This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

11institutetext: M. Mandloi (Corresponding author) 22institutetext: Department of Electronics and Telecommunication Engineering, SVKM’s NMIMS (Deemed to be University) Shirpur campus, Maharashtra 425405, India
Tel.: +91-9584858734
22email: [email protected]
33institutetext: D. S. Gurjar 44institutetext: Department of Electronics and Communication Engineering, National Institute of Technology Silchar, Assam 788010, India
44email: [email protected]

Low-Complexity Interference Cancellation Algorithms for Detection in Media-based Modulated Uplink Massive-MIMO Systems

Manish Mandloi    Devendra Singh Gurjar
(Received: date / Accepted: date)
Abstract

Media-based modulation (MBM) is a novel modulation technique that can improve the spectral efficiency of the existing wireless systems. In MBM, multiple radio frequency (RF) mirrors are placed near the transmit antenna(s) and are switched ON/OFF to create different channel fade realizations. In such systems, additional information is conveyed through the ON/OFF status of RF mirrors along with conventional modulation symbols. A challenging task at the receiver is to detect the transmitted information symbols and extract the additional information from the channel fade realization used for transmission. In this paper, we consider a massive MIMO (mMIMO) system where each user relies on MBM for transmitting information to the base station, and investigate the problem of symbol detection at the base station. First, we propose a mirror activation pattern (MAP) selection based modified iterative sequential detection algorithm. With the proposed algorithm, the most favorable MAP is selected, followed by the detection of symbol corresponding to the selected MAP. Each solution is subjected to the reliability check before getting the update. Next, we introduce a KK favorable MAP search based iterative interference cancellation (KMAP-IIC) algorithm. In particular, a selection rule is introduced in KMAP-IIC for deciding the set of favorable MAPs over which iterative interference cancellation is performed, followed by a greedy update scheme for detecting the MBM symbols corresponding to each user. Simulation results show that the proposed detection algorithms exhibit superior performance-complexity trade-off over the existing detection techniques in MBM-mMIMO systems.

Keywords:
Media-based modulation RF mirrors massive MIMO iterative interference cancellation structured sparsity channel hardening

1 Introduction

The explosive increase in the number of subscribers, the use of data thirsty applications, and ubiquitous computing for low latency applications pose a serious challenge towards the design of advanced communication techniques for 5G and beyond wireless systems. Over the last decade, different wireless techniques, such as non-orthogonal multiple access (NOMA), millimeter-wave (mm-Wave) communications, vehicle-to-everything (V2X) communications, massive MIMO (mMIMO), and machine learning in wireless networks, have been proposed in the literature to enhance the performance of the existing wireless systems r1b ; r1c ; r1a . Amongst these, mMIMO has been considered as a promising technique to satisfy the requirement of high data rate for 5G and beyond wireless systems r1 ; r2 ; r3 . In mMIMO, a large number of base station (BS) antennas are used to serve comparatively small number of single/multiple antenna users r1 ; r2 . One of the key advantages of such systems is that simple linear precoders and decoders can achieve near-optimal bit error rate (BER) performance which includes zero-forcing and minimum mean squared error detectors r1 ; r4 . Some of the key challenges in practical implementation of multiple antenna systems include inter channel interference, requirement of dedicated RF chains at each transmit antenna, and constraints on the total number of receive antennas. Index modulation is one such digital modulation technique proposed to overcome these challenging issues in MIMO systems r5 ; r5a . Through index modulation, extra information bits are embedded in the switching pattern of the building blocks along with the transmission of symbols selected from the conventional constellation set such as M-ary PSK or M-QAM r6 . This results in relaxing the need of all the available resources at the transmitter such as transmit antennas and RF chains r7 ; r8 . In conventional index modulation (IM) schemes, such as spatial modulation (SM) and generalised SM (GSM), only one or fewer antenna elements and RF chains are active which reduces the energy consumption as well as the inter channel interference thereby providing a higher energy efficiency. IM together with mMIMO r9 ; r10 has been evolved as an emerging technique for fulfilling the higher spectral as well as the higher energy efficiency requirements in beyond fifth-generation (B5G) wireless systems r6 . One of the key challenges in IM-mMIMO systems is the detection of the transmitted information which requires detection of the selected switching pattern and the detection of transmitted symbol.
Recently, media-based modulation (MBM) has been introduced as a potential IM scheme to enhance the spectral efficiency and the energy efficiency of the existing wireless systems by embedding information in different channel fade realizations r11 , r12 . These different end-to-end channel fade realizations are created by modifying the radio frequency (RF) properties of the propagation medium near to the transmitter r11 . To achieve these variations, multiple RF mirrors (parasitic elements), which are digitally controlled by the input data bits, are placed near the transmit antenna(s) r12 Choc . The ON/OFF status of RF mirrors also referred to as mirror activation pattern (MAP) convey additional information bits along with the conventional modulation symbol. Through nrfn_{rf} RF mirrors, 2nrf2^{n_{rf}} MAPs can be generated. Each MAP results in an independent channel fade realization which is used by the transmitting antenna to transmit information symbol selected from a constellation set. The practical advantages of MBM systems have been demonstrated in r12 with 14 RF mirrors placed near a dipole transmit antenna. Moreover, the antenna design, radiation pattern, and potential advantages of MBM are discussed in r12 , r1111 . The use of MBM in mMIMO systems, which is referred as MBM-mMIMO, has been manifested to achieve significant improvements in terms of BER performance, and spectral efficiency r13 ; r14 over the existing modulation schemes such as SM and GSM r15 ; r16 ; r17 ; r18 ; r19 ; r20 . It is worth noting that, in MBM the throughput enhancement is linear with respect to the number of RF mirrors, whereas, in SM and GSM, the increase in throughput is logarithmic r13 . Therefore, MBM is being considered as an emerging spectral efficient IM scheme in B5G wireless systems. However, one of the major challenges in MBM-mMIMO systems is to detect the transmitted information symbol, and to extract the additional information conveyed through the selection of channel fade realization by each user, reliably with low computational complexity r13 ; r21 .
Optimal detection rule suggests an exhaustive search over the set of all the possible MBM symbol vector r13 ; r14 ; r21 , which is termed as maximum-likelihood (ML) detection. However, due to exponentially high computational complexity, ML detection is impractical in MBM-mMIMO systems r13 . It is due to the fact that the set of all the possible symbol vectors for each user is generated by using all the possible combinations of MAPs and constellation points which ultimately results in an exponential increase in the size of the search space for ML detection with respect to the number of transmit antennas and nrfn_{rf}. Though, ZF/MMSE achieves near-optimal performance in mMIMO systems r1 , r22 ; r23 ; r24 ; r25 , their performance in MBM-mMIMO systems is sub-optimal which makes ZF/MMSE less selective for MBM-mMIMO systems r7 ; r8 . The sub-optimal BER performance of ZF/MMSE and exponentially high computational complexity of ML detection motivates for the design of low-complexity detection algorithms capable of achieving better BER performance in MBM-mMIMO systems.
Recently, inclusion-exclusion subspace pursuit (IESP) r13 and iterative interference cancellation (IIC) r14 algorithms have been proposed to achieve better BER performance over the conventional detection techniques such as MMSE and successive interference cancellation (SIC) r12 ; r14 ; r26 in MBM-mMIMO systems. However, the IESP algorithm r13 requires computation of pseudo inverse at multiple stages which is computationally expensive in MBM-mMIMO system due to large dimensional channel matrix. On the other hand, IIC algorithm r14 outperforms MMSE, SIC and IESP algorithms in terms of both the BER performance and the computational complexity. In IIC r14 , symbol vector transmitted by each user is detected by canceling interference from all the other users followed by an exhaustive search over the set of all the possible MAPs in an iterative manner. Although the computational complexity of IIC is less compared with MMSE, SIC and IESP algorithms, there is scope to reduce the computational complexity of IIC algorithm further by selecting a list of favorable MAPs for performing the search. In order to solve the detection problem in MBM-mMIMO systems, we propose two low-complexity detection schemes in this paper. First, we propose a MAP selection based iterative sequential detection (MAP-ISD) algorithm where the most favorable MAP is selected using a selection metric. The symbol corresponding to the selected MAP is detected sequentially for each user while nullifying the interference from all the other users. Next, we propose a KK favorable MAP search based iterative interference cancellation (KMAP-IIC) algorithm. In particular, KK most favorable MAPs are selected over which the search is performed for detecting the symbol corresponding to each user. The selection metric is obtained by exploiting the channel hardening which occurs in mMIMO systems r27 .
Our key contributions in this article are;

  • A technique for selection of favorable mirror activation pattern (MAP) for each user is proposed by utilizing channel hardening in mMIMO.

  • A low-complexity MAP-ISD algorithm is proposed for symbol detection in the MBM-mMIMO systems which utilizes the concept of favorable MAP and low-complexity ML search in sparse vectors.

  • The concept of reliability check of the solution in each iteration and stopping rule are utilized in the MAP-ISD algorithm to obtain better BER with low computational complexity.

  • Selection of KK favorable MAPs and low-complexity ML search are also integrated with IIC and proposed KMAP-IIC algorithm.

  • Simulation results on BER and computational complexity of the proposed algorithms are shown to validate superiority of the proposed algorithms over the existing algorithms.

Simulation results show that the proposed detection algorithms exhibit superior performance-complexity trade-off over the existing detection techniques such as MMSE, IESP, and IIC r13 ; r14 in MBM-mMIMO systems. It is also observed through simulations that the selection of a detection scheme between MAP-ISD and KMAP-IIC depends on the number of RF mirrors and the number of users in the system.
Notation: Boldface upper-case and lower-case letters denote matrices and column vectors, respectively. ()H(\cdot)^{H} and ()1(\cdot)^{-1} represent matrix Hermitian and matrix-inversion, respectively. xix_{i} is the ithi^{th} element of x. IU\textbf{I}_{U} refers to U×UU\times U identity matrix, ai,ja_{i,j} denotes the element in ithi^{th} row and jthj^{th} column of A, and aj\textbf{a}_{j} denotes jthj^{th} column of A. 𝒬[]\mathcal{Q}[\cdot] denotes the quantization operation which maps the soft values to the nearest constellation point.

2 Background

In this section, we discuss the mathematical model of MBM-mMIMO system, and introduce the ML detection rule for optimal detection of symbols in such systems. We also shed light on the prohibitive computational complexity of ML detection in MBM-mMIMO systems. Finally, we provide the detailed description of ISD and IIC algorithms for detection in mMIMO systems and MBM-mMIMO systems, respectively.

Table 1: List of Notations
NrN_{r} Number of BS antennas
UU Number of users
nrfn_{rf} Number of RF mirrors
M=2nrfM=2^{n_{rf}} Number of mirror activation pattern (MAP)
𝔸\mathbb{A} Constellation set
𝕊MBM\mathbb{S}_{MBM} MBM signal set for a single user
𝕊MBMU\mathbb{S}_{MBM}^{U} MBM signal set for UU user system
LL Number of iterations

2.1 System model

Refer to caption
Figure 1: System model for MBM-mMIMO system.

We consider an Nr×UN_{r}\times U mMIMO system with NrN_{r} BS antennas and UU single antenna users (Nr>>UN_{r}>>U for e.g., Nr=128,U=16N_{r}=128,U=16 ). Each user employs MBM for transmission of information to the BS as depicted in Fig. 1. We also consider that each user is having nrfn_{rf} RF mirrors placed near the antenna. Using MBM, the information is transmitted in two parts: 1. the mirror ON/OFF status, and 2. the conventional modulation symbol using the constellation set 𝔸\mathbb{A} (e.g., 4-QAM, QPSK, 16-QAM). To switch mirrors ON/OFF, each user requires nrfn_{rf} bits of incoming information, and therefore, there are M=2nrfM=2^{n_{rf}} ON/OFF combinations possible which are termed as MAPs. In a rich scattering environment, each MAP corresponds to an independent channel fade realization r11 ; r12 . After selection of an MAP, log2|𝔸|\log_{2}{|{\mathbb{A}}|} additional bits are transmitted through the antenna by selecting one symbol from the modulation alphabet 𝔸\mathbb{A}. Therefore, the spectral efficiency of a multi-user MBM system in terms of bits per channel use (bpcu) can be mathematically given by

ηMBM=U(nrf+log2|𝔸|).\eta_{MBM}=U(n_{rf}+\log_{2}{|{\mathbb{A}}|}). (1)

Let, the channel state vector between the jjth MAP selected by kk-th user and the base station is represented by 𝐡kj\mathbf{h}^{j}_{k}. Each 𝐡kj=[h1,kj,h2,kj,,hNr,kj]Nr×1T\mathbf{h}^{j}_{k}=[h^{j}_{1,k},h^{j}_{2,k},\cdots,h^{j}_{N_{r},k}]_{N_{r}\times 1}^{T}, for all j=1,2,,Mj=1,2,\cdots,M and k=1,2,,Uk=1,2,\cdots,U, where hi,kjh^{j}_{i,k} is assumed to be independent and identically distributed (i.i.d.) complex Gaussian random variable with zero mean and unit variance i.e. 𝒞𝒩(0,1)\sim\mathcal{CN}(0,1). Therefore, the channel matrix comprising of channel vectors corresponding to all the possible MAPs for the kk-th user is 𝐇k=[𝐡k1,𝐡k2,,𝐡kM]\mathbf{H}_{k}=[\mathbf{h}^{1}_{k},\mathbf{h}^{2}_{k},\cdots,\mathbf{h}^{M}_{k}]. The MBM signal set for a single user can be defined as the set of all the possible transmit symbol vectors as

𝕊MBM={𝐬j,i:j=1,2,,M,i=1,2,,|𝔸|},\displaystyle\mathbb{S}_{MBM}=\{\mathbf{s}_{j,i}:j=1,2,\cdots,M,i=1,2,\cdots,|\mathbb{A}|\},
s.t.𝐬j,i=[0,,0,qijth coordinate,0,,0]T,qi𝔸,\displaystyle\text{s.t.}\ \ \mathbf{s}_{j,i}=[0,\cdots,0,\underbrace{q_{i}}_{j\text{th coordinate}},0,\cdots,0]^{T},q_{i}\in\mathbb{A}, (2)

where 𝐬j,i\mathbf{s}_{j,i} is an M×1M\times 1 vector with only one non-zero entry qi𝔸q_{i}\in\mathbb{A} corresponding to the jjth channel fade realization. For the kk-th user, let us denote the transmit symbol vector is denoted by 𝐱k𝕊MBM\mathbf{x}_{k}\in\mathbb{S}_{MBM}. Thus, the received symbol vector at the BS after performing matched filtering and sampling operations can be written as

𝐲=k=1U𝐇k𝐱k+𝐧,\mathbf{y}=\sum_{k=1}^{U}\mathbf{H}_{k}\mathbf{x}_{k}+\mathbf{n}, (3)

where 𝐧\mathbf{n} is an Nr×1N_{r}\times 1 additive white Gaussian noise (AWGN) vector with 𝐧𝒞𝒩(0,σ2𝐈Nr)\mathbf{n}\sim\mathcal{CN}(0,\sigma^{2}\mathbf{I}_{N_{r}}). Further, for simplicity, we can rewrite the received symbol vector as

𝐲=𝐇𝐱+𝐧,\mathbf{y}=\mathbf{H}\mathbf{x}+\mathbf{n}, (4)

where 𝐇=[𝐇1𝐇2𝐇U]\mathbf{H}=[\mathbf{H}_{1}\ \ \mathbf{H}_{2}\ \ \cdots\ \ \mathbf{H}_{U}] is an Nr×UMN_{r}\times UM MBM-mMIMO channel matrix and 𝐱=[𝐱1T𝐱2T𝐱UT]T\mathbf{x}=[\mathbf{x}_{1}^{T}\ \ \mathbf{x}_{2}^{T}\ \ \cdots\ \ \mathbf{x}_{U}^{T}]^{T} is UM×1UM\times 1 MBM-mMIMO transmit symbol vector comprising of transmit symbol vectors of all the users.

2.2 Maximum Likelihood Detection for MBM-mMIMO systems

The objective at the receiver is to extract the information embedded in the selection of MAP as well as detect the transmitted information symbol from the constellation set for realizing the potential benefits of MBM. An optimal detection rule termed as ML detection suggests an exhaustive search over all the possible combinations of the transmit symbol vector 𝐱\mathbf{x} which minimize the ML cost, where ML cost associated with the symbol vector 𝐱\mathbf{x} is given by

C(𝐱)\displaystyle C(\mathbf{x}) =\displaystyle= 𝐲𝐇𝐱2,\displaystyle\|\mathbf{y}-\mathbf{H}\mathbf{x}\|^{2}, (5)
=\displaystyle= 𝐲k=1U𝐇k𝐱k2.\displaystyle\|\mathbf{y}-\sum_{k=1}^{U}\mathbf{H}_{k}\mathbf{x}_{k}\|^{2}. (6)

Therefore, the ML detection problem given the received vector 𝐲\mathbf{y} and the channel state information 𝐇\mathbf{H} can be formulated as

𝐱^=argmin𝐱𝕊MBMU𝐲𝐇𝐱2.\hat{\mathbf{x}}=\arg\min_{\mathbf{x}\in\mathbb{S}^{U}_{MBM}}\|\mathbf{y}-\mathbf{H}\mathbf{x}\|^{2}. (7)

where 𝕊MBMU\mathbb{S}^{U}_{MBM} is the set of all the possible combinations of 𝐱\mathbf{x}. In MBM-mMIMO systems, for a given value of UU, MM and |𝔸||{\mathbb{A}}| the dimensions of 𝐱\mathbf{x} equals M×UM\times U and the set 𝕊MBMU\mathbb{S}^{U}_{MBM} contains (M×|𝔸|)U\left(M\times|{\mathbb{A}}|\right)^{U} possible combinations of 𝐱\mathbf{x} for e.g., if U=16U=16 and M=2nrf=8M=2^{n_{rf}}=8 then for a 4-QAM modulated MBM-mMIMO systems the dimensions of 𝐱\mathbf{x} is 128 (M×U=16×8=128M\times U=16\times 8=128) and the size of |𝕊MBMU|=32161.2×1024|\mathbb{S}^{U}_{MBM}|=32^{16}\approx 1.2\times 10^{24}. Clearly, ML detection is unreasonable in such systems. Therefore, the design of low-complexity detection techniques is a challenging and a crucial problem for practical realization of MBM-mMIMO in the B5G wireless systems.

2.3 Iterative Sequential Detection for mMIMO Systems

In this section, we discuss the ISD algorithm proposed in r24 for detecting the transmitted information symbols in mMIMO systems. In ISD, symbols corresponding to each user are detected in a sequential manner. In each iteration of ISD, symbols corresponding to all the users are detected which are refined in next iterations. An initial solution is used to initialize the algorithm, which could be an all zero solution, i.e., 𝐱^j0=0\hat{\mathbf{x}}_{j}^{0}=0 for all j=1,2,,Uj=1,2,\cdots,U. Next, for detection of symbol corresponding to the kk-th user in the tt-th iteration, interference from all the other users is cancelled as

𝐫k(t)=𝐲i=1k1𝐡i𝐱^i(t)i=k+1U𝐡i𝐱^i(t1),\mathbf{r}_{k}^{(t)}=\mathbf{y}-\sum_{i=1}^{k-1}\mathbf{h}_{i}\hat{\mathbf{x}}_{i}^{(t)}-\sum_{i=k+1}^{U}\mathbf{h}_{i}\hat{\mathbf{x}}_{i}^{(t-1)}, (8)

where 𝐱^it1\hat{\mathbf{x}}_{i}^{t-1} and 𝐱^it\hat{\mathbf{x}}_{i}^{t} is the symbol corresponding to the ii-th user in the (t1)(t-1)-th and the (t)(t)-th iterations, respectively. The residual error vector 𝐫k(t)\mathbf{r}_{k}^{(t)} is then passed through a matched filter for detecting 𝐱^it\hat{\mathbf{x}}_{i}^{t} as

𝐱^it=𝒬[𝐡iH𝐡i2𝐫k(t)],\hat{\mathbf{x}}_{i}^{t}=\mathcal{Q}\left[\frac{\mathbf{h}_{i}^{H}}{\|\mathbf{h}_{i}\|^{2}}\mathbf{r}_{k}^{(t)}\right], (9)

where 𝒬[]\mathcal{Q}[\cdot] is the quantization operation which maps the soft values to the nearest constellation points. These steps are repeated for multiple iterations to obtain a better solution. It is worth noting that the detection of MBM symbols using the ISD algorithm directly is an inefficient way of detection due to the presence of MAPs. Moreover, selecting a reliable solution for each user and a proper stopping rule are required to avoid error propagation and terminate the algorithm early, respectively. Therefore, the selection of a reliable MAP and solution for each user is crucial for detecting the transmitted symbol in MBM-mMIMO systems. Also, the stopping rule will help in terminating the algorithm early, thereby saving the required computations. This motivates further modifications in ISD to detect symbols in MBM-mMIMO systems with low-complexity. Algorithm 1 presents the pseudo code of ISD algorithm for mMIMO detection.

Algorithm 1 ISD Algorithm
1:Input: 𝐲{\mathbf{y}}, 𝐇{\mathbf{H}}, Nr,U,LN_{r},U,L
2:Initialization: 𝐱(0)=𝟎,𝐫(0)=𝐲,t=0(Iteration index)\mathbf{x}^{(0)}=\mathbf{0},\ \ \mathbf{r}^{(0)}=\mathbf{y},\ \ t=0\ \ (\text{Iteration index})
3:repeat
4:    𝐱^(t)=𝐱^(t1),𝐫(t)=𝐫(t1),t=t+1\hat{\mathbf{x}}^{(t)}=\hat{\mathbf{x}}^{(t-1)},\ \ \mathbf{r}^{(t)}=\mathbf{r}^{(t-1)},\ \ t=t+1
5:    for (j=1,++j,jU)(j=1,++j,j\leq U) do
6:         Compute : 𝐫k(t)=𝐲i=1k1𝐡i𝐱^i(t)i=k+1U𝐡i𝐱^i(t1)\mathbf{r}_{k}^{(t)}=\mathbf{y}-\sum_{i=1}^{k-1}\mathbf{h}_{i}\hat{\mathbf{x}}_{i}^{(t)}-\sum_{i=k+1}^{U}\mathbf{h}_{i}\hat{\mathbf{x}}_{i}^{(t-1)}
7:         Compute : zi=𝐡iH𝐡i2𝐫k(t)z_{i}=\frac{\mathbf{h}_{i}^{H}}{\|\mathbf{h}_{i}\|^{2}}\mathbf{r}_{k}^{(t)}
8:         Update the symbol for iith user as : 𝐱^it=𝒬[𝐳i]\hat{\mathbf{x}}_{i}^{t}=\mathcal{Q}\left[\mathbf{z}_{i}\right]
9:    end for
10:until t=Lt=L (terminate the iterative processing)
11:Output:𝐱^L\hat{{\mathbf{x}}}_{L}

2.4 Iterative Interference Cancellation Algorithm for MBM-mMIMO Systems

In this section, we discuss the IIC algorithm proposed in r14 . In IIC, the symbol detection corresponding to each user is a two step process. The algorithm starts with an all zero solution, i.e., 𝐱^i(0)=0\hat{\mathbf{x}}_{i}^{(0)}=0 i=1,2,,U\forall i=1,2,\cdots,U. In the first step, the residual signal is obtained as

𝐫(t)\displaystyle\mathbf{r}^{(t)} =\displaystyle= 𝐲i=1U𝐇i𝐱^i(t),\displaystyle\mathbf{y}-\sum_{i=1}^{U}\mathbf{H}_{i}\hat{\mathbf{x}}_{i}^{(t)}, (10)
𝐲j(t)\displaystyle\mathbf{y}_{j}^{(t)} =\displaystyle= 𝐫(t)+𝐇j𝐱^j(t)\displaystyle\mathbf{r}^{(t)}+\mathbf{H}_{j}\hat{\mathbf{x}}_{j}^{(t)} (11)

where 𝐱^i(t1)\hat{\mathbf{x}}_{i}^{(t-1)} is the estimated MBM symbol vector of the ii-th user in (t1)(t-1)-th iteration, and 𝐫(t)\mathbf{r}^{(t)} is the residual signal. 𝐲j(t)\mathbf{y}_{j}^{(t)} is the interference cancellation vector for the jj-th user in the tt-th iteration. Next, a search is performed over the set of all the possible MBM symbol vectors for detecting the symbol vector corresponding to the jjth user as

𝐬^j(t)=argmin𝐬j𝕊MBM𝐲j(t)𝐇j𝐬j2.\hat{\mathbf{s}}_{j}^{(t)}=\arg\min_{\mathbf{s}_{j}\in\mathbb{S}_{MBM}}\|{\mathbf{y}_{j}^{(t)}-\mathbf{H}_{j}\mathbf{s}_{j}}\|^{2}. (12)

IIC algorithm is initialised with an all-zero solution. After performing these two steps for all the users, a greedy search is performed multiple times to update the solution for each user by using the selection metric given as

u=argmink=1,,U𝐫(t)+𝐇j(𝐬^j(t)𝐱^i(t))2.u=\arg\min_{k=1,\cdots,U}\|{\mathbf{r}^{(t)}+\mathbf{H}_{j}(\hat{\mathbf{s}}_{j}^{(t)}-\hat{\mathbf{x}}_{i}^{(t)})}\|^{2}. (13)

These steps are performed for multiple iterations so that the algorithm converge to a better solution. The pseudo code of IIC algorithm is described in Algorithm 2.

Algorithm 2 IIC Algorithm
1:Input: 𝐲{\mathbf{y}}, 𝐇{\mathbf{H}}, Nr,U,nrf,LN_{r},U,n_{rf},L
2:Initialization: 𝐱(0)=𝟎(Symbol estimation),𝐫(0)=𝐲(Residual signal),𝐖i,i=1,2,,U,t=0(Iteration index)\mathbf{x}^{(0)}=\mathbf{0}\ \ (\text{Symbol estimation}),\mathbf{r}^{(0)}=\mathbf{y}\ \ (\text{Residual signal}),\mathbf{W}_{i},\forall i=1,2,\cdots,U,\ t=0\ \ (\text{Iteration index})
3:repeat
4:    𝐱^(t)=𝐱^(t1),𝐫(t)=𝐫(t1),t=t+1\hat{\mathbf{x}}^{(t)}=\hat{\mathbf{x}}^{(t-1)},\mathbf{r}^{(t)}=\mathbf{r}^{(t-1)},\ \ t=t+1
5:    for (j=1,++j,jU)(j=1,++j,j\leq U) do
6:         Apply interference cancellation for the jj-th user as: 𝐲j(t)=𝐫(t)+𝐇j𝐱^j(t)\mathbf{y}_{j}^{(t)}=\mathbf{r}^{(t)}+\mathbf{H}_{j}\hat{\mathbf{x}}_{j}^{(t)}
7:         Perform ML search for the jj-th user as: 𝐬^j(t)=argmin𝐬j𝕊MBM𝐲j(t)𝐇j𝐬j2\hat{\mathbf{s}}_{j}^{(t)}=\arg\min_{\mathbf{s}_{j}\in\mathbb{S}_{MBM}}\|{\mathbf{y}_{j}^{(t)}-\mathbf{H}_{j}\mathbf{s}_{j}}\|^{2}
8:    end for
9:    for (j=1,++j,jU)(j=1,++j,j\leq U) do
10:         Select the first element of u=argmink=1,,U𝐫(t)+𝐇j(𝐬^j(t)𝐱^i(t))2u=\arg\min_{k=1,\cdots,U}\|{\mathbf{r}^{(t)}+\mathbf{H}_{j}(\hat{\mathbf{s}}_{j}^{(t)}-\hat{\mathbf{x}}_{i}^{(t)})}\|^{2}
11:         if 𝐫(t)2>𝐫(t)+𝐇u(𝐱^u(t)𝐬^u(t))2\|\mathbf{r}^{(t)}\|^{2}>\|\mathbf{r}^{(t)}+\mathbf{H}_{u}(\hat{\mathbf{x}}_{u}^{(t)}-\hat{\mathbf{s}}_{u}^{(t)})\|^{2} then
12:             Update the residual error vector as 𝐫(t)=𝐫(t)+𝐇u(𝐱^u(t)𝐬^u(t))\mathbf{r}^{(t)}=\mathbf{r}^{(t)}+\mathbf{H}_{u}(\hat{\mathbf{x}}_{u}^{(t)}-\hat{\mathbf{s}}_{u}^{(t)})
13:             Update the symbol vector for vvth user as 𝐱^u(t)=𝐬^u(t)\hat{\mathbf{x}}_{u}^{(t)}=\hat{\mathbf{s}}_{u}^{(t)}
14:         else
15:             break 
16:         end if
17:    end for
18:until 𝐱^(t)=𝐱^(t1)\hat{\mathbf{x}}^{(t)}=\hat{\mathbf{x}}^{(t-1)} or t=Lt=L (terminate the iterative processing or if no update in the solution)
19:𝐱^=𝐱^(t)\hat{\mathbf{x}}=\hat{\mathbf{x}}^{(t)}
20:Output:𝐱^\hat{{\mathbf{x}}}

