WO2010000075A1 - Computation of extrinsic information in a branch-and-bound detector - Google Patents

Computation of extrinsic information in a branch-and-bound detector Download PDF

Info

Publication number
WO2010000075A1
WO2010000075A1 PCT/CH2008/000298 CH2008000298W WO2010000075A1 WO 2010000075 A1 WO2010000075 A1 WO 2010000075A1 CH 2008000298 W CH2008000298 W CH 2008000298W WO 2010000075 A1 WO2010000075 A1 WO 2010000075A1
Authority
WO
WIPO (PCT)
Prior art keywords
map
detector
soft
extrinsic
bit
Prior art date
Application number
PCT/CH2008/000298
Other languages
French (fr)
Inventor
Christoph Studer
Andreas Burg
Helmut BÖLCSKEI
Original Assignee
Eth Zurich
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Eth Zurich filed Critical Eth Zurich
Priority to PCT/CH2008/000298 priority Critical patent/WO2010000075A1/en
Publication of WO2010000075A1 publication Critical patent/WO2010000075A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L25/00Baseband systems
    • H04L25/02Details ; arrangements for supplying electrical power along data transmission lines
    • H04L25/03Shaping networks in transmitter or receiver, e.g. adaptive shaping networks
    • H04L25/03006Arrangements for removing intersymbol interference
    • H04L25/03178Arrangements involving sequence estimation techniques
    • H04L25/03203Trellis search techniques
    • H04L25/03242Methods involving sphere decoding
    • HELECTRICITY
    • H03ELECTRONIC CIRCUITRY
    • H03MCODING; DECODING; CODE CONVERSION IN GENERAL
    • H03M13/00Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
    • H03M13/29Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes combining two or more codes or code structures, e.g. product codes, generalised product codes, concatenated codes, inner and outer codes
    • H03M13/2957Turbo codes and decoding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L25/00Baseband systems
    • H04L25/02Details ; arrangements for supplying electrical power along data transmission lines
    • H04L25/06Dc level restoring means; Bias distortion correction ; Decision circuits providing symbol by symbol detection
    • H04L25/067Dc level restoring means; Bias distortion correction ; Decision circuits providing symbol by symbol detection providing soft decisions, i.e. decisions together with an estimate of reliability
    • HELECTRICITY
    • H03ELECTRONIC CIRCUITRY
    • H03MCODING; DECODING; CODE CONVERSION IN GENERAL
    • H03M13/00Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
    • H03M13/03Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words
    • H03M13/05Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words using block codes, i.e. a predetermined number of check bits joined to a predetermined number of information bits
    • H03M13/11Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words using block codes, i.e. a predetermined number of check bits joined to a predetermined number of information bits using multiple parity bits
    • HELECTRICITY
    • H03ELECTRONIC CIRCUITRY
    • H03MCODING; DECODING; CODE CONVERSION IN GENERAL
    • H03M13/00Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
    • H03M13/37Decoding methods or techniques, not specific to the particular type of coding provided for in groups H03M13/03 - H03M13/35
    • H03M13/39Sequence estimation, i.e. using statistical methods for the reconstruction of the original codes
    • H03M13/3905Maximum a posteriori probability [MAP] decoding or approximations thereof based on trellis or lattice decoding, e.g. forward-backward algorithm, log-MAP decoding, max-log-MAP decoding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0045Arrangements at the receiver end
    • H04L1/0047Decoding adapted to other signal detection operation
    • H04L1/0048Decoding adapted to other signal detection operation in conjunction with detection of multiuser or interfering signals, e.g. iteration between CDMA or MIMO detector and FEC decoder
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0045Arrangements at the receiver end
    • H04L1/0047Decoding adapted to other signal detection operation
    • H04L1/005Iterative decoding, including iteration between signal detection and decoding operation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L25/00Baseband systems
    • H04L25/02Details ; arrangements for supplying electrical power along data transmission lines
    • H04L25/03Shaping networks in transmitter or receiver, e.g. adaptive shaping networks
    • H04L25/03006Arrangements for removing intersymbol interference
    • H04L2025/0335Arrangements for removing intersymbol interference characterised by the type of transmission
    • H04L2025/03426Arrangements for removing intersymbol interference characterised by the type of transmission transmission using multiple-input and multiple-output channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L25/00Baseband systems
    • H04L25/02Details ; arrangements for supplying electrical power along data transmission lines
    • H04L25/0202Channel estimation
    • H04L25/024Channel estimation channel estimation algorithms
    • H04L25/0242Channel estimation channel estimation algorithms using matrix methods
    • H04L25/0246Channel estimation channel estimation algorithms using matrix methods with factorisation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L25/00Baseband systems
    • H04L25/02Details ; arrangements for supplying electrical power along data transmission lines
    • H04L25/03Shaping networks in transmitter or receiver, e.g. adaptive shaping networks
    • H04L25/03006Arrangements for removing intersymbol interference
    • H04L25/03171Arrangements involving maximum a posteriori probability [MAP] detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L25/00Baseband systems
    • H04L25/02Details ; arrangements for supplying electrical power along data transmission lines
    • H04L25/03Shaping networks in transmitter or receiver, e.g. adaptive shaping networks
    • H04L25/03006Arrangements for removing intersymbol interference
    • H04L25/03178Arrangements involving sequence estimation techniques
    • H04L25/03184Details concerning the metric
    • H04L25/03197Details concerning the metric methods of calculation involving metrics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L25/00Baseband systems
    • H04L25/02Details ; arrangements for supplying electrical power along data transmission lines
    • H04L25/03Shaping networks in transmitter or receiver, e.g. adaptive shaping networks
    • H04L25/03006Arrangements for removing intersymbol interference
    • H04L25/03178Arrangements involving sequence estimation techniques
    • H04L25/03248Arrangements for operating in conjunction with other apparatus
    • H04L25/03286Arrangements for operating in conjunction with other apparatus with channel-decoding circuitry

