• 沒有找到結果。

多輸入多輸出系統之低複雜度偵測器研究

N/A
N/A
Protected

Academic year: 2021

Share "多輸入多輸出系統之低複雜度偵測器研究"

Copied!
76
0
0

加載中.... (立即查看全文)

全文

(1)國 立 交 通 大 學 電子工程學系 電子研究所碩士班 碩. 士. 論. 文. 多輸入多輸出系統之低複雜度偵測器研究. A Study on Low-complexity Detectors in MIMO Systems. 研 究 生:方自民 指導教授:簡鳳村. 博士. 中 華 民 國 九 十 七 年 八 月.

(2)

(3) 多輸入多輸出系統之低複雜度偵測器研究. A Study on Low-complexity Detectors in MIMO Systems. Student: Tzu-Min Fang Advisor: Dr. Feng-Tsun Chien. 研究生: 方自民 指導教授: 簡鳳村. 國 立 交 通 大 學 電 子 工 程 學 系 電 子 研 究 所 碩 士 班 碩 士 論 文. A Thesis Submitted to Department of Electronics Engineering & Institute of Electronics College of Electrical and Computer Engineering National Chiao Tung University in Partial Fulfillment of the Requirements for the Degree of Master in Electronics Engineering. August 2008. HsinChu, Taiwan, Republic of China. 中華民國九十七年八月.

(4) 多輸入多輸出系統之低複雜度偵測器研究. 研究生: 方自民. 指導教授: 簡鳳村 博士. 國立交通大學. 電子工程學系 電子研究所碩士班. 摘要 在這篇論文我們學習 B-Chase 檢測器被應用在多輸入多輪出系統和多輸入多輪出正交分 頻多工系統。B-Chase 檢測演算法是一個廣義技術它能夠提供先前所提過的檢測器當作 一個特殊的實例它包含了最大概似檢測器和決策返迴檢測器。這 B-Chase 檢測器包含一 個列舉檢測器,它能夠被列舉長度 l 所參數化。介由改變長度,我們能夠處理系統效能和 複雜度。 此外, 這 B-Chase 檢測器提供兩個選擇演算法它們能夠執行一個工作去決定 那一個先進來被檢測。並且列舉長度能夠影響那一個信號被第一個被檢測。這兩個選擇 演算法所抉擇的信號根據兩個不同準則所決定。第一個方法是建立在接收信號的雜訊比 在那裡,信號被選擇在比較高的優先權如果它有比較高的雜訊比。這個方法使得列舉檢 測器的結果能夠更正確,因此下降錯誤傳送的風險。在其它方面,為了下降複雜度的需要 當介由第一選擇演算法,在第二個方法執行這個選擇在這個子檢測器,能以效能去交換 複雜度。最後,我們應用低複雜度 B-Chase 檢測演算法到多輸入多輪出正交分頻多工系 統。. i.

(5) A Study on Low-complexity Detectors in MIMO Systems Student: Tzu-Min Fang. Advisor: Dr. Feng-Tsun Chien. Department of Electronic Engineering & Institute of Electronics National Chiao Tung University. Abstract We study the B-Chase detector applied to the MIMO and MIMO-OFDM systems in this thesis. B-Chase detection algorithm is a general technique that can accommodate previously reported detectors as special cases, including the maximum-likelihood and decision-feedback detectors. The B-Chase detector includes a list detector that is parameterized by the list length l. By changing the list length, we can manage the system performance and complexity. In addition, the B-Chase detector provides two selection algorithms that perform the task to decide which incoming symbol is firstly detected. And the list length can impact which symbol is firstly detected. The choice of two symbol selection algorithms is determined according to two different criteria. The first approach is based on the received SNR in which the symbol is selected in a higher priority if it has a higher SNR.. This way the result of the. list detector is more likely to be correct, thereby reducing the risk of error propagation. On the other hand, in order to reduce the complexity entailed by the first selection algorithm, the 2nd approach performs the selection in the sub-detectors, with the performance traded to the complexity. Finally, we apply the low-complexity B-Chase algorithm to the MIMO-OFDM systems.. ii.

(6) 誌謝 要感謝我的指導教授 簡鳳村 老師,能夠讓我順利完成這篇論文。老師能夠在做研究 上給予指導。感謝實驗室的其他成員和通訊電子與訊號處理實驗室(commlab),能提供 充足的軟硬體資源和幫助。這篇論文獻給所有幫助過我的人。 誌於 2008.8 交大 自民. iii.

(7) Contents Chapter 1 Introduction................................................................................................................1 1.1 Significance ..................................................................................................................1 1.2 Motivation ....................................................................................................................2 1.3 Contribution..................................................................................................................2 Chapter 2 MIMO Systems..........................................................................................................3 2.1 Introduction to MIMO Systems....................................................................................3 2.2 Maximum Likelihood (ML) Detection Methods..........................................................6 2.3 The Linear Detector Methods.......................................................................................7 2.4 BLAST Detection Methods ........................................................................................ 11 2.4.1 Combine ML and DFE Scheme....................................................................15 2.4.2 Parallel Detection (PD) Scheme....................................................................17 2.5 Chase Detector............................................................................................................21 Chapter 3 B-Chase Detector .....................................................................................................25 3.1 Introduce B-Chase Detector .......................................................................................25 3.1.1 The SNR Gain of a List Detector for the B-Chase Detector......................26 3.1.2 The SNR of the B-Chase Detector................................................................28 3.1.3 The B-Chase Selection...................................................................................30 3.1.4 Implementing the B-Chase Detector............................................................33 3.1.5 The B-Chase Detector for Channel Estimation Errors..............................45 Chapter 4 B-Chase Detector of MIMO-OFDM Systems .........................................................48 4.1 OFDM System Models...............................................................................................48 4.1.1 Continuous-Time Model ...............................................................................49 4.1.2 Discrete-Time Model .....................................................................................53 4.1.3 Effect of Cyclic Prefix ...................................................................................54 4.2 MIMO-OFDM Architecture .......................................................................................55 4.3 B-Chase Detector in MIMO-OFDM Systems ............................................................57 Chapter 5 Conclusion ...............................................................................................................63. iv.

(8) List of Figures Figure 2-1 Model of MIMO systems .................................................................................................................... 6 Figure 2-2 QR decomposition algorithm ............................................................................................................. 9 Figure 2-3 Block diagram of V-BLAST structure ............................................................................................ 11 Figure 2-4 ZF V-BLAST OSIC algorithm [2] ................................................................................................... 12 Figure 2-5 The Sorted-QR decomposition algorithm [6] ................................................................................. 14 Figure 2-6 Parallel detection............................................................................................................................... 19 Figure 2-7 Block diagram of the Chase detector [13]....................................................................................... 22 Figure 3-1 Overall block diagram for the B-Chase detector ........................................................................... 25 Figure 3-2 Decision regions for a = e. jπ. 4 and different list lengths: (a) l = 1; (b) l = 2; and (c) l = 3. The. decision list contains a whenever the input to the list detector falls within the shaded region. Also indicated is the minimum distance d l to the boundary [13] ............................................................... 27 Figure 3-3 QR decomposition algorithm ........................................................................................................... 28 Figure 3-4 Computationally efficient implementation of the B-Chase detector [13] ..................................... 36 Figure 3-5 Preprocessing pseudocode for the proposed implementation of the B-Chase detector that uses selection algorithm 1 [13] .......................................................................................................................... 37 Figure 3-6 The bit error rate versus SNR for the B-Chase detector* ( l ) with l =1, 2, 16 , T=8,and 16 QAM ..................................................................................................................................................................... 40 Figure 3-7 Bit error rate versus SNR for the B-Chase detector* ( l ) and the B-Chase detector ( l ) with l =1,2 , T=8,and 16 QAM ............................................................................................................................. 42 Figure 3-8 Bit error rate versus SNR for the B-Chase detector* ( l ) with l =1,2 ,and the ML detector T=8,and BPSK............................................................................................................................................ 43 Figure 3-9 Bit error rate with channel estimation error and without channel estimation error.................. 47 Figure 4-1 Cyclic prefix of an OFDM symbol [10] ........................................................................................... 49 Figure 4-2 Spectrum of an OFDM signal [10]................................................................................................... 52 Figure 4-3 Continuous-time OFDM baseband modulator [10] ....................................................................... 52 Figure 4-4 Continuous-time OFDM baseband demodulator [10] ................................................................... 53 Figure 4-5 Discrete-time OFDM system model [10] ......................................................................................... 54 Figure 4-6 Transmitter architecture of MIMO OFDM systems ..................................................................... 56 Figure 4-7 Receiver architecture of MIMO OFDM systems ........................................................................... 57 v.

(9) Figure 4-8 Bit error rate versus SNR in the B-Chase detector* ( l ) with l =1,2,16 for MIMO-OFDM Systems........................................................................................................................................................ 60 Figure 4-9 Bit error rate versus SNR in the B-Chase detector* ( l ) with l =1,2 for MIMO-OFDM Systems ..................................................................................................................................................................... 62. vi.

(10) List of Tables Table 2-1 Complexity of QR decomposition algorithm .......................................................................................9 Table 2-2 Complexity of the Sorted-QR decomposition algorithm ..................................................................14 Table 2-3 Special cases of the Chase detector [13] .............................................................................................23 Table 3-1 Complexity of the selection algorithm 1 and the selection algorithm 2...........................................33 Table 3-2 System parameters...............................................................................................................................40 Table 3-3 System parameters...............................................................................................................................41 Table 3-4 System parameters...............................................................................................................................43 Table 3-5 Complexity for B-Chase Detector and ML Detector.........................................................................44 Table 3-6 System parameters...............................................................................................................................46 Table 4-1 System parameters...............................................................................................................................59 Table 4-2 System parameters...............................................................................................................................61. vii.

(11) Chapter 1 Introduction 1.1 Significance For wireless communications applications, the major goal is to develop reliable, high data rate, and low complexity transmission systems. Therefore, future wireless communication systems are expected to provide those under all kind of channel environments, particularly with high mobility. We can realize broadband wireless systems will suffer detrimental effects of the frequency-selective fading, and many difficult engineering tasks remain to be resolved. Traditionally, getting more bandwidth is required for higher data rate transmission. However it is often impractical to increase bandwidth. Therefore, Orthogonal Frequency Division Multiplexing (OFDM) technique has received much attraction in wireless transmission applications for recent years due to the advantages to mitigate the detrimental effects of frequency-selective fading. From multiple input multiple output (MIMO) technology, we know that the rich-multipath wireless channels provide solutions to achieve spectral efficiency. In such cases, the channel between each transmit and receive antenna pair is considered flat and uncorrelated, thus Space Division Multiplexing (SDM) is a technique that can provide a significant improvement in data rate and bit error rate (BER) performance. When we employ multiple antennas at the receiver, these received data streams can be detected by SDM techniques such as Vertical–Bell Laboratories Layered Space-Time (V-BLAST) [2] [3] [8] [13]. These algorithms must require flat-fading channel information between each transmit and receive antenna pair. However, most practical channels are frequency-selective fading so that performances will be degraded. Therefore, we employ OFDM systems in which frequency-selective fading can be equivalently transformed into flat-fading in each subcarrier. In addition, it is effective when combined with SDM techniques. That is known that the SDM techniques have a performance gap for the optimal ML detectors. Hence, the goal of this research is to reduce this gap and provide new solutions to managing the inherent performance-complexity trade-off in MIMO and MIMO-OFDM detection.. 1.

(12) 1.2 Motivation In multiple input multiple output (MIMO) technology know that the rich-multipath wireless channels between each transmit and receive antenna pair is flat and uncorrelated, thus Space Division Multiplexing (SDM) is a technique that can provide a significant improvement in data rate and bit error rate (BER) performance. Due to the SDM techniques have a performance gap for the optimal ML detectors, therefore [13] provides a total solution for managing the inherent performance-complexity trade-off in MIMO detection. The work in [13] considered flat fading channels. However, practically the channels are more likely to be frequency-selective fading. Therefore, we consider using MIMO-OFDM to tackle the problem. We aim at providing a new technique combined SDM with OFDM so that SNR as well as data rates performances can be improved.. 1.3 Contribution In this thesis, we will combine SDM and OFDM technique that can improve SNR performances as well as data rates for the practical channels are frequency-selective fading. That is shown in the chapter 4. From that we understand the system architecture is robust in the frequency-selective fading channel.. 2.

(13) Chapter 2 MIMO Systems The material in this Chapter is largely taken from [1], [2], [3], [4], [5], [6], [7], [8], [9], [10], [11], [12], [13], and [17].. 2.1 Introduction to MIMO Systems In wireless communication demand high data rate and high link quality access, hence we employ the multiple-input-multiple-output (MIMO) systems architectures to obtain that. We can employ different space-time code in the MIMO systems architectures to obtain high data rate and high link quality access. The high spectral efficiency due to spatial multiplex (SM), which transmit multiple data streams simultaneously by multiple antennas, and the high link quality access due to space diversity, which transmit the same multiple data streams simultaneously by multiple antennas, both at the transmitter and receiver. MIMO systems provide the ability to turn multipath propagation, which is traditionally the impairment because it can causes signal fading in the wireless transmission, into a benefit but the channel state is not correlative. Since MIMO systems effectively take advantage of random fading and multipath delay spread, the signals transmitted from each transmit antenna appear highly uncorrelated at each receive antenna and the signals travel through different spatial channels. Then the receiver can exploit these different spatial channels and separate the signals transmitted from different antennas at the same frequency band simultaneously. MIMO is a promising technology that is suite for high-speed broadband wireless communications. Through space division multiplexing, MIMO technology can transmit multiple data streams in independent parallel spatial channels, thereby increasing total system transmission rate. Considering an arbitrary wireless communication system, a link is considered for that the transmitter is equipped with Nt transmit antennas and the receiver is equipped with Nr receive antennas. Such a setup is illustrated in Figure. 2.1. considered at some assumptions.. 3.

(14) Consider this system some important assumptions are made first:. 1. Channels are constant during the transmission of a packet. It means the communication is carried out in the some packets period that are shorter than the coherence time of the channels. The channel state is assumed that is time invariance. 2. Channels are memoryless. It means that an independent channel realization is drawn for each use of the channels. 3. The channel is flat fading. It means that constant fading over the bandwidth is desired in the case of narrowband transmissions. It also indicates that the channel gains can be described by complex numbers. 4. The received signal is corrupted by additive white Gaussian noise (AWGN). 5. At all time the receiver can perfectly know the channel matrix which is also known as the channel state information (CSI) and the CSI can be obtained by channel estimation based on the transmission of a training sequence.. With these assumptions, it is common to represent the input/output relations of a narrowband, single-user MIMO link by the complex baseband vector notation and transmit signal vector is transmitted at each instant time.. r = Ha + w. (2.1.1). where a = [a1," aNt ]T is the Nt×1 transmitted signal vector in \ Nt or ^ Nt whose entries. are chosen from some complex constellation A (e.g.16-QAM etc.), r ∈ ^ Nr is the received signal vector is the Nr×1 received vector, H = [h1," h Nt ] is ^ Nr × Nt the Rayleigh flat fading channel matrix whose ith column is hi , and where w = [ w1," wNr ]T is ^ Nr zero-mean complex Gaussian noise vector at some instant time. We assume that the columns of H are linearly independent (e.g Nr ≧ Nt). We assume that the noise components are independent and identically distributed (i.i.d.) complex Gaussian random variable with E[ww H ] = N 0I 4.

(15) that is additive white Gaussian noise (AWGN). We assume that the complex inputs are uncorrelated and chosen from the same unit-energy discrete alphabet, so that E[aa H ] = I . All the coefficients hij comprise the channel matrix H and represent the complex gain of the channel between the jth transmit antenna and the ith receive antenna. The channel matrix can be written as. ⎡ h1,1 ⎢h 2 ,1 H =⎢ ⎢ # ⎢ ⎣ h N r ,1. hi, j = α. i, j. h1,2 h 2 ,2 # hNr ,2. h1, N t ⎤ h 2 , N t ⎥⎥ # ⎥ ⎥ hNr , Nt ⎦. " " % ". + j β i, j = hi, j e. (2.1.2). φi, j. (2.1.3). Those coefficients {hij} describe the unknown channel properties of the medium that is usually Rayleigh distributed in a rich scattering environment without line-of-sight (LOS) path. If αij and βij are independent and Gaussian distributed random variables, then |hij| is a Rayleigh distributed random variable. Actually, those coefficients {hij} are likely to be subject to varying degrees of fading and change over time. Therefore, determination of the channel matrix is an important and necessary aspect of MIMO techniques. If all these coefficients are known, there will be sufficient information for the receiver to eliminate interference from other transmitters operating at the same frequency band. Although the introduced MIMO transmission requires flat-fading channels, and it is limited to applications with narrowband transmissions, in real broadband transmission systems, channel conditions are often frequency-selective fading. In wireless transmission, we demand a technique to alleviate the severe effect of frequency-selective fading. Therefore the OFDM technique is a good solution for this purpose in wireless transmission owing to its advantages.. 5.

(16) a1. r1. MOD. w1. DEMUX. MOD. r2. H. w2. a Nt. MOD. rNr. Detector. a2. wNr. Figure 2-1 Model of MIMO systems. 2.2 Maximum Likelihood (ML) Detection Methods First, we will employ the Maximum Likelihood (ML) Detection for the MIMO systems and it is given by. 2 aˆ ML = arg min r − Ha a∈ A. (2.2.1). Nt. From the transmitted vector symbols, A is the complex-valued modulating constellation and A Nt is the entire set of the possible transmitted vector symbols. We know that find the entire set of the possible transmitted vector symbols so that the complexity is huge due to Nt and A. We know that Nt is the transmit antennas and A is the complex-valued modulating constellation, so Nt and A is huge such that spend much complexity to find the solution from (2.2.1). From the optimal Maximum Likelihood (ML) Detection in the MIMO systems know the complexity increases when Nt and A increases, so find the suboptimal detection for the MIMO systems.. 6.

(17) 2.3 The Linear Detector Methods We could employ these linear detectors for the MIMO systems. The received signal vector r is multiplied with a filter matrix G and then followed by a parallel decision on all layers. Zero-forcing means that the mutual interference between the layers shall be perfectly suppressed. This is accomplished by the Moore-Penrose pseudo-inverse (denoted by (·)+ ) of the channel matrix. (2.3.1). G ZF = H + = (H H H ) −1 H H. where we assume that H has full column rank. The decision step consists of mapping each element of the filter output vector. aZF = G ZF r = a + (H H H ) −1 H H w. (2.3.2). into an element of the symbol alphabet by a minimum distance quantization. The estimation errors of the different layers correspond to the main diagonal elements of the error covariance matrix. 2 Φ ZF = E{( aZF − a)( aZF − a) H } = σ w ( H H H ) −1. (2.3.3). which equals the covariance matrix of the noise after the receive filter. It is obvious that small eigenvalues of HHH will lead to large errors due to noise amplification. This effect is especially observed in systems with the same number of transmit and receive antennas. We can use Linear MMSE detector to decrease the noise amplification. Minimizing the mean squared error (MSE) between the actually transmitted symbols and the output of a linear detector leads to the filter matrix. 7.

(18) 2 G MMSE = (H H H + σ w I Nt ) −1 H H. (2.3.4). The resulting filter output is given by. 2 aMMSE = G MMSE r = (H H H + σ w I Nt )−1 H H r. (2.3.5). and, after some manipulations, the error covariance matrix is found to be. 2 2 Φ MMSE = σ w (H H H + σ w I Nt )−1. (2.3.6). With the definition of a (Nt+Nr)×Nt extended channel matrix H and a (Nt+Nr)×1 extended receive vector r through ⎡ H ⎤ H=⎢ ⎥ and ⎢⎣σ w I Nt ⎥⎦. ⎡ r ⎤ r=⎢ ⎥ ⎣0 Nt ,1 ⎦. (2.3.7). We can write the output of the MMSE filter as. aMMSE = (H H H )−1 H H r = H + r. (2.3.8). Furthermore, the error covariance matrix becomes. (2.3.9). 2 Φ MMSE = σ w (H H H )−1. We compare that are the corresponding expression for zero-forcing that can find the only difference is that the channel matrix H has been replaced by H . We can use the QR 8.

(19) decomposition of the channel matrix for ZF or MMSE. For ZF, we can do the QR decomposition of the channel matrix H=QR that we can rewrite the a filter matrix as. G ZF = H + = R −1Q H. (2.3.10). 1 . fu n ctio n H = Q R 2 .R = 0 , Q = [ q 1 , q 2 , " , q N t ] = H 3 . fo r i = 1, ..., N t 4 .ri , i = | q i | 5 .q i = q i / ri , i 6 . fo r j = i + 1, ...., N t 7 .q j = q j − ri , j .q i 8 .en d 9 .en d Figure 2-2 QR decomposition algorithm. Table 2-1 Complexity of QR decomposition algorithm. 4.. No. Multiplication. Nr=4, Nt=4. Mult:2Nr. 8. 9.

(20) 7.. Mult:3Nr. 12. ZF. Mult:2*Nr+3*Nr*(Nt)2-3Nr*Nt. 152. Mult:3(Nt)3-3Nr(Nt)2-3(Nt)2 -3NrNt+2Nr+2Nt. 304. total complex MMSE total complex. For MMSE, we can do the QR decomposition of the extended channel matrix that we can write as. ⎡ H ⎤ ⎡ Q1 ⎤ ⎡ Q1R ⎤ H=⎢ ⎥ = QR = ⎢ ⎥ R = ⎢ ⎥ ⎣Q 2 ⎦ ⎣Q 2 R ⎦ ⎣⎢σ w I Nt ⎦⎥. (2.3.11). where the (Nt+Nr)×Nt matrix Q with orthonormal columns was partitioned into the Nr ×Nt matrix Q1 and the Nt ×Nt matrix Q2. From that equation we get the relation as. R −1 =. 1. σw. (2.3.12). Q2. Furthermore,. Q H H = Q1H H + σ w Q 2 H = R. (2.3.13). holds. The filtered receive vector becomes. a = Q H r = Q1H r = Ra − σ w R − H a + Q1H w. 10. (2.3.14).

(21) From the filtered receive vector we know that have the remaining interference that can not be removed in the detected procedure.. 2.4 BLAST Detection Methods For get high data rate and performance in the MIMO systems, therefore employ Vertical – Bell Laboratories Layered Space-Time (V-BLAST) Architecture to implement that.. a1 r1 Vector encoder. MOD. w1. a2 r2 w2. MOD. V-BLAST Signal processing. H. rNr wNr. MOD. RX data. TX data. a Nt. Figure 2-3 Block diagram of V-BLAST structure. Where the transmit antennas send a vector symbol of the size Nt over a rich-scattering wireless channel to the Nr receive antennas at each symbol time. At the transmitter, a single data stream is partitioned into Nt substreams, and each substream is encoded and sent through a different transmit antenna. During reception, each antenna receives signals transmitted from all the Nt transmit antennas. We are base on (V-BLAST) Architecture to find some detector. We use successive interference cancellation (SIC) technique or ordered SIC (OSIC) based on zero-forcing criterion (ZF V-BLAST) that require the decision-feedback equalization (DFE) and detect sequentially transmitted signals with the smallest estimation error. On zero-forcing criterion find the filter matrix GZF. For get the smallest estimation error, so find the largest signal-to-noise ratio (SNR) and reduce noise enhancement. Find the row g ZF of G ZF that has the minimum norm and multiply the received signal.. 11.

(22) aˆi = giZF r = giZF (Ha + w ) = ai + ηi. (2.4.1). where i is the order index a signal is detected. aˆi is quantized to get estimate of ai and regenerate an estimate of signal then the received signal subtract the regenerate an estimate of signal to remove the interference of this signal. Sequential do Nulling and canceling process until all signals are detected. That is shown. B e g in H 1 = H r1 = r fo r ( i = 1; i < = N t , i + + ) G iZ F. = (H i )+. k i = a rg j m in g iZ F. ( G iZ F ) j. = ( G iZ F ) k i. aˆ i = g iZ F r a k i = q u a n t i z e ( aˆ i ) ri + 1 = ri − a k i H k i H i + 1 = H ik i end Figure 2-4 ZF V-BLAST OSIC algorithm [2]. where giZF means the ki-th row of G iZF , H ki means the ki -th column of H , and H ik means the resulting matrix H after nulling the ki -th column of Hi . To find the i. ordering do the repeated computations of a channel matrix pseudoinverse and spend much complexity with O( Nt 4 ) , where Nt is the number of channel inputs. We find a low complexity algorithm to do the repeated computations of a channel matrix pseudoinverse and the ordering for the performance. We employ the decision-feedback (DF) detector that to do 12.

(23) nulling and canceling. We can know the risk of error propagation in the decision-feedback (DF) detector, so find out the best ordering to reduce the risk of error propagation. That is to find the max SNR at the first time which reduces the detection errors to do nulling and canceling. Find the low complexity algorithm or/and the best performance on the below when assume Nt =Nr =N. We will use the QR and the sorted QR decomposition in V-BLAST to reduce the complexity. Use the QR decomposition to decompose the H = QR that Q is the N×N unitary matrix and R is the N×N upper triangular matrix and we know the amplitudes of the entries of the matrix R are χ-distributed. We use the feedforward filter matrix QH for the received signal. That is shown..  r = Q H (Ha + w ) = Ra + w. ⎛ r1 ⎜ ⎜ r2 ⎜ # ⎜ ⎝ rN. ⎞ ⎛ r1,1 ⎟ ⎜ 0 ⎟=⎜ ⎟ ⎜ # ⎟ ⎜⎜ ⎠ ⎝ 0. r1,2 r2,2. " ". % ". % 0. (2.4.2). ⎞ ⎛ a1 ⎟⎜ ⎟ ⎜ a2 # ⎟⎜ # ⎟⎜ rN , N ⎟⎠ ⎝ a N r1, N r2, N. ⎞ ⎛ w 1 ⎟ ⎜  ⎟ + ⎜ w2 ⎟ ⎜ # ⎟ ⎜ ⎠ ⎝ w N. ⎞ ⎟ ⎟ ⎟ ⎟ ⎠.  = Q H w remain unchanged. Since Q is unitary, the statistical properties of the noise term w. First, we can use the last row to solve the last equation and that is shown.. rN = rN , N aN + w N. → get. rN −1 = rN −1, N −1aN −1 + rN −1, N aN + w N −1. → get. aˆ N aˆ N −1. # N. r1 = r1,1a1 + ∑ r1, j aˆ j + w N. → get. j =2. aˆ1. Form that we know the first time to solve the equation and it can affect the performance. If we can solve the equation at the first time is error then we can have much error at the second time. We call that is error propagation. So, we will use the sorted QR decomposition to choose which columns of H at the first time. That can get the optimum R to solve the equation. We 13.

(24) can use the complexity O( N 2 / 2) in the QR decomposition of permutations of H. We can use the sorted QR decomposition that use an extension of the modified Gram-Schmidt (MGS) algorithm by ordering the columns of H in each orthogonalisation step. That algorithm is shown.. 1.R = 0, Q = H , p = (1, ..., N ) 2. for i = 1, ..., N 3.k i = arg min | q j |2 j = i ,..., N. 4.exchange columns i and k i in R, Q , p 5.ri ,i =| q i | 6.q i = q i / ri , i 7. for j = i + 1, ...., N 8.q j = q j − ri , j .q i 9.end Figure 2-5 The Sorted-QR decomposition algorithm [6]. Table 2-2 Complexity of the Sorted-QR decomposition algorithm. No. Multiplication. Nr=Nt=N=4. 3.. Mult:2Nr*Nt. 32. 5.. Mult:2Nr. 8. 14.

(25) 8.. Mult:3Nr. 12. ZF. Mult:3.5*Nr*(Nt)2+0.5Nr*Nt. 232. Mult: 3.5*Nr*(Nt)2+3.5(Nt)3+0.5Nr*Nt+0.5(Nt)2. 464. total complex MMSE total complex. We find the permutation vector p that store the used reordering of H that minimises each rk ,k with k running from 1 to N.. We consequently compute the diagonal elements that are calculated from r1,1to rN,N and it would be optimal to maximise the rk ,k in every decoding step, that means from rN,N to r1,1 .That can reduce the risk of error propagation beacause we have the huge SNR gain in the Nth subchannel. We will know the performance is limited by the Nth subchannel. The performance of V-BLAST is limited by the worst subchannel, i.e., subchannel N. Basically this is due to the error propagation which is inherent in a DFE, and the distribution of the upper triangular matrix R. The amplitudes of the entries of R have x distribution with different degrees of freedom, and furthermore, rN,N has the least degree of freedom. Therefore, the Nth subchannel has the worst statistics, and it is crucial to improve its statistics in order to improve the overall performance of the V-BLAST. So we propose to combine ML decoding with the DFE procedure.. 2.4.1 Combine ML and DFE Scheme On the below when assume Nt =Nr =N. For the worst p subchannels, we perform ML decoding and then use a DFE for the remaining subchannels. In order to do this, we do not completely triangularize the channel matrix H. That is shown.. 15.

(26)   ⎛⎜ R Ha ⎞⎟ H=Q ⎝ 0 Hb ⎠. (2.4.1.1).  is an upper triangular matrix of size (N-p)×(N-p) and Hb is a square matrix of size p where R ×p. To get the above decomposition, we follow the usual Gram-Schmidt orthogonalization procedure for. ( h , h ," , h ) which yields 1. N−p. 2. (.  R  |h H= Q a N − p +1 , h N − p + 2 ," , h N. ). (2.4.1.2).  of size N×p such that where h j is the jth column of H. Now we find an arbitrary Q b. (.  HQ  = I and Q  HQ  = 0 .Thus Q  = Q  |Q  Q b b b a a b. ) form an orthonormal basis. Then choose Ha. and Hb such that. ( Q Q ) ⎛⎜ H a. b. Ha ⎞ ⎟ = ( h N − p +1 , h N − p + 2 ," , h N ) ⎝ b⎠. (2.4.1.3).  is independent of ( h Since Q N − p +1 , h N − p + 2 ," , h N ) , the elements of Hb are i.i.d. complex b Gaussian with zero mean and unit variance. Using this decomposition, we first detect. (a. , aN − p + 2 ," , aN ) jointly by ML decoding of size p, cancel the interferences caused by T. N − p +1. these symbols, and then detect. ( a , a ," , a ). T. 1. 2. N−p. by the usual DFE procedure. For the. decomposition of H we use that for the received signal and show that..  Hr r = Q. (2.4.1.4).  H ⎞ ⎛ aa ⎞ ⎛ w a ⎞ ⎛ ra ⎞ ⎛ R a ⎟⎜ ⎟ + ⎜ ⎟ ⎜ ⎟=⎜ ⎝ rb ⎠ ⎝ 0 H b ⎠ ⎝ ab ⎠ ⎝ w b ⎠. 16.

(27) We. perform. ML. decoding. ab = ( aN − p +1 , aN − p + 2 ," , aN ). T. and. rb = H bab + w b. with. employ. the. DFE. procedure. to. jointly. using.  to R. decode decode. aa = ( a1 , a2 ," , aN − p ) . T. 2.4.2 Parallel Detection (PD) Scheme We can propose a new parallel detection (PD) frame work which is a compromise between the low complexity schemes and the maximum likelihood estimation (MLE). The parallel detection (PD) frame empoly the optimally ordered decision feedback equalizer (OO-DFE) act as the subdetector. We will describe the optimally OO-DFE. The received signal in complex baseband representation can be then written as.   +w r = HP −1Pa + w = Ha. (2.4.2.1).  = HP -1 , a = Pa where P is a permutated matrix representing the detection order and H represent the permutated channel matrix and the substream vector respectively. Substreams are detected recursively in the order from a1 to a Nt . The i-th detection on substream symbol. ai is explained in the following three steps: cancelling, nulling and ordering.For the cancelling considered : all the proceeding detected substream symbols aˆ1 ," aˆi −1 are cancelled out from the received signal, r′ = r - h 1a 1 " h i −1a i −1 where h i i represents the i-th column of the.  = [h ," , h ] .For the nulling considered: a nulling vector g H based on channel matrix H 1 Nt i zero-forcing criteria, i.e. i′ = i ⎧1 g iH h i′ = ⎨ ⎩0 i′ = i + 1," , Nt. is calculated. As a result, g iH is the first row of F + = (F H F)−1 F H where F = [h i ," , h Nt ] .  Then a hard decision on g iH r′ is made to obtain ai .For the ordering considered: we can choose the optimally ordered row from F + as the nulling vector and make a hard decision. If 17.

(28) the row with smallest norm provides the largest signal-to-noise power ratio (SNR), then it can make the most reliable hard decision. We discuss the block error rate (BLER) for OO-DFE , MLE, and zero-forcing equalizer at a given channel H .Firstly, we discuss the block error rate (BLER) for OO-DFE. Denote the BLER of OO-DFE algorithm by POO. − d oo2 poo ≈ C exp 4σ w2. where d oo2 = min i. (2.4.2.2). +2 . g iH g i. For a given H, d oo2 is different if the different ordered P is used. The optimal order gives the largest d oo2 . The free distance for a maximum likelihood estimation (MLE) detector where its BLER is. pMLE ≈ C exp. − d 2free. (2.4.2.3). 4σ w2. and d 2free = min(a - a ′) H H H H (a - a ′) . Similarly, we can define for a zero-forcing equalizer, a ≠ a ′. 2 d ZF = min i. Δ2 where subscript (i,i) represents the diagonal element in the i-th row and [H H H ](−i1,i ). the i-th column. Intuitively, the relationship between performances of MLE, OO-DFE and 2 . We will use the zero-forcing is PMLE ≦ Poo ≦ PZF, which suggests d 2free ≥ d oo2 ≥ d ZF. OO-DFE act as subdetector in parallel detector and show that.. 18.

(29) − h 1 x1. r. subdetector. { x1 , b1}.  r - Ha 1. 2. { x2 , b 2 }.  r - Ha 2. 2. − h 1 x 2. subdetector. Compare and seledct. − h 1 x M. c. subdetector. {x. Mc. , bMc. }.  r - Ha Mc. 2. Figure 2-6 Parallel detection. We can understand when the receiver antennas Nr > the transmiter antennas Nt, OO-DFE can perform quite well. However, in the case Nr =Nt, its performance is quite far from that of the MLE. An explanation is given in this section. The nulling vectors. {g1," , g Nt }. defined in the zero-forcing based OO-DFE algorithm. are orthogonal to each other. This can be shown easily in the following. Since the nulling vector g1H is the first row of the + pseudo-inverse matrix ⎡⎣h 1," , h Nt ⎤⎦ , thus g1 must be orthogonal to h 2 ," , h Nt .Again + since giH is the first row of ⎡⎣h i ," , h Nt ⎤⎦ , gi must be a linear combination of vectors. h i ," , h Nt . Therefore, g1 must be orthogonal to g 2 ," , g Nt . Similarly, g2 is orthogonal to g3 ," , g Nt as well as g1, etc. Therefore we can conclude that the nulling vectors gi are 19. aˆ.

(30) orthogonal to each other. The algorithm of OO-DFE is actually a process of the constructing an orthogonal set. {g1," , g Nt }. with Nt basis vectors in an Nr-dimensional space for the.  . these vectors h , ( i = 1," , Nt ) are then projected onto gi. It is not difficult given channel H i  is a poor to see that doo is only the shortest projection timed by Δ.Therefore, a channel H channel for OO-DFE algorithm if there exits a column whose projection is small. We show an  with three columns, where example of H. ⎛ 2 1 0⎞  = ⎜ 2 0 1⎟ H ⎜ ⎟ ⎜ 0.1 0 0 ⎟ ⎝ ⎠. Since the three h i vectors are almost co-planar, the shortest projection is also small. In other words, since g1H is a row of matrix. (FH F). −1. F H , its norm certainly becomes large when. matrix F is near singular. We propose a new algorithm which makes the square channel matrix into a tall matrix by making hypotheses on a substream and apply the low complexity detectors on the tall channel matrix to improve the overall performance. We make hypotheses on a1 and assume it is correctly subtracted from the received signal. The remaining. (. ). (. ). 2  2 2     submatrix H (2:3) = ⎡⎣h1 h2 ⎤⎦ becomes a better channel where doo H ( 2;3) = d free H ( 2;3) = Δ .. We make all Mc hypotheses on the first substream a1 and leave the remaining Nt-1 substreams to be detected by using Mc subdetectors. Therefore, the PD algorithm consists of Mc branches each with a subdetector. In the qth branch, hypothesis a1 = xq is made where xq represents the q-th point in the signal constellation. After subtracting h 1 xq from the received signal, the q-th subdetector makes a hard decision bq on a (2:Nt ) . For these Mc branches in the PD algorithm, each branch outputs a different hard-decision {xq , b q } on a . Finally, a final   decision aˆ is made by selecting the branch with the smallest error r - H (2:Nt ) b q − h1 xq . Since. the subdetectors are now functioning on a Nr-by-(Nt-1) matrix, the diversity is higher and they are expected to perform better. Additionally, we can further improve the performance by properly selecting the substream a1 on which hypotheses are made. We analyze the BLER performance of the PD algorithm that employ OO-DFE as its subdetectors and illustrate the 20.

(31) method to select the optimal a1 . The BLER of the PD algorithm can be written as. pPD. 2 − d PD ≈ C exp 4σ w2. (2.4.2.4). 2  where d PD = min(d 2free , d oo2 (H (2:Nt ) )) .So, we find a method to choose the optimal substream on.  which the PD algorithm makes hypotheses. We chose a1 which gives the largest d oo2 (H (2:Nt ) ). that select the best submatrix of the channel to be detected by the subdetectors.. 2.5 Chase Detector We already know the large gap in both performance and complexity between the maximum-likelihood (ML) and the other existed detectors, which are linear detectors or BLAST-ordered decision-feedback (BODF) [15] detectors, hence we have the motivated search for find out a favorable performance-complexity trade-off and a unified framework which is the chase family of detection. In the chase family of detection, there is an important class of reduced-complexity detectors called list-based detectors that adopt a two-step approach of first creating a list of candidate decision vectors, and second choosing the best candidate as its final decision. For the example, the parallel detector [8] generates its list by implementing a separate low-complexity detector for each possible value of the first symbol. Numerical results suggest that if the first symbol detected is chosen so as to approximately minimize the probability of error for the remaining symbols, then the parallel detector achieves full receive diversity. This section proposes a family of Chase detectors, which includes as special cases the BODF [15], ML [5], parallel [8], PDF [16], B-CHASE [13]. Thus, the Chase family provides a unified framework for comparing a variety of existing detectors. Furthermore, we propose the B-Chase detector as a new special case that performs well on fading channels. We will demonstrate that the B-Chase detector can approach ML performance with less complexity than previously reported detectors. The B-Chase detector 21.

(32) distinguishes itself from previous list-based detectors in the unique way it builds its list. We will see that the B-Chase detector achieves better performance with significantly smaller candidate lists, leading to a favorable performance-complexity trade-off. We introduce the Chase detector, a general detection strategy for MIMO channels that reduces to a variety of previously reported detectors as special cases. The Chase detector defines a simple framework for not only comparing existing MIMO detection algorithms but also proposing new ones. The Chase detector is described use five steps and that is shown.. Figure 2-7 Block diagram of the Chase detector [13]. Step 1) Selecting i ∈ {1," Nt} that the index of the first symbol to be detected. Step 2) Generate a sorted list L of candidate values for the ith symbol, defined as the l elements of the alphabet nearest to yi ,. y = (H H H + α 2I )−1 H H r = Fr. (2.5.1). where y is the output of either the zero-forcing (ZF) (α = 0) or MMSE (α 2 = N 0 ) linear filter. Step 3) Generate a set of l residual vectors {r1,…rl }by cancelling the contribution to r from the ith symbol, assuming each candidate from the list is, in turn, correct: 22.

(33) r j = r − hi s j. Step 4) Apply each of {r1,…rl } to its own independent subdetector, which makes decisions about the remaining Nt-1symbols (all but the ith symbol). Together with sj, the jth subdetector defines a candidate hard decision aˆ j regarding the input a. Step 5) Choose as the final hard decision aˆ the candidate hard decision {aˆ1," aˆ l } that best represents the observation r in a minimum mean-squared-error sense:. aˆ =. arg a∈{ aˆ 1 ," aˆ l }. min r − Ha. 2. (2.5.2). From these steps know that have four parameters be specified:. Parameter 1:select i algorithm that affact the system performance and complexity. Parameter 2:set the list length l that affact the system performance and complexity. Parameter 3:find the weighted filter ZF or MMSE. Parameter 4:employ the subdetector algorithm to detect the received signal.. Table 2-3 Special cases of the Chase detector [13]. Detector. First-Symbol. List Length l. Filter type,α. Subdetector. index i ML[14]. any. |A|. ZF. ML. BODF[15]. ♦BLAST1. 1. ZF or MMSE. BODF. PDF[16]. ♦BLAST1. 1. ZF or MMSE. Linear. Parallel[8]. using Selection. |A|. ZF. any. 1 ≤ l ≤ |A|. ZF or MMSE. BODF. algorithm 1 B-Chase[13]. using Selection. 23.

(34) algorithm 1 or Selection algorithm 2 ♦The index BLAST1 signifies the first index of the BLAST ordering [15]. Above that, the list length is maximal such that subdetector is likely ML detectors and the choice of which symbol to detect first is not critical to performance. The list length is one such that subdetector is likely BLAST-ordered decision-feedback (BODF) detectors and the choice of which symbol to detect first is critical to performance. The parallel detector is another Chase detector whose performance is highly sensitive to the choice of which symbol to detect first.. 24.

(35) Chapter 3 B-Chase Detector 3.1 Introduce B-Chase Detector We introduce the example for the B-Chase detector which is defined as a Chase detector that uses BODF as a subdetector and an SNR gain of a list detector that demonstrate the probability of error. We will see that the B-Chase detector achieves better performance with significantly smaller candidate lists, leading to a favorable performance-complexity trade-off. We can demonstrate that the B-Chase detector can approach ML performance with less complexity than previously reported detectors. We show block diagram of the B-Chase detector.. r. F. y. i. yi LIST. s1. bˆ 1 DF. SELECT i. DETECTOR FOR SYMBOL i. s2. CHOOSE BEST. c1 bˆ. CANDIDATE 2 VECTOR. Π(i). DF. c2 bˆ. sl. l. DF. cl. STEP1. STEP2. STEP3 & 4. STEP5. Figure 3-1 Overall block diagram for the B-Chase detector 25. aˆ.

(36) 3.1.1 The SNR Gain of a List Detector for the B-Chase Detector We say that a list detector makes an error when the actual transmitted symbol does not appear somewhere on the list. With this definition, when we increase the length of the list that leads to a decrease in the probability of error. Therefore, we can employ the 4-QAM alphabet to describe the list detector. For the 4-QAM alphabet {e j. ±j. π 4 ,e. ±j. 3π 4 }. have a ZF front end and. π. the transmitted symbol is a = e 4 . For the ith symbol yi = a + n consider it as the input of the list detector and SNRi =. 1 2. E[ n ]. . Show the correct decision regions for lists lengths l ∈ {1, 2,3}. in the fig.3-2. Define the Pl as the list-error probability and the list length is l. Find that. SNRi SNRi − SNR − i P1 = 2Q( SNRi ) − Q ( SNRi ) ≈ 2e 2 − e ≈e 2. (3.1.1.1). P2 = Q( 2 SNRi ) ≈ e − SNRi. (3.1.1.2). P3 = Q 2 ( SNRi ) ≈ e− SNRi. (3.1.1.3). 2. −. 26.

(37) Figure 3-2 Decision regions for a = e. jπ. 4 and different list lengths: (a) l = 1; (b) l = 2; and (c) l = 3. The. decision list contains a whenever the input to the list detector falls within the shaded region. Also indicated is the minimum distance d l to the boundary [13]. In the high SNR case, we can approximate the list detector SNR gain and define the d l ( A ) as the minimum distance from any element in A to the corresponding decision region boundary of the list detector with list length l, so define the SNR gain γ l2 with a list length l in that 2. d ( A) γ l2 = l2. (3.1.1.4). d1 ( A). Show the extreme case that is the maximal list length l = A and that have an infinite SNR gain γ 2A = ∞ because the actual transmitted symbol is on the list with d l ( A ) = ∞ .. 27.

(38) 3.1.2 The SNR of the B-Chase Detector We will define the SNR for each symbol of the B-Chase detector and employ that to select which symbol is detected first .For describe that by doing the QR decomposition. Do the QR decomposition of the extended channel matrix and show that. ⎡ H ⎤  H=⎢ ⎥ = QL ⎣α I Nt ⎦. (3.1.2.1). 1 . L = 0 , Q = H 2 . fo r i = N t , ...,1 3 .l i , i = | q i | 4 .q i = q i / l i , i 5 . f o r j = i − 1, . . . . , 1 6 .q j = q j − l i , j .q i 7 .e n d 8 .e n d Figure 3-3 QR decomposition algorithm. Total. complex. of. the. QR. decomposition. algorithm. is. 3(Nt)3-3Nr(Nt)2-3(Nt)2. -3NrNt+2Nr+2Nt in the MMSE case. Where the matrix H are ( Nr + Nt ) × Nt , and where  are orthonormal, and where L is a lower triangular Nt × Nt the columns of the matrix Q  are the matrix with positive and real diagonal elements. Define the bottom rows of Q 28.

(39) matrix α L−1 such that α L−1L = α I .Due to (3.1.2.1) write (2.5.1) as. y = UH QH r. where the matrix. (3.1.2.2).  ,and where U H = L−1 . Use Q is defined as the top Nr rows of Q. r = Ha + w to reduce that. y = a − α 2 U H Ua + UQ H w = a + n. (3.1.2.3). where use Q H H = L - α 2 U and define n = U H Q H w − α 2 U H Ua .Due to (3.1.2.3) that we  HQ  = Q H Q + α 2 UU H = I and α 2 ∈ {0, N } , therefore we can define the SNR and know Q 0 2 2 can know the noise variance of the ith output of the forward filter is E ⎡ ni ⎤ = N 0 ui , ⎢⎣ ⎥⎦. where ui is the ith column of U.. Define the SNR for the first symbol detected. SNR1(i ) =. γ l2 N 0 ui. (3.1.2.4). 2. and then define the next symbol detected. That is defined by the QR decomposition of the extended channel matrix H whose columns are permuted, when employ the Π (i ) in the H , according to the detection order. Find the ordering and that shown..  (i )L(i ) HΠ (i ) = Q. (3.1.2.5).  (i ) are orthonormal, and where L(i ) is a Where the columns of the ( Nr + Nt ) × Nt matrix Q. lower triangular Nt × Nt matrix with positive and real diagonal elements. For the case  (i ) = Q  and L(i ) = L when Π (i ) = I .We can know that the Π (i ) is an Nt × Nt permutation Q 29.

(40) matrix that arranges the columns of H such that the ith column comes first, and the remaining columns are arranged according to the BLAST ordering. Use the QR decomposition ideal to construct SNR for B-Chase detector. First, show the SNR for the first symbol detected is. SNR1(i ). =. (i ) 2 γ l2 *(l1,1 ). (3.1.2.6). N0. For the first symbol detected can provide list-detection gain in the B-Chase detector. Where lk(i,)k is the kth diagonal of L(i ) and the SNR of the final symbols can be shown.. SNRk(i ). =. (lk(i,)k )2 N0. , k = 2," , Nt.. (3.1.2.7). That SNRk(i ) , k = 2," , Nt do not provide any list-detection gain in the B-Chase detector.. 3.1.3 The B-Chase Selection In the B-Chase detector provide the selection algorithm that get two opposing goals. Now we argue that the choice of i must balance two opposing goals: (1) the SNR of the first symbol SNR1(i ) is high that the list detector is likely to be correct, the actual transmitted symbol be on. the list, that reduce the risk of error propagation, and (2) that the subsequent subdetectors can perform well. If our only concern is to ensure that the actual transmitted symbol can be on the list, we will choose i such that the SNR of the first symbol SNR1(i ) is high. For that choose i so that hi is the column of H that is most orthogonal to the remaining columns which do not include hi in the remaining columns of H . On the other hand, if our only concern is to ensure that the subdetectors perform well when we make decisions about the remaining Nt–1 symbols, we will choose i so that the effective MIMO channel, we remove the hi in the column of H , seen by the subdetectors is as orthogonal as possible that we will get the 30.

(41) distance is likely the dfree [8]. So, we will choose i so that hi is the column of H that is least orthogonal to the remaining columns in the submatrix channel, that reduce the most co-planar vectors in the submatrix channel, which is precisely the i that corresponds to the SNR of the first symbol SNR1(i ) is low. Therefore, to balance the two opposing goals, we should choose i so that the SNR of the first symbol SNR1(i ) is small, but not so small that the list does not contain the actual transmitted symbol. In other words, we should choose i so that the effective SNR of the list detector is neither too small nor too large.. That selection algorithm are shown. Selection Algorithm 1:. (k ) (k ) (k ) i = arg max min {γ l * l1,1 , l2,2 ," , l Nt , Nt }. (3.1.3.1). k∈{1,2," Nt}. That maximizes the minimum SNR of the symbols. To implement the selection algorithm 1 can spend the complexity is O( Nt 4 ) computations when l >1. From the QR decomposition their complexity is O( Nt 3 ) computations, therefore the selection algorithm 1 implement Nt times. Due to the selection algorithm 1 complexity is high, so find the low-complexity to implement the selection algorithm. That will be shown the selection algorithm 2 which can reduce the complexity but can has the bad performance. Since the smallest SNR inside the subdetector is SNR2(i ) when 1 < l < A , select the symbol which maximizes the minimum of SNR1(i ) and SNR2(i ) . SNR2(i ) is shown.. 31.

(42) SNR2(i ) =. where g j ,i =. 1 N 0 min j ≠ i { u j. 2. (3.1.3.2). 2. − g j ,i }. u Hj ui ui. Selection algorithm 2 is shown:. 2 ⎧ arg max uk l = A ⎪k∈{1,2,", Nt} ⎪ ⎪ ⎪ i=⎨ ⎧ 2 ⎫ 1 ⎪ γl ⎪ ⎪ arg max min ⎨ , ⎬ , else. 2 2 2 ⎪k∈{1,2,", Nt} uk ⎪ min j ≠ i { u j − g j ,i } ⎪ ⎪ ⎩ ⎭ ⎪ ⎩. The Nt(Nt-1) squared-magnitudes. {. (3.1.3.3). }. 2. g j ,i |1 < j < Nt ,1 < i < Nt , j ≠ i. are computed in. selection algorithm 2. The each squared-magnitude is need to compute the complexity is 5Nt.. 32.

(43) Table 3-1 Complexity of the selection algorithm 1 and the selection algorithm 2. The selection algorithm 1. total complex. Nr=Nt=N=4. 3.5*Nr*(Nt)3+3.5(Nt)4+0.5Nr*(Nt)2+. 1856. 0.5(Nt)3. The selection algorithm 2. 3.5*Nr*(Nt)2+3.5(Nt)3+0.5Nr*Nt+0.5(Nt)2. 704. +5(Nt)3-5(Nt)2. 3.1.4 Implementing the B-Chase Detector We will implement the B-Chase detector and show the block diagram in the fig.3-1, and the pseudocode in the fig.3-4, and fig.3-5. For the B-Chase detector use the selection algorithm 1 or the selection algorithm 2. Now it use the selection algorithm 1 to implement in the B-Chase detector. For the selection algorithm 1 we must compute the QR decomposition to get L(i ) such that use the selection algorithm 1 to decide which symbol to detect but we do not compute directly that. We use another method to compute the QR decomposition to get L(i ) . From the Π (i ) definition we know permute the columns of H by Π (i ) that is similar to  H by Π (i ) H . So we define the sorted-QR decomposition of permute the the rows of C = U H Q C H and that is shown..  (i ) U ( i ) C H Π (i ) = Q. (3.1.4.1). 33.

(44) We can use the relation U (i ) = (L(i ) H )−1 to get L(i ) .From the Π (i ) definition is the ith column of C H comes first, so modify the sorted-QR decomposition. We can use the algorithm of the sorted-QR decomposition to compute the sorted-QR decomposition after modify this such that the ith column of C H firstly comes. Form the (3.1.4.1) equation we can modify that. (i )   (i )Θ (i ) H UΠ (i ) C H Π (i ) = QUΠ = QΘ. (3.1.4.2). where Θ(i ) is a unitary matrix such that the U (i ) = Θ(i ) H UΠ (i ) is an upper triangular matrix with real and positive diagonals and form (3.1.4.2) and (3.1.4.1) equations we can define the  (i ) = QΘ  (i ) .We can define the U sorted-QR decomposition and show relation Q. UΠ (i ) = Θ(i ) U (i ). (3.1.4.3). Form the y = (H H H + α 2I )−1 H H r = Fr equation we can define the front-end filter F as that. F = D−1Q(i ) H = D−1Θ(i ) H Q H. (3.1.4.4). where D is a diagonal matrix with d j , j =l (ji,)j . Form the y = Fr and r = Ha + w equations we can reduce that as. y = Mb + n. (3.1.4.5). where M = D−1L(i ) is an Nt × Nt lower-triangular matrix with ones along the diagonal, where b = Π (i ) H a is a permuted version of the channel input, and the effective noise is n = Fw - α 2 D−1U (i )b . From the B-Chase preprocessing function we can get some parameters 2 2 F, M, Π (i ) , and {d1,1 ," d Nt , Nt } . Use these parameters in the B-Chase detector to implement. that. We employ the list detector to generate an ordered list [ s1," sl ] of the l elements of A 34.

(45) that are nearest to y1 which is 1th element of y. For the ordered list [ s1," sl ] , si is in the ordered list and it is the ith closest element of A that is nearest to y1 . From the list detector generate an l elements ordered list and then use y and the ordered list as inputs of the l DF detectors whose first symbol decisions are hard-wired to decide first outputs of DF detectors and then compute the first cost .The next steps use a decision-feedback process to decide other symbols and update the cost. For show that the lth subdetector cancels the intersymbol interference from the kth element of as follows: k −1. xk ,l = yk − ∑ mk , j bˆ j ,l. (3.1.4.6). j =1.  Where b j ,l = dec{x j ,l } is the decision that regard that as the jth element of bˆ l which is the. decision vector of the l th subdetector, and where dec{x} quantizes x to the nearest element of A. From the outputs of subdetectors, B-Chase detector choose the minimum cost of the outputs of subdetectors as the decision vector. To express the cost of the l th decision vector as cl = r - HΠ (i )bˆ l. 2. , which reduces to. 2 cl = D(y - Mbˆ l ). (3.1.4.7). 35.

(46) F U N C T IO N B C H A SE D E T E C T O R IN P U T S : H , l , A O U T P U T : aˆ ================== ===============. {. }. 1. F , M , Π ( i ) ,{ d 2j , j } = B C hase P r eproces sin g ( H , l ) 2.y = F r 3. [ s1 , " , s l. ] = L istD etect ( y1 | A , l ),. so that si is the i − th closest elem ent of A to y1 4.τ = ∞ 5. f or l = 1 to l , 6. bˆ = s l. 7. 8.. l. 2 c l = d 1,1 y1 − s l for k = 2 to N t ,. 2. if c l < τ ,. 9.. x = yk −. 10.. k −1. ∑. j =1. m k , j bˆ j , l. 11.. bˆk , l = dec{ x }. 12.. 2 cl = c l + d k2, k x − bˆk , l. 13. 14.. end. 15.. if c l < τ ,. end. 16.. τ = cl. 17.. f =l. 18.. end. 19.end 20.aˆ = Π ( i ) b f Figure 3-4 Computationally efficient implementation of the B-Chase detector [13]. 36.

(47) FUNCTION BCHASEP REPROCESSING INPUTS : H, l 2 2 ,", d Nt OUTPUTS : F,M, Π(i) ,{d1,1 , Nt }. ====================================  ] = QRdecomposition(H) 1.[Q,L 2.U = (LH )−1 2. 3. for j = 1 to Nt, e j = ∑k∈{1,", j} uk , j , end 4. for k = 1 to Nt, (k ) 2 (k ) 2 ⎤ 5. ⎡Θ(k ) , U(k ) , Π(i) ,{(l1,1 ) ,",(lNt , Nt ) }⎦ = sortedQR(U,e, k ) ⎣. {. ( k ) 2 (k ) 2 (k ) 2 6.S (k ) = min (ϒl * l1,1 ) ,(l2,2 ) ,",(lNt , Nt ). }. 7.end 8.i = arg max S (k ) k∈{1,", Nt}. 9.D−1 = diag (U(i) )  10.Q = first Nr rows of Q 11.F = D−1Θ(i) H QH 12.M = D−1Θ(i) H LΠ(i) 13. for j = 1 to Nt, d 2j, j = (l (jk, j) )2. end. Figure 3-5 Preprocessing pseudocode for the proposed implementation of the B-Chase detector that uses selection algorithm 1 [13]. 37.

(48) We can have two crucial thing that reduce the complexity. z. From compute the sorted-QR decomposition algorithm of U and the QR decomposition algorithm of H that we know the mk , k = 1 element of the M matrix. And then we can combine the equation (3.1.4.6) and the equation (3.1.4.7) that let we can rewrite the cost expression as. cl =. Nt. ∑ dk2,k. k =1. 2 xk ,l − bˆk ,l. (3.1.4.8). From that we reduce computations in the cost equation (3.1.4.8) in the subdetector. We can use the O( Nt ) computations. z. We can use a pruning and threshold-tightening strategy that can reduce the computations. A cost threshold can be established with the cost c1 of the first subdetector’s decision. In subsequent subdetectors, we can abort both the cost calculation (3.1.4.8) as well as the decision feedback process (3.1.4.7) whenever this threshold is exceeded the cost threshold. Furthermore, the threshold can be reduced each time a lower cost is found.. We will get the performance and complexity well .From the B-Chase detector know the channel parameters that Rayleigh-fading gain, and know N 0 . We can use B-Chase*(l) to denote the B-Chase detector with list length l , α 2 = N 0 , and use selection algorithm (3.1.3.1). We can use B-Chase(l ) to denote the B-Chase detector with list length l , α 2 = N 0 ,and use selection algorithm (3.1.3.3).We use input is 4 with 16-QAM and output is 4. And show figure the performance versus the number of antennas, where the SNR per bit is 38.

(49) 2. E[ Ha ] 2. ( E[ w ]*log 2 A ). =. E[a H H H Ha] 2. ( E[ w ]*log 2 A ). .. Where E[H H H] = NrI Nt , E[w H w ] = NrN 0 , and E[a H a] = NtE[a H a] . We can reduce that as. NtE[a H a] SNR = N 0 log 2 A. For define the unit that is real multiplies (RMs) per bit to describe the complexity. We define the squared absolute value of a complex number is counted as two RM, and the complex multiplications are counted as three RMs. Now we define the preprocessing complexity that need to compute the computations that are required only once per channel estimation. And define the core-processing complexity need to compute the computations that must be implemented during every symbol period. In the B-Chase detector show the core-processing complexity when l =1 show their core-processing complexity is 3NrNt RM and when l ≠ 1 show their core-processing complexity is 3(Nr+l)Nt RM. The overall complexity includes both core-processing complexity and preprocessing complexity. We assume that the channel estimate is updated in T symbol periods. That unit is real multiples per bit. We can show that as:. complexity =. Ccore + C pre / T Nt log 2 A. (3.1.4.9). From preprocessing complexity we can know the state of the channel to compute complexity in the B-Chase detector. If the state of the channel changes quickly, then we can estimate the state of the channel is quick in the small symbol periods. That can affect the preprocessing complexity. If we have the small preprocessing complexity, then that reduce the complexity in the state of the channel changes quickly.. 39.

(50) Table 3-2 System parameters. Transmit antenna. 4. Receive antenna. 4. Channel is updated in T symbol periods. 8. Rayleigh-fading. Mean=0,Varance=1. Channel order. 0. Selection algorithm. 1. List length l. 1 ,2 ,and 16. 0. 10. B-CHASE*(1) B-CHASE*(2) B-CHASE*(16). -1. 10. -2. BER. 10. -3. 10. -4. 10. -5. 10. 5. 10. 15 SNR dB. 20. 25. Figure 3-6 The bit error rate versus SNR for the B-Chase detector* ( l ) with l =1, 2, 16 , T=8,and 16 QAM. 40.

(51) From figure we can know when increase the length of the list that leads to a decrease in the probability of error. In other word shrink this gap and provide new solutions for managing the inherent performance-complexity trade-off in MIMO detection. We can find that shrink this gap quickly in the low the length of the list.. Table 3-3 System parameters. Transmit antenna. 4. Receive antenna. 4. Channel is updated in T symbol periods. 8. Rayleigh-fading. Mean=0,Varance=1. Channel order. 0. Selection algorithm. 1 and 2. List length l. 1 ,and 2. 41.

(52) 0. 10. B-CHASE*(1) B-CHASE*(2) B-CHASE(1) B-CHASE(2) -1. BER. 10. -2. 10. -3. 10. 5. 10. 15 SNR dB. 20. 25. Figure 3-7 Bit error rate versus SNR for the B-Chase detector* ( l ) and the B-Chase detector ( l ) with l =1,2 , T=8,and 16 QAM. From figure we can know selection algorithm 1 and selection algorithm 2 that have almost the same performance.. 42.

(53) Table 3-4 System parameters. Transmit antenna. 4. Receive antenna. 4. Channel is updated in T symbol periods. 8. Rayleigh-fading. Mean=0,Varance=1. Channel order. 0. Selection algorithm. 1. List length l. 1 ,and 2. 0. 10. B-CHASE*(1) B-CHASE*(2) ML -1. BER. 10. -2. 10. -3. 10. -4. 10. 0. 2. 4. 6 SNR dB. 8. 10. 12. Figure 3-8 Bit error rate versus SNR for the B-Chase detector* ( l ) with l =1,2 ,and the ML detector T=8,and BPSK. 43.

(54) From figure we can know the B-Chase detector is nearly ML detector.. Table 3-5 Complexity for B-Chase Detector and ML Detector. Function B-Chase. Function. Channel is Total. Nr=Nt=4. Preprocessing. B-Chase. updated in. ,. complexity. detector. T symbol. QPSK(A. complexity. periods. =4). complexity. ,T=8 , l =4. B-Chase. 3.5(Nt)4+. 3NtNr+3Nt+2. [3.5(Nt)4+. *(l). 3.5Nr(Nt)3+6.5(Nt). l+2.5l. 3.5Nr(Nt)3. detector. 3-2.5Nr(Nt)2+0.5(N. (Nt)2-0.5 l Nt. +6.5(Nt)3-. t)2+2Nr+11Nt. 3868. 2.5Nr(Nt)2 +0.5(Nt)2+ 2Nr+11Nt] +T [3NtNr+3 Nt+2l+2.5l (Nt)2-0.5 l Nt]. ML. [3NrNt+2. detector. Nr] ANt. 44. 114688.

(55) 3.1.5 The B-Chase Detector for Channel Estimation Errors In previous sections, we always assumed that we have perfect the channel state information (CSI) at the receiver, which allows us to compare the performance. However, the channel information is typically not perfect. A channel estimator extracts from the received signal approximate channel coefficients during the transmission symbol. One method to accomplish this is to transmit the training signal prior to the transmission symbol. That are used as preamble at the start of each frame. Another way to estimate the channel fading coefficients is to embed the pilot bits, that is called pilot signal, inside the signal.. The impact from the channel estimation errors will degrade the performance of the system. To study the impact of the channel estimation errors on the B-CHASE detector algorithm, we introduce the error model at the receiver.. H′ = H + ΔH. (3.1.5.1). where H represent the true channel matrix and ΔH denotes the channel estimation error. The elements ofΔH are assumed to be zero mean, variance is 0.01 and complex Gaussian. The B-CHASE*(16) is a measurement based on that we can accurately obtain the channel estimation. The B-CHASEer*(16) is a measurement based on that we can not accurately obtain the channel estimation. As shown in Figure, the channel estimation errors with The B-CHASEer*(16) given the B-CHASE decoding algorithm. It is clear from the figure, the B-CHASEer*(16) decoding algorithm starts to perform poorly. This poor performance is caused by inter-symbol interference (ISI).When we obtain the error channel matrix, find out the error outputs, F′ M′ etc., in the B-Chase preprocessing. From that obtain the error y′ = F′r produce the ISI. This cause a ISI problem since channel estimation error is the biggest contributor of the errors in the simulation at the high SNR region.. 45.

(56) Table 3-6 System parameters. Modulation. 16-QAM. Transmit antenna. 4. Receive antenna. 4. Channel is updated in T symbol periods. 8. Rayleigh-fading. Mean=0,Varance=1. Error of the Rayleigh-fading. Mean=0,Varance=0.01. Channel order. 0. Selection algorithm. 1. List length l. 16. 46.

(57) 0. 10. B-CHASE*(16) B-CHASEer*(16) -1. 10. -2. BER. 10. -3. 10. -4. 10. -5. 10. 5. 10. 15. 20 SNR dB. 25. 30. 35. Figure 3-9 Bit error rate with channel estimation error and without channel estimation error. From figure we can know the channel estimation error demonstrate the error in the high SNR.. 47.

(58) Chapter 4 B-Chase Detector of MIMO-OFDM Systems The material in this Chapter is largely taken from [9], [10], [11], and [12].. 4.1 OFDM System Models We understand the single carrier (SC) that has the poor spectral efficiency in our communication system and when we have multipath so that have frequency selective fading and inter-symbol interference (ISI). So, we will employ the principle of multi carrier(MC) system that can combat them because only some subcarriers is fail to communication. We use orthogonal frequency division multiplexing (OFDM) that is to divide the available spectrum into several subchannels (subcarriers) and the frequency response of the subchannels are overlapping and orthogonal. That get the channel is flat fading per subcarrier and decrease ISI. In the MC system the transmitter separate the data stream into several parallel ones and each modulated by a specific subcarrier that can use Inverse discrete Fourier Transform (IDFT) to implemt that in the baseband modulation. In the receive each demodulated by a specific subcarrier that can use discrete Fourier Transform (DFT) to implement that in the baseband demodulation. When OFDM symbols pass through a time-dispersive channel, inter-symbol interference (ISI) and inter-carrier interference (ICI) usually occur in the receiver and cyclic prefix (CP) is introduced to combat ISI and ICI. Cyclic prefix, shown in Figure 4.1, is a copy of the tail part of a OFDM symbol is attached to its front. As long as the cyclic prefix length is longer than its experiencing time-dispersive channel length, ISI can be avoided. At the same time, the cyclic prefix along with its OFDM symbol makes a periodic OFDM signal and maintains the properties of circular convolution and subcarrier orthogonality that prevents the ICI effect. For this system we employ the following assumptions:. 48.

(59) z. The channel impulse response is shorter than the cyclic prefix.. z. Transmitter and receiver are perfectly synchronized.. z. The fading is slow enough for the channel to be considered constant during one OFDM symbol interval.. z. Channel noise is additive, white, and complex Gaussian.. Figure 4-1 Cyclic prefix of an OFDM symbol [10]. 4.1.1 Continuous-Time Model In this chapter, a continuous-time model is used to introduce the whole OFDM baseband system including the transmitter and receiver. In the transmitter, the transmitted data is split into multiple subchannels with overlapping frequency bands. The spectrum of OFDM signal is shown in Figure 3.2. It is clear that the spectrum of each subchannel is spreading to all the others, but is zero at all the other subcarrier frequencies, because of the sinc function property, which is the key feature of the orthogonality. Assumeing an OFDM system with N subcariers, a bandwidth of W Hz and a symbol length of T seconds, of which Tg seconds is the length of the cyclic prefix, the transmitter uses the following waveforms. 49.

(60) W j2π k( t−Tg ) ⎧ 1 e N if t ∈[0,T] ⎪ Φk ( t) = ⎨ T −Tg ⎪ otherwise ⎩0,. (4.1.1.1). Where T = N W + Tg . Note that Φ k ( t ) = Φ k ( t + N W ) when t is within the cyclic prefix ⎡⎣ 0, Tg ⎤⎦ . Since Φ k ( t ) is a rectangular pulse modulated on the carrier frequency k W N , the. common interpretation of OFDM is that it uses N subcarriers, each carrying a low bit-rate. The waveforms Φ k ( t ) are used in the modulation and the transmitted baseband signal for OFDM symbol as. N −1. x(t ) = ∑ X (k )Φ k (t ). (4.1.1.2). k =0. Where X (1), X (2),..., X ( N − 1) are complex numbers from a set of signal constellation points. Assume the given channel is quasi-static, i.e., constant during the transmission of an OFDM symbol, where the quasi-static impulse response is h (τ ; t ) of the physical channel is restricted to the interval τ ∈ ⎡⎣ 0, Tg ⎤⎦ , i.e., to the length of the cyclic prefix. The received signal becomes. Tg. y (t ) = ( h × x )( t ) = ∫ h (τ ; t )x ( t − τ ) dτ + n(t ) 0. 50. (4.1.1.3).

(61) where n is additive, white, and complex Gaussian channel noise. The OFDM receiver consists of a filter bank, matched to the last part ⎡⎣Tg , T ⎤⎦ of the transmitter waveforms Φ k ( t ) , i.e.,. ⎧⎪Φ∗k (T − t ) if t ∈ ⎡⎣0, T − Tg ⎤⎦ . ψ k (t ) = ⎨ otherwise. ⎪⎩0,. (4.1.1.4). Calculating the sampled output at the k th matched filter. _. Y (k ) = ( y ×ψ k )( t ) |t =T ∞. =. ∫ y ( t )ψ (T − t ) dt k. −∞. ⎛ Tg ⎞ N −1 = ∫ ⎜ ∫ h (τ ; t ) ⎡ ∑ k '=0 X (k ′)Φ k ' ( t − τ ) ⎤ dτ ⎟ Φ ∗k ( t ) dt ⎣ ⎦ ⎟ ⎜ Tg ⎝ 0 ⎠ T. (4.1.1.5). T. + ∫ n (T − t ) Φ ∗k ( t ) dt Tg. Figure 4.3 shows a typical continuous-time OFDM baseband modulator, in which the transmitted data is split into multiple parallel streams which are modulated by different subcarriers and then transmitted simultaneously. At the receiver, the received signal is demodulated simultaneously by multiple matched filters and then the data on each subchannel is obtained by sampling the outputs of matched filters, as shown in Figure 4.4.. 51.

(62) Figure 4-2 Spectrum of an OFDM signal [10]. Figure 4-3 Continuous-time OFDM baseband modulator [10]. 52.

(63) Figure 4-4 Continuous-time OFDM baseband demodulator [10]. 4.1.2 Discrete-Time Model To simultaneously transmit multiple data, the transmitter must modulate data with multiple subcarriers and the receiver must demodulate with multiple matched filters. In fact, the modulation and demodulation can be implemented efficiently by using digital IDFT/DFT operations, because they can be respectively represented as. N −1. x(i ) = ∑ X (k )e. j. 2π ki N. k =0. N −1. Y (k ) = ∑ y (i )e i =0. N −1. = ∑ X (k )Φ k (i ). (4.1.2.1). k =0. −j. 2π ki N. N −1. = ∑ y (i )ψ k (i ) i =0. 53. (4.1.2.2).

數據

Figure 2-1 Model of MIMO systems
Figure 2-2 QR decomposition algorithm
Figure 2-3  Block diagram of V-BLAST structure
Figure 2-4 ZF V-BLAST OSIC algorithm [2]
+7

參考文獻

相關文件

When we know that a relation R is a partial order on a set A, we can eliminate the loops at the vertices of its digraph .Since R is also transitive , having the edges (1, 2) and (2,

如圖1-16所示,NOT運算會改變邏輯準位。輸入為 HIGH (1) 時,輸出為LOW (0)。當輸入為LOW時,輸出

具備 (凌陽格式 ) 串列 SRAM 介面. 7 通道10位元電壓類比/數位轉換器 (ADC) 單通道聲音類比/數位轉換器

下列哪一種記憶體屬於非揮發性記憶體, 不會因電源關閉而使其中的資料消 失, 但是可以透過電壓的方式重複抹除資料, 可用於基本輸入/ 輸出系統 (Basic Input / Output System,BIOS)

 Promote project learning, mathematical modeling, and problem-based learning to strengthen the ability to integrate and apply knowledge and skills, and make. calculated

Instead of assuming all sentences are labeled correctly in the training set, multiple instance learning learns from bags of instances, provided that each positive bag contains at

➢The input code determines the generator output. ➢Understand the meaning of each dimension to control

• A function is a piece of program code that accepts input arguments from the caller, and then returns output arguments to the caller.. • In MATLAB, the syntax of functions is