WO2010000075A1 - Computation of extrinsic information in a branch-and-bound detector - Google Patents
Computation of extrinsic information in a branch-and-bound detector Download PDFInfo
- Publication number
- WO2010000075A1 WO2010000075A1 PCT/CH2008/000298 CH2008000298W WO2010000075A1 WO 2010000075 A1 WO2010000075 A1 WO 2010000075A1 CH 2008000298 W CH2008000298 W CH 2008000298W WO 2010000075 A1 WO2010000075 A1 WO 2010000075A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- map
- detector
- soft
- extrinsic
- bit
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L25/00—Baseband systems
- H04L25/02—Details ; arrangements for supplying electrical power along data transmission lines
- H04L25/03—Shaping networks in transmitter or receiver, e.g. adaptive shaping networks
- H04L25/03006—Arrangements for removing intersymbol interference
- H04L25/03178—Arrangements involving sequence estimation techniques
- H04L25/03203—Trellis search techniques
- H04L25/03242—Methods involving sphere decoding
-
- H—ELECTRICITY
- H03—ELECTRONIC CIRCUITRY
- H03M—CODING; DECODING; CODE CONVERSION IN GENERAL
- H03M13/00—Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
- H03M13/29—Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes combining two or more codes or code structures, e.g. product codes, generalised product codes, concatenated codes, inner and outer codes
- H03M13/2957—Turbo codes and decoding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L25/00—Baseband systems
- H04L25/02—Details ; arrangements for supplying electrical power along data transmission lines
- H04L25/06—Dc level restoring means; Bias distortion correction ; Decision circuits providing symbol by symbol detection
- H04L25/067—Dc level restoring means; Bias distortion correction ; Decision circuits providing symbol by symbol detection providing soft decisions, i.e. decisions together with an estimate of reliability
-
- H—ELECTRICITY
- H03—ELECTRONIC CIRCUITRY
- H03M—CODING; DECODING; CODE CONVERSION IN GENERAL
- H03M13/00—Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
- H03M13/03—Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words
- H03M13/05—Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words using block codes, i.e. a predetermined number of check bits joined to a predetermined number of information bits
- H03M13/11—Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words using block codes, i.e. a predetermined number of check bits joined to a predetermined number of information bits using multiple parity bits
-
- H—ELECTRICITY
- H03—ELECTRONIC CIRCUITRY
- H03M—CODING; DECODING; CODE CONVERSION IN GENERAL
- H03M13/00—Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
- H03M13/37—Decoding methods or techniques, not specific to the particular type of coding provided for in groups H03M13/03 - H03M13/35
- H03M13/39—Sequence estimation, i.e. using statistical methods for the reconstruction of the original codes
- H03M13/3905—Maximum a posteriori probability [MAP] decoding or approximations thereof based on trellis or lattice decoding, e.g. forward-backward algorithm, log-MAP decoding, max-log-MAP decoding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/004—Arrangements for detecting or preventing errors in the information received by using forward error control
- H04L1/0045—Arrangements at the receiver end
- H04L1/0047—Decoding adapted to other signal detection operation
- H04L1/0048—Decoding adapted to other signal detection operation in conjunction with detection of multiuser or interfering signals, e.g. iteration between CDMA or MIMO detector and FEC decoder
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/004—Arrangements for detecting or preventing errors in the information received by using forward error control
- H04L1/0045—Arrangements at the receiver end
- H04L1/0047—Decoding adapted to other signal detection operation
- H04L1/005—Iterative decoding, including iteration between signal detection and decoding operation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L25/00—Baseband systems
- H04L25/02—Details ; arrangements for supplying electrical power along data transmission lines
- H04L25/03—Shaping networks in transmitter or receiver, e.g. adaptive shaping networks
- H04L25/03006—Arrangements for removing intersymbol interference
- H04L2025/0335—Arrangements for removing intersymbol interference characterised by the type of transmission
- H04L2025/03426—Arrangements for removing intersymbol interference characterised by the type of transmission transmission using multiple-input and multiple-output channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L25/00—Baseband systems
- H04L25/02—Details ; arrangements for supplying electrical power along data transmission lines
- H04L25/0202—Channel estimation
- H04L25/024—Channel estimation channel estimation algorithms
- H04L25/0242—Channel estimation channel estimation algorithms using matrix methods
- H04L25/0246—Channel estimation channel estimation algorithms using matrix methods with factorisation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L25/00—Baseband systems
- H04L25/02—Details ; arrangements for supplying electrical power along data transmission lines
- H04L25/03—Shaping networks in transmitter or receiver, e.g. adaptive shaping networks
- H04L25/03006—Arrangements for removing intersymbol interference
- H04L25/03171—Arrangements involving maximum a posteriori probability [MAP] detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L25/00—Baseband systems
- H04L25/02—Details ; arrangements for supplying electrical power along data transmission lines
- H04L25/03—Shaping networks in transmitter or receiver, e.g. adaptive shaping networks
- H04L25/03006—Arrangements for removing intersymbol interference
- H04L25/03178—Arrangements involving sequence estimation techniques
- H04L25/03184—Details concerning the metric
- H04L25/03197—Details concerning the metric methods of calculation involving metrics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L25/00—Baseband systems
- H04L25/02—Details ; arrangements for supplying electrical power along data transmission lines
- H04L25/03—Shaping networks in transmitter or receiver, e.g. adaptive shaping networks
- H04L25/03006—Arrangements for removing intersymbol interference
- H04L25/03178—Arrangements involving sequence estimation techniques
- H04L25/03248—Arrangements for operating in conjunction with other apparatus
- H04L25/03286—Arrangements for operating in conjunction with other apparatus with channel-decoding circuitry
Definitions
- the invention relates to a method and device for branch-and-bound based soft-input soft-output decoding in a multiple-input multiple-output system.
- MIMO Multiple-input multiple-output
- the relevant blocks of a MIMO system using an iterative MEVIO detector are shown 20 in Fig. 1.
- the channel encoder obtains binary-valued information (denoted by the bit vector b) and computes coded bits X jj ,.
- the MIMO mapper obtains the coded bits and maps them to multi-dimensional data vectors (denoted by s).
- the iterative MIMO decoder consists of a soft-input soft-output (SISO) detector for MEMO systems and a channel decoder.
- the SISO detector obtains the received symbol vector 25 (denoted by y), channel state information, and soft-information from an external device (e.g., the channel decoder).
- the SISO detector computes extrinsic information, e.g., in the form of extrinsic log-likelihood ratios (denoted by L? b ) of the corresponding bits X jJ1 .
- the channel decoder computes estimates of the data bits (b) and produces a priori information Lf b for SISO detector.
- the SISO detector can
- BB-based MIMO detection uses branch-and-bound (BB) techniques.
- BB-based MIMO detection transforms the MIMO detection problem into a graph-search problem that can efficiently be solved by pruning of unnecessary branches in the graph.
- Prominent examples of BB-based MIMO detectors are the sphere decoder, k-Best algorithms, or M-algorithms.
- the present invention relates to a low-complexity method to compute extrinsic soft- outputs using a branch-and-bound (BB) based MIMO detector by processing channel observations and a priori information.
- BB branch-and-bound
- the key objective of the described method is to reduce the computational complexity associated with extrinsic soft-output computation.
- This objective is achieved by a method for generating extrinsic soft-outputs using a branch-and-bound detector in a MIMO system and using path traversal in a graph for identifying a multidimensional transmit vector, said method comprising the steps of a) feeding a priori information L A to the detector, with j and b together specifying a bit in said transmit vector L A and said a priori information comprising values Lf b being indicative of a probability that said bit is 1, b) traversing paths of the graph, each path representing a possible transmit vector, c) for at least part of the nodes x ⁇ of a path being traversed, checking if a pruning criterion B is met, wherein is a partial distance for the node,
- X MAP j s an es t ⁇ ma te of a most likely transmitted vector, d) and wherein in criterion B a contribution of a priori information Lf b is, for all bits in considered differently depending on if the bit j, b in yfi ) is equal to the bit j, b in x MAP , e) and terminating the traversal of said path if said pruning criterion is met.
- the method enables to identify influences of the detection algorithm to the final extrinsic soft-output information at an early stage in the detection phase, i.e., already during the BB procedure, and allows to compute the pruning criterion accordingly.
- this is used for clipping the magnitude of the extrinsic LLRs in or- der to lower the computational complexity of the BB procedure.
- Fig.1 shows the main building blocks of an iterative MIMO system.
- the soft- input soft-output MIMO detector computes extrinsic soft-output information using channel observations and a priori information.
- Fig.2 shows simulation results for the soft-input soft-output single tree-search sphere decoder (SISO STS-SD).
- the plot illustrates the performance/complexity trade-off of the soft-input soft-output detector depending on the (normalized) extrinsic LLR clipping level (indicated by the numbers next to the curves) and on the number of iterations /, i.e., how many times the detector and decoder are used.
- Matrices are set in boldface capital letters, vectors in boldface lowercase letters.
- the 5 superscripts ⁇ and H stand for transpose and conjugate transpose, respectively.
- ⁇ O ⁇ denotes the cardinality of the set O.
- the probability of an event Z is denoted by P[Z].
- MIMO Multiple-input multiple-output
- s is a multi-dimensional transmit data vector of dimension M ⁇ > 1
- H is a complex-valued MIMO channel matrix of dimension M R x M ⁇
- n is a noise vector of dimension M R > 1
- y is the received data vector of dimension M R .
- the input-output relation might represent a MIMO wireless communication system.
- MIMO may also describe channels with inter-symbol interference (ISI) or multiple access (MAC) channels, for example.
- ISI inter-symbol interference
- MAC multiple access
- Soft-Outputs are understood to be any 30 set of values that allows to derive the estimated probabilities or an approximate of a binary-valued random variable.
- soft-outputs might be log-likelihood ratios (LLRs) according to
- Soft-Input Soft-Output Soft-input soft-output is understood to be a technique to compute soft-output information using soft-input information and possibly received data.
- a device e.g., a decoder or a detector
- Extrinsic information of a binary- valued random variable is understood to contain only new information that has been generated from a soft- input detector. Extrinsic information does not contain the part of information that has been fed into the detector with the exception of the data received through the communication channels. However, the soft-input information fed into the detector is often required to compute new extrinsic information. In the context of iterative de- coding, e.g., extrinsic information corresponds to the information that is exchanged between two or more decoders or detectors. For log-likelihood ratios, extrinsic LLRs are bed as
- Lf b is the intrinsic information for the bit j, b computed from received data and all available a priori information L A (i.e., Vj, b), Lf b denotes the a priori information of the particular bit j, b, and Lf >b is the extrinsic LLR (soft-output information) of the bit j, b.
- a branch-and-Bound (BB) detector is understood to be a method to decode digital information that is represented by a graph.
- the graph consists of nodes and branches. Each path in the graph represents a possible data vector (output). Nodes correspond to partial data vectors. Branches are associated with bits (of part of the data vector) and branch metrics.
- the BB detector traverses the graph and checks during traversal whether parts of the graph can be pruned. 5 Pruning parts of the graph is performed whenever a pruning criterion is met.
- the BB detector searches for the most likely transmitted data vector (and eventually associated metrics) and/or data vectors (and/or associated metrics) with particular properties. The traversal in the graph can be stopped if no more parts of the graph are remaining.
- sphere decoding algorithms are a prominent example of BB-based MIMO detection algorithms and represent the detection problem by a tree and perform the traversal on this tree.
- Reference System j _- A multiple-input multiple-output (MIMO) system with M ⁇ transmit and M R > M ⁇ receive streams is considered.
- Each symbol vector (data vector) s is associated with a label vector x containing M T Q binary values
- H stands for the M R X M T channel matrix
- y is the M ⁇ -dimensional received signal vector
- n is an i.i.d. circularly symmetric complex Gaussian distributed 30 M ⁇ -dimensional noise vector with variance N 0 per complex entry.
- X ⁇ b and X ⁇ b are the sets of symbol vectors that have the bit corresponding to the indices j and b equal to —1 and +1, respectively.
- a soft-input soft-output MEvIO detector computes intrinsic LLRs according to (4) from the received channel matrix H, the signal vector y, and the a priori probabilities (a priori information) in the form of the a priori LLRs and delivers soft-outputs in the form of extrinsic LLRs
- N 0 which is associated with the MAP solution (i.e., the metric associated with the most likely transmitted vector) of the MIMO detection problem
- the solution of (6) and (8) corresponds to the leaf associated with the smallest metric in O M ⁇ and X ⁇ b 3 ' b ' , respectively.
- the soft- input soft-output single-tree search sphere decoder (SISO STS-SD) uses elements of 30 the Schnorr-Euchner SD with radius reduction [AEVZ02, BBW+05], briefly summarized as follows: The search along paths in the weighted graph (tree) is constrained to nodes which lie within a radius r around y and (tree) traversal is performed depth-first, visiting the children of a given node in ascending order of their
- a node s ⁇ with PD d 3 can be pruned along with the entire subgraph (subtree) 35 originating from this node, whenever the pruning criterion
- the functions (14) and (15) can be used to map intrinsic metrics to extrinsic metrics and vice versa.
- BB detectors are the repeated tree- search (RTS) strategy [WG04] or the single tree-search (STS) strategy [SBB08].
- RTS repeated tree- search
- STS single tree-search
- the main idea of the STS strategy is to use elements of the Schnorr-Euchner sphere decoder and to perform a search the subtree originating from a given node only if the result can lead to an update of either ⁇ MAP or of at least one of the ⁇ ° ⁇
- the SISO decoder employs the method described in Sec. 6 and maintains a list containing the current MAP hypothesis x MAP , the corresponding metric ⁇ MAP , and all QM T extrinsic metrics ⁇ 6 AP and performs list administration steps. Note that for hardware implementation, this list could be stored directly into a memory.
- the node s ⁇ ) along with its subtree is pruned if the corresponding PD d( ⁇ ) satisfies the pruning criterion
- One frame consists of 1024 randomly interleaved (across space and frequency) bits corresponding to one (spatial) OFDM symbol.
- the SNR in all simulations corresponds to the SNR per receive antenna.
- the number of using the detector (and the SISO channel decoder) corresponds to the number of iterations /. Fig.
- a second BB detector which is functionally different from the first BB detector (e.g., uses a different pruning criterion or different distance increments) but might also share the same hardware, can be used.
- HtB03 the list sphere decoder
- M-algorithms [dJW05]
- K-best algorithms [WTCM02].
- the MAP hypothesis and its counter-hypotheses can also be approximated using linear detection methods or non-linear equalizers (e.g., a decision feedback equalizer).
- extrinsic max-log LLRs can be computed within the branch- and-bound detection stage.
- the presented method enables clipping of extrinsic LLRs, which can significantly reduce the computational complexity of the underlying BB
Landscapes
- Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- Probability & Statistics with Applications (AREA)
- Theoretical Computer Science (AREA)
- Radio Transmission System (AREA)
Abstract
The computational complexity associated with detection in multiple-input multiple-output (MIMO) systems often dominates the complexity of the MIMO receiver. Soft-input soft-output detection can significantly improve the error rate performance in iterative MEvIO systems. Branch-and-bound (BB) based detection techniques aim at reducing the computational complexity by transforming MIMO detection into a graph-search problem. The method described in this document computes extrinsic information directly in the BB detector to enable extrinsic LLR clipping, which significantly reduces the computational complexity. As an example, we describe the application of the proposed method to the single tree-search sphere decoding algorithm.
Description
Computation of Extrinsic Information in a Branch-and-Bound Detector
5 T E C H N I C A L F I E L D
The invention relates to a method and device for branch-and-bound based soft-input soft-output decoding in a multiple-input multiple-output system.
10 B A C K G R O U N D A RT
Multiple-input multiple-output (MIMO) techniques have emerged in various wireless communication standards due to the high spectral efficiency offered by spatial multiplexing. Iterative detection and decoding can significantly improve the error rate ^ performance of MEMO wireless systems.
1. ITERATIVE MIMO SYSTEMS
The relevant blocks of a MIMO system using an iterative MEVIO detector are shown 20 in Fig. 1. The channel encoder obtains binary-valued information (denoted by the bit vector b) and computes coded bits Xjj,. The MIMO mapper obtains the coded bits and maps them to multi-dimensional data vectors (denoted by s). The iterative MIMO decoder consists of a soft-input soft-output (SISO) detector for MEMO systems and a channel decoder. The SISO detector obtains the received symbol vector 25 (denoted by y), channel state information, and soft-information from an external device (e.g., the channel decoder). The SISO detector computes extrinsic information, e.g., in the form of extrinsic log-likelihood ratios (denoted by L?b) of the corresponding bits XjJ1. The channel decoder computes estimates of the data bits (b) and produces a priori information Lf b for SISO detector. The SISO detector can
30 compute new extrinsic outputs. The number of iterations (i.e., how many times the detector and the channel decoder are used), significantly affects the error rate performance of the iterative MEMO decoder.
35 2. SOFT-INPUT SOFT-OUTPUT MEMO DETECTION
The computation of soft-output information with the use of soft-inputs is a computational complex task and poses significant challenges in practical implementations.
One of the most promising candidate for high-performance low-complexity soft- input soft-output MIMO detection is to use branch-and-bound (BB) techniques. The key idea of BB-based MIMO detection is to transform the MIMO detection problem into a graph-search problem that can efficiently be solved by pruning of unnecessary branches in the graph. Prominent examples of BB-based MIMO detectors are the sphere decoder, k-Best algorithms, or M-algorithms.
D I S C L O S U R E O F T H E I N V E N T I O N
The present invention relates to a low-complexity method to compute extrinsic soft- outputs using a branch-and-bound (BB) based MIMO detector by processing channel observations and a priori information.
The key objective of the described method is to reduce the computational complexity associated with extrinsic soft-output computation. This objective is achieved by a method for generating extrinsic soft-outputs using a branch-and-bound detector in a MIMO system and using path traversal in a graph for identifying a multidimensional transmit vector, said method comprising the steps of a) feeding a priori information LA to the detector, with j and b together specifying a bit in said transmit vector LA and said a priori information comprising values Lf b being indicative of a probability that said bit is 1, b) traversing paths of the graph, each path representing a possible transmit vector, c) for at least part of the nodes x^ of a path being traversed, checking if a pruning criterion B is met,
wherein is a partial distance for the node,
X MAP js an estχmate of a most likely transmitted vector, d) and wherein in criterion B a contribution of a priori information Lf b is, for all bits in considered differently depending on if the bit j, b in yfi) is equal to the bit j, b in xMAP, e) and terminating the traversal of said path if said pruning criterion is met.
The method enables to identify influences of the detection algorithm to the final extrinsic soft-output information at an early stage in the detection phase, i.e., already during the BB procedure, and allows to compute the pruning criterion accordingly. Advantageously, this is used for clipping the magnitude of the extrinsic LLRs in or- der to lower the computational complexity of the BB procedure.
The general method described in this document is applicable to a variety of extrinsic soft-output BB-based MIMO detectors. As an example, we demonstrate the application of said method using a soft-input soft-output single tree-search sphere decoder.
BRIEF DESCRIPTIONS OF DRAWINGS
The invention will be better understood and objects other than those set forth above will become apparent when consideration is given to the following detailed description thereof. Such description makes reference to the annexed drawings, wherein
Fig.1 shows the main building blocks of an iterative MIMO system. The soft- input soft-output MIMO detector computes extrinsic soft-output information using channel observations and a priori information.
Fig.2 shows simulation results for the soft-input soft-output single tree-search sphere decoder (SISO STS-SD). The plot illustrates the performance/complexity trade-off of the soft-input soft-output detector depending on the (normalized) extrinsic LLR clipping level (indicated by the numbers next to the curves) and on the number of iterations /, i.e., how many times the detector and decoder are used.
MODES FOR CARRYING OUT THE INVENTION 3. OUTLINE
In Sec.4, we introduce the notation, provide definitions, and describe the system model. In section Sec.5, we provide a brief review of sphere decoding (SD). Sec.6 introduces the general idea of the method to compute extrinsic LLRs within the BB- based MIMO detector. Sec.7 illustrates the application of the described method using a single tree-search (STS) sphere decoder. Simulation results are shown in Sec.8. Further comments are given in Sec.9 and conclusions are given in Sec.10.
4. NOTATION, DEFINITIONS, AND SYSTEM MODEL
4.1. Notation
Matrices are set in boldface capital letters, vectors in boldface lowercase letters. The 5 superscripts τ and H stand for transpose and conjugate transpose, respectively. We write Ai:j for the entry in the ith row and jth column of the matrix A and b{ for the ith entry of the vector b = [6X 62 • • • b^ }τ- IN denotes the N x N identity matrix. We call an N x M matrix A, where N > M, satisfying A-^A = IM. unitary. \O\ denotes the cardinality of the set O. The probability of an event Z is denoted by P[Z]. x is the binary complement of £ G {+1, —1}, i.e., x = —x.
4.2. Definitions
In the context of the present applications and claims, the following definitions are used.
15
MIMO Multiple-input multiple-output (MIMO) is understood to be a communication system that can be described by a linear input-output relation according to
20 y = Hs + n
wherein s is a multi-dimensional transmit data vector of dimension Mτ > 1, H is a complex-valued MIMO channel matrix of dimension MR x Mτ, n is a noise vector of dimension MR > 1, and y is the received data vector of dimension MR. In par- „<. ticular, the input-output relation might represent a MIMO wireless communication system. However, MIMO may also describe channels with inter-symbol interference (ISI) or multiple access (MAC) channels, for example.
Soft-Outputs Soft-outputs (soft-output information) are understood to be any 30 set of values that allows to derive the estimated probabilities or an approximate of a binary-valued random variable. In particular, soft-outputs might be log-likelihood ratios (LLRs) according to
_ . /P[z = +1]\
where the binary-valued random variable x takes on values from the set {+1, -1} and b denotes the basis of the logarithm. If the basis b is omitted, the natural logarithm, i.e., with b = e, is assumed. However, it might, e.g., also be that soft-output information can also be represented as the ratio of probabilities
P[x = -1] or the difference of probabilities
D = P[x = +1] - P[x = -I] .
Soft-Input Soft-Output Soft-input soft-output (SISO) is understood to be a technique to compute soft-output information using soft-input information and possibly received data. In particular, it may describe a device (e.g., a decoder or a detector) that obtains soft-input information in the form of a priori LLRs and computes either intrinsic or extrinsic soft-output LLRs, for example.
Extrinsic Information Extrinsic information of a binary- valued random variable is understood to contain only new information that has been generated from a soft- input detector. Extrinsic information does not contain the part of information that has been fed into the detector with the exception of the data received through the communication channels. However, the soft-input information fed into the detector is often required to compute new extrinsic information. In the context of iterative de- coding, e.g., extrinsic information corresponds to the information that is exchanged between two or more decoders or detectors. For log-likelihood ratios, extrinsic LLRs are denned as
T B _ r D T A
where Lfb is the intrinsic information for the bit j, b computed from received data and all available a priori information LA (i.e., Vj, b), Lf b denotes the a priori information of the particular bit j, b, and Lf>b is the extrinsic LLR (soft-output information) of the bit j, b.
Branch-and-Bound Detector A branch-and-bόund (BB) detector is understood to be a method to decode digital information that is represented by a graph. The graph
consists of nodes and branches. Each path in the graph represents a possible data vector (output). Nodes correspond to partial data vectors. Branches are associated with bits (of part of the data vector) and branch metrics. The BB detector traverses the graph and checks during traversal whether parts of the graph can be pruned. 5 Pruning parts of the graph is performed whenever a pruning criterion is met. During graph-traversal, the BB detector searches for the most likely transmitted data vector (and eventually associated metrics) and/or data vectors (and/or associated metrics) with particular properties. The traversal in the graph can be stopped if no more parts of the graph are remaining. In particular, sphere decoding algorithms are a prominent example of BB-based MIMO detection algorithms and represent the detection problem by a tree and perform the traversal on this tree.
4.3. Reference System j _- A multiple-input multiple-output (MIMO) system with Mτ transmit and MR > Mτ receive streams is considered. The coded bit-stream to be transmitted is mapped to (a sequence of) Mτ-dimensional transmit symbol vectors s G oMτ, where O stands for the underlying complex scalar constellation and \O\ = 2Q. Each symbol vector (data vector) s is associated with a label vector x containing MTQ binary values
20 chosen from the set {+1, —1} where the null element (0 in binary logic) of GF(2) corresponds to +1. The corresponding bits are denoted by x^, where the indices j and b refer to the bth bit in the binary label of the jth entry of the symbol vector s = [si S2 • • • sMτ ]τ. The associated complex baseband input-output relation is given by
25
(1) y = Hs + n
where H stands for the MR X MT channel matrix, y is the Mβ-dimensional received signal vector, and n is an i.i.d. circularly symmetric complex Gaussian distributed 30 Mβ-dimensional noise vector with variance N0 per complex entry.
35
5. SOFT-INPUT SOFT-OUTPUT SPHERE DECODING
5.1. Max-Log LLR Computation as a Tree Search
Coherent SISO detection for MIMO systems requires computation of soft-outputs in 5 the form of LLRs [HtB(B]
for all bits j = 1, 2, . . . , Mτ, b = 1, 2, . . . , Q, in the label x. Transforming (2) into a tree-search problem and, for example, using the sphere decoding algorithm, e.g., [FP85, SE94, BBW+05, SBB08], allows efficient computation of the LLRs. To this end, the channel matrix H is first QR-decomposed according to H = QR, where the MR x MT matrix Q is unitary and the Mτ x Mτ upper-triangular matrix j 5 R has real-valued positive entries on its main diagonal. Left-multiplying (1) by QH leads to the modified input-output relation
(3) y = Rs + QHn
_„ where y = Q^y. Noting that Q^n is also i.i.d. circularly symmetric complex
Gaussian and using the max-log approximation on (2) leads to the intrinsic max-log LLRs [HtB(B]
where X^ b and X^ b are the sets of symbol vectors that have the bit corresponding to the indices j and b equal to —1 and +1, respectively.
In the following, we consider an iterative MIMO decoder as depicted in Fig. 1, where a soft-input soft-output MEvIO detector computes intrinsic LLRs according to (4) from the received channel matrix H, the signal vector y, and the a priori probabilities (a priori information) in the form of the a priori LLRs
and delivers soft-outputs in the form of extrinsic LLRs
to a subsequent SISO channel decoder. Slightly abusing our notation, we define the set that contains all a priori information belonging to a symbol vector, i.e., lA for j = 1, 2, . . . , Mτ and b = 1, 2, . . . , Q, as ZΛ
For each bit, one of the two minima in (4) corresponds to
(6) λ MAP ^ -Uly - RsMAP 2 - log P[sMApT
N0 which is associated with the MAP solution (i.e., the metric associated with the most likely transmitted vector) of the MIMO detection problem
(7) sMAP = arg mm ( -U|y - Rs||2 - log P[s] ) . ss6£θθMMrτ 1 1^o J
The other minimum in (4) can be computed as
where the (bit-wise) counter-hypothesis x^p to the MAP hypothesis denotes the binary complement of the 6th bit in the label of the jth entry of sMAP. With the definitions (6) and (8), the intrinsic max-log LLRs in (4) can be written (Vj, b) in com- pact form as I
We can therefore conclude that efficient max-log optimal soft-input soft-output MIMO detection reduces to efficiently identifying sMAP, λMAP (Vj, b).
We next define the partial symbol vectors (PSVs)
■ ■ ■ SMT ]Γ and note that they can be arranged in a tree that has its root just above level j = Mτ and leaves, on level j = 1, which correspond to symbol vectors s. The binary-
valued label vector associated with sw will be denoted by x(j). The distances
d(S) = -U|y - Rs||2 - logP[s]
in (6) and (8) can be computed recursively if the individual symbols S3 (j = 1, 2, , . , MT) satisfy P[s] = JT^ P[s3]. In this case, we have
d0 = dJ+1 + Ie3 ] , j = Mτ, Mr - 1, . . . , 1,
, <- the initialization dMτ+i — 0, and the distance increments (DIs)
(10)
The dependence of the PDs d3 on the symbol vector s is only through the PSV s ω
20
Thus, the MAP detection problem and the computation of the max-log MAP intrinsic LLRs has been transformed into a path traversal in a graph (or tree in this particular example): PSVs and PDs are associated with nodes, branches correspond to DIs. For brevity, we shall often say "the node s^" to refer to the node corre- 25 sponding to the PSV Φ\ We shall furthermore use d(s^) and cϋ(x^) interchangeably to denote d3. Each path from the root node down to a leaf node corresponds to a symbol vector s G OMτ . The solution of (6) and (8) corresponds to the leaf associated with the smallest metric in OMτ and X^b 3'b ' , respectively. The soft- input soft-output single-tree search sphere decoder (SISO STS-SD) uses elements of 30 the Schnorr-Euchner SD with radius reduction [AEVZ02, BBW+05], briefly summarized as follows: The search along paths in the weighted graph (tree) is constrained to nodes which lie within a radius r around y and (tree) traversal is performed depth-first, visiting the children of a given node in ascending order of their
PDs. A node s^ with PD d3 can be pruned along with the entire subgraph (subtree) 35
originating from this node, whenever the pruning criterion
(11) dj ≥ r2
is met. In order to avoid the problem of choosing a suitable starting radius, we initialize the algorithm with r = oo and perform the update r2 <— d(s) whenever a valid leaf node s has been reached. The complexity measure of BB -based MIMO . detectors usually corresponds to the number of nodes visited by the decoder including the leaves, but excluding the root. 0
6. DIRECT COMPUTATION OF EXTRINSIC LLRS
Due to the large dynamic range of LLRs, fixed-point implementations need to constrain the magnitude of the LLR values to enable fixed-point hardware implemen- - tation. Evidently, clipping of the LLR magnitude leads to a degradation in terms of error rate performance. It has been noted in [YeeO5, SBB08] that incorporating LLR clipping into the graph-traversal (or tree search) is very effective in terms of reducing complexity of max-log based soft-output sphere decoding. In addition, as demonstrated in [SBB08], LLR clipping, when built into the tree search also allows0 to tune the decoding algorithm in terms of complexity versus performance by adjusting the clipping level. In the soft-input soft-output case, we are ultimately interested in the extrinsic LLRs Lf b and clipping should therefore ensure that
< Lmax (Vj, b). Note that soft-output detectors usually derive intrinsic LLRs L® b first and then compute extrinsic LLRs after the BB procedure using (5). 5 In order to enable clipping of the extrinsic LLRs, the BB detector needs to employ am method to directly compute extrinsic LLRs in the graph-search procedure. To this end, we start by writing the extrinsic max-log LLRs as Λ MAP \ MAP ™MAP , 1
Λi,& ~ λ ' xj,b - +1
\ MAP Λ MAP -MAP _ i
where the quantities \ MAP _ Γ A -MAP _ . I \ MAP , r A ,JVIAP _ I Λj,b + ^,b > Xj,b - ~ l will be referred to as the extrinsic metrics. For the following developments it will be convenient to define a function /(•) that transforms an intrinsic metric λ with
associated a priori LLR LΛ and binary label x to an extrinsic metric Λ according to
With this notation, we can rewrite (13) more compactly as Λ)f6 AP = / fcAP, Lffi, xfb AP) .
The inverse function of (14) transforms an extrinsic metric Λ to an intrinsic metric λ and is denned as
The key idea of the proposed method is to compute (12) instead of (9) directly within the BB detector, which requires to search for the MAP solution xMAP, its metric λMAP, as well as all extrinsic metrics Λ^6 AP (j = 1, 2, . . . , Mτ, b = 1, 2, . . . , Q). In order to obtain the pruning criterion or to compute branch-metrics, the functions (14) and (15) can be used to map intrinsic metrics to extrinsic metrics and vice versa.
To obtain (or approximate) the MAP solution (and its metric) as well as all counter-hypotheses, a variety of BB algorithms, linear detectors, and non-linear detectors exist [PNG03]. Prominent examples of BB detectors are the repeated tree- search (RTS) strategy [WG04] or the single tree-search (STS) strategy [SBB08]. In the following sections, the method is illustrated with the aid of the STS strategy.
7. EXTRINSIC LLR COMPUTATION WITH THE SISO STS-SD
We emphasize that BB-based MDVIO detection using the method described in the previous section directly leads to (clipped) extrinsic LLRs Lf b (Vj, b) in (12) rather than to intrinsic ones (9).
7.1. List Administration
The main idea of the STS strategy is to use elements of the Schnorr-Euchner sphere decoder and to perform a search the subtree originating from a given node only if the result can lead to an update of either λMAP or of at least one of the Λ^°\ The SISO decoder employs the method described in Sec. 6 and maintains a list containing the current MAP hypothesis xMAP, the corresponding metric λMAP, and all QMT extrinsic metrics Λ¥6 AP and performs list administration steps. Note that for
hardware implementation, this list could be stored directly into a memory. The algorithm can be initialized with λMAP = Λ^AP = oo (Vj, b) or with values that have been computed based on, e.g., previous detection runs or channel state information. Whenever a leaf with corresponding label x has been reached, the decoder distin- 5 guishes between two cases (list administration steps):
7.2. i) MAP Hypothesis Update
If d(x) < λMAP, a new MAP hypothesis has been found. First, all extrinsic metrics Λ^6 AP for which xjib = x™AF are updated according to
A MAP , J- Λ MAP T A ,JVIAP \ Aj,b *~ / ^A > Lj,b> Xj,b J
followed by the updates λMAP <— d(x) and χMAP <— x. In other words, for each bit in the MAP hypothesis that is changed in the update process, the metric associated with the former MAP hypothesis becomes the extrinsic metric of the new counter- hypothesis.
7.3. ii) Extrinsic Metric Update
20 In the case where d(x) > λMAP, only extrinsic metrics corresponding to counter- hypotheses might be updated. For each j — 1, 2., . . . , Mτ, b = 1, 2, . . . , Q with Xjtb = xfAP and whenever /(φc), Lfb, xfAP) < Λ$°\ the SISO STS-SD performs the update
7.4. Extrinsic LLR Clipping
In order to ensure that the extrinsic LLRs delivered by the algorithm indeed satisfy 30 < Lmax (Vj, b), the following update rule
, λ Λ MAP + , L r max \>, V VJjA, oh
has to be applied after carrying out the steps in Case i) of the list administration 35 steps described before. We emphasize that for L,mΑX = oo the decoder attains max- log optimal SISO performance, whereas for Lmax — 0, only the hard-output MAP solution (7) is found.
Note that the detector can also reduce the magnitude of at least a part of the
Λ^6 AP or of λMAP whenever a new xMAP is found, in order to impose constraints on the resulting extrinsic LLRs.
5 7.5. The Pruning Criterion
Consider the node s^ on level j corresponding to the label bits x^ {i = j, i + 1, . . . , M7-, 6 = 1, 2, . . . , Q). Assume that the subtree originating from this node and corresponding to the label bits x^b (i = l, 2, . . . , j — l, b = 1, 2, . . . , Q) has not been expanded yet. The pruning criterion for the node s^ along with its subtree is compiled from two sets, defined as follows:
1) The bits in the partial label
s^ are compared with the corresponding bits in the label of the current MAP hypothesis. All extrinsic metrics Λ^6 AP with Xjtb = x^b AP found in this comparison, may be affected ^ when searching the subtree originating from s^\ As d(pό^) is an intrinsic metric, the extrinsic metrics Λ^6 AP need to be mapped to an intrinsic measure according to (15). The resulting set of intrinsic metrics, which may be affected by an update, are given by
2) The extrinsic metrics Λ^6 AP foτ i = l, 2, . . . , j — l, b = l, 2, . . . , Q corresponding 25 to the counter-hypotheses in the subtree of s^ may be affected as well. Correspondingly, we define
30 In summary, the intrinsic metrics which may be affected during the search in the subtree emanating from node s^ are given by the union of the sets (18) and (19) according to Λ(xij)) = {en} = A1 (xω) LJ .42(x^). The node sϋ) along with its subtree is pruned if the corresponding PD d(χ^) satisfies the pruning criterion
35 (20) d(xω) > max, α,.
This pruning criterion ensures that a given node and the entire subtree originating from that node are explored only if this could lead to an update of either λMAP or of at least one of the extrinsic metrics Λ^6 AP.
8. SIMULATION RESULTS
The simulation results are for a convolutionally encoded (rate 1/2, generator polynomials [133O 17I0], and constraint length 7) iterative MIMO-OFDM system using Mτ = MR = 4, 16-QAM symbol constellation with Gray labeling, 64 OFDM tones, a TGn type C channel model [E+04], and are based on a max-log BCJR channel decoder. One frame consists of 1024 randomly interleaved (across space and frequency) bits corresponding to one (spatial) OFDM symbol. The SNR in all simulations corresponds to the SNR per receive antenna. The number of using the detector (and the SISO channel decoder) corresponds to the number of iterations /. Fig. 2 shows the performance/complexity trade-off of the SISO STS-SD (using sorted QR decomposition) employing the method of incorporating extrinsic LLR computation in combination with extrinsic LLR clipping as described in the previous sections. Reducing the LLR clipping level also reduces the complexity of the decoder. Increasing the number of iterations I improves, in general, the SNR operating point. We emphasize however, that the trade-off between (tree-search) complexity and error rate performance can be adjusted with the extrinsic LLR clipping parameter Lmax and the number of iterations /. This enables to choose (e.g., with the aid of the corresponding simulation results) the most efficient combination of Lmax and / in order to optimize the performance/complexity trade-off of the iterative MIMO decoder.
9. FURTHER COMMENTS
9.1. Comment 1
Note that in the above example, we have used (20) as pruning criterion. However, in general, any suitable pruning criterion of the form
J3(d(x^), LA, x« , xMAP)
can be used, wherein in criterion B the contribution of a priori information Lf b is, for all bits in x(Λ, considered differently depending on if the bit j, b in x^ is equal
to the bit j, 6 in χMAP is to be interpreted such that the influence of Lf b on the result of B depends on if Xj:b — x^b A¥ or Xjj, Φ ^Ap ■ However, this is of course not applicable for the bits xi}b for i — j — 1, j — 2, . . . , 1, b = 1, 2, . . . , Q. For those bits, different criteria depending on χMAP might be applied. 5
9.2. Comment 2
In the above example, we have computed (12) using a single-tree-search algorithm. However, in general, any suitable detector can be used to obtain or approximate xMAP, its metric λMAP, as well as all extrinsic metrics Λgp (J = 1, 2, . . . , Mτ, b = 1, 2, . . . , Q). To this end, a second BB detector, which is functionally different from the first BB detector (e.g., uses a different pruning criterion or different distance increments) but might also share the same hardware, can be used. Possible BB algorithms to approximate xMAP, its metric λMAP, as well as all extrinsic metrics .. A.γb AP (J — 1, 2, . . . , MT, b = 1, 2, . . . , Q) are, for example, the list sphere decoder [HtB03], M-algorithms [dJW05], K-best algorithms [WTCM02]. Furthermore, the MAP hypothesis and its counter-hypotheses can also be approximated using linear detection methods or non-linear equalizers (e.g., a decision feedback equalizer).
20 10. CONCLUSIONS
We have shown how extrinsic max-log LLRs can be computed within the branch- and-bound detection stage. The presented method enables clipping of extrinsic LLRs, which can significantly reduce the computational complexity of the underlying BB
„ - algorithm.
In this document, we provided an example for the application of the method to a soft-input soft-output single tree search sphere decoding algorithm. However, it is noted that the same method can also be performed within a variety of BB-based MIMO detection algorithms. In particular, the method is applicable to various vari-
30 ants of the sphere decoding algorithm.
While there are shown and described presently preferred embodiments of the invention, it is to be distinctively understood that the invention is not limited thereto but may otherwise variously embodied and practiced within the scope of the claims.
35
REFERENCES
[AEVZ02] Erik Agrell, Thomas Eriksson, Alexander Vardy, and Kenneth Zeger.
Closest point search in lattices. IEEE Transactions on Information Theory, 48(8):2201-2214, August 2002.
[BBW+05] A. Burg, M. Borgmann, M. Wenk, M. Zellweger, W. Fichtner, and
H. Bδlcskei. VLSI implementation of MIMO detection using the sphere decoder algorithm. IEEE Journal of Solid-State Circuits, 40(7): 1566- 1577, July 2005.
[dJW05] Y.L.C. de Jong and TJ. Willink. Iterative tree search detection for MIMO wireless systems. IEEE Transactions on Communications, 53(6):930— 935, June 2005.
[E+ 04] V. Erceg et al. TGn channel models, May 2004. IEEE 802.11 document 03/940r4.
[FP85] U. Fincke and M. Pohst. Improved methods for calculating vectors of short length in a lattice, including a complexity analysis. Mathematics of Computation, 44:463-471, April 1985.
[HtB03] Bertrand M. Hochwald and Stephan ten Brink. Achieving near-capacity on a multiple-antenna channel. IEEE Transactions on Communications, 51(3):389-399, March 2003.
[PNG03] A. Paulraj, R. Nabar, and D. Gore, editors. Introduction to Space-Time Wireless Communications. Cambridge Univ. Press, 2003.
[SBB08] C. Studer, A. Burg, and H. Bδlcskei. Soft-output sphere decoding: Algorithms and VLSI implementation. IEEE Journal on Selected Areas in Communications, 26(2), February 2008.
[SE94] C. P. Schnorr and M. Euchner. Lattice basis reduction: Improved practical algorithms and solving subset sum probl ems. Math. Programming, 66(2):181-191, September 1994.
[WG04] R. Wang and G. B. Giannakis. Approaching MIMO channel capacity with reduced-complexity soft sphere .decoding. In Proc. of IEEE Wireless Communications and Networking Conf. (WCNC), volume 3, pages 1620- 1625, March 2004.
[WTCM02] Kwan-wai Wong, Chi-ying Tsui, Roger S.-K. Cheng, and Wai-ho Mow. A VLSI architecture of a K-Best lattice decoding algorithm for MIMO channels. In IEEE International Symposium on Circuits and Systems (ISCAS), volume 3, pages 273-276, Scottsdale, Arizona, May 2002.
[YeeO5] Mong Suan Yee. Max-Log-Map sphere decoder. In Proc. IEEE ICASSP
2005, volume 3, pages 1013-1016, March 2005.
Claims
1. A method for generating extrinsic soft-outputs using a branch-and-bound detector in a MIMO system and using path traversal in a graph for identifying a multi- dimensional transmit vector x, said method comprising the steps of a) feeding a priori information LA to the detector, with j and b together specifying a bit in said transmit vector and said a priori information comprising values LA b being indicative of a probability that said bit (j, b) is 1, b) traversing paths of the graph, each path representing a possible transmit vector, c) for at least part of the nodes x.^ of a path being traversed, checking if a pruning criterion B is met, wherein d(x^) is a partial distance for the node,
2. The method of claim 1 wherein the detector is a soft-input soft-output detector for multiple-input multiple-output systems.
3. The method of any of the preceding claims where the soft-input soft-output detector is a sphere decoder.
4. The method of any of the preceding claims comprising the calculation of said extrinsic soft-outputs Lf b (Vj, 6) according to
XUAP js a tøt associated with the bit j, b in x .1MAP λMAP is a metric associated with the most likely transmitted vector, and Λ^b AP is an extrinsic metric associated with a counter-hypothesis of χ¥b AP and with LA- h.
5. The method of claim 4 where the detector stores xMAP, λMAP and all Λ^6 AP in a m meemmoorryv..
6. The methods of any of the claims 4 or 5 where the detector reduces the magnitude of at least a part of the Λ^6 AP or of λMAP whenever a new χMAP is found.
10 7. The method of claim 6, where the Λ^6 AP are being updated after finding a new λMAP or change in Λ^b AP according to
15 wherein Lmax is an extrinsic log-likelihood ratio clipping parameter.
8. The method of any of the claims 4-7, where xMAP, λMAP or at least parts of y^MAP ^6 being approximated using a second branch-and-bound detector, ™ a linear detector, or a decision feedback equalizer.
9. The method of any of the claims 4-8, wherein a list at least of said values xMAP, λMAP, and Λ^b AP is maintained by means of repetitive list administration steps
wherein a function / maps intrinsic metrics to extrinsic metrics according to 35
/(λ) L '^ = I A + ^1 x = ~l and said list administration steps are performed depending on a condition basing on at least said x, d(x), xMAP, or Lfb.
10. The method of any of the preceding claims where the detector is operated in iterations for computation of soft-outputs and where Lraax and a number of iterations / are chosen to optimize a performance/complexity trade-off of the detector.
12. The method of claim 11 where the said set A(^) corresponds to a union of the sets
13. A device comprising means for carrying out the method of one or more of the preceding claims.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CH2008/000298 WO2010000075A1 (en) | 2008-07-03 | 2008-07-03 | Computation of extrinsic information in a branch-and-bound detector |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CH2008/000298 WO2010000075A1 (en) | 2008-07-03 | 2008-07-03 | Computation of extrinsic information in a branch-and-bound detector |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2010000075A1 true WO2010000075A1 (en) | 2010-01-07 |
Family
ID=40790465
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CH2008/000298 WO2010000075A1 (en) | 2008-07-03 | 2008-07-03 | Computation of extrinsic information in a branch-and-bound detector |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2010000075A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014082487A1 (en) * | 2012-11-29 | 2014-06-05 | 中兴通讯股份有限公司 | Method and apparatus for soft output fixed complexity sphere decoding detection |
CN106357367A (en) * | 2016-07-15 | 2017-01-25 | 北京邮电大学 | Non-coherent joint detecting and channel decoding method under massive MIMO (multiple input multiple output) system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1521414A1 (en) * | 2003-10-03 | 2005-04-06 | Kabushiki Kaisha Toshiba | Method and apparatus for sphere decoding |
EP1545082A2 (en) * | 2003-12-17 | 2005-06-22 | Kabushiki Kaisha Toshiba | Signal decoding methods and apparatus |
US20070286313A1 (en) * | 2006-03-31 | 2007-12-13 | Bce Inc. | Parallel soft spherical mimo receiver and decoding method |
-
2008
- 2008-07-03 WO PCT/CH2008/000298 patent/WO2010000075A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1521414A1 (en) * | 2003-10-03 | 2005-04-06 | Kabushiki Kaisha Toshiba | Method and apparatus for sphere decoding |
EP1545082A2 (en) * | 2003-12-17 | 2005-06-22 | Kabushiki Kaisha Toshiba | Signal decoding methods and apparatus |
US20070286313A1 (en) * | 2006-03-31 | 2007-12-13 | Bce Inc. | Parallel soft spherical mimo receiver and decoding method |
Non-Patent Citations (1)
Title |
---|
LI WANG ET AL: "Apriori-LLR-Threshold-Assisted K-Best Sphere Detection for MIMO Channels", VEHICULAR TECHNOLOGY CONFERENCE, 2008. VTC SPRING 2008. IEEE, IEEE, PISCATAWAY, NJ, USA, 11 May 2008 (2008-05-11), pages 867 - 871, XP031255652, ISBN: 978-1-4244-1644-8 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014082487A1 (en) * | 2012-11-29 | 2014-06-05 | 中兴通讯股份有限公司 | Method and apparatus for soft output fixed complexity sphere decoding detection |
US9356733B2 (en) | 2012-11-29 | 2016-05-31 | Zte Corporation | Method and apparatus for soft output fixed complexity sphere decoding detection |
CN106357367A (en) * | 2016-07-15 | 2017-01-25 | 北京邮电大学 | Non-coherent joint detecting and channel decoding method under massive MIMO (multiple input multiple output) system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Larsson | MIMO detection methods: How they work [lecture notes] | |
Studer et al. | Soft–input soft–output single tree-search sphere decoding | |
JP5395099B2 (en) | Adaptive forward-backward soft output M-algorithm receiver structure | |
US20070201632A1 (en) | Apparatus, method and computer program product providing a mimo receiver | |
US20090296842A1 (en) | Soft output m-algorithm receiver structures with generalized survivor selection criteria for mimo systems | |
US20070121753A1 (en) | Wireless communications apparatus | |
Yoon et al. | Low-complexity MIMO detection based on belief propagation over pairwise graphs | |
WO2007104169A1 (en) | Method for decoding digital information encoded with a channel code | |
US20080123764A1 (en) | Wireless communications apparatus | |
EP1912396A2 (en) | Wireless communications apparatus | |
Studer et al. | Soft-input soft-output sphere decoding | |
Chen et al. | Optimal receiver design for SCMA system | |
Milliner et al. | CTH09-4: A lattice-reduction-aided soft detector for multiple-input multiple-output channels | |
CN100561901C (en) | The multi-antenna orthogonal frequency division multiplexing system soft in and soft out detection method of low complex degree | |
WO2010000076A1 (en) | Modified distance-increments for branch-and-bound detection | |
WO2010000075A1 (en) | Computation of extrinsic information in a branch-and-bound detector | |
Shieh et al. | Low-complexity soft-output sphere decoding with modified repeated tree search strategy | |
Ling et al. | Variants of the lll algorithm in digital communications: Complexity analysis and fixed-complexity implementation | |
Prasad et al. | Optimally efficient max-log APP demodulation in MIMO systems | |
Mennenga et al. | Iterative soft-in soft-out sphere detection for MIMO systems | |
Zimmermann et al. | A parallel smart candidate adding algorithm for soft-output MIMO detection | |
Xu et al. | A low-complexity solution to decode diversity-oriented block codes in MIMO systems with inter-symbol interference | |
Wang et al. | MMSE soft-interference-cancellation aided iterative center-shifting K-best sphere detection for MIMO channels | |
Milliner et al. | A framework for fixed complexity breadth-first MIMO detection | |
Tomashevich et al. | Detection performance of MIMO unique word OFDM |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 08757291 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 08757291 Country of ref document: EP Kind code of ref document: A1 |