This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

A Fast Recursive Algorithm for G-STBC

Hufei Zhu, Wen Chen, Bin Li, and Feifei Gao H. Zhu and W. Chen are with Department of Electronic Engineering, Shanghai Jiao Tong University, Shanghai 200240, P. R. China and Huawei Technologies Co., Ltd., e-mail: [email protected] and [email protected];H. Zhu is also with SKL of ISN, Xidian University, and W. Chen is also with SKL of Mobile Communications, Southeast University, P. R. China;B. Li is with Huawei Technologies Co., Ltd., Shenzhen 518129, P.R. China, e-mail: [email protected];F. Gao is with the Department of Automation, Tsinghua University, China, and is also with the School of Engineering and Science, Jacobs University Bremen, Germany. Email: [email protected] work is supported by NSF China #60972031, by SEU SKL project #W200907, by ISN project #ISN11-01, and by National 973 project #2009CB824904.
Abstract

This paper proposes a fast recursive algorithm for Group-wise Space-Time Block Code (G-STBC), which takes full advantage of the Alamouti structure in the equivalent channel matrix to reduce the computational complexity. With respect to the existing efficient algorithms for G-STBC, the proposed algorithm achieves better performance and usually requires less computational complexity.

Index Terms:
Fast recursive algorithms, MIMO, V-BLAST, G-STBC, DSTTD, Alamouti structure.

I Introduction

Multiple-input multiple-output (MIMO) wireless communication systems possess huge channel capacities [1] when the multipath scattering is sufficiently rich. A MIMO system can provide two types of gains simultaneously, i.e. spatial multiplexing gain and diversity gain, while usually the increase in one type of gain needs the sacrifice in the other type of gain [2]. Two extreme examples of MIMO systems are Vertical Bell Laboratories Layered Space-Time architecture (V-BLAST) [3] and space-time block code (STBC) [4, 5], which achieve full spatial multiplexing gain and full diversity gain, respectively. The combination of V-BLAST and STBC is known as Group-wise STBC (G-STBC) or Multi-layered STBC (MLSTBC) [6, 8, 7, 9, 10, 11, 12, 13, 14], which achieves both spatial multiplexing gain and diversity gain concurrently. Specifically, the Alamouti code (the simplest and most popular STBC) [4] and the G-STBC consisting of two Alamouti codes [8, 12, 13, 14] have been adopted in wireless standards [15], where they are named space-time transmit diversity (STTD) and double-STTD (DSTTD), respectively.

In G-STBC, the transmit antennas are divided into MM layers (groups), of which each has KK transmit antennas and a corresponding STBC encoder. To detect one layer by suppressing the interferences from the other M1M-1 layers, the detector in [6] requires N(M1)×K+1N\geq(M-1)\times K+1 receive antennas, while the linear or successive interference cancelation (SIC) detectors in [8, 7, 9, 10, 11, 12, 13, 14] only require NMN\geq M receive antennas, which are developed from the equivalent channel model based on the temporal and spatial structure of STBC. Moreover, group-wise SIC detectors and trellis-coded modulation (TCM) encoders/decoders are jointly designed for G-STBC in [16]. The minimum mean-square error (MMSE) ordered SIC (OSIC) detector for G-STBC [7] and that only for DSTTD [8] both require high computational complexities. Then some efficient detectors for G-STBC or only for DSTTD are proposed in [9, 10, 11, 12, 13, 14]. The MMSE sub-optimal OSIC detector for V-BLAST [17] using sorted QR decomposition (SQRD) are extended to decode G-STBC in [9]. The simple linear Zero Forcing (ZF) detector for G-STBC in [10] is further simplified in [11] by utilizing Strassen algorithm. For DSTTD, SIC detectors are reported in [12, 13]. Recently the authors of [14] notice that none of the DSTTD detectors in [8, 12, 13] utilizes the post-cancellation orthogonal structure, and then utilizes that structure to develop the SIC detector [14] for DSTDD that reduces the complexity at the sacrifice of performance.

In this letter, we consider the G-STBC consisting of M2M\geq 2 Alamouti Codes. We deduce an efficient recursive algorithm to compute the initial estimation error covariance matrix, based on which we propose a fast recursive algorithm for G-STBC. The proposed algorithm exploits the Alamouti structure [18] in the equivalent channel matrix to reduce the complexity dramatically.

In what follows, ()T(\bullet)^{T}, ()(\bullet)^{*}, and ()H(\bullet)^{H} denote matrix transposition, matrix conjugate, and matrix conjugate transposition, respectively. IM{\bf{{\rm I}}}_{M} is the identity matrix of size MM.

II System Model

The considered G-STBC system consists of M×KM\times K transmit antennas and NN (M\geq M) receive antennas in a rich-scattering and flat-fading wireless channel. It includes MM parallel and independent STBC encoders. In this letter, we consider the Alamouti STBC encoder [4] with K=2K=2. The transmitted data stream 𝐬=[s11s12s21s22sM1sM2]T{\bf{s^{\prime}}}=\left[{\begin{array}[]{*{20}c}{s_{11}}&{s_{12}}&{s_{21}}&{s_{22}}&\cdots&{s_{M1}}&{s_{M2}}\\ \end{array}}\right]^{T} is de-multiplexed into MM sub-streams. Each sub-stream sm1,sm2s_{m1},s_{m2} (m=1,2,,Mm=1,2,...,M) is encoded by an independent Alamouti encoder, and then fed to its respective K=2K=2 transmit antennas. Correspondingly the received symbols over two time slots are

[x11x12x21x22xN1xN2]=[h11h12h1,2Mh21h22h2,2MhN1hN2hN,2M]×[s11s12sM1sM2s12s11sM2sM1]T+𝐍,\left[{\begin{array}[]{*{20}c}{x_{11}}&{x_{12}}\\ {x_{21}}&{x_{22}}\\ \vdots&\vdots\\ {x_{N1}}&{x_{N2}}\\ \end{array}}\right]=\left[{\begin{array}[]{*{20}c}{h_{11}}&{h_{12}}&\cdots&{h_{1,2M}}\\ {h_{21}}&{h_{22}}&\cdots&{h_{2,2M}}\\ \vdots&\vdots&\ddots&\vdots\\ {h_{N1}}&{h_{N2}}&\cdots&{h_{N,2M}}\\ \end{array}}\right]\times\\ \left[{\begin{array}[]{*{20}c}{s_{11}}&{s_{12}}&\cdots&{s_{M1}}&{s_{M2}}\\ {-s_{12}^{*}}&{s_{11}^{*}}&\cdots&{-s_{M2}^{*}}&{s_{M1}^{*}}\\ \end{array}}\right]^{T}+{\bf{N}}, (1)

where xnjx_{nj} is the jthj^{th} symbol received by the nthn^{th} receive antenna, hnmh_{nm} is the fading gain from the mthm^{th} transmitter to the nthn^{th} receiver, and 𝐍{\bf{N}} is the N×2N\times 2 complex Gaussian noise matrix. We can transform (1) into the equivalent channel model [8]

