Next Article in Journal
Accelerated Maximum Entropy Method for Time Series Models Estimation
Previous Article in Journal
Robustness of the -Rule for an Unreliable Single-Server Two-Class Queueing System with Constant Retrial Rates
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Complexity-Efficient Sidelink Synchronization Signal Detection Scheme for Cellular Vehicle-to-Everything Communication Systems

1
Department of Computer Engineering and Convergence Engineering for Intelligent Drone, Sejong University, Seoul 05006, Republic of Korea
2
ICT Convergence Research Division, Intelligent Device Research Center, Gumi Electronics & Information Technology Research Institute (GERI), Gumi 39171, Republic of Korea
*
Author to whom correspondence should be addressed.
Mathematics 2023, 11(18), 4003; https://doi.org/10.3390/math11184003
Submission received: 21 August 2023 / Revised: 12 September 2023 / Accepted: 13 September 2023 / Published: 20 September 2023
(This article belongs to the Section Network Science)

Abstract

:
Synchronization is a challenging issue in vehicle-to-everything (V2X) cellular communication, especially when V2X devices need to directly communicate with each other outside the network coverage area. By adopting the maximum likelihood principle, we propose joint detection of the sidelink secondary synchronization signal (SL-SSS) and carrier frequency offset (CFO) in a V2X system using 5G new radio sidelink. We formulate an effective joint coherent synchronization scheme for cellular V2X applications by decoupling the estimation of the sidelink identity and CFO, which requires a priori knowledge of channel state information. To verify the feasibility of the proposed detection scheme, we derive a simplified implementation of the proposed SL-SSS detector and a closed-form expression for the detection probability. Simulation results demonstrate that the proposed SL-SSS detector exhibits either comparable performance in terms of detection probability or reduced complexity when compared with conventional SL-SSS detectors. Using the proposed method in the cellular V2X system enables V2X devices to achieve robust synchronization with reduced power consumption during the initial synchronization procedure, while also offering valuable insights for designing a simple, efficient sidelink synchronization receiver.

1. Introduction

Device-to-device (D2D) communication is a prime enabler that creates direct interaction between 5G-enabled user devices without the participation of the cellular network [1]. Sidelink D2D communication is considered a key technology in advancing wireless cellular networks from 4G long-term evolution-advanced (LTE-A) to 5G new radio (NR). Standardization developments towards 5G NR in 3rd-generation partnership project (3GPP) releases 16 and 17 focus on feature enhancements for cellular vehicle-to-everything (V2X) communication using NR sidelink [2,3,4]. The main scenario of NR sidelink addresses D2D-enabled V2X use cases, such as vehicle platooning, advanced driving, extended sensors, and remote driving [5,6,7]. A main challenge in 5G NR-V2X applications is meeting the rigorous reliability and latency demands while simultaneously enhancing coverage using relays [8]. In order to achieve these goals, releases 16 and 17 establish the role of 5G in supporting advanced V2X services and ensuring vehicle quality of service (QoS) support. Thus, V2X communication is anticipated to play a pivotal role in 5G NR systems [4].
In NR-V2X cellular communication, synchronization information can be periodically broadcasted with source user equipment (UE) to increase the synchronization coverage of a synchronization source and to facilitate multiple UE devices to align the time reference with each other [9,10]. When UE devices are in different, non-synchronized cells, or one or more UE devices are out of coverage, UE devices have to synchronize with one another via sidelink synchronization signal (SLSS) [11], which is transmitted within a sidelink synchronization signal block (SL-SSB). Figure 1 illustrates the synchronization modes of V2X networks. As shown in Figure 1, achieving synchronization across a network, especially in situations with partial coverage and in out-of-coverage scenarios where V2X UE devices communicate directly among themselves, poses a big challenge. In each SL-SSB, a sidelink primary synchronization signal (SL-PSS) and a sidelink secondary synchronization signal (SL-SSS) together carry information such as the source identifier of the transmitting UE, as well as synchronization information. At the beginning of communication, the SLSS is used for timing- and frequency-offset estimation. By identifying the SLSS transmitted by a source UE device, nearby UE devices can be synchronized with the source UE device and can estimate the symbol timing offset (STO) as well as carrier frequency offset (CFO) [12]. Once the initial STO and CFO have been removed from the time domain, a UE device attempts to acquire a sidelink identity by decoding the sidelink synchronization identity (SSID) information transmitted by the SLSS, which includes both the in-coverage indicator and the SLSS identifier (SLSSID) [13]. The problem of detecting the SLSS can be primarily divided into two main challenges. Firstly, the V2X UE device lacks information about the system timing, and secondly, the frequency of the local oscillator is not fully synchronized with the network [14]. Consequently, significant time and frequency uncertainties may be present between the V2X UE and the network, posing a substantial challenge to initial sidelink acquisition [15]. To establish robust synchronization under such demanding conditions, various synchronization strategies have been investigated in the existing literature [14,15,16,17,18].
The first step of the synchronization procedure on the UE side is the detection of the SL-PSS and the determination of the in-coverage indicator transmitted in the SL-PSS. After SL-PSS detection, the UE device attempts to detect the SLSSID transmitted in the SL-SSS [16]. Generally, there are two main strategies for detecting the SL-SSS, which can be performed in a coherent or non-coherent manner [17,18,19]. Once the SL-PSS has been identified, the UE device becomes ready for obtaining channel state information (CSI) to coherently detect the following SL-SSS. However, an interfering SL-PSS received from a neighboring next-generation nodeB (gNodeB) may deteriorate the performance of the initial CSI estimation. Due to the difficult task of CSI estimation, differential detection is commonly used for non-coherent SL-SSS detection (NSD), thereby avoiding any CSI estimation [19]. In this way, the effect of multipath fading and timing offset is removed from the received SL-SSS without resorting to the use of CSI. In spite of its simple implementation and robustness to Doppler frequency, the performance of the NSD approach heavily depends on the amount of frequency selectivity over the signal bandwidth. Since the SL-PSS is transmitted on two consecutive orthogonal frequency division multiplexing (OFDM) symbols, average channel estimation of the SL-PSS becomes feasible and thus provides an improved CSI estimate. Using available CSI, various coherent SL-SSS detection (CSD) schemes have been proposed in the literature [17,18]. However, in situations where the time selectivity of the channel prevents accurate CSI estimation and the Doppler effect can be high enough, the performance of the CSD methods deteriorates accordingly. In [18], the two binary m-sequences comprising a SL-SSS can be detected independently without relying on mutual information, which contributes to simplifying the complexity of the SL-SSS detector. Nevertheless, this computational advantage comes at the expense of sacrificing detection performance. After successfully detecting SL-SSS, the UE device gains access to important system information transmitted via a physical broadcast channel (PBCH). To decode PBCH successfully, it is essential to track and eliminate the remaining residual CFO (RCFO) since it persists even after CFO compensation. For this reason, it is important to design a cost-effective and still high-performance SL-SSS detection method for 5G V2X vehicular communications. Additionally, the initial synchronization procedure in 5G NR-V2X systems becomes notably challenging due to the necessity to evaluate 336 potential SL-SSS candidates for detection.
This paper presents a reduced-complexity formulation for SL-SSS detection in cellular V2X communication systems, supported by a coherent algorithm based on a priori knowledge of the CSI. The main contributions of this paper are stated as follows.
  • By utilizing the cyclic-shifted property of SL-SSS derived from m-sequence and adopting the maximum likelihood (ML) detection principle, we design a computationally efficient SL-SSS detection method to simultaneously estimate the SLSSID and RCFO in a decoupled manner without sacrificing detection performance.
  • The benefit of employing the identical correlation function for SLSSID detection is the capability to concurrently estimate the RCFO, thus resulting in a more straightforward design for the synchronization receiver.
  • Such a design makes it easier to achieve robust joint detection of the SLSSID and RCFO in the presence of significant frequency-selective fading and STO.
  • In order to validate the viability of the proposed SL-SSS detection method, we compare the performance of the proposed and conventional SL-SSS detectors in terms of detection probability and computational complexity.
  • Simulation results confirm that the proposed SL-SSS detection method is computationally efficient and achieves detection performance comparable with that of existing approaches, thereby making it as a strong candidate for synchronization receivers in 5G NR-V2X systems.
The reminder of this paper is as follows. Section 2 presents the system model for 5G NR-V2X communication. Section 3 highlights the reduced-complexity SL-SSS synchronization method. The numerical results, demonstrating the benefits of the proposed detector, are presented in Section 4. Finally, the paper is summarized in Section 5.

