Next Article in Journal
A Formal Performance Evaluation Method for Customised Plug-and-Play Manufacturing Systems Using Coloured Petri Nets
Next Article in Special Issue
Hybrid Beamforming and Relay Selection for End-to-End SNR Maximization in Single-User Multi-Relay MIMO Systems
Previous Article in Journal
A Focus on Electromobility within Smart City Solutions—Charging Stations, Renewable Energy, and Air Quality Monitoring
Previous Article in Special Issue
Design and Synchronization Procedures of a D&F Co-Operative 5G Network Based on SDR Hardware Interface: Performance Analysis
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Cooperative DF Protocol for MIMO Systems Using One-Bit ADCs

Department of Electronic Engineering, Gachon University, Seongnam 13120, Korea
Sensors 2022, 22(20), 7843; https://doi.org/10.3390/s22207843
Submission received: 20 September 2022 / Revised: 7 October 2022 / Accepted: 13 October 2022 / Published: 15 October 2022
(This article belongs to the Special Issue Cooperative Communication in 5G-and-Beyond Networks)

Abstract

:
This study considers a detection scheme for cooperative multi-input–multi-output (MIMO) systems using one-bit analog-to-digital converters (ADCs) in a decode-and-forward (DF) relay protocol. The use of one-bit ADCs is a promising technique for reducing the power consumption, which is necessary for supporting future wireless systems comprising a large number of antennas. However, the use of a large number of antennas remains still limited to mobile devices owing to their size. Cooperative communication using a DF relay can resolve this limitation; however, detection errors at the relay make it difficult to employ cooperative communication directly. This difficulty is more severe in a MIMO system using one-bit ADCs due to its nonlinear nature. To efficiently address the difficulty, this paper proposes a detection scheme that mitigates the error propagation effect. The upper bound of the pairwise error probability (PEP) of one-bit ADCs is first derived in a weighted Hamming distance form. Then, using the derived PEP, the proposed detection for the DF relay protocol is derived as a single weighted Hamming distance. Finally, the complexity of the proposed detection is analyzed in terms of real multiplications. The simulation results show that the proposed detection method efficiently mitigates the error propagation effect but has a relatively low level of complexity when compared to conventional detection methods.

1. Introduction

A multi-input–multi-output (MIMO) system is a simple but powerful solution for improving system performance by using multiple antennas [1,2,3,4,5]. To fully exploit its advantages, most standard groups have adopted multiple antennas for future wireless standards. Recently, the use of a large number of antennas has attracted interest in spectral/power-efficient method massive MIMO systems. However, the increase in the number of antennas at the receiver end remains limited in mobile devices owing to their limited size and complexity. Cooperative communication is a possible solution for overcoming this limitation without deploying additional antennas in mobile devices.
In particular, decode-and-forward (DF) protocols are widely adopted in cooperative communications because of their superior performance and signal processing [6,7,8]. However, the DF protocol may offer fewer advantages when the detection error at the relay is properly addressed. To mitigate this error propagation effect, the DF protocol has been widely investigated [9,10,11]. Joint maximum likelihood (JML) detection is a well-known method that can perfectly extract the diversity gain obtained from wireless channels. However, despite its advantages, addressing its complexity at the destination is a challenge. Alternatively, the cooperative maximum ratio combining (MRC) [9] and pseudo-linear combiner [10] methods have been introduced, but their applications are limited to single antennas and orthogonal space-time block codes, respectively. Pairwise error probability (PEP)-based ML detection was introduced in [11] to overcome the above limitations. Nevertheless, the aforementioned studies assume that the source, relay, and destination use an infinite number of analog-to-digital converters (ADCs) at the receiver.
The use of low-resolution analog-to-digital converters (ADCs) is an efficient solution for reducing the power consumption at receivers in future wireless systems, as they exploit a large bandwidth or numerous antennas [12,13,14]. In particular, one-bit ADCs can be used in the future wireless systems by significantly decreasing the power consumption [15,16]. Despite their potential use, only a few studies have investigated one-bit ADCs in cooperative communications [17,18,19,20,21,22,23]. The descriptions of the studies are briefly summarized in Table 1. The performance of multipair massive MIMO cooperative systems were introduced in [17,18] in terms of capacity. In [22,23], a multihop–multi-user MIMO system was investigated, where the non-linearity introduced by one-bit ADCs was overcome through a supervised learning approach. However, this approach involves a significant complexity, making it unfeasible for wireless applications. In particular, the use of a deep learning approach is difficult to implement in mobile devices. Thus, instead of deep learning, a practical detection scheme should be designed with reasonable complexity for one-bit ADCs.
This study considered a detection scheme for cooperative DF MIMO systems using one-bit ADCs. Specifically, this study focused on mitigating the error propagation effect for the system under consideration. To efficiently achieve this outcome, the following contributions are made.
  • The PEP of MIMO systems that uses one-bit ADCs is proposed. Because the non-linearity of one-bit ADCs hinders the derivation of an exact PEP, the upper bound of the PEP was analyzed instead. It was shown that the analyzed bound is well upper bounded with the simulated result.
  • The low-complexity detection scheme for cooperative DF MIMO systems using one-bit ADCs is proposed. The analyzed bound is easily combined with a PEP-based error propagation model reported in [11] in a weighted distance form. Thus, using this bound, the proposed detection scheme can also be obtained in a single weighted distance form. The advantage offered by this proposed detection is that the low-complexity scheme reported in [24] can also be applied; thus, the computational complexity can be significantly reduced.
  • In simulations, the proposed detection method provides a significant gain in one-bit ADCs by mitigating the error propagation effect generated from the relay. In addition, the proposed detection can be applied to arbitrary relay protocols similar to [11].
The remainder of this study is organized as follows. Section 2 introduces a MIMO system using one-bit ADCs. In Section 3, the JML detection and its low-complexity algorithm are described. The DF relay protocol and the proposed detection method are explained in Section 4. The simulation results are presented in Section 5 to verify the effectiveness of the proposed detection method. Finally, the conclusions are presented in Section 6.