Definitions

  • the invention relates to a method and device for branch-and-bound based soft-input soft-output decoding in a multiple-input multiple-output system.
  • MIMO Multiple-input multiple-output
  • the relevant blocks of a MIMO system using an iterative MEVIO detector are shown 20 in Fig. 1.
  • the channel encoder obtains binary-valued information (denoted by the bit vector b) and computes coded bits X jj ,.
  • the MIMO mapper obtains the coded bits and maps them to multi-dimensional data vectors (denoted by s).
  • the iterative MIMO decoder consists of a soft-input soft-output (SISO) detector for MEMO systems and a channel decoder.
  • the SISO detector obtains the received symbol vector 25 (denoted by y), channel state information, and soft-information from an external device (e.g., the channel decoder).
  • the SISO detector computes extrinsic information, e.g., in the form of extrinsic log-likelihood ratios (denoted by L? b ) of the corresponding bits X jJ1 .
  • the channel decoder computes estimates of the data bits (b) and produces a priori information Lf b for SISO detector.
  • the SISO detector can
  • BB-based MIMO detection uses branch-and-bound (BB) techniques.
  • BB-based MIMO detection transforms the MIMO detection problem into a graph-search problem that can efficiently be solved by pruning of unnecessary branches in the graph.
  • Prominent examples of BB-based MIMO detectors are the sphere decoder, k-Best algorithms, or M-algorithms.
  • the present invention relates to a low-complexity method to compute extrinsic soft- outputs using a branch-and-bound (BB) based MIMO detector by processing channel observations and a priori information.
  • BB branch-and-bound
  • the key objective of the described method is to reduce the computational complexity associated with extrinsic soft-output computation.
  • This objective is achieved by a method for generating extrinsic soft-outputs using a branch-and-bound detector in a MIMO system and using path traversal in a graph for identifying a multidimensional transmit vector, said method comprising the steps of a) feeding a priori information L A to the detector, with j and b together specifying a bit in said transmit vector L A and said a priori information comprising values Lf b being indicative of a probability that said bit is 1, b) traversing paths of the graph, each path representing a possible transmit vector, c) for at least part of the nodes x ⁇ of a path being traversed, checking if a pruning criterion B is met, wherein is a partial distance for the node,
  • X MAP j s an es t ⁇ ma te of a most likely transmitted vector, d) and wherein in criterion B a contribution of a priori information Lf b is, for all bits in considered differently depending on if the bit j, b in yfi ) is equal to the bit j, b in x MAP , e) and terminating the traversal of said path if said pruning criterion is met.
  • the method enables to identify influences of the detection algorithm to the final extrinsic soft-output information at an early stage in the detection phase, i.e., already during the BB procedure, and allows to compute the pruning criterion accordingly.
  • this is used for clipping the magnitude of the extrinsic LLRs in or- der to lower the computational complexity of the BB procedure.
  • Fig.1 shows the main building blocks of an iterative MIMO system.
  • the soft- input soft-output MIMO detector computes extrinsic soft-output information using channel observations and a priori information.
  • Fig.2 shows simulation results for the soft-input soft-output single tree-search sphere decoder (SISO STS-SD).
  • the plot illustrates the performance/complexity trade-off of the soft-input soft-output detector depending on the (normalized) extrinsic LLR clipping level (indicated by the numbers next to the curves) and on the number of iterations /, i.e., how many times the detector and decoder are used.
  • Matrices are set in boldface capital letters, vectors in boldface lowercase letters.
  • the 5 superscripts ⁇ and H stand for transpose and conjugate transpose, respectively.
  • ⁇ O ⁇ denotes the cardinality of the set O.
  • the probability of an event Z is denoted by P[Z].
  • MIMO Multiple-input multiple-output
  • s is a multi-dimensional transmit data vector of dimension M ⁇ > 1
  • H is a complex-valued MIMO channel matrix of dimension M R x M ⁇
  • n is a noise vector of dimension M R > 1
  • y is the received data vector of dimension M R .
  • the input-output relation might represent a MIMO wireless communication system.
  • MIMO may also describe channels with inter-symbol interference (ISI) or multiple access (MAC) channels, for example.
  • ISI inter-symbol interference
  • MAC multiple access
  • Soft-Outputs are understood to be any 30 set of values that allows to derive the estimated probabilities or an approximate of a binary-valued random variable.
  • soft-outputs might be log-likelihood ratios (LLRs) according to
  • Soft-Input Soft-Output Soft-input soft-output is understood to be a technique to compute soft-output information using soft-input information and possibly received data.
  • a device e.g., a decoder or a detector
  • Extrinsic information of a binary- valued random variable is understood to contain only new information that has been generated from a soft- input detector. Extrinsic information does not contain the part of information that has been fed into the detector with the exception of the data received through the communication channels. However, the soft-input information fed into the detector is often required to compute new extrinsic information. In the context of iterative de- coding, e.g., extrinsic information corresponds to the information that is exchanged between two or more decoders or detectors. For log-likelihood ratios, extrinsic LLRs are bed as
  • Lf b is the intrinsic information for the bit j, b computed from received data and all available a priori information L A (i.e., Vj, b), Lf b denotes the a priori information of the particular bit j, b, and Lf >b is the extrinsic LLR (soft-output information) of the bit j, b.
  • a branch-and-Bound (BB) detector is understood to be a method to decode digital information that is represented by a graph.
  • the graph consists of nodes and branches. Each path in the graph represents a possible data vector (output). Nodes correspond to partial data vectors. Branches are associated with bits (of part of the data vector) and branch metrics.
  • the BB detector traverses the graph and checks during traversal whether parts of the graph can be pruned. 5 Pruning parts of the graph is performed whenever a pruning criterion is met.
  • the BB detector searches for the most likely transmitted data vector (and eventually associated metrics) and/or data vectors (and/or associated metrics) with particular properties. The traversal in the graph can be stopped if no more parts of the graph are remaining.
  • sphere decoding algorithms are a prominent example of BB-based MIMO detection algorithms and represent the detection problem by a tree and perform the traversal on this tree.
  • Reference System j _- A multiple-input multiple-output (MIMO) system with M ⁇ transmit and M R > M ⁇ receive streams is considered.
  • Each symbol vector (data vector) s is associated with a label vector x containing M T Q binary values
  • H stands for the M R X M T channel matrix
  • y is the M ⁇ -dimensional received signal vector
  • n is an i.i.d. circularly symmetric complex Gaussian distributed 30 M ⁇ -dimensional noise vector with variance N 0 per complex entry.
  • X ⁇ b and X ⁇ b are the sets of symbol vectors that have the bit corresponding to the indices j and b equal to —1 and +1, respectively.
  • a soft-input soft-output MEvIO detector computes intrinsic LLRs according to (4) from the received channel matrix H, the signal vector y, and the a priori probabilities (a priori information) in the form of the a priori LLRs and delivers soft-outputs in the form of extrinsic LLRs
  • N 0 which is associated with the MAP solution (i.e., the metric associated with the most likely transmitted vector) of the MIMO detection problem
  • the solution of (6) and (8) corresponds to the leaf associated with the smallest metric in O M ⁇ and X ⁇ b 3 ' b ' , respectively.
  • the soft- input soft-output single-tree search sphere decoder (SISO STS-SD) uses elements of 30 the Schnorr-Euchner SD with radius reduction [AEVZ02, BBW+05], briefly summarized as follows: The search along paths in the weighted graph (tree) is constrained to nodes which lie within a radius r around y and (tree) traversal is performed depth-first, visiting the children of a given node in ascending order of their
  • a node s ⁇ with PD d 3 can be pruned along with the entire subgraph (subtree) 35 originating from this node, whenever the pruning criterion
  • the functions (14) and (15) can be used to map intrinsic metrics to extrinsic metrics and vice versa.
  • BB detectors are the repeated tree- search (RTS) strategy [WG04] or the single tree-search (STS) strategy [SBB08].
  • RTS repeated tree- search
  • STS single tree-search
  • the main idea of the STS strategy is to use elements of the Schnorr-Euchner sphere decoder and to perform a search the subtree originating from a given node only if the result can lead to an update of either ⁇ MAP or of at least one of the ⁇ ° ⁇
  • the SISO decoder employs the method described in Sec. 6 and maintains a list containing the current MAP hypothesis x MAP , the corresponding metric ⁇ MAP , and all QM T extrinsic metrics ⁇ 6 AP and performs list administration steps. Note that for hardware implementation, this list could be stored directly into a memory.
  • the node s ⁇ ) along with its subtree is pruned if the corresponding PD d( ⁇ ) satisfies the pruning criterion
  • One frame consists of 1024 randomly interleaved (across space and frequency) bits corresponding to one (spatial) OFDM symbol.
  • the SNR in all simulations corresponds to the SNR per receive antenna.
  • the number of using the detector (and the SISO channel decoder) corresponds to the number of iterations /. Fig.
  • a second BB detector which is functionally different from the first BB detector (e.g., uses a different pruning criterion or different distance increments) but might also share the same hardware, can be used.
  • HtB03 the list sphere decoder
  • M-algorithms [dJW05]
  • K-best algorithms [WTCM02].
  • the MAP hypothesis and its counter-hypotheses can also be approximated using linear detection methods or non-linear equalizers (e.g., a decision feedback equalizer).
  • extrinsic max-log LLRs can be computed within the branch- and-bound detection stage.
  • the presented method enables clipping of extrinsic LLRs, which can significantly reduce the computational complexity of the underlying BB

