Soft Iterative Linear Detection for LDPC Coded MIMO Scheme with PSK ()

Meixiang Zhang^{1}, Sooyoung Kim^{2}

^{1}Yangzhou University, Yangzhou, China.

^{2}Chonbuk National University, Jeonju, Korea.

**DOI: **10.4236/ijcns.2017.108B016
PDF HTML XML
597
Downloads
1,004
Views
Citations

A number of study results demonstrated that the performance of the coded MIMO scheme can be highly enhanced by incorporating iterative decoding and detection scheme by exchanging soft information between the symbol detector and decoder. One of the critical problems of these iterative schemes is an exponential order of the complexity with increase of number of bits in a symbol and the number of antennas. In this paper, we present an efficient iterative detection and decoding scheme for MIMO systems with phase shift keying (PSK) modulation schemes and low density parity check (LDPC) codes. In order to reduce the complexity by the number of antennas, we adopt minimum mean square error (MMSE) based linear detection scheme with parallel interference cancellation. In addition, soft bit estimation is made only with a single distance calculation per bit, with approximating performance to the maximum likelihood detection^{1}.

Keywords

MMSE, MIMO, Iterative Detection, Soft Bit Estimation, LDPC, PSK

Share and Cite:

Zhang, M. and Kim, S. (2017) Soft Iterative Linear Detection for LDPC Coded MIMO Scheme with PSK. *International Journal of Communications, Network and System Sciences*, **10**, 148-156. doi: 10.4236/ijcns.2017.108B016.

1. Introduction

There have been a number of research studies on the development of detection schemes for multi-input multi-output (MIMO) systems, in order to achieve a capacity approaching performance. The basic idea is to utilize a detector that maximizes the a posteriori probability (MAP) in order to achieve the best performance in combination with powerful forward error correction (FEC) coding scheme. In addition to the iterative soft decoding of the FEC scheme, re-utilization of the soft output fed-back into the symbol detection process made it possible to produce a capacity approaching performance [1]. However, a direct implementation of these iterative processes usually requires an exponentially- increasing computational complexity according to the number of antennas and the number of bits per symbol.

Recently, a number of researches reported results on minimum mean square error (MMSE) based MIMO detection schemes with soft iterative processes, due to their reasonable performance and complexity trade-offs [2] [3]. The parallel interference cancellation with MMSE (PIC-MMSE) MIMO detection schemes were proposed in order to enhance the performance as well as the computational efficiency compared to the conventional MMSE-based scheme [4] [5] [6]. These PIC-MMSE based detection schemes reduced the complexity of symbol-level detection to a linear-order. In addition to the symbol level detection, we need another step to extract soft bit information from the soft symbol values, and a direct implementation of this step requires an exponential order of complexity with increase in the number of bits in a symbol.

In this paper, we present an efficient linear MIMO detection scheme for a coded MIMO system, where phase shift keying (PSK) modulation schemes are used with low density parity check (LDPC) codes. In the proposed scheme, soft symbol values are first estimated by utilizing a PIC-MMSE filter, and then soft bit information (SBI) values are estimated only with a single distance estimation per bit. For this, we first normalize the detected symbol from the PIC-MMSE filtering process, and then map it to a specific region, so that SBI estimation can be made with a single distance calculation [7]. By this way, overall complexity is in a linear order, and thus it can be easily applied to a massive MIMO system, i.e., even the number of antennas are greater than a few tens.

The remainder of this paper is organized as follows. Section II describes a MIMO system model with soft iterative detection and decoding (IDD), with an FEC scheme with soft iterative decoding process. Next, the operational prin- ciples of the PIC-MMSE MIMO detection for IDD are described. In Section III, we detail the SBI estimation process by describing mathematical formulas when the PIC-MMSE detector is employed with PSK modulation. Section IV de- monstrates the bit error rate (BER) performance and the complexity of the proposed methods are compared with the conventional schemes for the LDPC coded MIMO systems with PSK modulation schemes. Finally, conclusions are drawn in Section V.

2. PIC-MMSE Detection for a Coded MIMO System

2.1. System Model

Figure 1 shows the block diagram for an MIMO system with soft IDD, where a LDPC code is used as an FEC scheme and a PSK is used for modulation. At the transmitter, the bit information vector is encoded to produce codeword. Then codewords are interleaved and modulated succes- sively before they are mapped to the transmitted antennas, where is the number of bits per transmitted symbol. The interleaved bits

Figure 1. Coded MIMO system model with soft IDD.

are divided and modulated to transmitted symbol vector, where represents the kth bit of the mth symbol which is independently chosen from a complex con- stellation O.

Suppose the received symbol vector is represented as, and a flat Rayleigh fading channel model is chosen as the MIMO channel, i.e., , where denotes the channel fading coefficient between the jth transmitted antenna and the ith received antenna. The elements of the channel matrix are modeled by independent and complex-valued Gaussian random variables with zero mean and unit variance. Then,

(1)

where is an vector whose elements are independent zero-mean complex Gaussian random variables with variance per dimension.

Figure 1 shows the soft IDD procedure. The SBI of the MIMO detector, is first calculated and subtracted by the a priori information of the detector, i.e.,; then the extrinsic information is passed through the de-interleaver, and its de-interleaved version is utilized by the channel decoder as the a priori information. The channel decoder estimates the infor- mation sequence and generates its soft output, by using soft iterative de- coding algorithm such as the min-sum-product algorithm. Subsequently, the interleaved version of extrinsic information, is fed back to the detector as the a priori information.

2.2. Soft Iterative PIC-MMSE Detection

The PIC-MMSE MIMO detector is performed as follows. First, with the a priori information, from the channel decoder (at the first iteration it is set to zero), the expected value of the ith transmitted symbol, is calculated as follows [8]:

(2)

where is a constellation symbol from, and is set to be −1 and 1 according to the kth bit of is 0 and 1, respectively. At the same time, the variance of the ith transmitted symbol, is calculated by:

(3)

The second step is PIC on the received symbol vector, , along with MMSE filtering. The PIC process on is performed using the estimated expectation, in (2) as follows:

(4)

where is the interference canceled symbol for the ith layer, is the ith column vector of the channel matrix, and denotes the residual noise plus interference (NPI) term expressed by. At the same time, the MMSE filtering process is performed as follows:

(5)

where is a diagonal matrix with estimated in (3).

The third step is suppressing the NPI term in (4) using the MMSE filter in (5). Then, the filtered result for the th layer, i.e., the estimated value of the th symbol, can be expressed as:

(6)

where denotes the ith row of and corresponds to the MMSE filter for the ith layer. The last step is to calculate SBI contained in. Let us denote SBI of the kth bit contained in the ith symbol, in terms of log-likelihood ratio (LLR) estimated on the observation of y over the channel H, as, then

(7)

where and denote constellation symbols with the kth bit of 0 and 1, respectively, and

(8)

It is clear in (7) that the search process to find the solution of needs complexity of for every layer.

3. Proposed Scheme

3.1. SBI Estimation Using Symbol Mapping of PSK

It was reported that there were no performance degradation even if the a priori information from the channel decoder in (7) was neglected, for the systems using binary phase shift keying (BPSK) and quadrature phase shift keying (QPSK) [9]. In this paper, we use this fact, and assume that the a priori infor- mation, can be neglected, then (7) can be simplified as follows.

(9)

With this simplification, the argument of operations in (9) is now. In other words, we need to find a symbol, with the minimum distance from for the kth bit. For this purpose, we map to a target unit range where there is only one constellation symbol to estimate the distance from. We utilize the symbol mapping technique using the symmetric characteristics of PSK symbol constellation for a given bit [7].

First, we consider that the constellation diagram can be divided into unit regions for -ary PSK modulation scheme, using the bisectors between the constellation symbols. Subsequently, is recursively mapped to a specific region in the first quadrant to, where, is the phase of the mapped symbol used for the kth bit of b. Then, at the ith layer, for the corresponding bit of is the same as the distance between and a constellation symbol located in the same unit region as. The mapped symbol, and the corresponding constellation symbol, are determined by the symmetric characteristics of the symbol constellation, based on Euclidean geometry for a given bit.

With the above property, (9) can be generalized as

(10)

where is a scaling parameter for the kth bit of the ith layer, which is a function of by reflecting the sign change introduced by the symbol mapping, and are the unique symbols nearest to, i.e., the mapped version of the detected symbol, with a phase of.

In addition, and are determined prior to the system implementation, and they are constant values independent of. For PSK with the Gray- mapping, and can be found as shown in Table 1 and Table 2. In 2, values can be recursively found as follows

(11)

where. In this way, the search process to find the minima can be eliminated. Thus, the complexity to estimate SBI is reduced to

Table 1. values for -ary PSK.

Table 2. values for -ary PSK.

linear-order for each independent layer without degrading the performance from the Max-approach.

3.2. Soft Symbol Estimation for PSK

Soft symbol value estimations specified in (2) and (3) require times of multiplications, which exponentially increases by. We reduce the com- plexities of computing (2) and (3), by finding the symbol values of. We modify the idea reported in [9] for QAM.

By denoting as the probability of the kth bit of the ith layer to be 0, the following equation applies:

(12)

where, then,

(13)

With this information, we simplify the expressions of and for PSK schemes, so that they can be used in real-number operations; First, in the case of BPSK, and can be derived as follows:

(14)

(15)

Then, we apply the same rule for the soft IDD scheme, and denote the iteration index inside the PIC-MMSE detector as, then (12) can be repre- sented by:

(16)

Equation (16) is then applied to QPSK, whereby QPSK can be decomposed into two independent BPSK. Then, expressions of the real and imaginary parts of the soft symbol values, and are formulated independently for QPSK with amplitude of and, respectively, as follows:

(17)

and accordingly, the of QPSK can be simplified according to the following equation:

(18)

The expressions for the real and imaginary part of for 8-PSK can be derived as follows:

(19)

(20)

where and. and for the 16-PSK can be derived with the same principle, and formulized as follows

(21)

(22)

where, , and . With the same principle, the in (2) for the higher-order PSK can be expanded.

4. Simulation Results

We simulated the BER performance of the proposed methods over a Rayleigh fading channel. We used the LDPC code with an information length of 16,200 bits and a code rate of 1/2. The min-sum product algorithm with a correction factor was used [10]. The maximum iterations of the LDPC decoding was set to 10, and the number of iterations between the LDPC decoder and PIC-MMSE detector was set to 4. As the conventional scheme, we employ (2) and (3) for soft symbol estimations inside PIC-MMSE and (7) for SBI estimation. On the other hand, in our proposed method, we utilized (17) to (22) for soft symbol esti- mations and (10) for SBI estimation.

Figure 2 and Figure 3 show the BER performance comparisons between the conventional and proposed schemes for and MIMO systems, respectively. As shown in the figures, the proposed method produces exactly the same performance with the conventional scheme, regardless of the modulation order and the number of antennas. On the other hand, the computational complexity of the proposed method is greatly reduced to almost linear-order, resulting from the elimination of search process to find the minima in the SBI calculation and a simplified soft symbol estimations. Table 3 demonstrates these.

Figure 2. BER Performance comparison of LDPC coded MIMO systems.

Figure 3. BER Performance comparison of LDPC coded MIMO systems.

Table 3. Number of multiplications and additions to estimate and per PIC- MMSE detection.

5. Conclusion

In this paper, we proposed the symbol mapping technique for the PIC-MMSE based MIMO detection of PSK to reduce the complexity, resulting from the elimination of the search process to find the minima in the SBI estimation. To further reduce the computational complexity, we presented efficient method for PSK schemes to calculate the soft symbols in the PIC process. Simulation results showed that the proposed techniques reduced the complexity to nearly linear- order without degrading the BER performance.

NOTES

^{1}This research was supported by the National Natural Science Foundation of China (No. 61601403), Universities Natural Science Research Project of Jiangsu Province (No. 16KJB510043).

Conflicts of Interest

The authors declare no conflicts of interest.

[1] | Hockwald, B.M. and Ten Brink, S. (2003) Achieving Near-Capacity on a Multi-ple-Antenna Channel. IEEE Transactions on Communication, 51, 389-399. https://doi.org/10.1109/TCOMM.2003.809789 |

[2] | Ahmed, S. and Kim, S. (2015) Efficient Soft Bit Estimation for Joint Iterative Multiple-Input Multi-ple-Output Detection. IET Communications, 9, 2107-2113. https://doi.org/10.1049/iet-com.2015.0225 |

[3] | Ahmed, S. and Kim, S. (2017) Efficient SIC-MMSE MIMO Detection with Three Iterative Loops. Inter-national Journal of Electronics and Communications, 72, 65- 71. https://doi.org/10.1016/j.aeue.2016.11.015 |

[4] | Tomasoni, A., Ferrari, M., Gatti, D., Osnato, F. and Bellini, S. (2006) Low Complexity Turbo MMSE Receiver for W-LAN MIMO Systems. Proc. of ICC 2006, 9, 4119- 4124. |

[5] | Bensaad, A., Bensaad, Z., Soudini, B. and Beloufa, A. (2013) SISO PIC-MMSE Detector in MIMO-OFDM Systems. Int. J. Mod. Eng. Research, 3, 2840-2847. |

[6] | Kuang, S.L., Ni, Z. and Lu, J. (2014) Low-Complexity Iterative Detection for Large-Scale Multiuse MIMO-OFDM Systems Using Approximate Message Passing. IEEE Journal on Selected Topics Signal Processing, 8, 902-915. https://doi.org/10.1109/JSTSP.2014.2313766 |

[7] | Zhang, M. and Kim, S. (2016) Universal Soft Demodulation Schemes for M-Ary PSK and QAM. IET Communications, 10, 316-326. https://doi.org/10.1049/iet-com.2015.0730 |

[8] | Zhang, M., Li, C., Kim, S. and Ahmed, S. (2016) Low Complexity Iterative PIC-MMSE Based Detection with Symbol Mapping. Proceedings of IEEE/CIC 2016, Chengdu, China, 27-29 July 2016. https://doi.org/10.1109/ICCChina.2016.7636778 |

[9] | Fateh, S. (2009) VLSI Implementation of Soft-Input Soft-Output MMSE Parallel Interfer-ence Cancellation. Master’s Thesis, ETH Zurich, Integrated Systems Laborato-ry. |

[10] | Eroz, M., Sun, F. and Lee, L. (2004) DVB-S2 Low Density Parity Check Codes with Near Shannon Limit Performance. International Journal of Satellite Communications and Networking, 22, 269-279. https://doi.org/10.1002/sat.787 |

Journals Menu

Contact us

customer@scirp.org | |

+86 18163351462(WhatsApp) | |

1655362766 | |

Paper Publishing WeChat |

Copyright © 2022 by authors and Scientific Research Publishing Inc.

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.