Performance-Driven Symbol Mapping for Downlink and Point-to-Point MIMO Systems

  • C. Masouros1Email author and

    Affiliated with

    • E. Alsusa2

      Affiliated with

      EURASIP Journal on Wireless Communications and Networking20112011:376394

      DOI: 10.1155/2011/376394

      Received: 25 October 2010

      Accepted: 18 February 2011

      Published: 13 March 2011

      Abstract

      An adaptive symbol mapping scheme is proposed for single-user point-to-point and multiuser downlink multiple-input multiple output (MIMO) systems aiming at the minimization of the overall system bit error rate. The proposed scheme introduces a disorder to the symbols to be transmitted within a MIMO subframe by means of dynamic mapping, with the objective to optimise the interference between them and enhance the received symbols' power. This is done by either changing the allocation order of the symbols to the antennas or by applying a scrambling process that alters the symbols sign. This procedure is targeted to optimizing, rather than strictly minimizing the interference between the symbols such that constructive instantaneous interference is utilized in enhancing the decision variables at the receiver on a symbol-by-symbol basis so that detection is made more reliable. In this way, the overall system performance is improved without the need to raise the transmitted power. The proposed scheme can be used in conjunction with various conventional MIMO precoding and detection techniques. The presented results show that for a given transmit power budget this scheme provides significant benefits to the corresponding conventional system's error rate performance.

      1. Introduction

      The recent advances in multiple-input multiple-output (MIMO) processing [1] are making the application of multiantenna transmitters and receivers increasingly popular in modern wireless communications due to the enhanced capacity and space diversity they offer. MIMO schemes have recently been incorporated in communication standards such as WiMAX and 3GPP-LTE to satisfy the growing demand for higher data rates and quality of service for multimedia applications. Despite the increased information capacity offered by the MIMO channel, the spatial correlation of the multiple subchannels introduces an additional source of interference which corrupts the data symbols and in effect degrades the achievable error rate performance of such systems. In the MIMO uplink, space diversity detection techniques [25] can counteract this impediment to a satisfactory extent. In [2, 3], the sphere decoder is presented for an arbitrary lattice code and a lattice code resulting from applying algebraic space-time coding on a MIMO system, respectively. Regardless of the technique's near-optimal performance, the decoding complexity is quite significant, which makes it impractical for use in mobile units at downlink and point-to-point reception. Suboptimal solutions with reduced complexity are introduced in [4, 5] where diagonal- and vertical-layered architectures of the (Bell Laboratories Layered Space Time) BLAST receiver are presented, respectively. While complexity is drastically reduced the performance of these techniques is comparable to the sphere decoder in most practical scenarios. An alternative to MIMO detection is to shift the signal enhancement processing to the transmitter by use of precoding. This is particularly popular in MIMO downlink communications and point-to-point systems, which is the focus of this work. Channel inversion (CI) [6] entails the least complexity of the precoding techniques available. However, the disadvantages of the CI technique include a poor symbol error rate (SER) performance and the fact that the transmission rate and throughput delivered are limited and do not improve by increasing the number of antennas, as demonstrated in [7]. The solution proposed in [7], which is a minimum mean square error (MMSE) form of channel inversion, provides some performance and capacity gains with respect to the conventional CI, without a considerable complexity increase. Nevertheless, the transmission rates offered by both these schemes are far from reaching the theoretical channel capacity. Dirty paper coding (DPC) techniques as, for example, in [811] based on the initial information theoretical analysis in [12], can further increase transmission rates and achieve significant capacity benefits. However, the majority of the DPC methods developed so far are impractical in many scenarios as they require sophisticated signal processing at the transmitter with complexity similar to the one of sphere decoding. A promising alternative is the joint transmit-receive beamforming scheme as presented in [13] amongst others in the literature. Despite being less complex than DPC, the most robust beamforming schemes require iterative communication between the transmitter and receiver for the optimization of the joint processing and the system configuration. This needs to be done every time the channel characteristics change and hence, in fast fading environments introduces considerable latency to the MIMO downlink system. Owing to their favourable performance-to-complexity tradeoff amongst the techniques mentioned above, this paper focuses on the application of the proposed scheme to the more practical V-BLAST detection and MMSE precoding.

      Complementary to the aforementioned signal enhancement processing MIMO schemes, a number of resource allocation schemes [1419] have emerged for MIMO communications mainly involving antenna selection [1416] and power allocation [17, 18] for multielement transceivers as well as frequency (subcarrier) allocation [19] for MIMO-orthogonal frequency division multiplexing (OFDM) communications. All the relevant resource allocation methods focus on the reduction of interference between the spatial streams of the MIMO channel. This clearly differentiates them to the proposed scheme where the aim is not strictly to minimise the correlation of the spatial streams but rather to optimise it and accommodate for constructive interchannel interference (ICI). Moreover, resource allocation schemes such as antenna selection can be used in addition to the proposed technique to further improve the performance. The focus of this paper, however, is on signal enhancement schemes and for reasons of coherence, antenna selection and power allocation are not considered here.

      In more detail, the proposed scheme which parallels the ones in [20, 21] proposed for code division multiple access (CDMA) is based on the fact that ICI is separated into constructive and destructive as discussed in detail in [22]. The characterisation of the instantaneous ICI depends on the channel characteristics and the correlation between the spatial streams, and, equally importantly, on the instantaneous values of the transmitted symbols. By perturbing the data symbols to be transmitted by means of reordering or scrambling, the proposed scheme influences the ICI between the MIMO subchannels. It then chooses a symbol mapping such that the interference is optimised and the decision variables at the receiver are maximised. Subsequently, conventional precoding or detection can be applied with enhanced performance due to the optimisation of interference achieved by the proposed symbol mapping.

      It is clear that the proposed symbol mapping scheme can be combined with various conventional MIMO detection (linear detection, V-BLAST, sphere decoding, etc.) and precoding schemes (linear precoding, dirty paper coding etc.) to improve the respective performance. For reasons of simplicity and to maintain the focus of the present paper, as mentioned above, only two of the most practical and popular MIMO techniques are considered here, MMSE precoding and V-BLAST detection.