Landscapes

  • Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Probability & Statistics with Applications (AREA)
  • Theoretical Computer Science (AREA)
  • Radio Transmission System (AREA)

Abstract

The computational complexity associated with detection in multiple-input multiple-output (MIMO) systems often dominates the complexity of the MIMO receiver. Soft-input soft-output detection can significantly improve the error rate performance in iterative MEvIO systems. Branch-and-bound (BB) based detection techniques aim at reducing the computational complexity by transforming MIMO detection into a graph-search problem. The method described in this document computes extrinsic information directly in the BB detector to enable extrinsic LLR clipping, which significantly reduces the computational complexity. As an example, we describe the application of the proposed method to the single tree-search sphere decoding algorithm.

Description

Computation of Extrinsic Information in a Branch-and-Bound Detector
5 T E C H N I C A L F I E L D
The invention relates to a method and device for branch-and-bound based soft-input soft-output decoding in a multiple-input multiple-output system.
10 B A C K G R O U N D A RT
Multiple-input multiple-output (MIMO) techniques have emerged in various wireless communication standards due to the high spectral efficiency offered by spatial multiplexing. Iterative detection and decoding can significantly improve the error rate ^ performance of MEMO wireless systems.
1. ITERATIVE MIMO SYSTEMS
The relevant blocks of a MIMO system using an iterative MEVIO detector are shown 20 in Fig. 1. The channel encoder obtains binary-valued information (denoted by the bit vector b) and computes coded bits Xjj,. The MIMO mapper obtains the coded bits and maps them to multi-dimensional data vectors (denoted by s). The iterative MIMO decoder consists of a soft-input soft-output (SISO) detector for MEMO systems and a channel decoder. The SISO detector obtains the received symbol vector 25 (denoted by y), channel state information, and soft-information from an external device (e.g., the channel decoder). The SISO detector computes extrinsic information, e.g., in the form of extrinsic log-likelihood ratios (denoted by L?b) of the corresponding bits XjJ1. The channel decoder computes estimates of the data bits (b) and produces a priori information Lf b for SISO detector. The SISO detector can
30 compute new extrinsic outputs. The number of iterations (i.e., how many times the detector and the channel decoder are used), significantly affects the error rate performance of the iterative MEMO decoder.
35 2. SOFT-INPUT SOFT-OUTPUT MEMO DETECTION
The computation of soft-output information with the use of soft-inputs is a computational complex task and poses significant challenges in practical implementations. One of the most promising candidate for high-performance low-complexity soft- input soft-output MIMO detection is to use branch-and-bound (BB) techniques. The key idea of BB-based MIMO detection is to transform the MIMO detection problem into a graph-search problem that can efficiently be solved by pruning of unnecessary branches in the graph. Prominent examples of BB-based MIMO detectors are the sphere decoder, k-Best algorithms, or M-algorithms.
D I S C L O S U R E O F T H E I N V E N T I O N
The present invention relates to a low-complexity method to compute extrinsic soft- outputs using a branch-and-bound (BB) based MIMO detector by processing channel observations and a priori information.
The key objective of the described method is to reduce the computational complexity associated with extrinsic soft-output computation. This objective is achieved by a method for generating extrinsic soft-outputs using a branch-and-bound detector in a MIMO system and using path traversal in a graph for identifying a multidimensional transmit vector, said method comprising the steps of a) feeding a priori information LA to the detector, with j and b together specifying a bit in said transmit vector LA and said a priori information comprising values Lf b being indicative of a probability that said bit is 1, b) traversing paths of the graph, each path representing a possible transmit vector, c) for at least part of the nodes x^ of a path being traversed, checking if a pruning criterion B is met,
Figure imgf000003_0001
wherein is a partial distance for the node,
X MAP js an esmate of a most likely transmitted vector, d) and wherein in criterion B a contribution of a priori information Lf b is, for all bits in considered differently depending on if the bit j, b in yfi) is equal to the bit j, b in xMAP, e) and terminating the traversal of said path if said pruning criterion is met. The method enables to identify influences of the detection algorithm to the final extrinsic soft-output information at an early stage in the detection phase, i.e., already during the BB procedure, and allows to compute the pruning criterion accordingly. Advantageously, this is used for clipping the magnitude of the extrinsic LLRs in or- der to lower the computational complexity of the BB procedure.
The general method described in this document is applicable to a variety of extrinsic soft-output BB-based MIMO detectors. As an example, we demonstrate the application of said method using a soft-input soft-output single tree-search sphere decoder.
BRIEF DESCRIPTIONS OF DRAWINGS
The invention will be better understood and objects other than those set forth above will become apparent when consideration is given to the following detailed description thereof. Such description makes reference to the annexed drawings, wherein
Fig.1 shows the main building blocks of an iterative MIMO system. The soft- input soft-output MIMO detector computes extrinsic soft-output information using channel observations and a priori information.
Fig.2 shows simulation results for the soft-input soft-output single tree-search sphere decoder (SISO STS-SD). The plot illustrates the performance/complexity trade-off of the soft-input soft-output detector depending on the (normalized) extrinsic LLR clipping level (indicated by the numbers next to the curves) and on the number of iterations /, i.e., how many times the detector and decoder are used.
MODES FOR CARRYING OUT THE INVENTION 3. OUTLINE
In Sec.4, we introduce the notation, provide definitions, and describe the system model. In section Sec.5, we provide a brief review of sphere decoding (SD). Sec.6 introduces the general idea of the method to compute extrinsic LLRs within the BB- based MIMO detector. Sec.7 illustrates the application of the described method using a single tree-search (STS) sphere decoder. Simulation results are shown in Sec.8. Further comments are given in Sec.9 and conclusions are given in Sec.10. 4. NOTATION, DEFINITIONS, AND SYSTEM MODEL
4.1. Notation
Matrices are set in boldface capital letters, vectors in boldface lowercase letters. The 5 superscripts τ and H stand for transpose and conjugate transpose, respectively. We write Ai:j for the entry in the ith row and jth column of the matrix A and b{ for the ith entry of the vector b = [6X 62 • • • b^ }τ- IN denotes the N x N identity matrix. We call an N x M matrix A, where N > M, satisfying A-^A = IM. unitary. \O\ denotes the cardinality of the set O. The probability of an event Z is denoted by P[Z]. x is the binary complement of £ G {+1, —1}, i.e., x = —x.
4.2. Definitions
In the context of the present applications and claims, the following definitions are used.
15
MIMO Multiple-input multiple-output (MIMO) is understood to be a communication system that can be described by a linear input-output relation according to
20 y = Hs + n
wherein s is a multi-dimensional transmit data vector of dimension Mτ > 1, H is a complex-valued MIMO channel matrix of dimension MR x Mτ, n is a noise vector of dimension MR > 1, and y is the received data vector of dimension MR. In par- „<. ticular, the input-output relation might represent a MIMO wireless communication system. However, MIMO may also describe channels with inter-symbol interference (ISI) or multiple access (MAC) channels, for example.
Soft-Outputs Soft-outputs (soft-output information) are understood to be any 30 set of values that allows to derive the estimated probabilities or an approximate of a binary-valued random variable. In particular, soft-outputs might be log-likelihood ratios (LLRs) according to
_ . /P[z = +1]\ where the binary-valued random variable x takes on values from the set {+1, -1} and b denotes the basis of the logarithm. If the basis b is omitted, the natural logarithm, i.e., with b = e, is assumed. However, it might, e.g., also be that soft-output information can also be represented as the ratio of probabilities
P[x = -1] or the difference of probabilities
D = P[x = +1] - P[x = -I] .
Soft-Input Soft-Output Soft-input soft-output (SISO) is understood to be a technique to compute soft-output information using soft-input information and possibly received data. In particular, it may describe a device (e.g., a decoder or a detector) that obtains soft-input information in the form of a priori LLRs and computes either intrinsic or extrinsic soft-output LLRs, for example.
Extrinsic Information Extrinsic information of a binary- valued random variable is understood to contain only new information that has been generated from a soft- input detector. Extrinsic information does not contain the part of information that has been fed into the detector with the exception of the data received through the communication channels. However, the soft-input information fed into the detector is often required to compute new extrinsic information. In the context of iterative de- coding, e.g., extrinsic information corresponds to the information that is exchanged between two or more decoders or detectors. For log-likelihood ratios, extrinsic LLRs are denned as
T B _ r D T A
where Lfb is the intrinsic information for the bit j, b computed from received data and all available a priori information LA (i.e., Vj, b), Lf b denotes the a priori information of the particular bit j, b, and Lf>b is the extrinsic LLR (soft-output information) of the bit j, b.
Branch-and-Bound Detector A branch-and-bόund (BB) detector is understood to be a method to decode digital information that is represented by a graph. The graph consists of nodes and branches. Each path in the graph represents a possible data vector (output). Nodes correspond to partial data vectors. Branches are associated with bits (of part of the data vector) and branch metrics. The BB detector traverses the graph and checks during traversal whether parts of the graph can be pruned. 5 Pruning parts of the graph is performed whenever a pruning criterion is met. During graph-traversal, the BB detector searches for the most likely transmitted data vector (and eventually associated metrics) and/or data vectors (and/or associated metrics) with particular properties. The traversal in the graph can be stopped if no more parts of the graph are remaining. In particular, sphere decoding algorithms are a prominent example of BB-based MIMO detection algorithms and represent the detection problem by a tree and perform the traversal on this tree.
4.3. Reference System j _- A multiple-input multiple-output (MIMO) system with Mτ transmit and MR > Mτ receive streams is considered. The coded bit-stream to be transmitted is mapped to (a sequence of) Mτ-dimensional transmit symbol vectors s G o, where O stands for the underlying complex scalar constellation and \O\ = 2Q. Each symbol vector (data vector) s is associated with a label vector x containing MTQ binary values
20 chosen from the set {+1, —1} where the null element (0 in binary logic) of GF(2) corresponds to +1. The corresponding bits are denoted by x^, where the indices j and b refer to the bth bit in the binary label of the jth entry of the symbol vector s = [si S2 • • • s ]τ. The associated complex baseband input-output relation is given by
25
(1) y = Hs + n
where H stands for the MR X MT channel matrix, y is the Mβ-dimensional received signal vector, and n is an i.i.d. circularly symmetric complex Gaussian distributed 30 Mβ-dimensional noise vector with variance N0 per complex entry.
35 5. SOFT-INPUT SOFT-OUTPUT SPHERE DECODING
5.1. Max-Log LLR Computation as a Tree Search
Coherent SISO detection for MIMO systems requires computation of soft-outputs in 5 the form of LLRs [HtB(B]
Figure imgf000008_0001
for all bits j = 1, 2, . . . , Mτ, b = 1, 2, . . . , Q, in the label x. Transforming (2) into a tree-search problem and, for example, using the sphere decoding algorithm, e.g., [FP85, SE94, BBW+05, SBB08], allows efficient computation of the LLRs. To this end, the channel matrix H is first QR-decomposed according to H = QR, where the MR x MT matrix Q is unitary and the Mτ x Mτ upper-triangular matrix j 5 R has real-valued positive entries on its main diagonal. Left-multiplying (1) by QH leads to the modified input-output relation
(3) y = Rs + QHn
_„ where y = Q^y. Noting that Q^n is also i.i.d. circularly symmetric complex
Gaussian and using the max-log approximation on (2) leads to the intrinsic max-log LLRs [HtB(B]
Figure imgf000008_0002
where X^ b and X^ b are the sets of symbol vectors that have the bit corresponding to the indices j and b equal to —1 and +1, respectively.
In the following, we consider an iterative MIMO decoder as depicted in Fig. 1, where a soft-input soft-output MEvIO detector computes intrinsic LLRs according to (4) from the received channel matrix H, the signal vector y, and the a priori probabilities (a priori information) in the form of the a priori LLRs
Figure imgf000008_0003
and delivers soft-outputs in the form of extrinsic LLRs
to a subsequent SISO channel decoder. Slightly abusing our notation, we define the set that contains all a priori information belonging to a symbol vector, i.e., lA for j = 1, 2, . . . , Mτ and b = 1, 2, . . . , Q, as ZΛ
For each bit, one of the two minima in (4) corresponds to
(6) λ MAP ^ -Uly - RsMAP 2 - log P[sMApT
N0 which is associated with the MAP solution (i.e., the metric associated with the most likely transmitted vector) of the MIMO detection problem
(7) sMAP = arg mm ( -U|y - Rs||2 - log P[s] ) . ss6£θθMMrτ 1 1^o J
The other minimum in (4) can be computed as
Figure imgf000009_0001
where the (bit-wise) counter-hypothesis x^p to the MAP hypothesis denotes the binary complement of the 6th bit in the label of the jth entry of sMAP. With the definitions (6) and (8), the intrinsic max-log LLRs in (4) can be written (Vj, b) in com- pact form as I
Figure imgf000009_0002
We can therefore conclude that efficient max-log optimal soft-input soft-output MIMO detection reduces to efficiently identifying sMAP, λMAP (Vj, b).
We next define the partial symbol vectors (PSVs)
Figure imgf000009_0003
■ ■ ■ SMT ]Γ and note that they can be arranged in a tree that has its root just above level j = Mτ and leaves, on level j = 1, which correspond to symbol vectors s. The binary- valued label vector associated with sw will be denoted by x(j). The distances
d(S) = -U|y - Rs||2 - logP[s]
in (6) and (8) can be computed recursively if the individual symbols S3 (j = 1, 2, , . , MT) satisfy P[s] = JT^ P[s3]. In this case, we have
Figure imgf000010_0001
which can be evaluated recursively as d(s) = d\, with the partial distances (PDs)
d0 = dJ+1 + Ie3 ] , j = Mτ, Mr - 1, . . . , 1,
, <- the initialization d+i — 0, and the distance increments (DIs)
(10)
N0 yj - logpy .
Figure imgf000010_0002
The dependence of the PDs d3 on the symbol vector s is only through the PSV s ω
20
Thus, the MAP detection problem and the computation of the max-log MAP intrinsic LLRs has been transformed into a path traversal in a graph (or tree in this particular example): PSVs and PDs are associated with nodes, branches correspond to DIs. For brevity, we shall often say "the node s^" to refer to the node corre- 25 sponding to the PSV Φ\ We shall furthermore use d(s^) and cϋ(x^) interchangeably to denote d3. Each path from the root node down to a leaf node corresponds to a symbol vector s G O . The solution of (6) and (8) corresponds to the leaf associated with the smallest metric in O and X^b 3'b ' , respectively. The soft- input soft-output single-tree search sphere decoder (SISO STS-SD) uses elements of 30 the Schnorr-Euchner SD with radius reduction [AEVZ02, BBW+05], briefly summarized as follows: The search along paths in the weighted graph (tree) is constrained to nodes which lie within a radius r around y and (tree) traversal is performed depth-first, visiting the children of a given node in ascending order of their
PDs. A node s^ with PD d3 can be pruned along with the entire subgraph (subtree) 35 originating from this node, whenever the pruning criterion
(11) dj ≥ r2
is met. In order to avoid the problem of choosing a suitable starting radius, we initialize the algorithm with r = oo and perform the update r2 <— d(s) whenever a valid leaf node s has been reached. The complexity measure of BB -based MIMO . detectors usually corresponds to the number of nodes visited by the decoder including the leaves, but excluding the root. 0
6. DIRECT COMPUTATION OF EXTRINSIC LLRS
Due to the large dynamic range of LLRs, fixed-point implementations need to constrain the magnitude of the LLR values to enable fixed-point hardware implemen- - tation. Evidently, clipping of the LLR magnitude leads to a degradation in terms of error rate performance. It has been noted in [YeeO5, SBB08] that incorporating LLR clipping into the graph-traversal (or tree search) is very effective in terms of reducing complexity of max-log based soft-output sphere decoding. In addition, as demonstrated in [SBB08], LLR clipping, when built into the tree search also allows0 to tune the decoding algorithm in terms of complexity versus performance by adjusting the clipping level. In the soft-input soft-output case, we are ultimately interested in the extrinsic LLRs Lf b and clipping should therefore ensure that
Figure imgf000011_0001
< Lmax (Vj, b). Note that soft-output detectors usually derive intrinsic LLRs L® b first and then compute extrinsic LLRs after the BB procedure using (5). 5 In order to enable clipping of the extrinsic LLRs, the BB detector needs to employ am method to directly compute extrinsic LLRs in the graph-search procedure. To this end, we start by writing the extrinsic max-log LLRs as Λ MAP \ MAP MAP , 1
Λi,& ~ λ ' xj,b - +1
\ MAP Λ MAP -MAP _ i
where the quantities \ MAP _ Γ A -MAP _ . I \ MAP , r A ,JVIAP _ I Λj,b + ^,b > Xj,b - ~ l will be referred to as the extrinsic metrics. For the following developments it will be convenient to define a function /(•) that transforms an intrinsic metric λ with associated a priori LLR LΛ and binary label x to an extrinsic metric Λ according to
With this notation, we can rewrite (13) more compactly as Λ)f6 AP = / fcAP, Lffi, xfb AP) .
The inverse function of (14) transforms an extrinsic metric Λ to an intrinsic metric λ and is denned as
Figure imgf000012_0001
The key idea of the proposed method is to compute (12) instead of (9) directly within the BB detector, which requires to search for the MAP solution xMAP, its metric λMAP, as well as all extrinsic metrics Λ^6 AP (j = 1, 2, . . . , Mτ, b = 1, 2, . . . , Q). In order to obtain the pruning criterion or to compute branch-metrics, the functions (14) and (15) can be used to map intrinsic metrics to extrinsic metrics and vice versa.
To obtain (or approximate) the MAP solution (and its metric) as well as all counter-hypotheses, a variety of BB algorithms, linear detectors, and non-linear detectors exist [PNG03]. Prominent examples of BB detectors are the repeated tree- search (RTS) strategy [WG04] or the single tree-search (STS) strategy [SBB08]. In the following sections, the method is illustrated with the aid of the STS strategy.
7. EXTRINSIC LLR COMPUTATION WITH THE SISO STS-SD
We emphasize that BB-based MDVIO detection using the method described in the previous section directly leads to (clipped) extrinsic LLRs Lf b (Vj, b) in (12) rather than to intrinsic ones (9).
7.1. List Administration
The main idea of the STS strategy is to use elements of the Schnorr-Euchner sphere decoder and to perform a search the subtree originating from a given node only if the result can lead to an update of either λMAP or of at least one of the Λ^°\ The SISO decoder employs the method described in Sec. 6 and maintains a list containing the current MAP hypothesis xMAP, the corresponding metric λMAP, and all QMT extrinsic metrics Λ¥6 AP and performs list administration steps. Note that for hardware implementation, this list could be stored directly into a memory. The algorithm can be initialized with λMAP = Λ^AP = oo (Vj, b) or with values that have been computed based on, e.g., previous detection runs or channel state information. Whenever a leaf with corresponding label x has been reached, the decoder distin- 5 guishes between two cases (list administration steps):
7.2. i) MAP Hypothesis Update
If d(x) < λMAP, a new MAP hypothesis has been found. First, all extrinsic metrics Λ^6 AP for which xjib = x™AF are updated according to
A MAP , J- Λ MAP T A ,JVIAP \ Aj,b *~ / ^A > Lj,b> Xj,b J
followed by the updates λMAP <— d(x) and χMAP <— x. In other words, for each bit in the MAP hypothesis that is changed in the update process, the metric associated with the former MAP hypothesis becomes the extrinsic metric of the new counter- hypothesis.
7.3. ii) Extrinsic Metric Update
20 In the case where d(x) > λMAP, only extrinsic metrics corresponding to counter- hypotheses might be updated. For each j — 1, 2., . . . , Mτ, b = 1, 2, . . . , Q with Xjtb = xfAP and whenever /(φc), Lfb, xfAP) < Λ$°\ the SISO STS-SD performs the update
Figure imgf000013_0001
7.4. Extrinsic LLR Clipping
In order to ensure that the extrinsic LLRs delivered by the algorithm indeed satisfy 30 < Lmax (Vj, b), the following update rule
, λ Λ MAP + , L r max \>, V VJjA, oh
Figure imgf000013_0002
has to be applied after carrying out the steps in Case i) of the list administration 35 steps described before. We emphasize that for L,mΑX = oo the decoder attains max- log optimal SISO performance, whereas for Lmax — 0, only the hard-output MAP solution (7) is found. Note that the detector can also reduce the magnitude of at least a part of the
Λ^6 AP or of λMAP whenever a new xMAP is found, in order to impose constraints on the resulting extrinsic LLRs.
5 7.5. The Pruning Criterion
Consider the node s^ on level j corresponding to the label bits x^ {i = j, i + 1, . . . , M7-, 6 = 1, 2, . . . , Q). Assume that the subtree originating from this node and corresponding to the label bits x^b (i = l, 2, . . . , j — l, b = 1, 2, . . . , Q) has not been expanded yet. The pruning criterion for the node s^ along with its subtree is compiled from two sets, defined as follows:
1) The bits in the partial label
Figure imgf000014_0001
s^ are compared with the corresponding bits in the label of the current MAP hypothesis. All extrinsic metrics Λ^6 AP with Xjtb = x^b AP found in this comparison, may be affected ^ when searching the subtree originating from s^\ As d(pό^) is an intrinsic metric, the extrinsic metrics Λ^6 AP need to be mapped to an intrinsic measure according to (15). The resulting set of intrinsic metrics, which may be affected by an update, are given by
Figure imgf000014_0002
2) The extrinsic metrics Λ^6 AP foτ i = l, 2, . . . , j — l, b = l, 2, . . . , Q corresponding 25 to the counter-hypotheses in the subtree of s^ may be affected as well. Correspondingly, we define
(19) Λ(x)
Figure imgf000014_0003
| i < j,V&}.
30 In summary, the intrinsic metrics which may be affected during the search in the subtree emanating from node s^ are given by the union of the sets (18) and (19) according to Λ(xij)) = {en} = A1 (xω) LJ .42(x^). The node sϋ) along with its subtree is pruned if the corresponding PD d(χ^) satisfies the pruning criterion
35 (20) d(xω) > max, α,. This pruning criterion ensures that a given node and the entire subtree originating from that node are explored only if this could lead to an update of either λMAP or of at least one of the extrinsic metrics Λ^6 AP.
8. SIMULATION RESULTS
The simulation results are for a convolutionally encoded (rate 1/2, generator polynomials [133O 17I0], and constraint length 7) iterative MIMO-OFDM system using Mτ = MR = 4, 16-QAM symbol constellation with Gray labeling, 64 OFDM tones, a TGn type C channel model [E+04], and are based on a max-log BCJR channel decoder. One frame consists of 1024 randomly interleaved (across space and frequency) bits corresponding to one (spatial) OFDM symbol. The SNR in all simulations corresponds to the SNR per receive antenna. The number of using the detector (and the SISO channel decoder) corresponds to the number of iterations /. Fig. 2 shows the performance/complexity trade-off of the SISO STS-SD (using sorted QR decomposition) employing the method of incorporating extrinsic LLR computation in combination with extrinsic LLR clipping as described in the previous sections. Reducing the LLR clipping level also reduces the complexity of the decoder. Increasing the number of iterations I improves, in general, the SNR operating point. We emphasize however, that the trade-off between (tree-search) complexity and error rate performance can be adjusted with the extrinsic LLR clipping parameter Lmax and the number of iterations /. This enables to choose (e.g., with the aid of the corresponding simulation results) the most efficient combination of Lmax and / in order to optimize the performance/complexity trade-off of the iterative MIMO decoder.
9. FURTHER COMMENTS
9.1. Comment 1
Note that in the above example, we have used (20) as pruning criterion. However, in general, any suitable pruning criterion of the form
J3(d(x^), LA, x« , xMAP)
can be used, wherein in criterion B the contribution of a priori information Lf b is, for all bits in x, considered differently depending on if the bit j, b in x^ is equal to the bit j, 6 in χMAP is to be interpreted such that the influence of Lf b on the result of B depends on if Xj:b — x^b or Xjj, Φ ^Ap ■ However, this is of course not applicable for the bits xi}b for i — j — 1, j — 2, . . . , 1, b = 1, 2, . . . , Q. For those bits, different criteria depending on χMAP might be applied. 5
9.2. Comment 2
In the above example, we have computed (12) using a single-tree-search algorithm. However, in general, any suitable detector can be used to obtain or approximate xMAP, its metric λMAP, as well as all extrinsic metrics Λgp (J = 1, 2, . . . , Mτ, b = 1, 2, . . . , Q). To this end, a second BB detector, which is functionally different from the first BB detector (e.g., uses a different pruning criterion or different distance increments) but might also share the same hardware, can be used. Possible BB algorithms to approximate xMAP, its metric λMAP, as well as all extrinsic metrics .. A.γb AP (J — 1, 2, . . . , MT, b = 1, 2, . . . , Q) are, for example, the list sphere decoder [HtB03], M-algorithms [dJW05], K-best algorithms [WTCM02]. Furthermore, the MAP hypothesis and its counter-hypotheses can also be approximated using linear detection methods or non-linear equalizers (e.g., a decision feedback equalizer).
20 10. CONCLUSIONS
We have shown how extrinsic max-log LLRs can be computed within the branch- and-bound detection stage. The presented method enables clipping of extrinsic LLRs, which can significantly reduce the computational complexity of the underlying BB
„ - algorithm.
In this document, we provided an example for the application of the method to a soft-input soft-output single tree search sphere decoding algorithm. However, it is noted that the same method can also be performed within a variety of BB-based MIMO detection algorithms. In particular, the method is applicable to various vari-
30 ants of the sphere decoding algorithm.
While there are shown and described presently preferred embodiments of the invention, it is to be distinctively understood that the invention is not limited thereto but may otherwise variously embodied and practiced within the scope of the claims.
35 REFERENCES
[AEVZ02] Erik Agrell, Thomas Eriksson, Alexander Vardy, and Kenneth Zeger.
Closest point search in lattices. IEEE Transactions on Information Theory, 48(8):2201-2214, August 2002.
[BBW+05] A. Burg, M. Borgmann, M. Wenk, M. Zellweger, W. Fichtner, and
H. Bδlcskei. VLSI implementation of MIMO detection using the sphere decoder algorithm. IEEE Journal of Solid-State Circuits, 40(7): 1566- 1577, July 2005.
[dJW05] Y.L.C. de Jong and TJ. Willink. Iterative tree search detection for MIMO wireless systems. IEEE Transactions on Communications, 53(6):930— 935, June 2005.
[E+ 04] V. Erceg et al. TGn channel models, May 2004. IEEE 802.11 document 03/940r4.
[FP85] U. Fincke and M. Pohst. Improved methods for calculating vectors of short length in a lattice, including a complexity analysis. Mathematics of Computation, 44:463-471, April 1985.
[HtB03] Bertrand M. Hochwald and Stephan ten Brink. Achieving near-capacity on a multiple-antenna channel. IEEE Transactions on Communications, 51(3):389-399, March 2003.
[PNG03] A. Paulraj, R. Nabar, and D. Gore, editors. Introduction to Space-Time Wireless Communications. Cambridge Univ. Press, 2003.
[SBB08] C. Studer, A. Burg, and H. Bδlcskei. Soft-output sphere decoding: Algorithms and VLSI implementation. IEEE Journal on Selected Areas in Communications, 26(2), February 2008.
[SE94] C. P. Schnorr and M. Euchner. Lattice basis reduction: Improved practical algorithms and solving subset sum probl ems. Math. Programming, 66(2):181-191, September 1994.
[WG04] R. Wang and G. B. Giannakis. Approaching MIMO channel capacity with reduced-complexity soft sphere .decoding. In Proc. of IEEE Wireless Communications and Networking Conf. (WCNC), volume 3, pages 1620- 1625, March 2004. [WTCM02] Kwan-wai Wong, Chi-ying Tsui, Roger S.-K. Cheng, and Wai-ho Mow. A VLSI architecture of a K-Best lattice decoding algorithm for MIMO channels. In IEEE International Symposium on Circuits and Systems (ISCAS), volume 3, pages 273-276, Scottsdale, Arizona, May 2002.
[YeeO5] Mong Suan Yee. Max-Log-Map sphere decoder. In Proc. IEEE ICASSP
2005, volume 3, pages 1013-1016, March 2005.

Claims

C L A I M S
1. A method for generating extrinsic soft-outputs using a branch-and-bound detector in a MIMO system and using path traversal in a graph for identifying a multi- dimensional transmit vector x, said method comprising the steps of a) feeding a priori information LA to the detector, with j and b together specifying a bit in said transmit vector and said a priori information comprising values LA b being indicative of a probability that said bit (j, b) is 1, b) traversing paths of the graph, each path representing a possible transmit vector, c) for at least part of the nodes x.^ of a path being traversed, checking if a pruning criterion B is met,
Figure imgf000019_0001
wherein d(x^) is a partial distance for the node,
X MAP js an estimate of a most likely transmitted vector, d) and wherein in criterion B a contribution of a priori information LA b is, for all bits in
Figure imgf000019_0002
is equal to the bit j, b in xMAP, e) and terminating the traversal of said path if said pruning criterion is met.
2. The method of claim 1 wherein the detector is a soft-input soft-output detector for multiple-input multiple-output systems.
3. The method of any of the preceding claims where the soft-input soft-output detector is a sphere decoder.
4. The method of any of the preceding claims comprising the calculation of said extrinsic soft-outputs Lf b (Vj, 6) according to
Figure imgf000019_0003
wherein
XUAP js at associated with the bit j, b in x .1MAP λMAP is a metric associated with the most likely transmitted vector, and Λ^b AP is an extrinsic metric associated with a counter-hypothesis of χ¥b AP and with LA- h.
5. The method of claim 4 where the detector stores xMAP, λMAP and all Λ^6 AP in a m meemmoorryv..
6. The methods of any of the claims 4 or 5 where the detector reduces the magnitude of at least a part of the Λ^6 AP or of λMAP whenever a new χMAP is found.
10 7. The method of claim 6, where the Λ^6 AP are being updated after finding a new λMAP or change in Λ^b AP according to
Λ A Mj)6AP < .— _ m_m• / < A Λ jMbAP , λ X MAP
Figure imgf000020_0001
15 wherein Lmax is an extrinsic log-likelihood ratio clipping parameter.
8. The method of any of the claims 4-7, where xMAP, λMAP or at least parts of y^MAP ^6 being approximated using a second branch-and-bound detector, ™ a linear detector, or a decision feedback equalizer.
9. The method of any of the claims 4-8, wherein a list at least of said values xMAP, λMAP, and Λ^b AP is maintained by means of repetitive list administration steps
25 corresponding to
Figure imgf000020_0002
or
T A rMApNl
Figure imgf000020_0003
wherein a function / maps intrinsic metrics to extrinsic metrics according to 35
/(λ) L '^ = I A + ^1 x = ~l and said list administration steps are performed depending on a condition basing on at least said x, d(x), xMAP, or Lfb.
10. The method of any of the preceding claims where the detector is operated in iterations for computation of soft-outputs and where Lraax and a number of iterations / are chosen to optimize a performance/complexity trade-off of the detector.
11. Any of the preceding claims, where said pruning criterion B is
Figure imgf000021_0001
wherein Λ(pόj^) is a set comprising a selection of the metrics λMAP using Lf b as said step d).
12. The method of claim 11 where the said set A(^) corresponds to a union of the sets
A1 (xω)
Figure imgf000021_0002
<T ) }
and
Figure imgf000021_0003
wherein a;,' 6 is a bit associated with the bit j, b in x^ and a function / l that maps extrinsic metrics to intrinsic metrics according to
13. A device comprising means for carrying out the method of one or more of the preceding claims.
PCT/CH2008/000298 2008-07-03 2008-07-03 Computation of extrinsic information in a branch-and-bound detector WO2010000075A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CH2008/000298 WO2010000075A1 (en) 2008-07-03 2008-07-03 Computation of extrinsic information in a branch-and-bound detector

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CH2008/000298 WO2010000075A1 (en) 2008-07-03 2008-07-03 Computation of extrinsic information in a branch-and-bound detector

Publications (1)

Publication Number Publication Date
WO2010000075A1 true WO2010000075A1 (en) 2010-01-07

Family

ID=40790465

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CH2008/000298 WO2010000075A1 (en) 2008-07-03 2008-07-03 Computation of extrinsic information in a branch-and-bound detector

Country Status (1)

Country Link
WO (1) WO2010000075A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014082487A1 (en) * 2012-11-29 2014-06-05 中兴通讯股份有限公司 Method and apparatus for soft output fixed complexity sphere decoding detection
CN106357367A (en) * 2016-07-15 2017-01-25 北京邮电大学 Non-coherent joint detecting and channel decoding method under massive MIMO (multiple input multiple output) system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1521414A1 (en) * 2003-10-03 2005-04-06 Kabushiki Kaisha Toshiba Method and apparatus for sphere decoding
EP1545082A2 (en) * 2003-12-17 2005-06-22 Kabushiki Kaisha Toshiba Signal decoding methods and apparatus
US20070286313A1 (en) * 2006-03-31 2007-12-13 Bce Inc. Parallel soft spherical mimo receiver and decoding method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1521414A1 (en) * 2003-10-03 2005-04-06 Kabushiki Kaisha Toshiba Method and apparatus for sphere decoding
EP1545082A2 (en) * 2003-12-17 2005-06-22 Kabushiki Kaisha Toshiba Signal decoding methods and apparatus
US20070286313A1 (en) * 2006-03-31 2007-12-13 Bce Inc. Parallel soft spherical mimo receiver and decoding method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
LI WANG ET AL: "Apriori-LLR-Threshold-Assisted K-Best Sphere Detection for MIMO Channels", VEHICULAR TECHNOLOGY CONFERENCE, 2008. VTC SPRING 2008. IEEE, IEEE, PISCATAWAY, NJ, USA, 11 May 2008 (2008-05-11), pages 867 - 871, XP031255652, ISBN: 978-1-4244-1644-8 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014082487A1 (en) * 2012-11-29 2014-06-05 中兴通讯股份有限公司 Method and apparatus for soft output fixed complexity sphere decoding detection
US9356733B2 (en) 2012-11-29 2016-05-31 Zte Corporation Method and apparatus for soft output fixed complexity sphere decoding detection
CN106357367A (en) * 2016-07-15 2017-01-25 北京邮电大学 Non-coherent joint detecting and channel decoding method under massive MIMO (multiple input multiple output) system

Similar Documents

Publication Publication Date Title
Larsson MIMO detection methods: How they work [lecture notes]
Studer et al. Soft–input soft–output single tree-search sphere decoding
JP5395099B2 (en) Adaptive forward-backward soft output M-algorithm receiver structure
US20070201632A1 (en) Apparatus, method and computer program product providing a mimo receiver
US20090296842A1 (en) Soft output m-algorithm receiver structures with generalized survivor selection criteria for mimo systems
US20070121753A1 (en) Wireless communications apparatus
Yoon et al. Low-complexity MIMO detection based on belief propagation over pairwise graphs
WO2007104169A1 (en) Method for decoding digital information encoded with a channel code
US20080123764A1 (en) Wireless communications apparatus
EP1912396A2 (en) Wireless communications apparatus
Studer et al. Soft-input soft-output sphere decoding
Chen et al. Optimal receiver design for SCMA system
Milliner et al. CTH09-4: A lattice-reduction-aided soft detector for multiple-input multiple-output channels
CN100561901C (en) The multi-antenna orthogonal frequency division multiplexing system soft in and soft out detection method of low complex degree
WO2010000076A1 (en) Modified distance-increments for branch-and-bound detection
WO2010000075A1 (en) Computation of extrinsic information in a branch-and-bound detector
Shieh et al. Low-complexity soft-output sphere decoding with modified repeated tree search strategy
Ling et al. Variants of the lll algorithm in digital communications: Complexity analysis and fixed-complexity implementation
Prasad et al. Optimally efficient max-log APP demodulation in MIMO systems
Mennenga et al. Iterative soft-in soft-out sphere detection for MIMO systems
Zimmermann et al. A parallel smart candidate adding algorithm for soft-output MIMO detection
Xu et al. A low-complexity solution to decode diversity-oriented block codes in MIMO systems with inter-symbol interference
Wang et al. MMSE soft-interference-cancellation aided iterative center-shifting K-best sphere detection for MIMO channels
Milliner et al. A framework for fixed complexity breadth-first MIMO detection
Tomashevich et al. Detection performance of MIMO unique word OFDM

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08757291

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 08757291

Country of ref document: EP

Kind code of ref document: A1