matrices and Optimal Index Sets
[0124] Before describing the proposed dispersion matrix construction let us, without loss of generality and to facilitate comparison with existing methods, impose the assumption that the transmit signal matrix X as per equation (2) satisfies the unity average transmission power constraint for each active transmit antenna, such that [tr(X.sup.HX)]=PT under constellations with unity average power symbols. Then, consider the 22 Golden code, which compactly encodes four symbols {s1, s2, s3, s4} into the matrix.
[0125] where and
[0126] The construction of QSM dispersion matrices based on the latter Golden code follows from the decomposition of S.sub.G into the auxiliary matrices C.sub.i and D.sub.i, which are used to modulate the real part s.sub.i.sup.R and imaginary part s.sub.i.sup.I of each i-th symbol encoded, respectively, such that
where
[0127] With
and note that post-multiplying the circular lower-shift matrix M.sub.n to a given matrix X results in a column-wise circular shift of X to the left. In possession of the above auxiliary matrices, the Golden dispersion matrices are then built using the Kronecker product operations following a similar strategy namely
[0128] Regarding the scaling factor in equation (18), the denominator 1/sqrt(5) is passed over from the coefficient of the Golden code as in equations (15) and (16), while the numerator sqrt(2) is the result of power scaling required to ensure that the transmit power constraint [tr (X.sup.HX)]]=PT is satisfied. To elaborate further, from equations (2) and (18) it follows that
[tr (X.sup.Hx)]]=PT implies that the dispersion matrices must satisfy tr(A.sub.q.sup.HA.sub.q)=T and tr(B.sub.q.sup.HB.sub.q)=T, for all q{1, . . . , Q}, whereas from the construction of the auxiliary matrices C.sub.i and D.sub.i as per equations (17) it is evident that tr(C.sub.i.sup.HC.sub.i)=1 and tr(D.sub.i.sup.HD.sub.i)=1, such that a power scaling of T=2 onto C.sub.i and D.sub.i, i.e., an amplitude scaling of sqrt (2) onto C.sub.i and D.sub.i, is needed.
[0129] The Golden codes are known to outperform the SSB codes employed in the EDA-QSM scheme, while having structure very similar to the latter, such that their utilization in the construction of dispersion matrices as described above is, in and of itself, bound to improve the performance of QSM schemes over those briefly described, as shall be demonstrated later via simulated comparisons.
[0130] There is, however, another mechanism to improve the performance of QSM schemes employing STBCs, namely, to optimize the selection of the index vectors in ={kn}.sub.n=1.sup.N
.sup.P that determine which dispersion matrices are assigned to the real and imaginary parts of each encoded symbol. This is because each index vectors k.sub.n is, according to equations (17) and (18), associated with different subsets of spatial-temporal resources utilized by the QSM scheme in the transmission of a given set of spatially encoded bits. To illustrate the issue, define the set K* of all of all (.sub.P.sup.Q) distinct index vectors for a given pair (P, Q), and consider the corresponding example compiled in Table I for the case P=3 and Q=2n.sub.T=8.
[0131] Recall also that each dispersion matrix in the transmission of s.sub.p.sup.R or s.sub.p.sup.I uses two given pairs of antennas and time slots, as per equations (17) and (18), such that for the sake of conciseness it is hereafter referred to each pair of one antenna and one time slot simply as a spatial temporal resource rq, defining also for future convenience the set of all available and utilized spatial temporal resources, denoted respectively by R* and R. Then, if resources and dispersion matrix indices are represented by a rectangular and a circular nodes, respectively, a bipartite graph such as the one shown in
[0132]
[0133] As illustrated by the graph, the inclusion of a given index set k.sub.n from K* into the set K is associated with the use of certain resources, occasionally with multiplicity, identified by the graph edges intercepted by the enclosure encircling the corresponding indices. We shall therefore use the notation k.sub.n.Math.r.sub.n to indicate that the index set k.sub.n implicates the utilization of the set of resources r.sub.n, and .sub.kn (rq) to denote the multiplicity of the resource rq in the set k.sub.n.
[0134] For example, the use of the resources r1={2(1, 1), (1, 2), (2, 1), 2(2, 2)} results from having k.sub.1=[1, 2, 3] in K, such that it may be written concisely k.sub.1.Math.r.sub.1, with .sub.k1 (1, 1)=.sub.k1 (2, 2)=2. Similarly, k.sub.37=[3, 4, 5].Math.r.sub.37={(1, 1), (1, 2), (2, 1), (2, 2), (3, 1), (4, 2)}, and k.sub.54=[5, 6, 8].Math.r.sub.54={(3, 1), 2(3, 2), 2(4, 1), (4, 2)}, with .sub.r37 (3, 2)=.sub.r37 (4, 1)=2.
[0135] It is evident from all the above that in order to avoid redundancy and uneven utilization of spatial-temporal resources, so as to optimize the performance of QSM schemes, the sets of dispersion matrix indices K (with con (i.e., k.sub.nk.sub.m, nm,);) must satisfy the following conditions: [0136] a) no two index vectors k.sub.n and km in the set can be equal (i.e., k.sub.nk.sub.m, nm); [0137] b) no two elements in each index vector can be equal (i.e., [k.sub.n].sub.q[k.sub.n].sub.j, k.sub.n and ij): [0138] c) the utilization of all resources available must be ensured (i.e.,
(r.sub.q)>0r.sub.q
) [0139] d) all resources are utilized as often (i.e.
(r.sub.1)= . . . =
(r.sub.Q)), [0140] e) the cardinality of the set must be a power of 2 in order to enable the encoding of codewords (i.e., N=|
|=[(.sub.P.sup.Q)].sub.2)
[0141] As an example, we highlight in Table I the set of index vectors K={k.sub.1, k.sub.2, k.sub.3, k.sub.5, . . . , k.sub.8, k.sub.10, k.sub.11, k.sub.19, . . . , k.sub.23, k.sub.26, k.sub.27, k.sub.28, k.sub.35, . . . , k.sub.38, k.sub.41, k.sub.42, k.sub.47, k.sub.48, k.sub.50, . . . , k.sub.56}. The reader can verify that by this choice of K, all resources in the associated set R have multiplicity 24. In contrast, a nave truncation of the first 32 index vectors in Table I, i.e. K={k.sub.1, . . . , k.sub.32}, leads to an uneven utilization pattern in which K (1, 1)=k(2, 2)=32, k(1, 2)=k(2, 1)=28, k(3, 1)=k(4, 2)=19 and k(3, 2)=k(4, 1)=17, which is obviously sub-optimum as it leads to antennas 1 and 2 being used far more often than antennas 3 and 4. The problem of selecting the optimum set K as described and illustrated above relates to a classic problem in combinatorics graph theory known as the Vertex Cover Problem. In the context hereby, however, the problem has the additional difficulties that: a) the graph in question is bipartite, b) coverage with equal multiplicity is required, and c) nodes must be selected in subsets of three at a time.
TABLE-US-00001 TABLE I Sets of All Possible Index Vectors * and Resources
* (P = 3, n.sub.T = 4, T = 2) Elements of
* Elements of
* Elements of
* Elements of
* k.sub.1 [1, 2, 3] (1, 1), (2, 2), (1, 2), (2, 1), (1, 1), (2, 2) k.sub.29 [2, 4, 7] (1, 2), (2, 1), (1, 2), (2, 1), (3, 1), (4, 2) k.sub.2 [1, 2, 4] (1, 1), (2, 2), (1, 2), (2, 1), (1, 2), (2, 1) k.sub.30 [2, 4, 8] (1, 2), (2, 1), (1, 2), (2, 1), (3, 2), (4, 1) k.sub.3 [1, 2, 5] (1, 1), (2, 2), (1, 2), (2, 1), (3, 1), (4, 2) k.sub.31 [2, 5, 6] (1, 2), (2, 1), (3, 1), (4, 2), (3, 2), (4, 1) k.sub.4 [1, 2, 6] (1, 1), (2, 2), (1, 2), (2, 1), (3, 2), (4, 1) k.sub.32 [2, 5, 7] (1, 2), (2, 1), (3, 1), (4, 2), (3, 1), (4, 2) k.sub.5 [1, 2, 7] (1, 1), (2, 2), (1, 2), (2, 1), (3, 1), (4, 2) k.sub.33 [2, 5, 8] (1, 2), (2, 1), (3, 1), (4, 2), (3, 2), (4, 1) k.sub.6 [1, 2, 8] (1, 1), (2, 2), (1, 2), (2, 1), (3, 2), (4, 1) k.sub.34 [2, 6, 7] (1, 2), (2, 1), (3, 2), (4, 1), (3, 1), (4, 2) k.sub.7 [1, 3, 4] (1, 1), (2, 2), (1, 1), (2, 2), (1, 2), (2, 1) k.sub.35 [2, 6, 8] (1, 2), (2, 1), (3, 2), (4, 1), (3, 2), (4, 1) k.sub.8 [1, 3, 5] (1, 1), (2, 2), (1, 1), (2, 2), (3, 1), (4, 2) k.sub.36 [2, 7, 8] (1, 2), (2, 1), (3, 1), (4, 2), (3, 2), (4, 1) k.sub.9 [1, 3, 6] (1, 1), (2, 2), (1, 1), (2, 2), (3, 2), (4, 1) k.sub.37 [3, 4, 5] (1, 1), (2, 2), (1, 2), (2, 1), (3, 1), (4, 2) k.sub.10 [1, 3, 7] (1, 1), (2, 2), (1, 1), (2, 2), (3, 1), (4, 2) k.sub.38 [3, 4, 6] (1, 1), (2, 2), (1, 2), (2, 1), (3, 2), (4, 1) k.sub.11 [1, 3, 8] (1, 1), (2, 2), (1, 1), (2, 2), (3, 2), (4, 1) k.sub.39 [3, 4, 7] (1, 1), (2, 2), (1, 2), (2, 1), (3, 1), (4, 2) k.sub.12 [1, 4, 5] (1, 1), (2, 2), (1, 2), (2, 1), (3, 1), (4, 2) k.sub.40 [3, 4, 8] (1, 1), (2, 2), (1, 2), (2, 1), (3, 2), (4, 1) k.sub.13 [1, 4, 6] (1, 1), (2, 2), (1, 2), (2, 1), (3, 2), (4, 1) k.sub.41 [3, 5, 6] (1, 1), (2, 2), (3, 1), (4, 2), (3, 2), (4, 1) k.sub.14 [1, 4, 7] (1, 1), (2, 2), (1, 2), (2, 1), (3, 1), (4, 2) k.sub.42 [3, 5, 7] (1, 1), (2, 2), (3, 1), (4, 2), (3, 1), (4, 2) k.sub.15 [1, 4, 8] (1, 1), (2, 2), (1, 2), (2, 1), (3, 2), (4, 1) k.sub.43 [3, 5, 8] (1, 1), (2, 2), (3, 1), (4, 2), (3, 2), (4, 1) k.sub.16 [1, 5, 6] (1, 1), (2, 2), (3, 1), (4, 2), (3, 2), (4, 1) k.sub.44 [3, 6, 7] (1, 1), (2, 2), (3, 2), (4, 1), (3, 1), (4, 2) k.sub.17 [1, 5, 7] (1, 1), (2, 2), (3, 1), (4, 2), (3, 1), (4, 2) k.sub.45 [3, 6, 7] (1, 1), (2, 2), (3, 2), (4, 1), (3, 2), (4, 1) k.sub.18 [1, 5, 8] (1, 1), (2, 2), (3, 1), (4, 2), (3, 2), (4, 1) k.sub.46 [3, 7, 8] (1, 1), (2, 2), (3, 1), (4, 2), (3, 2), (4, 1) k.sub.19 [1, 6, 7] (1, 1), (2, 2), (3, 2), (4, 1), (3, 1), (4, 2) k.sub.47 [4, 5, 6] (1, 2), (2, 1), (3, 1), (4, 2), (3, 2), (4, 1) k.sub.20 [1, 6, 8] (1, 1), (2, 2), (3, 2), (4, 1), (3, 2), (4, 1) k.sub.48 [4, 5, 7] (1, 2), (2, 1), (3, 1), (4, 2), (3, 1), (4, 2) k.sub.21 [1, 7, 8] (1, 1), (2, 2), (3, 1), (4, 2), (3, 2), (4, 1) k.sub.49 [4, 5, 8] (1, 2), (2, 1), (3, 1), (4, 2), (3, 2), (4, 1) k.sub.22 [2, 3, 4] (1, 2), (2, 1), (1, 1), (2, 2), (1, 2), (2, 1) k.sub.50 [4, 6, 7] (1, 2), (2, 1), (3, 2), (4, 1), (3, 1), (4, 2) k.sub.23 [2, 3, 5] (1, 2), (2, 1), (1, 1), (2, 2), (3, 1), (4, 2) k.sub.51 [4, 6, 8] (1, 2), (2, 1), (3, 2), (4, 1), (3, 2), (4, 1) k.sub.24 [2, 3, 6] (1, 2), (2, 1), (1, 1), (2, 2), (3, 2), (4, 1) k.sub.52 [4, 7, 8] (1, 2), (2, 1), (3, 1), (4, 2), (3, 2), (4, 1) k.sub.25 [2, 3, 7] (1, 2), (2, 1), (1, 1), (2, 2), (3, 1), (4, 2) k.sub.53 [5, 6, 7] (3, 1), (4, 2), (3, 2), (4, 1), (3, 1), (4, 2) k.sub.26 [2, 3, 8] (1, 2), (2, 1), (1, 1), (2, 2), (3, 2), (4, 1) k.sub.54 [5, 6, 8] (3, 1), (4, 2), (3, 2), (4, 1), (3, 2), (4, 1) k.sub.27 [2, 4, 5] (1, 2), (2, 1), (1, 2), (2, 1), (3, 1), (4, 2) k.sub.55 [5, 7, 8] (3, 1), (4, 2), (3, 1), (4, 2), (3, 2), (4, 1) k.sub.28 [2, 4, 6] (1, 2), (2, 1), (1, 2), (2, 1), (3, 2), (4, 1) k.sub.56 [6, 7, 8] (3, 2), (4, 1), (3, 1), (4, 2), (3, 2), (4, 1)
TABLE-US-00002 Method 1 Greedy Construction of Optimal Set of Index Vectors K Internal Parameters: Number of resources Q = T .Math. n.sub.T and set of all possible indices *. Inputs: Number of symbols P, of transmit antennas n.sub.T and dimension T of FDFR STBC. Outputs: Optimized set of index vectors
