Joint Activity Detection, Channel Estimation, and Data Decoding for Grant-free Massive Random Access
Abstract
In the massive machine-type communication (mMTC) scenario, a large number of devices with sporadic traffic need to access the network on limited radio resources. Recently, grant-free random access has emerged as a promising mechanism for this challenging scenario, but its potential has not been fully unleashed. In particular, the available auxiliary information has not been fully exploited, including the common sparsity pattern in the received pilot and data signal, as well as the channel decoding information. This paper develops advanced receivers in a holistic manner to improve the massive access performance by jointly designing activity detection, channel estimation, and data decoding. To tackle the algorithmic and computational challenges, a turbo structure is adopted at the joint receiver. For performance enhancement, all the received symbols are utilized to jointly estimate the channel state, user activity, and soft data symbols, which effectively exploits the common sparsity pattern. Meanwhile, the extrinsic information from the channel decoder will assist the joint channel estimation and data detection. To reduce the complexity, a low-cost side information (SI)-aided receiver is also proposed, where the channel decoder provides side information to update the estimates on whether a user is active or not. Simulation results show that the turbo receiver is able to reduce the activity detection, channel estimation, and data decoding errors effectively, supporting twice as many active users compared with a separate design that disregards the common sparsity. In addition, the SI-aided receiver notably outperforms the conventional methods with a relatively low complexity.
Index Terms:
Grant-free massive random access, massive machine-type communication (mMTC), user activity detection, channel estimation, channel coding, approximate message passing (AMP), turbo receiver.I Introduction
The upsurge of numerous Internet of Things (IoT) applications, e.g., autonomous vehicles, intelligent robots, smart city, and industry 4.0, is boosting a rapid paradigm shift of wireless communications from connecting people to connecting things [2]. It is estimated by Cisco that the share of machine-to-machine (M2M) communications will increase from 33% in 2018 to 50% in 2023 [3], leading to an unprecedented requirement of ubiquitous and scalable connectivity. In order to fulfill such an urgent need, massive machine-type communications (mMTC) has been identified as one of the key application scenarios of the fifth-generation (5G) cellular networks by the third-generation partnership project (3GPP) [4]. The most distinctive feature of mMTC is that a huge amount of devices are simultaneously connected to a base station (BS), while only a small proportion of them are active for transmitting a short data packet at each time [5]. This brings forth significant challenges that cannot be catered with existing wireless technologies. In particular, uplink access in cellular networks is traditionally controlled by grant-based random access (RA) mechanisms, where each user first initiates a RA procedure by transmitting a scheduling request (SR) to its serving BS, and it cannot start data transmission until the request is granted [6]. Nevertheless, due to the limited preamble sequences for SR, grant-based RA suffers from potential collisions of the connection requests when two or more users pick the same sequence, especially with massive concurrent requests [7]. Although complementary techniques such as power ramping, back-off, and access class barring [8], can be utilized to relieve access collision, long access latency and significant signalling overhead will be incurred, which are unfavorable for mMTC [9, 10]. Therefore, more efficient RA mechanisms are needed to meet the stringent latency and reliability requirements of mMTC.
Grant-free RA, which allows users to directly send messages without waiting for access permissions from the BS [11], is widely acknowledged as a promising alternative for massive RA. In contrast to grant-based RA where each user selects a random pilot sequence at each time slot, grant-free RA assigns a fixed and unique pilot sequence to each user to enable contention-free uplink access. Nevertheless, the BS does not have knowledge of the set of transmitting (i.e., active) users in grant-free RA, making it arduous to perform accurate channel estimation and data reception. Consequently, detecting the set of transmitting users (i.e., user activity detection) at the BS, becomes a new and critical task for grant-free massive RA [12].
I-A Related Works and Motivations
The popular pilot-based grant-free RA protocol is considered in this paper, where the active users transmit their unique pilot sequences using dedicated radio resources followed by data symbols, and the BS identifies the set of active users and decodes their data. Attributed to the massive number of devices and the limited resources for pilot transmission, it is infeasible to assign orthogonal pilot sequences to all the devices, rendering conventional collision avoidance mechanisms not readily applicable. Fortunately, user activity detection in mMTC turns out to be a compressive sensing (CS) problem [13] thanks to the sporadic data traffic pattern, for which, many efficient algorithms are available [14, 15, 16, 17]. For instance, by formulating user activity detection as a maximum likelihood (ML) estimation problem, low-complexity algorithms based on sample covariance matrices of the received pilot signal were proposed for massive multi-input multi-output (MIMO) systems in [18]. The user activity detection accuracies in massive and cooperative MIMO systems were analyzed in [19] with the approximate message passing (AMP) algorithm. Nevertheless, early studies on grant-free massive RA only focused on user activity detection but neglected the data reception performance, which motivates the investigations on multi-user detection (MUD) for massive connectivity [20, 21]. In particular, based on the orthogonal matching pursuit (OMP), a support detection algorithm was proposed for joint activity and data detection in grant-free non-orthogonal multiple access (NOMA) systems in [20]. A similar problem was tackled by fusing the expectation maximization (EM) algorithm with AMP in [21], which leverages prior information of the transmitted data symbols in addition to the sparse user activity pattern. However, these works assume full channel state information (CSI) available at the BS, which is idealized and impractical for grant-free massive RA.
To bridge this gap, joint activity detection and channel estimation (JADCE) becomes an emerging theme for grant-free massive RA. It was shown in [22] that JADCE can be formulated as a single measurement vector (SMV) and multiple measurement vector (MMV) CS problem with single- and multi-antenna BS, respectively, and both problems can be efficiently solved by AMP. The false alarm and missed detection probabilities were also characterized in [22]. Interestingly, a subsequent investigation [23] revealed that the activity detection error can be made arbitrarily small with sufficient BS antennas. Besides, characteristics of the wireless channels have been utilized together with the sparse user activity pattern to promote the accuracy of JADCE [24, 25]. Moreover, in reliance on a spatial and angular domain channel model respectively, user activity detection and channel estimation algorithms were developed for orthogonal frequency division multiplexing (OFDM) massive MIMO systems in [24] to achieve considerably improved access performance. Beyond those, low-complexity JADCE algorithms were proposed based on dimension reduction [26] and deep learning [27].
While the aforementioned JADCE algorithms exploit the sparsity pattern in the received pilot signal, a common sparsity pattern inherently embedded in both the received pilot and data signal could be further utilized to enhance the performance. The benefits of exploiting such a common sparsity pattern was first witnessed in [28] for massive RA systems with a single-antenna BS, where a joint activity detection, channel estimation and MUD algorithm was proposed under the framework of MMV CS. An extension for multi-antenna BSs was conducted in [29] via the bilinear generalized AMP (BiG-AMP) algorithm [17]. These preliminary attempts, however, were limited to uncoded transmissions and failed to take advantages of channel coding in modern digital communication systems. Specifically, the error detection mechanism of channel codes can be utilized to determine a subset of active users with high channel quality [30]. Besides, the soft decoding results, which carry posterior information of the transmitted data symbols, are valuable for improving the accuracy of activity detection, channel estimation and MUD. However, the joint detection/decoding problem is computationally infeasible for channel codes even with reasonable block lengths [31]. Thus, it necessitates a holistic investigation of how channel decoders can be effectively integrated with other critical components in a massive RA receiver, including user activity detection, channel estimation, and MUD, which will be pursued in this paper.