2. System Model

2.1. Signal Model

We adopt an OFDM system which has N equi-width subcarriers. A time-domain OFDM symbol with a duration of T is generated through the application of an N-point inverse discrete Fourier transform (IDFT) to the complex data symbol X l ( v ) , v = 0 , 1 , , N 1 . In order to preserve inter-symbol interference free transmission, a guard interval (GI) of duration T g is appended to the useful part of the OFDM signal, leading to blocks of length T u = T + T g . For a given symbol index l, thus, the time-domain modulated signal with duration T u = ( N + N g ) T s is described as
x l ( n ) = v = 0 N 1 X l ( v ) e j 2 π v n / N
where T s is the amount of time between consecutive output samples, N g is the number of cyclic prefix (CP) samples used for GI insertion, n = N g , N g + 1 , , N 1 is the time sample index, and X l ( v ) is the complex-valued data symbol.
In this paper, we consider the situation in which there remain an uncompensated integer CFO (ICFO), RCFO, and residual STO (RSTO) after the initial synchronization process in the pre-DFT stage [20]. As reported in [18], the RSTO has little impact on the detection performance during the post-DFT synchronization stage. Supposing that the RSTO is known to the receiver, the transmit signal x l ( n ) linearly convolves with the multi-path fading channel characterized by channel impulse response h l ( n ) . In the time domain, then, the received signal during the l-th period is represented as
y l ( n ) = e j 2 π l ( η + ε ) N s / N e j 2 π ( η + ε ) n / N h l ( n ) x l ( n ) + z l ( n ) , n = N g , N g + 1 , , N 1
where η is the normalized ICFO with respect to the frequency spacing between adjacent subcarriers denoted by Δ f , ε is the normalized RCFO with respect to Δ f , N s = N + N g , ⊗ is the linear convolution operator, and z l ( n ) is the zero-mean additive white Gaussian noise (AWGN) with variance σ z 2 . Assuming that the GI duration is sufficiently large to absorb the multi-path channel effect, it can be safely discarded at the receiver. After the DFT process is performed over the CP-removed signal, the demodulated OFDM symbol under the effect of normalized CFO turns into [21]
Y l ( v ) H l ( v η ) X l ( v η ) e j 2 π ζ ( l N s + N g ) / N + I l ( v ) + Z l ( v )
where l denotes the symbol index, ζ = η + ε , H l ( v ) denotes the CSI following the complex Gaussian distribution CN ( 0 , σ H 2 ) , I l ( v ) denotes the inter-channel interference (ICI) term having variance σ I 2 , and Z l ( v ) denotes the AWGN term having Z l ( v ) CN ( 0 , σ Z 2 ) . The notation x CN ( y , z ) indicates that a complex random variable x follows a complex normal distribution with mean y and variance z.

2.2. Synchronization Signal

The NR-V2X supports 672 physical-layer SSIDs. Each SSID is generated by uniquely combining 1 SL-PSS and 1 SL-SSS out of the 2 SL-PSS and 336 SL-SSS possible candidates, respectively. As a consequence, each SSID is a unique number assigned according to N S S I D = s + 336 u , where u { 0 , 1 } and s { 0 , 1 , 2 , , 335 } stand for identifiers of the SL-PSS and SL-SSS out of the SL-PSS and SL-SSS possible candidates, respectively. Depending on the in-coverage or out-of-coverage statuses of the UE devices, the number of possible SSIDs is partitioned into two groups. For the in-coverage case ( u = 0 ), the UE device periodically sends SL-PSS sequences indicated by N S S I D 335 . For the out-of-coverage scenarios ( u = 1 ), on the other hand, the UE device transmits SL-PSS sequences indicated by N S S I D > 335 . In order to provide higher coverage, the SL-PSS and SL-SSS are both broadcasted twice consecutively within each SL-SSB.
In the frequency domain, the SL-PSS is generated by a maximum length sequence (m-sequence) with a length of 127 points, thus occupying 127 subcarriers of the SL-SSB bandwidth. By cyclically shifting a basic m-sequence c ( n ) , one obtain two unique SL-PSS symbols as follows:
m u ( n ) = 1 2 c ( [ n + 22 + 43 u ] mod N m ) , 0 n < N m
where u { 0 , 1 } serves as an identifier of the SL-PSS among the candidate sequences and N m = 127 denotes the length of SL-PSS symbol. Let us denote M u ( v ) as the SL-PSS symbol transmitted at subcarrier v, which is defined as
M u ( v ) = m u ( v 2 ) , 2 v 128 0 , otherwise
where the same SL-PSS sequence is allocated to the second and third OFDM symbols of each SSB. The SL-SSS is generated by concatenating two m-sequences to overcome poor cross-correlation issue, which forms a gold sequence with a length of also 127 points. The generation of the SL-SSS is given by
g s ( n ) = [ 1 2 c 0 ( [ n + 15 s / 112 + 5 u ] mod N m ] × [ 1 2 c 1 ( [ n + ( s mod 112 ) ] mod N m ) ] , 0 n < N m
where s { 0 , 1 , 2 , , 335 } serves as an identifier of the SL-SSS among the candidate sequences and · stands for the floor operation. The formulation of two sequences c 0 ( n ) and c 1 ( n ) is described in detail in [3]. Identically, g s ( n ) is allocated onto N m SL-SSS subcarriers with { 2 v 128 } , producing G s ( v ) as follows:
G s ( v ) = g s ( v 2 ) , 2 v 128 0 , otherwise
where the same SL-SSS sequence is mapped to the fourth and fifth OFDM symbols of each SSB. This paper focuses on the SL-SSS synchronization in NR-V2X vehicular systems.

2.3. SL-SSS Detection

In the literature, SL-SSS detection systems are classified into two categories: coherent detection and non-coherent detection [17,18,19]. First, the CSD method uses the CSI derived from SL-PSS. In the CSD approach, the cost function is described as [17]
Ω c s d ( c ) = i = 0 1 v G Y ˜ l + i * ( v + η ) Y l + i + 2 ( v + η ) G c * ( v )
where c { 0 , 1 , 2 , , 335 } is the available trial value of s, G = { v | 2 v 128 } with N m = 127 elements, and Y ˜ l + i ( v + η ) = Y l + i ( v + η ) P u * ( v ) is the received signal from which the SL-PSS sequence is compensated during the second and third OFDM symbol periods of each SSB. On the other hand, using the differential correlation between adjacent subcarriers is one of the most popular NSD strategies. In this case, the cost function is given by [19]
Ω n s d ( c ) = i = 0 1 v D Y l + i + 2 ( v + η ^ ) Y l + i + 2 * ( v + η ^ 1 ) G c * ( v ) G c ( v 1 )
where D = { v | 3 v 128 } with N m 1 elements. For both the CSD and NSD methods, the estimate s ^ can be found by locating a maximum of Ω c s d ( c ) or Ω n s d ( c ) over 336 candidate values of c. This process requires computationally expensive operations caused by a large number of possible hypotheses. Therefore, the development of a computationally efficient SL-SSS detection method holds significant importance in the 5G NR-V2X system.

3. Proposed SL-SSS Detection Method for V2X Systems

This section presents joint synchronization of SL-SSS and RCFO, which is based on the ML detection principle. In order to evaluate the usefulness of the proposed SL-SSS detector, we develop a simplified alternative and calculate its corresponding analytical detection probability.
For a simple presentation, assume that the SL-PSS with an in-coverage indicator u is present on the l-th OFDM symbol within each SSB such that M u ( v ) = X l ( v ) = X l + 1 ( v ) and G s ( v ) = X l + 2 ( v ) = X l + 3 ( v ) . To counteract the impacts of interference and fading channel, we use the average correlation among the received four consecutive SLSSs. As seen from (6), the SL-SSS can be represented by the concatenation of two m-sequences as follows: G s ( v ) = G 0 , s 0 ( v ) G 1 , s 1 ( v ) for s 0 = s / 112 { 0 , 1 , 2 } and s 1 = ( s mod 112 ) { 0 , 1 , 2 , , 111 } , where G 0 , s 0 ( v ) and G 1 , s 1 ( v ) stand for m-sequences mapped from c 0 ( n ) and c 1 ( n ) in a subcarrier-wise manner, respectively. Based on in-coverage indicator u detected using the SL-PSS, G 0 , s 0 ( v ) forms one of three m-sequences created by applying a cyclic shift of length 15 s 0 + 5 u to a basic code and G 1 , s 1 ( v ) is designed with the same sequence for all three sequences G 0 , s 0 ( v ) ’s ( s 0 = 0 , 1 , 2 ), therefore generating a total number of 336 SLSSIDs. According to this formulation, an SLSSID s is associated with a pair ( s 0 , s 1 ) in such a way that s = s 1 + 112 s 0 .

3.1. Approximate ML Detection Scheme

In this section, we consider that the OFDM receiver collects four observation SLSS vectors of length N m , Y l , Y l + 1 , Y l + 2 , Y l + 3 , to detect the SLSSID and RCFO. Denote Y l + d = [ Y l + d ( 2 ) , , Y l + d ( 128 ) ] T ( d = 0 , 1 , 2 , 3 ). For the simplicity of notations, let us consider a situation where the ICFO η and in-coverage indicator u are perfectly known at the UE receiver. Furthermore, G a , b ( v ) = G 0 , a ( v ) G 1 , b ( v ) , where a { 0 , 1 , 2 } is the possible identifier of s 0 and b { 0 , 1 , 2 , , 111 } is the possible identifier of s 1 . Applying the ML estimation principle, one can obtain the conditional joint probability density function (PDF) of the SLSS vectors Y l + d ( d = 0 , 1 , 2 , 3 ) as
f ( Y l , Y l + 1 , Y l + 2 , Y l + 3 | a , b , ε ) = 1 ( 2 π σ 2 ) 2 N m exp { 1 2 σ 2 × i = 0 1 v G Y ˜ l + i + 2 a , b ( v + η ) e j 4 π ( η + ε ) ϱ Y ˜ l + i ( v + η ) 2 }
where σ 2 stands for the appropriate noise variance, ϱ = ( N + N g ) / N , and Y ˜ l + i + 2 a , b ( v + η ) = Y l + i + 2 ( v + η ) G a , b * ( v ) stands for the received signal from which the SL-SSS sequence is compensated during the fourth and fifth OFDM symbol periods of each SSB.
The ML optimization problem is to jointly choose the SLSSID and RCFO in order to maximize the conditional PDF f ( Y l , Y l + 1 , Y l + 2 , Y l + 3 | a , b , ε ) with respect to ( a , b , ε ) , which is described as
( s ^ 0 , s ^ 1 , ε ^ ) = arg   max ( a , b , ε ) f ( Y l , Y l + 1 , Y l + 2 , Y l + 3 | a , b , ε ) .
Since M u ( v ) has already been detected before the process of detecting SL-SSS, the UE device tries to jointly detect the SLSSID and RCFO by performing
( s ^ 0 , s ^ 1 , ε ^ ) = arg   max ( a , b , ε ) Ψ ( a , b , ε )
where
Ψ ( a , b , ε ) = i = 0 1 v G Y ˜ l + i + 2 a , b ( v + η ) e j 4 π ( η + ε ) ϱ Y ˜ l + i ( v + η ) 2 .
After some arithmetic calculations, (13) is simplified as
Ψ ( a , b , ε ) = 2 Ω ( a , b ) e j 4 π ε ϱ Ξ ( a , b )
where { · } stands for a real part of the enclosed quantity,
Ω ( a , b ) = i = 0 1 v G Y ˜ l + i * ( v + η ) Y l + i + 2 ( v + η ) G a , b * ( v ) e j 4 π η ϱ ,
and
Ξ ( a , b ) = i = 0 1 v G | Y ˜ l + i ( v + η ) | 2 + | Y ˜ l + i + 2 a , b ( v + η ) | 2 .
Since Ξ ( a , b ) is independent of both a and b, it can be dropped from the optimization task in (12), resulting in an approximate ML (AML) estimate of ( s 0 , s 1 , ε ) simply as
( s ^ 0 , s ^ 1 , ε ^ ) = arg   max ( a , b , ε ) Ω ( a , b ) e j 4 π ε ϱ .
For each trial value of ( a , b ) , the AML estimator performs an exhaustive search of ε by appropriately quantizing the possible RCFO values, which incurs a heavy computational load. In order to solve the complexity issue involved with maximizing (17) with respect to ( s 0 , s 1 , ε ) , a low-complexity alternative is presented in the following section.

3.2. Low-Complexity SL-SSS Detection Scheme

Since the superscripts ( a , b ) are omitted from Ξ ( a , b ) and it is apparent from (13) that Ψ ( a , b , ε ) is negative, the cost function Ψ ( a , b , ε ) reaches its maximum when { Ω ( a , b ) e j 4 π ε ϱ } is maximized. To achieve this goal, it is necessary that { Ω ( a , b ) e j 4 π ε ϱ } = { Ω ( a , b ) } 4 π ε ϱ = 0 . Based on this implication, ε can be estimated in a closed form as follows:
ε ^ = 1 4 π ϱ Ω ( a , b )
where is the angle operation. Note that the estimation range of (18) is limited by | ε | 1 / ( 4 ϱ ) . Using the fact that e j 4 π ε ^ ϱ = Ω * ( a , b ) / | Ω ( a , b ) | and putting this notation in { Ω ( a , b ) e j 4 π ε ϱ } , it is obvious that the quantity { Ω ( a , b ) e j 4 π ε ϱ } is reduced to | Ω ( a , b ) | . By using this formulation, a simplified estimation ( s ^ 0 , s ^ 1 ) is performed as
( s ^ 0 , s ^ 1 ) = arg   max ( a , b ) | Ω ( a , b ) |
which implies that the detection problem of (17) is decoupled in a sequential manner. By collecting the estimated pair ( s ^ 0 , s ^ 1 ) , we can determine s ^ as s ^ = s ^ 1 + 112 s ^ 0 . Then, one can estimate ε in a decoupled manner by substituting ( s ^ 0 , s ^ 1 ) into (18).
As seen from (19), we perform a hypothesis test for potential SL-SSS candidates to decide one of the 336 SLSSIDs, which still remains computationally very demanding. To address this complexity problem, we propose a low-complexity SLSSID detection method without compromising the detection performance of (19). A close looking at (6) informs us that G 0 , 1 ( v ) and G 0 , 2 ( v ) are generated by cyclically shifting G 0 , 0 ( v ) . Therefore, three m-sequences are related to each other as G 0 , s 0 ( v ) = G 0 , 0 ( v ) B s 0 ( v ) , where B s 0 ( v ) = G 0 , s 0 ( v ) / G 0 , 0 ( v ) { 1 , 1 } for s 0 = 0 , 1 , 2 is the phase difference factor between G 0 , 0 ( v ) and G 0 , s 0 ( v ) ’s for s 0 = 1 , 2 that are cyclic-shifted versions of G 0 , 0 ( v ) . Inspired by this observation, the cost function is rewritten by
Ω ( a , b ) = i = 0 1 v G Y ˜ l + i * ( v + η ) Y l + i + 2 ( v + η ) G ¯ 0 , b * ( v ) B a * ( v ) e j 4 π η ϱ
where G ¯ 0 , b ( v ) = G 0 , 0 ( v ) G 1 , b ( v ) is the partial SL-SSS for a = 0 and b { 0 , 1 , 2 , , 111 } whose possible number of candidate sequences is 112. Using the cyclic-shifted property of m-sequence, two different auto-correlations with local template G a , b ( v ) for the remaining hypothesized values a { 1 , 2 } and b { 0 , 1 , 2 , , 111 } can be implemented by simply compensating only the polarity of the pre-computed autocorrelation for a = 0 . This compensation is performed on a per-subcarrier basis according to the phase difference factor B a ( v ) ( a = 1 , 2 ). To complete (20), therefore, only one auto-correlation needs to be calculated for each trial value of b, which helps reduce the computational burden by minimizing the number of required multiplication operations. Substituting (3) into (20), we have
Ω ( a , b ) = i = 0 1 v G | H l + i ( v ) | 2 | M u ( v ) | 2 G s ( v ) G ¯ 0 , b * ( v ) B a * ( v ) e j 4 π ε ϱ + i = 0 1 v G I ¯ l + i ( v ) G a , b * ( v ) + i = 0 1 v G Z ¯ l + i ( v ) G a , b * ( v )
where Ω ˜ ( a , b ) = Ω ( a , b ) e j 4 π ε ϱ is a complex Gaussian random variable (RV),
I ¯ l + i ( v ) = H l + i * ( v ) | M u ( v ) | 2 I l + i + 2 ( v ) e j 2 π ζ ( ( l + i ) N s + N g ) / N + H l + i + 2 ( v ) G s ( v ) M u ( v ) I l + i * ( v ) e j 2 π ζ ( ( l + i + 2 ) N s + N g ) / N + M u ( v ) Z l + i * ( v ) I l + i + 2 ( v ) + M u ( v ) Z l + i + 2 ( v ) I l + i * ( v ) + M u ( v ) I l + i * ( v ) I l + i + 2 ( v )
and
Z ¯ l + i ( v ) = H l + i * ( v ) | M u ( v ) | 2 Z l + i + 2 ( v ) e j 2 π ζ ( ( l + i ) N s + N g ) / N + H l + i + 2 ( v ) G s ( v ) M u ( v ) Z l + i * ( v ) e j 2 π ζ ( ( l + i + 2 ) N s + N g ) / N + M u ( v ) Z l + i * ( v ) Z l + i + 2 ( v ) .
Note that I ¯ l + i ( v ) and Z ¯ l + i ( v ) are treated as zero-mean complex Gaussian RVs with variances σ I ¯ 2 and σ Z ¯ 2 , respectively. Assuming g = b + 112 a (hypothesis H 1 ), substituting (3) into (20) yields
Ω ( a , b ) = i = 0 1 v G | H l + i ( v ) | 2 | M u ( v ) | 2 | G s ( v ) | 2 e j 4 π ε ϱ + i = 0 1 v G I ¯ l + i ( v ) G a , b * ( v ) + i = 0 1 v G Z ¯ l + i ( v ) G a , b * ( v )
where we assume H l ( v ) H l + 1 ( v ) .

3.3. Performance Analysis

3.3.1. SL-SSS Detection

In this subsection, the detection probability of (19) is derived in a closed form. For ease of derivation, we suppose that the flat-fading channel is slowly time-variant, i.e., H l ( v ) H l + 1 ( v ) . Let E { · } denote the expected value of the enclosed quantity. The detection probability P d = P r o b { ( s ^ 0 , s ^ 1 ) = ( s 0 , s 1 ) } is the probability that ( s 0 , s 1 ) (or equivalently s) are correctly decided. First, we consider the hypothesis H 1 that ( a , b ) = ( s 0 , s 1 ) in (24). Conditioned on β = | H l ( v ) | 2 , we find that Ω ˜ ( a , b ) = Ω ( a , b ) j 4 π ε ϱ CN ( μ , σ 1 2 ) with μ = 2 N m E X 2 β and σ 1 2 = 2 N m E X ( σ I ¯ 2 + σ Z ¯ 2 ) , where E X = E { | M u ( v ) | 2 } = E { | G s ( v ) | 2 } , σ I ¯ 2 = 2 E X 2 σ I 2 β + 2 E X σ I 2 σ Z 2 + E X σ I 4 , σ Z ¯ 2 = 2 E X 2 σ Z 2 β + E X σ Z 4 , and σ I 2 E X σ H 2 ε 2 π 2 / 3 . In this assumption, the PDF of z = | Ω ˜ ( a , b ) | = | Ω ( a , b ) | in (24) is Rician distributed and is given by
f H 1 ( z ) = 2 z σ 1 2 e z 2 + μ 2 σ 1 2 I 0 2 z μ σ 1 2
where I 0 ( · ) denotes the modified Bessel function of the first kind and zeroth order. In the case when ( a , b ) ( s 0 , s 1 ) (null hypothesis H 0 ), Ω ˜ ( a , b ) CN ( 0 , σ 0 2 ) . For N m 1 , it can be seen that σ 0 2 σ 1 2 . As a consequence, | Ω ( a , b ) | is Rayleigh-distributed as f H 0 ( z ) = 2 z / σ 0 2 e z 2 / σ 0 2 .
Thus, making use of f H 0 ( z ) and f H 1 ( z ) , the probability that ( s 0 , s 1 ) are correctly detected and conditioned on β becomes
P d ( β ) = 0 f H 1 ( z ) 0 z f H 0 ( y ) d y 335 d z .
With the aid of binomial expansion, P d ( β ) is found to be
P d ( β ) = g = 0 335 ( 1 ) g 335 g 0 2 z σ 1 2 e z 2 ( 1 + g ) σ 1 2 ν 2 I 0 2 z μ σ 1 2 d z = g = 0 335 ( 1 ) g 335 g 1 1 + g e g ν 2 1 + g
where ν = μ / σ 1 is the ratio of mean to standard deviation of a complex random variable Ω ˜ ( a , b ) . In (27), ν is defined as
ν = 2 N m 2 ( 1 / γ z + 1 / γ i ) + ( 1 / γ z + 1 / γ i ) 2
where γ z = β E X / σ Z 2 is the instantaneous signal-to-noise ratio (SNR) and γ i = β E X / σ I 2 is the instantaneous signal-to-ICI ratio (SIR). In order to find a closed-form formula, (27) is averaged over β , namely
P d = 0 P d ( β ) f ( β ) d β = g = 0 335 ( 1 ) g 335 g 1 ( 1 + g ) σ H 2 0 e g ν 2 1 + g e β σ H 2 d β
where f ( β ) = σ H 2 e β σ H 2 is the PDF of β . If the SNR is relatively high, the second squaring term of the denominator of (28) is negligible. Ignoring this term, ν is approximated as
ν N m γ z γ i γ z + γ i .
Substituting (30) into (29), and after some mathematical simplifications, one obtains the following unconditional probability
P d = g = 0 335 ( 1 ) g 335 g γ ¯ z + γ ¯ i g N m γ ¯ z γ ¯ i + ( 1 + g ) ( γ ¯ z + γ ¯ i )
where γ ¯ z = E { β } E X / σ Z 2 is the average SNR and γ ¯ i = E { β } E X / σ I 2 is the average SIR.

3.3.2. RCFO Estimation

We consider the scenario in which the estimates ( s ^ 0 , s ^ 1 ) are available to the receiver without any error. With this assumption, it is easy to see that instead of (21), we now have
Ω ( s ^ 0 , s ^ 1 ) = 2 E X 2 e j 4 π ε ϱ v G | H l ( v ) | 2 1 + v G I ¯ ( v ) + v G Z ¯ ( v ) 2 E X 2 e j 4 π ε ϱ v G | H l ( v ) | 2
where I ¯ ( v ) = i = 0 1 I ¯ l + i ( v ) G a , b * ( v ) and Z ¯ ( v ) = i = 0 1 Z ¯ l + i ( v ) G a , b * ( v ) . Assuming a significantly large SNR and applying power boosting to the SLSS, we can confidently assert that { v G I ¯ ( v ) e j 4 π ε ϱ + v G Z ¯ ( v ) e j 4 π ε ϱ } / ( 2 E X 2 v G | H l ( v ) | 2 ) 1 . Consequently, for high SNR, it follows that
Ω ( s ^ 0 , s ^ 1 ) = 4 π ε ϱ + 1 + v G I ¯ ( v ) + v G Z ¯ ( v ) 2 E X 2 e j 4 π ε ϱ v G | H l ( v ) | 2 4 π ε ϱ + e j tan 1 v G { I ^ ( v ) } + v G { Z ^ ( v ) } 2 E X 2 v G | H l ( v ) | 2
where I ^ ( v ) = I ¯ ( v ) e j 4 π ε ϱ , Z ^ ( v ) = Z ¯ ( v ) e j 4 π ε ϱ , { · } represents the imaginary part and tan 1 ( x ) refers to the arctangent function applied to a real number x. It is important to mention that I ¯ ( v ) and Z ¯ ( v ) hold the same statistical equivalence as I ^ ( v ) and Z ^ ( v ) , respectively. Since the estimated error Δ ε = ε ^ ε is significantly small and e j tan 1 ( x ) approximates e j x = x with increasing SNR, we can easily conclude that
Δ ε 1 4 π ϱ v G { I ^ ( v ) } + v G { Z ^ ( v ) } 2 E X 2 N m β .
It is clear from (34) that the MSE of the RCFO estimation scheme is represented by
E { | Δ ε | 2 } = 1 8 π ϱ N m E X 2 2 v G E { | { I ^ ( v ) } / β | 2 } + 1 8 π ϱ N m E X 2 2 v G E { | { Z ^ ( v ) } / β | 2 }
and we have E { { I ^ ( v ) } } = E { { Z ^ ( v ) } } = 0 . Upon observing (22) and (23), it becomes apparent that the variances of I ^ ( v ) and Z ^ ( v ) are computed as σ I ^ 2 = 4 E X 3 σ I 2 β + 4 E X 2 σ I 2 σ Z 2 + 2 E X 2 σ I 4 , σ Z ^ 2 = 4 E X 3 σ Z 2 β + 2 E X 2 σ Z 4 , respectively. Hence, it is evident that
E { | { I ^ ( v ) } / β | 2 } E X 4 = 4 γ i + 4 γ i γ z + 2 γ i 2
and
E { | { Z ^ ( v ) } / β | 2 } E X 4 = 4 γ z + 2 γ z 2 .
By combining (35)–(37), we eventually arrive at
E { | Δ ε | 2 } = 1 16 π 2 ϱ 2 N m 1 γ i + 1 γ i γ z + 1 2 γ i 2 + 1 γ z + 1 2 γ z 2 .

4. Numerical Results and Analysis

In this section, we conduct extensive simulation experiments to verify the effectiveness of the SL-SSS detectors.

4.1. Simulation Setup

We consider an OFDM system employing the number of DFT points N = 2048 and the CP size N g = 144 . It operates within a transmission bandwidth of 40 MHz with a frequency separation Δ f = 30 kHz in the 6 GHz frequency band, resulting in a sampling time period of T s = 1 / 61.44 μs. For the simulations, a 5G tapped delay line-B model is used for non-line-of-sight scenarios [22]. Two different values of delay spreads are considered to represent two channel profiles, which are very short delay (Vsd) spread and very long delay (Vld) spread. Unless otherwise mentioned, the Doppler frequency is set to be D f = 300 Hz, corresponding to the UE velocity of 54 km/h [23], and all performance results were obtained through simulations.
To demonstrate the advantages of the proposed SL-SSS detection scheme, we consider three different SL-SSS detection schemes as benchmarks [17,18,19]. The first benchmark is the coherent approach and the second benchmark is the non-coherent method with the cost functions provided in (8) and (9), respectively. The last benchmark is a reduced SL-SSS detection (RSD) method that identifies the SL-SSS by individually maximizing two cost functions given by [18]
Ω r s d 1 ( b ) = i = 0 1 v G Y ˜ l + i * ( v + η ) Y l + i + 2 ( v + η ) a = 0 2 G 0 , a * ( v ) G 1 , b * ( v ) e j 4 π η ϱ
and
Ω r s d 0 ( a ) = i = 0 1 v G Y ˜ l + i * ( v + η ) Y l + i + 2 ( v + η ) G 0 , a * ( v ) G 1 , b ^ * ( v ) e j 4 π η ϱ .

4.2. Complexity Evaluation

First, we evaluate the computational load of the SL-SSS detectors, assuming six floating point operations (flops) for each complex multiplication, two flops for each complex addition, and three flops for each complex magnitude [24]. For G and i = 0 , 1 , the CSD method computes Y ˜ l + i * ( v + η ^ ) Y l + i + 2 ( v + η ^ ) with 16 N m flops, which are common for every hypothesis. Then, | Ω c s d ( c ) | is implemented using 8 N m flops for each trial, resulting in a total of 2704 N m flops to obtain the estimate s ^ by locating a maximum of | Ω c s d ( c ) | . Similarly, the NSD approach uses 12 ( N m 1 ) flops to evaluate the term Y l + i + 2 ( v + η ^ ) Y l + i + 2 * ( v + η ^ 1 ) for D and i = 0 , 1 . For every hypothesis, the cost function | Ω n s d ( c ) | is computed using 8 N m 8 flops. Consequently, 2700 ( N m 1 ) flops are required to obtain the SSID s ^ employing the NSD approach. In the case of the RSD approach, | Ω r s d 1 ( b ) | is evaluated using 8 N m + 6 flops for each trial and then a total of 16 N m + 112 ( 8 N m + 6 ) flops is used to obtain the SSID s ^ 1 . In this way, the computation of | Ω r s d 0 ( a ) | for a { 0 , 1 , 2 } involves 3 ( 8 N m + 6 ) flops. As a result, the RSD approach can be implemented with 936 N m + 690 flops. Finally, we evaluate the complexity of the proposed approach. Considering all hypotheses associated with (20), the proposed method requires 112 ( 4 N m + 6 ) real multiplications (RMs) and 336 ( 4 N m 3 ) real additions, which are eventually converted to 1792 N m + 672 flops. Table 1 summarizes the computational complexity of SL-SSS detection methods. As one can see from (18), the RCFO detector is realized with one angle operation and one RM.

4.3. Performance Evaluation

Figure 2 presents P r o b { ( s ^ 0 , s ^ 1 ) = ( s 0 , s 1 ) } for the conventional RSD and proposed algorithms under both AWGN and fading conditions, as a function of average SNR. To validate the accuracy of the derived detection probability, we consider the case where D f = 0 Hz and RSTO is equal to zero. However, the impact of Doppler frequency and RSTO on the performance of the proposed method will be examined in the following example. Although not shown in Figure 2, the detection curves for both the CSD and proposed schemes are nearly identical because they use the same cost function. On the other hand, it is observed that the proposed SL-SSS detector has a competitive performance improvement over the RSD method in terms of detection probability. And, more importantly, the analytical curves are very well matched with the simulated curves in the presence of frequency offset values under the assumption of perfect ICFO and SL-PSS detection. These observations confirm the effectiveness of the proposed SL-SSS detection method and the accuracy of theoretical expressions derived in Section 3.3.
Figure 3 shows the performance comparison of different SL-SSS detection methods versus average SNR under various channel models, assuming that RSTO is equal to zero. While the AML method offers a substantial gain over the proposed SL-SSS detection method, its heavy computational complexity severely limits the efficiency. As we can see, the proposed SL-SSS detection scheme attains comparable detection performance to other baselines such as the NSD and CSD methods, which suffer from significant computational load caused by a huge number of possible hypothesis testing outcomes. Consequently, the proposed method is an effective approach to compromise a better trade-off between detection performance and computational complexity. In the case of the Vld channel, the capacity enhancement of the presented SL-SSS detectors becomes more significant as the maximum channel delay spread increases, which is due to multipath diversity.
To further evaluate the usefulness of the proposed SL-SSS detector, we consider the overall detection performance denoted by P r o b { ( η ^ , u ^ , s ^ 0 , s ^ 1 ) = ( η , u , s 0 , s 1 ) } under different STO and Doppler frequency conditions. For this purpose, η is randomly chosen within a range from −4 to 4. Figure 4 exhibits the performance of various SL-SSS detection methods when the UE device operates at an SNR of 4 dB. As expected, increased UE velocity severely degrades the performance of the detection methods employing coherent strategy, while the AML and NSD methods are less sensitive to the amount of Doppler frequency. Therefore, we can conclude that the proposed approach can attain near-optimal detection performance while keeping lower computational costs compared with other methods.
Figure 5 illustrates E { | Δ ε | 2 } of the RCFO detection scheme as a function of SNR under various channel conditions. To verify the feasibility of the RCFO estimation scheme, we provide a Cramer–Rao lower bound (CRLB) as a benchmark [21]. In Figure 5a, it is evident that the MSE of the RCFO estimation scheme closely approximates the CRLB for moderate SNR levels in the case of the AWGN channel. Conversely, the presence of a Doppler frequency introduces a loss of orthogonality in the frequency-selective fading channel, which in turn impairs the estimation accuracy of the RCFO detector. Another notable observation regarding the suggested RCFO detector is that the simulated MSE demonstrates substantial concordance with the theoretical MSE when the SNR exceeds 2 dB. Meanwhile, if the SNR value falls below a certain threshold, the detection capability of the RCFO detection method is significantly impaired due to the constrained estimation range, which is also confirmed by Figure 5b. As demonstrated in (18), we observe that the estimation range of the RCFO estimator is constrained to | ε | 1 / ( 4 ϱ ) 0.24 . Within this estimation range, it becomes apparent that the detection performance deteriorates around ε = 0 as the RCFO value increases. This phenomenon is primarily attributed to the existence of an irreducible ICI term that persists even as the SNR approaches infinity.

5. Concluding Remark

In this paper, a computationally effective SL-SSS synchronization scheme is presented in a cellular NR-V2X communication system. Taking advantage of the cyclic-shifted property between SL-SSS sequences, we highlight a low-complexity implementation of the proposed SL-SSS detector. The proposed method offers the advantage of simultaneously estimating RCFO by utilizing the same cost function employed for SLSSID detection. Therefore, the total complexity of the initial synchronization procedure can be considerably reduced. We derive the detection probability of the proposed SLSSID detector and the MSE of the RCFO estimator, demonstrating their accuracy through simulation results. Numerical results show that the computational complexity of the proposed SL-SSS detector is reduced compared with the conventional SL-SSS detector while maintaining the same detection performance. Applying the proposed synchronization method to the 5G NR-V2X communication system results in a reduction in computational complexity by over 66%, leading to decreased power consumption and ultimately enhancing the battery life of NR-V2X terminals.

Author Contributions

Conceptualization, Y.-H.Y. and Y.-A.J.; methodology, Y.-H.Y. and Y.-A.J.; software, Y.-A.J.; writing—original draft preparation, Y.-H.Y. and Y.-A.J.; writing—review and editing, Y.-H.Y. and Y.-A.J.; supervision, Y.-H.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This work was in part supported by the National Research Foundation of Korea (NRF) grant funded by the Korean government (MSIT) (No. RS-2023-00219051), in part supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (2021R1F1A1057577), and in part supported by the Institute of Information and Communications Technology Planning and Evaluation (IITP) grant funded by the Korean government (MSIT) (2022-0-00162, Development of Industrial 5G Private Network Management System).

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Ganesan, K.; Lohr, J.; Mallick, P.B.; Kunz, A.; Kuchibhotla, R. NR sidelink design overview for advanced V2X service. IEEE Internet Things Mag. 2020, 3, 26–30. [Google Scholar] [CrossRef]
  2. Shrivastava, R.; Hegde, S.; Blume, O. Sidelink evolution toward 5G-A/6G future considerations for standardization of group communications. IEEE Commun. Stand. Mag. 2023, 7, 24–30. [Google Scholar] [CrossRef]
  3. V2X Services Based on NR; 3GPP TR 38.886, v16.3.0; 3GPP: Sophia Antipolis, France, 2021.
  4. Lien, S.; Deng, D.; Lin, C.; Tsai, H.; Chen, T.; Guo, C.; Cheng, S. 3GPP NR sidelink transmissions toward 5G V2X. IEEE Access 2020, 8, 35368–35382. [Google Scholar] [CrossRef]
  5. Lu, Q.; Jung, H.; Kim, K. Optimization-based approach for resilient connected and autonomous intersection crossing traffic control under V2X communication. IEEE Trans. Intell. Veh. 2022, 7, 354–367. [Google Scholar] [CrossRef]
  6. Del Puerto-Flores, J.A.; Castillo-Soria, F.R.; Gutiérrez, C.A.; Pena-Campos, F. Efficient index modulation-based MIMO OFDM data transmission and detection for V2V highly dispersive channels. Mathematics 2023, 11, 2773. [Google Scholar] [CrossRef]
  7. Bi, J.; Qin, X.; Jia, Z. Energy-efficient resource allocation for D2D-V2V communication with load balancing. Mathematics 2023, 11, 2848. [Google Scholar] [CrossRef]
  8. Garcia-Roger, D.; Gonzalez, E.; Martin-Sacristan, D.; Monserrat, J. V2X support in 3GPP specifications: From 4G to 5G and beyond. IEEE Access 2020, 8, 190946–190963. [Google Scholar] [CrossRef]
  9. Study on NR Vehicle-to-Everything (V2X); 3GPP TR 38.885, v16.0.0; 3GPP: Sophia Antipolis, France, 2019.
  10. Abbasi, M.; Shahraki, A.; Barzegar, H.R.; Pahl, C. Synchronization techniques in “device to device- and vehicle to vehicle-enabled” cellular networks: A survey. Comput. Electr. Eng. 2021, 90, 106955. [Google Scholar] [CrossRef]
  11. Study on Scenarios and Requirements of In-Coverage, Partial Coverage, and Out-of-Coverage NR Positioning Use Cases; 3GPP TR 38.845, v17.0.0; 3GPP: Sophia Antipolis, France, 2021.
  12. Won, S.; Choi, S.W. A tutorial on 3GPP initial cell search: Exploring a potential for intelligence based cell search. IEEE Access 2022, 9, 100223–100263. [Google Scholar] [CrossRef]
  13. Garcia, M.H.C.; Molina-Galan, A.; Boban, M.; Gozalvez, J.; Coll-Perales, B.; Sahin, T.; Kousaridas, A. A tutorial on 5G NR V2X communications. IEEE Commun. Surv. Tutor. 2021, 23, 1972–2026. [Google Scholar] [CrossRef]
  14. Omri, A.; Shaqfeh, M.; Ali, A.; Alnuweiri, H. Synchronization procedure in 5G NR systems. IEEE Access 2019, 7, 41286–41295. [Google Scholar] [CrossRef]
  15. Chang, K.; Lee, S. Robust OFDM-based synchronization against very high fractional CFO and time-varying fading. IEEE Syst. J. 2020, 14, 4047–4058. [Google Scholar] [CrossRef]
  16. Chen, F.; Li, X.; Zhang, Y.; Jiang, Y. Design and implementation of initial cell search in 5G NR systems. China Commun. 2020, 17, 38–49. [Google Scholar] [CrossRef]
  17. Inoue, D.; Ota, K.; Sawahashi, M.; Nagata, S. Physical cell ID detection using joint estimation of frequency offset and SSS ssequence for NR initial access. IEICE Trans. Commun. 2021, E104.B, 1120–1128. [Google Scholar] [CrossRef]
  18. You, Y.H.; Park, J.H.; Ahn, I.Y. Complexity effective sequential detection of secondary synchronization signal for 5G new radio communication systems. IEEE Syst. J. 2021, 15, 3382–3390. [Google Scholar] [CrossRef]
  19. Liao, C.-C.; Tsai, P.-Y.; Chiueh, T.-D. Low-complexity cell search algorithm for interleaved concatenation ML-sequences in 3GPP-LTE systems. IEEE Wirel. Commun. Lett. 2012, 1, 280–283. [Google Scholar] [CrossRef]
  20. D’Amico, A.; Morelli, M.; Moretti, M. A novel scheme for CP-length detection and initial synchronization for the LTE downlink. IEEE Trans. Wirel. Commun. 2019, 18, 4668–4678. [Google Scholar] [CrossRef]
  21. Murin, Y.; Dabora, R. Low complexity estimation of carrier and sampling frequency offsets in burst-mode OFDM systems. Wirel. Commun. Mob. Comput. 2016, 16, 1018–1034. [Google Scholar] [CrossRef]
  22. 5G; Study on Channel Model for Frequencies from 0.5 to 100 GHz; 3GPP TR 38.901, v.16.1.0, Release 16; 3GPP: Sophia Antipolis, France, 2020.
  23. NR; Base Station (BS) Radio Transmission and Reception; 3GPP TS 38.104, v.15.5.0, Release 15; 3GPP: Sophia Antipolis, France, 2019.
  24. Golub, G.H.; Loan, C.F.V. Matrix Computations, 4th ed.; The Johns Hopkins University Press: Baltimore, MD, USA, 2013. [Google Scholar]
Figure 1. Synchronization modes of V2X cellular networks.
Figure 1. Synchronization modes of V2X cellular networks.
Mathematics 11 04003 g001
Figure 2. Performance of the proposed SL-SSS detectors in AWGN and flat-fading channels: (a) ε = 0 , (b) ε = 0.1 .
Figure 2. Performance of the proposed SL-SSS detectors in AWGN and flat-fading channels: (a) ε = 0 , (b) ε = 0.1 .
Mathematics 11 04003 g002
Figure 3. Performance comparison between the conventional and proposed SL-SSS detectors with respect to SNR values: (a) ε = 0 , (b) ε = 0.1 .
Figure 3. Performance comparison between the conventional and proposed SL-SSS detectors with respect to SNR values: (a) ε = 0 , (b) ε = 0.1 .
Mathematics 11 04003 g003
Figure 4. Performance comparison between the conventional and proposed SL-SSS detectors versus (a) STO and (b) UE speed when S N R = 4 dB.
Figure 4. Performance comparison between the conventional and proposed SL-SSS detectors versus (a) STO and (b) UE speed when S N R = 4 dB.
Mathematics 11 04003 g004
Figure 5. MSE of the RCFO estimation scheme under various channel conditions: (a) ε = 0 , (b) S N R = 0 and 16 dB.
Figure 5. MSE of the RCFO estimation scheme under various channel conditions: (a) ε = 0 , (b) S N R = 0 and 16 dB.
Mathematics 11 04003 g005
Table 1. Complexity of the SL-SSS detection methods.
Table 1. Complexity of the SL-SSS detection methods.
MethodNumber of Flops
CSD method 2704 N m
NSD method 2700 ( N m 1 )
RSD method 936 N m + 690
Proposed method 1792 N m + 672
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

You, Y.-H.; Jung, Y.-A. Complexity-Efficient Sidelink Synchronization Signal Detection Scheme for Cellular Vehicle-to-Everything Communication Systems. Mathematics 2023, 11, 4003. https://doi.org/10.3390/math11184003

AMA Style

You Y-H, Jung Y-A. Complexity-Efficient Sidelink Synchronization Signal Detection Scheme for Cellular Vehicle-to-Everything Communication Systems. Mathematics. 2023; 11(18):4003. https://doi.org/10.3390/math11184003

Chicago/Turabian Style

You, Young-Hwan, and Yong-An Jung. 2023. "Complexity-Efficient Sidelink Synchronization Signal Detection Scheme for Cellular Vehicle-to-Everything Communication Systems" Mathematics 11, no. 18: 4003. https://doi.org/10.3390/math11184003

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop