• 沒有找到結果。

於通道誤差下空時區塊編碼多用戶多輸入多輸出系統之強健式接收機設計

N/A
N/A
Protected

Academic year: 2021

Share "於通道誤差下空時區塊編碼多用戶多輸入多輸出系統之強健式接收機設計"

Copied!
70
0
0

加載中.... (立即查看全文)

全文

(1)國立交通大學 電信工程學系碩士班 碩士論文. 於通道誤差下空時區塊編碼多用戶多輸入 多輸出系統之強健式接收機設計 Design of Robust Receiver for Space-Time Block Coded Multi-user MIMO System under Channel Estimation Errors. 研 究 生:林倩羽. Student: Chien-Yu Lin. 指導教授:李大嵩 博士. Advisor: Dr. Ta-Sung Lee. 吳卓諭 博士. Dr. Jwo-Yuh Wu. 中 華 民 國 九 十 七 年 六 月.

(2) 於通道誤差下空時區塊編碼多用戶多輸入多輸出系統 之強健式接收機設計 Design of Robust Receiver for Space-Time Block Coded Multi-user MIMO System under Channel Estimation Errors 研 究 生:林倩羽. Student: Chien-Yu Lin. 指導教授:李大嵩 博士. Advisor: Dr. Ta-Sung Lee. 吳卓諭 博士. Dr. Jwo-Yuh Wu. 國立交通大學 電信工程學系碩士班 碩士論文. A Thesis Submitted to Institute of Communication Engineering College of Electrical Engineering and Computer Science National Chiao Tung University in Partial Fulfillment of the Requirements for the Degree of Master of Science in Communication Engineering June 2008 Hsinchu, Taiwan, Republic of China. 中 華 民 國 九 十 七 年 六 月 -I-.

(3) 於通道誤差下空時區塊編碼多用戶多輸入多輸出 系統之強健式接收機設計 學生:林倩羽. 指導教授:李大嵩 博士 吳卓諭 博士 國立交通大學電信工程學系碩士班 摘要. 空時區塊編碼(Space-Time Block Code, STBC)在多輸入多輸出(Multiple-Input Multiple-Output, MIMO)的無線通訊系統中是一項被廣泛使用與討論的技術,特 別是針對於多用戶的狀況下。目前已有許多空時區塊編碼多用戶多輸入多輸出系 統線性接收機演算法被提出,以因應該系統中之多重進接干擾(Multi-Access Inference, MAI)。然而,這些接收機設計有一個共同的問題:它們皆基於完善通 道估計的假設下。在實際的傳輸狀況,有限的訓練符元或是嚴重的通道衰退現象 時常會導致通道估計錯誤發生。在本論文中,吾人基於通道估計不完善的假設前 題,提出一種綜合解碼和消除干擾的強健式接收機設計。此強健式接收機設計是 基於限制最佳化(Constrained Optimization)線性等化器,其最佳化問題可藉由廣 義旁波帶消除(GSC)技巧被轉換為等效的無限制(Unconstrained)問題而求解。 吾人利用擾動 (Perturbation)技巧將通道估計錯誤之效應一併考慮進接收機設計 中。吾人同時使用連續干擾消除(successive interference cancellation ,SIC)機制進一 步增進接收機效能。由模擬結果可以看出,和其他現存的接收機技術相較,吾人 的方法確實能提供較強健之表現。. - II -.

(4) Design of Robust Receiver for Space-Time Block Coded Multi-user MIMO System under Channel Estimation Errors Student: Chien-Yu Lin. Advisor: Dr. Ta-Sung Lee Dr. Jwo-Yuh Wu. Department of Communication Engineering National Chiao Tung University. Abstract It is well known that space-time block coding (STBC) has emerged as a popular technique in multiple-input multiple-output (MIMO) wireless communication, especially for multi-user cases. Several linear receiver algorithms have been developed for such a system where multi-access inference (MAI) causes a problem. A common shortcoming of all these techniques, however, is that they are all developed based on the perfect channel assumption. Channel estimation errors do happen in practical situations due to the limited training symbols or severe fading channels. In this thesis, new robust linear receivers for joint space-time decoding and interference rejection in orthogonal space-time block coded multi-user MIMO systems are proposed for combating imperfect channel estimation. The proposed receivers are developed based on the constrained optimization design which can be transformed to an equivalent unconstrained one by the generalized sidelobe canceller (GSC) technique. By using the perturbation techniques, the channel estimation error term can be incorporated into the receiver design. We also apply the successive interference cancellation (SIC) mechanism for further performance enhancement. Numerical simulations confirm the robustness of the proposed receiver when compared with the other existing techniques.. - III -.

(5) Acknowledgement First, I would like to express my deepest thanks to my advisors, Dr. Ta-Sung Lee and Dr. Jwo-Yuh Wu for their enthusiastic guidance in completion and improvement of this thesis. I was deeply inspired by their positive attitude in many areas. Heartfelt thanks are also offered to all members in the Communication System Design and Signal Processing (CSDSP) Lab for their constant encouragement. Last but not least, I would like to show my sincere thanks to my parents for their support and love.. - IV -.

(6) Contents Chinese Abstract. I. English Abstract. II. Acknowledgement. III. Contents. IV. List of Figures. VII. List of Tables. VIIII. Acronym Glossary. IX. Notations. XI. Chapter 1 Introduction. 1. Chapter 2 Models of Space-Time Block Coded MIMO System 4. 2.1 Overview of Space-Time Block Code ................................................ 4 2.1.1 Orthogonal Space-Time Block Code ........................................... 5 2.1.2 Alamouti Space-Time Block Code............................................... 8. -V-.

(7) 2.2 MIMO Systems with Space-Time Block Code................................. 10 2.2.1 Point-to-Point MIMO Model ..................................................... 12 2.2.2 Decoding in Point-to-Point MIMO Model................................. 14 2.2.3 Multi-user MIMO Model ........................................................... 15 2.3 Summary ........................................................................................... 17. Chapter 3 Linear Receivers for Space-time Block Coded Multi-user MIMO System with Perfect Channel Estimation. 18. 3.1 Problem Formulation and System Model......................................... 19 3.2 GSC-Based Interference Suppression .............................................. 21 3.2.1 Constrained Optimization .......................................................... 21 3.2.2 GSC-based Equalizer ................................................................. 23 3.3 GSC/SIC-Based Interference Suppression ....................................... 25 3.4 Low Computational Complexity Scheme: Alamouti Code.............. 27 3.5 Computer Simulations ...................................................................... 30 3.6 Summary........................................................................................... 34. - VI -.

(8) Chapter 4 Robust Linear Receivers for Space-time Block Coded Multi-user MIMO System with Imperfect Channel Estimation 35. 4.1 Problem Formulation for Imperfect Channel Estimation Case ........ 36 4.2 Derivation of Robust Optimal Solution............................................ 38 4.2.1 Error in Estimated Blocking Matrix........................................... 38 4.2.2 Algorithm Summary of Robust Solution ................................... 40 4.2.3 Associated Discussions .............................................................. 43 4.3 Computer Simulations ...................................................................... 44 4.4 Summary........................................................................................... 49. Chapter 5 Conclusions and Future Works. 50. Appendix A…………………………………………………………….52 Bibliography............................................................................... 54. - VII -.

(9) List of Figures Figure 2.1: A block diagram of the orthogonal space-time block coded system for four transmit antennas and single receive antenna ................................................ 8 Figure 2.2: A block diagram of the Alamouti space-time coded system ....................... 10 Figure 2.3: Illustration of MIMO system....................................................................... 12 Figure 2.4: A point-to-point MIMO system................................................................... 12 Figure 2.5: Multi-user MIMO model............................................................................. 15 Figure 3.1. Structure of GSC equalizer under the perfect channel estimation. ............. 23 Figure 3.2. BER performances of the GSC-based receiver with and without the SIC mechanism (equal-power case).................................................................... 32 Figure 3.3. BER performances of the proposed receiver and other existing methods (equal-power case)....................................................................................... 32 Figure 3.4. BER performances of the GSC-based receiver with and without the SIC mechanism (unequal-power case)................................................................ 33 Figure 3.5. BER performances of the proposed receiver and other existing methods (unequal-power case)................................................................................... 33 Figure 4.1: Structure of GSC equalizer under imperfect channel estimation ................ 36 Figure 4.2. BER performance of the GSC-based receiver and the robust GSC-based receiver with imperfect channel estimation ................................................. 45 - VIII -.

(10) Figure 4.3. BER performances of the GSC-based receiver and the proposed receiver under different channel estimation error variance. ...................................... 46 Figure 4.4. BER performances of the proposed receiver and other existing methods (equal-power case)....................................................................................... 48 Figure 4.5. BER performances of the proposed receiver and other existing methods (unequal-power case)................................................................................... 48. - IX -.

(11) List of Table Table 4.1. Proposed robust receiver algorithm summary .............................................. 42. -X-.

