Next Article in Journal
Design of VGSOT-MTJ-Based Logic Locking for High-Speed Digital Circuits
Next Article in Special Issue
A Clutter Loss Model for Satellite Communication Systems
Previous Article in Journal
TORRES: A Resource-Efficient Inference Processor for Binary Convolutional Neural Networks Based on Locality-Aware Operation Skipping
Previous Article in Special Issue
V-Band Channel Modeling, Throughput Measurements, and Coverage Prediction for Indoor Residential Environments
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Asynchronous Partial Gaussian Approximation Detection Algorithm for Uplink-Grouped MIMO-SCMA System

1
School of Electronics & Information, Soochow University, Suzhou 215000, China
2
Yangtze Delta Region Institute (Quzhou), University of Electronic Science and Technology of China, Quzhou 324000, China
*
Author to whom correspondence should be addressed.
Electronics 2022, 11(21), 3536; https://doi.org/10.3390/electronics11213536
Submission received: 29 September 2022 / Revised: 24 October 2022 / Accepted: 27 October 2022 / Published: 30 October 2022

Abstract

:
To relieve the impact caused by different arrival times of multiple users in the uplink MIMO-SCMA system, a grouped multiuser transmission model, according to different delays and its corresponding detection scheme, is proposed in this paper. Assuming perfect synchronization in one group, a message-passing algorithm based on serial propagation (SP-MPA) is proposed to reduce the bit error rate (BER), which could transfer the updated information to the next symbol as its initial probability. Furthermore, with a more practical case, the partial Gaussian approximation method (PGA) is designed to decrease the interference resulting from the imperfect synchronization in one group. As the result, the computing complexity of the proposed PGA method could be decreased by at least 20% compared with SP-MPA and the BER could be improved by about 10%.

1. Introduction

With a sharp increase in data and large amounts of connection, communication networks are under unprecedented pressure. The fifth-generation mobile communication system (5G) is expected to support higher requirements and more scenarios [1].
Among all the technologies of 5G, novel multiple-access methods allow multiple users to transmit signals over the same time-frequency resource, which greatly improves the spectral efficiency [2]. Sparse code multiple access (SCMA) is a non-orthogonal multiple-access (NOMA) technology in the code domain that combines symbol mapping and spreading using multi-dimensional codebooks. Benefiting from its sparsity, the detection of multiple users becomes possible in massive machine type of communication (mMTC) [3,4].
For SCMA, a message-passing algorithm (MPA) is thought of as a basic detection method. It is an improvement on the maximum a posteriori (MAP), which iterates the edge probability without exhaustion of all combinations of codewords [5]. Now, more superior methods have been proposed. The authors of [6] proposed a (RRL) detector, which updates the function nodes only within a restricted search region and reduces the targeting points. In [7], a novel fixed low-complexity detector for an uplink SCMA system was proposed based on partial marginalization. Ref. [8] studied an improved sphere decoding for SCMA that achieves the optimal maximum likelihood detector for any arbitrary regular or irregular constellations. In [9], a generalized sphere-coding SCMA was proposed where sorted QR decomposition and Schnorr–Euchner enumeration are applied. Ref. [10] compared MAX-Log-MPA and Log-MPA, which aim to reduce the exponential operations. A deterministic message-passing algorithm in [11] utilized algorithmic simplifications for SCMA decoding, such as domain changing and probability approximation. The authors in [12] proved that serial scheduling-based MPA can reach a faster convergence by updating information with newly updated information in the same iteration.
The methods mentioned above mainly focus on a synchronous SCMA scheme, in which all signals are considered to arrive at the base station at the same time. However, in a real uplink channel, signals come from users in different directions or with different distances, resulting in different delays of transmission. Moreover, a grant scheme produces significant signaling cost, so grant-free transmission is introduced as a competitive alternative in 3rd Generation Partnership Project (3GPP) Release 16 [13]. That means delays of signals are completely random, adding great difficulty for uplink detection. Thus, exploring useful asynchronous detection algorithms is essential.
Some research paid attention to asynchronous detection. Ref. [14] devised a message-passing receiver for the uplink SCMA that uses expectation propagation to tackle the intractable distributions. Ref. [15] estimated a channel based on both received short pilot and data sequences and introduces auxiliary active-state indicators in joint detection. Ref. [16] proposed a blind detection algorithm for detecting user signals without the knowledge of a user codebook. Ref. [17] performed signal detection using deep learning with unknown channel information and system sparsity. Ref. [18] investigated an algorithm based on belief propagation and equal gain combining under asynchronous circumstances and effectively improves the system performance.
It is noted that delays can be various when connections of users are massive, which means the contents of the mixed signal received can be too various to decode in one scheme. Although the algorithms above perform well in an asynchronous system, few of them consider the problem caused by the variety of delays. Thus, making a detection rule is very important to relieve the bad effects brought by interference between symbols.
To further improve system performance, the multiple-input multiple-output (MIMO) technique is used to increase system reliability through diversity gain. Ref. [19] made a selection of receive antennas that minimizes the signal-to-interference ratio of the observed signal during the MPA calculations. Ref. [20] developed low-complexity iterative detection algorithms based on an expectation propagation algorithm. Ref. [21] studied spatial multiplexing (SMX), spatial modulation (SM) and space shift keying (SSK) techniques for the MIMO-SCMA systems. Ref. [22] proposed a partially active message passing based on the Gaussian approximation principle and a sliding window is introduced to determine what user stays active during each detection. The combination of MIMO and SCMA can enhance the performance greatly but it also adds computing complexity at the same time. Ref. [23] proposed a multi-dimensional space-time block code (MSTBC)-aided downlink MIMO-SCMA, which has almost the same complexity but better performance. In [24], a low-complexity codebook design algorithm based on the cross-entropy method and low-complexity MIMO-SCMA codeword detectors based on depth-first and breadth-first tree-search algorithms was proposed. Ref. [25] proposed a new scheme, named spatial modulation sparse code multiple access (SM-SCMA). At the receiver, a low-complexity joint message-passing algorithm is proposed.
Targeting the problems above, this paper constructs a grouped-detection scheme, in which users with similar delays are grouped together for the ease of joint detection. First, we assume that the scheme in the same group is perfect synchronization, which is to say that the delays of users’ information in the same group are exactly the same and delays are different between different groups. A message-passing algorithm based on serial propagation (SP-MPA) is proposed and utilized to propagate the updated information to the next symbol as the initial information. This method can effectively cut down the bit error rate because it sufficiently utilizes the same information without recalculation. Then, we consider the imperfect synchronization of users in the same group. In this scheme, performance undergoes a sharp degradation because of the interference of the delayed symbols. Therefore, we propose a partial Gaussian approximation-aided (PGA) algorithm to compensate the error and improve the transmission accuracy when ensuring lower complexity compared to original SP-MPA in the MIMO-SCMA system.
The contents of this paper are outlined as follows. Section 2 represents the asynchronous SCMA system model. Section 3 describes the detailed process of asynchronous detection using SP-MPA. The imperfect scheme in the same group and the process of PGA are illustrated in Section 4. Section 5 shows the final results of these algorithms, such as bit error rate and complexity. Finally, conclusions are drawn in Section 6.

