SOLUTIONS TO ECE 6603 ASSIGNMENT NO. 6

Similar documents
BASICS OF DETECTION AND ESTIMATION THEORY

Multi-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User MIMO Systems

The Sorted-QR Chase Detector for Multiple-Input Multiple-Output Channels

Direct-Sequence Spread-Spectrum

UTA EE5362 PhD Diagnosis Exam (Spring 2011)

Appendix B Information theory from first principles

392D: Coding for the AWGN Channel Wednesday, January 24, 2007 Stanford, Winter 2007 Handout #6. Problem Set 2 Solutions

ECE 564/645 - Digital Communications, Spring 2018 Homework #2 Due: March 19 (In Lecture)

Lecture 2. Capacity of the Gaussian channel

Multi-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User MIMO Systems

A Thesis for the Degree of Master. An Improved LLR Computation Algorithm for QRM-MLD in Coded MIMO Systems

A Hilbert Space for Random Processes

Improved Multiple Feedback Successive Interference Cancellation Algorithm for Near-Optimal MIMO Detection

Decomposing the MIMO Wiretap Channel

Maximum Likelihood Sequence Detection

Applications of Lattices in Telecommunications

Anatoly Khina. Joint work with: Uri Erez, Ayal Hitron, Idan Livni TAU Yuval Kochman HUJI Gregory W. Wornell MIT

Layered Orthogonal Lattice Detector for Two Transmit Antenna Communications

Data Detection for Controlled ISI. h(nt) = 1 for n=0,1 and zero otherwise.

Truncation for Low Complexity MIMO Signal Detection

Chapter 9 Fundamental Limits in Information Theory

Supplementary Figure 1: Scheme of the RFT. (a) At first, we separate two quadratures of the field (denoted by and ); (b) then, each quadrature

On the diversity of the Naive Lattice Decoder

This examination consists of 10 pages. Please check that you have a complete copy. Time: 2.5 hrs INSTRUCTIONS

Improved Methods for Search Radius Estimation in Sphere Detection Based MIMO Receivers

ECE 564/645 - Digital Communications, Spring 2018 Midterm Exam #1 March 22nd, 7:00-9:00pm Marston 220

LECTURE 18. Lecture outline Gaussian channels: parallel colored noise inter-symbol interference general case: multiple inputs and outputs

RADIO SYSTEMS ETIN15. Lecture no: Equalization. Ove Edfors, Department of Electrical and Information Technology

EE 121: Introduction to Digital Communication Systems. 1. Consider the following discrete-time communication system. There are two equallly likely

ECE Information theory Final (Fall 2008)

a) Find the compact (i.e. smallest) basis set required to ensure sufficient statistics.

Nulling-cancelling algorithm with selective maximum-likelihood detection for MIMO communication

Reduced Complexity Sphere Decoding for Square QAM via a New Lattice Representation

Imperfect Sampling Moments and Average SINR

Lecture 9: Diversity-Multiplexing Tradeoff Theoretical Foundations of Wireless Communications 1. Overview. Ragnar Thobaben CommTh/EES/KTH

Single-User MIMO systems: Introduction, capacity results, and MIMO beamforming

EE6604 Personal & Mobile Communications. Week 13. Multi-antenna Techniques

Random Matrix Theory Lecture 1 Introduction, Ensembles and Basic Laws. Symeon Chatzinotas February 11, 2013 Luxembourg

Simultaneous SDR Optimality via a Joint Matrix Decomp.

Channel Estimation under Asynchronous Packet Interference

Novel spectrum sensing schemes for Cognitive Radio Networks

Optimal Transmit Strategies in MIMO Ricean Channels with MMSE Receiver

Lecture 8: MIMO Architectures (II) Theoretical Foundations of Wireless Communications 1. Overview. Ragnar Thobaben CommTh/EES/KTH

ECE Information theory Final

Summary: SER formulation. Binary antipodal constellation. Generic binary constellation. Constellation gain. 2D constellations

Estimation techniques

The Asymmetric Golden Code for Fast Decoding on Time-Varying Channels

Lecture 9: Diversity-Multiplexing Tradeoff Theoretical Foundations of Wireless Communications 1

Parameter Estimation

Optimal Receiver for MPSK Signaling with Imperfect Channel Estimation

Lecture 18: Gaussian Channel

ECE 534 Information Theory - Midterm 2

Computing Probability of Symbol Error

MMSE Decision Feedback Equalization of Pulse Position Modulated Signals

Problem Set 7 Due March, 22

Constrained Detection for Multiple-Input Multiple-Output Channels

A Simple Example Binary Hypothesis Testing Optimal Receiver Frontend M-ary Signal Sets Message Sequences. possible signals has been transmitted.

An analysis of the computational complexity of sequential decoding of specific tree codes over Gaussian channels

One-Bit LDPC Message Passing Decoding Based on Maximization of Mutual Information

Chapter 7: Channel coding:convolutional codes

Trust Degree Based Beamforming for Multi-Antenna Cooperative Communication Systems

Digital Band-pass Modulation PROF. MICHAEL TSAI 2011/11/10

Lattice Reduction Aided Precoding for Multiuser MIMO using Seysen s Algorithm

Improved Detected Data Processing for Decision-Directed Tracking of MIMO Channels

Lecture 7 MIMO Communica2ons

Machine Learning 3. week

GEORGIA INSTITUTE OF TECHNOLOGY SCHOOL OF ELECTRICAL AND COMPUTER ENGINEERING Final Examination - Fall 2015 EE 4601: Communication Systems

Exercise 1. = P(y a 1)P(a 1 )

ANALYSIS OF A PARTIAL DECORRELATOR IN A MULTI-CELL DS/CDMA SYSTEM

1 Introduction to information theory

DSP Applications for Wireless Communications: Linear Equalisation of MIMO Channels

Physical Layer Binary Consensus. Study

ON DECREASING THE COMPLEXITY OF LATTICE-REDUCTION-AIDED K-BEST MIMO DETECTORS.

Feasibility Conditions for Interference Alignment

Expectation propagation for symbol detection in large-scale MIMO communications

IEEE C80216m-09/0079r1

Augmented Lattice Reduction for MIMO decoding

Lecture 15: Thu Feb 28, 2019

Distributed Scheduling for Achieving Multi-User Diversity (Capacity of Opportunistic Scheduling in Heterogeneous Networks)

EE6604 Personal & Mobile Communications. Week 15. OFDM on AWGN and ISI Channels

Lecture 5: Likelihood ratio tests, Neyman-Pearson detectors, ROC curves, and sufficient statistics. 1 Executive summary

Morning Session Capacity-based Power Control. Department of Electrical and Computer Engineering University of Maryland

UNIVERSITY OF DUBLIN

ABSTRACT. Efficient detectors for LTE uplink systems: From small to large systems. Michael Wu

ELEG 5633 Detection and Estimation Signal Detection: Deterministic Signals

Random Signal Transformations and Quantization

3F1: Signals and Systems INFORMATION THEORY Examples Paper Solutions

C4.5 - pruning decision trees

16.36 Communication Systems Engineering

Diversity-Multiplexing Tradeoff in MIMO Channels with Partial CSIT. ECE 559 Presentation Hoa Pham Dec 3, 2007

Capacity of AWGN channels

UCSD ECE153 Handout #40 Prof. Young-Han Kim Thursday, May 29, Homework Set #8 Due: Thursday, June 5, 2011

Lecture 8: Channel Capacity, Continuous Random Variables

Incremental Coding over MIMO Channels

Solution to Homework 1

Shannon meets Wiener II: On MMSE estimation in successive decoding schemes

Soft-Input Soft-Output Sphere Decoding

Linköping University Post Print. MIMO Detection Methods: How They Work

Lecture 7: Wireless Channels and Diversity Advanced Digital Communications (EQ2410) 1

Title. Author(s)Tsai, Shang-Ho. Issue Date Doc URL. Type. Note. File Information. Equal Gain Beamforming in Rayleigh Fading Channels

Transcription:

SOLUTIONS TO ECE 6603 ASSIGNMENT NO. 6 PROBLEM 6.. Consider a real-valued channel of the form r = a h + a h + n, which is a special case of the MIMO channel considered in class but with only two inputs. Assume a and a are independently and uniformly chosen from the binary alphabet {}, and assume that the noise components are real, independent and Gaussian with variance. This problem compares the jointly optimal (JML) detector, which jointly chooses a and a to maximize the conditional pdf f(r a, a ), to the individually optimal (IML) detector for the first input, which chooses a to maximize f(r a ). Let y = h T r, let y = h T r, and let = h T h. The JML detector chooses the pair (a, a ) T to maximize the conditional pdf f(r a, a ). It thus decides a = when max{f (r, ), f (r, )} > max{f (r, ), f (r, )} or equivalently, since the logarithm is monotonic: JML â = sign log---- maxfr fr. maxfr fr In contrast, the IML detector chooses its decision for a to maximize fra f(r a ) = + fra. fr a In other words, the IML detector chooses â according to the sign of log = -- : fr a = IML â = sign log- fr + fr. fr + fr Comparing, we see that the IML and JML detectors can be put into the same form: aˆ = sign log-- hfr fr, hfr fr where h JML (x, y )=max(x, y) for the JML detector, and h IML (x, y )=x + y for the IML detector. But f(r a, a ) = --- --e r a h a h --- = --e r + h + h a e y + a y a a --- a y a y + a a = K e, where K is a constant, independent of a and a. Plugging this into the above yields:

aˆ y h Ke + y y Ke y + = sign log--- y h Ke + y + y Ke y y Ke y h e y e = sign log---, y -- y Ke h e + y e + where we used the fact that h(ax, Ay) = Ah(x, y) for both definitions of h(, ) and for any constant A. The above equation simplifies to: y aˆ = sign y h e y e +. log-- y h e + y e + (a) Show that the JML decision for a can be expressed as: JML â = sign y + -- g 0 (y ) -- g 0 (y + ), where we have introduced the nonlinearity g 0 (x) = x. Using the above with h JML (x, y )=max(x, y) yields: y â JML = sign y max e y e + log---- y max e + y e + y = sign y --- e log-- + y + ---- e = sign y + -- y -- y + = sign y + -- g 0 (y ) -- g 0 (y + ), where we have introduced the nonlinearity g 0 (x) = x.

(b) Show that the IML decision for a is also given by the above equation, but with g 0 (x) = x replaced by g (x) = log cosh(x/ ). This nonlinearity is sketched below: g (x) 0.5 =0 0. 0.3 0.5 0 0.5 x For the special case of IML, where h IML (x, y) = x + y, the general result reduces to: â IML = sign y y e y e + + log---- y e + y e + + = sign y cosh y ---- + log y + cosh ---- = sign y + y logcosh ---- logcosh, y + ---- =sign y + -- g (y ) -- g (y + ), where g (x) = logcosh(x/ ).

(c) Show that g (x) x as 0. It follows that â IML and â JML usually agree at high SNR. The function g (x) is defined by: But e x / g (x) = e log x/ e + x/ = e log x / e + x /. goes to zero as 0, so that: g (x) = log e x / + e x / log() log e x = loge x / = log(e x ) = x. It follows that JML â and IML â usually agree at high SNR. (d) Find a value for y such that â IML 6= â JML, assuming y =, = and =. When y = = =, the JML and IML detectors reduce to: â JML = sign y, IML â = sign y + -- g (0) -- g () = sign y 0.665. So any y satisfying -- IML JML g () 0.665 < y < will result in â = but a =.

PROBLEM 6.. Consider the three-input memoryless channel H =[h,h,h 3 ], where h = [, 0,, 0] T, h = [,, 0, 0] T, and h 3 = [, 0,, ] T. Suppose the inputs are i.i.d. uniformly chosen from{}, and the channel adds real white-gaussian noise having the identity as an autocorrelation matrix. The QG decomposition of the matrix H = QG yields a lower-triangular G matrix whose first diagonal element G is positive and real. If y is the first component of the WMF output y = Q*r, then it may be expressed as: y = G a + n, where n is a Gaussian random variable with variance =. The probability that the stack sphere detector extends the node that does not belong to the transmitted path can be expressed as: P e = P( y G a > y + G a ). After substituting for y, this probability becomes: P( n > n + G a )= P(G + n a < 0) = P(n > G ) = Q( G ). The larger G is, the less likely it is that the sphere detector will extend the wrong branch from the root. (a) Assuming the stack sphere detector is used with the natural ordering, find a numerical value for the probability that the first node extended (besides the root node) is not a part of the actual transmitted path. In the natural ordering, the QG decompostion of H =[h, h, h 3 ] yields the following G matrix: 0.7746 0 0 G = 0.58.9 0..547 0.5774.73 Therefore, the probability of extending to the wrong half of the tree is: Q( G ) = Q( 0.7746) = %.

(b) Repeat part (a) based on the -3- ordering (which is the optimal BLAST ordering). In the -3- ordering, the QG decompostion of [ h, h 3, h ] yields the following G matrix:.47 0 0 G = 0 0. 0.707.44.44 Therefore, the probability of extending to the wrong half of the tree with BLAST ordering is: Q( G ) = Q(.47) = %. (c) Based on a comparison of (a) and (b), argue qualitatively why the BLAST ordering reduces the complexity of the sphere detector tree search. The complexity of the sphere detector is directly related to how many nodes are visited by the search algorithm, and indirectly related to how quickly the cost threshold J is reduced. If the stack sphere detector extends to the correct node at the first stage, then it will search the correct side of the tree first, thereby establishing a low cost threshold J for its tentative decision. With this small cost threshold, searching the wrong side of the tree becomes less complex since many of its nodes will have costs greater than J, allowing them and their subbranches to be pruned. Comparing the answers from parts (a) and (b), we see that the stack sphere detector is half as likely to extend the wrong node at the first stage when the BLAST ordering is used instead of the natural ordering. Therefore, with the BLAST ordering, the stack sphere detector is half as likely to waste unnecessary computations searching the wrong side of the tree.

PROBLEM 6.3. Consider a -by- MIMO channel of the form r = a h + a h + n, where the components of the noise vector are i.i.d. CN(0, ), and where a and a are independently and uniformly chosen from the 4-QAM alphabet { j}. Suppose that the channel matrix is: H =[h,h ] =. 0 (a) ZF Find the weights w of the decentralized ZF detector for a, and ZF find the weights w of the decentralized ZF detector for a. These weights are the two rows of the channel inverse: H = 0 = 0 first row w ZF = [, 0] T (b) second row w ZF = [, ] T Find the weights w MF of the decentralized MF detector for a, and find the weights w MF of the decentralized MF detector for a. w MF = h = [, ] T w MF = h = [0, ] T (c) Find an equation for the SNR of the decentralized ZF detector for a. After the the ZF filter: y = ( w ZF ) T r = [, ]r = r r = (a + a + n ) (a + n ) E a = a + n n SNR = --- = =. E n n ---- - (d) Find an equation for the error probability of the decentralized ZF detector for a. After the the ZF filter: y = (w ZF ) T r = [, 0]r = r E a = a + n SNR = ---- =. E n -

For 4-QAM in AWGN with no ISI, the symbol-error probability is (see ECE660): P e = Q( ) Q SNR ( SNR ) Q( SNR ) = Q( - ). In the same conditions, and with Gray coding, the bit-error probability is (see ECE660): P b = Q( SNR ) = Q( - ). (e) Find an equation for the error probability of the decentralized MF detector for a. After the the MF filter: y = (w MF ) T r = [, ]r = r + r = (a + n ) + (a + a + n ) = a + a + n + n. Taking the real part yields: z = b + b + w + w, where z i = Re{y i }, b i = Re{a i } {±}, and w i = Re{n i } N(0, /). The decision about b will be incorrect when the sign of z disagrees with the sign of b. Equivalently, the decision will be incorrect when the product z b is negative: P b = P(z b < 0) = P((b + b + w + w )b < 0) = P( + b b + b w + b w < 0). Making the observation that the product b b {±} has exactly the same distribution as b alone, and similarly that the product b w i has exactly the same distribution as w i alone, we can simplify P b to: P b = P( + b + w + w < 0) = -- P( + + w + w < 0 b =+) + -- P( + w + w < 0 b = ) = -- P(3 + w + w < 0) + -- P( + w + w < 0) = -- P( (w + w ) > 3) + -- P( (w + w ) > ) = -- Q( 3 ) + -- Q( ).

(f) Find an equation for the single-user-bound (SUB) on error probability for both a and a. These can be derived from the SUB on the SNR, since there is no interference to consider in this case, and since the noise is AWGN; from ECE660 we learned that the relationship between bit-error probability and SNR in AWGN without interference for 4-QAM is: P b = Q( SNR ). The SUB on the SNR for the two symbols is: Therefore: SNR SUB = kh k / = -, SUB SNR = kh k / = -. SUB P b, = Q( - ), SUB P b, = Q( - ).

PROBLEM 6.4. A 5-input 0-output MIMO channel transmits an independent 6-QAM symbol from each of the 5 transmit antennas. This question is about the structure of the detection tree. (a) How many layers are in the detection tree? One for each transmitter n = 5 layers. (b) How many branches emanate from each non-leaf node in the detection tree? One for each candidate symbol A = 6 branches. (c) How many leaf nodes are in the detection tree? One for each candidate symbol vector A n = 6 5 = 0 = 048576 > million. (d) How many total nodes (including the root node and leaf nodes and all in between) are in the detection tree? Including the single root node at layer 0, the total number of nodes in the tree is: P n N = =0 A P 5 = =0 6 = + 6 + 56 + 4096 + 65536 + 048576 = 848 total nodes. (e) How many branches in all are in the detection tree? There is precisely one branch leading into each nonroot node. Subtracting one from the answer in part (d), to exclude the root node, we get: 8480 total branches.