I-B Contributions
In this paper, we endeavor to push the performance limit of uplink receivers for grant-free massive RA by leveraging both the common sparsity pattern and channel decoding results. Our main contributions lie in developing effective methods to tackle the algorithmic and computational challenges of the joint design of activity detection, channel estimation, and data decoding, as summarized below.
-
•
We propose a turbo receiver for joint activity detection, channel estimation, and data decoding, which iterates between a joint estimator and a channel decoder. In order to exploit the common sparsity pattern in the received pilot and data signal, the joint estimator for joint activity detection, channel estimation, and data symbol detection, is developed by solving a bilinear inference problem based on the BiG-AMP algorithm. To boost its performance, we further leverage the posterior log-likelihood ratios (LLRs) of the data bits from the channel decoder to derive the extrinsic information, which serves as the updated estimates of the user activity as well as data symbol distribution and are used as prior information for the next turbo iteration.
-
•
Albeit the turbo receiver is effective in exploiting the common sparsity pattern, the BiG-AMP-based joint estimator incurs significant computation overhead. To facilitate fast execution while retaining the performance gain of the iterative receiver, we develop a side information (SI)-aided receiver that executes a sequential estimator and a channel decoder alternatively. The sequential estimator is developed for JADCE based on the AMP algorithm, which processes only the received pilot signal, leaving data symbol detection to a minimum mean square error (MMSE) equalizer. To effectively leverage the common sparsity and channel decoding results, the estimates on whether a user is active or not are used as SI for the sequential estimator, which are derived according to the parity check results and posterior LLRs.
-
•
Simulation results show that the turbo receiver significantly reduces the activity detection, channel estimation, and data decoding errors compared with the baseline schemes. Remarkably, in the simulated setting, assuming the block error rate (BLER) requirement is , the turbo receiver is able to support 40 active users while the separate design can only support 20. Meanwhile, the SI-aided receiver saves more than 60% of the execution time compared with the turbo receiver, while maintaining a noticeable performance improvement compared against a data-assisted design that only leverages the common sparsity pattern.
I-C Organization
The rest of this paper is organized as follows. We introduce the system model in Section II. A turbo receiver for joint activity detection, channel estimation, and data decoding is developed in Section III. In Section IV, we propose a low-complexity SI-aided receiver. Simulation results are presented in Section V, and Section VI concludes this paper.
I-D Notations
We use lower-case letters, bold-face lower-case letters, bold-face upper-case letters, and math calligraphy letters to denote scalars, vectors, matrices, and sets, respectively. The entry in the -th row and -th column of matrix is denoted as , and the matrix transpose, complex conjugate, and conjugate transpose operators are denoted as , , and , respectively. Besides, represents all the elements in matrix except . In addition, denotes the exponential function, denotes the Dirac delta function, denotes the floor function, and denotes the probability density function (PDF) of a complex Gaussian random variable with mean and variance .
II System Model
We consider an uplink cellular system as shown in Fig. 1, where a BS with antennas serves single-antenna users. The users are assumed to have short data packets to transmit occasionally, and at each time instant, () among the users become active for transmission. Denote as the user activity indicator, where means user is active and if it is inactive. The sets of system users and active users are represented by and , respectively, and the set of BS antennas is denoted as . Besides, the number of BS antennas is assumed to be no less than the number of active users, i.e., , to avoid the system from being overloaded [32].
Each transmission block contains symbol intervals and we assume quasi-static block fading channels, i.e., the channel state remains unchanged within a transmission block, but varies independently across multiple blocks. The uplink channel vector from user to the BS is modeled as , where and denote the small-scale and large-scale fading coefficients, respectively. We focus on Rayleigh fading channels, i.e., 111With slight abuse of notation, also denotes the complex Gaussian distribution with mean and covariance matrix ., and assume that the users are static with ’s known by the BS [22].
A grant-free RA scheme where each transmission block is divided into two phases, as shown in Fig. 1, is adopted for uplink transmission. Specifically, in the first phase, symbols, denoted as , are reserved for pilot transmission, which are essential for user activity detection and channel estimation at the BS; Whereas the remaining symbols, denoted as , are used for payload delivery in the second phase. It is important to note that although orthogonal pilot sequences are most beneficial for accurate channel estimation, it is strictly prohibitive in mMTC since the number of users can be much larger than the pilot length, i.e., . As a result, we assign the users with a set of non-orthogonal and unique pilot sequences ’s by sampling a complex Gaussian distribution, i.e., with , which achieves asymptotic orthogonality when is sufficiently large. Define as the collection of pilot sequences.

In each transmission block, payload bits, denoted as , need to be transmitted for each active user, which are encoded for error detection and correction. Following contemporary communication standards such as the long term evolution (LTE) [33] and 5G new radio (NR) [34], cyclic redundancy check (CRC) bits are generated and attached to the payload bits to form a code block. We represent the CRC generation and attachment procedures by function , where denotes the size of a code block. Thus, the code blocks of the active users can be expressed as follows:
(1) |
Each code block is then encoded by a channel encoder, which is abstracted as function , and the coded bits can be represented as follows:
(2) |
Note that is the number of coded bits and the code rate is defined as the ratio between and , i.e., .
The coded bits are modulated to a set of constellation points with normalized average power via an invertible mapping , i.e., for an arbitrary bit sequence with length , if and only if , where is a constellation point. The modulated symbols for the active users are denoted as follows:
(3) |
We assume for simplicity and assign zero vectors to for the set of inactive users. Let denote the transmitted data symbols from all the users. As a result, the received signal of the transmission block at the BS can be expressed as follows:
(4) |
where is the uplink transmit power, and are the received pilot and data signal, respectively, and with denotes the effective channel coefficient matrix. Besides, is the additive white Gaussian noise (AWGN) with zero mean and variance for each element, and and are the noise of the received pilot and data signal, respectively. The noise variance is assumed known, which can be accurately estimated at the BS [35]. Define , , , , , and as the normalized received signals and noise for the ease of notation. TABLE I summarizes the key notations in this paper and their definitions.
Notation | Definition |
, , | Number of BS antennas, system users, and active users |
, , | Set of BS antennas, system users, and active users |
, , | Number of symbols, pilot symbols, and data symbols in a transmission block |
, | Small-scale and large-scale fading coefficients |
User activity indicator | |
, | Effective channel coefficient vector and matrix |
, , | Payload bits, code block, and coded bits |
, , | Number of payload bits, code block bits, and coded bits |
Set of constellation points | |
, | Pilot sequences and modulated data symbols |
, | Received pilot and data signals |
, | Normalized received pilot and data signals |
, | Uplink transmit power and noise variance |
, | Estimated set of active users and users that pass CRC |
, | Detected code blocks and payload bits |
In the following sections, we will develop efficient algorithms to detect the set of active users, estimate their channel coefficients and the transmitted payload bits.
III Joint Estimation via a Turbo Receiver
In this section, we develop a turbo receiver for joint estimation of the user activity, channel coefficients, and payload data of the active users. It is noteworthy that while the turbo principle has achieved great success in conventional multi-user MIMO systems [36, 37], its applications in grant-free massive RA are still unchartered due to the new requirement of user activity detection. Besides, in contrast to most state-of-the-art approaches that follow a sequential user activity detection and data detection/decoding pipeline [9], our design exploits the common sparsity pattern in both the received pilot and data signal. Meanwhile, it takes advantages of the soft decoding information in order to optimize the activity detection and data reception performance.
III-A Overview of the Turbo Receiver
The proposed turbo receiver iterates between a joint estimator and a channel decoder as shown in Fig. 2, which is inspired by the turbo decoding principle [38] that leverages multiple concatenated elementary decoders with the aid of the extrinsic information. In particular, responsible for user activity detection, channel estimation, and soft data symbol detection, the joint estimator is designed based on the BiG-AMP algorithm [17]. It also estimates the posterior probabilities of the transmitted data symbols in each turbo iteration, which are converted as extrinsic information of the coded bits. On the other hand, the channel decoder is developed based on the belief propagation (BP) algorithm [39], which accepts the extrinsic information of the coded bits as input to generate their posteriors. The extrinsic LLRs of the coded bits, i.e., the logarithm of ratio between the probabilities that a coded bit is “0” or “1”, are obtained accordingly and translated to priors of the transmitted data symbols for the use of the joint estimator in the next turbo iteration. The turbo iteration terminates after rounds or when an exit condition is achieved, after which, hard decision is performed to obtain the code block, followed by a cyclic redundancy check. The workflow of the turbo receiver is summarized in Algorithm 1 with details of the joint estimator and channel decoder to be elaborated in the following subsections. Note that an initial estimate of the effective channel coefficients and their variances, as well as the average sparsity levels derived from the estimated effective channel coefficients, are obtained via the AMP algorithm developed in [24]222With prior knowledge of the user active probability, the AMP algorithm [24] estimates the effective channel coefficients and their variances based on the received pilot signal, and a set of belief indicators ’s are derived as the posterior probabilities of the effective channel coefficients to be non-zero. In this paper, we term as the posterior sparsity level of user at the -th BS antenna, and define as the average sparsity level of user , which is a reliable statistic of the activity status and updated iteratively by the joint estimator of the proposed turbo receiver..

Input:
The normalized received signal , pilot symbols , maximum number of iterations , and accuracy tolerance .
Output:
The estimated set of active users , the set of users that pass CRC and their detected payload bits ’s.
Initialize:
, , , , , , , , , .
III-B The Joint Estimator
The joint estimator is designed to detect the set of active users, estimate their channel coefficients and the transmitted data symbols. Since the user activity pattern is encapsulated in and can be determined accordingly, it remains for the joint estimator to estimate the effective channel coefficients and soft data symbols. We resort to the MMSE estimators, which can be expressed for the effective channel coefficients and soft data symbols respectively as follows [40]:
(5) |
(6) |
where () is the estimate of (), and () denotes the marginal posterior distribution of () given the normalized received signal . The marginal posterior distributions can be rewritten in terms of the joint posterior distribution as follows:
(7) |
(8) |
where can be factorized via the Bayes’ rule:
(9) |
In (9), (a) holds since , as the user activity pattern is deterministic given , and (b) is attributed to the conditional independence of random variables.
Nevertheless, the marginal distributions in (7) and (8) are intractable due to high-dimensional integrals and summations. Fortunately, the factorization in (9) implies efficient approximations via the BP algorithm operating on factor graphs [39]. As shown in Fig. 3, a factor graph consists of variable nodes (as indicated by circles), factor nodes (correspond to PDFs as indicated by squares), and edges connecting variable nodes and factor nodes. In the formats of PDFs, messages are propagated in the factor graph and updated iteratively. Specifically, the message from a variable node to a factor node is the product of messages from other adjacent factor nodes of that variable node, while the message from a factor node to a variable node is the integral of the product of that factor and messages from other adjacent variable nodes of that factor node. The posterior PDF of a variable is approximated by the belief of the corresponding variable node, which is the product of messages from all its adjacent factor nodes. For instance, let and be the messages from variable node to factor node and from factor node to variable node , respectively. They are updated in each iteration of the BP algorithm as follows:
(10) |
(11) |
where denotes the message from factor node to variable node that is used to approximate the prior distribution of , and is the message from variable node to factor node . The belief of variable node and the approximated posterior distribution of , i.e., and , are updated via the following expressions, respectively:
(12) |
(13) |

Unfortunately, although the BP algorithm is efficient in calculating marginal distributions, computations of the high-dimensional integrals in (11) still exhibit excessive complexity since is very large in massive RA systems. To develop a joint estimator with affordable complexity, we turn to the framework of AMP, which is a variant of BP that provides more tractable approximations for marginal distributions [16]. It adopts the Central Limit Theorem to approximate the product of some messages as a complex Gaussian distribution so that only the mean and variance need to be propagated. Besides, high-order terms of messages are omitted in deriving the means and variances to further reduce the computation complexity. Since the joint estimation of effective channel coefficients and soft data symbols belongs to a bilinear inference problem, the BiG-AMP algorithm [17] offers a viable solution by estimating and alternatively. Key steps of the BiG-AMP-based joint estimator are summarized in Algorithm 2, which is an iterative algorithm that estimates three sets of variables in each iteration, including: 1) The linear mixing variables ’s (); 2) The effective channel coefficients ’s; and 3) The soft data symbols ’s, as elaborated in the following.
Input:
The normalized received signal , pilot symbols , the estimates of the likelihood that each user is active ’s, the estimates of the effective channel coefficients ’s and their variances ’s, the prior probabilities that equals , i.e., ’s, the threshold of determining the active user , maximum number of iterations , and accuracy tolerance .
Output:
The estimated set of active users , and the posterior probabilities that equals , i.e., , , .
Initialize:
, , , , , , , .