𝐱=𝐇𝐬+𝐧,{\bf{x^{\prime}}}={\bf{H^{\prime}s^{\prime}}}+{\bf{n^{\prime}}}, (2)

where the equivalent received symbol vector 𝐱=[x11x12x21x22xN1xN2]T{\bf{x^{\prime}}}=\left[{\begin{array}[]{*{20}c}{x_{11}}&{x_{12}^{*}}&{x_{21}}&{x_{22}^{*}}&\cdots&{x_{N1}}&{x_{N2}^{*}}\\ \end{array}}\right]^{T}, and the equivalent channel matrix

𝐇=[h11h12h1,2M1h1,2Mh12h11h1,2Mh1,2M1hN1hN2hN,2M1hN,2MhN2hN1hN,2MhN,2M1].\displaystyle\footnotesize{\bf{H^{\prime}}}=\left[{\begin{array}[]{*{20}c}{h_{11}}&{h_{12}}&\cdots&{h_{1,2M-1}}&{h_{1,2M}}\\ {h_{12}^{*}}&{-h_{11}^{*}}&\cdots&{h_{1,2M}^{*}}&{-h_{1,2M-1}^{*}}\\ \vdots&\vdots&\ddots&\vdots&\vdots\\ {h_{N1}}&{h_{N2}}&\cdots&{h_{N,2M-1}}&{h_{N,2M}}\\ {h_{N2}^{*}}&{-h_{N1}^{*}}&\cdots&{h_{N,2M}^{*}}&{-h_{N,2M-1}^{*}}\\ \end{array}}\right]. (8)

In (2), the transmitted data stream 𝐬{\bf s^{\prime}} is with the covariance E(𝐬𝐬H)=σs2I2ME({\bf{s^{\prime}s^{\prime}}}^{H})=\sigma_{{s}}^{2}{\bf{{\rm I}}}_{2M}, and the 2N×12N\times 1 Gaussian noise vector 𝐧{\bf{n^{\prime}}} is with zero mean and the covariance E(𝐧𝐧H)=σn2I2NE({\bf{n^{\prime}n^{\prime}}}^{H})=\sigma_{n}^{2}{\bf{{\rm I}}}_{2N}.

The MMSE OSIC detector for V-BLAST can be extended to the equivalent channel model (2) for G-STBC, since mathematically (2) has the same form as the standard channel model for V-BLAST [7]. Correspondingly the linear MMSE estimate of 𝐬\bf{s^{\prime}} can be [7, 9]

𝐲=(𝐇H𝐇+α𝐈2M)1𝐇H𝐱=𝐐𝐇H𝐱,{\bf{y}}=\left({{\bf{H^{\prime}}}^{H}{\bf{H^{\prime}}}+\alpha{\bf{I}}_{2M}}\right)^{-1}{\bf{H^{\prime}}}^{H}{\bf{x^{\prime}}}={\bf{Q^{\prime}}}{\bf{H^{\prime}}}^{H}{\bf{x^{\prime}}}, (9)

where α=σn2/σs2\alpha=\sigma_{n}^{2}/\sigma_{s}^{2}, and 𝐐=(𝐇H𝐇+α𝐈2M)1{\bf{Q^{\prime}}}=\left({{\bf{H^{\prime}}}^{H}{\bf{H^{\prime}}}+\alpha{\bf{I}}_{2M}}\right)^{-1} is the estimation error covariance matrix.

The OSIC detector for G-STBC [7] detects 2M2M entries of 𝐬\bf{s^{\prime}} iteratively with the optimal order. In each iteration, the entry with the highest SINR (Signal to Interference plus Noise Ratio) is detected, and then its interference is cancelled in 𝐱{\bf{x^{\prime}}}. Suppose that the entries of 𝐬{\bf{s^{\prime}}} are permuted such that the successive detection order is sM2,sM1,s(M1)2,s(M1)1,,s12,s11{s_{M2}},{s_{M1}},{s_{(M-1)2}},{s_{(M-1)1}},\cdots,{s_{12}},{s_{11}}. Then in the (2Mk+1)th(2M-k+1)^{th} (k=2M,2M1,,1k=2M,2M-1,\cdots,1) iteration, the kk undetected entries can be represented as 𝐬k{\bf{s^{\prime}}}_{k} that includes the first kk entries of 𝐬{\bf{s^{\prime}}}, while the corresponding equivalent channel matrix

𝐇k=[𝐡1𝐡2𝐡k],{\bf{H^{\prime}}}_{k}=\left[{\begin{array}[]{*{20}c}{{\bf{h^{\prime}}}_{1}}&{{\bf{h^{\prime}}}_{2}}&\cdots&{{\bf{h^{\prime}}}_{k}}\\ \end{array}}\right], (10)

where 𝐡i{\bf{h}}^{\prime}_{i} (i=1,2,,ki=1,2,\cdots,k) denotes the ithi^{th} column of 𝐇{\bf{H^{\prime}}}.

III A Fast Recursive Algorithm for G-STBC

In this section, we deduce an efficient recursive algorithm to compute the initial 𝐐{\bf{Q^{\prime}}}, based on which we develop a fast recursive algorithm for G-STBC.

The 2×22\times 2 Alamouti structure [a1a2a2a1]\left[{\begin{array}[]{*{20}c}{a_{1}}&{-a_{2}^{*}}\\ {a_{2}}&{a_{1}^{*}}\\ \end{array}}\right] in the equivalent channel matrix 𝐇{{\bf{H^{\prime}}}}, which remains invariant under several matrix operations [18], is regarded as the matrix representation of a quaternion and then called as a block entry [18]. Block entries can form vectors and matrices, which are then called as block vectors and block matrices [18], respectively. In what follows, scalars, vectors and matrices with overlines always represent the above-mentioned block entries (i.e. block scalars), block vectors, and block matrices, respectively. We define the block matrix

𝐇¯m=𝐇2m=[𝐡¯1𝐡¯2𝐡¯m],{\bf{\bar{H}}}_{m}={\bf{H^{\prime}}}_{2m}=\left[{\begin{array}[]{*{20}c}{{\bf{\bar{h}}}_{1}}&{{\bf{\bar{h}}}_{2}}&\cdots&{{\bf{\bar{h}}}_{m}}\\ \end{array}}\right], (11)

where m=1,2,,Mm=1,2,\cdots,M, and the block column vector 𝐡¯m=[𝐡2m1𝐡2m]{\bf{\bar{h}}}_{m}=\left[{\begin{array}[]{*{20}c}{{\bf{h^{\prime}}}_{2m-1}}&{{\bf{h^{\prime}}}_{2m}}\\ \end{array}}\right]. Then we write

𝐑¯m=𝐇¯mH𝐇¯m+α𝐈2m=[𝐑¯m1𝐯¯m1𝐯¯m1Hυ¯m],\displaystyle{\bf{{\bar{R}}}}_{m}={{\bf{\bar{H}}}_{m}}^{H}{\bf{\bar{H}}}_{m}+\alpha{\bf{I}}_{2m}=\left[{\begin{array}[]{*{20}c}{{\bf{{\bar{R}}}}_{{m-1}}}&{{\bf{{\bar{v}}}}_{{m-1}}}\\ {{\bf{{\bar{v}}}}_{{m-1}}^{H}}&{{{{\bar{{\upsilon}}}}}_{m}}\\ \end{array}}\right], (12c)
𝐐¯m=𝐑¯m1=[𝐓¯m1𝐰¯m1𝐰¯m1Hω¯m],\displaystyle{\bf{{{\bar{Q}}}}}_{m}={\bf{{\bar{R}}}}_{m}^{-1}=\left[{\begin{array}[]{*{20}c}{{\bf{{{\bar{T}}}}}_{m-1}}&{{{\bf{\bar{w}}}}_{m-1}}\\ {{{\bf{\bar{w}}}}_{m-1}^{H}}&{{{{\bar{{\omega}}}}}_{m}}\\ \end{array}}\right], (12f)

where 𝐑¯m1{\bf{\bar{R}}}_{m-1} and 𝐓¯m1{\bf{\bar{T}}}_{m-1} are the leading principal 2(m1)×2(m1)2(m-1)\times 2(m-1) sub-matrices of 𝐑¯M{\bf{\bar{R}}}_{M} and 𝐐¯m{\bf{\bar{Q}}}_{m} [19, 20], respectively. In (12c), 𝐇¯mH𝐇¯m{\bf{\bar{H}}}_{m}^{H}{{\bf{\bar{H}}}_{m}} (computed from the block matrix 𝐇¯m{{\bf{\bar{H}}}_{m}}) must be Hermitian with diagonal 2×22\times 2 sub-blocks that are non-negative scaled multiples of the identity matrix and with off-diagonal 2×22\times 2 sub-blocks that are Alamouti matrices [18, Property 3 in the subsection “B. Block Matrices”], and the same is 𝐑¯m{\bf{{\bar{R}}}}_{m}. Then in (12c), the block entry

υ¯m=υm𝐈2{{{\bar{{\upsilon}}}}}_{{m}}={{{\upsilon}^{\prime}}}_{m}{\bf{I}}_{2} (13)

(where υm{{{\upsilon}^{\prime}}}_{m} is a scalar), while 𝐯¯m1{\bf{{\bar{v}}}}_{{m-1}} is the block column vector, which can be represented as 𝐯¯m1=[𝐯2(m1)𝐯′′2(m1)].{\bf{{\bar{v}}}}_{{m-1}}=\left[{\begin{array}[]{*{20}c}{{\bf{v^{\prime}}}_{2(m-1)}}&{{\bf{v^{\prime\prime}}}_{2(m-1)}}\\ \end{array}}\right]. Moreover, in Appendix A we derive ω¯m{{{\bar{{\omega}}}}}_{m}, 𝐰¯m1{{\bf{\bar{w}}}}_{m-1} and 𝐓¯m1{\bf{{{\bar{T}}}}}_{m-1} in (12f) respectively as

ωm=(υm𝐯2(m1)H𝐐¯m1𝐯2(m1))1,\displaystyle{{\omega}^{\prime}}_{m}=\left({{{{\upsilon}^{\prime}}}_{m}-{\bf{{v^{\prime}}}}_{2(m-1)}^{H}{\bf{{{\bar{Q}}}}}_{m-1}{\bf{{v^{\prime}}}}_{2(m-1)}}\right)^{-1}, (14a)
ω¯m=ωm𝐈2,\displaystyle{{{\bar{{\omega}}}}}_{m}={{\omega}^{\prime}}_{m}{\bf{I}}_{2}, (14b)
𝐰¯m1=ωm𝐐¯m1𝐯¯m1,\displaystyle{{\bf{\bar{w}}}}_{m-1}=-{{\omega}^{\prime}}_{m}{\bf{{{\bar{Q}}}}}_{m-1}{\bf{{\bar{v}}}}_{m-1}, (14c)
𝐓¯m1=𝐐¯m1+ωm1𝐰¯m1𝐰¯m1H.\displaystyle{\bf{{{\bar{T}}}}}_{m-1}={\bf{{{\bar{Q}}}}}_{m-1}+{{\omega}^{\prime}}_{m}^{-1}{{\bf{\bar{w}}}}_{m-1}{{\bf{\bar{w}}}}_{m-1}^{H}. (14d)

Base on (14d), we develop the recursive G-STBC algorithm. In the initialization phase, to obtain 𝐐¯M{\bf{{{\bar{Q}}}}}_{M} from 𝐐¯1=𝐑¯11{\bf{{{\bar{Q}}}}}_{1}={\bf{{{\bar{R}}}}}_{1}^{-1}, we compute 𝐐¯m{\bf{{{\bar{Q}}}}}_{m} from 𝐐¯m1{\bf{{{\bar{Q}}}}}_{m-1} recursively (for m=2,3,,Mm=2,3,...,M) by (14d) and (12f). Moreover, as the V-BLAST algorithms in [19, 20], we perform interference cancellation not in 𝐱{\bf{x^{\prime}}}, but in 𝐳=𝐇¯MH𝐱{\bf z}^{\prime}={\bf{\bar{H}}}_{M}^{H}{\bf{x^{\prime}}}. Then we need to compute the initial

𝐳M=𝐇¯MH𝐱.{\bf z}^{\prime}_{M}={\bf{\bar{H}}}_{M}^{H}{\bf{x^{\prime}}}. (15)

In the recursion phase, we detect MM layers of STBC encoded symbols recursively by group-wise OSIC. The subscript || is added to some variables for the recursion phase, to distinguish them from the variables for the initialization phase, e.g., usually 𝐐¯|m𝐐¯m{\bf{\bar{Q}}}_{|m}\neq{\bf{\bar{Q}}}_{m}. In each recursion, estimate the pmthp_{m}^{th} layer, i.e. the layer with the highest SINR among all the undetected layers, by

[ypm1ypm2]T=[𝐪|2m1𝐪|2m]H𝐳m,\left[{\begin{array}[]{*{20}c}{y_{p_{m}1}}&{y_{p_{m}2}}\\ \end{array}}\right]^{T}=\left[{\begin{array}[]{*{20}c}{{\bf{{q}}}^{\prime}_{|2{m}-1}}&{{\bf{{q}}}^{\prime}_{|2{m}}}\\ \end{array}}\right]^{H}{\bf z}^{\prime}_{m}, (16)

where 𝐪|2m1{\bf{{q}}}^{\prime}_{|2{m}-1} and 𝐪|2m{\bf{{q}}}^{\prime}_{|2{m}} are the (2m1)th\left({2m-1}\right)^{th} and 2mth2m^{th} columns of the permuted 𝐐¯|m{\bf{{{\bar{Q}}}}}_{|m}, respectively. Quantize ypm1{y_{p_{m}1}} and ypm2{y_{p_{m}2}} to obtain s^pm1=Q{ypm1}{\hat{s}_{p_{m}1}}={Q\left\{{y_{p_{m}1}}\right\}} and s^pm2=Q{ypm2}{\hat{s}_{p_{m}2}}={Q\left\{{y_{p_{m}2}}\right\}}, respectively. Then as in [19, 20], we cancel the effect of spm1{s_{p_{m}1}} and spm2{s_{p_{m}2}} in 𝐳m{\bf z}^{\prime}_{m} by

𝐳m1=𝐳m[2]𝐯¯|m1[s^pm1s^pm2]T,{\bf z}^{\prime}_{{m}-1}={{\bf z^{\prime}}_{m}^{\left[{-2}\right]}}-{\bf{{\bar{v}}}}_{{|m-1}}\left[{\begin{array}[]{*{20}c}{\hat{s}_{p_{m}1}}&{\hat{s}_{p_{m}2}}\\ \end{array}}\right]^{T}, (17)

where 𝐳m[2]{\bf z^{\prime}}_{m}^{\left[{-2}\right]} is 𝐳m{\bf z}^{\prime}_{m} with the last two entries removed, and 𝐯¯|m1{\bf{{\bar{v}}}}_{{|m-1}} is in 𝐑¯|m{\bf{{\bar{R}}}}_{|m}, as shown in (12c). In the next recursion, 𝐐¯|m1{\bf{{{\bar{Q}}}}}_{|m-1} is required to compute (16). Thus we deflate 𝐐¯|m{\bf{{{\bar{Q}}}}}_{|m} by (14d) to obtain

𝐐¯|m1=𝐓¯|m1ω|m1𝐰¯|m1𝐰¯|m1H.{\bf{{{\bar{Q}}}}}_{|m-1}={\bf{{{\bar{T}}}}}_{|m-1}-{{\omega}^{\prime}}_{|m}^{-1}{{\bf{\bar{w}}}}_{|m-1}{{\bf{\bar{w}}}}_{|m-1}^{H}. (18)

To some extent, (18) (that deflates a block matrix recursively) has a similar form as equation (15) in [21] and equation (21) in [20] (that deflates a matrix recursively), while the vector 𝐰m1{{\bf{{w}}}}_{m-1} in the equations of [21, 20] is replaced with the block vector 𝐰¯|m1{{\bf{\bar{w}}}}_{|m-1} in (18). On the other hand, as (18), equation (24) in [22] also deflates a block matrix recursively, while it deflates the matched-filtered (MF) real-valued channel matrix for G-STBC that is obtained from the augmented real-valued channel matrix.

Table \@slowromancapi@ summarizes the proposed recursive G-STBC algorithm, where r|i,km{r^{\prime}}_{|i,k}^{m} and q|i,km{q^{\prime}}^{m}_{|i,k} are the entries in the ithi^{th} row and kthk^{th} column of the permuted 𝐑¯|m{\bf{\bar{R}}}_{|m} and 𝐐¯|m{\bf{\bar{Q}}}_{|m}, respectively. Notice that 𝐐¯m{\bf{{{\bar{Q}}}}}_{m}(=𝐑¯m1={\bf{{{\bar{R}}}}}_{m}^{-1}) and 𝐐¯|m{\bf{{{\bar{Q}}}}}_{|m} consist of Alamouti sub-blocks[18, Lemma “Invariance Under Inversion”].

TABLE I: The proposed recursive G-STBC algorithm
Initialization Compute 𝐳M{\bf z}^{\prime}_{M} by (15). Compute the initial 𝐑¯M=𝐑¯|M{\bf{\bar{R}}}_{M}={\bf{\bar{R}}}_{|M}. Compute 𝐐¯m{\bf{\bar{Q}}}_{m} from 𝐐¯m1{\bf{\bar{Q}}}_{m-1} recursively by (14d)
and (12f) for m=2,3,,Mm=2,3,\cdots,M, to obtain the initial 𝐐¯M=𝐐¯|M{\bf{\bar{Q}}}_{M}={\bf{\bar{Q}}}_{|M}.
Recursion Set 𝐩=[1,2,,M]T{\bf{p}}=\left[1,2,\cdots,M\right]^{T}, and let pmp_{m} denote the mthm^{th} entry of 𝐩{\bf{p}}. For m=M,M1,,2{m}=M,M-1,\cdots,2:
(a) Find lm=argmini=2,4,2m(q|i,im)l_{m}={\arg\min}_{i=2,4,\cdots}^{2{m}}({q^{\prime}}^{m}_{|i,i}), since the entry with the highest SINR is the one with the least
    mean-square error [19, 20]. In 𝐐¯|m{\bf{{{\bar{Q}}}}}_{|m} and 𝐑¯|m{\bf{{{\bar{R}}}}}_{|m}, permute rows and columns (lm1l_{m}-1, lml_{m}) with rows
    and columns (2m12m-1, 2m2m). Permute entries (lm1l_{m}-1, lml_{m}) with entries (2m12m-1, 2m2m) in 𝐳m1{\bf z}^{\prime}_{{m}-1}.
    Interchange entries lm/2l_{m}/2 and m{m} of 𝐩{\bf{p}}.
(b) Compute ypm1{y_{p_{m}1}} and ypm2{y_{p_{m}2}} by (16), which are quantized into s^pm1=Q{ypm1}{\hat{s}_{p_{m}1}}={Q\left\{{y_{p_{m}1}}\right\}} and s^pm2=Q{ypm2}{\hat{s}_{p_{m}2}}={Q\left\{{y_{p_{m}2}}\right\}}.
(c) Cancel the effect of [spm1,spm2][{s_{p_{m}1}},{s_{p_{m}2}}] in 𝐳m{\bf z}^{\prime}_{m} by (17), to obtain 𝐳m1{\bf z}^{\prime}_{{m}-1}.
(d) Deflate 𝐐¯|m{\bf{\bar{Q}}}_{|m} to get 𝐐¯|m1{\bf{\bar{Q}}}_{|m-1} by (18). Remove the last two columns and rows of 𝐑¯|m{\bf{\bar{R}}}_{|m} to get 𝐑¯|m1{\bf{\bar{R}}}_{|m-1}.
Solution When m=1m=1, only execute the above-described step (b). The hard decisions of [spm1,spm2][{s_{p_{m}1}},{s_{p_{m}2}}] are
[s^pm1,s^pm2][{\hat{s}_{p_{m}1}},{\hat{s}_{p_{m}2}}], for m=1,2,,M{m}=1,2,\cdots,M.
TABLE II: Complexities of the Presented G-STBC and DSTTD Algorithms
Algorithm (Alg.) Total Complexity
Proposed G-STBC Alg. 8M2N+323M3+O(M2+MN){8M^{2}N+\frac{32}{3}M^{3}+O(M^{2}+MN)} real mult.,
8M2N+323M3+O(M2+MN){8M^{2}N+\frac{32}{3}M^{3}+O(M^{2}+MN)} real add.
G-STBC Alg. in [9] 32M3+162N+O(M2+MN){32M^{3}+16^{2}N+O(M^{2}+MN)} real mult.,
32M3+16M2N+O(M2+MN){32M^{3}+16M^{2}N+O(M^{2}+MN)} real add. [9, equation (19)]
Proposed G-STBC Alg. with M=N=3M=N=3 570570 real mult.
ZF G-STBC Alg. in [11] with M=N=3M=N=3 588588 real mult. [11, Table \@slowromancapi@]
Proposed DSTTD Alg. 8M2N+8MN+8N+678M^{2}N+8MN+8N+67 real mult.,
8M2N+8MN+8N+408M^{2}N+8MN+8N+40 real add. (MM is always 22 for DSTTD)
One-step SIC Alg. for 83N3+14N2+793N25\frac{8}{3}N^{3}+14N^{2}+\frac{79}{3}N-25 real mult.,
DSTTD in [14] 83N3+10N2+463N9\frac{8}{3}N^{3}+10N^{2}+\frac{46}{3}N-9 real add.[24]

IV Performance Analysis and Numerical Results

In the recursion phase, the proposed group-wise OSIC only needs to compute the block matrices 𝐐¯|m1{\bf{\bar{Q}}}_{|m-1}s (m=M,M1,,2m=M,M-1,\cdots,2) that consist of Alamouti sub-blocks, while the symbol-wise OSIC [7] implemented by the recursive V-BLAST algorithm in [20] needs to compute the matrices 𝐐|k1{\bf{Q}}_{|k-1}s (k=2M,2M1,2M2,2M3,,2k=2M,2M-1,2M-2,2M-3,\cdots,2) that usually do not consist of Alamouti sub-blocks. So the proposed group-wise OSIC can save much computational complexity, with respect to the symbol-wise OSIC [7]. On the other hand, the proposed group-wise OSIC is equivalent to the symbol-wise SIC with the group-wise optimal detection order, as shown in Appendix B. Thus its performance loss with respect to the symbol-wise OSIC (for G-STBC) [7] only comes from different detection orders (i.e., the group-wise optimal order vs. the symbol-wise optimal order), and is relatively small, as shown in the rest of this section.

We list the computational complexities of the presented G-STBC and DSTTD algorithms in Table \@slowromancapii@, where the exact complexities of the presented DSTTD algorithms have been verified by our numerical experiments to count the floating-point operations (flops — One flop can be one real multiplication or one real addition). In this table, “Proposed DSTTD Alg.” denotes the proposed G-STBC algorithm applied to D-STTD. When counting the complexities, we utilize the fact that one complex multiplication needs 44 real multiplications and 22 real additions, while one complex addition needs 22 real additions. The total complexity of the proposed G-STBC algorithm is the sum of the complexities to compute 𝐑¯M{\bf{\bar{R}}}_{M}, 𝐐¯M{\bf{\bar{Q}}}_{M} and 𝐐¯|m1{\bf{\bar{Q}}}_{|m-1}s (m=M,M1,,2m=M,M-1,\cdots,2) that are 2M2N\langle{2M^{2}N}\rangle, 2M3\langle{2M^{3}}\rangle and 23M3\langle{\frac{2}{3}M^{3}}\rangle, respectively, where k\langle{k}\rangle denotes kk complex multiplications and kk complex additions. The algorithm in [9] nearly requires the same number of complex multiplications and additions [9], [17, Table \@slowromancapi@], while [9, equation (19)] claims a complexity of 2Nt3+2Nt2Nr+O(Nt2+NtNr)2N_{t}^{3}+2N_{t}^{2}N_{r}+O(N_{t}^{2}+N_{t}N_{r}) operations, where Nt=2MN_{t}=2M, Nr=NN_{r}=N, and an operation can be a complex multiplication or addition. The complexity of the one-step SIC algorithm for DSTTD in [14] has been revised in [24], while the two-step SIC algorithm and the SINR-ordered SIC algorithm for DSTTD in [14] both need nearly double the complexity of the one-step SIC algorithm.

For DSTTD, the special case of G-STBC with the minimum number of transmit antennas, the ML(maximum likelihood)-like sphere detectors [23] are alternative methods worth considering. For example, with respect to the SIC DSTTD detector in [8], the ML-like DSTTD detector in [23] performs about 1.71.7 dB better at BER=10210^{-2}, but requires about 2.72.7 times of complexity [23, Fig. 5]. Although ML-like DSTTD detectors can be preferred in some applications, they usually do not have advantage in both complexity and BER performance [23]. Thus quite a few recent literatures focusing on SIC DSTTD receivers [12, 13, 14, 16] did not discuss ML-like sphere detectors, and neither does this letter focusing on SIC G-STBC receivers, which, due to the limited space, cannot give too extensive discussion for only the special case of G-STBC (i.e. DSTTD).

From Table \@slowromancapii@, we can compare the complexities of the presented algorithms. When M=NM=N, the proposed G-STBC algorithm speeds up the G-STBC algorithm in [9] by 48/(563)=2.5748/(\frac{56}{3})=2.57 approximately, and even requires less real multiplications than the linear ZF G-STBC algorithm in [11]. When N3N\geq 3, the proposed DSTTD algorithm is faster than the one-step SIC DSTTD algorithm in [14], and the speedup (in the number of flops) grows with NN, which is 1.021.02 for N=3N=3, 1.541.54 for N=4N=4, and 4.554.55 for N=8N=8. However, when N=2N=2, the one-step SIC DSTTD algorithm in [14] (with much performance loss) is faster than the proposed DSTTD algorithm, while the speedup is 1.761.76.

Let N=MN=M. For different NN, we carried out numerical experiments to count the average flops per time slot of the G-STBC algorithm in [9] and the proposed G-STBC algorithm in Fig. 1. It can be seen that they are consistent with the theoretical flops calculation. On the other hand, Fig. 2 shows the BER (bit error rate) performance of the algorithms in [7, 9] and the proposed algorithm in a G-STBC system with 88 transmit and 44 receive antennas, while Fig. 3 and Fig. 4 show the BER performance of the algorithms in [7, 8, 14] and the proposed algorithm in a DSTTD system with 22 and 88 receive antennas, respectively. We used QPSK modulation in Fig. 2, Fig. 3 and Fig. 4. As shown in Fig. 2 and Fig. 3, the proposed algorithm performs better than the efficient G-STBC algorithms in [9] and the efficient DSTTD algorithms in [14]. For example, it performs about 0.40.4 dB better than the SQRD algorithm in [9] at BER =104=10^{-4}, and performs about 22 dB better than the one-step fixed-order SIC algorithm for DSTTD in [14] at BER=103=10^{-3}. Fig. 2 and Fig. 3 also shows that with respect to the MMSE OSIC algorithm in [7], the proposed algorithm performs about 0.30.3 dB worse in the G-STBC system and 0.40.4 dB worse in the DSTTD system, at BER =103=10^{-3}. Moreover, it can be seen from Fig. 4 that for a large number of receive antennas, the performance difference among the presented DSTTD algorithms is small and even negligible.

Refer to caption
Figure 1: Complexity Comparison between the G-STBC algorithm in [9] and the proposed G-STBC algorithm.
Refer to caption
Figure 2: Bit Error Rate (BER) comparison for a G-STBC system with QPSK modulation, 88 transmit and 44 receive antennas.
Refer to caption
Figure 3: Bit Error Rate (BER) comparison for a DSTTD system with QPSK modulation and 22 receive antennas.
Refer to caption
Figure 4: Bit Error Rate (BER) comparison for a DSTTD system with QPSK modulation and 88 receive antennas.

V Conclusion

We propose a fast recursive algorithm for G-STBC, which takes full advantage of the Alamouti structure in the equivalent channel matrix to reduce the computational complexity dramatically. With respect to the existing efficient algorithms for G-STBC or only for DSTTD, the proposed group-wise MMSE OSIC algorithm for G-STBC achieves better performance and usually requires less complexity. When M=NM=N, the proposed algorithm speeds up the MMSE sub-optimal OSIC algorithm for G-STBC by 2.572.57, speeds up the recently proposed DSTTD algorithm by up to 4.554.55, and even requires less real multiplications than the linear ZF G-STBC algorithm.

Appendix A The Derivation of (14d)

In what follows, 𝟎M{\bm{{\rm 0}}}_{M} is the M×M{M\times M} zero matrix. Substitute (12f) into 𝐑¯m𝐐¯m=𝐈2m{\bf{{\bar{R}}}}_{m}{\bf{{{\bar{Q}}}}}_{m}={\bf{I}}_{2m} to obtain [𝐑¯m1𝐯¯m1𝐯¯m1Hυ¯m][𝐓¯m1𝐰¯m1𝐰¯m1Hω¯m]=𝐈2m\left[{\begin{array}[]{*{20}c}{{\bf{{\bar{R}}}}_{m-1}}&{{\bf{{\bar{v}}}}_{m-1}}\\ {{\bf{{\bar{v}}}}_{m-1}^{H}}&{{{\bar{{\upsilon}}}}_{m}}\\ \end{array}}\right]\left[{\begin{array}[]{*{20}c}{{\bf{{{\bar{T}}}}}_{m-1}}&{{{\bf{\bar{w}}}}_{m-1}}\\ {{{\bf{\bar{w}}}}_{m-1}^{H}}&{{{\bar{{\omega}}}}_{m}}\\ \end{array}}\right]={\bf{I}}_{2m}, from which we can deduce

𝐑¯m1𝐰¯m1+𝐯¯m1ω¯m=𝟎2,\displaystyle{\bf{{\bar{R}}}}_{{m-1}}{{\bf{\bar{w}}}}_{{m-1}}+{\bf{{\bar{v}}}}_{{m-1}}{{\bar{{\omega}}}}_{m}=\bm{0}_{2}, (19a)
𝐯¯m1H𝐰¯m1+υ¯mω¯m=𝐈2,\displaystyle{\bf{{\bar{v}}}}_{{m-1}}^{H}{{\bf{\bar{w}}}}_{{m-1}}+{{\bar{{\upsilon}}}}_{m}{{\bar{{\omega}}}}_{m}={\bf{I}}_{2}, (19b)
𝐑¯m1𝐓¯m1+𝐯¯m1𝐰¯m1H=𝐈2(m1).\displaystyle{\bf{{\bar{R}}}}_{{m-1}}{\bf{{{\bar{T}}}}}_{{m-1}}+{\bf{{\bar{v}}}}_{{m-1}}{{\bf{\bar{w}}}}_{{m-1}}^{H}={\bf{I}}_{2(m-1)}. (19c)

On the other hand, let us extend equation (17) in [17] to 𝐇¯m{\bf{\bar{H}}}_{m} in (11) for G-STBC, to obtain

