Multi-keyhole bridges the gap between single keyhole and full-scattering multiple-inputmultiple-output (MIMO) channels. In this paper, we therefore investigate the multi-keyhole effect on the MIMO amplify-and-forward...
详细信息
ISBN:
(纸本)9781424492688
Multi-keyhole bridges the gap between single keyhole and full-scattering multiple-inputmultiple-output (MIMO) channels. In this paper, we therefore investigate the multi-keyhole effect on the MIMO amplify-and-forward (AF) relay downlink transmission with orthogonal space-time block codes. In particular, we derive the analytical symbol error rate (SER) expression for the considered system with arbitrary number of keyholes. Moreover, SER approximations in the high SNR regime for several important special scenarios of multi-keyhole channels are further derived. These asymptotic results provide important insights into the impact of system parameters on the SER performance. Our analysis is confirmed by comparing with Monte-Carlo simulations.
This paper deals with the quadrature amplitude modulation (QAM) problem for the multiple-inputmultiple-output (MIMO) channel. Based on the maximum likelihood estimation, the QAM detection problem is formulated as an ...
详细信息
ISBN:
(纸本)9781479952557
This paper deals with the quadrature amplitude modulation (QAM) problem for the multiple-inputmultiple-output (MIMO) channel. Based on the maximum likelihood estimation, the QAM detection problem is formulated as an integer quadratic programming, which is a combinatorial problem and difficult to obtain exact solutions. In order to overcome combinatorial difficulties, this paper formulates the QAM detection problem as the l(o) norm minimization problem and relaxes it into a quadratic programming with the l(1) norm regularization. Utilizing and modifying the forward-backward splitting (FOBOS) algorithm, a new QAM detection algorithm is proposed. This algorithm has a trade-off between the computational cost and the detection accuracy, which depends on a parameter of the algorithm. Numerical simulations show that the proposed algorithm works well and achieves a good detection performance with less computational cost comparing with the semidefinite relaxation (SDR) based algorithm.
In this paper, we study the design of optimal robust training sequences for multiple-inputmultiple-output (MIMO) channel estimation, based on known second order statistics of both the channel and the colored disturba...
详细信息
ISBN:
(纸本)9781457713484
In this paper, we study the design of optimal robust training sequences for multiple-inputmultiple-output (MIMO) channel estimation, based on known second order statistics of both the channel and the colored disturbance, but with an uncertainty in the channel covariance matrix. More specifically, the training sequences are designed by taking the least-favorable channel covariance component into account throughout an iterative algorithm. Numerical experiments are carried out to demonstrate the performance gained by employing the proposed design procedure and to compare it with other relevant schemes.
In multiuser MIMO-CDMA systems, the layered space-time multiuser detector (LAST-MUD) can achieve high data rate and reliable communication by combining time-domain technique and space-domain technique. At the receiver...
详细信息
ISBN:
(纸本)9781424410200
In multiuser MIMO-CDMA systems, the layered space-time multiuser detector (LAST-MUD) can achieve high data rate and reliable communication by combining time-domain technique and space-domain technique. At the receiver side of LAST-MUD, the mathematical expression of the signals passing through the space-code matched filters is similar to the received signals of the V-BLAST system. This similarity makes it possible to apply some advance detection schemes originally used in single user V-BLAST system to multiuser MIMO-CDMA system. Recently, the B-Chase and L-Chase detectors have been developed to improve V-BLAST system performance. In this paper, we investigate the use of these two Chase based schemes to MIMO-CDMA system. The simulation results show that the performance of the L-Chase detector is worse than LAST-MUD due to the error in noise estimation, while the B-Chase detector can achieve a better performance than LAST-MUD.
We analyze the asymptotic behavior of compute-and-forward relay networks in the regime of high signal-to-noise ratios. We consider a section of such a network consisting of K transmitters and K relays. The aim of the ...
详细信息
ISBN:
(纸本)9781457705953
We analyze the asymptotic behavior of compute-and-forward relay networks in the regime of high signal-to-noise ratios. We consider a section of such a network consisting of K transmitters and K relays. The aim of the relays is to reliably decode an invertible function of the messages sent by the transmitters. An upper bound on the capacity of this system can be obtained by allowing full cooperation among the transmitters and among the relays, transforming the network into a K X K multiple-inputmultiple-output (MIMO) channel. The number of degrees of freedom of compute-and-forward is hence at most K. In this paper, we analyze the degrees of freedom achieved by the lattice coding implementation of compute-and-forward proposed recently by Nazer and Gastpar. We show that this lattice implementation achieves at most 2/(1 + 1/K) <= 2 degrees of freedom, thus exhibiting a very different asymptotic behavior than the MIMO upper bound. This raises the question if this gap of the lattice implementation to the MIMO upper bound is inherent to compute-and-forward in general. We answer this question to the negative by proposing a novel compute-and-forward implementation achieving K degrees of freedom.
In dense networks, interference becomes the main bottleneck for achieving high data rates. Topological interference management (TIM) is proposed to manage interference only based on network topology information to red...
详细信息
ISBN:
(纸本)9781728190549
In dense networks, interference becomes the main bottleneck for achieving high data rates. Topological interference management (TIM) is proposed to manage interference only based on network topology information to reduce the system overhead. In this paper we study the TIM problem in the multiple-inputmultiple-output (MIMO) interference channel with only the network connectivity information. For the general asymmetric channel with Mi antennas at each transmitter and Ni antennas at each receiver, we provide a topological interference alignment condition via carefully designing the structured transceivers. It turns out that the achievable degrees-of-freedom (DoFs) for each user grow linearly with min{M-i,N-i}. We further present a low-rank optimization approach to maximize the achievable DoFs, followed by developing a novel difference-of-convex programming algorithm with convergence guarantees. Numerical results demonstrate the effectiveness of the proposed methods for topological interference management in MIMO networks.
Recent studies unveiled that huge channel capacity can be achieved by employing multi-element antenna arrays at both transmitter and receiver. Foschini ***. proposed a vertical Bell Laboratories layered space-time (V-...
详细信息
ISBN:
(纸本)0780374002
Recent studies unveiled that huge channel capacity can be achieved by employing multi-element antenna arrays at both transmitter and receiver. Foschini ***. proposed a vertical Bell Laboratories layered space-time (V-BLAST) system with a detection algorithm based on decision feedback. This system is computational efficient and yet supporting a high data rate. However, the detection algorithm shows unsatisfactory performance when equal number of antennas are employed at both ends. In this paper, a parallel detection algorithm is proposed to improve the performance in such scenarios. The detector consists of many low complexity sub-detectors, all of them operating in parallel on a sub-channel matrix. By selecting the submatrix appropriately the overall performance can be improved substantially.
暂无评论