III-B1 Estimate the linear mixing variables
In each iteration, the joint estimator first estimates the linear mixing variable from . The basic principle is that if the prior distribution of a variable and its likelihood function are available, the posterior probability can be derived for MMSE estimation by using the Bayes’ rule. Since , the likelihood function is given as follows:
(14) |
The prior distribution of is approximated as a complex Gaussian distribution with mean and variance in the -th iteration of the joint estimator, as shown in Line 3 and 4 in Algorithm 2, respectively, where the superscript “(j)” denotes the turbo iteration index, and are the most updated estimate of the effective channel coefficient and its variance, and are the latest estimate of the soft data symbol and its variance, and denotes the scaled residual of . Note that for , we have and as the pilot symbols are known at the BS.
Since both the approximated prior distribution of and the likelihood function of are complex Gaussian, the posterior distribution can also be approximated by a complex Gaussian distribution with mean and variance given in Line 5 and 6 in Algorithm 2, respectively. Detailed derivations are provided in Appendix A. Note that the posterior mean of also gives the MMSE estimate . Besides, the scaled residual of and the corresponding inverse-residual-variance are updated in Line 7 and 8, respectively, which are useful for approximating the likelihood functions of the effective channel coefficients and soft data symbols.
III-B2 Estimate the effective channel coefficients
The effective channel coefficients and their variances are estimated by incorporating both the received pilot and data signals. In order to approximate the posterior distribution of in the -th iteration of the joint estimator, we first obtain the belief of variable node as it only differs from the posterior distribution of by a normalizing constant, which can be derived based on the BP algorithm as follows:
(15) |
where denotes the message from factor node to variable node that serves as the prior distribution of , and represents the message from factor node to variable node . Thus, the term can be interpreted as the likelihood function of in the -th iteration. Specifically, the term , which corresponds to the received pilot symbols, is approximated as a complex Gaussian PDF with mean and variance , and the term that relates to the received data symbols, is approximated as another complex Gaussian PDF with mean and variance . Consequently, the term is also approximated as a complex Gaussian PDF with mean and variance given in Line 13 and 14 of Algorithm 2, respectively, which are derived in Appendix B.
To derive , we obtain as follows:
(16) |
where approximates the probability that is non-zero, and it is defined as the sparsity level of user at the -th BS antenna. Detailed derivations of (16) are deferred to Appendix C. Note that estimates of the likelihood that each user is active or not in the considered transmission block, i.e., , are required for the calculations of ’s in Lines 15-17 of Algorithm 2. We propose to update ’s in each turbo iteration for more accurate estimation of the BiG-AMP algorithm, as will be elaborated shortly. Therefore, the posterior distribution of is approximated in the -th iteration as follows:
(17) |
where and are given in Line 18 of Algorithm 2, and presented in Line 19 is defined as the posterior sparsity level of user at the -th BS antenna. Based on the posterior distribution, the MMSE estimate of the effective channel coefficient and its variance are obtained in Line 20 and 21 of Algorithm 2, respectively.
III-B3 Estimate the soft data symbols
Due to the symmetry of and in the bilinear inference problem of the joint estimator, we similarly obtain the conditional mean and variance given in Line 23 and 22 of Algorithm 2, respectively. Prior distributions of the transmitted data symbols can be estimated as follows:
(18) |
where , and denotes the probability that belongs to constellation point . As will be introduced in the next subsection, ’s are obtained from the channel decoder in the last turbo iteration. Thus, the approximated posterior distributions of the transmitted data symbols in the -th iteration of the joint estimator can be expressed as follows:
(19) |
where denotes the posterior probability that belongs to constellation point as derived using the Bayes’ rule in Line 24 of Algorithm 2. The soft data symbols and the corresponding posterior variances are estimated via Line 25 and 26, respectively.
Once the while loop of Algorithm 2 is terminated, , and are updated for the next turbo iteration. Accordingly, we update ’s in Line 28 using the average sparsity level , i.e., , , where is the learning rate. This is inspired by the idea of exploration and exploitation from reinforcement learning [41], which avoids using the average sparsity levels exclusively to eliminate the potential estimation errors caused by inaccurate prior information of the BiG-AMP algorithm. The set of active users is determined as , where is an empirical threshold [24].
III-B4 Derive the extrinsic information of the joint estimator
With the estimated set of active users and soft data symbols ’s, extrinsic information of the joint estimator is derived as input of the channel decoder, which aims at minimizing the data decoding error by eliminating some redundancy from the prior information of the coded bits. In particular, the posterior probability of a transmitted data symbols is translated to the posterior probabilities of the corresponding coded bits as follows:
(20) |
where , , and represents the set of constellation points with the -th position () of the corresponding bit sequence as . For example, suppose the bit sequences “00”, “01”, “10” and “11” are modulated to constellation points , , , and respectively in quadrature phase shift keying (QPSK), we have , , , and . Other modulation schemes such as the 16-Quadrature Amplitude Modulation (QAM) can be applied similarly. The posterior probabilities of the coded bits are used to derive the posterior LLRs as follows:
(21) |
which are converted to the extrinsic information as defined below [42]:
(22) |
where is the prior information obtained from the channel decoder in the last turbo iteration.
III-C The Channel Decoder
The channel decoder determines the most probable code block for each user that is determined as active by the joint estimator, which can be formulated as the following maximum a posteriori probability (MAP) estimation problem:
(23) |
Known for its effectiveness in calculating marginal distributions, the BP algorithm has a long history of applications for channel decoder designs [42]. In this paper, we adopt a BP-based channel decoder to solve (23), which should be able to accept the extrinsic information of the coded bits derived from the joint estimator as input, and calculate the posterior LLRs of the coded bits , as the soft decoding results. We emphasize that this is a mild requirement that can be satisfied by a variety of off-the-shelf BP-based channel decoders, e.g., the decoders developed in [43], [44] and [38], [45] for low-density parity-check (LDPC) code and turbo code, respectively.
Similar to the joint estimator, extrinsic information of the channel decoder is derived as follows:
(24) |
which is adopted as prior information , for the use of the joint estimator in the next turbo iteration. Therefore, the prior distribution of a coded bit is given as
(25) |
and prior distributions of the transmitted data symbols can be estimated according to the following expression:
(26) |
where , , and . Note that for the users that are determined as inactive, we reuse the prior information of the transmitted data symbols from the last turbo iteration by setting and , .
The values of ’s are also utilized to obtain the code block , after the last turbo iteration by performing hard decision as follows:
(27) |
CRC is then performed for and the CRC bits are detached to obtain the payload bits for the users that pass parity check, which is denoted as in Algorithm 1.
IV A Low-complexity Side Information-aided Receiver
Assisted by prior information of the transmitted data symbols, the proposed turbo receiver effectively exploits the common sparsity pattern in the received pilot and data signal via BiG-AMP. Nevertheless, such a design incurs significant computation overhead even with a reasonable size of the payload data, since the joint estimation of effective channel coefficients and soft data symbols is performed iteratively by incorporating all the received symbols in each turbo iteration. Besides, in order to estimate the prior information, the channel decoder needs to be executed in each turbo iteration for all users in (See Line 7 of Algorithm 1), which brings additional computation overhead. These observations necessitate low-complexity receivers for massive RA that can leverage both the common sparsity pattern and channel decoding results more efficiently. In this section, we develop a low-complexity side information (SI)-aided receiver without relying on BiG-AMP.
IV-A Overview of the SI-aided Receiver
The SI-aided receiver iterates between a sequential estimator and a channel decoder as shown in Fig. 4. Unlike the turbo receiver developed in Section III, it estimates the effective channel coefficients and soft data symbols sequentially in each iteration to reduce the computation overhead. Specifically, the sequential estimator cascades the AMP algorithm [24] for JADCE, and an MMSE-based soft demodulator to compute the prior LLRs of the coded bits. A BP-based channel decoder is adopted to obtain the posterior LLRs of the coded bits similar as the turbo receiver, while hard decision is required for parity check in each iteration. By updating the SI, i.e., the estimates on whether a user is active, in each iteration jointly based on the average sparsity levels, the posterior LLRs of the coded bits, and the parity check results, the receiver progresses with more precise prior knowledge for the sequential estimator so that more accurate JADCE can be achieved [46]. The workflow of the SI-aided receiver is summarized in Algorithm 3. We introduce details of the sequential estimator and the channel decoder in Section IV-B, and elaborate the design of the SI in Section IV-C.

Input:
The normalized received signal , pilot symbols , maximum number of iterations , and accuracy tolerance .
Output:
The estimated set of active users , the set of users that pass CRC and their detected payload bits .
Initialize:
, , , , , .
IV-B The Sequential Estimator and the Channel Decoder
Based on the normalized received pilot signal , the sequential estimator adopts the AMP algorithm [24] to estimate the effective channel coefficients ’s and the set of active users . We also derive the sparsity levels ’s from the AMP algorithm following similar steps in Lines 15-17 of Algorithm 2. Soft data symbol detection is then performed using an MMSE-based soft demodulator based on the results of the sequential estimator. In particular, signal distortion caused by wireless fading is first removed from the normalized received data signal to estimate the transmitted data symbols , , via an MMSE equalizer. The prior LLRs of the coded bits are obtained via soft demodulation as follows:
(28) |
where and .
With the knowledge of ’s, the BP-based channel decoder calculates the posterior LLRs of the coded bits , and decides the code blocks according to (27). CRC is performed for all users in to obtain their payload bits ’s. Note that channel decoding is not performed for the users that have already passed the parity check, which differs the turbo receiver and helps to save the computations. We would like to point out that the SI-aided receiver can be extended by incorporating the idea of successful interference cancellation, i.e., subtracting the user data that have passed CRC from the received signal. However, the performance improvement is not guaranteed due to the potentially large channel estimation error. A thorough investigation on such an extension will be left for future works.
IV-C The Side Information
The AMP algorithm is a key component of the sequential estimator, which determines the average sparsity levels and effective channel coefficients based on the framework of Bayesian estimation [40]. As a consequence, prior knowledge of the user activity, i.e., the SI for the sequential estimator ’s, also has significant impacts on the estimation accuracy, similar with the case of the BiG-AMP algorithm. In order to obtain more precise estimates through multiple iterations of Algorithm 3, we propose to update the SI by jointly utilizing the results of the sequential estimator and channel decoder, according to three different cases depending on the estimated set of active users and their parity check results via the following update rule:
(29) |
In particular, in the first case of (29), we set , since the users that have passed the parity check in the current or previous iterations can be safely determined as active. In the second case, we handle the users that are estimated as active but fail to pass the parity check in the current iteration, i.e., . For this set of users, the average sparsity levels and the posterior LLRs of the coded bits are jointly utilized to update the SI since both of them are informative on users’ activity. Specifically, the term indicates the decoding reliability of user as its complement, i.e., , provides an accurate estimate of the bit error rate [47]. Besides, parameter is an empirical weighting factor balancing the contributions of the channel estimation and data decoding results. In the third case, we update the SI for the users that neither pass the CRC in any iteration nor being determined as inactive in the current iteration using the average sparsity levels, using similar methodology as that for the turbo receiver in Section III, where denotes the learning rate.
To demonstrate the rationality of the SI update rule in (29), we provide numerical examples on the evolutions of ’s, considering two scenarios with and in Fig. 5(a) and (b), respectively. From these figures, we see that as the iteration of Algorithm 3 proceeds, the SI evolves from the initial values, which is set to be , , to the perfect estimates, i.e., , and , . This validates the effectiveness of the proposed SI update rule. Besides, we observe that a larger number of active users leads to a slower convergence rate and higher estimation variance, implying the need of more iterations in Algorithm 3.

IV-D Computational Complexity Analysis
The computational complexity of the two proposed receivers is summarized in TABLE II, where the number of complex-valued multiplications is adopted as the metric, and the complexity of a real-valued multiplication is assumed to be one quarter of a complex-valued multiplication. We use to denote the complexity of the decoder. Since the overall computational complexity of the two proposed receivers is determined by the iteration numbers, i.e., and for the turbo and SI-aided receiver respectively, we only focus on the complexity of one iteration in the following discussions, which is contributed by the estimator and channel decoder.
Receiver | Number of complex multiplications |
Turbo | |
SI-aided |
As summarized in TABLE II, the complexity of the channel decoder in each turbo iteration is given as for the turbo receiver ( for the SI-aided receiver), where () is the number of users that need to be decoded in this iteration. The other terms shown in the table correspond to the complexity of the joint (sequential) estimator. Compared with the joint estimator that requires complex-valued multiplications for the BiG-AMP algorithm in each turbo iteration, the sequential estimator first performs the AMP algorithm, followed by an one-shot data detection procedure, which respectively require and complex-valued multiplications. Please be noted that denotes the number of users that are detected as active, and and stand for the actual iteration numbers of the BiG-AMP and AMP algorithm, respectively.
We use the simulation setting as will be detailed in Section V to give a more intuitive idea on the computational complexity of the two proposed receivers by assuming . The values of and , given respectively by 41 and 52, are obtained by averaging the results over independent channel realizations. The numbers of complex-valued multiplications of the turbo and SI-aided receiver in one iteration (excluding those of the channel decoders) are given by and , respectively. In addition, since hard decision is made in each iteration of the SI-aided receiver, is typically smaller than , especially in later iterations. These two factors jointly imply that the SI-aided receiver has a much lower complexity compared with the turbo receiver. In the next section, we will compare the computational complexity of different receivers numerically using the measured execution time in simulations.
V Simulation Results
V-A Simulation Setting and Baseline Schemes
A single-cell uplink cellular network is simulated, where 200 users are randomly distributed in a circle with a radius of 500 m centered at the BS equipped with 64 antennas. The path loss of user is calculated as (dB), where (km) is the distance to the BS. The system bandwidth is 1 MHz, and the user transmit power is 23 dBm. Without otherwise specified, QPSK is employed as the modulation scheme and LDPC code is used for channel coding. Besides, we select CRC-8 to show the effectiveness of the proposed receivers, which is one of the CRC options for the physical uplink control channel (PUCCH) in 3GPP standards [48].
In order to achieve more stable convergence behavior, a damping factor [17] is applied to moderate the updates of , , , and . For instance, the damped version of the estimated soft data symbol can be expressed as . In particular, the mean and variance of in Line 3 and 4 of Algorithm 2 are replaced with the damped versions and , respectively, while the damped versions of and are used in Lines 10-12 and Lines 22-23 of Algorithm 2. The simulation results are averaged over independent channel realizations, and other critical simulation parameters are summarized in TABLE III.
Parameters | Values | Parameters | Values |
64 | 200 | ||
50 | 150 | ||
142 | 150 | ||
300 | CRC type | CRC-8 | |
0.6 | 200 | ||
0.4 | , | 6 | |
100 | , , | ||
, | 0.5 | 0.5 | |
Noise power density | -169 dBm/Hz | Code rate |
We adopt two baseline schemes and a performance upper bound for comparisons:
-
•
Separate design [24]: This scheme first performs JADCE via the AMP algorithm, after which, data symbols are detected using an MMSE equalizer. The detected soft data symbols are then converted to prior LLRs of the coded bits for data decoding via soft demodulation using (28). This can be viewed as an instance of the SI-aided receiver by setting .
-
•
Data-assisted design with BiG-AMP [29]: This scheme exploits the common sparsity pattern using the BiG-AMP algorithm for joint activity detection, channel estimation, and soft data symbol detection. The detected soft data symbols are converted to prior LLRs of the coded bits for data decoding using (28). This is a special case of the turbo receiver when .
-
•
Turbo receiver with known user activity: This scheme assumes perfect knowledge of the user activity and consequently, channel estimation and data decoding are performed via the proposed turbo receiver by setting , , and , . This scheme serves as a performance upper bound.
Note that all the simulated schemes adopt the same BP-based LDPC decoder [43] for fair comparisons.
V-B Results
We first evaluate the activity detection error probability (including the missed detection and false alarm probability) and the normalized mean square error (NMSE) of channel estimation in Fig. 6 and Fig. 7, respectively. It is observed that a large number of active users degrade both the activity detection and channel estimation performance due to the limited radio resource reserved for pilot transmission. Compared with the separate design, the data-assisted design achieves much lower activity detection and channel estimation errors, validating the benefits of incorporating the received data symbols. It is also seen that the proposed turbo receiver significantly outperforms the data-assisted design as the soft channel decoding results are further utilized to refine the prior distributions of the transmitted data symbols through multiple turbo iterations. Besides, despite with some performance loss compared with the turbo receiver, the low-cost SI-aided receiver secures noticeable performance improvement compared with the data-assisted design, which can be credited to the use of the customized SI as prior knowledge of the user activity.


Fig. 8 shows the BLER of all the simulated schemes versus the number of active users. Similar to activity detection and channel estimation, the turbo receiver achieves the best BLER performance. Assuming the block error rate requirement is , the turbo receiver is able to support 40 active users while the separate design can only support 20, which is a remarkable 100% increase. Compared with the baseline schemes, it also greatly narrows the performance gap to the upper bound scheme with perfect knowledge of the user activity, owing to the more accurate activity detection and channel estimation. Because of the same reason, the SI-aided receiver brings notable BLER reduction compared with the data-assisted design.

Since both the turbo receiver and the SI-aided receiver iterate between an estimator and a channel decoder, we further investigate the impacts of the number of iterations, i.e., for the turbo receiver and for the SI-aided receiver, as shown in Fig. 9. We examine the computation complexity of different schemes by measuring their average execution time on the same computing server. Since the average execution time is platform-specific, it is normalized with respect to that of the separate design. As shown in the figure, the separate design has the lowest complexity but the highest BLER, as it ignores both the common sparsity pattern and the information offered by the channel decoder. Besides, it is observed that the performance achieved by both of the proposed receivers improves with the number of iterations (i.e., for the turbo receiver and for the data-assisted design), which again corroborates the effectiveness of the iterative estimation on the prior information of the user activity and the transmitted data symbols. However, such performance improvement is accompanied with increased computation complexity. Compared with the turbo receiver, the SI-aided receiver enjoys 66%74% average execution time reduction since the sequential estimator only processes the pilot signal for JADCE, and channel decoding is performed just for the users that have not passed the parity check. In addition, we notice that the major performance gains of the proposed receivers come from the first few iterations, e.g., seven in the considered scenario, and the subsequent iterations only contribute to marginal further improvement. In other words, there is no need to execute a large number of iterations, and wise choices of hyper-parameters for the proposed receivers are critical to balance the performance gain and the computation cost.

To show the effectiveness of the two proposed receivers with different modulation schemes, we also simulate a grant-free massive RA system with 16-QAM while keeping unchanged. As shown in Fig. 10, when 16-QAM is used, the BLER performance of different receivers degrades, which is in accordance with intuition. However, we see the two proposed receivers still achieve significant performance improvements compared with the separate design, which again demonstrates the benefit of utilizing the common sparsity and data decoding results in designing grant-free massive RA receivers.

Furthermore, we investigate the impacts of the threshold value for determining the set of active users in the AMP-based receivers. A covariance-based receiver is also simulated, which applies the covariance-based method [18] for activity detection together with an MMSE channel estimator. Similar to the AMP-based receivers, a threshold () was introduced to detect the set of active users in [18]. It is observed from Fig. 11 and Fig. 12 that there is a tradeoff between the missed detection and false alarm probability, and an optimal threshold value brings the best BLER performance for a given receiver. The two proposed receivers achieve better performance compared with the baselines with various values of . Although the covariance-based receiver outperforms the conventional separate and data-assisted designs, it is defeated by the proposed turbo receiver by a large margin. On the other hand, while the SI-aided receiver achieves comparable activity detection performance as the covariance-based receiver, it outperforms the covariance-based receiver in terms of BLER with an optimized threshold value. It is also worthwhile to note that the covariance-based receiver has a very high complexity and its execution time is 6.5 times of the separate design, but that of the SI-aided receiver is only times. These results demonstrate the competence of the proposed receivers over the covariance-based receiver.


VI Conclusions
This paper carried out the first holistic investigation that jointly considered activity detection, channel estimation, and data decoding for grant-free massive random access (RA). A turbo receiver was proposed to exploit the common sparsity pattern in the received pilot and data signal, and its performance is enhanced by the extrinsic information from the channel decoder. To reduce the complexity, we also developed a low-cost side information (SI)-aided receiver, where the SI is updated iteratively to take advantages of the common sparsity pattern and the channel decoding results. Simulation results demonstrated that substantial performance gains can be obtained with advanced receivers for a given protocol.