(12) Acronym Glossary AWGN. additive white Gaussian noise. BER. bit error rate. CSI. channel state information. DL. diagonal loading. GSC. generalized side-lobe canceller. MAI. multi-access interference. MIMO. multiple-input multiple-output. ML. maximum likelihood. MMSE. minimum mean square error. MRC. maximal ratio combining. MV. minimum variance. OFDM. orthogonal frequency division multiplexing. OSIC. ordered successive interference cancellation. OSTBC. orthogonal space-time block codes. QPSK. quaternary phase shift keying. PIC. parallel interference cancellation. SDMA. space division multiple access. SIC. successive interference cancellation. SINR. signal-to- interference-plus-noise ratio. SNR. signal-to-noise ratio. STC. space-time coding. STBC. space-time block codes. SVD. singular value decomposition. TX. transmitter. ZF. zero forcing - XI -.

(13) Notations B. blocking matrix. D. desired signal’s space-time signature. H. channel matrix between the transmitter and receiver. K. size of transmit symbol vector. M. number of receive antenna. N. number of transmit antenna. Q. numbers of transmitters. R. rate of space-time block codes. s. information symbol vector. T. block length. U. adaptive matrix. V. channel noise. W. coefficient weighting matrix. X. transmission matrix. Y. received signal matrix. σ D2. channel estimation error power. σ v2. noise power. γ. loading factor. - XII -.

(14) Chapter 1 Introduction Space-time coding is famous for its ability to exploit spatial diversity and combat fading in multiple-input multiple-output (MIMO) wireless communication systems [1]-[3]. On the other hand, orthogonal space-time block codes (OSTBC) provides low complexity decoding scheme as a result of its special coding structure [2]-[3]. Although there is the optimal maximum likelihood (ML) detector [4] for point-to-point MIMO communications, this simple linear receiver cannot handle the problems of co-channel user interference when it comes to the multi-user case. In order to recover the desired signal, one may in general resort to the joint maximum likelihood (Joint ML) detection but it usually suffers from intensive computational efforts and complicated implementation. Therefore, we here seek for a suboptimal but simple solution for space-time block coded multi-user MIMO system. Nowadays several alternative approaches have been developed for space-time coded multi-user MIMO systems. Some typical proposals include the Stamoulis’s decoupled detection method [5] and the Naguib’s parallel interference cancellation (PIC) approaches [6]. The former uses decoupling to perform interference cancellation; the latter designs a two stage procedure that combines the ML and MMSE schemes. However, the Stamoulis’s and Naguib’s approaches are restricted by the transmitters that consist of two antennas only and the usage of the Alamouti’s OSTBC scheme. -1-.

(15) Other methods such as MV linear receivers have been proposed in [7]. In contrast to [5]–[6], these techniques are applicable to the general case of arbitrary OSTBCs and multiple interferers. But like the receivers mentioned previously, these proposals are also based on the perfect channel estimation assumption. Nevertheless, in practical wireless communications, there are several factors which can affect the accuracy of the channel estimation at the receiver. For example, the channel estimation error can be caused by the limited duration/outdating of the training sequence. When it comes to channel mismatch, the performance of above mentioned receivers will degrade seriously. As a result, the robustness of the receiver against imperfect channel estimation becomes an important issue. The robust generalization of the MV techniques was proposed in [8] and developed based on the worst-case performance optimization approach. Later the less conservative receiver was suggested in [9]. It guarantees robustness against CSI errors with a certain selected (high) probability in probability-constrained stochastic optimization format. Yet the above two methods do not provide a linear close form solution such that a built-in convex optimization software may be needed. In this thesis, we first address the case with perfect channel estimation. We resort to the generalized sidelobe canceller (GSC) principle [10]-[12] to transform the original constrained optimization problem in the multi-user MIMO system into an equivalent unconstrained framework. Then we apply the successive cancellation (SIC) mechanism [13]-[14] to GSC-based equalizer for a further performance enhancement. Motivated by the robust design for MIMO-OFDM systems in [15], we propose an efficient approach to the design of robust linear receiver under imperfect channel estimation. The receiver is an extended version of the GSC/SIC-based equalizer and has an elegant close form solution. The remainder of this thesis is organized as follows. In Chapter 2, the overview of space-time coding is first introduced and then the model of the space-time coded -2-.

(16) single-user MIMO system is built. In addition, the single user case is extended to the multi-user case. In Chapter 3, under the assumption of perfect channel estimation, a GSC/SIC-based equalizer is proposed to combat multi-user interference and noise at the same time. In Chapter 4, we develop a new robust GSC/SIC-based equalizer based on perturbation analysis. The main results are presented and computer simulations of the proposed scheme are illustrated respectively at the ends of the chapters. Finally, we conclude this thesis and propose some potential future works in Chapter 5. -3-.

(17) Chapter 2 Models of Space-Time Block Coded MIMO System This chapter presents the overview of space-time block coded multiple-in multiple-out (MIMO) wireless communication systems. At first, a brief introduction about space-time block code (STBC) is given. We focus on orthogonal space-time block code (OSTBC), which is an attractive class of space-time coding techniques, because of its full diversity gain and low decoding complexity. Since nowadays OSTBC has emerged as an efficient approach to exploiting spatial diversity and combating fading in MIMO system, the model for point-to-point MIMO systems with OSTBC is developed. Finally, we extend the above point-to-point model to a multi-user one. This system model is helpful for us to analyze and design the receiver scheme in the following works.. 2.1 Overview of Space-Time Block Code. Space-time coding (STC) is first proposed by Vahid Tarokh et al. [1]. The original space-time codes are based on trellis codes which achieve significant performance -4-.

(18) improvements over single receive antenna systems. Later the simpler block code version which is called space–time block code (STBC) [2] is proposed. Since transmit diversity has been an important factor which combating fading channels especially under the power constraint and bandwidth efficiency considerations, STBC involves temporal and spatial correlations to provide diversity or coding gain at the receiver without sacrificing the bandwidth. Also the properties of data transmission which transmit multiple redundant encoded signal copies among spaced antennas and across time make multiple receiver antennas are not necessary in link end. As a result, it can reduce the complexity of hardware implement at receiver and achieve diversity goal at the same time. Nevertheless due to the number of antennas increasing, the decoding complexity is increasing too. Making space-time block code matrices orthogonal seems to be an attractive approach, which is called orthogonal space-time code (OSTBC). The advantages of OSTBC lead to full diversity gain and convenience of a simple receiver with the maximum-likelihood decoding algorithm. Here we specially address the Alamouti code [3] as a very famous example of OSTBCs. The Alamouti scheme is not only able to provide full diversity gain but also full data rate with two transmit antennas. What follow up are the details about OSTBC and Alamouti code scheme.. 2.1.1 Orthogonal Space-Time Block Code Although STBC [2] is firstly introduced and usually studied as orthogonal, for convenience, orthogonal space-time block code (OSTBC) is defined to be the form that any pair of columns taken from the coding matrix is orthogonal. In order to present the details of OSTBC, we first start form the construction of STBC design. A STBC is usually presented by a matrix. Each row represents a time slot and each column. -5-.

(19) represents one antenna's transmissions over time. At first we assume there are km information bits and M -ary modulation scheme is used. Then we divide the km information bits into k signal groups x1, x 2,...x k where each group includes m bits. Now every group is modulated to selects a constellation signal from 2m points, where m = log2 M . At the encoding part of STBC, the encoder encodes the k modulated signals to generate nT parallel signal sequences of length p to compose the transmission matrix X . We define the l th row of X as a space-time symbol transmitted at time l and n th column of X as a space-time symbol transmitted from n th transmit antenna. So during the transmission time, there are p space-time symbols transmitted from each antennas for each block of k input symbols. Since the code rate measures the ration of how many modulated symbols to the number of space-time coded symbols transmitted from each antenna. It is defined as. k . p. R=. (2.1). In order to construct an OSTBC, the transmission matrix X ∈ C NT ×P must satisfy the following constraint. (. 2. 2. X ⋅ X H = x1 + x2 + " + xNT. 2. )I. NT. ,. (2.2). where xi , for 1 ≤ i ≤ NT , is the column taken from the transmission matrix. Note that every column of transmission matrix X is orthogonal with each other. Due to the code orthogonal nature shown above, the decoding process is a simple, linear and optimal scheme at the receiver. However, the most serious disadvantage of OSTBC is that all but one of the codes which satisfy the orthogonal criterion must sacrifice some proportion of their data rate at the same time. Here to present the scheme, the space-time block codes can be divided into two groups based on the type of the signal constellations. One group is the space-time block codes with real signals and the other one is with complex signals. In theorem, it is shown that full rate OSTBC only exists -6-.

(20) for restrictions of some specific antenna/modulation configurations. Although, STBC exists for any number of transmit antennas and any arbitrary real signal constellation, Tarokh showed that full rate OSTBC for complex constellations exists only for two transmit antennas. This scheme called “Alamouti space-time block codes”. The Alamouti is famous for offering the full transmitted diversity and the number of input symbols the encoder taken is equal to the number of transmission symbol periods required. Therefore the Alamouti scheme doesn’t require any additional bandwidth expansion. In other words, any OSTBC with complex signal constellation except for Alamouti scheme can only achieve a data rate under than 1 for any given number of transmit antennas. For example, in the four transmit antennas case, there are four symbols transmitted and the transmission matrix OSTBC is given by. ⎡ x1 ⎢−x ⎢ 2 ⎢ − x3 ⎢ ⎢ − x4 C X 4 = ⎢ x* ⎢ 1 ⎢ − x* ⎢ 2 ⎢ * ⎢ − x3 ⎢ * ⎣⎢ − x 4. x2 x1 x4 − x3. x3 − x4 x1 x2. x*2. x*3. x1*. − x*4. x*4. x1*. − x*3. x*2. x4 ⎤ x3 ⎥⎥ − x2 ⎥ ⎥ x1 ⎥ x*4 ⎥ , ⎥ * ⎥ x3 ⎥ ⎥ − x*2 ⎥ ⎥ x1* ⎦⎥. (2.3). where it is obvious that the orthogonal nature lead the inner product of any two columns of these matrices is zero. Also the block diagram of the OSTBC transmitter for four transmit antennas and one receive antenna is shown in Figure 2.1. The data stream is separated into four sub-streams which are converted from serial to parallel and mapped in the OSTBC encoder.. -7-.

(21) SpaceSpace-Time Encoder. x1 (k ). OSTBC. Modulator. h2. ⎡ x1 ⎤ ⎢x ⎥ ⎢ 2⎥ ⎢ x3 ⎥ ⎢ ⎥ ⎣ x4 ⎦. x( k ) S/P S/P. h1. 2. x (k ). h3 x3 ( k ). Receiver. x (k ). y (k ). h4. (2.9). 4. x (k ). Figure 2.1: A block diagram of the orthogonal space-time block coded system for four transmit antennas and single receive antenna. 2.1.2 Alamouti Space-Time Block Code The Alamouti space-time block code is unique in the sense that it is only one space-time block code which provides the full diversity without any loss of transmission rate for complex signal constellations. The uniqueness has been proved in Tarokh’s orthogonal designs associated with Radon-Hurwitz Theorem. As a result, expect for Alamouti scheme, a complex OSTBC which has ability to provide full diversity and full transmission rate is not possible to transmit in more than two antennas. Since Alamouti STBC is a special case of OSTBC which transmit data symbols in two antennas, the Alamouti space-time encoder is similar to the OSTBC one mentioned in last section. First, an M-ary modulation scheme is assumed to be used in each group of m information bits, where m = log 2 M . Due to the number of transmit antennas is two, the modulated input symbols to the space-time encoder are divided into groups of two symbols in encoding operation. It means during any symbol period, the two symbols in each group. { x1 , x2 }. are transmitted simultaneously from the two. antennas. The transmission matrix of Alamouti scheme is defined as -8-.

(22) ⎡ x1 X=⎢ * ⎣⎢ x2. x2 ⎤ ⎥, − x1* ⎦⎥. (2.4). where the coding matrix X presents the modulated signal symbol x1 transmitted from antenna 1 and the modulated signal symbol transmitted from antenna 2 is x2 in the first symbol period. Then in the second symbol period, x2* is transmitted from antenna 1 and − x1* is transmitted from antenna 2 . Superscript (i)T , (i)* and (i)H denote transpose, complex conjugate, and Hermitian operation, respectively. In fair comparison, the transmit power must be normalized. In summary, the data rate of the Alamouti code is equal to one. The transmission matrix X of Alamouti code also demonstrates the orthogonal property and must satisfy the following constraint. X⋅X. H. ⎡x 2+ x 1 2 =⎢ ⎢ 0 ⎣. 2. ⎤ ⎥ = x1 2 + x2 2⎥ + x2 ⎦ 0. x1. 2. (. 2. )I , 2. (2.5). where I 2 is a 2 × 2 identity matrix. It is shown that the transmit sequences from the two transmit antennas are orthogonal since the inner product of the sequences is zero. For real transmission case, the channel assumption remains constant over the two symbol periods. Denote h1 and h2 be the fading channel coefficients from antenna 1 and antenna 2. The real part and imaginary part of channel coefficients are same modeled as Gaussian random variables with zero mean and variance 0.5. In the case of only one antenna used at receiver, the received data over two continued symbol periods as y1 and y2 . The received signals are expressed as ⎡ y1 ⎤ ⎡ x1 ⎢y ⎥ = ⎢ * ⎣ 2 ⎦ ⎢⎣ x2. x2 ⎤ ⎡ h1 ⎤ ⎡ n1 ⎤ ⎥⎢ ⎥ + ⎢ ⎥, − x1* ⎥⎦ ⎣ h2 ⎦ ⎣ n2 ⎦. (2.6). where the noise samples n1 and n2 are independent complex Gaussian random variables with zero mean. Additionally, the real part and imaginary part of noise have -9-.

(23) the same variance nT /(2SNR) . Figure 2.2 displays the block diagram including modulator, serial to parallel structure and Alamouti encoder. Like the structure of OSTBC in Figure 2.1, the data stream is de-multiplexed into two sub-streams converted from serial to parallel and mapped to Alamouti encoder.. h1 Alamouti. Modulator. S/P S/P. y (k ). x1 ( k ). [ x1 x2 ]. x( k ). ⎡ x1 − x2∗ ⎤ ⎢ ⎥ ∗ ⎢⎣ x2 x1 ⎥⎦. h2. Receiver. x ( k ). x 2 (k ). Figure 2.2: A block diagram of the Alamouti space-time coded system. 2.2 MIMO Systems with Space-Time Block Code. Multiple-input multiple-output (MIMO) wireless communication systems (see Figure 2.3) are the communication systems which implement multiple antennas respectively in transmit and receive end. These antennas are capable of offering a linear increase in the capacity and additional antenna gain for the same bandwidth and same power consumption. In practical, recent theoretical results has shown that a point-to-point MIMO system capacity can linearly increase with the gain equal to minimum number of transmit and receive antennas. If we apply an antenna array to the base station of a multi-user system, user terminals can lead lower system interference level since multi-antenna array can provide a much larger degrees-of-freedom for interference suppression. Therefore the output system performance equipped with multi-antenna is better than the one with single antenna.. - 10 -.

(24) There are two important applicable techniques of MIMO system. One is space-time coding (STC) scheme as a well-known diversity technique; the other one is spatial multiplexing. STC, as mentioned previously, makes the transmitted symbols appropriately map into multiple transmit antennas according to specific coding matrix. Then the receiver exploits the artificially induced signal redundancy to obtain the diversity gain. As a result, STC emerged as a powerful approach to exploit diversity and resist fading in MIMO communication system. Moreover, OSTBC as one class of STC is well known for simple decoding scheme and full diversity. On the other hand, spatial multiplexing scheme is that multiple independent data streams are simultaneously transmitted via different antenna branches at the transmitter and are detected at the receiver based on their unique spatial signatures. By knowing the channel state information, the receiver is able to differentiate among the co-channel signals and extract all signals. And after demodulating those signals, the receiver can obtain the original sub-streams and combine them to give the original bit stream. Spatial multiplexing can also be applied to a multi-user format (MU-MIMO, also known as space division multiple access or SDMA). In this section, a point-to-point STBC MIMO system model is first given. Then the simple decoding scheme is following. At the end of this section, the original point-to-point system model extends to a multi-user one for spatial multiplexing scheme.. - 11 -.

(25) Figure 2.3: Illustration of MIMO system. 2.2.1 Point-to-Point MIMO Model A point-to-point (single user access) MIMO system with N transmit and M receive antennas is shown in Figure 2.4.. TX. RX. H. Figure 2.4: A point-to-point MIMO system Under the assumption that channel is flat block-fading, the relationship between transmitter and receiver can be expressed as follows [1],[2]: Y = HX + V ,. (2.7). where H is the M × N complex channel matrix known at the receiver. The entries. - 12 -.

(26) of H are independent identically distributed (i.i.d.) complex zero-mean Gaussian variables so the channel is a Rayleigh flat fading channel. Y , X , and V denote the matrices of the received signals, transmitted signals, and channel noise, respectively. It is defined as. Y. ⎡ yT (1) ⎤ ⎢ ⎥ ⎢ T ⎥ ⎢ y (2) ⎥ ⎢ ⎥ ⎢ . ⎥ ⎢ ⎥,X ⎢ . ⎥ ⎢ ⎥ ⎢ . ⎥ ⎢ ⎥ ⎢ T ⎥ ⎢ y (T )⎥ ⎣⎢ ⎦⎥. ⎡xT (1) ⎤ ⎢ ⎥ ⎢ T ⎥ ⎢x (2) ⎥ ⎢ ⎥ ⎢ . ⎥ ⎢ ⎥,V ⎢ . ⎥ ⎢ ⎥ ⎢ . ⎥ ⎢ ⎥ ⎢ T ⎥ ⎢x (T )⎥ ⎣⎢ ⎦⎥. ⎡ vT (1) ⎤T ⎢ ⎥ ⎢ T ⎥ ⎢ v (2) ⎥ ⎢ ⎥ ⎢ . ⎥ ⎢ ⎥ , ⎢ . ⎥ ⎢ ⎥ ⎢ . ⎥ ⎢ ⎥ ⎢ T ⎥ ⎢ v (T )⎥ ⎣⎢ ⎦⎥. (2.8). where y (t ) = [y1 (t ) ....y M (t )] , x (t ) = [x1 (t ) ....x N (t )],. v (t ) = [v1 (t ) ....v M (t )] ,. (2.9). are complex row vectors of the received signals, transmitted signals, and noise respectively. Here the channel noise is spatially and temporally i.i.d. additive white Gaussian noise (AWGN) and 1 ≤ t ≤ T , T is the block length presented the transmit time. Assume there are K complex information symbols prior to space-time encoding which are denoted as s1, s2,..., sK . The information symbol vector is introduced as s. {. noted s ∈ S . S = s (1)...s (L ). }. [s1...sK ]T ,. (2.10). is the set of all possible symbol vectors and L is the. cardinality of the set since a L × K space-time codeword matrix is used in this system. The N ×T transmission matrix X is called OSTBC if it satisfies the following conditions [2]:. - 13 -.

(27) z. Each element of X is all linear function of K complex variables s1, s2,..., sK and their complex conjugates;. z. For any arbitrary s , the matrix X has following property:. XXH =|| s ||2 IN. (2.11). where IN is the identity matrix, and || . || denotes the Euclidean norm of a vector or the Frobenius norm of a matrix. For the considerations of analysis, we first split the user’s information vector s , the receive data vector Y and the noise vector V into respective real and imaginary part in order to obtain the following vectors: T s := ⎡⎢ Re {sT } Im {sT }⎤⎥ ∈ R2K , ⎣ ⎦. (2.12). T Y := ⎡⎢Re {YT } Im {YT }⎤⎥ ∈ R2MT , ⎣ ⎦. (2.13). T V := ⎡⎢Re {VT } Im {VT }⎤⎥ ∈ R2MT . ⎣ ⎦. (2.14). In summary, the original system can be rewritten as Y = A (H ) s + V ,. (2.15). here the 2MT × 2K real matrix A (H) is called space-time signature matrix [16]. Noting by resorting of the transmitted symbol vector, A (H) captures and combines both of the effects coming from the space-time codeword matrix and the channel matrix. What important is that A (H) inherits the same poverty from X (s) [17]. If X (s) is the transmission matrix of OSTBC, each column of A (H) is also orthogonal to each other. The poverty is shown as A (H) AH (H) =|| A (H) ||2 I2MT .. (2.16). 2.2.2 Decoding in Point-to-Point MIMO Model Having the exact channel knowledge at the receiver, maximum likelihood (ML) - 14 -.

(28) technique is the optimal space-time decoder [2] for the system which is defined as pervious section. It uses the channel state information to search the closet point to the. {. }. received signal in the noise-free observation space ϒ= Y(1), Y(2),..., Y(L) . Here Y(l ) denotes the l th noise free received signal matrix correspond to the l th vector of. information symbol vector s(l ) . So we obtain the optimization lopt = arg min. l ={1,...,L }. || Y − Y(l ) ||F ,. (2.17). to find the index to decode the transmitted bit. The ML receiver can also be regarded as a matched filter whose output SNR is maximized [4]. It has been shown that is equivalent to the MF linear receiver in [7]: sˆ =. 1 AT (H) Y . 2 || H ||. (2.18). 2.2.3 Multi-user MIMO Model To consider spatial multiplexing scheme, a multi-user MIMO communication system is illustrated in Figure 2.5.. Figure 2.5: Multi-user MIMO model As Figure 2.5 shown, there are multiple synchronous multi-antenna transmitters communicating with a single multi-antenna receiver. For simplification of notation, we. - 15 -.

(29) assume each transmitter has the same number of transmit antennas and encode the information symbol by the same STBC. The received signal is a combination of the all signals transmitted by different transmitters. It is given as Y=. Q. ∑ Hq Xq + V ,. (2.19). q =1. where Xq is the coding matrix of transmitted signals of the q th transmitter. And Hq is the channel matrix between the q th transmitter and the receiver. There are totally Q transmitters. Following the same analysis procedure as used in the point-to-point MIMO model, we separate the q th user’s information vector sq. ⎡sq 1...sqK ⎤T , the received data ⎢⎣ ⎥⎦. vector Yq and the noise vector Vq into respective real and imaginary part in order to obtain following vectors T sq := ⎡⎢ Re {sqT } Im {sqT }⎤⎥ ∈ R2K , ⎣ ⎦. (2.20). T Yq := ⎡⎢ Re {YqT } Im {YqT }⎤⎥ ∈ R2MT , ⎣ ⎦. (2.21). T Vq := ⎡⎢ Re {VqT } Im {VqT }⎤⎥ ∈ R2MT ⎣ ⎦. (2.22). As a result, the original system is rewritten as Y=. Q. ∑ A (Hq ) sq. +V. (2.23). q =1. where the 2MT × 2K real matrix A (Hq ) presents the space-time signature of q th transmitter and is useful for the joint decoding plus interference suppression receiver design in the following chapters.. - 16 -.

(30) 2.3 Summary First of all, we stress the advantages of STBC and give the details of OSTBC and Alamouti STBC scheme in this Chapter. Because the space-time block coded MIMO communication system has proven capable of achieving high spectral efficiency and high link quality, it is believed to play an important rule in next generation wireless communication systems. Therefore, we here put our emphasis on a point-to-point space-time block coded MIMO system model. In the point-to-point MIMO communication case, the optimal ML detector provides a simple but linear receiver which maximizes the output SNR performance. Extending the above result, a system model for the multi-user space-time block coded MIMO is given in Section 2.2.3. Nevertheless, for multi-user case, ML detector in Section 2.2.2 becomes highly non-optimal since the co-channel interference dominates the receiver performance instead of the channel noise term. And it has a much more complicated structure and higher complexity for multi-user case. Therefore, in the following chapters, we will search for a simple receiver scheme for the multi-user space-time block coded MIMO systems.. - 17 -.

(31) Chapter 3 Linear Receivers for Space-time Block Coded Multi-user MIMO System with Perfect Channel Estimation In Chapter 3, we consider the general case of space-time block coded multi-user MIMO wireless communication systems. The scheme can be presented as that both the receiver and the multiple transmitters are equipped with multiple antennas. In addition, OSTBC is used to send the data simultaneously from each transmitter to the receiver. Here an optimal receiver scheme is provided for this system. It is able to suppress multi-access interference (MAI) and noise while decoding the data which is sent from the transmitter-of-interest by leverage of the spatial resource at the same time. The spatial resource comes from the array gain provided by multiple antennas at the transmitter and the receiver [18]. In other words, the proposed receiver is designed to minimize the filtered interference average power subject to the constraints that all received symbol gains of the transmitter-of-interest are maximal. Given that the exact channel estimation is available at the receiver, the equalizer scheme is regard as an associated reduced complexity implementation in comparison with joint ML detector. - 18 -.

(32) We also applied the successive interference cancellation (SIC) mechanism to utilize the in-built structure of the space-time signature matrix [13]-[14]. Finally, the simulation results of the proposed receiver are provided at the end of this chapter.. 3.1 Problem Formulation and System Model. In the multi-user MIMO case, the receiver performance is dominated by the signal-to-interference-plus-noise ratio (SINR) instead of the signal-to-noise ratio (SNR). Therefore, in order to design the receiver for a space-time block coded multi-user MIMO system, we have to define the interference term in the received signal first. Based on the system model proposed in Section 2.2.3, the received signal can be represented as. Y = HX + V ,. (3.1).  = ⎡ H H ...H ...H ⎤ denotes the whole channel matrix of the system and where H q Q⎦ ⎣ 1 2 Hq denotes the channel matrix between the q th transmitter and the receiver. Q is the total number of transmitters. X = ⎡⎣⎢X1 X2 ...Xq ...XQ ⎤⎦⎥ is the total transmission matrix of all users, V is the channel noise vector. The following assumptions are made in the sequel: 1.. The transmitted symbol vector sq = ⎡⎢⎣sq 1 sq 2 ...sqK ⎤⎥⎦ , 1 ≤ q ≤ Q , of q th user is zero mean and uncorrelated to each other. In the other words, it means the expectation of any two transmitted symbol vectors are. { }. E sq s p* = δ (q − p ),. (3.2). where E {y } denotes the expectation of the random variable y , and δ (.) is. - 19 -.

(33) the Kronecker delta function. 2.. For a Rayleigh fading channel, the elements of q th channel matrix Hq , 1 ≤ q ≤ Q , are modeled as i.i.d zero-mean complex Guassian random variables with its variance equal to 0.5.. 3.. Each element of the noise vector V is i.i.d zero-mean complex Guassian random variables with variance σV2 in order to model the AWGN channel noise.. For the advantages over joint design of interference suppression and decoding, we rewrite (3.1) into the space-time signature form which is similar to (2.23) to combine the effect of channel and space-time coding upon the transmitted symbol vector Y = As+V ,. (3.3). where s = ⎡⎣⎢s 1s 2 ...sQ ⎤⎦⎥ is a presented vector of all users’ transmitted symbol vectors and A = ⎡⎢ A (H1 ) A (H2 )...A (Hq ) ...A (HQ )⎤⎥ with 1 ≤ q ≤ Q is denoted as the ⎣ ⎦ space-time signature matrix of all transmitters. Then we can use this representation form to characterize the MAI term in the system. From (3.3), we can see the received signal is the combination of each transmitter's signal through its own space-time signature as Y = A ( H1 ) s1 + A ( H 2 ) s 2 + ... + A ( H Q ) sQ + V .. (3.4). Now assuming without any loss of generality that the first transmitter is the transmitter-of-interest, we can observe that the first term on the right hand side of (3.4) comes from the desired signal. And the other terms in (3.4) denote the interference comes from non-desired signal including MAI and channel noise. The separated structure of signal, multi-user interference and noise suggests us to obtain the corresponding description of (3.4) - 20 -.