. 1: Choose a random seed n {1, . . . , (.sub.P.sup.Q)} and start with
= ; 2: while |
| (.sub.P.sup.Q).sub.2 do 3: Insert k.sub.n into the set
of selected index vectors; 4: Sort all indices k {1 . . . , Q)} in ascending order of their multiplicities in
; 5: Set D = P and construct/clear the empty set
= of candidate index vectors; 6: while |
| = 0 do 7: Construct a list
of candidate indices with the D lowest multiplicities in
; 8: Construct the set
of all (.sub.P.sup.D) index vectors {tilde over (k)}.sub.m with indices in k; 9: Remove from
all index vectors already in
; 10: if |
| = 0 then 11: Increment D by 1; 12: end if 13: end while 14: Select next n {1, . . . , (.sub.P.sup.Q)} as the position of the first index vector {tilde over (k)}.sub.m of
in
*; 15: end while
[0142] Due to these peculiarities, the problem itself is, to the best of our knowledge, original and cannot be solved by known variations of the Vertex Cover algorithm. Fortunately, the highly symmetric structure of the associated bipartite graph can be exploited to design an efficient method to solve the selection problem at hand. To that end, let us commit a slight abuse of notation and define the multiplicity of a dispersion matrix index (notice that there is no ambiguity with the definition of multiplicity of resources because dispersion matrix indices are single numbers, while spatial temporal resources are pairs) q in the set K as k (q). Then, by virtue of the symmetry of the graph, as it can be seen in
C. Optimal Generalized Design (TT)
[0143] Due to the greedy optimal index vector selection algorithm described above, which is general on P, T and n.sub.T, the last limiting factor preventing the generalization of QSM to arbitrary T is the construction of the dispersion matrices with basis on
[0144] STBCs of arbitrary size. This obstacle is eliminated by considering the design of QSM dispersion matrices based on the Perfect FDFR STBC.
[0145] A TT FDFR STBC encodes T.sup.2 symbols such that the average energy transmitted per antenna is normalized to unity, an energy efficiency-shaping constraint is enforced, and a SE-preserving lower bound on the coding gain (a.k.a, non-vanishing determinant) is maximized. Ultimately, for given TN.sup.+ the design can be described by
[0146] where s.sub.t=[s.sub.1+(i-1)T, s.sub.2+(i-1)T, . . . , s.sub.T].sup.T, with t={1, . . . , T} are vectors each carrying T distinct transmit symbols, R is a TT optimum lattice generating matrix], J.sub.T,n is a TT matrix constructed by replacing the last n diagonal entries of the identity matrix by the elementary complex number j, and N.sub.T is a TT cyclic upper-shift matrix (notice that J.sub.T,n generalizes J.sub.2,1 used in equation (17). In turn, oppositely to M.sub.n, N.sub.n is obtained by circularly shifting the top row of I.sub.n to the bottom. Some examples are
such that post-multiplying it to a given matrix X results in a column-wise shift of X to the right.
[0147] Notice that the Perfect FDFR STBC fully generalizes the 22 Golden code of. To see that, suffice it to consider the case T=2 and with the corresponding lattice generating matrix
such that equation (19) yields
[0148] It follows that in order to be employ Perfect FDFR STBCs in the design of QSM, suffice it to decompose the core code structure of equation (19) in terms of corresponding auxiliary dispersion matrices C.sub.i and D.sub.i due to symmetry, namely
where the generalized indices i{1, . . . , 72} are constructed systematically on t{1, . . . , T} and w{1, . . . , T}, and et is the t-th column of I.sub.T.
[0149] Following this, the full set of dispersion matrices A and B can be built, i.e.,
where again q{1, . . . , Q}, i{1, . . . , T2} as from equation (21), e.sub.I is the I-th column of I.sub.L, but I{1, . . . , L} with L=[n.sub.T//T], as well as a generalized scaling factor y determined depending on the specific STBC in order to adjust the powers of the dispersion matrices such that tr(A.sub.q.sup.HA.sub.q)=T and tr(B.sub.q.sup.HB.sub.q)=T.
[0150] Next, we turn our attention to the construction of the optimal set of index vectors K, via a straightforward generalization of the method described in Subsection III-B. Indeed, as can be learned by inspecting equation (21), each auxiliary matrix C.sub.i and D.sub.i is a TT sparse matrix obtained from a cyclic rotation of a diagonal matrix containing only T non-zero elements of R.
TABLE-US-00003 Method 2 QSM Signal Generation Internal Parameters: Number of symbols P, transmit antennas n.sub.T, time slots T and spatial-temporal resources Q = T .Math. n.sub.T; and cardinalities M = | |, and N = |
| = (.sub.P.sup.Q).sub.2; Global Quantities: Symbol constellation
, optimum lattice generating matrix R, sets of dispersion matrices
= {A.sub.q}.sub.q=1.sup.Q and
= {B.sub.q}.sub.q=1.sup.Q with A.sub.q and B.sub.q as in eq. (22), set of index vectors
obtained from Algorithm 1. Input: Information bit sequence b = [b.sup.R, b.sup.J, b.sup.S]; Outputs: Transmitted signal X. 1: Select index vector k.sup.R as the ([b.sup.R].sub.(10) + 1)-th vector in
; 2: Select index vector k.sup.J as the ([b.sup.J].sub.(10) + 1)-th vector in
; 3: Assign the bits b.sup.S to P symbols {s.sub.1, . . . , s.sub.p} selected from
, with s.sub.p = s.sub.p.sup.R + js.sub.p.sup.I; 4: Construct X = .sub.p=1.sup.P (s.sub.p.sup.BAk.sub.p.sup.R +s.sub.p.sup.JBk.sub.P.sup.I) as per equation (2)
[0151] Consequently, the associated dispersion matrices obtained from equation (22) are all sparse matrices with only T non-zero entries, corresponding to the T spatial-temporal resources utilized. In other words, while in the Golden QSM scheme of Subsection III-B each dispersion matrix index q is associated with 2 resources, in the Perfect STBC-based construction here described each index q associates to T resources, such that the corresponding bipartite graph illustrated in
IV. Proposed Receiver Design
A. Sparse Formulation of QSM Receivers
[0152] Together, Method 1 and 2 introduced above demonstrate that the design of OS-QSM transmitters is possible and tractable. There is, however, no true scalability without feasibility, such that in order to complete the task it is also necessary to show that the proposed OS-QSM design is effectively decodable at reasonable complexity. To put the challenge into context, for given P, M, T and n.sub.T, with Q=T . . . n.sub.T, an ML receiver would have to go through ([(.sub.P.sup.Q)].sub.2).sup.2.Math.M.sup.P combinations of symbols and selected spatial-temporal resources in order to detect a sequence of 2.Math.[log.sub.2(.sub.P.sup.Q)]+P.Math.log.sub.2 M. That means that even for the minimal setting of T=2, P=2 and M=4, a system with n.sub.T=8 transmit antennas would require the receiver to go through ([(.sub.P.sup.Q)].sub.2).sup.2.Math.(4).sup.2=16.777.210 combinations in order to decode the corresponding log 2 (16.777.216)=24 bits. In other words, ML decoding is highly impractical in QSM systems, especially in the context of massive MIMO systems.
[0153] We emphasize that this challenge applies not only to the OS-QSM scheme of Subsection III-B, but also to current SotA QSM methods, as the example given above is for T=2, which is the size of the core codes used in the latter. We furthermore stress that the utilization of SD receivers is also not viable in scaled cases, because the nature of tree search algorithms still requires excessive computational complexity in large systems. Finally, it is remarked that since convenient properties such as fast-decodability and block-diagonality are known not to be retainable without sacrifice of optimality for STBC of arbitrary size, a scalable detector for QSM schemes cannot rely on such features.
[0154] In light of the above, we introduce hereafter a new detection method for QSM schemes which relies neither on tree-search, nor on specific properties of STBCs, and which is completely independent of the infeasible combinatorial factor [(.sub.P.sup.Q)].sub.2. In addition, given prior information on the encoding construction, the proposed decoder is valid to detect any QSM signal.
[0155] The core idea of our approach is to take full advantage of a sparse representation of QSM signals over the entire channel (i.e., for all spatial temporal resources available), assumed known at the receiver. The proposed decoding method then leverages the iterative shrinkage thresholding algorithm (ISTA) to greedily extract symbol and dispersion index estimates, resulting in significantly lower complexities compared to ML and SD-based methods. To that end, first combine equations (1) and (2), and consider the vectorized form of the QSM received signal
where we implicitly defined the block-diagonal channel matrix OH and vectorized noise v; the dispersion matrices in A and B are also vectorized into a.sub.q-vec(A.sub.q) and b.sub.q vec (B.sub.q) and concatenated .sub.A[a.sub.1, . . . , a.sub.g].sup.QQ and .sub.B=[b.sub.1, . . . , b.sub.Q]
.sup.QQ respectively; and u.sup.n
.sup.Q1 (respectively u.sup.I
.sup.Q1) is set to zero everywhere, except for its elements of indices k.sup.R
(respectively k.sup.I
), which are set to {S.sub.1.sup.R, . . . , s.sub.P.sup.R} (respectively {S.sub.1.sup.I, . . . , S.sub.P.sup.I})
[0156] Equation (23) can be further simplified by defining the combined and real-imaginary decoupled information and noise vectors
[0157] as well as the decoupled versions of a.sub.q and b.sub.q, namely
which in turn can be combined into a single dispersion matrix .sub.D .sup.2Q2Q, namely
such that the vectorized system model of equation (23) can be re-written as
[0158] where {hacek over ()}.sub.H is the quadrature-operated block diagonal channel matrix .sub.H which we implicitly relabeled .sub.H, as with the effective channel matrix G.sub.H.Math..sub.D, for future convenience.
[0159] To elaborate on equation (27) with an example, consider a system with P=3, T=2 and n.sub.T=4, and assume that for a particular bit sequence b=[b.sup.R, b.sup.I, b.sup.s], the selected index vectors are given by k.sup.R=k.sub.10=[1, 3, 7] and k.sup.I=k.sub.47=[4, 5, 7]. Then, the corresponding combined information vector becomes u=[S.sub.1.sup.R0, 0, 0, S.sub.2.sup.R, 0, 0, S.sub.1.sup.I, 0, S.sub.2.sup.I, 0, 0, S.sub.3.sup.R, S.sub.3.sup.I, 0, 0].sup.T Notice that while u carries in the entries s.sub.P.sup.R and s.sub.P.sup.I the Plog.sub.2 M bits corresponding to the b.sup.s subsequence, the remaining 2 log.sub.2 N bits corresponding to the subsequences b.sup.R and b.sup.I are encoded merely by positions of non-zero elements in u, regardless of what the values of S.sub.P.sup.R and s.sub.P.sup.I might be, which suggests that the detection of b.sup.s could be done separately from that of b.sup.R and b.sup.I.
[0160] In principle, the latter feature could be utilized to design an SD receiver for the OS-QSM method proposed above, similarly to how block-separability was exploited to do so for the EDA-QSM scheme. The problem with that approach is, of course, the prohibitively large number of combinations how the 2P elements of the decoupled symbol vector S=[S.sub.1.sup.R, S.sub.1.sup.I, . . . , S.sub.P.sup.R, S.sub.P.sup.I] can be placed among the 2Q entries of u. In order to circumvent this challenge, we instead seek to exploit the facts demonstrated in Subsection III-A, namely, that: a) the optimum number P* of symbols maximizing SE is a fraction of the total spatial-temporal resources Q=T.Math.n.sub.T, as per equation (12); and b) that in large-scale systems with n.sub.T>>1, a significantly smaller block size T suffices to asymptotically achieve SE optimality, as shown in
[0161] Taking into account the focus on scalability, which at the receiver side translates to controlling complexity, two suitable candidate methods to be applied for OS-QSM demodulation are the generalized approximate message-passing (GAMP) algorithm, and the iterative shrinkage thresholding algorithm (ISTA), both of which possess quadratic complexity on the size 2T.sub.nT of the signal vector u. It is well-known, however, that the GAMP algorithm relies strongly on the particular structure of measurement matrix and the independence of the received signal, which in the case of QSM cannot be generally assumed, as a direct consequence of the utilization of STBCs in the dispersion matrices. In the absence of the required conditions, GAMP receivers yield poor performance, characterized by error-floors at high SNRs.
[0162] Motivated by this fact, it is therefore chosen to follow a ISTA-based approach in the design of a low-complexity demodulator for QSM systems, which is described in the sequel. In particular, it is introduced a method to detect QSM signals, which is based on a purpose-built variation of ISTA that incorporates modifications both on the thresholding function and on the index vector estimation process, specifically to QSM detection.
B. Greedy Boxed ISTA-based QSM Decoder
[0163] Consider the standard ISTA recursion,
[0164] where u ( ) is the estimate of u at the n-th iteration, =maxeig (G.sup.TG) is the shrinkage step size (the actual requirement is that >maxeig (G.sup.TG), however, we will assume the minimum step-size, which is sufficient), is the threshold factor, and (s; T) is the soft-thresholding function. A first meaningful modification to such standard ISTA recursions in equation (28) is to account for the fact that the symbols in the real-valued projected constellation S.sub.R (S) are finite, such that in addition to the lower limit T in the vicinity of the origin used to enforce sparsity in the solution, an upper limit max (S.sub.R) can be introduced into the thresholding function. In other words, for the case at hand we replace ISTA's standard soft-thresholding function (s; T) by a hard-thresholding function leading to the boxed hard-thresholding function (s; T) illustrated in
[0165]
[0166] Incorporating this modification yields the boxed-hard ISTA (BH-ISTA) receiver described by
[0167] Notice that the computational cost of repeatedly evaluating equation (30) is dominated by the term G.sup.(n), therefore quadratic on the number of non-zero entries (i.e., l.sub.0-norm) of .sup.(n), which reduces with the iterations n, as illustrated in
[0168]
[0171] In particular,
[0172] It can in fact be seen that as a result of boxing and hard-thresholding, |.sub..sup.(0)|.sub.0<|.sub..sup.(0)|.sub.0, such that the expected order of complexity associated with evaluating equation (28) is lower than that of evaluating (30), which can be bounded both below and above by the lower- and upper-limits (O(4P.sup.2) and O(4Q.sup.2)).
[0173] More details will be given in Section V-A. In turn,
[0174] Let us consider that multiple runs of the BH-ISTA iterations described by equation (30) are performed, such that prior to the m-th run a modification is made to y, G and u, which can be expressed by rewriting equation (30) as
where we convene that for the first run (m=1) we set y.sub.1=y, G.sub.1=G and
[0175] Let n* be the last iteration of the m-th run of the latter estimator, with its corresponding outcome denoted by .sub.m.sup.(n*). And finally, let sa {tilde over (s)}.sub.qm be the entry of .sub.m.sup.(n*) with the largest amplitude whose position is denoted by {circumflex over (q)}.sub.m, such that we may write
[0176] where [x]] denotes the I-th element of a generic vector x. It is emphasize that in the greedy procedure summarized by equation (32), two distinct pieces of information on the bit sequence b are obtained, namely, a soft estimate {tilde over (S)}.sub.qm of one of the modulated symbols {S.sub.P.sup.R, s.sub.P.sup.I}S., and a hard estimate {circumflex over (q)}.sub.m, of one of the indices contained in the selected index sets {k.sup.R, k.sup.I}K. In possession of such information, the following steps are then executed in order to produce the modified quantities required to perform the next run of the BH-ISTA recursion described by equation (31).
[0177] First, a hard-detected version of {tilde over (s)}.sub.m is obtained by projecting in onto S.sub.R, that is
[0178] Then, the remaining quantities are updated following
where I.sub.2Q is the identity matrix of size 2Q and e.sub.{circumflex over (q)}m its {circumflex over (q)}.sub.m column. Recall that due to the quadrature-decomposed structure of the sparse vector u, all odd index estimates q{circumflex over ()}m correspond to the real parts of modulated symbols, while even {circumflex over (q)}.sub.m correspond to the imaginary parts, respectively. It is therefore sensible that, as equations (31) through (35) are evaluated iteratively, the obtained index estimates {{circumflex over (q)}.sub.1, {circumflex over (q)}.sub.2, . . . , {circumflex over (q)}.sub.m} be split and collected accordingly into the subsequences
where mod (x, 2) denotes the modulo-2 operation onto x.
[0179] If there are no errors during the detection process, after exactly m=2P runs, the sequences {{circumflex over (q)}.sub.m.sup.R, {circumflex over (q)}.sub.m.sup.I} can be perfectly mapped to {k.sup.R, k.sup.I}, in particular via
such that procedure comes to a stop.
[0180] More generally, however, errors may occur, such that either {circumflex over (q)}.sub.m.sup.R or {circumflex over (q)}.sub.m.sup.I, or both, contain incorrect indices even with cardinality P. In such cases, the procedure continues until both subsequences contains the first P-tuple of indices included in the dispersion matrix index vector set K, at which point a modification of the update equations is required, which can be described as follows.
[0181] Let P.sub.k (q) denote the projection of a sequence q onto the set K, such that either a sequence kK or the empty set is returned by the projection, depending on whether or not q contains within it a sequence from K. If multiple valid kK exist in the combination of elements in the viable elements with lower indices in q (not of the element values themselves) take priority, such that the notion of greedy selection is coherent. Then, equation (34) can be expanded into
[0182] In plain words, equation (37) establishes that after the m-th run of the BH-ISTA detector, the initial state of the estimate vector .sub.m+1.sup.(I) for the next run is either: [0183] a) updated by removing the latest estimate symbol, when neither of {circumflex over (q)}.sub.m.sup.R and {circumflex over (q)}.sub.m.sup.I can be projected to K, which happens either when the number of indices acquired are insufficient (less than P) to decide on valid estimates of k.sup.R or k.sup.I or when the number of indices are sufficient (P or larger) but none contains valid combinations of indices to any kK; or [0184] b) updated by nulling all odd entries of q{1, 3, . . . , 2Q-3, 2Q-1}, when a hard decision of k is confirmed from the projection of {circumflex over (q)}.sub.m.sup.I onto K, which will only happen once throughout the demodulation procedure; or c) updated by nulling all even entries q{2, 4, . . . , 2Q-2, 2Q}, when a hard-decision of {circumflex over (k)}.sup.R is confirmed from the projection of {circumflex over (q)}.sup.R onto K, which also can happen only once throughout the demodulation procedure; or. [0185] c) updated by nulling all even entries q{2, 4, . . . , 2Q-2, 2Q}, when a hard-decision of {circumflex over (k)}.sub.m.sup.I is confirmed from the projection of .sub.m.sup.I onto K, which also can happen only once.
[0186] Obviously, the only other alternative to those above is when both {circumflex over (k)}.sup.R and {circumflex over (k)}.sup.I have been acquired, and consequently also the entire set of symbol estimates {S.sub.1.sup.R, s.sub.1.sup.I, . . . , s.sub.P.sup.R, S.sub.P.sup.I} have been obtained, in which case the procedure is terminated.
[0187] Similarly to the above, the updates of ym and Gm must also be revised so as to account for the effect of hard-decisions onto {circumflex over (k)}.sup.R and {circumflex over (k)}.sup.I, so as to cancel the effect of hard-decided indices and symbols, and to nullify the channel corresponding to confirmed indices, yielding respectively
[0188]
[0189] The procedure described by equations (31) through (33) and (35) through (39) amount to a greedyi.e., symbol-by-symbol and index set-by-index setmodification of the GB-ISTA detector introduced earlier, for which it is dubbed as the greedy boxed iterative shrinkage thresholding algorithm for QSM demodulation.
[0190] Notice that at the end of the process, estimates {circumflex over (k)}.sup.R and {circumflex over (k)}.sup.I of the selected dispersion matrix index vectors, as well as hard-decision estimates =[S.sub.1.sup.R, s.sub.1.sup.I, . . . , s.sub.P.sup.R, S.sub.P.sup.I] of the modulated symbols are obtained, from which the corresponding encoded bits b=[b.sup.R, b.sup.I, b.sup.s] can be retrieved at a fraction of the complexity of sphere detection or exhaustive maximum likelihood searches. A diagram illustrating the proposed GB-ISTA QSM receiver is offered in
TABLE-US-00004 Method 3 Greedy Boxed-(Hard) ISTA Receiver for QSM Schemes Global Quantities: Real-valued projected symbol constellation .sub.R, set of index vectors
and threshold factor : Inputs: Received signal y and effective channel matrix G. Outputs: Estimated index and symbol vectors {circumflex over (k)}.sup.R, {circumflex over (k)}.sup.l and . 1: Set m = 1 and = maxeig(G.sup.TG); 2: Initialize y.sub.m = y, G.sub.m = G and u.sub.m.sup.(l) = 0.sub.2Q; 3: while
([q.sub.m.sup.R + 1]) = or
(q.sub.m.sup.l) = do 4: Iterate equation (31) until convergence obtaining .sub.m.sup.(n*.sup.) 5: Obtain symbol soft estimate
and index hard estimate {circumflex over (q)}.sub.m via equation (32); 6: Obtain hard symbol estimate
via equation (33); 7: Insert index estimate {circumflex over (q)}.sub.m into its subsequence {circumflex over (q)}.sub.m.sup.R or {circumflex over (q)}.sub.m.sup.J as per equation (35); 8: Construct .sub.m+1.sup.(1), y.sub.m+1 and G.sub.m+1 via equations (37), (38) and (39); 9: Increment m by 1; 10: end while 11: Output the estimate index vectors as {circumflex over (k)}.sup.R
([{circumflex over (q)}.sub.m.sup.R + 1]) and {circumflex over (k)}.sup.l
({circumflex over (q)}.sub.m.sup.J), respectively. and the estimate symbol vector as the intercalation of {
} and {
}.
TABLE-US-00005 Method 4a Greedy ISTA Decoder Inputs: Received signal: y. Channel matrix: {umlaut over (H)}, Iteration limit: , Threshold factor: Symbol constellation: C Outputs: Estimated symbols vector: {circumflex over (x)}. Estimated index vectors {circumflex over (k)} and
. 1: {circumflex over (k)} = [ ], {circumflex over (l)} = [ ], {circumflex over (x)} = [ ] . 2:
= [ ],
= [ ], = 0
13: if i.sub.max is even then and
as the unique integer parts of C. 14:
= [
, i.sub.max/2], 3: while {circumflex over (k)} or {circumflex over (l)} == [ ] do 15: {circumflex over (k)} = index_est(
), as given in Algorithm 2. 4: Set
= 0, s
= 0
16: else 5: while t t
do 17:
= [
, {i.sub.max 1}/2]. 6: s
=
18: {circumflex over (l)} = index_est(
), as given in Algorithm 2. 7: t = t + 1. 19: end if 8: end while 9: t.sub.max equation (17) 20: end while 10:
=
. 21: for p in [l, . . . , P] do 11: y = y {{umlaut over (H)}}
.Math.
, 22: x = [x,
+
] 12: {{umlaut over (H)}}
= 0
, 23: end for
indicates data missing or illegible when filed
TABLE-US-00006 Method 4b Dispersion Indices Decider: index_est(.Math.) Inputs: Detected indices vector i Outputs: Estimated index vector {circumflex over (v)}. 1: n = numel(i).
[0191] In the following table the Spectral efficiency n of the nn generalised EDA-QSM is shown.
TABLE-US-00007 TABLE 1 selected combinations of n, (n.sub.T, n.sub.R, P), spectral efficiency , and sparsity s (n.sub.T, n.sub.R, P) n s (n.sub.T, n.sub.R, P) n s (4, n.sub.R, 1) 2 4 (8, n.sub.R, 4) 4 9.5 (4, n.sub.R, 2) 4 4 (4, n.sub.R, 4) 2 10 (32, n.sub.R, 1) 4 4 1/128 (16, n.sub.R, 2) 2 10 1/16 (4, n.sub.R, 2) 2 6 (32, n.sub.R, 3) 4 10.5 3/128 (4, n.sub.R, 3) 4 6 (16, n.sub.R, 4) 4 11.5 1/16 (16, n.sub.R, 1) 2 6 1/32 (8, n.sub.R, 3) 2 12 3/16 (4, n.sub.R, 4) 2 7 (32, n.sub.R, 2) 2 12 1/32 (32, n.sub.R, 1) 2 7 1/32 (32, n.sub.R, 4) 4 13.5 1/32 (32, n.sub.R, 2) 4 7 1/64 (8, n.sub.R, 4) 2 14 (8, n.sub.R, 3) 4 7.5 3/32 (16, n.sub.R, 3) 2 15 3/32 (4, n.sub.R, 3) 2 8 (16, n.sub.R, 2) 4 19 (8, n.sub.R, 2) 2 8 (32, n.sub.R, 4) 2 23 1/16 (16, n.sub.R, 3) 4 9 3/64
[0192] Compare the pairs where n and P are increased by the same factor, keeping the same sparsity for a given n.sub.T [0193] (4, n.sub.R, 1), n=2, n=4, s=1/8 [0194] (4, n.sub.R, 2), n=4, n=4, s=1/8
[0195] The striking and novel result is observed when comparing this effect with larger increase in P: [0196] (4, n.sub.R, 2), n=2, n=6, s=1/4 [0197] (4, NR, 4), n=4, n=7, s=1/4
[0198] At same average sparsity in time, the spectral efficiency increased with n, and more largely for larger n.sub.T!! [0199] (16, n.sub.R, 2), n=2, n=10, s=1/16 [0200] (16, n.sub.R, 4), n=4, n=11.5, s=1/16
V. Complexity and Performance Analysis
[0201] In this section we analyze the performance of the proposed OS-QSM via computer simulations. Given that our focus is on the scalability of the system, all simulation results to be shown are for relatively large number of transmit antennas (i.e., n.sub.T6) and for increasing number of transmission slots (i.e., T2), with the number of digitally-modulated transmit symbols P and the cardinality of corresponding constellation M adjusted on a case-by-case basis in order to highlight the main finding of each simulated experiment. To the best of our knowledge, simulation results on QSM schemes with such parameters have not appeared so far in the literature, due to the prohibitive computational complexity of existing receivers
A. Complexity: GB-ISTA Versus ML and SCMB-SD Receivers
[0202] In light of the latter remark, let us start by assessing the decoding complexity of scaled QSM systems, in particular by deriving the complexity orders of the conventional ML and SCMB-SD approaches, and of the proposed GB-ISTA algorithm described in Section IV.
[0203] For any given n.sub.T, T and P, the brute-force ML decoder requires a search among all possible [(.sub.P.sup.TRP)].sub.2, antenna activation patterns, independently selected according to {k.sup.R, k.sup.I}K to transmit the real and imaginary parts of the P digitally modulated symbols in sS.sup.P, as well as another search, for each possible activation pattern, of all possible P-tuples of symbols selected from the constellation S of cardinality M. Assuming, idealistically and for simplicity, that each search consumes a single floating point operation (flop), the ML search process alone yields a complexity order lower-bounded by O(4.sup.[log.sup.
[0204] The practical unfeasibility of ML-based detection of QSM systems is clearly highlighted by equation (40), as it exposes the fact that the number of transmit symbols P is a complexity order exponent of all theoretically scalable quantities n.sub.T, T and M. Next, let us show that this challenge cannot be satisfactorily mitigated by the SD approach. To that end, consider again idealistically and for simplicity, that SD can reduce the search radius to a single symbol, such that the factor MP in equation (40) can be neglected. In other words, we find that the order of complexity associated to SD-based QSM receivers can, at best, be reduced to
[0205] From the latter it can be concluded that, in the context of scalable QSM schemes, the only advantage of SD is to enable scaling of the digital constellation cardinality M, which not only impacts negatively on the corresponding BER, but also is not the most significant factor in increasing the SE of the system, since the total number of bits conveyed by a QSM scheme is B=2.Math.[log.sub.2(.sub.P.sup.Tn.sup.
[0206] Finally, let us address the computation complexity of the proposed GB-ISTA. For starters, observe from equations (31) through (36) that the GB-ISTA receiver obtains the spatially encoded bits b.sup.R and b.sup.I not from a search, but directly from the sparse-recovery process, i.e., the value and locations of non-zero elements of u{circumflex over ()}. As a consequence of removing such combinatorial search, the impact of the scalable parameters n.sub.T, T and P onto GB-ISTA is significantly smaller, as demonstrated by the following complexity analysis of the steps of method 3.
[0207] 1) Method 3 takes as input the effective matrix G given in equation (27), whose construction requires evaluating the product of the sparse block-diagonal Matrix .sub.H .sup.2Tn.sup.
.sup.2Tn.sup.
[0208] 2) Next, the GB-ISTA receiver performs multiple runs of evaluating equation (31), the first step to which is computing .sup.(n)+1/G.sup.T(yG.sup.(n)). The cost of computing a as per line 1 of method 3 are ignored, under the argument that for large systems, the largest eigenvalues G.sup.TG converges almost sure to a constant dependent only on the structure and the energy of G.
[0209] That operation would cost (2Tn.sub.T)(2Tn.sub.R)+(2Tn.sub.R)+(2Tn.sub.R)(2Tn.sub.T)+(2Tn.sub.R)=ST2n.sub.Tn.sub.R30 4Tn.sub.R flops to accomplish, but since the sparsity of u{circumflex over ()}(n) quickly reduces to the actual value 2P, as shown in
[0210] 3) After convergence of equation (31), the receiver obtains the sparse estimate vector .sub.m.sup.(n*), from which the soft symbol estimate {tilde over (S)}.sub.{circumflex over (q)}m is extracted at negligible cost via maximum value search [44], along with the estimate index {circumflex over (q)}.sub.m given by the position of {tilde over (s)}.sub.{circumflex over (q)}m in .sub.m.sup.(n*), as expressed in equation (32). With these quantities at hand, up to VM flops are consumed to obtain the hard symbol estimate {tilde over (s)}.sub.{circumflex over (q)}m as per equation (33).
[0211] 4) Considering that the cost of the element, interference and column removals expressed by equations (37) through (39) are negligible, the next significant cost of the receiver is the validation of acquired indices. In particular, after at least P runs, when a sufficient number of position indices {circumflex over (q)}.sub.m have been detected to construct any or both of the index subsequences {circumflex over (q)}.sub.m.sup.R and/or {circumflex over (q)}.sub.m.sup.I, and map them to corresponding estimate index vectors {circumflex over (k)}.sup.R and/or {circumflex over (k)}.sup.I as per equation (36), said estimates need be validated against the optimal set of index vectors K. Assuming the cost of such operation is of order O(1), this step contributes to the total complexity of the GB-ISTA detector with an additional cost of P flops.
[0212] 5) Lastly, as described in line 11 of Algorithm 3, the GB-ISTA outputs both the pair of estimate index vectors {circumflex over (k)}.sup.R and {circumflex over (k)}.sup.I as well as the digitally modulated symbol vector estimate .sup.P, which requires the intercalation of the real and imaginary parts, at estimated cost of P flops.
[0213] From the above, the total complexity order of the GB-ISTA can be estimated at
[0214] The per-bit complexity orders of the ML and the proposed GB-ISTA decoders, obtained by dividing the expressions in equations (40) and (42) by the number of bits detected per transmission B=2[log.sub.2 (.sub.P.sup.Tn.sup.
[0215]
[0216]
B. BER Performance of the Proposed OS-QSM Scheme
[0219] Empowered by the significant reduction in complexity obtained by GB-ISTA over ML detection, as shown above, we proceed to assess the BER performance of the proposed OS-QSM scheme, decoded via the GB-ISTA. In general, our simulated experiments aim to further demonstrate that the proposed OS-QSM are feasible with relatively large numbers of transmit antennas, and can achieve very low BER at very low Et/No with rather high spectral efficiencies, whilst using relatively few spatial-temporal resources per transmission.
[0220]
[0221] To that end, our first set of results, shown in
[0222] Two important facts can be learned from the results of
[0223] One criticism that could be raised about the results of
[0224]
[0225] In any case, in order to dispel any doubts about the ability of the proposed OS-QSM design and of the corresponding GB-ISTA receiver to actually achieve feasible and optimized spectral efficient combined with low BERs, shown in
[0226] With these remarks made, turning to the results obtained in
[0227]
[0228] Furthermore, the proposed decoder also does not require design restrictions such as block-diagonality or orthogonality in the transmission scheme, only the sparsity which is inherent with spatial modulation schemes, therefore providing larger freedom in transmitter development as well. In other words, the proposed decoder is capable of coping with many different encoding structures (flexibility).
[0229] The decoder can be used in any MIMO system where the number of antennas is expected to be large, such that ML approaches are infeasible. The scheme can be used to increase efficiency in cellular networks and V2X communications (eMBB).
[0230]
[0231]
[0232]
[0233]
[0234]
[0235]
[0236]
[0237]
[0238]
[0239] In this application it is a new transmitter and receiver designs for QSM schemes, focusing on their scalability in terms of the number of transmit antennas n.sub.T, number of transmit instances T and number of encoded M-ary symbols P, as well as on their performance optimization in terms of SE, diversity and coding gains proposed. The contributions are motivated by the demonstrated fact that, in order for SE optimality to be achieved, QSM schemes must scale n.sub.T, T and P, which is not possible with SotA methods. At the transmitter, the newly proposed OS-QSM scheme differs from SotA alternatives in that its dispersion matrices are designed based on the FDFR STBCs, and in that dispersion matrix index selection is performed via a new greedy algorithm given, which ensures that all spatial-temporal resources of the transmitter are utilized evenly over multiple transmissions. In turn, at the receiver, the proposed art contributes with a new ISTA-based receiver, which thanks to its reliance on the sparse structure of QSM signaling, eliminates the combinatorial nature of existing ML- or SD-based approaches, further enabling the scaling of the system from a feasibility perspective. In fact, a complexity analysis is offered, which shows that the proposed GB-ISTA receiver enjoys a complexity order that is cubic on T, quadratic on P, and only linear on nT, in contrast to the ML and SD detectors which have geometric complexities on T and nT, with P as exponent, rendering them unfeasible in the scaled scenario. Simulation results for set-ups of scales never before shown in related literature, corroborate both the high performance and feasibility of the proposed OS-QSM scheme and GB-ISTA receiver.