14,145 research outputs found

    Matrix Factorization Based Blind Bayesian Receiver for Grant-Free Random Access in mmWave MIMO mMTC

    Full text link
    Grant-free random access is promising for massive connectivity with sporadic transmissions in massive machine type communications (mMTC), where the hand-shaking between the access point (AP) and users is skipped, leading to high access efficiency. In grant-free random access, the AP needs to identify the active users and perform channel estimation and signal detection. Conventionally, pilot signals are required for the AP to achieve user activity detection and channel estimation before active user signal detection, which may still result in substantial overhead and latency. In this paper, to further reduce the overhead and latency, we explore the problem of grant-free random access without the use of pilot signals in a millimeter wave (mmWave) multiple input and multiple output (MIMO) system, where the AP performs blind joint user activity detection, channel estimation and signal detection (UACESD). We show that the blind joint UACESD can be formulated as a constrained composite matrix factorization problem, which can be solved by exploiting the structures of the channel matrix and signal matrix. Leveraging our recently developed unitary approximate message passing based matrix factorization (UAMP-MF) algorithm, we design a message passing based Bayesian algorithm to solve the blind joint UACESD problem. Extensive simulation results demonstrate the effectiveness of the blind grant-free random access scheme

    Grant-Free Massive MTC-Enabled Massive MIMO: A Compressive Sensing Approach

    Full text link
    A key challenge of massive MTC (mMTC), is the joint detection of device activity and decoding of data. The sparse characteristics of mMTC makes compressed sensing (CS) approaches a promising solution to the device detection problem. However, utilizing CS-based approaches for device detection along with channel estimation, and using the acquired estimates for coherent data transmission is suboptimal, especially when the goal is to convey only a few bits of data. First, we focus on the coherent transmission and demonstrate that it is possible to obtain more accurate channel state information by combining conventional estimators with CS-based techniques. Moreover, we illustrate that even simple power control techniques can enhance the device detection performance in mMTC setups. Second, we devise a new non-coherent transmission scheme for mMTC and specifically for grant-free random access. We design an algorithm that jointly detects device activity along with embedded information bits. The approach leverages elements from the approximate message passing (AMP) algorithm, and exploits the structured sparsity introduced by the non-coherent transmission scheme. Our analysis reveals that the proposed approach has superior performance compared to application of the original AMP approach.Comment: Submitted to IEEE Transactions on Communication

    Massive MIMO for Internet of Things (IoT) Connectivity

    Full text link
    Massive MIMO is considered to be one of the key technologies in the emerging 5G systems, but also a concept applicable to other wireless systems. Exploiting the large number of degrees of freedom (DoFs) of massive MIMO essential for achieving high spectral efficiency, high data rates and extreme spatial multiplexing of densely distributed users. On the one hand, the benefits of applying massive MIMO for broadband communication are well known and there has been a large body of research on designing communication schemes to support high rates. On the other hand, using massive MIMO for Internet-of-Things (IoT) is still a developing topic, as IoT connectivity has requirements and constraints that are significantly different from the broadband connections. In this paper we investigate the applicability of massive MIMO to IoT connectivity. Specifically, we treat the two generic types of IoT connections envisioned in 5G: massive machine-type communication (mMTC) and ultra-reliable low-latency communication (URLLC). This paper fills this important gap by identifying the opportunities and challenges in exploiting massive MIMO for IoT connectivity. We provide insights into the trade-offs that emerge when massive MIMO is applied to mMTC or URLLC and present a number of suitable communication schemes. The discussion continues to the questions of network slicing of the wireless resources and the use of massive MIMO to simultaneously support IoT connections with very heterogeneous requirements. The main conclusion is that massive MIMO can bring benefits to the scenarios with IoT connectivity, but it requires tight integration of the physical-layer techniques with the protocol design.Comment: Submitted for publicatio

    Massive MIMO is a Reality -- What is Next? Five Promising Research Directions for Antenna Arrays

    Full text link
    Massive MIMO (multiple-input multiple-output) is no longer a "wild" or "promising" concept for future cellular networks - in 2018 it became a reality. Base stations (BSs) with 64 fully digital transceiver chains were commercially deployed in several countries, the key ingredients of Massive MIMO have made it into the 5G standard, the signal processing methods required to achieve unprecedented spectral efficiency have been developed, and the limitation due to pilot contamination has been resolved. Even the development of fully digital Massive MIMO arrays for mmWave frequencies - once viewed prohibitively complicated and costly - is well underway. In a few years, Massive MIMO with fully digital transceivers will be a mainstream feature at both sub-6 GHz and mmWave frequencies. In this paper, we explain how the first chapter of the Massive MIMO research saga has come to an end, while the story has just begun. The coming wide-scale deployment of BSs with massive antenna arrays opens the door to a brand new world where spatial processing capabilities are omnipresent. In addition to mobile broadband services, the antennas can be used for other communication applications, such as low-power machine-type or ultra-reliable communications, as well as non-communication applications such as radar, sensing and positioning. We outline five new Massive MIMO related research directions: Extremely large aperture arrays, Holographic Massive MIMO, Six-dimensional positioning, Large-scale MIMO radar, and Intelligent Massive MIMO.Comment: 20 pages, 9 figures, submitted to Digital Signal Processin

    Sparse Message Passing Based Preamble Estimation for Crowded M2M Communications

    Full text link
    Due to the massive number of devices in the M2M communication era, new challenges have been brought to the existing random-access (RA) mechanism, such as severe preamble collisions and resource block (RB) wastes. To address these problems, a novel sparse message passing (SMP) algorithm is proposed, based on a factor graph on which Bernoulli messages are updated. The SMP enables an accurate estimation on the activity of the devices and the identity of the preamble chosen by each active device. Aided by the estimation, the RB efficiency for the uplink data transmission can be improved, especially among the collided devices. In addition, an analytical tool is derived to analyze the iterative evolution and convergence of the SMP algorithm. Finally, numerical simulations are provided to verify the validity of our analytical results and the significant improvement of the proposed SMP on estimation error rate even when preamble collision occurs.Comment: submitted to ICC 2018 with 6 pages and 4 figure

    ๋Œ€๊ทœ๋ชจ ์‚ฌ๋ฌผ ํ†ต์‹ ์„ ์œ„ํ•œ ์••์ถ•์„ผ์‹ฑ ๊ธฐ๋ฐ˜ ๋‹ค์ค‘ ์‚ฌ์šฉ์ž ๊ฒ€์ถœ

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ (๋ฐ•์‚ฌ)-- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› : ๊ณต๊ณผ๋Œ€ํ•™ ์ „๊ธฐยท์ปดํ“จํ„ฐ๊ณตํ•™๋ถ€, 2019. 2. ์ด๊ด‘๋ณต.Massive machine-type communication (mMTC) is a newly introduced service category in 5G wireless communication systems to support a variety of Internet-of-Things (IoT) applications. In the mMTC network, a large portion of devices is inactive and hence does not transmit data. Thus, the transmit vector consisting of data symbols of both active and inactive devices can be readily modeled as a sparse vector. In recovering sparsely represented multi-user vectors, compressed sensing based multi-user detection (CS-MUD) can be used. CS-MUD is a feasible solution to the grant-free uplink non-orthogonal multiple access (NOMA) environments. In this dissertation, two novel techniques regarding CS-MUD for mMTC networks are proposed. In the first part of the dissertation, the sparsity-aware ordered successive interference cancellation (SA-OSIC) technique is proposed. In CS-MUD, multi-user vectors are detected based on a sparsity-aware maximum a posteriori probability (S-MAP) criterion. To reduce the computational complexity of S-MAP detection, sparsity-aware successive interference cancellation (SA-SIC) can be used. SA-SIC is a simple low-complexity scheme that recovers transmit symbols in a sequential manner. However, SA-SIC does not perform well without proper layer sorting due to error propagation. When multi-user vectors are sparse and each device is active with a distinct probability, the detection order determined solely by channel gains might not be optimal. In this dissertation, to reduce the error propagation and enhance the performance of SA-SIC, an activity-aware sorted QR decomposition (A-SQRD) algorithm that finds the optimal detection order is proposed. The proposed technique finds the optimal detection order based on the activity probabilities and channel gains of machine-type devices. Numerical results verify that the proposed technique greatly improves the performance of SA-SIC. In the second part of the dissertation, the expectation propagation based joint AUD and CE (EP-AUD/CE) technique is proposed. In several studies regarding CS-MUD, the uplink channel state information (CSI) from the MTD to the BS is assumed to be perfectly known to the BS. In practice, however, the uplink CSI from the devices to the BS should be estimated before data detection. To address this issue, various joint active user detection (AUD) and channel estimation (CE) schemes have been proposed. Since only a few devices are active at one time, an element-wise (i.e., Hadamard) product of the binary activity pattern and the channel vector is also a sparse vector and thus compressed sensing (CS)-based technique is a good fit for the problem at hand. One potential shortcoming in these studies is that a prior distribution of the sparse vector is not exploited. In fact, these studies are based on the non-Bayesian greedy algorithms such as the orthogonal matching pursuit (OMP) and approximate message passing (AMP) algorithms, which do not require a prior distribution of the sparse vector. In essence, these algorithms find out non-zero values based on the instantaneous correlation between the sensing matrix and the observation vector so that they might not be effective in the situation where the prior distribution is available. In this case, clearly, by exploiting the statistical distribution of the sparse vector, the performance of AUD and CE can be improved substantially. The proposed technique finds the best approximation of the posterior distribution of the sparse channel vector based on the expectation propagation (EP) algorithm. Using the approximate distribution, AUD and CE are jointly performed. Numerical simulations show that the proposed technique substantially enhances AUD and CE performances over competing algorithms.๋Œ€๊ทœ๋ชจ ์‚ฌ๋ฌผ ํ†ต์‹ (massive machine-type communications, mMTC)์€ ๋‹ค์–‘ํ•œ ์‚ฌ๋ฌผ ์ธํ„ฐ๋„ท(internet of things, IoT) ์„œ๋น„์Šค๋ฅผ ์ง€์›ํ•˜๊ธฐ ์œ„ํ•ด ์ฐจ์„ธ๋Œ€ ๋ฌด์„  ํ†ต์‹  ํ‘œ์ค€์— ์ƒˆ๋กœ ๋„์ž…๋œ ์„œ๋น„์Šค ๋ฒ”์ฃผ์ด๋‹ค. ๋Œ€๊ทœ๋ชจ ์‚ฌ๋ฌผ ํ†ต์‹  ํ™˜๊ฒฝ์—์„œ๋Š” ๋งŽ์€ ์ˆ˜์˜ ์‚ฌ๋ฌผ ๊ธฐ๊ธฐ(machine-type device, MTD)๊ฐ€ ๋Œ€๋ถ€๋ถ„์˜ ํƒ€์ž„ ์Šฌ๋กฏ(time slot)์—์„œ ๋น„ํ™œ์„ฑ ์ƒํƒœ์ด๋ฉฐ ๋ฐ์ดํ„ฐ๋ฅผ ์ „์†กํ•˜์ง€ ์•Š๋Š”๋‹ค. ๋”ฐ๋ผ์„œ, ํ™œ์„ฑ ๋ฐ ๋น„ํ™œ์„ฑ ๊ธฐ๊ธฐ ๋ชจ๋‘์˜ ๋ฐ์ดํ„ฐ ์‹ฌ๋ณผ๋กœ ๊ตฌ์„ฑ๋œ ์ „์†ก ๋ฒกํ„ฐ๋Š” ํฌ์†Œ(sparse) ๋ฒกํ„ฐ๋กœ ํ‘œํ˜„๋  ์ˆ˜ ์žˆ๋‹ค. ํฌ์†Œ ๋ฒกํ„ฐ๋กœ ํ‘œํ˜„๋œ ๋‹ค์ค‘ ์‚ฌ์šฉ์ž ๋ฒกํ„ฐ๋ฅผ ๋ณต์›ํ•˜๊ธฐ ์œ„ํ•ด, ์••์ถ• ์„ผ์‹ฑ ๊ธฐ๋ฐ˜ ๋‹ค์ค‘ ์‚ฌ์šฉ์ž ๊ฒ€์ถœ(CS-MUD)์ด ์‚ฌ์šฉ๋  ์ˆ˜ ์žˆ๋‹ค. CS-MUD๋Š” ์Šค์ผ€์ค„๋ง(scheduling) ์ ˆ์ฐจ๊ฐ€ ์—†๋Š” ์ƒํ–ฅ๋งํฌ(uplink) ๋น„์ง๊ต ๋‹ค์ค‘ ์ ‘์†(non-orthogonal multiple access, NOMA)์„ ์œ„ํ•œ ํ•ต์‹ฌ ๊ธฐ์ˆ  ์ค‘ ํ•˜๋‚˜์ด๋‹ค. ๋ณธ ํ•™์œ„ ๋…ผ๋ฌธ์—์„œ๋Š” ๋Œ€๊ทœ๋ชจ ์‚ฌ๋ฌผ ํ†ต์‹ ์„ ์œ„ํ•œ ์ƒˆ๋กœ์šด CS-MUD ๊ธฐ์ˆ ๋“ค์„ ์ œ์•ˆํ•œ๋‹ค. ๋…ผ๋ฌธ์˜ ์ฒซ ๋ฒˆ์งธ ๋ถ€๋ถ„์—์„œ๋Š”, ํฌ์†Œ์„ฑ์„ ๊ณ ๋ คํ•œ ์ •๋ ฌ ์ˆœ์ฐจ์  ๊ฐ„์„ญ ์ œ๊ฑฐ(sparsity-aware ordered successive interference cancellation, SA-OSIC) ๊ธฐ์ˆ ์„ ์ œ์•ˆํ•œ๋‹ค. CS-MUD์—์„œ ๋‹ค์ค‘ ์‚ฌ์šฉ์ž ๋ฒกํ„ฐ๋Š” ํฌ์†Œ์„ฑ์„ ๊ณ ๋ คํ•œ ์ตœ๋Œ€ ์‚ฌํ›„ ํ™•๋ฅ (sparsity-aware maximum a posteriori probability, S-MAP) ๊ธฐ์ค€์— ๋”ฐ๋ผ ๊ฒ€์ถœ๋œ๋‹ค. S-MAP ๊ฒ€์ถœ์˜ ๊ณ„์‚ฐ ๋ณต์žก์„ฑ์„ ์ค„์ด๊ธฐ ์œ„ํ•ด ํฌ์†Œ์„ฑ์„ ๊ณ ๋ คํ•œ ์ˆœ์ฐจ์  ๊ฐ„์„ญ ์ œ๊ฑฐ(sparsity-aware successive interference cancellation, SA-SIC)๋ฅผ ์‚ฌ์šฉํ•  ์ˆ˜ ์žˆ๋‹ค. ํฌ์†Œ ๋ฐ์ดํ„ฐ ๋ฒกํ„ฐ ๊ฒ€์ถœ์˜ ๊ณ„์‚ฐ ๋ณต์žก์„ฑ์„ ์ค„์ด๊ธฐ ์œ„ํ•ด ์‚ฌ์šฉ๋˜๋Š” ํฌ์†Œ์„ฑ ๊ณ ๋ ค ์—ฐ์† ๊ฐ„์„ญ ์ œ๊ฑฐ ๊ธฐ์ˆ ์€ ์˜ค๋ฅ˜ ์ „ํŒŒ(error propagation)๋กœ ์ธํ•ด ์ ์ ˆํ•œ ์‚ฌ์šฉ์ž ์ •๋ ฌ ์—†์ด๋Š” ์„ฑ๋Šฅ์ด ์ข‹์ง€ ์•Š๋‹ค. ๋‹ค์ค‘ ์‚ฌ์šฉ์ž ๋ฒกํ„ฐ๊ฐ€ ํฌ์†Œ ๋ฒกํ„ฐ์ด๊ณ  ๊ฐ ๊ธฐ๊ธฐ๊ฐ€ ๋‹ค๋ฅธ ํ™•๋ฅ ๋กœ ํ™œ์„ฑ์ผ ๊ฒฝ์šฐ ์ฑ„๋„ ์ด๋“(channel gain)์— ์˜ํ•ด์„œ๋งŒ ๊ฒฐ์ •๋œ ์‚ฌ์šฉ์ž ๊ฒ€์ถœ ์ˆœ์„œ๋Š” ์ตœ์ ์ด ์•„๋‹ ์ˆ˜ ์žˆ๋‹ค. ๋ณธ ๋…ผ๋ฌธ์—์„œ๋Š”, ์˜ค๋ฅ˜ ์ „ํŒŒ๋ฅผ ์ค„์ด๊ณ  ํฌ์†Œ์„ฑ ๊ณ ๋ ค ์—ฐ์† ๊ฐ„์„ญ ์ œ๊ฑฐ์˜ ์„ฑ๋Šฅ์„ ํ–ฅ์ƒํ•˜๊ธฐ ์œ„ํ•ด ๊ฐ ์‚ฌ๋ฌผ ๊ธฐ๊ธฐ์˜ ํ™œ์„ฑ ํ™•๋ฅ (activity probability)๊ณผ ์ฑ„๋„ ์ด๋“์„ ๊ธฐ๋ฐ˜์œผ๋กœ ์ตœ์ ์˜ ๊ฒ€์ถœ ์ˆœ์„œ๋ฅผ ์ฐพ๋Š” ์ƒˆ๋กœ์šด ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ์ œ์•ˆํ•œ๋‹ค. ์‹œ๋ฎฌ๋ ˆ์ด์…˜์„ ํ†ตํ•ด ์ œ์•ˆํ•œ ๊ฒ€์ถœ ์ˆœ์„œ ์ •๋ ฌ ๊ธฐ์ˆ ์€ ๋ฐ์ดํ„ฐ ๊ฒ€์ถœ์˜ ์„ฑ๋Šฅ์„ ํฌ๊ฒŒ ํ–ฅ์ƒํ•จ์„ ๊ฒ€์ฆํ•˜์˜€๋‹ค. ๋…ผ๋ฌธ์˜ ๋‘ ๋ฒˆ์งธ ๋ถ€๋ถ„์—์„œ๋Š”, ๊ธฐ๋Œ“๊ฐ’ ์ „ํŒŒ ๊ธฐ๋ฐ˜ ํ™œ์„ฑ ์‚ฌ์šฉ์ž ๊ฒ€์ถœ ๋ฐ ์ฑ„๋„ ์ถ”์ •(expectation propagation based active user detection channel estimation, EP-AUD/CE) ๊ธฐ์ˆ ์„ ์ œ์•ˆํ•œ๋‹ค. CS-MUD์— ๊ด€ํ•œ ๋ช‡๋ช‡ ์—ฐ๊ตฌ์—์„œ, ๊ฐ ์‚ฌ๋ฌผ ๊ธฐ๊ธฐ๋กœ๋ถ€ํ„ฐ ๊ธฐ์ง€๊ตญ(base station, BS)์œผ๋กœ์˜ ์ƒํ–ฅ๋งํฌ ์ฑ„๋„ ์ƒํƒœ ์ •๋ณด(channel state information, CSI)๋Š” ๊ธฐ์ง€๊ตญ์— ์™„์ „ํžˆ ์•Œ๋ ค์ ธ ์žˆ๋‹ค๊ณ  ๊ฐ€์ •๋œ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ์‹ค์ œ๋กœ๋Š”, ๋ฐ์ดํ„ฐ ๊ฒ€์ถœ ์ „์— ๊ฐ ๊ธฐ๊ธฐ๋กœ๋ถ€ํ„ฐ ๊ธฐ์ง€๊ตญ์œผ๋กœ์˜ ์ƒํ–ฅ๋งํฌ ์ฑ„๋„ ์ƒํƒœ ์ •๋ณด๋ฅผ ์ถ”์ •ํ•ด์•ผ ํ•œ๋‹ค. ์ด ๋ฌธ์ œ๋ฅผ ํ•ด๊ฒฐํ•˜๊ธฐ ์œ„ํ•ด ๋‹ค์–‘ํ•œ ํ™œ์„ฑ ์‚ฌ์šฉ์ž ๊ฒ€์ถœ(active user detection, AUD) ๋ฐ ์ฑ„๋„ ์ถ”์ •(channel estimation, CE) ๊ธฐ์ˆ ์ด ์ œ์•ˆ๋˜์—ˆ๋‹ค. ๋Œ€๊ทœ๋ชจ ์‚ฌ๋ฌผ ํ†ต์‹ ์—์„œ๋Š” ํ•˜๋‚˜์˜ ํƒ€์ž„ ์Šฌ๋กฏ์— ์ ์€ ์ˆ˜์˜ ์žฅ์น˜๋งŒ ํ™œ์„ฑํ™”๋˜๊ธฐ ๋•Œ๋ฌธ์— ์ด์ง„(binary)๊ฐ’์œผ๋กœ ์ด๋ฃจ์–ด์ง„ ํ™œ์„ฑ ์—ฌ๋ถ€ ๋ฒกํ„ฐ์™€ ์ฑ„๋„ ๋ฒกํ„ฐ์˜ ๊ณฑ์€ ํฌ์†Œ ๋ฒกํ„ฐ๊ฐ€ ๋˜์–ด ์••์ถ•์„ผ์‹ฑ ์•Œ๊ณ ๋ฆฌ์ฆ˜์œผ๋กœ ๋ณต์›์ด ๊ฐ€๋Šฅํ•˜๋‹ค. ํ•˜์ง€๋งŒ, ์ด๋Ÿฌํ•œ ์—ฐ๊ตฌ๋“ค์˜ ๋‹จ์  ์ค‘ ํ•˜๋‚˜๋Š” ํฌ์†Œ ๋ฒกํ„ฐ์˜ ์‚ฌ์ „ ๋ถ„ํฌ(prior distritubion)๊ฐ€ ํ™œ์šฉ๋˜์ง€ ์•Š๋Š”๋‹ค๋Š” ๊ฒƒ์ด๋‹ค. ํฌ์†Œ ๋ฒกํ„ฐ์˜ ํ†ต๊ณ„์  ์‚ฌ์ „ ๋ถ„ํฌ๋ฅผ ์ด์šฉํ•˜๋ฉด ํ™œ์„ฑ ์‚ฌ์šฉ์ž ๊ฒ€์ถœ ๋ฐ ์ฑ„๋„ ์ถ”์ •์˜ ์„ฑ๋Šฅ์„ ํฌ๊ฒŒ ํ–ฅ์ƒํ•  ์ˆ˜ ์žˆ๋‹ค. ๋ณธ ํ•™์œ„ ๋…ผ๋ฌธ์—์„œ๋Š”, ๊ธฐ๋Œ“๊ฐ’ ์ „ํŒŒ(expectation propagation, EP) ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ์ด์šฉํ•ด ํฌ์†Œ ์ฑ„๋„ ๋ฒกํ„ฐ์˜ ์‚ฌํ›„ ๋ถ„ํฌ(posterior distribution)์˜ ๊ทผ์‚ฌ ๋ถ„ํฌ๋ฅผ ์ฐพ๊ณ , ํ•ด๋‹น ๊ทผ์‚ฌ ๋ถ„ํฌ๋ฅผ ์ด์šฉํ•˜์—ฌ ํ™œ์„ฑ ์‚ฌ์šฉ์ž ๊ฒ€์ถœ๊ณผ ์ฑ„๋„ ์ถ”์ •์„ ๋™์‹œ์— ์ˆ˜ํ–‰ํ•˜๋Š” ๊ธฐ์ˆ ์„ ์ œ์•ˆํ•œ๋‹ค. ์‹œ๋ฎฌ๋ ˆ์ด์…˜์„ ํ†ตํ•ด ์ œ์•ˆํ•œ ์‚ฌ์šฉ์ž ๊ฒ€์ถœ ๋ฐ ์ฑ„๋„ ์ถ”์ • ๊ธฐ์ˆ ์€ ํ™œ์„ฑ ์‚ฌ์šฉ์ž ๊ฒ€์ถœ ๋ฐ ์ฑ„๋„ ์ถ”์ •์˜ ์„ฑ๋Šฅ์„ ์ƒ๋‹นํžˆ ํ–ฅ์ƒํ•จ์„ ๊ฒ€์ฆํ•˜์˜€๋‹ค.1 Introduction . . . . . 1 1.1 Sparsity-Aware Ordered Successive Interference Cancellation . . . . . 3 1.2 Expectation Propagation-based Joint Active User Detection and Channel Estimation . . . . . 4 2 Sparsity-Aware Ordered Successive Interference Cancellation . . . . . 7 2.1 System model . . . . . 7 2.2 Sparsity-Aware Successive Interference Cancellation (SA-SIC) . . . . . 9 2.2.1 Derivation of S-MAP Detection . . . . . 9 2.2.2 Sparsity-Aware SIC (SA-SIC) Detection . . . . . 10 2.3 Proposed Activity-Aware Sorted-QRD (A-SQRD) Algorithm . . . . . 11 2.4 Complexity Analysis . . . . . 15 2.5 Numerical Results . . . . . 15 2.5.1 Simulation Setup . . . . . 16 2.5.2 Simulation Results . . . . . 20 3 Expectation Propagation-based Joint Active User Detection and Channel Estimation . . . . . 21 3.1 System model . . . . . 21 3.2 Joint Active User Detection and Channel Estimation . . . . . 23 3.3 EP-Based Active User Detection and Channel Estimation . . . . . 26 3.3.1 A Brief Review of Expectation Propagation . . . . . 29 3.3.2 Form of the Approximation . . . . . 30 3.3.3 Iterative EP Update Rules . . . . . 31 3.3.4 Active User Detection and Channel Estimation . . . . . 36 3.3.5 Data Detection . . . . . 37 3.3.6 Comments on Complexity . . . . . 38 3.4 Simulation Results and Discussions . . . . . 39 3.4.1 Simulation Setup . . . . . 39 3.4.2 Simulation Results . . . . . 52 4 Conclusion . . . . . 54 Abstract (In Korean) . . . . . 60Docto
    • โ€ฆ
    corecore