Soft-Output Sphere Decoding: Performance and Implementation Aspects
read more
Citations
Simulating the Long Term Evolution physical layer
Soft-output sphere decoding: algorithms and VLSI implementation
Mutual information based calculation of the Precoding Matrix Indicator for 3GPP UMTS/LTE
Experimental Evaluation of Adaptive Modulation and Coding in MIMO WiMAX with Limited Feedback
Physics-inspired heuristics for soft MIMO detection in 5G new radio and beyond
References
Iterative decoding of binary block and convolutional codes
Achieving near-capacity on a multiple-antenna channel
Closest point search in lattices
Improved methods for calculating vectors of short length in a lattice, including a complexity analysis
Lattice basis reduction: improved practical algorithms and solving subset sum problems
Related Papers (5)
Frequently Asked Questions (21)
Q2. What is the way to reduce complexity in sphere decoding?
Ordering: A common approach to reduce complexity in sphere decoding without compromising the decoder’s performance is to adapt the detection ordering of the spatial streams to the geometry of the instantaneous channel realization byperforming a QR-decomposition on HP (rather than H), where P is a suitably chosen permutation matrix.
Q3. What is the way to prune a search tree?
More efficient pruning of the search tree closer to the root is obtained if “stronger streams” correspond to the levels closer to the root, i.e., P is chosen such that the main diagonal entries of R in HP = QR are sorted in ascending order.
Q4. What is the simplest way to compute the LLRs?
Transforming (3) and (4) into tree-search problems and using the sphere decoding algorithm [2], [3] allows to efficiently compute the LLRs (5).
Q5. What is the key to a more efficient tree-search strategy?
The key to a more efficient (compared to RTS) tree-search strategy is to ensure that every node in the tree is visited at most once.
Q6. What is the main advantage of the RTS strategy?
The main advantage of the RTS strategy lies in the fact that each traversal of the tree can be performed using a harddecision SESD with minimal modifications to account for the search being carried out on a prepruned tree.
Q7. What is the meaning of the SESD?
The SESD constrains the search to nodes which lie within a radius r around ỹ and traverses the tree depthfirst, visiting the children of a given node in ascending order of their PEDs.
Q8. What is the performance of the sphere decoder?
In the region where Lmax is small, the performance is dominated by aggressive LLR clipping rather than by the run-time constraint.
Q9. what is the d(s) of a tree?
Euclidean distances d(s) = ‖ỹ −Rs‖2 in (6) and (7) can be computed recursively as d(s) = d1 with the partial Euclidean distances (PEDs)di = di+1 + |ei|2 , i = MT ,MT − 1, . . . , 1 (8)and the distance increments (DIs)|ei|2 = ∣∣∣ỹi − MT∑j=iRi,jsj ∣∣∣2. (9) Since the dependence of the PEDs di on the symbol vector s is only through s(i), the authors have transformed ML detection and the computation of the max-log LLRs into a weighted treesearch problem: PEDs and PSVs are associated with nodes, branches correspond to DIs.
Q10. What is the way to enforce a run-time constraint?
A straightforward way of enforcing a run-time constraint is to terminate the search, on a symbol vector by symbol vector basis, after a maximum number of visited nodes.
Q11. What is the key to achieving low complexity?
The keys to achieving low complexity are the single tree-search strategy in Section III-B, MMSE-SQRD preprocessing, LLR clipping, and imposing run-time constraints with MF scheduling.
Q12. What is the way to ensure that the LLR values are bounded?
A straightforwardway of ensuring that LLR values are bounded is to clip them after the detection stage so that∣∣L(xj,b)∣∣ ≤ Lmax ∀ j, b . (11)
Q13. What is the way to counter this problem?
An efficient way to counter this problem is to perform the treesearch on a regularized channel matrix by computing[H αI] P = [ Q1 Q2 ]
Q14. What is the metric for determining the LLRs?
Computing the LLRs as in (5) requires determining the metric λMLj,b , which is achieved by traversing only those partsof the tree that have leaves in X “ xMLj,b ” j,b .
Q15. What is the corresponding LLR for the MR MT channel matrix?
To this end, the channel matrix H is first QR-decomposed according to H = QR, where Q is unitary of dimension MR ×MT and the upper-triangular MT×MT matrix R has real-valued positive entries on its main diagonal.
Q16. What is the corresponding computational complexity of the MR MT antenna?
In order to reduce the corresponding computational complexity, the authors employ the max-log approximation [6]L ( xj,b ) = mins∈X (0)j,b ‖y −Hs‖2 − min s∈X (1)j,b ‖y −Hs‖2 (2)where X (0)j,b and X (1) j,b are the disjoint sets of vector symbols that have the bth bit in the label of the jth scalar symbol equal to 0 and 1, respectively, and the LLRs in (2) are normalized to avoid dependence on the noise variance.
Q17. How can the authors initialize the search radius rj,b?
It is therefore important to realize that, without compromising max-log optimality, the authors can initialize the search radius rj,b by setting it equal to theminimum value of ‖ỹ −
Q18. What is the ML algorithm used to update the counterhypotheses?
Whenever a leaf has been reached and a new ML hypothesis has been found after carrying out the steps in Case 1 in Section III-B, the counterhypotheses have to be updated according toλMLj,b ← min { λMLj,b , λ ML + Lmax } ∀ j, b .
Q19. What is the way to limit the complexity of the detection of the kth vector symbol?
The maximum complexity allocated to the detection of the kth vector symbol can, for example, be chosen according to the maximum-first (MF) scheduling strategy [13] asDmax(k) = NDavg − k−1∑ i=1 D(i)− (N − k)MT (15)2
Q20. What is the pruning criterion for a tree?
The node s(i) along with its subtree is pruned if its PED d ( s(i) ) satisfiesd ( s(i) ) > maxal∈A al . (10)This pruning criterion (illustrated in Fig. 2) ensures that the subtree of a given node is explored only if it can lead to an update of either the ML hypothesis or of at least one of the counter-hypotheses.
Q21. What is the main idea behind the single tree search?
the authors formulate update rules and a pruning criterion based on a list containing the metrics λML and λMLj,b .The main concept is to have a list containing the metric λML along with the corresponding bit sequence xML and the metrics λMLj,b of all counter-hypotheses and to search the subtree originating from a given node only if the result can lead to an update of either λML or one of the λMLj,b .List administration: