∎
Tel.: +91-9584858734
22email: [email protected] 33institutetext: D. S. Gurjar 44institutetext: Department of Electronics and Communication Engineering, National Institute of Technology Silchar, Assam 788010, India
44email: [email protected]
Low-Complexity Interference Cancellation Algorithms for Detection in Media-based Modulated Uplink Massive-MIMO Systems
Abstract
Media-based modulation (MBM) is a novel modulation technique that can improve the spectral efficiency of the existing wireless systems. In MBM, multiple radio frequency (RF) mirrors are placed near the transmit antenna(s) and are switched ON/OFF to create different channel fade realizations. In such systems, additional information is conveyed through the ON/OFF status of RF mirrors along with conventional modulation symbols. A challenging task at the receiver is to detect the transmitted information symbols and extract the additional information from the channel fade realization used for transmission. In this paper, we consider a massive MIMO (mMIMO) system where each user relies on MBM for transmitting information to the base station, and investigate the problem of symbol detection at the base station. First, we propose a mirror activation pattern (MAP) selection based modified iterative sequential detection algorithm. With the proposed algorithm, the most favorable MAP is selected, followed by the detection of symbol corresponding to the selected MAP. Each solution is subjected to the reliability check before getting the update. Next, we introduce a favorable MAP search based iterative interference cancellation (KMAP-IIC) algorithm. In particular, a selection rule is introduced in KMAP-IIC for deciding the set of favorable MAPs over which iterative interference cancellation is performed, followed by a greedy update scheme for detecting the MBM symbols corresponding to each user. Simulation results show that the proposed detection algorithms exhibit superior performance-complexity trade-off over the existing detection techniques in MBM-mMIMO systems.
Keywords:
Media-based modulation RF mirrors massive MIMO iterative interference cancellation structured sparsity channel hardening1 Introduction
The explosive increase in the number of subscribers, the use of data thirsty applications, and ubiquitous computing for low latency applications pose a serious challenge towards the design of advanced communication techniques for 5G and beyond wireless systems. Over the last decade, different wireless techniques, such as non-orthogonal multiple access (NOMA), millimeter-wave (mm-Wave) communications, vehicle-to-everything (V2X) communications, massive MIMO (mMIMO), and machine learning in wireless networks, have been proposed in the literature to enhance the performance of the existing wireless systems r1b ; r1c ; r1a . Amongst these, mMIMO has been considered as a promising technique to satisfy the requirement of high data rate for 5G and beyond wireless systems r1 ; r2 ; r3 . In mMIMO, a large number of base station (BS) antennas are used to serve comparatively small number of single/multiple antenna users r1 ; r2 . One of the key advantages of such systems is that simple linear precoders and decoders can achieve near-optimal bit error rate (BER) performance which includes zero-forcing and minimum mean squared error detectors r1 ; r4 . Some of the key challenges in practical implementation of multiple antenna systems include inter channel interference, requirement of dedicated RF chains at each transmit antenna, and constraints on the total number of receive antennas. Index modulation is one such digital modulation technique proposed to overcome these challenging issues in MIMO systems r5 ; r5a . Through index modulation, extra information bits are embedded in the switching pattern of the building blocks along with the transmission of symbols selected from the conventional constellation set such as M-ary PSK or M-QAM r6 . This results in relaxing the need of all the available resources at the transmitter such as transmit antennas and RF chains r7 ; r8 . In conventional index modulation (IM) schemes, such as spatial modulation (SM) and generalised SM (GSM), only one or fewer antenna elements and RF chains are active which reduces the energy consumption as well as the inter channel interference thereby providing a higher energy efficiency. IM together with mMIMO r9 ; r10 has been evolved as an emerging technique for fulfilling the higher spectral as well as the higher energy efficiency requirements in beyond fifth-generation (B5G) wireless systems r6 . One of the key challenges in IM-mMIMO systems is the detection of the transmitted information which requires detection of the selected switching pattern and the detection of transmitted symbol.
Recently, media-based modulation (MBM) has been introduced as a potential IM scheme to enhance the spectral efficiency and the energy efficiency of the existing wireless systems by embedding information in different channel fade realizations r11 , r12 . These different end-to-end channel fade realizations are created by modifying the radio frequency (RF) properties of the propagation medium near to the transmitter r11 . To achieve these variations, multiple RF mirrors (parasitic elements), which are digitally controlled by the input data bits, are placed near the transmit antenna(s) r12 –Choc . The ON/OFF status of RF mirrors also referred to as mirror activation pattern (MAP) convey additional information bits along with the conventional modulation symbol. Through RF mirrors, MAPs can be generated. Each MAP results in an independent channel fade realization which is used by the transmitting antenna to transmit information symbol selected from a constellation set. The practical advantages of MBM systems have been demonstrated in r12 with 14 RF mirrors placed near a dipole transmit antenna. Moreover, the antenna design, radiation pattern, and potential advantages of MBM are discussed in r12 , r1111 . The use of MBM in mMIMO systems, which is referred as MBM-mMIMO, has been manifested to achieve significant improvements in terms of BER performance, and spectral efficiency r13 ; r14 over the existing modulation schemes such as SM and GSM r15 ; r16 ; r17 ; r18 ; r19 ; r20 . It is worth noting that, in MBM the throughput enhancement is linear with respect to the number of RF mirrors, whereas, in SM and GSM, the increase in throughput is logarithmic r13 . Therefore, MBM is being considered as an emerging spectral efficient IM scheme in B5G wireless systems. However, one of the major challenges in MBM-mMIMO systems is to detect the transmitted information symbol, and to extract the additional information conveyed through the selection of channel fade realization by each user, reliably with low computational complexity r13 ; r21 .
Optimal detection rule suggests an exhaustive search over the set of all the possible MBM symbol vector r13 ; r14 ; r21 , which is termed as maximum-likelihood (ML) detection. However, due to exponentially high computational complexity, ML detection is impractical in MBM-mMIMO systems r13 . It is due to the fact that the set of all the possible symbol vectors for each user is generated by using all the possible combinations of MAPs and constellation points which ultimately results in an exponential increase in the size of the search space for ML detection with respect to the number of transmit antennas and . Though, ZF/MMSE achieves near-optimal performance in mMIMO systems r1 , r22 ; r23 ; r24 ; r25 , their performance in MBM-mMIMO systems is sub-optimal which makes ZF/MMSE less selective for MBM-mMIMO systems r7 ; r8 . The sub-optimal BER performance of ZF/MMSE and exponentially high computational complexity of ML detection motivates for the design of low-complexity detection algorithms capable of achieving better BER performance in MBM-mMIMO systems.
Recently, inclusion-exclusion subspace pursuit (IESP) r13 and iterative interference cancellation (IIC) r14 algorithms have been proposed to achieve better BER performance over the conventional detection techniques such as MMSE and successive interference cancellation (SIC) r12 ; r14 ; r26 in MBM-mMIMO systems. However, the IESP algorithm r13 requires computation of pseudo inverse at multiple stages which is computationally expensive in MBM-mMIMO system due to large dimensional channel matrix. On the other hand, IIC algorithm r14 outperforms MMSE, SIC and IESP algorithms in terms of both the BER performance and the computational complexity. In IIC r14 , symbol vector transmitted by each user is detected by canceling interference from all the other users followed by an exhaustive search over the set of all the possible MAPs in an iterative manner. Although the computational complexity of IIC is less compared with MMSE, SIC and IESP algorithms, there is scope to reduce the computational complexity of IIC algorithm further by selecting a list of favorable MAPs for performing the search. In order to solve the detection problem in MBM-mMIMO systems, we propose two low-complexity detection schemes in this paper. First, we propose a MAP selection based iterative sequential detection (MAP-ISD) algorithm where the most favorable MAP is selected using a selection metric. The symbol corresponding to the selected MAP is detected sequentially for each user while nullifying the interference from all the other users. Next, we propose a favorable MAP search based iterative interference cancellation (KMAP-IIC) algorithm. In particular, most favorable MAPs are selected over which the search is performed for detecting the symbol corresponding to each user. The selection metric is obtained by exploiting the channel hardening which occurs in mMIMO systems r27 .
Our key contributions in this article are;
-
•
A technique for selection of favorable mirror activation pattern (MAP) for each user is proposed by utilizing channel hardening in mMIMO.
-
•
A low-complexity MAP-ISD algorithm is proposed for symbol detection in the MBM-mMIMO systems which utilizes the concept of favorable MAP and low-complexity ML search in sparse vectors.
-
•
The concept of reliability check of the solution in each iteration and stopping rule are utilized in the MAP-ISD algorithm to obtain better BER with low computational complexity.
-
•
Selection of favorable MAPs and low-complexity ML search are also integrated with IIC and proposed KMAP-IIC algorithm.
-
•
Simulation results on BER and computational complexity of the proposed algorithms are shown to validate superiority of the proposed algorithms over the existing algorithms.
Simulation results show that the proposed detection algorithms exhibit superior performance-complexity trade-off over the existing detection techniques such as MMSE, IESP, and IIC r13 ; r14 in MBM-mMIMO systems. It is also observed through simulations that the selection of a detection scheme between MAP-ISD and KMAP-IIC depends on the number of RF mirrors and the number of users in the system.
Notation: Boldface upper-case and lower-case letters denote matrices and column vectors, respectively. and represent matrix Hermitian and matrix-inversion, respectively. is the element of x. refers to identity matrix, denotes the element in row and column of A, and denotes column of A. denotes the quantization operation which maps the soft values to the nearest constellation point.
2 Background
In this section, we discuss the mathematical model of MBM-mMIMO system, and introduce the ML detection rule for optimal detection of symbols in such systems. We also shed light on the prohibitive computational complexity of ML detection in MBM-mMIMO systems. Finally, we provide the detailed description of ISD and IIC algorithms for detection in mMIMO systems and MBM-mMIMO systems, respectively.
Number of BS antennas | |
---|---|
Number of users | |
Number of RF mirrors | |
Number of mirror activation pattern (MAP) | |
Constellation set | |
MBM signal set for a single user | |
MBM signal set for user system | |
Number of iterations |
2.1 System model

We consider an mMIMO system with BS antennas and single antenna users ( for e.g., ). Each user employs MBM for transmission of information to the BS as depicted in Fig. 1. We also consider that each user is having RF mirrors placed near the antenna. Using MBM, the information is transmitted in two parts: 1. the mirror ON/OFF status, and 2. the conventional modulation symbol using the constellation set (e.g., 4-QAM, QPSK, 16-QAM). To switch mirrors ON/OFF, each user requires bits of incoming information, and therefore, there are ON/OFF combinations possible which are termed as MAPs. In a rich scattering environment, each MAP corresponds to an independent channel fade realization r11 ; r12 . After selection of an MAP, additional bits are transmitted through the antenna by selecting one symbol from the modulation alphabet . Therefore, the spectral efficiency of a multi-user MBM system in terms of bits per channel use (bpcu) can be mathematically given by
(1) |
Let, the channel state vector between the th MAP selected by -th user and the base station is represented by . Each , for all and , where is assumed to be independent and identically distributed (i.i.d.) complex Gaussian random variable with zero mean and unit variance i.e. . Therefore, the channel matrix comprising of channel vectors corresponding to all the possible MAPs for the -th user is . The MBM signal set for a single user can be defined as the set of all the possible transmit symbol vectors as
(2) |
where is an vector with only one non-zero entry corresponding to the th channel fade realization. For the -th user, let us denote the transmit symbol vector is denoted by . Thus, the received symbol vector at the BS after performing matched filtering and sampling operations can be written as
(3) |
where is an additive white Gaussian noise (AWGN) vector with . Further, for simplicity, we can rewrite the received symbol vector as
(4) |
where is an MBM-mMIMO channel matrix and is MBM-mMIMO transmit symbol vector comprising of transmit symbol vectors of all the users.
2.2 Maximum Likelihood Detection for MBM-mMIMO systems
The objective at the receiver is to extract the information embedded in the selection of MAP as well as detect the transmitted information symbol from the constellation set for realizing the potential benefits of MBM. An optimal detection rule termed as ML detection suggests an exhaustive search over all the possible combinations of the transmit symbol vector which minimize the ML cost, where ML cost associated with the symbol vector is given by
(5) | |||||
(6) |
Therefore, the ML detection problem given the received vector and the channel state information can be formulated as
(7) |
where is the set of all the possible combinations of . In MBM-mMIMO systems, for a given value of , and the dimensions of equals and the set contains possible combinations of for e.g., if and then for a 4-QAM modulated MBM-mMIMO systems the dimensions of is 128 () and the size of . Clearly, ML detection is unreasonable in such systems. Therefore, the design of low-complexity detection techniques is a challenging and a crucial problem for practical realization of MBM-mMIMO in the B5G wireless systems.
2.3 Iterative Sequential Detection for mMIMO Systems
In this section, we discuss the ISD algorithm proposed in r24 for detecting the transmitted information symbols in mMIMO systems. In ISD, symbols corresponding to each user are detected in a sequential manner. In each iteration of ISD, symbols corresponding to all the users are detected which are refined in next iterations. An initial solution is used to initialize the algorithm, which could be an all zero solution, i.e., for all . Next, for detection of symbol corresponding to the -th user in the -th iteration, interference from all the other users is cancelled as
(8) |
where and is the symbol corresponding to the -th user in the -th and the -th iterations, respectively. The residual error vector is then passed through a matched filter for detecting as
(9) |
where is the quantization operation which maps the soft values to the nearest constellation points. These steps are repeated for multiple iterations to obtain a better solution. It is worth noting that the detection of MBM symbols using the ISD algorithm directly is an inefficient way of detection due to the presence of MAPs. Moreover, selecting a reliable solution for each user and a proper stopping rule are required to avoid error propagation and terminate the algorithm early, respectively. Therefore, the selection of a reliable MAP and solution for each user is crucial for detecting the transmitted symbol in MBM-mMIMO systems. Also, the stopping rule will help in terminating the algorithm early, thereby saving the required computations. This motivates further modifications in ISD to detect symbols in MBM-mMIMO systems with low-complexity. Algorithm 1 presents the pseudo code of ISD algorithm for mMIMO detection.
2.4 Iterative Interference Cancellation Algorithm for MBM-mMIMO Systems
In this section, we discuss the IIC algorithm proposed in r14 . In IIC, the symbol detection corresponding to each user is a two step process. The algorithm starts with an all zero solution, i.e., . In the first step, the residual signal is obtained as
(10) | |||||
(11) |
where is the estimated MBM symbol vector of the -th user in -th iteration, and is the residual signal. is the interference cancellation vector for the -th user in the -th iteration. Next, a search is performed over the set of all the possible MBM symbol vectors for detecting the symbol vector corresponding to the th user as
(12) |
IIC algorithm is initialised with an all-zero solution. After performing these two steps for all the users, a greedy search is performed multiple times to update the solution for each user by using the selection metric given as
(13) |
These steps are performed for multiple iterations so that the algorithm converge to a better solution. The pseudo code of IIC algorithm is described in Algorithm 2.
The size of search space for each user in MBM-mMIMO is which grows exponentially with the number of RF mirrors and linearly with the size of constellation set used. To perform ML search for each user in a single iteration, it requires IIC to search over possible solutions. Therefore, the total search operations in performing ML search is . This makes the algorithm computationally expensive and motivates for further research in the algorithm to improve the practical feasibility of IIC in MBM-mMIMO systems.
3 Proposed Detection Algorithms
In this section, we discuss the proposed algorithms, namely, MAP-ISD algorithm and KMAP-IIC algorithm for MBM symbol detection in mMIMO systems.
3.1 MAP Selection based ISD
In this algorithm, we propose to modify the ISD algorithm r24 , which was originally proposed to detect the symbols in mMIMO systems. Here, we improvise the ISD algorithm for detecting MBM symbols corresponding to each user in MBM-mMIMO systems. In particular, we introduce a rule for selecting the most favorable MAP corresponding to each user from the list of all the possible MAPs in MBM-mMIMO system. For this, first, we utilize the concept of channel hardening, which occurs in mMIMO systems, and then find the pseudo-inverse of the individual channel matrices . The key idea for computing the pseudo-inverse is to find the highly erroneous locations by applying low-complexity zero-forcing over the residual vector (as discussed later in this section). The MAP corresponding to these erroneous locations are then explored for detecting the symbol transmitted by a particular user. Upon detection, the residual vector is updated accordingly.
3.1.1 Channel Hardening
3.1.2 Low-Complexity Pseudo-Inverse
Due to diagonal dominance, we can approximate the inverse of matrix by using matrix r16 as
(15) |
where is the diagonal matrix containing only the diagonal entries of . Therefore, the problem of finding pseudo-inverse in mMIMO systems r16 ; r17 ; r18 can be approximated by using a low-complexity approximation as
(16) |
It is worth noting that, the approximate inverse of matrix is computed only once for each user and requires the computational complexity of .
3.1.3 MAP Selection Rule
Next, we use the approximate pseudo-inverse obtained in Eq. (16) over the residual vector defined in Eq. 10 to obtain the favorable MAP as
(17) |
where and is the diagonal of the Gram matrix . From , we select the element having the largest magnitude value, i.e., for all and select as the index of the largest value which is nothing but the index of the most favorable MAP. The magnitude value of resembles the non-zero location in the transmitted symbol vector which can be mathematically analysed using Eq. (17). The vector can be simplified as
(18) | |||||
After incorporating the value of in Eq. (18) and further solving we get
(19) |
where and . Due to channel hardening and . Clearly, the vector reduces to a combination the transmitted symbol and the noise vector , i.e., . Obviously, the vector has only one non-zero location, and therefore, the magnitude for all have the maximum value corresponding to that non-zero location.
Finally, we decide the MBM symbol corresponding to the th user as
(20) |
where such that . The symbol for the th user is updated only if it results in the reduction of the norm of residual vector, i.e., if . Similarly, the symbol corresponding to each user is detected in a single iteration. The algorithm is run for multiple iterations say for refining the detected symbols and obtaining the minimum norm of residual vector. Algorithm 3 presents the pseudo code of the MAP-ISD algorithm for symbol detection in MBM-mMIMO systems.
3.2 -favorable MAP based IIC
In this section, we discuss the proposed KMAP-IIC algorithm for detecting symbols in MBM-mMIMO systems. Through selection of multiple favorable MAPs, the computational complexity of the existing IIC can be reduced significantly without compromising the BER performance (as discussed in Section 4). In the proposed algorithm, multiple favorable MAPs are selected using Eq. (17) and a list , of -favorable MAPs is generated. From , we select elements having largest magnitude value to update i.e. we sort for all in descending order, and select the indices of first element.
Next, we define the reduced size set of favorable MBM symbol vectors for the th user in the th iteration as
(21) |
After finding the list of favorable MAPs and the reduced size set of MBM symbol vectors, a search is performed over the set for all the users in order to determine the best candidate solution corresponding to each user. The solution in the set which minimizes the norm of residual vector is selected as the best candidate solution for the th user defined as
(22) |
Moreover, for a square- and rectangular-QAM constellation, a low-complexity search, proposed in r22 , is utilized in the proposed algorithm to reduce the computational complexity further. The real and imaginary parts of the estimated solution for square- and rectangular-QAM constellations can be expressed mathematically as
(23) |
where , and , and are the sizes two PAMs on the real and imaginary axis of the QAM constellation, respectively. Thus the best possible solution corresponding to the th MAP of the th user is r22 . This makes the search independent of the number of points in the constellation set, and therefore, reduces the computational complexity incurred during the detection.
The search for the best possible solution is followed by symbol update stage where symbol vectors corresponding to the selected user is updated. A greedy update strategy proposed in r8 is used which requires iterations to update the solution corresponding to several users in order to minimize the ML cost. In each iteration, the user for which the ML cost is selected by using
(24) |
and the solution corresponding to the selected user is updated. This update strategy is initiated only after completion of search over reduced size set for all the users. Algorithm 4 presents the pseudo code of the KMAP-IIC algorithm.
4 Simulation results
In this section, we present the simulation results of the proposed detection algorithms in terms of BER performance and the computational complexity for MBM-mMIMO systems. We also compare the BER performance of the proposed algorithms with the performance of MMSE detector r7 , IESP algorithm r7 and IIC algorithm r8 . We consider and MBM-mMIMO systems with , , and , respectively. In summary, Table 2 shows list of the parameters used in simulation of BER performance and computational complexity.
Figure | MBM-mMIMO System | Parameters Used |
---|---|---|
Fig. 2 | , , | 4-QAM, |
Fig. 3 | , , | 4-QAM, |
Fig. 4 | , , | 4-QAM, , |
Fig. 5 | , , | 4-QAM, , |
Fig. 6 | , , | 4-QAM, , |
Fig. 7 | , , | 4-QAM, , |
Fig. 8 | , , | 16-QAM, , |
Fig. 9 | , , | 16-QAM, , |
Fig. 10 | , | 4-QAM, , |
Fig. 11 | , , | 4-QAM, , , SNR = 5 dB |
Fig. 12 | , | 4-QAM, , , SNR = 5 dB |
4.1 Bit Error Rate Performance
In Figs. 2 and 3, we present the BER performance of MAP-ISD with different iterations and for mMIMO system, and mMIMO system, , respectively. It is observed that the BER performance of MAP-ISD improves with increase in the number of iterations and converges after . Significant improvement in BER performance is observed for increase in the value of from 1 to 2 and from 2 to 4 whereas marginal improvement is observed for further increase in the value of .



In Fig. 4, we simulate the BER performance of KMAP-IIC algorithm with different iterations and for mMIMO systems with 4-QAM, and MBM. Similar observations can be drawn which suggests that the BER performance of the KMAP-IIC algorithm converges for . Therefore, for comparison of BER of the proposed algorithms, i.e. MAP-ISD and KMAP-IIC, with other detection techniques (discussed later in the section) we use iterations.

In Fig. 5, we compare the BER performance of the proposed algorithms with other algorithms such as IIC, IESP and MMSE for mMIMO with 4-QAM, MBM system. For comparison of KMAP-IIC, we consider three different values for , i.e. , and . It is observed that, MAP-ISD and KMAP-IIC algorithms outperform the MMSE and the IESP algorithms. Moreover, the KMAP-IIC achieves BER performance close to within dB to that of the IIC algorithm with . For a target BER of , MAP-ISD achieves performance within 0.5 dB of the IIC algorithm. Therefore, due to significant low-computational complexity of MAP-ISD (discussed later in Section 4.2), it would be a better choice over other detection techniques with marginal loss in performance. Fig. 6 shows the comparison of BER for mMIMO with 4-QAM, MBM systems. It is observed that in contrast to Fig. 5, the BER performance gap between MAP-ISD and KMAP-IIC increases with increase in from 3 to 4. The key reason behind such performance degradation is the error propagation in interference cancellation of MAP-ISD which increases with increase in . It is interesting to note that, KMAP-IIC with achieves BER performance close to within 0.1 dB to that of IIC, KMAP-IIC with and KMAP-IIC with . Therefore, in MBM-mMIMO systems with moderate values of , KMAP-IIC with could be a better choice.

Fig. 7 presents the BER performance comparison for mMIMO with 4-QAM, MBM system. It is observed that the performance of KMAP-IIC with is same as that of the IIC algorithm. The performance of KMAP-IIC with and is close to within dB and dB, respectively, of the performance of IIC algorithm. However, the performance of MAP-ISD is far inferior as compared to the KMAP-IIC, IIC and IESP algorithms. Clearly, from Figs. 5, 6 and 7, the performance of MAP-ISD degrades as compared to the IIC algorithm which makes MAP-ISD less selective for systems having high values of . However, in such scenarios KMAP-IIC still performs up to mark. Therefore, from the aforementioned BER performance results, it can be concluded that the choice of low-complexity (discussed in next subsection) reasonable detection technique between MAP-ISD and KMAP-IIC depends significantly on the value of RF mirrors and the number of uplink users.



In Figs. 8 and 9, the BER performance comparison is performed for mMIMO system with and with 16-QAM modulation. Observations reveal that the proposed algorithms perform superior over the IESP algorithm. However, the performance of MAP-ISD and KMAP-IIC with degrades with an increase in as compared to KMAP-IIC with , KMAP-IIC with and IIC. It is also observed that KMAP-IIC with achieves performance close to KMAP-IIC with and IIC algorithms.
In Fig. 10, we present the BER performance with variation in the number of BS antennas from to for , and 4-QAM MBM-mMIMO system. It is observed that the BER performance improves with an increase in the BS antennas. Also, the performance of KMAP-IIC with different values of , i.e., , is close to that of the IIC algorithm. On the other hand, the performance of MAP-ISD is far from IIC. For example, for a target BER of , required BS antennas for IIC and KMAP-IIC are around , whereas MAP-ISD requires around BS antennas. Moreover, channel-hardening is not observed to degrade the performance compared to the IIC algorithm.

4.2 Computational Complexity
This section discusses the computational complexity of the proposed algorithms and compares them with the IIC algorithm r8 . First, we discuss the approximate computations involved in different steps of the IIC algorithm in Table 3 in terms of floating-point operations (FLOPs) r23 ,r24 . It is to note that the algorithms’ initialization does not require any computation due to all zero initial solutions.
Steps involved in IIC | Computational complexity |
---|---|
Interference cancellation | |
Performing ML search | |
Finding the solution using greedy search |
In Table 4 and 5, we present the computations required in different steps of the MAP-ISD and KMAP-IIC algorithms, respectively.
Steps involved in MAP-ISD | Computational complexity |
---|---|
Finding low-complexity matrix inverse (required only once) | |
Finding the most favorable MAP | |
Finding reliability of the solution |
Steps involved in KMAP-IIC | Computational complexity |
---|---|
Finding low-complexity matrix inverse (required only once) | |
Finding favorable MAPs | |
Performing low-complexity search | |
Finding the solution using greedy search |
It is observed from Tables 3, 4, and 5 that the computations in MAP-ISD are significantly less than that of IIC and KMAP-IIC algorithm, which is due to the complex search mechanism in IIC and KMAP-IIC algorithm. The computation of finding a low-complexity matrix inversion in MAP-ISD and KMAP-IIC is required only once. Therefore, the reduction in search space due to favorable MAP selection and low-complexity search are the key factors for the overall reduction in the proposed algorithms’ computational complexity. Fig. 11 presents the comparison of average number of FLOPs for different MBM-mMIMO systems at SNR= 5 dB. In Fig. 11, System 1 refers to mMIMO systems with , system 2 refers to mMIMO systems with and system 3 refers to mMIMO systems with . Observations reveal that KMAP-IIC with achieves significant computational gain of upto and for , and , systems, respectively. This gain increases further to and when MAP-ISD algorithm is used for , and , systems, respectively. It is clear from the figure that the computational complexity of MAP-ISD is significantly less as compared to the KMAP-IIC with , and . Therefore, in case of MBM-mMIMO systems with less value of , MAP-ISD is suitable over KMAP-IIC with and other algorithms. On the other hand for moderate values of KMAP-IIC with and can be used to achieve a reasonable BER performance.


In Fig. 12, we present the comparison on the average number of floating point operations (FLOPs) of the IIC algorithm with MAP-ISD and KMAP-IIC algorithms, respectively, with respect to the number of receive antennas for MBM-mMIMO system having users and at each user. Observation reveals that the computational complexity increase linearly with increase in the number of receive antennas at the station. It is also observed that the computational complexity increases with increase in . Furthermore, the complexity of MAP-ISD is significantly less compared with the KMAP-IIC algorithm and the IIC algorithm r8 .
5 Conclusion
We proposed low complexity interference cancellation based algorithms for symbol detection in MBM-mMIMO systems. First, we proposed a MAP selection based ISD algorithm which detects symbols in a sequential manner while nullifying interference from all other users. Then, we presented an approach to reduce the search space in the IIC algorithm and devised the KMAP-IIC algorithm. The key idea was to introduce a metric and a selection rule for selecting the list of the favorable MAPs in MBM corresponding to each user. The proposed algorithms achieve superior performance-complexity trade-off over the existing detection techniques in MBM-mMIMO systems. Observations reveal that when the number of users and the RF mirrors are comparatively less MAP-ISD algorithm achieves similar performance with almost and savings in computational complexity as compared to KMAP-IIC and IIC algorithm, respectively. However, with an increase in the number of users and the RF mirrors, KMAP-IIC delivers better BER performance over MAP-ISD with almost to savings in computational complexity for different value of over the IIC algorithm.
Acknowledgements.
This work is supported by the Start-up Research Grant (file no. SRG/2019/000654) scheme of Science and Engineering Research Board, Department of Science and Technology, Government of India.Conflict of interest
The authors declare that they have no conflict of interest.
References
- (1) Y. Sun et. al., “Application of Machine Learning in Wireless Networks: Key Techniques and Open Issues,” IEEE Communications Surveys and Tutorials, vol. 21, no. 4, pp. 3072-3108, 2019.
- (2) M. Chen et. al., “Artificial Neural Networks-Based Machine Learning for Wireless Networks: A Tutorial” IEEE Communications Surveys and Tutorials, vol. 21, no. 4, pp. 3039-3071, 2019.
- (3) M. Mandloi et. al. (Eds.), 5G and Beyond Wireless Systems: PHY Layer Perspective, Springer Series in Wireless Technology, Springer, Singapore, DOI: https://doi.org/10.1007/978-981-15-6390-4, 2020.
- (4) F. Rusek et al., “Scaling up MIMO: Opportunities and challenges with very large arrays,” IEEE Signal Processing Magazine, vol. 30, no. 1, pp. 40-60, Jan. 2013.
- (5) Lu Lu et al., “An overview of massive MIMO: Benefits and challenges,” IEEE Journal on Selected Topics in Signal Processing, vol. 8, no. 5, pp. 742-748, Oct. 2014.
- (6) E. G. Larsson et al., “Massive MIMO for next generation wireless systems,” IEEE Communications Magazine, vol. 52, no. 2, pp. 186-195, Feb. 2014.
- (7) S. Yang and L. Hanzo, “Fifty years of MIMO detection: The road to large-scale MIMOs,” IEEE Communications Survey & Tutorials, vol. 17, no. 4, pp. 1941-1988, 2015.
- (8) E. Basar, “Index modulation techniques for 5G wireless networks,” IEEE Commun. Mag., vol. 54, no. 7, pp. 168-175, July 2016.
- (9) E. Basar, “Reconfigurable Intelligent Surface-Based Index Modulation: A New Beyond MIMO Paradigm for 6G,” IEEE Transactions on Communications, vol. 68, no. 5, pp. 3187-3196, 2020.
- (10) M. Wen, X. Cheng, and L. Yang, “Index modulation for 5G wireless communications,” Springer, 2017.
- (11) R. Y. Mesleh, H. Haas, and S. Sinanovic, C. W. Ahn, S. Yun, “Spatial modulation,” IEEE Trans. Veh. Technol., vol. 57, no. 4, pp. 2228-2241, Jul. 2008.
- (12) A. Younis, N. Serafimovski, R. Mesleh, and H. Haas, “Generalised spatial modulation,” Proc. 44th Asilomar Conf. Signals Syst. Comput., pp. 1498-1502, 2011.
- (13) L. Lu, G. Y. Li, A. L. Swindlehurst, A. Ashikhmin, and R. Zhang, “An overview of massive MIMO: Benefits and challenges,” IEEE Jrnl on Selected Topics in Signal Processin, vol. 8, no. 5, pp. 742-758, 2014
- (14) F. Rusek, D. Presson, B. K. Lau, E. G. Larsson, T. L. Marzetta, O. Edfors, and F. Tufvesson, “Scaling up MIMO: Opportunities and challenges with very large arrays,” IEEE Signal Processing Magazine, vol. 30, no. 1, pp. 40-60, 2013.
- (15) A. K. Khandani, “Media-based modulation: A new approach to wireless transmission,” in 2013 IEEE International Symposium on Information Theory, July 2013, pp. 3050-3054.
- (16) E. Seifi, M. Atamanesh, and A. K. Khandani, “Media-based modulation: A new frontier in wireless communications,” arXiv preprint arXiv:1507.07516, 2015.
- (17) E. Basar, “Media-Based Modulation for Future Wireless Systems: A Tutorial,” IEEE Wireless Communications, vol. 26, no. 5, pp. 160-166, 2019.
- (18) Y. Naresh and A. Chockalingam, “Performance Analysis of Full-Duplex Decode-and-Forward Relaying With Media-Based Modulation,” IEEE Transactions on Vehicular Technology, vol. 68, no. 2, pp. 1510-1524, Feb. 2019.
- (19) B. Shamasundar and A. Chockalingam, “Media-based modulation for the uplink in massive MIMO systems,” IEEE Trans. on Vehicular Tech., vol. 67, no. 9, pp. 8169-8183, Sept. 2018.
- (20) L. Zhang, M. Zhao, and L. Li, “Low-complexity multi-user detection for MBM in uplink large-scale MIMO systems,” IEEE Commun. Letters, vol. 22, no. 8, pp. 1568-1571, Aug. 2018.
- (21) R. Y. Mesleh et al., “Spatial modulation,” IEEE Transactions on Vehicular Technology, vol. 57, no. 4, pp. 2228-2241, July 2008.
- (22) J. Jeganathan, A. Ghrayed, and L. Szczecinski, “Spatial modulation: Optimal detection and performance analysis,” IEEE Communications Letters, vol. 12, no. 8, pp. 545-547, Aug. 2008.
- (23) M. D. Renzo et al., “Spatial modulation for generalized MIMO: Challenges, opportunities, and implementation,” Proceedings of the IEEE, vol. 102, no. 1, pp. 56-103, Jan. 2014.
- (24) A. Younis et. al., “Generalized spatial modulation,” 2010 Conference Record for the Forty Fourth Asilomar Conference on Signals, Systems and Computers, Nov. 2010.
- (25) J. Wang, S. Jia, and J. Song, “Generalized spatial modulation system with multiple active transmit antennas and low complexity detection scheme,” IEEE Transactions on Wireless Communications, vol. 11, no. 4, pp. 1605-1615, April 2012.
- (26) T. L. Narasimhan, P. Raviteja, and A. Chockalingam, “Generalized spatial modulation in large-scale multiuser MIMO systems,” IEEE Transactions on Wireless Communications, vol. 17, no. 7, pp. 3764-3779, 2015.
- (27) Y. Naresh and A. Chockalingam, “On media-based modulation using RF mirrors,” IEEE Trans. on Vehicular Technology, vol. 66, no. 6, pp. 4967-4983, June 2017.
- (28) M. Wu et al., “Large-scale MIMO detection for 3GPP LTE: Algorithms and FPGA implementations,” IEEE Journal of Selected Topics in Signal Processing, vol. 8, no. 5, pp. 916-929, Oct. 2014.
- (29) C. Tang, C. Liu, and L. Yuan, “High precision low complexity matrix inversion based on Newton iteration for data detection in the massive MIMO,” IEEE Communications Letters, vol. 20, no. 3, pp.490-493, March 2016.
- (30) M. Mandloi and V. Bhatia, “Low-complexity near-optimal iterative sequential detection for uplink massive MIMO systems,” IEEE Communications Letters, vol. 21, no. 3, pp. 568-571, March 2017.
- (31) L. Dai et al., “Low complexity soft-output signal detection based on Gauss-Seidel method for uplink multiuser large-scale MIMO,” IEEE Transactions on Vehicular Technology, vol. 64, no. 10, pp. 4839-4845, Oct. 2015.
- (32) Y. Naresh and A. Chockalingam, “Performance analysis of media-based modulation with imperfect channel state information,” IEEE Trans. on Vehicular Technology, vol. 67, no. 5, pp. 4192-4207, May 2018.
- (33) T. L. Narasimhan and A. Chockalingam, “Channel hardening-exploiting message passing (CHEMPP) receiver in large-scale MIMO systems,” IEEE Journal of Selected Topics in Signal Processing, vol. 8, no. 5, pp. 847-860, 2014.
- (34) R. Rajashekar, K. V. S. Hari, and L. Hanzo, “Reduced-complexity ML detection and capacity-optimized training for spatial modulation systems,” IEEE Transactions on Communications, vol. 62, no. 1, pp. 112-125, Jan. 2014.
- (35) G. H. Van and C. F. Van Loan, Matrix computations, vol. 3, JHU Press, 2012.
- (36) A. Bjorck, Numerical methods for least square problems, Philadelphia, PA, USE:SIAM, 1996.