Our study demonstrates the benefits of exploiting the structured information from the pilot and data symbols, and the importance of incorporating the interplay among activity detection, channel estimation, and data decoding to the design of massive RA receivers. In other words, treating activity detection and data decoding separately, as in many previous studies, leads to highly suboptimal receivers. For future investigations, it would be interesting to extend the proposed receivers to scenarios with spatial-temporal correlation of the user activity and investigate more complex massive RA systems supported by ultra-massive MIMO and reconfigurable meta-surfaces. Meanwhile, since the proposed receivers are iterative algorithms by nature, it is critical to further reduce their computational complexity via, for examples, deep learning based methods [49, 50] to facilitate practical implementation. In addition, optimally controlling the uplink transmit power is also very important.
Appendix A Derivations of and Its Variance
Since and the prior distribution of is approximated as , the joint PDF is approximated in the -th iteration of Algorithm 2 by
(30) | ||||
where , , and . Thus, the posterior distribution of can be approximated in the -th iteration via the Bayes’ rule as follows:
(31) |
Since the MMSE estimate of is the posterior mean, we have . Accordingly, the variance of the MMSE estimate is given by the posterior variance as .
Appendix B Derivations of and
According to the principles of the BiG-AMP algorithm, and are approximated as complex Gaussian distributions and , respectively. By substituting these two complex Gaussian PDFs into the term , we have:
(32) | |||
where , , and .
Appendix C Derivation of (16)
It is straightforward that and . Thus, based on the BP algorithm, the term can be determined as
(33) | ||||
where is the message from variable node to factor node that can be obtained as follows:
(34) |
In (34), stands for the likelihood that user is active or not in the considered transmission block, and is the message from factor node () to variable node that can be expanded as follows:
(35) |
In (35), is the message from variable node to factor node that can be obtained based on the BP algorithm as follows:
(36) | |||
where the second equality in (36) adopts the same approximation as the one used in (32), and is a constant given as . By substituting the right-hand side of (36) into (35), we have:
(37) | ||||
(40) |
Define
(41) |
which uniquely determines the values of and , since . We further define
(42) | ||||
and . With some basic mathematical manipulations, can be simplified as follows:
(43) |
As a result, the terms and can be determined as and , respectively. We complete the derivation by defining .
References
- [1] X. Bian, Y. Mao, and J. Zhang, “Joint activity detection and data decoding in massive random access via a turbo receiver,” in Proc. IEEE Int. Workshop Signal Process. Adv. Wireless Commun. (SPAWC), Sep. 2021.
- [2] A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, “Internet of Things: A survey on enabling technologies, protocols, and applications,” IEEE Commun. Surveys Tut., vol. 17, no. 4, pp. 2347-2376, Fourth Quart. 2015.
- [3] Cisco, “Cisco annual Internet report (2018–2023),” Cisco White Paper, Mar. 2020.
- [4] ITU-R, “Framework and overall objectives of the future development of IMT for 2020 and beyond Recommendation,” ITU-R M.2083-0, 2015.
- [5] C. Bockelmann, N. Pratas, H. Nikopour, K. Au, T. Svensson, C. Stefanovic, P. Popovski, and A. Dekorsy, “Massive machine-type communications in 5G: Physical and MAC-layer solutions,” IEEE Commun. Mag., vol. 54, no. 9, pp. 59–65, Sep. 2016.
- [6] M. Hasan, E. Hossain, and D. Niyato, “Random access for machine-to-machine communication in LTE-advanced networks: Issues and approaches,” IEEE Commun. Mag., vol. 51, no. 6, pp. 86-93, Jun. 2013.
- [7] E. Björnson, E. Carvalho, J. H. Sørensen, E. G. Larsson, and P. Popovski, “A random access protocol for pilot allocation in crowded massive MIMO systems,” IEEE Trans. Wireless Commun., vol. 16, no. 4, pp. 2220-2234, Apr. 2017.
- [8] N. Jiang, Y. Deng, A. Nallanathan, X. Kang, and T. Q. S. Quek, “Analyzing random access collisions in massive IoT networks,” IEEE Trans. Wireless Commun., vol. 17, no. 10, pp. 6853-6879, Oct. 2018.
- [9] L. Liu, E. G. Larsson, W. Yu, P. Popovski, C. Stefanović, and E. Carvalh, “Sparse signal processing for grant-free massive connectivity: A future paradigm for random access protocols in the Internet of Things,” IEEE Signal Process. Mag., vol. 35, no. 5, pp. 88-99, Sep. 2018.
- [10] P. Schulz et al., “Latency critical IoT applications in 5G: Perspective on the design of radio interface and network architecture,” IEEE Commun. Mag., vol. 55, no. 2, pp. 70-78, Feb. 2017.
- [11] X. Chen, D. Ng, W. Yu, E. G. Larsson, N. Al-Dhahir, and R. Schober, “Massive access for 5G and beyond,” IEEE J. Sel. Areas Commun., vol. 39, no. 3, pp. 615-637, Mar. 2021.
- [12] Y. Wu, X. Gao, S. Zhou, W. Yang, Y. Polyanskiy, and G. Caire, “Massive access for future wireless communication systems,” IEEE Wireless Commun., vol. 27, no. 4, pp. 148-156, Aug. 2020.
- [13] D. L. Donoho, “Compressed sensing,” IEEE Trans. Inf. Theory, vol. 52, no. 4, pp. 1289–1306, Apr. 2006.
- [14] T. Robert, “Regression shrinkage and selection via the Lasso,” J. Roy. Statist. Soc., vol. 58, no. 1, pp. 267–288, Jan. 1996.
- [15] J. Tropp, “Greed is good: Algorithmic results for sparse approximation,” IEEE Trans. Inf. Theory, vol. 50, no. 10, pp. 2231– 2242, Oct. 2004.
- [16] D. L. Donoho, A. Maleki, and A. Montanari, “Message passing algorithms for compressed sensing: I. motivation and construction,” in Proc. IEEE Inf. Theory Workshop (ITW), Cairo, Egypt, Jan. 2010.
- [17] J. T. Parker, P. Schniter, and V. Cevher, “Bilinear generalized approximate message passing – Part I: Derivation,” IEEE Trans. Signal Process., vol. 62, no. 22, pp. 5839–5853, Nov. 2014.
- [18] S. Haghighatshoar, P. Jung, and G. Caire, “Improved scaling law for activity detection in massive MIMO systems,” in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Vail, CO, USA, Jun. 2018.
- [19] Z. Chen, F. Sohrabi, and W. Yu, “Multi-cell sparse activity detection for massive random access: Massive MIMO versus cooperative MIMO,” IEEE Trans. Wireless Commun., vol. 18, no. 8, pp. 4060-4072, Aug. 2019.
- [20] B. Wang, L. Dai, Y. Zhang, T. Mir, and J. Li, “Dynamic compressive sensing-based multi-user detection for uplink grant-Free NOMA,” IEEE Commun. Lett., vol. 20, no. 11, pp. 2320-2323, Nov. 2016.
- [21] C. Wei, H. Liu, Z. Zhang, J. Dang, and L. Wu, “Approximate message passing-based joint user activity and data detection for NOMA,” IEEE Commun. Lett., vol. 21, no. 3, pp. 640–643, Mar. 2017.
- [22] Z. Chen, F. Sohrabi, and W. Yu, “Sparse activity detection for massive connectivity,” IEEE Trans. Signal Process., vol. 66, no. 7, pp. 1890–1904, Apr. 2018.
- [23] L. Liu and W. Yu, “Massive connectivity with massive MIMO – Part I: Device activity detection and channel estimation,” IEEE Trans. Signal Process., vol. 66, no. 11, pp. 2933–2946, Jun. 2018.
- [24] M. Ke, Z. Gao, Y. Wu, X. Gao, and R. Schober, “Compressive sensing based adaptive active user detection and channel estimation: Massive access meets massive MIMO,” IEEE Trans. Signal Process., vol. 68, pp. 764–779, 2020.
- [25] Y. Cheng, L. Liu, and P. Li, “Orthogonal AMP for massive access in channels with spatial and temporal correlations,” IEEE J. Sel. Areas Commun., vol. 39, no. 3, pp. 726-740, Mar. 2021.
- [26] X. Shao, X. Chen and R. Jia, “A dimension reduction-based joint activity detection and channel estimation algorithm for massive access,” IEEE Trans. Signal Process., vol. 68, pp. 420-435, Dec. 2019.
- [27] Y. Cui, S. Li and W. Zhang, “Jointly sparse signal recovery and support recovery via deep learning with applications in MIMO-based grant-free random access,” IEEE J. Sel. Areas Commun., vol. 39, no. 3, pp. 788-803, Mar. 2021.
- [28] Y. Du, et al., “Joint channel estimation and multiuser detection for uplink grant-free NOMA,” IEEE Wireless Commun. Lett., vol. 7, no. 4, pp. 682–685, Feb. 2018.
- [29] Q. Zou, H. Zhang, D. Cai and H. Yang, “A low-complexity joint user activity, channel and data estimation for grant-free massive MIMO systems,” IEEE Signal Process. Lett., vol. 27, pp. 1290-1294, 2020.
- [30] X. Bian, Y. Mao, and J. Zhang, “Supporting more active users for massive access via data-assisted activity detection,” in Proc. IEEE Int. Conf. Commun. (ICC), Montreal, QC, Canada, Jun. 2021.
- [31] B. M. Hochwald and S. t. Brink, “Achieving near-capacity on a multiple-antenna channel,” IEEE Trans. Commun., vol. 51, no. 3, pp. 389-399, Mar. 2003.
- [32] K. Wong, A. Paulraj, and R. Murch, “Efficient high-performance decoding for overloaded MIMO antenna systems,” IEEE Trans. Wireless Commun., vol. 6, no. 5, pp. 1833–1843, May 2007.
- [33] 3GPP, “3GPP TS 36.212 version 10.0.0 Release 10,” Jan. 2011.
- [34] 3GPP, “3GPP TS 38.212 version 15.10.0 Release 15,” Nov. 2020.
- [35] T. Cui and C. Tellambura, “Power delay profile and noise variance estimation for OFDM,” IEEE Commun. Lett., vol. 10, no. 1, pp. 25-27, Jan. 2006.
- [36] S. Haykin, M. Sellathurai, Y. de Jong, and T. Willink, “Turbo-MIMO for wireless communications,” IEEE Commun. Mag., vol. 42, no. 10, pp. 48-53, Oct. 2004.
- [37] X. Wautelet, A. Dejonghe, and L. Vandendorpe, “MMSE-based fractional turbo receiver for space-time BICM over frequency-selective MIMO fading channels,” IEEE Trans. Signal Process., vol. 52, no. 6, pp. 1804-1809, Jun. 2004.
- [38] C. Berrou and A. Glavieux, “Near optimum error correcting coding and decoding: Turbo-codes,” IEEE Trans. Commun., vol. 44, no. 10, pp. 1261-1271, Oct. 1996.
- [39] F. R. Kschischang, B. J. Frey and H. A. Loeliger, “Factor graphs and the sum-product algorithm,” IEEE Trans. Inf. Theory, vol. 47, no. 2, pp. 498-519, Feb. 2001.
- [40] S. Kay, Fundamentals of Statistical Signal Processing: Estimation Theory. Prentice Hall, Englewood Cliffs, NJ, USA, 1993.
- [41] R. S. Sutton and A. G. Barto, Reinforcement Learning: An Introduction. MIT Press, 2018.
- [42] B. Vucetic and J. Yuan, Turbo Codes: Principles and Applications. Springer, 2001.
- [43] R. G. Gallager, “Low density parity check codes,” IRE Trans. Inf. Theory, vol. IT-8, no. 1, pp. 21-28, Jan. 1962.
- [44] D. E. Hocevar, “A reduced complexity decoder architecture via layered decoding of LDPC codes,” in Proc. IEEE Workshop Signal Process. Syst. (SiPS), Austin, TX, USA, Oct. 2004.
- [45] J. Hagenauer, E. Offer, and L. Papke, “Iterative decoding of binary block and convolutional codes,” IEEE Trans. Inf. Theory, vol. 42, no. 2, pp. 429-445, Mar. 1996.
- [46] A. Ma, Y. Zhou, C. Rush, D. Baron, and D. Needell, “An approximate message passing framework for side information,” IEEE Trans. Signal Process., vol. 67, no. 7, pp. 1875-1888, Apr. 2019.
- [47] B. Goektepe, S. Faehse, L. Thiele, T. Schierl, and C. Hellge, “Subcode-based early HARQ for 5G,” in Proc. IEEE Int. Conf. Commun. (ICC), Kansas City, MO, USA, May 2018.
- [48] 3GPP, “3GPP TS 36.211 version 15.3.0 Release 15,” Oct. 2018.
- [49] V. Satorras and M. Welling, “Neural enhanced belief propagation on factor graphs,” in Proc. AISTATS-21, pp. 685–693, Apr. 2021.
- [50] Y. Shen, Y. Shi, J. Zhang, and K. B. Letaief, “Graph neural networks for scalable radio resource management: architecture design and theoretical analysis,” IEEE J. Select. Areas Commun., vol. 39, no. 1, pp. 101–115, Jan. 2021.