Notation

The superscripts ( · ) T and ( · ) H denote the transpose and conjugate transpose matrices, respectively. P ( · ) denotes the probability of an event. Operators Re ( · ) and Im ( · ) denote the real and imaginary parts of the complex number, respectively, while log ( · ) denotes a logarithmic operation. | · | and · 0 denote the absolute value and zero norm (which represents the number of nonzero elements), respectively. An indicator function 𝟙 { X } is equal to 1 if event X is true, and 0 if untrue. Sign ( x ) is a function whose value is 1 for x 1 , and 1 for all other x, while x ˜ is a function whose value is 1 if x = 1 , and 0 for all other x. An indicator function 𝟙 { X } is equal to 1 if event X is true, and 0 if untrue. Sets R and C represent the set of real and complex numbers, respectively.

2. System Model

A point-to-point signal model for MIMO systems using one-bit ADCs is described in this section. Using the signal model, a detection rule using a likelihood function is also presented. The proposed signal model and detection rule are used to describe the proposed relay protocol in Section 3 and Section 4, respectively.

2.1. Signal Model

A MIMO system is considered where a node a with N a antennas communicate with N b antennas at node b. When a signal is transmitted from node a over a Rayleigh fading channel, the received signal at node b is written as
y ¯ b = γ a b N a G ¯ a b x ¯ a + w ¯ b ,
where the average SNR is γ a b . Channel matrix G ¯ b C N b × N a is Rayleigh fading, whose entries are independent and identically distributed, complex Gaussian random variables with zero mean and unit variance. x ¯ a C N a × 1 is the transmitted signal that is modulated from encoded bits (see Figure 1). It belongs to A ¯ N a and is normalized as 1 N a E { | x ¯ a | 2 } = 1 . A ¯ is an M-quadrature amplitude modulation (QAM) complex constellation set. After receiving the transmitted signal, complex additive white Gaussian noise (AWGN) w ¯ b C N b × 1 with zero mean and unit variance is added at the receiver.
To facilitate detection in one-bit ADCs, the complex received signal in (1) is re-expressed as the real signal:
y b = Re { y ¯ b } Im { y ¯ b } = γ a b N a Re { G ¯ a b } Im { G ¯ a b } Im { G ¯ a b } Re { G ¯ a b } G a b Re { x ¯ a } Im { x ¯ a } x a + Re { w ¯ b } Im { w ¯ b } w b , = H a b x a + w b ,
where H a b γ a b N a G a b R 2 N b × 2 N a . Signal x a belongs to A 2 N a , where A is a M -pulse-amplitude modulation real-constellation set. The use of one-bit ADCs quantizes the real signal in (2) as
r b , i = sign ( y b . i ) = sign ( h a b , i T x a + w b , i ) ,
where i I = { 1 , , 2 N b } .

2.2. Detection Rule

In this subsection, the ML detection rule is briefly summarized in [24]. After the one-bit ADCs, the receiver first obtains the channel estimates from the quantized signals in (3). Then, data detection is applied to obtain decoded bits using the likelihood function (see Figure 1). When signal x a is transmitted, the likelihood function is calculated as follows:
P { r b | x a } = i = 1 2 N b P { r b , i | c a b , i x a } ,
where c a b , i x a is the i-th element of the codeword c a b x a sign ( H a b x a ) . Note that the codeword c a b x a R 2 N b × 1 can be understood as a noise-free quantized signal. The i-th element of the likelihood function in (4) is computed as follows:
P { r b , i | c a b , i x a } = p a b , i x a , r b , i c a b , i x a 1 p a b , i x a , r b , i = c a b , i x a ,
where the i-th element of the likelihood function p a b , i x a is defined as
p a b , i x a = Q 2 | h a b , i T x a | .
where Q ( x ) = 1 2 π x e u 2 / 2 d u .
By using a log operation, the likelihood function in (4) can be re-expressed as
log P { r b | x a } = i = 1 2 N b log p a b , i x a r b , i c a b , i x a 0 + log 1 p a b , i x a ( 1 r b , i c a b , i x a 0 ) = i = 1 2 N b w a b , i x a r b , i c a b , i x a 0 + w ˜ a b , i x a ( 1 r b , i c a b , i x a 0 ) ,
where w a b , i x a log p a b , i x a and w ˜ a b , i x a log 1 p a b , i x a . The log-likelihood function in (7) is concisely described by introducing the weighted Hamming distance, defined as follows:
d w r b , c a b ( x a ) ; w a b ( x a ) , w ˜ a b ( x a ) = log P { r b | x a } .
Using (8), the ML detection rule that maximizes the likelihood function is expressed as:
x ^ a = argmax x a A 2 N a log P { r b | x a } = argmin x a A 2 N a d w r b , c a b ( x a ) ; w a b ( x a ) , w ˜ a b ( x a ) .
Based on (9), the ML detection selects the candidate symbol with the lowest weighted Hamming distance. For the improvement of readability, representative symbols of this study are summarized in Table 2.