      It should be noted that the proposed data allocation method entails the transmission of control signalling (CS) to inform the receiver about the mapping process used so as to attain the correct initial order or appropriately descramble the received data after detection. It will be shown that the CS increases logarithmically with the number of candidate mapping patterns and for this reason the number of possible reordered or scrambled versions of the data to select from should be limited. In the simulations presented here this number is limited to values such that the overhead imposed by the CS transmission is restricted to less than 6% of the transmitted information.

      2. System Model and Conventional MIMO Processing

      This paper considers transmission in a MIMO system with a limited number of http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq1_HTML.gif transmit http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq2_HTML.gif and http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq3_HTML.gif receive http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq4_HTML.gif antennas over a frequency flat fading channel. As commonly suggested in the literature, the received signals of all antennas for the http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq5_HTML.gif symbol period can be combined in an http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq6_HTML.gif vector
      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_Equ1_HTML.gif
      (1)

      Here http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq7_HTML.gif and http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq8_HTML.gif is the http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq9_HTML.gif matrix that contains the complex frequency flat channel coefficients with the http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq10_HTML.gif element http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq11_HTML.gif being the zero-mean unit-variance channel tap between the http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq12_HTML.gif transmit antenna and the http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq13_HTML.gif receive antenna. Also, http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq14_HTML.gif is the http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq15_HTML.gif vector with the symbols transmitted by the http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq16_HTML.gif antennas and http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq17_HTML.gif is the http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq18_HTML.gif vector of the additive white Gaussian noise (AWGN) components at the http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq19_HTML.gif antennas. For reasons of completeness and to introduce the notation used in this paper, the following briefly presents the conventional MMSE precoding and V-BLAST detection schemes. A modification to the conventional V-BLAST is also introduced to make it more compatible with the proposed method.

      2.1. Linear Minimum Mean Square Error (MMSE) Precoding

      The MMSE precoding shown in [7] applies a regularized inversion of the channel matrix at the transmitted symbols such that the signal to interference plus noise ratio (SINR) at the receiver is maximized. The transmitted symbol vector is given as
      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_Equ2_HTML.gif
      (2)
      where http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq20_HTML.gif is the http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq21_HTML.gif data vector for the http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq22_HTML.gif symbol period, http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq23_HTML.gif is the MMSE-like pseudoinverse of the channel matrix and http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq24_HTML.gif denotes the Hermitian transpose of http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq25_HTML.gif . http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq26_HTML.gif is a scaling factor that ensures that http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq27_HTML.gif and is given as
      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_Equ3_HTML.gif
      (3)
      which derives average normalization of the transmitted power. It can be seen that in this case the channel is not entirely orthogonalized and a certain amount of interference remains. The received symbol vector is given as
      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_Equ4_HTML.gif
      (4)
      where
      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_Equ5_HTML.gif
      (5)
      is the equivalent crosscorrelation matrix of the symbols as seen at the receiver. The estimated symbols are retrieved by directly quantizing the received signal
      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_Equ6_HTML.gif
      (6)

      where http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq28_HTML.gif represents the quantization operation. It is shown in [9] that the value of http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq29_HTML.gif that maximizes the received SINR is http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq30_HTML.gif , where http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq31_HTML.gif is the noise variance at the receiver. It is demonstrated that this precoding outperforms full channel inversion in symmetric MIMO systems where http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq32_HTML.gif such as the ones investigated here.

      2.2. Vertical Bell Laboratories Layered Space Time (V-BLAST) Detector and Proposed Modification

      The V-BLAST detector proposed in [5] involves iterative detection and cancellation of the interfering symbols at each antenna in order to attain an interference-free detection of the desired signal. No precoding is applied at the transmitter http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq33_HTML.gif and hence http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq34_HTML.gif as the cancellation process is applied on the received signal http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq35_HTML.gif of (1). The function of the scheme is well explained in [5] and for reasons of completeness we present the compact recursive procedure of the technique:

      Initialisation:
      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_Equ7_HTML.gif
      (7a)
      Recursion:
      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_Equ8_HTML.gif
      (7b)
      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_Equ9_HTML.gif
      (7c)
      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_Equ10_HTML.gif
      (7d)
      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_Equ11_HTML.gif
      (7e)
      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_Equ12_HTML.gif
      (7f)

      Here http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq36_HTML.gif denotes the http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq37_HTML.gif column if http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq38_HTML.gif is a matrix or the http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq39_HTML.gif element if http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq40_HTML.gif is a vector, http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq41_HTML.gif denotes the transpose of http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq42_HTML.gif , http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq43_HTML.gif denotes the index of the selected symbol to be detected and cancelled at the http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq44_HTML.gif recursion and http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq45_HTML.gif is the http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq46_HTML.gif estimated symbol. In (7e), the estimated interference from symbol http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq47_HTML.gif is regenerated using channel state information (CSI) and canceled out from the received signal. In (7f) the rows http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq48_HTML.gif to http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq49_HTML.gif are zeroed in the channel matrix to provide http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq50_HTML.gif on which the new equalization matrix http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq51_HTML.gif is based. It is important to stress that in the recursive detection-reconstruction-cancellation part, the http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq52_HTML.gif symbol to be cancelled is selected as the one that corresponds to the row in http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq53_HTML.gif with the minimum norm. This is done so that the increase in noise power due to multiplication with http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq54_HTML.gif at each recursion is minimized. However, for the pairing of V-BLAST with the proposed scheme the simulations showed that a criterion based on the one proposed for successive interference cancellation (SIC) in code division multiple access (CDMA) systems in [23] is more appropriate. Therefore in the simulations shown below the received signal is multiplied with the entire equalization matrix at each recursion and the symbol with the highest norm (most reliable for detection) is selected for cancellation at each iteration of the algorithm. Hence, while the conventional V-BLAST is simulated in the graphs below using the procedure in (7a)–(7f) for the combined V-BLAST and symbol mapping the BLAST algorithm is modified to:

      Initialisation:
      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_Equ13_HTML.gif
      (8a)
      Recursion:
      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_Equ14_HTML.gif
      (8b)
      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_Equ15_HTML.gif
      (8c)
      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_Equ16_HTML.gif
      (8d)
      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_Equ17_HTML.gif
      (8e)
      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_Equ18_HTML.gif
      (8f)
      As regards the equalized symbols to be detected in (8b) assuming perfect cancellation the expression can be transformed using (8f) to
      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_Equ19_HTML.gif
      (9)

      where http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq55_HTML.gif is the crosscorrelation of the remaining symbols at the http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq56_HTML.gif cancellation iteration, and http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq57_HTML.gif is the noise component after channel equalization. It can be proven that the noise component http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq58_HTML.gif has on average increased power compared to http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq59_HTML.gif after multiplication with the nonunitary channel equalization matrix.

      3. Proposed Optimized Symbol Allocation (SA)

      In both (4) and (9) it can be seen that when the transmitted data symbols are reordered they are paired with different crosscorrelation elements in the crosscorrelation matrix and the interference between them changes so that the values of the resulting decision variables are different. Hence, instead of transmitting the symbols http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq60_HTML.gif as they appear at the output of the information source, it would be beneficial to the communication system to reorder the symbols in a way that the decision variables resulting from (4) and (9) are enhanced. This serves as the motivation behind the proposed SA scheme, the flow diagram of which is illustrated in Figure 1. The proposed algorithm involves the following steps.

      1. (1)

        From an initial reference symbol-to-antenna allocation pattern a limited number of http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq61_HTML.gif candidate allocation patterns are formed offline, known both to the transmitter and receiver. The value of http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq62_HTML.gif should be limited, so that the CS bits (needed to convey which of the http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq63_HTML.gif candidates was used to the receiver) do not impose an overwhelming transmission overhead.

        http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_Fig1_HTML.jpg
        Figure 1

        Block diagram of the proposed symbol allocation (SA) scheme.

         

      Transmitter

      1. (2)

        For each candidate the expected decision variables are preestimated according to the signal enhancement mechanism employed (precoding or detection). For the MMSE and V-BLAST techniques considered here the preestimated symbols are given by (6) and (8d), respectively using the channel estimates. The vectors containing the decision variables for each candidate allocation are stacked to form the http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq64_HTML.gif matrix http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq65_HTML.gif . The http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq66_HTML.gif column of the matrix, denoted as http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq67_HTML.gif for simplicity, contains the preestimated decision variables for the http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq68_HTML.gif candidate symbol allocation with http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq69_HTML.gif .

         
      2. (3)

        A symbol allocation http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq70_HTML.gif is selected based on an error rate minimization criterion that will be shown in the following.

         
      3. (4)

        The transmitter subsequently allocates the symbols to the antennas based on the selected allocation and, if applicable, precodes the data using some form of conventional precoding.

         
      4. (5)

        Additional to the data symbols the transmitter sends the CS bits that inform the receiver which of the candidate allocation patterns was used.

         

      Receiver

      1. (6)

        The receiver applies the conventional signal enhancement processing which can be V-BLAST (assumed in this paper) or any other conventional detection scheme to acquire the enhanced decision variables.

         
      2. (7)

        The CS is detected to determine the allocation http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq71_HTML.gif used at the transmitter.

         
      3. (8)

        Using the knowledge of all possible allocation patterns, the receiver then removes the perturbation introduced at the transmitter by inverting the process of http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq72_HTML.gif to retrieve the original data.

         

      For reasons of clarity the separation between the notations http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq73_HTML.gif and http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq74_HTML.gif in the above analysis should be emphasized, as the former represents the preestimated values of the data at the transmitter using CSI and ignoring noise while the latter denotes the actual estimated data at the receiver.

      It is evident that for each allocation pattern used, a number of http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq75_HTML.gif control signaling bits need to be transmitted additionally to the information symbols to notify the receiver which of the http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq76_HTML.gif candidate allocations was selected. Therefore if the proposed SA was applied at individual symbol periods, in realistic MIMO scenarios with limited number of antennas the need to map the symbols at each symbol period would yield a significant amount of CS. To limit the signaling overhead to practical levels, rather than applying the proposed SA on a symbol-by-symbol basis, symbols of multiple transmission time slots and spatial layers are grouped to form MIMO subframes, similar to the ones used in the LTE standard. By applying SA on these subframes and increasing the number of data information symbols per allocation the relative CS overhead is dramatically reduced.

      As regards the mapping mechanism used to create the http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq77_HTML.gif candidate allocations and introduce the diversity in the resulting interference to optimize the decision variables, this paper proposes two distinct methods which are analyzed below.

      3.1. Mapping Method 1: Symbol Reordering

      The symbols within the MIMO subframe are randomly shuffled to produce a reordered version of the data subframe as shown in Figure 2(a). This can be expressed by the mapping operation
      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_Equ20_HTML.gif
      (10)
      for the http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq78_HTML.gif candidate allocation. Here http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq79_HTML.gif is the http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq80_HTML.gif randomly permuted sequence of positive integer indexes of 1 to http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq81_HTML.gif , where http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq82_HTML.gif is the total number of symbols per subframe. For the example of http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq83_HTML.gif , three possible permutations could be http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq84_HTML.gif , http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq85_HTML.gif , and http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq86_HTML.gif . Assuming the permutation http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq87_HTML.gif , (10) denotes that http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq88_HTML.gif . Clearly, http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq89_HTML.gif is a space-time reordered version of http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq90_HTML.gif which is used to preestimate the decision variables for the given candidate allocation. Any individual symbol within the subframe can be transmitted at any spatial layer or time slot within the subframe. This means that the corresponding symbol can be received at any time slot and more importantly at any receive antenna. Therefore the receive antennas need to cooperate to reestablish the actual order of the data in order for them to be used for the intended application. Hence, the usefulness of this form of perturbation is limited to point-to-point MIMO systems. If the length of the subframe is a number of http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq91_HTML.gif time slots then the number of symbols reordered for a transmitter with http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq92_HTML.gif antennas is http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq93_HTML.gif . For a number of http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq94_HTML.gif symbols to be shuffled there exists a number of
      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_Equ21_HTML.gif
      (11)
      different reordered versions of the subframe. Nevertheless as mentioned in the previous section the number of candidate allocation patterns needs to be limited http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq95_HTML.gif in order to restrict the resulting CS overhead. It will be shown however in the results section that the performance benefit provided by SA, while less than the theoretically achievable for http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq96_HTML.gif , is still considerable compared to conventional MIMO schemes.
      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_Fig2_HTML.jpg
      Figure 2

      Mapping methods: (a) symbol reordering, (b) symbol scrambling.