𝐐¯m=(𝐇¯mH𝐇¯m)1=𝐋¯m1𝐋¯mH,{\bf{{{\bar{Q}}}}}_{m}=\left({{\bf{\underline{H}}}_{m}^{H}{\bf{\underline{H}}}_{m}}\right)^{-1}={\bf{\bar{L}}}_{m}^{-1}{\bf{\bar{L}}}_{m}^{-H}, (20)

where 𝐇¯m=[𝐇¯mTα𝐈2m]T{\bf{\underline{H}}}_{m}=\left[{\begin{array}[]{*{20}c}{{\bf{\bar{H}}}_{m}^{T}}&{\sqrt{\alpha}{\bf{I}}_{2m}}\\ \end{array}}\right]^{T} is QR decomposed into 𝐋¯m{\bf{\bar{L}}}_{m} and the orthogonal 𝚯¯m\bm{\bar{\Theta}}_{m}, i.e., 𝐇¯m=𝚯¯m𝐋¯m{\bf{\underline{H}}}_{m}=\bm{\bar{\Theta}}_{m}{\bf{\bar{L}}}_{m}. 𝐇¯m{\bf{\underline{H}}}_{m} consists of Alamouti sub-blocks [18], and so do 𝐋¯m{\bf{\bar{L}}}_{m} [18, Lemma “Invariance Under QR Factorization”] and 𝐋¯m1{\bf{\bar{L}}}_{m}^{-1} [18, Lemma “Invariance Under Inversion”]. Then it can be seen from (20) that 𝐐¯m{\bf{{\bar{Q}}}}_{m} must be Hermitian with diagonal 2×22\times 2 sub-blocks that are non-negative scaled multiples of the identity matrix and with off-diagonal 2×22\times 2 sub-blocks that are Alamouti matrices [18, Property 3 in the subsection “B. Block Matrices”]. Correspondingly the diagonal 2×22\times 2 sub-block ω¯m{{{\bar{{\omega}}}}}_{m} in 𝐐¯m{\bf{{\bar{Q}}}}_{m} must satisfy (14b).

Now we can substitute (14b) and 𝐐¯m=𝐑¯m1{\bf{{{\bar{Q}}}}}_{m}={\bf{{\bar{R}}}}_{m}^{-1} into (19a) to obtain (14c). From (14c) and (19c), we can deduce 𝐓¯m1=𝐐¯m1𝐐¯m1𝐯¯m1𝐰¯m1H{\bf{{{\bar{T}}}}}_{m-1}={\bf{{{\bar{Q}}}}}_{m-1}-{\bf{{{\bar{Q}}}}}_{m-1}{\bf{{\bar{v}}}}_{m-1}{{\bf{\bar{w}}}}_{m-1}^{H} and 𝐐¯m1𝐯¯m1=ωm1𝐰¯m1{\bf{{{\bar{Q}}}}}_{m-1}{\bf{{\bar{v}}}}_{m-1}=-{{\omega}^{\prime}}_{m}^{-1}{{\bf{\bar{w}}}}_{m-1}, respectively, and then the latter is substituted into the former to derive (14d). Moreover, substitute (14c) and (13) into (19b) to deduce (υm𝐈2𝐯¯m1H𝐐¯m1𝐯¯m1)ωm=𝐈2\left({{{{\upsilon}^{\prime}}}_{m}{\bf{I}}_{2}-{\bf{{\bar{v}}}}_{m-1}^{H}{\bf{{{\bar{Q}}}}}_{m-1}{\bf{{\bar{v}}}}_{m-1}}\right){{\omega}^{\prime}}_{m}={\bf{I}}_{2}, from which we obtain (14a).

Appendix B Proposed Group-wise OSIC vs. Symbol-wise SIC with Group-wise Ordering

The proposed G-STBC algorithm applies (16) to compute the estimates of spm1s_{p_{m}1} and spm2s_{p_{m}2}, which are the last two entries of

𝐲m=𝐐¯|m𝐳m.{\bf y}_{m}={\bf\bar{Q}}_{|m}{\bf z}^{\prime}_{m}. (21)

In (21), 𝐳m{\bf z}^{\prime}_{m} satisfies [19]

𝐳m=𝐇¯|mH𝐱(m).{\bf z}^{\prime}_{m}={\bf{{{\bar{H}}}}}_{{|m}}^{H}{\bf x^{\prime}}^{({m})}. (22)

In 𝐱(m){\bf x^{\prime}}^{({m})}, the interferences of the 2(Mm)2(M-{m}) detected symbols have been cancelled. Then

𝐱(m)=𝐇¯|m𝐬2m+𝐧,{\bf x^{\prime}}^{({m})}={\bf{{{\bar{H}}}}}_{{|m}}{\bf s}^{\prime}_{2{m}}+{\bf n}, (23)

where the noise 𝐧{\bf n} is irrelevant to our discussion and can be neglected. Substitute (23) into (22), and then substitute (22) into (21) to obtain 𝐲m=𝐐¯|m𝐇¯|mH𝐇¯|m𝐬2m=𝐐¯|m(𝐑¯|mα𝐈2m)𝐬2m{\bf y}_{m}={\bf\bar{Q}}_{|m}{\bf{{{\bar{H}}}}}_{{|m}}^{H}{\bf{{{\bar{H}}}}}_{{|m}}{\bf s}^{\prime}_{2{m}}={\bf\bar{Q}}_{|m}({\bf\bar{R}}_{|m}-\alpha{\bf{I}}_{2m}){\bf s}^{\prime}_{2m}, i.e.,

𝐲m=(𝐈2mα𝐐¯|m)𝐬2m.{\bf y}_{m}=({\bf{I}}_{2m}-\alpha{\bf\bar{Q}}_{|m}){\bf s}^{\prime}_{2m}. (24)

𝐐¯|m{\bf{{\bar{Q}}}}_{|m} in (24) is with diagonal 2×22\times 2 sub-blocks that are non-negative scaled multiples of the identity matrix, as shown in Appendix A. Thus (24) can be represented as

[yp11yp12ypm1ypm2]=[×0××0××××××0××0×][sp11sp12spm1spm2],\footnotesize{\left[{\begin{array}[]{*{10}c}{y_{p_{1}1}}\\ {y_{p_{1}2}}\\ \vdots\\ {y_{p_{m}1}}\\ {y_{p_{m}2}}\\ \end{array}}\right]=\left[{\begin{array}[]{*{10}c}\times&0&\cdots&\times&\times\\ 0&\times&\cdots&\times&\times\\ \vdots&\vdots&\ddots&\vdots&\vdots\\ \times&\times&\cdots&\times&0\\ \times&\times&\cdots&0&\times\\ \end{array}}\right]\left[{\begin{array}[]{*{20}c}{s_{p_{1}1}}\\ {s_{p_{1}2}}\\ \vdots\\ {s_{p_{m}1}}\\ {s_{p_{m}2}}\\ \end{array}}\right]}, (25)

where ×\times denotes the non-zero entry. Now it can be seen from (25) that the interference of spi2s_{p_{i}2} does not affect the estimate of spi1s_{p_{i}1} (i.e. ypi1{y_{p_{i}1}}), and vice versa, for i=1,2,,mi=1,2,\cdots,m. That is to say, in the linear MMSE estimates of 𝐬2m{\bf s}^{\prime}_{2m}, each layer of STBC encoded symbols, i.e. spi1s_{p_{i}1} and spi2s_{p_{i}2}, remain orthogonal. Thus the performance will remain unchanged if we modify the proposed group-wise OSIC detector into the corresponding symbol-wise SIC detector with the group-wise optimal detection order, which detects spi1s_{p_{i}1} immediately after the interference of spi2s_{p_{i}2} is cancelled.

Acknowledgment

The authors would like to transfer their appreciation to the editor and the reviewers for their valuable comments leading to the improvement of this paper.

References

  • [1] G. J. Foschini and M. J. Gans, “On limits of wireless communications in a fadiig environment when using multiple antennas,” Wireless Personal Communications, vol. 6, pp. 311-335, Mar. 1998.
  • [2] L. Zheng and D. N. C. Tse, “Diversity and multiplexing: a fundamental tradeoff in multiple-antenna channels,” IEEE Transactions on Information Theory, vol. 49, no. 5, pp. 1073-1096, May 2003.
  • [3] P. W. Wolniansky, G. J. Foschini, G. D. Golden and R. A. Valenzuela, “V-BLAST: an architecture for realizing very high data rates over the rich-scattering wireless channel”, URSI International Symposium on Signals, Systems, and Electronics, pp. 295-300, Sept. 1998.
  • [4] S. M. Alamouti., “A simple transmit diversity technique for wireless communications,” IEEE J. Selected Areas in Communications, vol. 16, no. 8, pp. 1451-1458, Oct. 1998.
  • [5] V. Tarokh, H. Jafarkhani and A. R. Calderbank, “Space-time block codes from orthogonal designs,” IEEE Transactions on Information Theory, vol. 45, no. 5, pp. 1456-1467, July 1999.
  • [6] V. Tarokh, A. Naguib, N. Seshadri and A. R. Calderbank, “Combined array processing and space-time coding”, IEEE Transactions on Information Theory, vol. 45, no. 4, pp. 1121-1128, May 1999.
  • [7] X. Fan, H. Zhang, H. Luo and J. Huang, “Optimal MMSE successive interference cancellation in group-wise STBC MIMO systems”, Journal of Systems Engineering and Electronics, vol. 17, no. 1, pp. 85-90, 2006
  • [8] A. F. Naguib, N. Seshadri and A. R. Calderbank, “Applications of space-time block codes and interference suppression for high capacity and high data rate wireless systems”, IEEE Asilomar SSC, vol. 2, pp. 1803-1810, Nov. 1998.
  • [9] M. Gomaa and A. Ghrayeb, “A Low Complexity MMSE Detector for Multiuser Layered Space-Time Coded MIMO Systems”, Canadian Conference on Electrical and Computer Engineering, 22-26 April, 2007.
  • [10] A. Stamoulis, N. Al-Dhahir and A. R. Calderbank, “Further results on interference cancellation and space-time block codes”, IEEE Asilomar SSC, vol. 1, pp. 257-261, Nov. 2001.
  • [11] T. Hardtke, K. Chin and S. Sun, “A linear groupwise STBC detector based on Strassen algorithm”, ICICS 2007.
  • [12] H. Kim and H. Park, “Efficient successive interference cancellation algorithms for the DSTTD system,” IEEE PIMRC 2005, vol. 1, pp. 62-66, Sept. 2005.
  • [13] F. Wang, W. Zhao and Y. Xiong, “Ordered group interference cancellation for quasi-orthogonal space time block codes,” Proc. WICOM 2006.
  • [14] S. Jung and J. Lee, “A New ML Based Interference Cancellation Technique for Layered Space-Time Codes”, IEEE Transactions on Communications, vol. 57, no. 4, pp. 930-936, April 2009.
  • [15] IEEE Std 802.16e-2005, December 2005.
  • [16] N. Prasad, M.K. Varanasi, L. Venturino, X. Wang, “An Analysis of the MIMO SDMA Channel With Space Time Orthogonal and Quasi-Orthogonal User Transmissions and Efficient Successive Cancellation Decoders”, IEEE Transactions on Information Theory, vol 54, no. 12, pp. 5427-5446, Dec. 2008.
  • [17] R. Buhnke, D. Wubben, V. Kuhn and K. D. Kameyer, “MMSE extension of V-BLAST based on sorted QR decomposition”, IEEE Vehicular Technology Conference 2003-Fall.
  • [18] A. H. Sayed, W. M., Younis and A. Tarighat, “An invariant matrix structure in multiantenna communications”, IEEE Signal Processing Letters, vol. 12, pp. 749-752, Nov. 2005.
  • [19] H. Zhu, Z. Lei, F. P. S. Chin, “An improved recursive algorithm for BLAST”, Signal Processing, vol. 87, no. 6, pp. 1408-1411, Jun. 2007.
  • [20] Y. Shang and X. G. Xia, “On Fast Recursive Algorithms For V-BLAST With Optimal Ordered SIC Detection”, IEEE Transactions on Wireless Communications, vol. 8, pp. 2860-2865, June 2009.
  • [21] T. Liu and Y. Liu, “Modified fast recursive algorithm for efficient MMSE-SIC detection of the V-BLAST system”, IEEE Transactions on Wireless Communications, vol. 7, pp. 3713-3717, Oct. 2008.
  • [22] C. L. Ho, J. Y. Wu, T. S. Lee, “Group-wise V-BLAST detection in multiuser space-time dual-signalling wireless systems”, IEEE Trans. Wireless Commun, vol. 5, no. 7, pp. 1896-1909, July 2006.
  • [23] J. Cha, S. Hur, C. Min, H. Lee, J. Kang, “Efficient Modified Fano Detection with Reduced Branches for DSTTD System”, IEEE International Conference on Communications 2006.
  • [24] H. Zhu and W. Chen, “Comments on a New ML Based Interference Cancellation Technique for Layered Space-Time Codes,” IEEE Transactions on Communications, vol. 58, no. 11, pp. 3054-3055, Nov. 2010.