(34) Y = Ds + HI sI + V ,. (3.5). where D := A (H1 ) denotes the space-time signature matrix mapping to the desired symbol vector s := s1 in the receiver, and HI := ⎡⎢ A (H2 ) A (H3 )...A (HQ )⎤⎥ denotes ⎣ ⎦ the space-time signature matrix mapping to the other users’ symbol vectors sI := ⎡⎢⎣ s2 s3 ...sQ ⎤⎥⎦ in the system. In the following procedure of receiver design, we assume that the perfect channel estimation is available at receiver which means that we know the exact information of D and HI .. 3.2 GSC-Based Interference Suppression. Based on the system model proposed in the previous section, there are several existing linear equalization methods such as zero-forcing (ZF) equalizer or minimum mean square error (MMSE) equalizer...etc[19]-[20]. These linear equalizers are capable of proving simple recovery solution to the desired signal but having limited performance. On the contrary, other nonlinear equalizers can provide the additional performance gain at the expense of higher computation complexity, for example, joint maximum likelihood (ML) equalizer. In this section, we first provide constrained optimization as a typical nonlinear approach of signal recovering. Then we transform the constrained optimization problem into an unconstrained one by generalized sidelobe canceller (GSC) technique. As a result, we proposed a low complexity but optimal solution to the multi-user system in this section.. 3.2.1 Constrained Optimization The diversity and array gain provided by STBC in the multi-user MIMO system - 21 -.

(35) not only can resist the channel fading effect but also can reject interference comes from the other users. To fully use the extra degrees-of-freedom in system model, one typical solution for signal recovering is the constrained optimization [21]-[23]. The first step in developing the constrained algorithm is to define the optimum weighting matrix W . Here we follow the same assumption in Section 3.1 that the first transmitter is the user-of-interest without any generality loss. Using the system model (3.5), we can express the output vector of this equalizer as s1 = ϑ (WH Y) ,. (3.6). where W = [ w1w2 .....wK ] ∈ C MT ×K is the coefficient weighting matrix of the receiver, and s1 ∈ C K ×1 is the estimate of the desired symbol vector s1 . ϑ (.) denotes the decision slice. Additionally, the column wk , 1 ≤ k ≤ K , in W can be interpreted as the receiver weight vector for the k th symbol of desired signal. The second step is to determine the constraints in the receiver. We have two main goals to be achieved by the constraints at the same time: one is able to maintain an undistorted response to the transmitter-of- interest’s signal. In other words, we try to seek a weighting matrix W to linearly combine the desired signal in the maximum ratio sense. As results, the linear weighting matrix must satisfy WH Y ≅ DH Ds1 ;. (3.7). the other goal is to suppress the MAI and the channel noise under the condition that the first goal is set up. It can be implemented via minimizing the total filtered output power of interference-plus-noise as much as possible while keeping the desired signal maximal. The goal can be expressed as the followed mathematic form: min E {|| WH (HI sI + V ) ||2 } . W. (3.8). Commonly, the closed-form optimal solution to satisfy the above two constraints are - 22 -.

(36) solved by Lagrange multiplier method [24]. Although it does represent the solutions to the constrained optimization problems, it is computationally complex in the sense that a correlation matrix of the received signal must be estimated regularly and then inverted in order to arrive at the solutions.. 3.2.2 GSC-based Equalizer Here we use GSC as an efficient tool to solve the above constrained optimization problem instead of Lagrange multiplier method. The advantage over GSC principle is its ability to transform a constrained problem into an unconstrained one. The main idea of GSC is depicted in Figure 3.1.. Estimated signal s. Received signal Y. DH. Matched Filter. BH. UH. Blocking Matrix. Adaptive Weighting Matrix. Figure 3.1. Structure of GSC equalizer under the perfect channel estimation.. We can see the linear weighting matrix W is decomposed into three parts: W = D − BU ,. (3.9). where D ∈ C MT ×K forms a conventional match filter matrix along the upper path to satisfies the first constraint (3.7). The superscript H is the complex conjugate (Hermitian) transpose. Therefore it is designed to equal the transmitter-of-interest’s - 23 -.

(37) space-time signature. As the upper path’s output is reduced by the lower path where the amount subtracted is the least-squares estimation of the noise and interference. To guard from subtracting the desired signal, the lower path is allocated with a blocking matrix. B. that. nulls. desired. signal. components.. The. blocking. matrix. B ∈ C (MT −K )×MT has the property that BH D = 0 , so that any component of the desired signal arriving at the lower path will be blocked. The adaptive weighting matrix U ∈ C MT −K ×MT is designed to use the remaining degrees of freedom to suppress the. noise and other user’s interference power. Following the procedure illustrated in Figure 3.1, the output power of GSC equalizer becomes WH Y = (D − BU)H Y = yd − UH yb ,. (3.10). where the output power of upper path can be represented as yd : = DH (Ds1 + HI sI + V) ,. (3.11). and the output power of lower path can be represented as yb : = BH (Ds1 + HI sI + V) .. (3.12). We observe that contaminated term in the upper path output is i : = DH HI sI + DH V .. (3.13). Therefore if we want to minimize the filtered noise power and interference power, the adaptive weighting matrix U must satisfy the following cost function: min J : = E {|| i − UH yb ||2 } . U. (3.14). Simply following the standard procedures of GSC technique[25], the optimal weighting matrix Uopt has to satisfy the linear equation ⎡ BH R B⎤ U = BH R D , I ⎥⎦ opt I ⎢⎣. where. - 24 -. (3.15).

(38) RI : = HI HIH + σv2IMT ∈ C MT ×MT .. (3.16). So the Uopt can be rewritten as −1. Uopt = (BH RI B). BH RI D ,. (3.17). and we can get the optimal GSC weighting matrix Wopt = D − BUopt. (3.18). 3.3 GSC/SIC-Based Interference Suppression. In the above section we provide a GSC-based receiver to reject multi-user interference and noise at the same time. However by observing the algebraic structure of system model (3.3), we discover that there exists a in-built group partition at the transmit symbol vector s . The partition is according to the transmitter and each group transmits its symbol vector through its own space-time signature matrix. This basic structure gives rise to the multilayered space–time architecture. Here we use the SIC mechanism [13]-[14] to do the multistage detection and cancellation in the extension of proposed GSC-based receiver in Section 3.2. The basic idea is supposed that the first user’s symbol vector s1 is recovering successfully by the GSC-based receiver. After decoding s1 , we subtract the contribution of this signal from the received signals at all receive antennas. In other words, the communication system now are with less transmit antennas and the same number of receive antennas in comparison with the original one. We next use GSC-based receiver to recover the second user’s signal then subtract its contribution from the received signals at all receive antennas. Proceeding in this manner, we observe that by subtracting the contribution of previously recovered user’s signal from the received signals at receive antennas the space–time code affords an - 25 -.

(39) extra diversity gain [13]. This scheme can lead a straightforward power allocation application. In fact, powers at the different layers could be allocated based on the diversity gains. For example, the allocated powers can be decreased geometrically in terms of the diversity gains. In other words, it can also solve the near-far problem commonly happened in the multi-user case. The detailed procedures of the proposed receiver are described in the following algorithm:. GSC/SIC-Based Interference Suppression Receiver Algorithm. Initialization: D1 = A (H1 ) , HI = ⎡⎢A (H2 )......A (H p )⎤⎥ , Y1 = Y ⎣ ⎦. Recursive: For 1 ≤ i ≤ Q. Step 1) Bi is the blocking matrix of Di Step 2) RI ,i : = (HI ,i HIH,i ) + σv2I(MT −K (i −1)) −1. Step 3) Uq,i = (BiH RI ,i Bi ). BiH RI ,i Di. Step 4) Wq,i = Di − Bi Uq,i Step 5) si = ϑ (WiT yi ), ϑ (.) is the decision slice Step 6) yi +1 = yi − (Disˆi ). Step 7) Di +1 = A (Hi +1 ), HI ,i +1 = ⎡⎢ A (H2+i )......A (HQ )⎤⎥ ⎣ ⎦. - 26 -.

(40) 3.4 Low Computational Complexity Scheme: Alamouti Code. The computational complexity of the above proposed receiver mainly comes from the two places: one is in solving for the blocking matrix via BH D = 0 ; the other one 2 is in multiplying of two large matrix HI in order to get Rin = HI HH I + σv IMT . In. this section, we provide a low complexity scheme with Alamouti code employed in the system. Because of the peculiar structure of Alamouti code block, we can obtain the blocking matrix B and the multiplication RI through much simpler calculations. The typical approach for obtaining B ∈ C QK ×K is through the singular value decomposition (SVD) of the match filter matrix D ∈ C QK ×K . Since B is constructed as a basis of the left null space of D , the computational complexity cannot be reduced due to the large user number Q . In the Alamoti code case, the matrix D is composed of Q Alamouti code blocks as ⎡ h11 h12 ⎫⎪ ⎤ block 1 ⎢ * ⎥ ⎬ * ⎢ h12 −h11 ⎪⎭ ⎥ ⎢. ⎥ . ⎢ ⎥ = d d ∈ C QK ×K , D= ⎢. ⎥ [ 1 2] . ⎢ ⎥ ⎢ hQ1 hQ 2 ⎫⎪ ⎥ blockQ ⎥ ⎢ * * ⎬ h -hQ1 ⎭⎪ ⎣⎢ Q 2 ⎦⎥. (3.19). where K = 2 . In consequence of this distinctive structure of D , we discover that the blocking matrix B has the similar structure which is also composed of Q code blocks as. - 27 -.

(41) ⎡ a1 ⎢ * ⎢ −b1 ⎢. B=⎢ ⎢. ⎢ ⎢ aQ ⎢ * ⎢⎣ −bQ. ⎤ ⎥ ⎥ ⎥ ⎥ = b b ∈ C QK ×K , ⎥ [ 1 2] ⎥ bQ ⎫⎪ ⎥ blockQ ⎬ ⎥ * aQ ⎪⎭ ⎥⎦ b1 ⎫⎪ ⎬ block1 a1* ⎭⎪ . .. (3.20). where K = 2 in Alamouti case. We observe an important fact that the two columns of B are composed of the same elements in the different order. It means that as long as we know any one column’s information of B , we can find the other one and complete the matrix B . It inspires us that we only need to find a column b ∈ C QK ×1 which is satisfied. bH D = 0 ,. (3.21). then we can find the matrix B to satisfied BH D = 0 by copying and reordering the. column b . Therefore we use the Gram–Schmidt process to find the desired column. It is a method for orthogonalizing a set of vectors in an inner product space, commonly the Euclidean space Rn . The Gram–Schmidt process takes a finite, linearly independent. set. S = {v1,..., vn }. and. generates. an. orthogonal. set. S ' = {u1,..., un } that spans the same subspace as S . To do the process, we firstly define the projection operator by proju v =. < u, v > u u =< u, v > , < u, u > < u, u >. (3.22). where <u, v> denotes the inner product of the vectors u and v . Since the two columns of D are orthogonal to each other in nature, we directly assign that u1 = v1 = d1 , u2 = v2 = d2 . Then v3 ∈ C KQ×1 is randomly assigned any vector which is orthogonal to v1 . The Gram–Schmidt process works as follows:. - 28 -.

(42) u1 = v1 = d1 ,. (3.23). u2 = v2 − proju1v2 = d2 ,. (3.24). u 3 = v3 − proju1v3 − proju2 v3 ,. (3.25). where u 3 is the desired column b which is orthogonal to any column in D . Since two pairs of columns d1, d2 and d1, v 3 are orthogonal to each other, the above process only has one term proju2 u3 in (3.25) which is needed to be computed. It. greatly reduced the flop counts from CM SVD = 4K 3Q 2 + (8K 3 + 9K 2 )Q ,. (3.26). CMGram −Schmidt = 3QK. (3.27). to. The scheme of Alamouti code also gives some additional computational advantage besides the calculation of the blocking matrix in GSC-based equalizer: the multiplying of the large matrix HI ∈ C QK ×QK is presented as a symmetric form as follows:. HI * HIH. ⎡a11 a12 a13 .....a1,Q ⎤ ⎢ ⎥ ⎢a * a a .....a ⎥ 2,Q −1 ⎥ ⎢ 12 22 23 ⎢ ⎥ ⎢a * a * a .....a ⎥ 3,Q −2 ⎥ = ⎢⎢ 13 23 33 ⎥, . ⎢. ⎥ ⎢. ⎥ ⎢ ⎥ ⎢ ⎥ ⎢a * a * ........a ⎥ Q,Q ⎥⎦ ⎢⎣ 1Q 2Q −1. (3.28). where aij ∈ C K ×K , K = 2 is the multiplication of any two Alamouti block codes. It also has a symmetric form ⎧⎪⎡ m 0⎤ ⎪ ⎢ ⎥ , for i = j ⎪ ⎪⎢ ⎥ 0 m ⎪ ⎢ ⎥⎦ ⎪⎣ ⎪ aij = ⎨ n , p⎤ ⎡ ⎪ ⎪ ⎢ ⎥ ⎪ ⎪ ⎢−p * n * ⎥ , for i ≠ j ⎪ ⎥⎦ ⎪ ⎩⎪⎢⎣ - 29 -. (3.29).

(43) where m, n, and p are scalars. As a result, the total number of flops for computing. HI * HH is determined as KQ 3 − KQ 2 comparing to original K 3Q 3 − K 3Q 2 I flops. Here the total approximate flop counts which are required to compute the regular OSTBC code scheme and the Alamouti code scheme are respectively summarized as below: CM regularOSTBC = KQ 3 + (2K 3 − K )Q 2 + (3K 2 + 3K )Q + (2K 3 − 2K 2 + K ). ,. (3.30). and CM Alamouti = K 3Q 3 + (5K 3 + K 2 )Q 2 + (8K 3 + 12K 2 )Q + (2K 3 − 2K 2 + K ). .. (3.31). From (3.30) and (3.31), it can be seen that the Alamoti scheme can save about K 2 times of computational load at the highest order.. 3.5 Computer Simulations Throughout the simulations in this section, Q = 2 transmitters are assumed. Each transmitter is with N = 2 transmit antennas and the full-rate Alamouti’s OSTBC (T = 2, K = 2 ) is used. In addition, we assume a single receiver of M = 2 receive antennas. For simplicity, the interfering transmitter uses the same OSTBC as the transmitter-of-interest. Here channel model is assumed to be independent Rayleigh fading channel and the perfect channel estimation is available in receiver end. QPSK modulation is used. All plots are averaged over at least 1000 independent simulation runs. In the first example, two transmitters are under the assumption of equal power. Figure 3.2 shows the bit error rates (BERs) of the GSC-based receiver and the - 30 -.

(44) GSC/SIC-based receiver versus SNR. We can observe that the GSC-based receiver with the SIC mechanism offers about 1~2 dB gain. This would benefit from the increased received diversity obtained by SIC mechanism. In Figure 3.3, the BERs of all the receivers tested are displayed versus SNR. The simulations compare the proposed GSC/SIC-based with several existing methods: the Stamoulis’s method [5], the Naguib’s approaches [6], and the minimum variance (MV) receiver [7]. As we can see, the proposed receiver provides better performance over the whole tested SNR range as compared to the other receivers. As expected, the performance of MV is limited by the finite sample effect. And although the Stamoulis’s decoupled based detector is free from error-propagation problem but its diversity gain is fixed. Moreover both the Stamoulis’s method and the Naguib’s approaches have the limitation of the Alamouti code usage and two transmit antennas. In contrast to these restrictions, the proposed GSC/SIC-based receiver is free for any OSTBC and any number of transmit antennas. In the second example, two transmitters are assumed with unequal power to model the near-far problem in a multi-user’s system. In this case, we assume that the power of transmitter is known at the receiver end. The decoding order is based on the amount of power. Figure 3.4 shows the BERs of the GSC-based receiver with and without SIC mechanism versus SNR and Figure 3.5 shows the BERs of all the receivers tested and are displayed versus SNR. Compared to Figure 3.2 and Figure 3.3, the improvement of performance confirm the advantage of SIC mechanism in the unequal power case.. - 31 -.

(45) 0. 10. GSC GSC/SIC -1. 10. -2. 10. -3. 10. -4. 10. -5. 10. 0. 5. 10. 15. 20. 25. Figure 3.2. BER performances of the GSC-based receiver with and without the SIC mechanism (equal-power case) 0. 10. Stamoulis method Minimum variance Naguib method GSC GSC/SIC. -1. 10. -2. 10. -3. 10. -4. 10. -5. 10. 0. 5. 10. 15. 20. 25. Figure 3.3. BER performances of the proposed receiver and other existing methods (equal-power case) - 32 -.

(46) 0. 10. GSC GSC/SIC -1. 10. -2. 10. -3. 10. -4. 10. -5. 10. 0. 5. 10. 15. 20. 25. Figure 3.4. BER performances of the GSC-based receiver with and without the SIC mechanism (unequal-power case) 0. 10. Stamoulis method Minimum variance Naguib method GSC GSC/SIC. -1. 10. -2. 10. -3. 10. -4. 10. -5. 10. 0. 5. 10. 15. 20. 25. Figure 3.5. BER performances of the proposed receiver and other existing methods (unequal-power case). - 33 -.

(47) 3.6 Summary. In Section 3.1, we define the interference term and the system model of a space time block coded multi-user MIMO system. Under the assumption that perfect channel estimation is known at the receiver end, we use the system model to derive the optimal constrained equalizer to reject MAI and noise in Section 3.2. A GSC-based equalizer is also provided to transform the constrained problem into an unconstrained one in the same section. In addition, due to the multi-group structure in the system model, we apply the SIC mechanism to implement the multi-stage detection and interference cancellation in Section 3.3. Since Alamouti code is famous for its full rate and full diversity and commonly used in OSTBC, in Section 3.4 we also derive a low computational complexity scheme for Alamouti case. Finally computer simulation results are available in Section 3.5. It shows the SIC mechanism do improve the performance of GSC-based receiver and this proposed GSC/SIC-based receiver do have the comparable performance with other existing methods for the space time block coded multi-user MIMO system.. - 34 -.

(48) Chapter 4 Robust Linear Receivers for Space-time Block Coded Multi-user MIMO System with Imperfect Channel Estimation The proposed receiver in Chapter 3 and other existing receivers for space-time block coded multi-user MIMO system have a major shortcoming: they use the assumption that the channel estimate is perfect at the receiver. When channel estimation error occurs, the performance of these receivers will degrade since their design does not take the channel estimation error into account. In practice, channel estimation error does happen. It comes from limited or outdating training symbols and leads to serious performance problems as do the effects of MAI and channel noise. In this chapter, we propose a robust receiver which is able to combat the imperfect channel estimation. By modeling the channel estimation error as a random variable and finding its characteristics, we derive an extended version of the GSC/SIC-based receiver in Chapter 3 to fix the performance problem. Here the perturbation technique leads to a very natural cost function for joint interference, noise and channel estimation error mitigation at the same time. Finally we compare the proposed solution with other - 35 -.

(49) existing robust solutions for space-time block coded multi-user MIMO system.. 4.1 Problem Formulation for Imperfect Channel Estimation Case. When the perfect channel estimation is no longer available at receiver end, it means that the optimal weighting matrix W in Chapter 3 is obtained only by the estimated version of channel parameter. It causes serious system performance problem of the GSC/SIC-based receiver since its design is crucial to perfect channel estimation assumption. By observing the design procedure of GSC equalizer in Figure 4.1 , we discover the problems which result in performance degradation. As was mentioned above, the weighting matrix is decomposed into. W = D − BU. (4.1). where X denotes the estimated version of X .. Estimated signal s. Received signal Y. H. D. Matched Filter. H. H. B. Blocking Matrix. U. Adaptive Weighting Matrix. Figure 4.1: Structure of GSC equalizer under imperfect channel estimation - 36 -.

(50) The first problem comes from the upper path: the maximal-ratio combing of the desired signal is impossible because there is only estimated D ≠ D available, where. D equals the desired signal’s space-time signature; the second problem comes from the lower path: since the blocking matrix is designed for D instead of D , signal leakage happens. In summary, the output power of GSC equalizer under the imperfect channel estimation case becomes H. W Y = (D − BU) Y = yd − U yb , H. H. (4.2). where the output of the upper path can be represented as H. yd : = D (Ds1 + HI sI + V ) ,. (4.3). and the output of the lower path can be represented as H. yb : = B (Ds1 + HI sI + V ) .. (4.4). H. Note that B D ≠ 0 brings signal leakage into yb term. Now the contaminated term in the upper path output is defined as H. H. i : = D HI sI + D V .. (4.5). As a result, we have to define the new cost function in considerations of channel estimation error. {. H. }. min J : = E || i − U yb ||2 , U. (4.6). where the expectation term is a combination of the source signal, channel estimation error, and AWGN noise. Based on (4.4), (4.5), and (4.6), and by averaging the cost function over the source signal and noise, we have. (. {. H. H. J : = Tr U E B. (DDH + RI ) B} U). }) ( { − Tr (E {D R B} U) + Tr (E {D H. H. − Tr U E B RI D H. H. I. - 37 -. .. }). RI D. (4.7).

(51) We derive the derivative of J with respect to U . By setting ∂ J / ∂ U = 0 , the first order necessary condition satisfies. {. }. E B (RI + DDH ) B U = E {BRI D}. (4.8). Note that when B = B and D = D , (4.8) reduce to (3.15) in the perfect channel estimation case. The only way to determine the optimal U is to know precisely every expectation term in this first order necessary condition. In order to do the evaluation, we will establish a relationship between the estimated blocking matrix B and estimation error ΔD to in next section and derive the optimal weighting matrix W .. 4.2 Derivation of Robust Optimal Solution. Although the channel parameters are not exactly known at receiver end, the characteristic of the channel estimation error ΔD = D − D still can be obtained by some commonly used channel estimation techniques. As a consequence, we can calculate the expectation terms which involve D . In addition, if we can establish a relationship between the estimated blocking matrix B and the channel estimation error ΔD , we can calculate all expectation terms in (4.8) and derive the robust optimal solution for imperfect channel estimation case.. 4.2.1 Error in Estimated Blocking Matrix By observation, an error-free version D and an estimated version D both can be written as the following singular value decomposition (SVD) form:. - 38 -.

(52) ⎡ΣD 0⎤ ⎡⎢ VDH ⎤⎥ ⎥⎢ D = [UD UB ] ⎢⎢ ⎥ ⎢ H ⎥⎥ , 0 0 ⎢⎣ ⎦⎥ ⎢⎣ VD ⎥⎦. (4.9). H ⎡ΣD 0⎤ ⎡⎢ VD ⎤⎥ ⎥⎢ ⎥. UB ⎤⎥ ⎢⎢ ⎦ ⎢0 0 ⎥⎥ ⎢ H ⎥ ⎣ ⎦ ⎢⎣ VD ⎥⎦. (4.10). and D = ⎡⎢UD ⎣. Since B and B are constructed as the left null space of D and D respectively, we can find B = UB ∈ C MT ×(MT −K ) ,. (4.11). B = UB ∈ C MT ×(MT −K ) .. (4.12). and. So we can see that there is a certain relationship between B and ΔD . By perturbation analysis process in [15],[26], a closed-form expression of B linear in channel estimation error ΔD is as follows: 1 H H B = B −UD Σ− D VD ΔD B ,. (4.13). :=ΔB. when || ΔD || is small. Also the estimated channel matrix can be presented as D = D + ΔD ,. (4.14). where ΔD ∈ C MT ×K models the estimation error and has the similar structure as D . Since D equals to the space-time signature of desired signal and OSTBC is used to transmit signal, ΔD satisfies the following property. (. 2. 2. ΔD H ⋅ ΔD = Δd1 + Δd 2 + " + Δd MT. 2. )I. K. ,. (4.15). where Δdi , 1 ≤ i ≤ MT , denotes the estimation error of the ith channel gain. Here we assume least square (LS) channel estimation technique which produces a white channel estimation error. Therefore we can see. - 39 -.

(53) RD(. m1,m2 ). {. m m := E ΔD ( 1 )H ΔD ( 2 ). }. , ⎪⎧⎪0, for m1 ≠ m2 := ⎨ 2 ⎪⎪Q σD I MT ×MT , for m1 = m2 ⎪⎩. (4.16). 2 where σD denotes the variance of channel estimation error.. 4.2.2 Algorithm Summary of Robust Solution Based on the characteristics of ΔD in (4.15), (4.16) and the relationship between B and ΔD in (4.13), we can determine the expected values in (4.8) which are summarized in the following lemma (see Appendix A for a proof): Lemma 4.1: the following results hold.. {. }. (4.17). }. (4.18). 2 σD E B RI B = B RI B + trace ( J) I MT −K K. (4.19). H. 1.. E B RI D = BH RI D. 2.. 2 E B DDB =σD * I MT −K. {. {. 3.. H. }. H. H. −1. where J := (DH D). −1. DH RI D (DH D). □. By Lemma 4.1 and (4.8), the optimal U can be obtained by Uopt. 2 ⎛ 2 ⎞⎟−1 H σD H ⎜ trace ( J) I(MT −K ) ⎟⎟ B RI D = ⎜⎜σD I(MT −K ) + B RI B + ⎜⎝ K ⎠⎟. (4.20). 2 denotes the variance of the channel estimation error. And RI is defined where σD. as lI = H lI H l HI + σ 2 I R v MT − K .. (4.21). In practical situation, only an estimated sample version is available at the receiver end. So the weighting matrix of proposed robust receiver is presented as - 40 -.

(54) Wopt = D − BUopt 2 ⎛ 2 ⎞−1 H H σD ⎟ ⎜ trace ( J) I(MT −K ) ⎟⎟ B RI D = D − B ⎜⎜σD I(MT −K ) + B RI B + ⎟⎠ ⎜⎝ K. (4.22). Comparing to the original weight matrix W in Chapter 3, the new robust weighting matrix Wopt has two more terms in the adaptive matrix Uopt in consideration of accounting the signal leakage and parameter perturbation effect. Noting that with different channel estimation technique, (4.22) will be modified in corresponding to different characteristics of the channel estimation error. Nevertheless as long as the channel estimation error remaining independent to the source signal and channel noise, there still exists a closed-form solution similar to (4.22). Since the SIC mechanism has proven the ability of performance enhancement in Chapter 3, here we also combine this mechanism to the proposed robust receiver in order to gain more received diversity. The algorithm is summarized in Table 4.1:. - 41 -.

(55) Table 4.1. Proposed robust receiver algorithm summary INITIALIZATION:. D1 = A (H1 ) , HI = ⎡⎢ A (H2 ) ......A (Hq )⎤⎥ , Y1 = Y ⎣ ⎦ RECURSIVE: FOR 1 ≤ i ≤ Q. Step 1) Bi is the blocking matrix of Di. (. H. ). Step 2) RI ,i : = HI ,i HI ,i + σv2I(MT −K (i −1)) where σv2 denotes the variance of channel noise. (. H. Step 3) Ji = Di Di. −1. ). H. (. H. Di RI ,i Di Di Di. −1. ). ⎧ ⎫ ⎪ 2 ⎪ H H σ2 Step 4) Uq,i = ⎪ ⎨σD I(MT −K (i −1)) + Bi RI ,i Bi + D trace ( Ji ) I(MT −K (i −1)) ⎪ ⎬ Bi RI ,i Di ⎪ ⎪ K ⎪ ⎪ ⎩ ⎭ 2 where σD denotes the variance of channel estimation error. Step 5) Wi = Di − Bi Ui. (. T. ). Step 6) si = ϑ Wi Yi , ϑ (.) is the decision slice Step 7) Yi +1 = Yi − (Disˆi ) Step 8) Di +1 = A (Hi +1 ), HI ,i +1 = ⎡⎢ A (H2+i ) ......A (HQ )⎤⎥ ⎣ ⎦. - 42 -.

(56) 4.2.3 Associated Discussions As observation, we can rewrite the optimal U in (4.20) as the following form: Uopt. ⎛ 2⎛ ⎞⎟−1 H trace ( J)⎟⎞ H ⎜ ⎜ = ⎜σD ⎜1 + ⎟⎟ I(MT −K ) + B RI B⎟⎟ B RI D , ⎠ K ⎝⎜ ⎝⎜ ⎠⎟. (4.23). We can see (4.23) is in a form which is similar to a commonly used robust approach: the diagonal loading (DL) approach [7][27]. The key idea of DL technique is to regularize the original solution for the weight vector by adding a quadratic term to the objective function. As a result, in the situation of the proposed receiver case, we obtain the DL adaptive matrix is defined as. (. H. −1. ). UDL = γ I(MT −K ) + B RI B. H. B RI D ,. (4.24). where γ ≥ 0 is the loading vector. This operation corresponds to injecting an H. artificial amount of white noise into the main diagonal of B RI B . It has been shown that the diagonal loading will guarantee the abilities of inversion of the matrix H. H. γ I(MT −K ) + B RI B , even in the case B RI B is a singular matrix. Another meaningful interpretation of the DL is that it is the appropriate tool for combating the unexpected interference like channel mismatch, finite sample effect…etc [7]. Unfortunately, it is not a clear from in reference for what the proper choice of γ is and how it depends on the norm of the channel estimation errors. Until now, the optimal choice of the DL factor is dependent case by case which leads its limited robustness [7], [27], [28]. However, by comparing (4.23) and (4.24), we discover that the optimal γ can be set up as. ⎞ 2 ⎛ ⎜⎜1 + trace ( J)⎟⎟ . γ := σD ⎜⎝ ⎠⎟ K Our simulation results will confirm this scenario.. - 43 -. (4.25).

(57) 4.3 Computer Simulations. In this section, we present the computer simulations for the space-time block coded multi-user MIMO system with the imperfect channel estimation. In all of them, we assume there are Q = 4 transmitters. Here the channel model is assumed as independent Rayleigh fading channel so each element of the channel matrices are independently drawn from a zero-mean complex Guassian distribution. The full-rate Alamouti’s OSTBC (T = 2, K = 2 ) is used, in other words, the transmitter is with. N = 2 transmit antennas. A single receiver of M = 4 receive antennas is assumed. Since the imperfect channel estimation case is assumed, the receivers in this system use the presumed (erroneous) channel matrix H = H + ΔH rather than the true channel matrix H . In each simulation run, each element of the channel estimation error matrix ΔH is generated by independently drawn from a zero-mean complex 2 Guassian variable with the variance σD due to LS channel estimation assumption.. Then the presumed channel matrix H is coming from the addition of every element in ΔH to the corresponding element in H . At first, Figure 4.2 shows the simulated bit-error-rate (BER) of the GSC-based receiver (3.18) and the robust GSC-based receiver (4.22) versus SNR with imperfect 2 = 0.01 is channel estimation. Here the channel estimation error variance σD. simulated. As expected, the robust solution substantially outperforms the non-robust one especially in high SNR region since the optimal robust weighting matrix is designed to handle the channel mismatch. Because of the fixed power of the channel estimation error, the performance is dominated by the channel estimation error rather than channel noise and multi-user interference at high SNR. As a result, the. - 44 -.

(58) improvement of the robust receiver becomes more obvious with SNR increasing.. 0. 10. GSC RGSC. -1. 10. -2. 10. -3. 10. 0. 5. 10. 15. 20. 25. 30. Figure 4.2. BER performance of the GSC-based receiver and the robust GSC-based receiver with imperfect channel estimation. Figure 4.3 illustrates the BER decreasing trend of the GSC-based receiver and the proposed (robust GSC/SIC-based) receiver under the different power (in decreasing form) of the channel estimation error at SNR =35 dB. It can be observed that the proposed receiver is able to combat the different level of channel mismatch from 2 2 σD = 0.1 ~ 0 . And when the channel information is perfectly known ( σD = 0 ), the. proposed robust solution reduces to act as the non-robust one. The result can also be confirmed by the derivation of (4.8).. - 45 -.

(59) -1. 10. GSC Proposed Method. -2. 10. -3. 10. -4. 10. -5. 10. 0.1. 0.09. 0.08. 0.07. 0.06. 0.05. 0.04. 0.03. 0.02. 0.01. 0. Figure 4.3. BER performances of the GSC-based receiver and the proposed receiver under different channel estimation error variance.. Throughout the second part of simulations, the following techniques are examined: z. The proposed (robust GSC/SIC-based ) receiver. z. The Stamoulis’s method [5]. z. The Naguib’s approaches [6]. z. The minimum variance (MV) receiver [7]. z. 2 The DL-based MV receiver [7], where γ = 5σD is chosen. Note that this is a. popular ad hoc choice of γ [7]-[9]. In Figure 4.4, the BERs of all the examined receivers are displayed versus SNR. Here 2 σD is also assumed as 0.01 to test the robustness against imperfect channel state. information of the proposed receiver and other techniques. And we assume all. - 46 -.

(60) transmitters are equal power. As expected, all tested receivers expect for the proposed one are sensitive to the channel estimation error since they are designed under the perfect channel assumption. Compared to the simulation result in Chapter 3, the stamoulis, the naguib, and the MV approaches all fail to resist the channel mismatch especially in high SNR region. Note that the DL-based MV receiver is a robust version of MV receiver and performs better than non-DL counterparts. However it suffers the finite sample effect of MV receiver and has limited performance. With Figure 4.2, it can be seen the improvement between robust GSC-based receiver and non-robust GSC-based receiver is more manifest than the one between DL-based MV receiver and MV receiver toward same channel estimation error variance. The result also illustrates the derivation of the optimal choice γ in (4.25) do perform better than the popular 2 choice of γ = 5σD . Figure 4.5 shows the un-equal power case to confirm the. advantage of the SIC mechanism toward the near-far effect.. - 47 -.

(61) 0. 10. stamoulis Minimum variance Minimum variance with DL naguib Proposed method. -1. 10. -2. 10. -3. 10. -4. 10. 0. 5. 10. 15. 20. 25. 30. Figure 4.4. BER performances of the proposed receiver and other existing methods (equal-power case) 0. 10. -1. 10. -2. 10. -3. stamoulis Minimum variance Minimum variance with DL naguib Proposed method. 10. -4. 10. 0. 5. 10. 15. 20. 25. 30. Figure 4.5. BER performances of the proposed receiver and other existing methods (unequal-power case). - 48 -.

(62) 4.4 Summary. In this chapter, we solve the receiver performance degradation problem under imperfect channel estimation in the space-time coded multi-user MIMO system. We analyze the effect and the potential problems due to channel mismatch in the GSC-based receiver (3.18) in Section 4.1. And Section 4.2 is shown that by the perturbation techniques we can estimate the error amount of the estimated blocking matrix. Combining the perturbation analysis result and the distinctive structure of STBC, we can derive the robust solution in a simple closed-form. We also give some associated discussions about the proposed robust solution comparing with other existing robust solutions. Finally the computer simulation results are shown to confirm the robustness of the proposed method in Section 4.3.. - 49 -.

數據

Figure 4.3. BER performances of the GSC-based receiver and the proposed receiver  under different channel estimation error variance
Table 4.1. Proposed robust receiver algorithm summary .............................................
Figure 2.1: A block diagram of the orthogonal space-time block coded system for four  transmit antennas and single receive antenna
Figure 2.2: A block diagram of the Alamouti space-time coded system
+7

參考文獻

相關文件

在數位系統中,若有一個以上通道的數位信號需要輸往單一的接收端,數位系統通常會使用到一種可提供選擇資料的裝置,透過選擇線上的編碼可以決定輸入端

下列何者敘述錯誤?(A)鼎新 ERP 系統可以設定日期格式(西元\民國) (B)鼎新 ERP 系統可 以設定多種幣別資料 (C)鼎新 ERP 系統可以設計表單的簽核

下列哪一種記憶體屬於非揮發性記憶體, 不會因電源關閉而使其中的資料消 失, 但是可以透過電壓的方式重複抹除資料, 可用於基本輸入/ 輸出系統 (Basic Input / Output System,BIOS)

In particular, we present a linear-time algorithm for the k-tuple total domination problem for graphs in which each block is a clique, a cycle or a complete bipartite graph,

檢視 檢視「 「 「 「輸出 輸出 輸出 輸出」 」 」 」視窗表示 視窗表示 視窗表示 視窗表示 程式碼沒有任何錯誤

接收機端的多路徑測量誤差是GPS主 要誤差的原因之一。GPS信號在到達 地球沒有進到接收機之前,除了主要 傳送路徑之外,會產生許多鄰近目標 反射的路徑。接收機接收的首先是直

The probability of loss increases rapidly with burst size so senders talking to old-style receivers saw three times the loss rate (1.8% vs. The higher loss rate meant more time spent

Multi-core linear classification Parallel matrix-vector multiplications.. Existing Algorithms for Sparse