      3.2. Mapping Method 2: Symbol Scrambling

      The symbols within the MIMO subframe are randomly scrambled as shown in Figure 2(b), so that the sign (but not the absolute value) of the real and imaginary parts of the symbols existing in the subframe change. This can be expressed by the element wise multiplication of the data symbols with a scrambling sequence http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq97_HTML.gif
      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_Equ22_HTML.gif
      (12)
      where http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq98_HTML.gif has elements of the form http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq99_HTML.gif . In this case the initial order of the time slot and spatial stream allocated to the symbols from the information source is unchanged but the actual symbol value is altered in favor of constructive instantaneous interference. Similar to conventional scrambling techniques, a scrambling sequence is applied on the group of symbols to introduce the desirable interference diversity. In contrast to conventional scrambling however, the aim is to constructively correlate the symbols rather than fully decorrelate them. For the example of quadrature phase shift keying (QPSK) used in the following simulations a complex scrambling code needs to be employed. Since with random scrambling each symbol can take any of the four different values in the QPSK constellation, for the number of http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq100_HTML.gif symbols in the subframe there exist
      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_Equ23_HTML.gif
      (13)

      different possible scrambled versions. It will be shown however that the performance of the proposed scheme depends on the number of actual candidate perturbed versions of the frame rather than the theoretical achievable diversity. Therefore for a practical number of candidate allocations http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq101_HTML.gif the performances of the two mechanisms are identical as shown in the simulations that follow. The advantage of the scrambling method however lies in the fact that since the symbols arrive at the receive antennas at the initial time slots and spatial streams there is no need for the antennas to cooperate for retrieving the actual order of the transmitted data. This makes the proposed scheme also applicable to multiuser MIMO downlink transmission.

      4. Selection of the Symbol Allocation

      4.1. Selection Criterion

      From (4) and (9), a number of criteria can be formulated for the selection of the symbol allocation to be used for transmission based on the resulting interference and decision variables for each candidate allocation pattern. Since the average error rate performance of a point-to-point MIMO system is governed by the performance of the instantaneously "worst" symbols we propose to select the allocation pattern that derives the decision variable distribution with the most reliable worst symbol. The obvious choice would be to select the allocation according to a Euclidean distance criterion
      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_Equ24_HTML.gif
      (14)
      that is, select the allocation that minimizes the maximum Euclidean distance to the data symbols (worst symbol) in the preestimated symbol distribution. However, this does not allow for constructive interference which pushes the received symbols further away from the nominal constellation points, towards the direction opposite from the decision thresholds. This is shown graphically in Figure 3 for the example of constellation point http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq102_HTML.gif of the QPSK constellation. It can be seen that although the received symbol denoted by "+" has a smaller Euclidean distance to http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq103_HTML.gif than the point denoted by " http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq104_HTML.gif ", the latter has increased distances to the decision thresholds of the QPSK constellation (the real and imaginary axes) and therefore is more tolerant to noise and yields more reliable detection. For this reason the proposed criterion is based on the projection of the preestimated symbols on the data symbols, which for phase shift keying (PSK) modulation is expressed as
      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_Equ25_HTML.gif
      (15)
      Here http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq105_HTML.gif denotes the projection of the elements of vector http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq106_HTML.gif to the elements of vector http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq107_HTML.gif for the http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq108_HTML.gif allocation pattern. For the case of binary PSK (BPSK) the projection involves the element wise multiplication of the two vectors while for QPSK the real and imaginary parts of the elements need to be separated prior to element wise multiplication
      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_Equ26_HTML.gif
      (16)
      When the projection of the preestimated decision variable on the actual symbol to be transmitted is negative it signifies that due to ICI the decision variable is corrupted and would indicate a different constellation point than the one transmitted which would lead to erroneous detection. When the projection is positive the ICI does not push the decision variable to a different constellation point and in the absence of noise detection is expected to be successful. The higher the value of the projection the more reliable the decision variables are expected to be. Hence the minimum of the projection for each candidate http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq109_HTML.gif denotes the most unreliable (worst) symbol in the distribution http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq110_HTML.gif . By selecting the candidate allocation with the highest minimum projection for every subframe the performance of the instantaneously worst symbol is constantly enhanced and therefore the overall average performance is boosted.
      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_Fig3_HTML.jpg
      Figure 3

      Euclidean distance versus projection criterion, QPSK http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq111_HTML.gif example.

      To verify the superiority of the proposed criterion over the conventional approach, the two criteria (14) and (15) are compared in the results that follow. It should be noted that since the search for the best candidate is not exhaustive amongst all possible perturbed symbol allocations but rather between http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq112_HTML.gif possibilities—to limit the CS-the selected candidate may be suboptimum. It is shown in the simulations however that even for this suboptimal selection a significant performance improvement can be gleaned.

      4.2. Selection Implementation

      As regards the selection of http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq113_HTML.gif , the obvious method for this is to calculate http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq114_HTML.gif in (15) for each symbol period. An alternative would be to calculate http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq115_HTML.gif for all symbol combinations for a given channel impulse response and store the values of http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq116_HTML.gif in a memory, possibly in the for of a lookup table (LUT). For each symbol period the transmitter would then select the appropriate value of http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq117_HTML.gif from the LUT according to the symbol combination encountered. For QPSK modulation and http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq118_HTML.gif assumed in the following results the number of possible symbol combinations would be http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq119_HTML.gif . However, for PSK modulation the interference encountered depends only on the relative phases of the data symbols and not their amplitudes which are common for all constellation points. Hence different data symbol combinations that share the same relative phases such as http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq120_HTML.gif and http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq121_HTML.gif would yield the same value of http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq122_HTML.gif . Clearly there exist http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq123_HTML.gif relative phase combinations arising from each of the QPSK constellation points. Hence, a total number of http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq124_HTML.gif entries need to be calculated and stored in the LUT. This LUT-based implementation of the allocation selection is particularly preferable in slow fading cases where the channel coefficients remain unchanged for large numbers of symbol periods and large framelengths http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq125_HTML.gif can be used.

      5. Control Signalling (CS) and Resulting Transmission-Reception Efficiency

      5.1. CS Transmission

      It is evident from the aforementioned analysis that the performance of the proposed scheme relies on the transmission of CS to update the receiver on the allocation pattern used at each symbol period in order to correctly remove the perturbation introduced at the transmitter and obtain the initial data. It is possible to attach the CS at the end of the corresponding subframe but for reasons of efficiency it is preferable to adopt a frame-based approach as the one shown in Figure 4. The MIMO frame consists of http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq126_HTML.gif subframes each one comprising http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq127_HTML.gif symbol periods over http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq128_HTML.gif spatial streams. The CS is calculated for the whole MIMO frame and is transmitted at the beginning of the frame. This facilitates the perturbation removal at the receiver as the whole frame can be processed uniformly in order to avoid subframe-by-subframe CS transmission and detection. The CS is transmitted separately to the data to avoid interference so that CS detection is reliable.
      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_Fig4_HTML.jpg
      Figure 4

      Proposed frame structure.

      5.2. CS Transmission-Reception Efficiency

      As mentioned above a number of http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq129_HTML.gif candidate allocations can be represented using http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq130_HTML.gif bits. Assuming http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq131_HTML.gif -ary modulation for the CS, a number of http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq132_HTML.gif CS symbols need to be transmitted for every switch of the allocation pattern, while when the allocation pattern is constant, no CS is transmitted. Assuming the worst case where the pattern is changed at each subframe, a number of http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq133_HTML.gif CS symbols needs to be transmitted for every http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq134_HTML.gif transmitted data symbols in the subframe and therefore the transmission efficiency can be expressed as
      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_Equ27_HTML.gif
      (17)

      Likewise, at the receiver a number of http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq135_HTML.gif CS symbols need to be detected for every http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq136_HTML.gif received data symbols which gives an equal reception efficiency. In the majority of the following simulations a data subframe of http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq137_HTML.gif symbol periods over http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq138_HTML.gif spatial streams is assumed and a number of http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq139_HTML.gif candidate allocations is used. As QPSK modulation is employed for both data and CS this derives a practical transmission and reception efficiency of http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq140_HTML.gif %. At this point is should be mentioned that a 5.4% efficiency reduction, while nontrivial, is worthwhile due to the significant performance improvement attained by the proposed scheme. Indeed, it is not uncommon to sacrifice a degree of transmission efficiency to secure performance benefits and a profound example of this is forward error correction (FEC) coding. While it imposes major transmission overheads such as 33% for codes of rate http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq141_HTML.gif , 100% for rate http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq142_HTML.gif and so on, it greatly improves communications system performance. This is why FEC is adopted in most modern communication standards and its importance is widely acknowledged. Furthermore, the transmission efficiency of the proposed scheme in (17) can be improved by increasing http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq143_HTML.gif and employing higher-order modulation such as 16-quardature amplitude modulation (QAM) or 64QAM. This is further illustrated in Figure 7 (and the relevant discussion in the following) which plots the transmission efficiency with increasing http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq144_HTML.gif for the parameters mentioned above and for various modulation schemes used for the CS transmission.

      6. Complexity Analysis

      In order to investigate the complexity repercussions of the above methodology, the relevant comparison of the conventional and proposed techniques is illustrated in Table 1. The table illustrates the complexity of conventional MMSE precoding with MMSE using symbol allocation (MMSE-SA). The complexity count is shown in terms of principal factors http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq145_HTML.gif as commonly done in the literature. A slow fading channel is assumed where the channel estimates and the precoding matrix need to be updated once every MIMO frame. It can be seen that for the proposed scheme the principal complexity factor is the need to trial between all candidate symbol allocations at the transmitter before selection. This increases the vector ( http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq146_HTML.gif ) to matrix http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq147_HTML.gif multiplications by a factor equal to the number of candidate allocations http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq148_HTML.gif . The resulting complexity increase relative to conventional MMSE can be expressed as
      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_Equ28_HTML.gif
      (18)
      For the case of fast fading where channel estimation and precoding matrix calculation (steps 1, 2, 3, 5 in Table 1) need to be done more frequently, the weight of the factor http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq149_HTML.gif that relates to the complexity increase for the proposed scheme in (18) is reduced. Therefore, the relative complexity increase for MMSE-SA compared to MMSE is drastically reduced. It should be mentioned that in the cases where the proposed scheme is applied on the MIMO downlink by use of scrambling the discussed complexity increase has less of an impact as it involves the base station transmitter where resources are more affordable. Moreover, by use of the LUT-based approach discussed in Section 4.2) the complexity of the proposed scheme can be further reduced. Overall, the raise in complexity is well justified by the performance benefits provided by the proposed technique as will be shown by the results.
      Table 1

      Complexity in numbers of operations for MMSE and MMSE-SA.

      MMSE

      No. of operations

      MMSE-SA

      No. of operations

      (1)

      construct http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq150_HTML.gif

      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq151_HTML.gif

      (1)

      construct http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq152_HTML.gif

      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq153_HTML.gif

      (2)

      invert http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq154_HTML.gif

      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq155_HTML.gif

      (2)

      invert http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq156_HTML.gif

      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq157_HTML.gif

      (3)

      multiply http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq158_HTML.gif with http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq159_HTML.gif

      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq160_HTML.gif

      (3)

      multiply http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq161_HTML.gif with http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq162_HTML.gif

      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq163_HTML.gif

      (4)

      multiply with http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq164_HTML.gif

      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq165_HTML.gif

      (4)

      multiply with http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq166_HTML.gif

      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq167_HTML.gif

      (5)

      calculate scaling factor

      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq168_HTML.gif

      (5)

      calculate scaling factor

      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq169_HTML.gif

         

      (6)

      choose optimum http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq170_HTML.gif

      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq171_HTML.gif

      Total

      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq172_HTML.gif

      Total

      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq173_HTML.gif

      7. Performance Analysis for Nonideal CS Transmission

      Another important aspect of the proposed SA scheme is the dependency of its performance on the correct reception of the CS. This issue is treated in this section where a performance analysis is presented for the case of imperfect CS detection. Assume that http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq174_HTML.gif is the probability of bit error for the data detection in the case of error-free CS. In the case of erroneous CS detection, the data detection becomes random and the probability of bit error is http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq175_HTML.gif . Hence the probability of correct detection per data bit becomes
      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_Equ29_HTML.gif
      (19)
      Also, if http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq176_HTML.gif is the bit error probability for the CS detection, for a number of http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq177_HTML.gif CS bits the probability of correct CS detection becomes http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq178_HTML.gif . Following the above, the probability of success in the data detection considering the CS performance is given as
      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_Equ30_HTML.gif
      (20)
      while the resulting probability of data error per bit for imperfect CS detection is
      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_Equ31_HTML.gif
      (21)
      For http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq179_HTML.gif -PSK modulation the error probability per CS bit ( http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq180_HTML.gif ) is the flat fading http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq181_HTML.gif -PSK bit error probability [24] expressed as
      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_Equ32_HTML.gif
      (22)
      where http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq182_HTML.gif ,
      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_Equ33_HTML.gif
      (23)
      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_Equ34_HTML.gif
      (24)

      In (24) http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq183_HTML.gif is the amplitude of flat fading, http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq184_HTML.gif is the energy per bit, http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq185_HTML.gif is the noise power spectral density and http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq186_HTML.gif denotes the expected value of http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq187_HTML.gif . The probability of symbol error for QPSK modulation used in the simulations below can then be simply calculated using (22) and (23) for http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq188_HTML.gif . It can be observed that as the signal to noise ratio (SNR) increases and the CS detection becomes more reliable http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq189_HTML.gif tends to zero for which case (21) yields http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq190_HTML.gif . The value http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq191_HTML.gif for the proposed SA scheme is dependent on which of the investigated conventional techniques are used and how SA enhances performance. It is obvious that http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq192_HTML.gif for nonzero http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq193_HTML.gif , but the following simulations show that with the proposed SA the data detection error probability http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq194_HTML.gif is severely reduced compared to the corresponding conventional techniques. Hence http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq195_HTML.gif for SA is still significantly less than the error probability of the conventional methods. The exact error probability http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq196_HTML.gif cannot be calculated in closed form due to the fluctuations in the symbol allocation and the instantaneous crosscorrelation values between the symbols. Therefore, an exact expression of the final error probability http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq197_HTML.gif for imperfect CS detection cannot be derived. Simulation results are provided in the following section for the proof of the proposed method's superiority.

      8. Numerical Results

      This section presents the results of Monte Carlo simulations carried out for conventional MIMO precoding and detection schemes with and without the proposed SA for various numbers of antennas on frequency flat fading MIMO channels in order to illustrate the relevant performance comparison. While it is intuitive that the benefits of the proposed scheme extend to a variety of MIMO techniques, the simulations below focus on MMSE precoding and V-BLAST detection, as these schemes offer a practical performance-to-complexity tradeoff. For the simulations shown QPSK modulation has been employed and unless stated otherwise perfect channel estimates are assumed. For the transmission of CS an increased transmission power by a factor of two compared to the data transmission is assumed, which is a common method in practical systems to achieve reliable CS and eliminate the effect on data detection. To avoid confusion it should be clarified that to ease comparison to the results of [5, 9] the total transmitted SNR is used in the graphs for MMSE precoding while the values of transmitted SNR per receive http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq198_HTML.gif antenna are used in the graphs for V-BLAST detection.

      8.1. Reference Achievable Performance Gain

      As an initial point and to quantify the absolute performance benefit achievable by SA on MMSE precoding Figure 5 depicts the performance of MMSE-SA on a MIMO symbol rather than on a MIMO subframe basis ( http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq199_HTML.gif ) for a system with http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq200_HTML.gif . In the results shown here the symbol allocation is optimized at every symbol period and the candidates are increased up to the maximum possible http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq201_HTML.gif . In realistic scenarios this would impose a significant amount of CS which renders the SA scheme impractical. Hence the result here is shown for reference purposes only, ignoring the need for CS transmission. It can be seen that the benefit achievable for maximum http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq202_HTML.gif is almost 5 dB. It is worthwhile to note that drastically decreasing the candidate allocations to http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq203_HTML.gif and http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq204_HTML.gif imposes only an insignificant performance loss. The performance gain is halved however when http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq205_HTML.gif .
      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_Fig5_HTML.jpg
      Figure 5

      SER versus SNR for MMSE, MMSE-SA for increasing http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq206_HTML.gif , http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq207_HTML.gif , http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq208_HTML.gif , QPSK.

      8.2. Selection of Optimum http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq209_HTML.gif and Resulting Transmission-Reception Efficiency

      A profound insight of the performance to transmission efficiency tradeoff can be attained by Figures 5 and 6 where the symbol error rate (SER) performance and transmission efficiency are shown for increasing values of http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq210_HTML.gif , respectively. The same http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq211_HTML.gif MIMO system is considered but in this case a subframe-based optimization of the symbol allocation is employed as the one analyzed in Section 5. A subframe length of http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq212_HTML.gif time slots is assumed which derives a number of http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq213_HTML.gif data symbols per subframe. In Figure 6 the performance of MMSE precoding is shown for a total transmitted SNR of 20 and 25 dB and the performance of V-BLAST is included for transmitted SNR per antenna of 20 dB. It can be seen that for low values of http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq214_HTML.gif the performance gain for increasing http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq215_HTML.gif is significant while at higher values of http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq216_HTML.gif and http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq217_HTML.gif this benefit saturates. Considering the transmission efficiency diagram of Figure 7 and especially the curve for QPSK modulation of the CS bits it can be seen that the reduction in efficiency is considerable between http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq218_HTML.gif and http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq219_HTML.gif . Therefore it can be concluded that for the system investigated in the majority of simulations in this paper, for which http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq220_HTML.gif and http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq221_HTML.gif , the value of http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq222_HTML.gif provides a favorable performance-to-efficiency tradeoff. Hence, unless stated otherwise it is the one used in the following simulations. For this case the relevant transmission-reception efficiency of (17) is http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq223_HTML.gif %. It is apparent in Figure 7 that the transmission efficiency can be increased by using 16QAM modulation which for this value of http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq224_HTML.gif gives http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq225_HTML.gif % in the graph yielding less than 3% of overhead.
      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_Fig6_HTML.jpg
      Figure 6

      SER versus http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq226_HTML.gif for MMSE (SNR = 20 dB, 25 dB) and V-BLAST (SNR per rx antenna = 20 dB) using SA, http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq227_HTML.gif , http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq228_HTML.gif , QPSK.

      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_Fig7_HTML.jpg
      Figure 7

      Transmission-reception efficiency for SA for increasing http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq229_HTML.gif , http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq230_HTML.gif , http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq231_HTML.gif , QPSK.

      8.3. Further Performance Investigation

      The SER versus transmitted SNR performance for MMSE is shown in Figure 8 for the same system of http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq232_HTML.gif , http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq233_HTML.gif . The graph depicts the performance for both mapping mechanisms of Section 3, namely reordering and scrambling and it can be seen that for the same value of http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq234_HTML.gif both perform identically. Hence the results confirm that as mentioned above, it is the value of http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq235_HTML.gif that makes the difference in performance rather that the mapping method used. Moreover, to illustrate the superiority of the proposed projection criterion (15) over the Euclidean distance (ED) criterion (14) for the selection of http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq236_HTML.gif , the performance of the latter is also included for the case of error-free CS. It can be seen that the ED criterion only provides a minimal improvement with respect to the performance of the conventional system, while the existence of constructive interference for the proposed criterion offers a notable improvement. The performance of the system with error-free CS transmission is also depicted for comparison. It can be viewed that the negative impact of the CS transmission on the performance of the system is apparent at low SNR values where CS detection is problematic, while it becomes negligible for higher SNRs where the CS detection is reliable. As a result, for low SNRs the proposed technique is outperformed by conventional MMSE precoding due to the unreliability of the CS transmission. However, for the higher SNR values a considerable SER reduction can be observed which yields a 2 dB gain in the transmitted SNR for http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq237_HTML.gif for this 5×5 MIMO system. A 2.5 dB gain can be attained by allowing a reduction of the transmission efficiency using http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq238_HTML.gif for the same system.
      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_Fig8_HTML.jpg
      Figure 8

      SER versus SNR for MMSE, MMSE-SA with reordering or scrambling, projection-based optimisation and MMSE -SA with Euclidean distance (ED) optimisation http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq239_HTML.gif , http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq240_HTML.gif , QPSK.

      The performance of V-BLAST is investigated in Figure 9 where the bit error rate (BER) versus SNR per rx antenna is shown. The same MIMO system of http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq241_HTML.gif , http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq242_HTML.gif , http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq243_HTML.gif is assumed. Again the performances for both mapping techniques are depicted to validate their equality. The performance of the system with error-free CS transmission is also included for comparison and it is obvious that the negative impact of the CS transmission on the performance of the system only exists at low SNR values. At higher values an SNR gain of 5 dB can be viewed for V-BLAST-SA compared to conventional V-BLAST. Notably the BER reduction for SNR = 20 dB is of an order of a magnitude which consists of a worthwhile improvement for this small scale MIMO system. Again the performance of the ED criterion (14) for the selection of http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq244_HTML.gif , is also shown for comparison. Clearly, the proposed criterion benefits from allowing constructive interference in comparison to the ED criterion.
      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_Fig9_HTML.jpg
      Figure 9

      BER versus SNR for V-BLAST, V-BLAST-SA with reordering or scrambling, projection-based optimisation and V-BLAST-SA with Euclidean distance (ED) optimisation http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq245_HTML.gif , http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq246_HTML.gif , http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq247_HTML.gif , QPSK.

      Figure 10 shows the BER performance for increasing number of antennas for the symmetric ( http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq248_HTML.gif ) MIMO channel for the case of V-BLAST and V-BLAST-SA. Two sets of results are shown for the cases when the SNR per rx antenna takes the values of 10 dB and 15 dB. It can be seen that for practical values of http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq249_HTML.gif to http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq250_HTML.gif for point-to-point MIMO systems the proposed scheme considerably improves the performance of the conventional system. One can observe that the BER is improving up to a certain http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq251_HTML.gif for both techniques. This is because the SNR per receive antenna is considered here, which for increasing antennas derives increasing total SNR. Therefore the performance naturally increases up to a certain point where the ICI becomes dominant in the system. Overall the proposed scheme outperforms conventional V-BLAST for all values of http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq252_HTML.gif .
      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_Fig10_HTML.jpg
      Figure 10

      BER versus http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq253_HTML.gif for V-BLAST, V-BLAST-SA for SNR per http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq254_HTML.gif antenna = 10 dB and 15 dB, http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq255_HTML.gif , http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq256_HTML.gif , QPSK.

      In all simulations above the CSI is assumed perfectly known at the transmitter. However the processing of the proposed scheme as shown in Section 3 suggests that SA could be sensitive to CSI errors. To validate the usefulness of the proposed scheme in scenarios with erroneous channel estimates, Figure 11 depicts the BER performance of V-BLAST and V-BLAST-SA for increasing CSI errors. In order to maintain a generic performance comparison irrespective to any channel estimation technique or type of CSI errors, these errors are simulated by adding a complex random deviation to the channel coefficients available at the transmitter to derive an error in the estimated coefficients of
      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_Equ35_HTML.gif
      (25)
      Here http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq257_HTML.gif denotes the flat fading channel coefficient between the http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq258_HTML.gif transmit and the http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq259_HTML.gif receive antennas while http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq260_HTML.gif represents the corresponding channel estimate. Results for http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq261_HTML.gif % and http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq262_HTML.gif % are shown and for reasons of comparison the performance graphs for perfect CSI are retained in the figure. It can be seen that the performance of the proposed V-BLAST-SA degrades in the same way as conventional V-BLAST for increasing CSI errors. In all cases V-BLAST-SA still outperforms conventional V-BLAST for the higher SNR values when CS detection is reliable.
      http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_Fig11_HTML.jpg
      Figure 11

      BER versus SNR for V-BLAST, V-BLAST-SA for CSI errors http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq263_HTML.gif , http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq264_HTML.gif %, http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq265_HTML.gif %, http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq266_HTML.gif , http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq267_HTML.gif , http://static-content.springer.com/image/art%3A10.1155%2F2011%2F376394/MediaObjects/13638_2010_Article_2109_IEq268_HTML.gif , QPSK.

      9. Conclusions and Future Work

      The use of static data-to-antenna allocation leads to waste of useful energy inherent in the communication channel and makes conventional MIMO schemes suboptimal. By applying adaptive mapping on the data to be transmitted and introducing diversity in the interference between the transmitted symbols of the MIMO channel this work has shown that significant performance benefits are gleaned for MIMO systems. The tradeoff to this improvement is the need for control signaling for the correct data detection. Further work can be carried out towards reducing the CS overhead and applying the proposed scheme to further and more advanced MIMO techniques including resource allocation.

      Declarations

      Acknowledgments

      This work has been jointly funded by EPSRC and Philips Research Labs, UK. The authors would like to thank Dr. Tim Moulsley for the helpful discussions throughout this research contribution.

      Authors’ Affiliations

      (1)
      School of Electrical Engineering, Electronics & Computer Science, Queen's University Belfast
      (2)
      School of Electrical & Electronic Engineering, University of Manchester

      References

      1. Caire G, Shamai S: On the achievable throughput of a multiantenna Gaussian broadcast channel. IEEE Transactions on Information Theory 2003, 49(7):1691-1706. 10.1109/TIT.2003.813523MATHMathSciNetView Article
      2. Viterbo E, Boutros J: A universal lattice code decoder for fading channels. IEEE Transactions on Information Theory 1999, 45(5):1639-1642. 10.1109/18.771234MATHMathSciNetView Article
      3. Damen O, Chkeif A, Belfiore JC: Lattice code decoder for space-time codes. IEEE Communications Letters 2000, 4(5):161-163. 10.1109/4234.846498View Article
      4. Foschini GJ: Layered space-time architecture for wireless communication in a fading environment when using multi-element antennas. Bell Labs Technical Journal 1996, 1(2):41-59.View Article
      5. Wolniansky PW, Foschini GJ, Golden GD, Valenzuela RA: V-BLAST: an architecture for realizing very high data rates over the rich-scattering wireless channel. Proceedings of the URSI International Symposium on Signals, Systems, and Electronics (ISSSE '98), October 1998 295-300.
      6. Haustein T, von Helmolt C, Jorswieck E, Jungnickel V, Pohl V: Performance of MIMO systems with channel inversion. Proceedings of the 55th Vehicular Technology Conference (VTC '02), May 2002, Birmingham, Ala, USA 35-39.
      7. Peel CB, Hochwald BM, Swindlehurst AL: A vector-perturbation technique for near-capacity multiantenna multiuser communication—part I: channel inversion and regularization. IEEE Transactions on Communications 2005, 53(1):195-202. 10.1109/TCOMM.2004.840638View Article
      8. Tomlinson M: New automatic equaliser employing modulo arithmetic. Electronics Letters 1971, 7(5-6):138-139. 10.1049/el:19710089View Article
      9. Harashima H, Miyakawa H: Matched-transmission technique for channels with intersymbol interference. IEEE Transactions on Communications 1972, 20(4):774-780. 10.1109/TCOM.1972.1091221View Article
      10. Erez U, Shamai S, Zamir R: Capacity and lattice strategies for canceling known interference. IEEE Transactions on Information Theory 2005, 51(11):3820-3833. 10.1109/TIT.2005.856935MATHMathSciNetView Article
      11. El Gamal H, Caire G, Damen MO: Lattice coding and decoding achieve the optimal diversity-multiplexing tradeoff of MIMO channels. IEEE Transactions on Information Theory 2004, 50(6):968-985. 10.1109/TIT.2004.828067MATHMathSciNetView Article
      12. Costa MHM: Writing on dirty paper. IEEE Transactions on Information Theory 1983, 29(3):439-441. 10.1109/TIT.1983.1056659MATHView Article
      13. Rashid F, Liu KJR, Tassiulas L: Transmit beamforming and power control for cellular wireless systems. IEEE Journal on Selected Areas in Communications 1998, 16(8):1437-1449. 10.1109/49.730452View Article
      14. Heath RW, Sandhu S, Paulraj A: Antenna selection for spatial multiplexing systems with linear receivers. IEEE Communications Letters 2001, 5(4):142-144. 10.1109/4234.917094View Article
      15. Gharavi-Alkhansari M, Gershman AB: Fast antenna subset selection in MIMO systems. IEEE Transactions on Signal Processing 2004, 52(2):339-347. 10.1109/TSP.2003.821099MathSciNetView Article
      16. Sanayei S, Nosratinia A: Antenna selection in MIMO systems. IEEE Communications Magazine 2004, 42(10):68-73. 10.1109/MCOM.2004.1341263View Article
      17. Yu W, Rhee W, Boyd S, Cioffi JM: Iterative water-filling for Gaussian vector multiple-access channels. IEEE Transactions on Information Theory 2004, 50(1):145-152. 10.1109/TIT.2003.821988MATHMathSciNetView Article
      18. Yu W, Rhee W, Cioffi JM: Optimal power control in multiple access fading channels with multiple antennas. Proceedings of the International Conference on Communications (ICC '01), June 2001 575-579.
      19. Pan YH, Letaief KB, Cao Z: Dynamic spatial subchannel allocation with adaptive beamforming for MIMO/OFDM systems. IEEE Transactions on Wireless Communications 2004, 3(6):2097-2107. 10.1109/TWC.2004.841542View Article
      20. Masouros C, Alsusa E: Two-stage transmitter precoding based on data-driven code-hopping and partial zero forcing beamforming for MC-CDMA communications. IEEE Transactions on Wireless Communications 2009, 8(7):3634-3645.View Article
      21. Masouros C, Alsusa E: Interference exploitation using adaptive code allocation for the downlink of precoded multiple carrier code division multiple access systems. IET Communications 2008, 2(9):1118-1130. 10.1049/iet-com:20070628View Article
      22. Masouros C, Alsusa E: Dynamic linear precoding for the exploitation of known interference in MIMO broadcast systems. IEEE Transactions on Wireless Communications 2009, 8(3):1396-1404.View Article
      23. Patel P, Holtzman J: Analysis of a simple successive interference cancellation scheme in a DS/CDMA system. IEEE Journal on Selected Areas in Communications 1994, 12(5):796-807. 10.1109/49.298053View Article
      24. Proakis JG: Digital Communications, Electrical Engineering. 3rd edition. McGraw-Hill, New York, NY, USA; 1995.

      Copyright

      © C. Masouros and E. Alsusa. 2011

      This article is published under license to BioMed Central Ltd. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.