The size of search space 𝕊MBM\mathbb{S}_{MBM} for each user in MBM-mMIMO is (M×|𝔸|)\left(M\times|\mathbb{A}|\right) which grows exponentially with the number of RF mirrors and linearly with the size of constellation set used. To perform ML search for each user in a single iteration, it requires IIC to search over M×|𝔸|M\times|\mathbb{A}| possible solutions. Therefore, the total search operations in performing ML search is (M×|𝔸|)UL\left(M\times|\mathbb{A}|\right)UL. This makes the algorithm computationally expensive and motivates for further research in the algorithm to improve the practical feasibility of IIC in MBM-mMIMO systems.

3 Proposed Detection Algorithms

In this section, we discuss the proposed algorithms, namely, MAP-ISD algorithm and KMAP-IIC algorithm for MBM symbol detection in mMIMO systems.

3.1 MAP Selection based ISD

In this algorithm, we propose to modify the ISD algorithm r24 , which was originally proposed to detect the symbols in mMIMO systems. Here, we improvise the ISD algorithm for detecting MBM symbols corresponding to each user in MBM-mMIMO systems. In particular, we introduce a rule for selecting the most favorable MAP corresponding to each user from the list of all the possible MAPs in MBM-mMIMO system. For this, first, we utilize the concept of channel hardening, which occurs in mMIMO systems, and then find the pseudo-inverse of the individual channel matrices 𝐇k\mathbf{H}_{k}. The key idea for computing the pseudo-inverse is to find the highly erroneous locations by applying low-complexity zero-forcing over the residual vector (as discussed later in this section). The MAP corresponding to these erroneous locations are then explored for detecting the symbol transmitted by a particular user. Upon detection, the residual vector is updated accordingly.

3.1.1 Channel Hardening

In mMIMO systems, due to a large number of receive antennas as compared to the number of users, the Gram matrix, 𝐆=𝐇H𝐇\mathbf{G}=\mathbf{H}^{H}\mathbf{H}, becomes diagonal dominant which is a consequence of channel hardening r1 ; r27 . Mathematically, it can be expressed as

𝐡iT𝐡jNr0,ij,i,j{1,2,,UM},\frac{\mathbf{h}_{i}^{T}\mathbf{h}_{j}}{N_{r}}\rightarrow 0,\quad\forall i\neq j,~{}~{}i,j\in\left\{{1,2,\ldots,UM}\right\}, (14)

where 𝐡j\mathbf{h}_{j} is the jjth column of channel gain matrix 𝐇\mathbf{H}.

3.1.2 Low-Complexity Pseudo-Inverse

Due to diagonal dominance, we can approximate the inverse of matrix 𝐆\mathbf{G} by using matrix 𝐃\mathbf{D} r16 as

𝐆1𝐃1,\mathbf{G}^{-1}\approx\mathbf{D}^{-1}, (15)

where 𝐃\mathbf{D} is the diagonal matrix containing only the diagonal entries of 𝐆\mathbf{G}. Therefore, the problem of finding pseudo-inverse in mMIMO systems r16 ; r17 ; r18 can be approximated by using a low-complexity approximation as

(𝐇H𝐇)1𝐇H=𝐆1𝐇H𝐃1𝐇H.(\mathbf{H}^{H}\mathbf{H})^{-1}\mathbf{H}^{H}=\mathbf{G}^{-1}\mathbf{H}^{H}\approx\mathbf{D}^{-1}\mathbf{H}^{H}. (16)

It is worth noting that, the approximate inverse of matrix 𝐆\mathbf{G} is computed only once for each user and requires the computational complexity of 𝒪(MNr)\mathcal{O}(MN_{r}).

3.1.3 MAP Selection Rule

Next, we use the approximate pseudo-inverse obtained in Eq. (16) over the residual vector defined in Eq. 10 to obtain the favorable MAP as

𝐞j(t)=𝐖j(𝐲i=1,ijU𝐇i𝐱^i(t1)).\mathbf{e}_{j}^{(t)}=\mathbf{W}_{j}\left(\mathbf{y}-\sum_{i=1,i\neq j}^{U}\mathbf{H}_{i}\hat{\mathbf{x}}_{i}^{(t-1)}\right). (17)

where 𝐖j=𝐃j1𝐇jH\mathbf{W}_{j}=\mathbf{D}^{-1}_{j}\mathbf{H}_{j}^{H} and 𝐃j\mathbf{D}_{j} is the diagonal of the Gram matrix 𝐇jH𝐇j\mathbf{H}_{j}^{H}\mathbf{H}_{j}. From 𝐞j(t)\mathbf{e}_{j}^{(t)}, we select the element having the largest magnitude value, i.e., |ej,i(t)||{e}_{j,i}^{(t)}| for all i=1,2,,Mi=1,2,\cdots,M and select kk as the index of the largest value which is nothing but the index of the most favorable MAP. The magnitude value of |ej,i(t)||{e}_{j,i}^{(t)}| resembles the non-zero location in the transmitted symbol vector 𝐱j\mathbf{x}_{j} which can be mathematically analysed using Eq. (17). The vector 𝐞j(t)\mathbf{e}_{j}^{(t)} can be simplified as

𝐞j(t)\displaystyle\mathbf{e}_{j}^{(t)} =\displaystyle= 𝐖j(𝐇j𝐱j+i=1,ijU𝐇i𝐱i+𝐧i=1,ijU𝐇i𝐱^i(t1))\displaystyle\mathbf{W}_{j}\left(\mathbf{H}_{j}\mathbf{x}_{j}+\sum_{i=1,i\neq j}^{U}\mathbf{H}_{i}\mathbf{x}_{i}+\mathbf{n}-\sum_{i=1,i\neq j}^{U}\mathbf{H}_{i}\hat{\mathbf{x}}_{i}^{(t-1)}\right) (18)
=\displaystyle= 𝐖j𝐇j𝐱j+i=1,ijU𝐖j𝐇i(𝐱i𝐱^i(t1))+𝐖j𝐧.\displaystyle\mathbf{W}_{j}\mathbf{H}_{j}\mathbf{x}_{j}+\sum_{i=1,i\neq j}^{U}\mathbf{W}_{j}\mathbf{H}_{i}\left(\mathbf{x}_{i}-\hat{\mathbf{x}}_{i}^{(t-1)}\right)+\mathbf{W}_{j}\mathbf{n}.

After incorporating the value of 𝐖j\mathbf{W}_{j} in Eq. (18) and further solving we get

=\displaystyle= 𝐃j1𝐆j𝐱j+i=1,ijU𝐃j1𝐆ji(𝐱i𝐱^i(t1))+𝐧~,\displaystyle\mathbf{D}^{-1}_{j}\mathbf{G}_{j}\mathbf{x}_{j}+\sum_{i=1,i\neq j}^{U}\mathbf{D}^{-1}_{j}\mathbf{G}{ji}\left(\mathbf{x}_{i}-\hat{\mathbf{x}}_{i}^{(t-1)}\right)+\widetilde{\mathbf{n}}, (19)

where 𝐧~=𝐃j1𝐇jH𝐧\widetilde{\mathbf{n}}=\mathbf{D}^{-1}_{j}\mathbf{H}_{j}^{H}\mathbf{n} and 𝐆ji=𝐇jH𝐇i\mathbf{G}_{ji}=\mathbf{H}_{j}^{H}\mathbf{H}_{i}. Due to channel hardening 𝐃j1𝐆j𝐈\mathbf{D}^{-1}_{j}\mathbf{G}_{j}\approx\mathbf{I} and 𝐃j1𝐆ji𝐎\mathbf{D}^{-1}_{j}\mathbf{G}{ji}\approx\mathbf{O}. Clearly, the vector 𝐞j(t)\mathbf{e}_{j}^{(t)} reduces to a combination the transmitted symbol 𝐱j\mathbf{x}_{j} and the noise vector 𝐧~\widetilde{\mathbf{n}}, i.e., 𝐞j(t)=𝐱j+𝐧~\mathbf{e}_{j}^{(t)}=\mathbf{x}_{j}+\widetilde{\mathbf{n}}. Obviously, the vector 𝐱j\mathbf{x}_{j} has only one non-zero location, and therefore, the magnitude |ej,i(t)||{e}_{j,i}^{(t)}| for all i=1,2,,Mi=1,2,\cdots,M have the maximum value corresponding to that non-zero location.
Finally, we decide the MBM symbol corresponding to the jjth user as

𝐬^j(t)=[0,,0,βkth coordinate,0,,0]T\hat{\mathbf{s}}_{j}^{(t)}=[0,\cdots,0,\underbrace{\beta}_{k\text{th coordinate}},0,\cdots,0]^{T} (20)

where β=𝒬[ej,k]\beta=\mathcal{Q}[{e}_{j,k}] such that β𝔸\beta\in\mathbb{A}. The symbol for the jjth user is updated only if it results in the reduction of the norm of residual vector, i.e., 𝐱^j(t)=𝐬^j(t)\hat{\mathbf{x}}_{j}^{(t)}=\hat{\mathbf{s}}_{j}^{(t)} if 𝐫(t)2>𝐫(t)+𝐇j(𝐱^j(t1)𝐬^j(t))2\|\mathbf{r}^{(t)}\|^{2}>\|\mathbf{r}^{(t)}+\mathbf{H}_{j}(\hat{\mathbf{x}}_{j}^{(t-1)}-\hat{\mathbf{s}}_{j}^{(t)})\|^{2}. Similarly, the symbol corresponding to each user is detected in a single iteration. The algorithm is run for multiple iterations say LL for refining the detected symbols and obtaining the minimum norm of residual vector. Algorithm 3 presents the pseudo code of the MAP-ISD algorithm for symbol detection in MBM-mMIMO systems.

Algorithm 3 MAP-ISD Algorithm
1:Input: 𝐲{\mathbf{y}}, 𝐇{\mathbf{H}}, Nr,U,nrf,LN_{r},U,n_{rf},L
2:Initialization: 𝐱(0)=𝟎,𝐫(0)=𝐲,𝐖i,i=1,2,,U,t=0(Iteration index)\mathbf{x}^{(0)}=\mathbf{0},\mathbf{r}^{(0)}=\mathbf{y},\mathbf{W}_{i},\forall i=1,2,\cdots,U,\ \ t=0\ \ (\text{Iteration index})
3:repeat
4:    𝐱^(t)=𝐱^(t1),𝐫(t)=𝐫(t1),t=t+1\hat{\mathbf{x}}^{(t)}=\hat{\mathbf{x}}^{(t-1)},\mathbf{r}^{(t)}=\mathbf{r}^{(t-1)},\ \ t=t+1
5:    for (j=1,++j,jU)(j=1,++j,j\leq U) do
6:         Compute : 𝐞j=𝐖j(𝐫(t)+𝐇j𝐱^j(t1))\mathbf{e}_{j}=\mathbf{W}_{j}(\mathbf{r}^{(t)}+\mathbf{H}_{j}\hat{\mathbf{x}}_{j}^{(t-1)})
7:         Find the element having largest |ej,i(t)||{e}_{j,i}^{(t)}| for all i=1,2,,Mi=1,2,\cdots,M
8:         Find the MBM symbol for the jjth user as: 𝐬^j(t)=[0,,0,βkth coordinate,0,,0]T\hat{\mathbf{s}}_{j}^{(t)}=[0,\cdots,0,\underbrace{\beta}_{k\text{th coordinate}},0,\cdots,0]^{T} where β=𝒬[ej,k]\beta=\mathcal{Q}[{e}_{j,k}]
9:         if 𝐫(t)2>𝐫(t)+𝐇j(𝐱^j(t1)𝐬^j(t))2\|\mathbf{r}^{(t)}\|^{2}>\|\mathbf{r}^{(t)}+\mathbf{H}_{j}(\hat{\mathbf{x}}_{j}^{(t-1)}-\hat{\mathbf{s}}_{j}^{(t)})\|^{2} then
10:             Update the residual vector as 𝐫(t)=𝐫(t)+𝐇j(𝐱^j(t1)𝐬^j(t))\mathbf{r}^{(t)}=\mathbf{r}^{(t)}+\mathbf{H}_{j}(\hat{\mathbf{x}}_{j}^{(t-1)}-\hat{\mathbf{s}}_{j}^{(t)})
11:             Update the symbol vector for jjth user as 𝐱^j(t)=𝐬^j(t)\hat{\mathbf{x}}_{j}^{(t)}=\hat{\mathbf{s}}_{j}^{(t)}
12:         end if
13:    end for
14:until 𝐱^(t)=𝐱^(t1)\hat{\mathbf{x}}^{(t)}=\hat{\mathbf{x}}^{(t-1)} or t=Lt=L (terminate the iterative processing or if no update in the solution)
15:Output:𝐱^t\hat{{\mathbf{x}}}_{t}

3.2 KK-favorable MAP based IIC

In this section, we discuss the proposed KMAP-IIC algorithm for detecting symbols in MBM-mMIMO systems. Through selection of multiple favorable MAPs, the computational complexity of the existing IIC can be reduced significantly without compromising the BER performance (as discussed in Section 4). In the proposed algorithm, multiple favorable MAPs are selected using Eq. (17) and a list 𝕃j(t),j=1,2,,U\mathbb{L}_{j}^{(t)},\ \forall j=1,2,\cdots,U, of KK-favorable MAPs is generated. From 𝐞j(t)\mathbf{e}_{j}^{(t)}, we select KK elements having largest magnitude value to update 𝕃j(t)\mathbb{L}_{j}^{(t)} i.e. we sort |ej,i(t)||{e}_{j,i}^{(t)}| for all i=1,2,,Mi=1,2,\cdots,M in descending order, and select the indices of first KK element.
Next, we define the reduced size set 𝕊~MBMj,(t)\tilde{\mathbb{S}}_{MBM}^{j,(t)} of favorable MBM symbol vectors for the jjth user in the ttth iteration as

𝕊~MBMj,(t)={𝐬k,i𝔸0:k=𝕃j(t)(1),𝕃j(t)(2),,𝕃j(t)(K),\displaystyle\tilde{\mathbb{S}}_{MBM}^{j,(t)}=\{\mathbf{s}_{k,i}\in\mathbb{A}_{0}:k=\mathbb{L}_{j}^{(t)}(1),\mathbb{L}_{j}^{(t)}(2),\cdots,\mathbb{L}_{j}^{(t)}(K),
i=1,2,,|𝔸|}\displaystyle i=1,2,\cdots,|\mathbb{A}|\}
s.t.𝐬k,i=[0,,0,αikth coordinate,0,,0]T,αi𝔸.\displaystyle\text{s.t.}\ \ \mathbf{s}_{k,i}=[0,\cdots,0,\underbrace{\alpha_{i}}_{k\text{th coordinate}},0,\cdots,0]^{T},\alpha_{i}\in\mathbb{A}. (21)

After finding the list of favorable MAPs and the reduced size set of MBM symbol vectors, a search is performed over the set 𝕊~MBMj,(t)\tilde{\mathbb{S}}_{MBM}^{j,(t)} for all the users in order to determine the best candidate solution corresponding to each user. The solution in the set 𝕊~MBMj,(t)\tilde{\mathbb{S}}_{MBM}^{j,(t)} which minimizes the norm of residual vector is selected as the best candidate solution for the jjth user defined as

𝐬^j(t)=argmin𝐬~q𝕊~MBMj,(t)𝐫j(t)𝐇j𝐬~q2.\hat{\mathbf{s}}_{j}^{(t)}=\arg\min_{\tilde{\mathbf{s}}_{q}\in\tilde{\mathbb{S}}_{MBM}^{j,(t)}}\|{\mathbf{r}_{j}^{(t)}-\mathbf{H}_{j}\tilde{\mathbf{s}}_{q}}\|^{2}. (22)

Moreover, for a square- and rectangular-QAM constellation, a low-complexity search, proposed in r22 , is utilized in the proposed algorithm to reduce the computational complexity further. The real and imaginary parts of the estimated solution for square- and rectangular-QAM constellations can be expressed mathematically as

(𝐬^l)=min[max(2m1+121,N1+1),N11],\displaystyle\Re(\hat{\mathbf{s}}_{l})=\min\left[\max\left(2\lfloor\frac{m_{1}+1}{2}\rceil-1,-N_{1}+1\right),N_{1}-1\right],
(𝐬^l)=min[max(2m2+121,N2+1),N21],\displaystyle\Im(\hat{\mathbf{s}}_{l})=\min\left[\max\left(2\lfloor\frac{m_{2}+1}{2}\rceil-1,-N_{2}+1\right),N_{2}-1\right], (23)

where m1=(zl)m_{1}=\Re({z}_{l}), m2=(zl)m_{2}=\Im({z}_{l}) and zl=𝐡j,lH𝐫j(t)𝐡j,l2z_{l}=\frac{\mathbf{h}_{j,l}^{H}\mathbf{r}_{j}^{(t)}}{\|\mathbf{h}_{j,l}\|^{2}}, and N1,N2N_{1},N_{2} are the sizes two PAMs on the real and imaginary axis of the QAM constellation, respectively. Thus the best possible solution corresponding to the llth MAP of the jjth user is 𝐬^l=(𝐬^l)+i(𝐬^l)\hat{\mathbf{s}}_{l}=\Re(\hat{\mathbf{s}}_{l})+i\Im(\hat{\mathbf{s}}_{l}) r22 . This makes the search independent of the number of points in the constellation set, and therefore, reduces the computational complexity incurred during the detection.
The search for the best possible solution is followed by symbol update stage where symbol vectors corresponding to the selected user is updated. A greedy update strategy proposed in r8 is used which requires UU iterations to update the solution corresponding to several users in order to minimize the ML cost. In each iteration, the user for which the ML cost is selected by using

v=argmini=1,2,,U𝐫(t)+𝐇i(𝐱^i(t)𝐬^i(t))2,v=\arg\min_{i=1,2,\cdots,U}\|\mathbf{r}^{(t)}+\mathbf{H}_{i}(\hat{\mathbf{x}}_{i}^{(t)}-\hat{\mathbf{s}}_{i}^{(t)})\|^{2}, (24)

and the solution corresponding to the selected user is updated. This update strategy is initiated only after completion of search over reduced size set for all the users. Algorithm 4 presents the pseudo code of the KMAP-IIC algorithm.

Algorithm 4 KMAP-IIC Algorithm
1:Input: 𝐲{\mathbf{y}}, 𝐇{\mathbf{H}}, Nr,U,nrf,L,KN_{r},U,n_{rf},L,K
2:Initialization: 𝐱(0)=𝟎,𝐫(0)=𝐲,𝐖i,i=1,2,,U,t=0(Iteration index)\mathbf{x}^{(0)}=\mathbf{0},\mathbf{r}^{(0)}=\mathbf{y},\mathbf{W}_{i},\forall i=1,2,\cdots,U,\ \ t=0\ \ (\text{Iteration index})
3:repeat
4:    𝐱^(t)=𝐱^(t1),𝐫(t)=𝐫(t1),t=t+1\hat{\mathbf{x}}^{(t)}=\hat{\mathbf{x}}^{(t-1)},\mathbf{r}^{(t)}=\mathbf{r}^{(t-1)},\ \ t=t+1
5:    for (j=1,++j,jU)(j=1,++j,j\leq U) do
6:         Compute : 𝐞j=𝐖j(𝐫(t)+𝐇j𝐱^j(t1))\mathbf{e}_{j}=\mathbf{W}_{j}(\mathbf{r}^{(t)}+\mathbf{H}_{j}\hat{\mathbf{x}}_{j}^{(t-1)})
7:         Sort the elements in Descending Order and update 𝕃j(t)\mathbb{L}_{j}^{(t)} i.e. select indices of first KK elements from argsort(|ej,1(t)|,|ej,2(t)|,,|ej,M(t)|,descend)\arg sort(|{e}_{j,1}^{(t)}|,|{e}_{j,2}^{(t)}|,\ldots,|{e}_{j,M}^{(t)}|,descend)
8:         Generate the Reduced Search Space 𝕊~MBMj,(t)\tilde{\mathbb{S}}_{MBM}^{j,(t)}
9:         Perform search for the jjth user as: 𝐬^j(t)=argmin𝐬~q𝕊~MBMj,(t)𝐫j(t)𝐇j𝐬~q2\hat{\mathbf{s}}_{j}^{(t)}=\arg\min_{\tilde{\mathbf{s}}_{q}\in\tilde{\mathbb{S}}_{MBM}^{j,(t)}}\|{\mathbf{r}_{j}^{(t)}-\mathbf{H}_{j}\tilde{\mathbf{s}}_{q}}\|^{2}
10:    end for
11:    for (j=1,++j,jU)(j=1,++j,j\leq U) do
12:         Select the first element of v=argmini=1,2,,U𝐫(t)+𝐇i(𝐱^i(t)𝐬^i(t))2v=\arg\min_{i=1,2,\cdots,U}\|\mathbf{r}^{(t)}+\mathbf{H}_{i}(\hat{\mathbf{x}}_{i}^{(t)}-\hat{\mathbf{s}}_{i}^{(t)})\|^{2}
13:         if 𝐫(t)2>𝐫(t)+𝐇v(𝐱^v(t)𝐬^v(t))2\|\mathbf{r}^{(t)}\|^{2}>\|\mathbf{r}^{(t)}+\mathbf{H}_{v}(\hat{\mathbf{x}}_{v}^{(t)}-\hat{\mathbf{s}}_{v}^{(t)})\|^{2} then
14:             Update the residual vector as 𝐫(t)=𝐫(t)+𝐇v(𝐱^v(t)𝐬^v(t))\mathbf{r}^{(t)}=\mathbf{r}^{(t)}+\mathbf{H}_{v}(\hat{\mathbf{x}}_{v}^{(t)}-\hat{\mathbf{s}}_{v}^{(t)})
15:             Update the symbol vector for vvth user as 𝐱^v(t)=𝐬^v(t)\hat{\mathbf{x}}_{v}^{(t)}=\hat{\mathbf{s}}_{v}^{(t)}
16:         else
17:             break 
18:         end if
19:         if 𝐱^(t)=𝐱^(t1)\hat{\mathbf{x}}^{(t)}=\hat{\mathbf{x}}^{(t-1)} then
20:             break 
21:         end if
22:    end for
23:until 𝐱^(t)=𝐱^(t1)\hat{\mathbf{x}}^{(t)}=\hat{\mathbf{x}}^{(t-1)} or t=Lt=L (terminate the iterative processing or if no update in the solution)
24:Output:𝐱^t\hat{{\mathbf{x}}}_{t}

4 Simulation results

In this section, we present the simulation results of the proposed detection algorithms in terms of BER performance and the computational complexity for MBM-mMIMO systems. We also compare the BER performance of the proposed algorithms with the performance of MMSE detector r7 , IESP algorithm r7 and IIC algorithm r8 . We consider 128×16128\times 16 and 128×20128\times 20 MBM-mMIMO systems with nrf=3n_{rf}=3, nrf=4n_{rf}=4, nrf=5n_{rf}=5 and nrf=6n_{rf}=6, respectively. In summary, Table 2 shows list of the parameters used in simulation of BER performance and computational complexity.

Table 2: List of parameters used in simulation.
Figure MBM-mMIMO System Parameters Used
Fig. 2 Nr=128N_{r}=128, U=20U=20, nrf=3n_{rf}=3 4-QAM, L=1,2,4,6,8L=1,2,4,6,8
Fig. 3 Nr=128N_{r}=128, U=16U=16, nrf=4n_{rf}=4 4-QAM, L=1,2,4,6,8L=1,2,4,6,8
Fig. 4 Nr=128N_{r}=128, U=20U=20, nrf=3n_{rf}=3 4-QAM, L=1,2,4,6L=1,2,4,6, K=M/2K=M/2
Fig. 5 Nr=128N_{r}=128, U=20U=20, nrf=3n_{rf}=3 4-QAM, L=6L=6, K=1,M/4,M/2K=1,M/4,M/2
Fig. 6 Nr=128N_{r}=128, U=20U=20, nrf=4n_{rf}=4 4-QAM, L=6L=6, K=1,M/4,M/2K=1,M/4,M/2
Fig. 7 Nr=128N_{r}=128, U=16U=16, nrf=6n_{rf}=6 4-QAM, L=6L=6, K=1,M/4,M/2K=1,M/4,M/2
Fig. 8 Nr=128N_{r}=128, U=20U=20, nrf=3n_{rf}=3 16-QAM, L=6L=6, K=1,M/4,M/2K=1,M/4,M/2
Fig. 9 Nr=128N_{r}=128, U=20U=20, nrf=5n_{rf}=5 16-QAM, L=6L=6, K=1,M/4,M/2K=1,M/4,M/2
Fig. 10 U=20U=20, nrf=4n_{rf}=4 4-QAM, L=6L=6, K=1,M/4,M/2K=1,M/4,M/2
Fig. 11 Nr=128N_{r}=128, U=16,20U=16,20, nrf=3,4n_{rf}=3,4 4-QAM, L=6L=6, K=1,M/4,M/2K=1,M/4,M/2, SNR = 5 dB
Fig. 12 U=16U=16, nrf=4n_{rf}=4 4-QAM, L=6L=6, K=1,M/4,M/2K=1,M/4,M/2, SNR = 5 dB

4.1 Bit Error Rate Performance

In Figs. 2 and 3, we present the BER performance of MAP-ISD with different iterations L=1,2,4,6L=1,2,4,6 and 88 for 128×20128\times 20 mMIMO system, nrf=3n_{rf}=3 and 128×16128\times 16 mMIMO system, nrf=4n_{rf}=4, respectively. It is observed that the BER performance of MAP-ISD improves with increase in the number of iterations and converges after L=6L=6. Significant improvement in BER performance is observed for increase in the value of LL from 1 to 2 and from 2 to 4 whereas marginal improvement is observed for further increase in the value of LL.

Refer to caption
Figure 2: BER performance of MAP-ISD for 128×20128\times 20, nrf=3n_{rf}=3 MBM-mMIMO system with 4-QAM modulation.
Refer to caption
Figure 3: BER performance of MAP-ISD for 128×16128\times 16, nrf=4n_{rf}=4 MBM-mMIMO system with 4-QAM modulation.
Refer to caption
Figure 4: BER performance of KMAP-IIC with K=M/2K=M/2 for 128×20128\times 20, nrf=4n_{rf}=4 MBM-mMIMO system with 4-QAM modulation.

In Fig. 4, we simulate the BER performance of KMAP-IIC algorithm with different iterations L=1,2,4L=1,2,4 and 66 for 128×20128\times 20 mMIMO systems with 4-QAM, K=M/2K=M/2 and nrf=3n_{rf}=3 MBM. Similar observations can be drawn which suggests that the BER performance of the KMAP-IIC algorithm converges for L=6L=6. Therefore, for comparison of BER of the proposed algorithms, i.e. MAP-ISD and KMAP-IIC, with other detection techniques (discussed later in the section) we use L=6L=6 iterations.

Refer to caption
Figure 5: BER performance comparison for 128×20128\times 20, nrf=3n_{rf}=3 MBM-mMIMO system with 4-QAM modulation.

In Fig. 5, we compare the BER performance of the proposed algorithms with other algorithms such as IIC, IESP and MMSE for 128×20128\times 20 mMIMO with 4-QAM, nrf=3n_{rf}=3 MBM system. For comparison of KMAP-IIC, we consider three different values for KK, i.e. K=1K=1, K=M/4K=M/4 and K=M/2K=M/2. It is observed that, MAP-ISD and KMAP-IIC algorithms outperform the MMSE and the IESP algorithms. Moreover, the KMAP-IIC achieves BER performance close to within 0.10.1 dB to that of the IIC algorithm with K=M/2K=M/2. For a target BER of 10410^{-4}, MAP-ISD achieves performance within 0.5 dB of the IIC algorithm. Therefore, due to significant low-computational complexity of MAP-ISD (discussed later in Section 4.2), it would be a better choice over other detection techniques with marginal loss in performance. Fig. 6 shows the comparison of BER for 128×20128\times 20 mMIMO with 4-QAM, nrf=4n_{rf}=4 MBM systems. It is observed that in contrast to Fig. 5, the BER performance gap between MAP-ISD and KMAP-IIC increases with increase in nrfn_{rf} from 3 to 4. The key reason behind such performance degradation is the error propagation in interference cancellation of MAP-ISD which increases with increase in nrfn_{rf}. It is interesting to note that, KMAP-IIC with K=1K=1 achieves BER performance close to within 0.1 dB to that of IIC, KMAP-IIC with K=M/4K=M/4 and KMAP-IIC with K=M/2K=M/2. Therefore, in MBM-mMIMO systems with moderate values of nrfn_{rf}, KMAP-IIC with K=1K=1 could be a better choice.

Refer to caption
Figure 6: BER performance comparison for 128×20128\times 20, nrf=4n_{rf}=4 MBM-mMIMO system with 4-QAM modulation.

Fig. 7 presents the BER performance comparison for 128×20128\times 20 mMIMO with 4-QAM, nrf=6n_{rf}=6 MBM system. It is observed that the performance of KMAP-IIC with K=M/2K=M/2 is same as that of the IIC algorithm. The performance of KMAP-IIC with K=M/4K=M/4 and K=1K=1 is close to within 0.20.2 dB and 0.50.5 dB, respectively, of the performance of IIC algorithm. However, the performance of MAP-ISD is far inferior as compared to the KMAP-IIC, IIC and IESP algorithms. Clearly, from Figs. 5, 6 and 7, the performance of MAP-ISD degrades as compared to the IIC algorithm which makes MAP-ISD less selective for systems having high values of nrfn_{rf}. However, in such scenarios KMAP-IIC still performs up to mark. Therefore, from the aforementioned BER performance results, it can be concluded that the choice of low-complexity (discussed in next subsection) reasonable detection technique between MAP-ISD and KMAP-IIC depends significantly on the value of nrfn_{rf} RF mirrors and the number of uplink users.

Refer to caption
Figure 7: BER performance comparison for 128×16128\times 16, nrf=6n_{rf}=6 MBM-mMIMO system with 4-QAM modulation.
Refer to caption
Figure 8: BER performance comparison for 128×20128\times 20, nrf=3n_{rf}=3 MBM-mMIMO system with 16-QAM modulation.
Refer to caption
Figure 9: BER performance comparison for 128×20128\times 20, nrf=5n_{rf}=5 MBM-mMIMO system with 16-QAM modulation.

In Figs. 8 and 9, the BER performance comparison is performed for 128×20128\times 20 mMIMO system with nrf=3n_{rf}=3 and nrf=5n_{rf}=5 with 16-QAM modulation. Observations reveal that the proposed algorithms perform superior over the IESP algorithm. However, the performance of MAP-ISD and KMAP-IIC with K=1K=1 degrades with an increase in nrfn_{rf} as compared to KMAP-IIC with K=M/4K=M/4, KMAP-IIC with K=M/2K=M/2 and IIC. It is also observed that KMAP-IIC with K=M/4K=M/4 achieves performance close to KMAP-IIC with K=M/2K=M/2 and IIC algorithms.
In Fig. 10, we present the BER performance with variation in the number of BS antennas from Nr=80N_{r}=80 to Nr=140N_{r}=140 for U=20U=20, nrf=4n_{rf}=4 and 4-QAM MBM-mMIMO system. It is observed that the BER performance improves with an increase in the BS antennas. Also, the performance of KMAP-IIC with different values of KK, i.e., K=1,M/4,M/2K=1,M/4,M/2, is close to that of the IIC algorithm. On the other hand, the performance of MAP-ISD is far from IIC. For example, for a target BER of 5×1045\times 10^{-4}, required BS antennas for IIC and KMAP-IIC are around 125125, whereas MAP-ISD requires around 140140 BS antennas. Moreover, channel-hardening is not observed to degrade the performance compared to the IIC algorithm.

Refer to caption
Figure 10: BER performance comparison for U=20U=20 mMIMO with nrf=4n_{rf}=4 and 4-QAM modulation for different values of NrN_{r}.

4.2 Computational Complexity

This section discusses the computational complexity of the proposed algorithms and compares them with the IIC algorithm r8 . First, we discuss the approximate computations involved in different steps of the IIC algorithm in Table 3 in terms of floating-point operations (FLOPs) r23 ,r24 . It is to note that the algorithms’ initialization does not require any computation due to all zero initial solutions.

Table 3: Approximate number of computations in each iteration of IIC algorithm
Steps involved in IIC Computational complexity
Interference cancellation 2Nr2N_{r}
Performing ML search (4Nr1)MU|𝔸|(4N_{r}-1)MU|\mathbb{A}|
Finding the solution using greedy search (6Nr1)U2(6N_{r}-1)U^{2}

In Table 4 and 5, we present the computations required in different steps of the MAP-ISD and KMAP-IIC algorithms, respectively.

Table 4: Approximate number of computations in each iteration of MAP-ISD
Steps involved in MAP-ISD Computational complexity
Finding low-complexity matrix inverse (required only once) (2Nr1)MU(2N_{r}-1)MU
Finding the most favorable MAP 2MNrU2MN_{r}U
Finding reliability of the solution (4Nr1)U(4N_{r}-1)U
Table 5: Approximate number of computations in each iteration of KMAP-IIC
Steps involved in KMAP-IIC Computational complexity
Finding low-complexity matrix inverse (required only once) (2Nr1)MU(2N_{r}-1)MU
Finding favorable MAPs 2MNrU2MN_{r}U
Performing low-complexity search (2Nr+4)KU(2N_{r}+4)KU
Finding the solution using greedy search (6Nr1)U2(6N_{r}-1)U^{2}

It is observed from Tables 3, 4, and 5 that the computations in MAP-ISD are significantly less than that of IIC and KMAP-IIC algorithm, which is due to the complex search mechanism in IIC and KMAP-IIC algorithm. The computation of finding a low-complexity matrix inversion in MAP-ISD and KMAP-IIC is required only once. Therefore, the reduction in search space due to favorable MAP selection and low-complexity search are the key factors for the overall reduction in the proposed algorithms’ computational complexity. Fig. 11 presents the comparison of average number of FLOPs for different MBM-mMIMO systems at SNR= 5 dB. In Fig. 11, System 1 refers to 128×20128\times 20 mMIMO systems with nrf=3n_{rf}=3, system 2 refers to 128×20128\times 20 mMIMO systems with nrf=4n_{rf}=4 and system 3 refers to 128×16128\times 16 mMIMO systems with nrf=6n_{rf}=6. Observations reveal that KMAP-IIC with K=M/2K=M/2 achieves significant computational gain of upto 70%70\% and 63%63\% for 128×16128\times 16, nrf=6n_{rf}=6 and 128×20128\times 20, nrf=4n_{rf}=4 systems, respectively. This gain increases further to 76%76\% and 80%80\% when MAP-ISD algorithm is used for 128×16128\times 16, nrf=6n_{rf}=6 and 128×20128\times 20, nrf=4n_{rf}=4 systems, respectively. It is clear from the figure that the computational complexity of MAP-ISD is significantly less as compared to the KMAP-IIC with K=1K=1, K=M/4K=M/4 and K=M/2K=M/2. Therefore, in case of MBM-mMIMO systems with less value of nrfn_{rf}, MAP-ISD is suitable over KMAP-IIC with K=1K=1 and other algorithms. On the other hand for moderate values of n=rfn={rf} KMAP-IIC with K=1K=1 and K=M/4K=M/4 can be used to achieve a reasonable BER performance.

Refer to caption
Figure 11: Computational complexity comparison of different detection techniques for different MBM-mMIMO systems.
Refer to caption
Figure 12: Computational complexity comparison of different detection techniques versus the number of receive antennas.

In Fig. 12, we present the comparison on the average number of floating point operations (FLOPs) of the IIC algorithm with MAP-ISD and KMAP-IIC algorithms, respectively, with respect to the number of receive antennas for MBM-mMIMO system having 1616 users and nrf=4n_{rf}=4 at each user. Observation reveals that the computational complexity increase linearly with increase in the number of receive antennas at the station. It is also observed that the computational complexity increases with increase in KK. Furthermore, the complexity of MAP-ISD is significantly less compared with the KMAP-IIC algorithm and the IIC algorithm r8 .

5 Conclusion

We proposed low complexity interference cancellation based algorithms for symbol detection in MBM-mMIMO systems. First, we proposed a MAP selection based ISD algorithm which detects symbols in a sequential manner while nullifying interference from all other users. Then, we presented an approach to reduce the search space in the IIC algorithm and devised the KMAP-IIC algorithm. The key idea was to introduce a metric and a selection rule for selecting the list of the favorable MAPs in MBM corresponding to each user. The proposed algorithms achieve superior performance-complexity trade-off over the existing detection techniques in MBM-mMIMO systems. Observations reveal that when the number of users and the RF mirrors are comparatively less MAP-ISD algorithm achieves similar performance with almost 75%75\% and 87%87\% savings in computational complexity as compared to KMAP-IIC and IIC algorithm, respectively. However, with an increase in the number of users and the RF mirrors, KMAP-IIC delivers better BER performance over MAP-ISD with almost 65%65\% to 70%70\% savings in computational complexity for different value of KK over the IIC algorithm.

Acknowledgements.
This work is supported by the Start-up Research Grant (file no. SRG/2019/000654) scheme of Science and Engineering Research Board, Department of Science and Technology, Government of India.

Conflict of interest

The authors declare that they have no conflict of interest.

References

  • (1) Y. Sun et. al., “Application of Machine Learning in Wireless Networks: Key Techniques and Open Issues,” IEEE Communications Surveys and Tutorials, vol. 21, no. 4, pp. 3072-3108, 2019.
  • (2) M. Chen et. al., “Artificial Neural Networks-Based Machine Learning for Wireless Networks: A Tutorial” IEEE Communications Surveys and Tutorials, vol. 21, no. 4, pp. 3039-3071, 2019.
  • (3) M. Mandloi et. al. (Eds.), 5G and Beyond Wireless Systems: PHY Layer Perspective, Springer Series in Wireless Technology, Springer, Singapore, DOI: https://doi.org/10.1007/978-981-15-6390-4, 2020.
  • (4) F. Rusek et al., “Scaling up MIMO: Opportunities and challenges with very large arrays,” IEEE Signal Processing Magazine, vol. 30, no. 1, pp. 40-60, Jan. 2013.
  • (5) Lu Lu et al., “An overview of massive MIMO: Benefits and challenges,” IEEE Journal on Selected Topics in Signal Processing, vol. 8, no. 5, pp. 742-748, Oct. 2014.
  • (6) E. G. Larsson et al., “Massive MIMO for next generation wireless systems,” IEEE Communications Magazine, vol. 52, no. 2, pp. 186-195, Feb. 2014.
  • (7) S. Yang and L. Hanzo, “Fifty years of MIMO detection: The road to large-scale MIMOs,” IEEE Communications Survey & Tutorials, vol. 17, no. 4, pp. 1941-1988, 2015.
  • (8) E. Basar, “Index modulation techniques for 5G wireless networks,” IEEE Commun. Mag., vol. 54, no. 7, pp. 168-175, July 2016.
  • (9) E. Basar, “Reconfigurable Intelligent Surface-Based Index Modulation: A New Beyond MIMO Paradigm for 6G,” IEEE Transactions on Communications, vol. 68, no. 5, pp. 3187-3196, 2020.
  • (10) M. Wen, X. Cheng, and L. Yang, “Index modulation for 5G wireless communications,” Springer, 2017.
  • (11) R. Y. Mesleh, H. Haas, and S. Sinanovic, C. W. Ahn, S. Yun, “Spatial modulation,” IEEE Trans. Veh. Technol., vol. 57, no. 4, pp. 2228-2241, Jul. 2008.
  • (12) A. Younis, N. Serafimovski, R. Mesleh, and H. Haas, “Generalised spatial modulation,” Proc. 44th Asilomar Conf. Signals Syst. Comput., pp. 1498-1502, 2011.
  • (13) L. Lu, G. Y. Li, A. L. Swindlehurst, A. Ashikhmin, and R. Zhang, “An overview of massive MIMO: Benefits and challenges,” IEEE Jrnl on Selected Topics in Signal Processin, vol. 8, no. 5, pp. 742-758, 2014
  • (14) F. Rusek, D. Presson, B. K. Lau, E. G. Larsson, T. L. Marzetta, O. Edfors, and F. Tufvesson, “Scaling up MIMO: Opportunities and challenges with very large arrays,” IEEE Signal Processing Magazine, vol. 30, no. 1, pp. 40-60, 2013.
  • (15) A. K. Khandani, “Media-based modulation: A new approach to wireless transmission,” in 2013 IEEE International Symposium on Information Theory, July 2013, pp. 3050-3054.
  • (16) E. Seifi, M. Atamanesh, and A. K. Khandani, “Media-based modulation: A new frontier in wireless communications,” arXiv preprint arXiv:1507.07516, 2015.
  • (17) E. Basar, “Media-Based Modulation for Future Wireless Systems: A Tutorial,” IEEE Wireless Communications, vol. 26, no. 5, pp. 160-166, 2019.
  • (18) Y. Naresh and A. Chockalingam, “Performance Analysis of Full-Duplex Decode-and-Forward Relaying With Media-Based Modulation,” IEEE Transactions on Vehicular Technology, vol. 68, no. 2, pp. 1510-1524, Feb. 2019.
  • (19) B. Shamasundar and A. Chockalingam, “Media-based modulation for the uplink in massive MIMO systems,” IEEE Trans. on Vehicular Tech., vol. 67, no. 9, pp. 8169-8183, Sept. 2018.
  • (20) L. Zhang, M. Zhao, and L. Li, “Low-complexity multi-user detection for MBM in uplink large-scale MIMO systems,” IEEE Commun. Letters, vol. 22, no. 8, pp. 1568-1571, Aug. 2018.
  • (21) R. Y. Mesleh et al., “Spatial modulation,” IEEE Transactions on Vehicular Technology, vol. 57, no. 4, pp. 2228-2241, July 2008.
  • (22) J. Jeganathan, A. Ghrayed, and L. Szczecinski, “Spatial modulation: Optimal detection and performance analysis,” IEEE Communications Letters, vol. 12, no. 8, pp. 545-547, Aug. 2008.
  • (23) M. D. Renzo et al., “Spatial modulation for generalized MIMO: Challenges, opportunities, and implementation,” Proceedings of the IEEE, vol. 102, no. 1, pp. 56-103, Jan. 2014.
  • (24) A. Younis et. al., “Generalized spatial modulation,” 2010 Conference Record for the Forty Fourth Asilomar Conference on Signals, Systems and Computers, Nov. 2010.
  • (25) J. Wang, S. Jia, and J. Song, “Generalized spatial modulation system with multiple active transmit antennas and low complexity detection scheme,” IEEE Transactions on Wireless Communications, vol. 11, no. 4, pp. 1605-1615, April 2012.
  • (26) T. L. Narasimhan, P. Raviteja, and A. Chockalingam, “Generalized spatial modulation in large-scale multiuser MIMO systems,” IEEE Transactions on Wireless Communications, vol. 17, no. 7, pp. 3764-3779, 2015.
  • (27) Y. Naresh and A. Chockalingam, “On media-based modulation using RF mirrors,” IEEE Trans. on Vehicular Technology, vol. 66, no. 6, pp. 4967-4983, June 2017.
  • (28) M. Wu et al., “Large-scale MIMO detection for 3GPP LTE: Algorithms and FPGA implementations,” IEEE Journal of Selected Topics in Signal Processing, vol. 8, no. 5, pp. 916-929, Oct. 2014.
  • (29) C. Tang, C. Liu, and L. Yuan, “High precision low complexity matrix inversion based on Newton iteration for data detection in the massive MIMO,” IEEE Communications Letters, vol. 20, no. 3, pp.490-493, March 2016.
  • (30) M. Mandloi and V. Bhatia, “Low-complexity near-optimal iterative sequential detection for uplink massive MIMO systems,” IEEE Communications Letters, vol. 21, no. 3, pp. 568-571, March 2017.
  • (31) L. Dai et al., “Low complexity soft-output signal detection based on Gauss-Seidel method for uplink multiuser large-scale MIMO,” IEEE Transactions on Vehicular Technology, vol. 64, no. 10, pp. 4839-4845, Oct. 2015.
  • (32) Y. Naresh and A. Chockalingam, “Performance analysis of media-based modulation with imperfect channel state information,” IEEE Trans. on Vehicular Technology, vol. 67, no. 5, pp. 4192-4207, May 2018.
  • (33) T. L. Narasimhan and A. Chockalingam, “Channel hardening-exploiting message passing (CHEMPP) receiver in large-scale MIMO systems,” IEEE Journal of Selected Topics in Signal Processing, vol. 8, no. 5, pp. 847-860, 2014.
  • (34) R. Rajashekar, K. V. S. Hari, and L. Hanzo, “Reduced-complexity ML detection and capacity-optimized training for spatial modulation systems,” IEEE Transactions on Communications, vol. 62, no. 1, pp. 112-125, Jan. 2014.
  • (35) G. H. Van and C. F. Van Loan, Matrix computations, vol. 3, JHU Press, 2012.
  • (36) A. Bjorck, Numerical methods for least square problems, Philadelphia, PA, USE:SIAM, 1996.