3. Joint Maximum Likelihood Detection

In this section, a DF relay protocol for MIMO systems using one-bit ADCs is presented. The JML detection rule is then described with the aim of achieving a full diversity gain. However, the implementation of the JML detection rule is considerably complex. As a low-complexity algorithm for JML detection, a PEP-based ML detection rule reported in [11] is also presented.

3.1. Joint Maximum Likelihood Detection

The DF relay protocol is depicted in Figure 2, where the notations S, R, and D denote the source, relay, and destination, respectively. In the first time slot, the source transmits a signal x S to the relay and detection nodes, which is given by:
r R = sign ( H S R x S + w R ) , r D 1 = sign ( H S D x S + w D 1 ) .
Note that direction communication decodes the signal x S from r D 1 . After receiving this signal r R , the relay detects the transmitted signal x S according to the ML criterion in (9), as follows:
x R = argmin x S A 2 N S d w r R , c S R ( x S ) ; w S R ( x R ) , w ˜ S R ( x S ) .
In the second time slot, the relay transmits the detected signal x R to the destination, which is given by:
r D 2 = sign ( H R D x R + w D 2 ) .
The destination then detects the transmitted signal x S from quantized signals r D 1 and r D 2 . The JML criterion [6] is a well-known method for achieving a full diversity gain, which is given by
x ^ S = argmax x S A 2 N S P { r D | x S } = argmax x S A 2 N S P { r D 1 | x S } × x R A 2 N S P { x R | x S } P { r D 2 | x R } ,
where r D = [ r D 1 T , r D 2 T ] T . The error probability at the relay associated with a transmitted signal ( x S ) is denoted as P { x R | x S } .

3.2. PEP-Based Maximum Likelihood Detection

JML detection in (13) is considerably complex because the total number of candidates to search is given by | A | 4 N S . This cumbersome exercise can be avoided by approximating the error propagation at the relay [11]. In this approximation, the max-log and PEP operations were applied to the JML criterion.
Based on these operations, the likelihood function in (13) for a DF relay protocol is derived as follows:
log P { r D | x S } = log P { r D 1 | x S } + log x R A 2 N S P { x R | x S } P { r D 2 | x R } ( a ) log P { r D 1 | x S } + max x R A 2 N S log P { x R | x S } P { r D 2 | x R } ( b ) log P { r D 1 | x S } + max x R A 2 N S log P { x S x R } P { r D 2 | x R } ,
where a max-log approximation was used in ( a ) . The conditional error probability is approximated as PEP in ( b ) . Using the likelihood function in (14), the PEP-based ML detection rule [11] is expressed as the sum of the log-likelihood function:
x ^ S = argmax [ x S T , x R T ] T A 4 N S log P { r D 1 | x S } + log P { x S x R } + log P { r D 2 | x R } ,
where the conditional probabilities of P { r D 1 | x S } and P { r D 2 | x R } are calculated using (4). In addition, P { x S x R } is the PEP detecting x R when x S is transmitted.

4. Proposed Detection

This section presents the proposed detection method that efficiently exploits the PEP-based ML detection of (15) in one-bit ADCs. To efficiently exploit the PEP-based ML detection, the PEP term for (15) of one-bit ADSs should be characterized as a weighted Hamming distance form. To achieve this, the upper bound of the PEP is derived. Subsequently, the proposed detection is derived as a single weighted Hamming distance.

4.1. Proposed Detection Rule

4.1.1. Upper Bound of PEP

The log-likelihood functions log P { r D 1 | x S } and log P { r D 2 | x R } in (15) can be calculated using (7). However, PEP log P { x S x R } is unknown for MIMO systems using one-bit ADCs. The PEP for MIMO systems using infinite-bit ADCs is usually expressed as a Q function; however, this expression does not hold for MIMO systems using one-bit ADCs. Moreover, the PEP for the detection rule in (15) should preserve the diversity characteristics of JML detection. Thus, the upper bound of PEP is derived as follows:
Lemma 1.
PEP for MIMO systems using one-bit ADCs between nodes a and b is upper bounded as:
log P { x a x ˜ a } d w c a b ( x a ) , c a b ( x ˜ a ) ; w a b ( x a , x ˜ a ) , w ˜ a b ( x a , x ˜ a ) ,
where w a b , i x a , x ˜ a and w ˜ a b , i x a , x ˜ a are, respectively, given by
w a b , i x a , x ˜ a = log p a b , i x a p a b , i x ˜ a + 1 p a b , i x a 1 p a b , i x ˜ a , w ˜ a b , i x a , x ˜ a = log p a b , i x a 1 p a b , i x ˜ a + 1 p a b , i x a p a b , i x ˜ a .
Proof. 
For a formal proof derivation, refer to Appendix A. □

4.1.2. Validity of Upper Bound of PEP

To demonstrate the validity of Lemma 1, the analysis result in (16) is compared with the simulation result in Figure 3 for different numbers of source and destination antennas. For this simulation, the pairs ( x a , x ˜ a ) of ( a 1 T , a 2 T ) , ( [ a 1 , a 1 ] T , [ a 1 , a 2 ] T ) , ( [ a 1 , a 1 , a 1 , a 1 ] T , [ a 1 , a 1 , a 1 , a 2 ] T ) , and ( [ a 1 , a 1 , a 1 , a 1 , a 1 , a 1 , a 1 , a 1 ] T , [ a 1 , a 1 , a 1 , a 1 , a 1 , a 1 , a 1 , a 2 ] T ) were used for N S = 1 , 2 , 4 , and 8, respectively, where a 1 = [ 1 , 1 ] / 2 and a 2 = [ 1 , 1 ] / 2 are the candidate symbols in constellation set A . In Figure 3, the simulated PEP is shown to be upper bound by the analyzed PEP in Lemma 1, regardless of the number of antennas. Note that the PEP is saturated everywhere except at N S = 1 because it has a saturated performance when x a x ˜ a [25].

4.1.3. Proposed Detection

Because the upper bound of PEP is expressed as the weighted Hamming distance between two codewords c a b ( x a ) and c a b ( x ˜ a ) , the detection rule in (15) can be simplified as:
x ^ S = argmin [ x S T , x R T ] T A 4 N S d w r D 1 , c S D ( x S ) ; w S D ( x S ) , w ˜ S D ( x S ) + d w r D 2 , c R D ( x R ) ; w R D ( x R ) , w ˜ R D ( x R ) + d w c S R ( x S ) , c S R ( x R ) ; w S R ( x S , x R ) , w ˜ S R ( x S , x R ) .
Because the detection rule in (17) is represented by the sum of three weighted Hamming distances, the proposed detection rule in (17) can be further summarized as a single weighted Hamming distance:
x ^ S = argmin [ x S T , x R T ] T A 4 N S d w r D 1 r D 2 c S R ( x S ) , c S D ( x S ) c R D ( x R ) c S R ( x R ) ; w S D ( x S ) w R D ( x R ) w S R ( x S , x R ) , w ˜ S D ( x S ) w ˜ R D ( x R ) w ˜ S R ( x S , x R ) .
From the detection rule in (18), a DF relay protocol with ( N S , N R , N D ) antennas can be interpreted as a single MIMO system with ( N S + N R ) transmitting antennas and ( 2 N D + N R ) receiving antennas. Using this fact, the low-complexity algorithm reported in [24] can be applied to the detection rule reported in (18). Thus, the proposed detection rule can significantly reduce the complexity compared with the JML detection rule. Note that the original PEP-based ML detection reported in [11] also exploits the advantages of an equivalent single MIMO system in the DF relay protocols. However, unlike in [11], the distinct PEP types in (15) are applied to (14). In addition, the proposed detection uses a different low-complexity algorithm reported in [24], whereas the original PEP-based ML detection [11] uses the low-complexity algorithm reported in [26].

4.2. Extension to Other Relaying Protocols

The proposed detection rule in (18) can be applied to arbitrary space-time codes and relay networks, because the derived PEP can be expressed as a weighted Hamming distance in Lemma 1. For example, the proposed detection can be applied to a two-way relay (TWR) protocol (see Figure 4). Here, source A transmits its signal x A to source B and relay R in the first time slot, which is given by:
r B 1 = sign ( H A B x A + w B 1 ) , r R 1 = sign ( H A R x A + w R 1 ) .
In the second time slot, source B transmits its signal x B to source A and relay R, which is given by:
r A 2 = sign ( H B A x B + w B 2 ) , r R 2 = sign ( H B R x B + w R 2 ) .
After receiving the signals from sources A and B, the relay detects signals x ^ A and x ^ B by using the ML criterion in (9). Then, the relay generates the network-coded signal from the detected signals, which is given by:
x R = 1 2 ( x ^ R , A + x ^ R , B ) ,
where complex-field network coding (CFNC) is considered because of its easy implementation while it also guarantees a diversity gain in MIMO systems [27,28]. The relay transmits the network-coded signal from (21) to sources A and B, which is given by:
r A 3 = sign ( H R A x R + w A 3 ) , r B 3 = sign ( H R B x R + w B 3 ) .
Finally, the signals r A 2 and r A 3 are received at source A, and the signals r B 1 and r B 3 are received at source B. Each source performs the proposed detection rule to detect the symbol as:
x ^ A = argmin [ x A T , x R , A T , x R , B T ] T A 6 N S d w r B 1 r B 3 c A R ( x A ) c B R ( x B ) , c A B ( x A ) c R B ( x R , A + x R , B 2 ) c A R ( x R , A ) c B R ( x R , B ) ; w A B ( x A ) w R B ( x R , A + x R , B 2 ) w A R ( x A , x R , A ) w B R ( x B , x R , B ) , w ˜ A B ( x A ) w ˜ R B ( x R , A + x R , B 2 ) w ˜ A R ( x A , x R , A ) w ˜ B R ( x B , x R , B ) .
x ^ B = argmin [ x B T , x R , A T , x R , B T ] T A 6 N S d w r A 2 r A 3 c A R ( x A ) c B R ( x B ) , c B A ( x B ) c R A ( x R , A + x R , B 2 ) c A R ( x R , A ) c B R ( x R , B ) ; w B A ( x B ) w R A ( x R , A + x R , B 2 ) w A R ( x A , x R , A ) w B R ( x B , x R , B ) , w ˜ B A ( x B ) w ˜ R A ( x R , A + x R , B 2 ) w ˜ A R ( x A , x R , A ) w ˜ B R ( x B , x R , B ) .
Note that the detection rules in (23) and (24) are, respectively, performed to obtain signals x ^ A and x ^ B at the destination at source B and source A.

4.3. Complexity Analysis

In this subsection, the complexity of the proposed detection method is analyzed in terms of real multiplication. In Table 3, the complexity of the JML detection increases exponentially with the number of source antennas. The proposed detection can decrease the complexity by applying the low-complexity algorithm reported in [24], where new design parameters N l and N s v are introduced to reduce the search space dimension. By applying the dimension reduction in [24], the proposed detection is independent of the constellation set; thus, the complexity is significantly reduced by setting the appropriate parameter values of N l and N s v . For example, when ( N S , N R , N D ) = ( 2 , 8 , 8 ) , the number of real multiplication of the JML detection is approximately 3.3 × 10 7 , while that of the proposed detection is approximately 2.4 × 10 6 .

5. Simulations

A coded MIMO system for a DF relay protocol is considered to operate with ( N S , N R , N D ) = ( 2 , 8 , 8 ) . A frame consists of a pilot and data with 32 and 265 lengths, respectively, and 4-QAM was adopted for symbol mapping. All underlying links were modeled as Rayleigh fading channels, and a linear minimum mean squared error (LMMSE) channel estimation was applied to the pilot. The rate 1 2 turbo code is adopted for channel coding and is based on parallel concatenated codes with feedforward and feedback polynomials ( 15 , 13 ) in octal notation. In addition, the source-to-relay link was assumed to be obtained at the destination. The low-complexity algorithm [24] with ( N l , N s v ) = ( 32 , 8 ) was applied to the proposed detection, where N l and N s v is the list size and dimension of the sub-vector, respectively. As a performance comparison, the MRC and selective decode-and-forward (SDF) methods were simulated using [6,29], respectively. A 16-bit cyclic-redundancy-check scheme was adopted for the SDF where only the corrected signal was forwarded to the destination.
The frame error rate (FER) for different detections is compared with the proposed detection in Figure 5. In this figure, perfect channel state information (PCSI) is assumed at the destination to explicitly check whether the proposed detection achieves a diversity gain. Direct communication (DC) is also simulated in Figure 5 to verify the effectiveness of the relay protocol. The MRC does not achieve a diversity gain from the relay because the detection errors at the relay are not mitigated. In contrast, the proposed detection and SDF efficiently achieve a diversity gain and therefore address the error propagation effect. In particular, the FER of the proposed detection approaches that of the JML with reduced complexity, as shown in Table 3.
In Figure 6, the FER for the proposed detection is depicted according to the number of pilots N p . The proposed detection outperforms conventional forms of detection by achieving a diversity gain and is independent of a pilot. However, the FER dramatically decreases as the number of pilots decreases, because the FER of the MIMO system that uses one-bit ADCs is highly dependent on the channel estimation performance. Figure 7 shows the FER based on the number of the source, relay, and destination antennas. As the number of source antennas increases, the FER decreases owing to spatial multiplexing. In contrast, the FER improves with the number of destination antennas because the diversity gain of the proposed detection also increases. From this figure, the antenna configurations of ( N S , N R , N D ) = ( 2 , 8 , 8 ) are used in the simulations because a sufficient FER performance cannot be achieved in one-bit ADCs when the number of relay and destination antennas is small.
The FER of the proposed detection in the TWR protocol when N p = 32 is depicted in Figure 8. Similar to Figure 5, the proposed detection method outperformed conventional detection methods. In particular, the proposed detection achieves an FER similar to that of the JML. This achievement shows that the derived PEP in Lemma 1 is well upper bounded and is applicable to the error propagation model reported in [11]. Thus, the proposed detection method can efficiently mitigate the error propagation effect, regardless of the relay protocols adopted.

6. Conclusions

This study considered a detection scheme for cooperative MIMO systems using one-bit ADCs in a DF relay protocol. The detection error at the relay was the main cause of the performance degradation of the DF relay protocol. Especially, the error propagation effect was severe in one-bit ADCs, which produces the significant performance degradation. To efficiently mitigate the error propagation effect caused by the detection error, the upper bound of the PEP was first derived as a weighted Hamming distance. By using the derived PEP, the proposed detection was obtained as a single weighted Hamming distance form, and the low-complexity detection scheme was then applied to this form. The complexity of the proposed detection was analyzed in terms of real multiplications. The simulation results showed that the FER of the proposed detection approaches that of the JML; however, its complexity is considerably reduced.
An interesting direction for future research is to explicitly derive the diversity order for the proposed detection. To achieve this, the analyzed PEP in (16) of the ML detection can be exploited for the PEP calculation of the proposed detection. Then, the diversity order can be derived for the PEP calculation in a similar way to [25]. Other future research is to consider the one-bit transceiver at the nodes. The one-bit transceiver design is challenging research but will significantly increase the system power efficiency.

Funding

This work was supported by the Gachon University research fund of 2022 (GCU-202205680001).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The author declares that there is no conflict of interest.

Appendix A

Proof of Lemma A1.
The PEP for detecting x ˜ a when x a is transmitted is defined as:
P { x a x ˜ a } = r b { 1 , 1 } 2 N b P { r b | x a } 𝟙 { P { r b | x a } P { r b | x ˜ a } } ,
where the indicator is upper bounded by 𝟙 { A B } B A s with s [ 0 , 1 ] . By applying s = 1 2 to (A1), the upper bound of PEP is obtained as:
P { x a x ˜ a } r b { 1 , 1 } 2 N b P { r b | x a } P { r b | x ˜ a } P { r b | x a } 1 2 = r b { 1 , 1 } 2 N b P { r b | x a } P { r b | x ˜ a } .
By applying (4) to (A2), the PEP is further computed as:
P { x a x ˜ a } r b { 1 , 1 } 2 N b i = 1 2 N b P { r b , i | c a b , i ( x a ) } P { r b , i | c a b , i ( x ˜ a ) } = i = 1 2 N b r b , i { 1 , 1 } P { r b , i | c a b , i ( x a ) } P { r b , i | c a b , i ( x ˜ a ) } A ,
where term A in (A3) can be calculated by dividing two cases: c a b , i ( x a ) = c a b , i ( x ˜ a ) and c a b , i ( x a ) c a b , i ( x ˜ a ) . For c a b , i ( x a ) = c a b , i ( x ˜ a ) :
A = p a b , i x a p a b , i x ˜ a + 1 p a b , i x a 1 p a b , i x ˜ a .
For c a b , i ( x a ) c a b , i ( x ˜ a ) :
A = p a b , i x a ( 1 p a b , i x ˜ a ) + 1 p a b , i x a p a b , i x ˜ a .
By applying the results of (A4) and (A5) to (A3) and the log operation, the PEP is upper bounded as:
log P { x a x ˜ a } ( i = 1 2 N b [ w a b , i x a , x ˜ a c a b , i x a c a b , i x ˜ a 0 + w ˜ a b , i x a , x ˜ a ( 1 c a b , i x a c a b , i x ˜ a 0 ) ] ) ,
where w a b , i x a , x ˜ a and w ˜ a b , i x a , x ˜ a are, respectively, defined as
w a b , i x a , x ˜ a = log p a b , i x a p a b , i x ˜ a + 1 p a b , i x a 1 p a b , i x ˜ a , w ˜ a b , i x a , x ˜ a = log p a b , i x a 1 p a b , i x ˜ a + 1 p a b , i x a p a b , i x ˜ a .
(A6) can be transformed into the weighted distance form in (8), which completes the proof. □

References

  1. Swindlehurst, A.L.; Ayanoglu, E.; Heydari, P.; Capolino, F. Millimeter-Wave Massive MIMO: The Next Wireless Revolution? IEEE Commun. Mag. 2014, 52, 56–62. [Google Scholar] [CrossRef]
  2. Busari, S.A.; Huq, K.M.S.; Mumtaz, S.; Dai, L.; Rodriguez, J. Millimeter-Wave Massive MIMO Communication for Future Wireless Systems: A survey. IEEE Commun. Surv. Tut. 2017, 20, 836–869. [Google Scholar] [CrossRef]
  3. Fan, L.; Jin, S.; Wen, C.K.; Zhang, H. Uplink Achievable Rate for Massive MIMO Systems With Low-Resolution ADC. IEEE Commun. Lett. 2015, 19, 2186–2189. [Google Scholar] [CrossRef] [Green Version]
  4. Li, Y.; Tao, C.; Seco-Granados, G.; Mezghani, A.; Swindlehurst, A.L.; Liu, L. Channel Estimation and Performance Analysis of One-Bit Massive MIMO systems. IEEE Trans. Signal Process. 2017, 65, 4075–4089. [Google Scholar] [CrossRef]
  5. Jacobsson, S.; Durisi, G.; Coldrey, M.; Gustavsson, U.; Studer, C. Throughput Analysis of Massive MIMO Uplink with Low-Resolution ADCs. IEEE Trans. Wirel. Commun. 2017, 16, 4038–4051. [Google Scholar] [CrossRef]
  6. Sendonaris, A.; Erkip, E.; Aazhang, B. User Cooperation Diversity Part II: Implementatoin Aspects and Performance Analysis. IEEE Trans. Commun. 2003, 51, 1939–1948. [Google Scholar] [CrossRef] [Green Version]
  7. Sharma, G.V.V.; Ganwani, V.; Desai, U.B.; Merchant, S.N. Perforamnce Analysis of Maximum Likelihood Detectin for Decode and Forward MIMO Relay Channels in Rayleigh Fading. IEEE Trans. Wirel. Commun. 2010, 9, 2880–2889. [Google Scholar] [CrossRef]
  8. Bansal, A.; Bhatnagar, M.R.; Hjørungnes, A.; Han, Z. Low-Complexity Decoding in DF MIMO Relaying System. IEEE Trans. Veh. Technol. 2013, 62, 1123–1137. [Google Scholar] [CrossRef]
  9. Guan, W.; Liu, K.J.R. Mitigating Error Propagation for Wireless Network Coding. IEEE Trans. Wirel. Commun. 2012, 11, 3632–3643. [Google Scholar] [CrossRef] [Green Version]
  10. Chen, D.; Laneman, J.N. Modulation and Demodulation for Cooperative Diversity in Wireless Systems. IEEE Trans. Wirel. Commun. 2006, 5, 1785–1794. [Google Scholar] [CrossRef]
  11. Kim, H.-M.; Kim, T.-K.; Min, M.; Im, G.H. Low-Complexity Detection Scheme for Cooperative MIMO Systems with Decode-and-Forward Relays. IEEE Trans. Commun. 2015, 63, 94–106. [Google Scholar]
  12. Wen, C.-K.; Wang, C.-J.; Jin, S.; Wong, K.-K.; Ting, P. Bayes-Optimal Joint Channel-and-Data Estimation for Massive MIMO with Low-Precision ADCs. IEEE Trans. Signal Process. 2016, 64, 2541–2556. [Google Scholar] [CrossRef] [Green Version]
  13. Mo, J.; Heath, R.W. Capacity Analysis of One-Bit Quantized MIMO Systems with Transmitter Channel State Information. IEEE Trans. Signal Process. 2015, 63, 5498–5512. [Google Scholar] [CrossRef] [Green Version]
  14. Saxena, A.K.; Fijalkow, I.; Swindlehurst, A.L. Analysis of One-Bit Quantized Precoding for the Multiuser Massive MIMO Downlink. IEEE Trans. Signal Process. 2017, 65, 4624–4634. [Google Scholar] [CrossRef]
  15. Moll’en, C.; Choi, J.; Larsson, E.G.; Heath, R.W. Uplink Performance of Wideband Massive MIMO with One-Bit ADCs. IEEE Trans. Wirel. Commun. 2017, 16, 87–100. [Google Scholar] [CrossRef]
  16. Wang, H.; Wen, C.-K.; Jin, S. Bayesian Optimal Data Detector for mmWave OFDM System with Low-Resolution ADC. IEEE J. Sel. Areas Commun. 2017, 35, 1962–1979. [Google Scholar] [CrossRef] [Green Version]
  17. Kong, C.; Mezghani, A.; Zhong, C.; Swindlehurts, A.L.; Zhang, Z. Multipair Massive MIMO Relaying Systems With One-Bit ADCs and DACs. IEEE Trans. Sig. Process. 2018, 66, 2984–2997. [Google Scholar] [CrossRef] [Green Version]
  18. Yu, C.; Dai, X.; Yin, H.; Jiang, F. Full-duplex massive MIMO Relaying Systems with Low-Resolution ADCs over Rician Fading Channels. IET Commun. 2019, 13, 3088–3096. [Google Scholar] [CrossRef]
  19. Dai, J.; Liu, J.; Wang, J.; Zhao, J.; Cheng, C.; Wang, J. Achievable Rates for Full-Duplex Massive MIMO Systems with Low-Resolution ADCs/DACs. IEEE Access 2019, 7, 24343–24353. [Google Scholar] [CrossRef]
  20. Yu, S.; Liu, X.; Cao, J.; Zhang, Y. Low-Resolution ADCs for Two-Hop Massive MIMO Relay System under Rician Channels. Entropy 2021, 23, 1074. [Google Scholar] [CrossRef]
  21. Cao, C.; Li, H.; Hu, Z.; Zeng, H. One-Bit Transceiver Cluster for Relay Transmission. IEEE Commun. Lett. 2017, 21, 925–928. [Google Scholar] [CrossRef]
  22. Kim, D.; Hong, S.-N.; Lee, N. Supervised-Learning for Multi-Hop MU-MIMO Communications with One-Bit Transceivers. IEEE J. Sel. Areas Commun. 2019, 37, 2559–2572. [Google Scholar] [CrossRef] [Green Version]
  23. Kim, S.; Hong, S.-N. A Supervised-Learning Detector for Multihop Distributed Reception Systems. IEEE Trans. Veh. Tech. 2019, 68, 1958–1962. [Google Scholar] [CrossRef] [Green Version]
  24. Jeon, Y.-S.; Lee, N.; Hong, S.-N.; Heath, R.W. One-Bit Sphere Decoding for Uplink Massive MIMO Systems with One-Bit ADCs. IEEE Trans. Wirel. Commun. 2018, 17, 4509–4521. [Google Scholar] [CrossRef] [Green Version]
  25. Kim, T.-K.; Min, M.; Jeon, Y.-S. Performance Bound for MIMO Systems using One-Bit ADCs over Rayleigh Fading Channels. IEEE Trans. Veh. Tech. 2022, 71, 9067–9072. [Google Scholar] [CrossRef]
  26. Hassibi, B.; Vikalo, H. On the Sphere-Decoding Algorithm I. Expected Complexity. IEEE Trans. Signal Process. 2005, 53, 2806–2818. [Google Scholar] [CrossRef] [Green Version]
  27. Nguyen, S.L.H.; Ghrayeb, A.; Al-Habian, G.; Hasna, M. Mitigating Error Propagation in Two-Way Relay Channels with Network Coding. IEEE Trans. Wirel. Commun. 2010, 9, 3380–3390. [Google Scholar]
  28. Lee, K.; Hanzo, L. MIMO-Assisted Hard versus Soft Decoding-and-Forwarding for Network Coding Aided Relaying Systems. IEEE Trans. Wirel. Commun. 2009, 8, 376–385. [Google Scholar] [CrossRef] [Green Version]
  29. Laneman, J.N.; Tse, D.N.C.; Wornell, G.W. Cooperative Diversity in Wireless Networks: Efficient Protocols and Outage Behavior. IEEE Trans. Inf. Theory 2004, 50, 3062–3080. [Google Scholar] [CrossRef]
Figure 1. Transmitter and receiver for MIMO systems using one-bit ADCs.
Figure 1. Transmitter and receiver for MIMO systems using one-bit ADCs.
Sensors 22 07843 g001
Figure 2. DF relay protocol for the proposed system.
Figure 2. DF relay protocol for the proposed system.
Sensors 22 07843 g002
Figure 3. Verification of the weighted Hamming distance for the PEP in Lemma 1. (a) Different number of N D ; (b) different number of N S .
Figure 3. Verification of the weighted Hamming distance for the PEP in Lemma 1. (a) Different number of N D ; (b) different number of N S .
Sensors 22 07843 g003
Figure 4. DF protocol for two-way relay.
Figure 4. DF protocol for two-way relay.
Sensors 22 07843 g004
Figure 5. FER of the proposed detection with different detection schemes when ( N S , N R , N D ) = ( 2 , 8 , 8 ) .
Figure 5. FER of the proposed detection with different detection schemes when ( N S , N R , N D ) = ( 2 , 8 , 8 ) .
Sensors 22 07843 g005
Figure 6. FER for different length of pilots N p when LMMSE channel estimation is applied.
Figure 6. FER for different length of pilots N p when LMMSE channel estimation is applied.
Sensors 22 07843 g006
Figure 7. Impact of the number of antenna configurations ( N S , N R , N D ) on the proposed detection.
Figure 7. Impact of the number of antenna configurations ( N S , N R , N D ) on the proposed detection.
Sensors 22 07843 g007
Figure 8. FER of the proposed detection for different detection schemes in a two-way relay.
Figure 8. FER of the proposed detection for different detection schemes in a two-way relay.
Sensors 22 07843 g008
Table 1. Relevant studies for cooperative MIMO systems using one-bit ADCs.
Table 1. Relevant studies for cooperative MIMO systems using one-bit ADCs.
PapersDescriptionsPerformance Measure
[17]Multipair MIMO relay using one-bit transceiversCapacity
[18]Massive MIMO relay using one-bit transceiversCapacity
[21]Relay cluster using one-bit transceiversError rate
[22]Multihop relay using one-bit transceiversError rate
Table 2. Representative symbols in this study.
Table 2. Representative symbols in this study.
Symbols 1 Descriptions
x a transmitted signal at node a
H a b channel matrix between nodes a and b
w b noise signal at node b
y b received signal at node b
r b quantized signal at node b
P { r b | x a } the likelihood function when signal x a is transmitted
c a b x a (noise-free) codeword between nodes a and b
p a b , i x a Q 2 | h a b , i T x a |
w a b , i ( x a ) log p a b , i x a
w a b , i ( x a ) log 1 p a b , i x a
d w r b , c a b ( x a ) ; w a b ( x a ) , w ˜ a b ( x a ) the weighted Hamming distance
1 Subscripts a and b can be either source (S), relay (R), or destination (D).
Table 3. Complexity analysis in terms of real multiplications.
Table 3. Complexity analysis in terms of real multiplications.
Detection SchemesNumber of Real MultiplicationsExample a
JML ( 4 N S + 2 ) N D | A | 2 N S + ( 4 N R + 2 ) N D + ( 8 N S + 12 ) N R | A | 4 N S 32,526,336
MRC ( 4 N S + 2 ) N D + ( 4 N R + 2 ) N D | A | 2 N S 90,112
Proposed detection b ( 4 N S + 2 ) N D + ( 8 N S + 12 ) N R + ( 4 N R + 2 ) N D 4 N D 2 N l 2 N s v 2 2,359,296 c
a Antennas configuration with (NS, NR, ND) = (2, 8, 8) using 4-QAM modulation is applied for this example. b Nl is the list size and Nsv is sub-vector dimension for the low-complexity algorithm in [24]. c Parameters (Nl , Nsv) = (32, 8) are applied for this example.
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Kim, T.-K. Cooperative DF Protocol for MIMO Systems Using One-Bit ADCs. Sensors 2022, 22, 7843. https://doi.org/10.3390/s22207843

AMA Style

Kim T-K. Cooperative DF Protocol for MIMO Systems Using One-Bit ADCs. Sensors. 2022; 22(20):7843. https://doi.org/10.3390/s22207843

Chicago/Turabian Style

Kim, Tae-Kyoung. 2022. "Cooperative DF Protocol for MIMO Systems Using One-Bit ADCs" Sensors 22, no. 20: 7843. https://doi.org/10.3390/s22207843

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop