4,207 research outputs found

    Grant-Free Massive MTC-Enabled Massive MIMO: A Compressive Sensing Approach

    Full text link
    A key challenge of massive MTC (mMTC), is the joint detection of device activity and decoding of data. The sparse characteristics of mMTC makes compressed sensing (CS) approaches a promising solution to the device detection problem. However, utilizing CS-based approaches for device detection along with channel estimation, and using the acquired estimates for coherent data transmission is suboptimal, especially when the goal is to convey only a few bits of data. First, we focus on the coherent transmission and demonstrate that it is possible to obtain more accurate channel state information by combining conventional estimators with CS-based techniques. Moreover, we illustrate that even simple power control techniques can enhance the device detection performance in mMTC setups. Second, we devise a new non-coherent transmission scheme for mMTC and specifically for grant-free random access. We design an algorithm that jointly detects device activity along with embedded information bits. The approach leverages elements from the approximate message passing (AMP) algorithm, and exploits the structured sparsity introduced by the non-coherent transmission scheme. Our analysis reveals that the proposed approach has superior performance compared to application of the original AMP approach.Comment: Submitted to IEEE Transactions on Communication

    Sparse Signal Processing Concepts for Efficient 5G System Design

    Full text link
    As it becomes increasingly apparent that 4G will not be able to meet the emerging demands of future mobile communication systems, the question what could make up a 5G system, what are the crucial challenges and what are the key drivers is part of intensive, ongoing discussions. Partly due to the advent of compressive sensing, methods that can optimally exploit sparsity in signals have received tremendous attention in recent years. In this paper we will describe a variety of scenarios in which signal sparsity arises naturally in 5G wireless systems. Signal sparsity and the associated rich collection of tools and algorithms will thus be a viable source for innovation in 5G wireless system design. We will discribe applications of this sparse signal processing paradigm in MIMO random access, cloud radio access networks, compressive channel-source network coding, and embedded security. We will also emphasize important open problem that may arise in 5G system design, for which sparsity will potentially play a key role in their solution.Comment: 18 pages, 5 figures, accepted for publication in IEEE Acces

    Signal Processing for Compressed Sensing Multiuser Detection

    Get PDF
    The era of human based communication was longly believed to be the main driver for the development of communication systems. Already nowadays we observe that other types of communication impact the discussions of how future communication system will look like. One emerging technology in this direction is machine to machine (M2M) communication. M2M addresses the communication between autonomous entities without human interaction in mind. A very challenging aspect is the fact that M2M strongly differ from what communication system were designed for. Compared to human based communication, M2M is often characterized by small and sporadic uplink transmissions with limited data-rate constraints. While current communication systems can cope with several 100 transmissions, M2M envisions a massive number of devices that simultaneously communicate to a central base-station. Therefore, future communication systems need to be equipped with novel technologies facilitating the aggregation of massive M2M. The key design challenge lies in the efficient design of medium access technologies that allows for efficient communication with small data packets. Further, novel physical layer aspects have to be considered in order to reliable detect the massive uplink communication. Within this thesis physical layer concepts are introduced for a novel medium access technology tailored to the demands of sporadic M2M. This concept combines advances from the field of sporadic signal processing and communications. The main idea is to exploit the sporadic structure of the M2M traffic to design physical layer algorithms utilizing this side information. This concept considers that the base-station has to jointly detect the activity and the data of the M2M nodes. The whole framework of joint activity and data detection in sporadic M2M is known as Compressed Sensing Multiuser Detection (CS-MUD). This thesis introduces new physical layer concepts for CS-MUD. One important aspect is the question of how the activity detection impacts the data detection. It is shown that activity errors have a fundamentally different impact on the underlying communication system than data errors have. To address this impact, this thesis introduces new algorithms that aim at controlling or even avoiding the activity errors in a system. It is shown that a separate activity and data detection is a possible approach to control activity errors in M2M. This becomes possible by considering the activity detection task in a Bayesian framework based on soft activity information. This concept allows maintaining a constant and predictable activity error rate in a system. Beyond separate activity and data detection, the joint activity and data detection problem is addressed. Here a novel detector based on message passing is introduced. The main driver for this concept is the extrinsic information exchange between different entities being part of a graphical representation of the whole estimation problem. It can be shown that this detector is superior to state-of-the-art concepts for CS-MUD. Besides analyzing the concepts introduced simulatively, this thesis also shows an implementation of CS-MUD on a hardware demonstrator platform using the algorithms developed within this thesis. This implementation validates that the advantages of CS-MUD via over-the-air transmissions and measurements under practical constraints

    Reliable recovery of hierarchically sparse signals for Gaussian and Kronecker product measurements

    Full text link
    We propose and analyze a solution to the problem of recovering a block sparse signal with sparse blocks from linear measurements. Such problems naturally emerge inter alia in the context of mobile communication, in order to meet the scalability and low complexity requirements of massive antenna systems and massive machine-type communication. We introduce a new variant of the Hard Thresholding Pursuit (HTP) algorithm referred to as HiHTP. We provide both a proof of convergence and a recovery guarantee for noisy Gaussian measurements that exhibit an improved asymptotic scaling in terms of the sampling complexity in comparison with the usual HTP algorithm. Furthermore, hierarchically sparse signals and Kronecker product structured measurements naturally arise together in a variety of applications. We establish the efficient reconstruction of hierarchically sparse signals from Kronecker product measurements using the HiHTP algorithm. Additionally, we provide analytical results that connect our recovery conditions to generalized coherence measures. Again, our recovery results exhibit substantial improvement in the asymptotic sampling complexity scaling over the standard setting. Finally, we validate in numerical experiments that for hierarchically sparse signals, HiHTP performs significantly better compared to HTP.Comment: 11+4 pages, 5 figures. V3: Incomplete funding information corrected and minor typos corrected. V4: Change of title and additional author Axel Flinth. Included new results on Kronecker product measurements and relations of HiRIP to hierarchical coherence measures. Improved presentation of general hierarchically sparse signals and correction of minor typo

    ๋Œ€๊ทœ๋ชจ ์‚ฌ๋ฌผ ํ†ต์‹ ์„ ์œ„ํ•œ ์••์ถ•์„ผ์‹ฑ ๊ธฐ๋ฐ˜ ๋‹ค์ค‘ ์‚ฌ์šฉ์ž ๊ฒ€์ถœ

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ (๋ฐ•์‚ฌ)-- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› : ๊ณต๊ณผ๋Œ€ํ•™ ์ „๊ธฐยท์ปดํ“จํ„ฐ๊ณตํ•™๋ถ€, 2019. 2. ์ด๊ด‘๋ณต.Massive machine-type communication (mMTC) is a newly introduced service category in 5G wireless communication systems to support a variety of Internet-of-Things (IoT) applications. In the mMTC network, a large portion of devices is inactive and hence does not transmit data. Thus, the transmit vector consisting of data symbols of both active and inactive devices can be readily modeled as a sparse vector. In recovering sparsely represented multi-user vectors, compressed sensing based multi-user detection (CS-MUD) can be used. CS-MUD is a feasible solution to the grant-free uplink non-orthogonal multiple access (NOMA) environments. In this dissertation, two novel techniques regarding CS-MUD for mMTC networks are proposed. In the first part of the dissertation, the sparsity-aware ordered successive interference cancellation (SA-OSIC) technique is proposed. In CS-MUD, multi-user vectors are detected based on a sparsity-aware maximum a posteriori probability (S-MAP) criterion. To reduce the computational complexity of S-MAP detection, sparsity-aware successive interference cancellation (SA-SIC) can be used. SA-SIC is a simple low-complexity scheme that recovers transmit symbols in a sequential manner. However, SA-SIC does not perform well without proper layer sorting due to error propagation. When multi-user vectors are sparse and each device is active with a distinct probability, the detection order determined solely by channel gains might not be optimal. In this dissertation, to reduce the error propagation and enhance the performance of SA-SIC, an activity-aware sorted QR decomposition (A-SQRD) algorithm that finds the optimal detection order is proposed. The proposed technique finds the optimal detection order based on the activity probabilities and channel gains of machine-type devices. Numerical results verify that the proposed technique greatly improves the performance of SA-SIC. In the second part of the dissertation, the expectation propagation based joint AUD and CE (EP-AUD/CE) technique is proposed. In several studies regarding CS-MUD, the uplink channel state information (CSI) from the MTD to the BS is assumed to be perfectly known to the BS. In practice, however, the uplink CSI from the devices to the BS should be estimated before data detection. To address this issue, various joint active user detection (AUD) and channel estimation (CE) schemes have been proposed. Since only a few devices are active at one time, an element-wise (i.e., Hadamard) product of the binary activity pattern and the channel vector is also a sparse vector and thus compressed sensing (CS)-based technique is a good fit for the problem at hand. One potential shortcoming in these studies is that a prior distribution of the sparse vector is not exploited. In fact, these studies are based on the non-Bayesian greedy algorithms such as the orthogonal matching pursuit (OMP) and approximate message passing (AMP) algorithms, which do not require a prior distribution of the sparse vector. In essence, these algorithms find out non-zero values based on the instantaneous correlation between the sensing matrix and the observation vector so that they might not be effective in the situation where the prior distribution is available. In this case, clearly, by exploiting the statistical distribution of the sparse vector, the performance of AUD and CE can be improved substantially. The proposed technique finds the best approximation of the posterior distribution of the sparse channel vector based on the expectation propagation (EP) algorithm. Using the approximate distribution, AUD and CE are jointly performed. Numerical simulations show that the proposed technique substantially enhances AUD and CE performances over competing algorithms.๋Œ€๊ทœ๋ชจ ์‚ฌ๋ฌผ ํ†ต์‹ (massive machine-type communications, mMTC)์€ ๋‹ค์–‘ํ•œ ์‚ฌ๋ฌผ ์ธํ„ฐ๋„ท(internet of things, IoT) ์„œ๋น„์Šค๋ฅผ ์ง€์›ํ•˜๊ธฐ ์œ„ํ•ด ์ฐจ์„ธ๋Œ€ ๋ฌด์„  ํ†ต์‹  ํ‘œ์ค€์— ์ƒˆ๋กœ ๋„์ž…๋œ ์„œ๋น„์Šค ๋ฒ”์ฃผ์ด๋‹ค. ๋Œ€๊ทœ๋ชจ ์‚ฌ๋ฌผ ํ†ต์‹  ํ™˜๊ฒฝ์—์„œ๋Š” ๋งŽ์€ ์ˆ˜์˜ ์‚ฌ๋ฌผ ๊ธฐ๊ธฐ(machine-type device, MTD)๊ฐ€ ๋Œ€๋ถ€๋ถ„์˜ ํƒ€์ž„ ์Šฌ๋กฏ(time slot)์—์„œ ๋น„ํ™œ์„ฑ ์ƒํƒœ์ด๋ฉฐ ๋ฐ์ดํ„ฐ๋ฅผ ์ „์†กํ•˜์ง€ ์•Š๋Š”๋‹ค. ๋”ฐ๋ผ์„œ, ํ™œ์„ฑ ๋ฐ ๋น„ํ™œ์„ฑ ๊ธฐ๊ธฐ ๋ชจ๋‘์˜ ๋ฐ์ดํ„ฐ ์‹ฌ๋ณผ๋กœ ๊ตฌ์„ฑ๋œ ์ „์†ก ๋ฒกํ„ฐ๋Š” ํฌ์†Œ(sparse) ๋ฒกํ„ฐ๋กœ ํ‘œํ˜„๋  ์ˆ˜ ์žˆ๋‹ค. ํฌ์†Œ ๋ฒกํ„ฐ๋กœ ํ‘œํ˜„๋œ ๋‹ค์ค‘ ์‚ฌ์šฉ์ž ๋ฒกํ„ฐ๋ฅผ ๋ณต์›ํ•˜๊ธฐ ์œ„ํ•ด, ์••์ถ• ์„ผ์‹ฑ ๊ธฐ๋ฐ˜ ๋‹ค์ค‘ ์‚ฌ์šฉ์ž ๊ฒ€์ถœ(CS-MUD)์ด ์‚ฌ์šฉ๋  ์ˆ˜ ์žˆ๋‹ค. CS-MUD๋Š” ์Šค์ผ€์ค„๋ง(scheduling) ์ ˆ์ฐจ๊ฐ€ ์—†๋Š” ์ƒํ–ฅ๋งํฌ(uplink) ๋น„์ง๊ต ๋‹ค์ค‘ ์ ‘์†(non-orthogonal multiple access, NOMA)์„ ์œ„ํ•œ ํ•ต์‹ฌ ๊ธฐ์ˆ  ์ค‘ ํ•˜๋‚˜์ด๋‹ค. ๋ณธ ํ•™์œ„ ๋…ผ๋ฌธ์—์„œ๋Š” ๋Œ€๊ทœ๋ชจ ์‚ฌ๋ฌผ ํ†ต์‹ ์„ ์œ„ํ•œ ์ƒˆ๋กœ์šด CS-MUD ๊ธฐ์ˆ ๋“ค์„ ์ œ์•ˆํ•œ๋‹ค. ๋…ผ๋ฌธ์˜ ์ฒซ ๋ฒˆ์งธ ๋ถ€๋ถ„์—์„œ๋Š”, ํฌ์†Œ์„ฑ์„ ๊ณ ๋ คํ•œ ์ •๋ ฌ ์ˆœ์ฐจ์  ๊ฐ„์„ญ ์ œ๊ฑฐ(sparsity-aware ordered successive interference cancellation, SA-OSIC) ๊ธฐ์ˆ ์„ ์ œ์•ˆํ•œ๋‹ค. CS-MUD์—์„œ ๋‹ค์ค‘ ์‚ฌ์šฉ์ž ๋ฒกํ„ฐ๋Š” ํฌ์†Œ์„ฑ์„ ๊ณ ๋ คํ•œ ์ตœ๋Œ€ ์‚ฌํ›„ ํ™•๋ฅ (sparsity-aware maximum a posteriori probability, S-MAP) ๊ธฐ์ค€์— ๋”ฐ๋ผ ๊ฒ€์ถœ๋œ๋‹ค. S-MAP ๊ฒ€์ถœ์˜ ๊ณ„์‚ฐ ๋ณต์žก์„ฑ์„ ์ค„์ด๊ธฐ ์œ„ํ•ด ํฌ์†Œ์„ฑ์„ ๊ณ ๋ คํ•œ ์ˆœ์ฐจ์  ๊ฐ„์„ญ ์ œ๊ฑฐ(sparsity-aware successive interference cancellation, SA-SIC)๋ฅผ ์‚ฌ์šฉํ•  ์ˆ˜ ์žˆ๋‹ค. ํฌ์†Œ ๋ฐ์ดํ„ฐ ๋ฒกํ„ฐ ๊ฒ€์ถœ์˜ ๊ณ„์‚ฐ ๋ณต์žก์„ฑ์„ ์ค„์ด๊ธฐ ์œ„ํ•ด ์‚ฌ์šฉ๋˜๋Š” ํฌ์†Œ์„ฑ ๊ณ ๋ ค ์—ฐ์† ๊ฐ„์„ญ ์ œ๊ฑฐ ๊ธฐ์ˆ ์€ ์˜ค๋ฅ˜ ์ „ํŒŒ(error propagation)๋กœ ์ธํ•ด ์ ์ ˆํ•œ ์‚ฌ์šฉ์ž ์ •๋ ฌ ์—†์ด๋Š” ์„ฑ๋Šฅ์ด ์ข‹์ง€ ์•Š๋‹ค. ๋‹ค์ค‘ ์‚ฌ์šฉ์ž ๋ฒกํ„ฐ๊ฐ€ ํฌ์†Œ ๋ฒกํ„ฐ์ด๊ณ  ๊ฐ ๊ธฐ๊ธฐ๊ฐ€ ๋‹ค๋ฅธ ํ™•๋ฅ ๋กœ ํ™œ์„ฑ์ผ ๊ฒฝ์šฐ ์ฑ„๋„ ์ด๋“(channel gain)์— ์˜ํ•ด์„œ๋งŒ ๊ฒฐ์ •๋œ ์‚ฌ์šฉ์ž ๊ฒ€์ถœ ์ˆœ์„œ๋Š” ์ตœ์ ์ด ์•„๋‹ ์ˆ˜ ์žˆ๋‹ค. ๋ณธ ๋…ผ๋ฌธ์—์„œ๋Š”, ์˜ค๋ฅ˜ ์ „ํŒŒ๋ฅผ ์ค„์ด๊ณ  ํฌ์†Œ์„ฑ ๊ณ ๋ ค ์—ฐ์† ๊ฐ„์„ญ ์ œ๊ฑฐ์˜ ์„ฑ๋Šฅ์„ ํ–ฅ์ƒํ•˜๊ธฐ ์œ„ํ•ด ๊ฐ ์‚ฌ๋ฌผ ๊ธฐ๊ธฐ์˜ ํ™œ์„ฑ ํ™•๋ฅ (activity probability)๊ณผ ์ฑ„๋„ ์ด๋“์„ ๊ธฐ๋ฐ˜์œผ๋กœ ์ตœ์ ์˜ ๊ฒ€์ถœ ์ˆœ์„œ๋ฅผ ์ฐพ๋Š” ์ƒˆ๋กœ์šด ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ์ œ์•ˆํ•œ๋‹ค. ์‹œ๋ฎฌ๋ ˆ์ด์…˜์„ ํ†ตํ•ด ์ œ์•ˆํ•œ ๊ฒ€์ถœ ์ˆœ์„œ ์ •๋ ฌ ๊ธฐ์ˆ ์€ ๋ฐ์ดํ„ฐ ๊ฒ€์ถœ์˜ ์„ฑ๋Šฅ์„ ํฌ๊ฒŒ ํ–ฅ์ƒํ•จ์„ ๊ฒ€์ฆํ•˜์˜€๋‹ค. ๋…ผ๋ฌธ์˜ ๋‘ ๋ฒˆ์งธ ๋ถ€๋ถ„์—์„œ๋Š”, ๊ธฐ๋Œ“๊ฐ’ ์ „ํŒŒ ๊ธฐ๋ฐ˜ ํ™œ์„ฑ ์‚ฌ์šฉ์ž ๊ฒ€์ถœ ๋ฐ ์ฑ„๋„ ์ถ”์ •(expectation propagation based active user detection channel estimation, EP-AUD/CE) ๊ธฐ์ˆ ์„ ์ œ์•ˆํ•œ๋‹ค. CS-MUD์— ๊ด€ํ•œ ๋ช‡๋ช‡ ์—ฐ๊ตฌ์—์„œ, ๊ฐ ์‚ฌ๋ฌผ ๊ธฐ๊ธฐ๋กœ๋ถ€ํ„ฐ ๊ธฐ์ง€๊ตญ(base station, BS)์œผ๋กœ์˜ ์ƒํ–ฅ๋งํฌ ์ฑ„๋„ ์ƒํƒœ ์ •๋ณด(channel state information, CSI)๋Š” ๊ธฐ์ง€๊ตญ์— ์™„์ „ํžˆ ์•Œ๋ ค์ ธ ์žˆ๋‹ค๊ณ  ๊ฐ€์ •๋œ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ์‹ค์ œ๋กœ๋Š”, ๋ฐ์ดํ„ฐ ๊ฒ€์ถœ ์ „์— ๊ฐ ๊ธฐ๊ธฐ๋กœ๋ถ€ํ„ฐ ๊ธฐ์ง€๊ตญ์œผ๋กœ์˜ ์ƒํ–ฅ๋งํฌ ์ฑ„๋„ ์ƒํƒœ ์ •๋ณด๋ฅผ ์ถ”์ •ํ•ด์•ผ ํ•œ๋‹ค. ์ด ๋ฌธ์ œ๋ฅผ ํ•ด๊ฒฐํ•˜๊ธฐ ์œ„ํ•ด ๋‹ค์–‘ํ•œ ํ™œ์„ฑ ์‚ฌ์šฉ์ž ๊ฒ€์ถœ(active user detection, AUD) ๋ฐ ์ฑ„๋„ ์ถ”์ •(channel estimation, CE) ๊ธฐ์ˆ ์ด ์ œ์•ˆ๋˜์—ˆ๋‹ค. ๋Œ€๊ทœ๋ชจ ์‚ฌ๋ฌผ ํ†ต์‹ ์—์„œ๋Š” ํ•˜๋‚˜์˜ ํƒ€์ž„ ์Šฌ๋กฏ์— ์ ์€ ์ˆ˜์˜ ์žฅ์น˜๋งŒ ํ™œ์„ฑํ™”๋˜๊ธฐ ๋•Œ๋ฌธ์— ์ด์ง„(binary)๊ฐ’์œผ๋กœ ์ด๋ฃจ์–ด์ง„ ํ™œ์„ฑ ์—ฌ๋ถ€ ๋ฒกํ„ฐ์™€ ์ฑ„๋„ ๋ฒกํ„ฐ์˜ ๊ณฑ์€ ํฌ์†Œ ๋ฒกํ„ฐ๊ฐ€ ๋˜์–ด ์••์ถ•์„ผ์‹ฑ ์•Œ๊ณ ๋ฆฌ์ฆ˜์œผ๋กœ ๋ณต์›์ด ๊ฐ€๋Šฅํ•˜๋‹ค. ํ•˜์ง€๋งŒ, ์ด๋Ÿฌํ•œ ์—ฐ๊ตฌ๋“ค์˜ ๋‹จ์  ์ค‘ ํ•˜๋‚˜๋Š” ํฌ์†Œ ๋ฒกํ„ฐ์˜ ์‚ฌ์ „ ๋ถ„ํฌ(prior distritubion)๊ฐ€ ํ™œ์šฉ๋˜์ง€ ์•Š๋Š”๋‹ค๋Š” ๊ฒƒ์ด๋‹ค. ํฌ์†Œ ๋ฒกํ„ฐ์˜ ํ†ต๊ณ„์  ์‚ฌ์ „ ๋ถ„ํฌ๋ฅผ ์ด์šฉํ•˜๋ฉด ํ™œ์„ฑ ์‚ฌ์šฉ์ž ๊ฒ€์ถœ ๋ฐ ์ฑ„๋„ ์ถ”์ •์˜ ์„ฑ๋Šฅ์„ ํฌ๊ฒŒ ํ–ฅ์ƒํ•  ์ˆ˜ ์žˆ๋‹ค. ๋ณธ ํ•™์œ„ ๋…ผ๋ฌธ์—์„œ๋Š”, ๊ธฐ๋Œ“๊ฐ’ ์ „ํŒŒ(expectation propagation, EP) ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ์ด์šฉํ•ด ํฌ์†Œ ์ฑ„๋„ ๋ฒกํ„ฐ์˜ ์‚ฌํ›„ ๋ถ„ํฌ(posterior distribution)์˜ ๊ทผ์‚ฌ ๋ถ„ํฌ๋ฅผ ์ฐพ๊ณ , ํ•ด๋‹น ๊ทผ์‚ฌ ๋ถ„ํฌ๋ฅผ ์ด์šฉํ•˜์—ฌ ํ™œ์„ฑ ์‚ฌ์šฉ์ž ๊ฒ€์ถœ๊ณผ ์ฑ„๋„ ์ถ”์ •์„ ๋™์‹œ์— ์ˆ˜ํ–‰ํ•˜๋Š” ๊ธฐ์ˆ ์„ ์ œ์•ˆํ•œ๋‹ค. ์‹œ๋ฎฌ๋ ˆ์ด์…˜์„ ํ†ตํ•ด ์ œ์•ˆํ•œ ์‚ฌ์šฉ์ž ๊ฒ€์ถœ ๋ฐ ์ฑ„๋„ ์ถ”์ • ๊ธฐ์ˆ ์€ ํ™œ์„ฑ ์‚ฌ์šฉ์ž ๊ฒ€์ถœ ๋ฐ ์ฑ„๋„ ์ถ”์ •์˜ ์„ฑ๋Šฅ์„ ์ƒ๋‹นํžˆ ํ–ฅ์ƒํ•จ์„ ๊ฒ€์ฆํ•˜์˜€๋‹ค.1 Introduction . . . . . 1 1.1 Sparsity-Aware Ordered Successive Interference Cancellation . . . . . 3 1.2 Expectation Propagation-based Joint Active User Detection and Channel Estimation . . . . . 4 2 Sparsity-Aware Ordered Successive Interference Cancellation . . . . . 7 2.1 System model . . . . . 7 2.2 Sparsity-Aware Successive Interference Cancellation (SA-SIC) . . . . . 9 2.2.1 Derivation of S-MAP Detection . . . . . 9 2.2.2 Sparsity-Aware SIC (SA-SIC) Detection . . . . . 10 2.3 Proposed Activity-Aware Sorted-QRD (A-SQRD) Algorithm . . . . . 11 2.4 Complexity Analysis . . . . . 15 2.5 Numerical Results . . . . . 15 2.5.1 Simulation Setup . . . . . 16 2.5.2 Simulation Results . . . . . 20 3 Expectation Propagation-based Joint Active User Detection and Channel Estimation . . . . . 21 3.1 System model . . . . . 21 3.2 Joint Active User Detection and Channel Estimation . . . . . 23 3.3 EP-Based Active User Detection and Channel Estimation . . . . . 26 3.3.1 A Brief Review of Expectation Propagation . . . . . 29 3.3.2 Form of the Approximation . . . . . 30 3.3.3 Iterative EP Update Rules . . . . . 31 3.3.4 Active User Detection and Channel Estimation . . . . . 36 3.3.5 Data Detection . . . . . 37 3.3.6 Comments on Complexity . . . . . 38 3.4 Simulation Results and Discussions . . . . . 39 3.4.1 Simulation Setup . . . . . 39 3.4.2 Simulation Results . . . . . 52 4 Conclusion . . . . . 54 Abstract (In Korean) . . . . . 60Docto
    • โ€ฆ
    corecore