2. System Model

In this paper, the uplink MIMO-SCMA system is constructed with one base station, K frequency resources and L users. Each user is equipped with one antenna and the base station has R antennas γ r ,   r = 1 R . The distance from each user to the base station is d l ( 1 l L ) . In this system, users are located in various directions and distances and send their information at any time. Users within the coverage of the base station are divided into different groups according to different delays.

2.1. Grouping Rule

As shown in Figure 1, different delays of the asynchronous multi-users would lead to various symbol detection cases. It is hard to perform signal sampling and detection algorithms without grouping. Therefore, a grouping rule will help improve the system performance through categorizing similar delays into one group.
Assuming that all users are in the same environment but only with different distances to the base station in the system model, we can divide the users with similar distances into one group.
For example, there are two groups in the system model. The users with the distances similar to the d g 1 could be grouped as g 1 and the users with the distances similar to the d g 2 could be grouped as g 2 . The users in both groups are defined as u g 1 ( j ) and u g 2 ( j ) ( 1 j J ) . The transmitting power of these users is normalized to P g 1 and P g 2 as the identity. The modulation order is M . The delay of two different user groups to the base station is τ g 1 and τ g 2 respectively and the arrows mean the transmitting direction, as Figure 2 illustrates.

2.2. Codebook

First, the mother codebook for each user group is designed, divided into diversity groups and assigned to users shared on each resource block. Each user maps their bit stream to its own codebook and transmits the mapped symbols to the base station.
The SCMA encoder maps log 2 ( M ) bits to a K × M codebook, B log 2 ( M ) X , X = [ x ( 1 ) , x ( 2 ) , , x ( J ) ] . In this model, each user occupies d k ( d k < K ) resource blocks and each resource block accommodates d j ( d j < J ) users.
d j = J × d k K
J = ( K d k ) = K × ( K 1 ) × × ( K d k + 1 ) d k × ( d k 1 ) × × 1
Two mother codebooks, C g 1 and C g 2 , are constructed with C g 1 assigned to near users and C g 2 assigned to far users. The radius of C g 1 is bigger than C g 2 and there is a rotated angle between them for distinction. In the uplink system, near users have better channel states, which are easier to be decoded. Thus, P g 1 is set bigger than P g 2 to obtain a more accurate result because of the joint detection. The mother codebooks are divided into d j diversities, respectively, to distinct users shared on the same resource block. Figure 3 shows the codeword distribution on the same resource block and users in these two groups both adopt QPSK modulation. The power of signals is normalized and the radius means the transmitting power of users in two groups. Constellation points in each group are M × d j ( d j = 2 ) in Figure 3.

2.3. Asynchronous Transmission Model

In the uplink, multiple users transmit data to the base station. Due to the different locations, the channel conditions are different and the fading and loss are also different. Users with similar distances to the base station are divided into one group, so that delays of the users in the same group could be assumed as the same value if the perfect detection scheme is used and the total delay of two different user groups to the base station is τ g 1 and τ g 2 , respectively. The symbol ‘+’ means that the noise is additive and ‘ ’ means addition operation, as shown in Figure 4.
In the asynchronous scheme, the superimposed signal received at the base station can be expressed as y = [ y 1 , y 2 , , y k , y K ] T , 1 < k < K . The resource blocks are orthogonal to each other, where OFDM is conducted, so that separate detection of frequency resource blocks can be performed. The superimposed signal on the same resource block is shown as below, where T k means the set of users on the k t h resource block, T 1 k = T 2 k = T k . τ g 1 can be written as 0, which is chosen as the reference. However, it is still marked in the following figures in order to be clearer. In addition, due to the similarity of delays in one group, we use rectangles with different colors to represent T 1 k and T 2 k . The ratio of τ g 2 and t s is defined as ρ , where t s means the lasting time of one symbol. Classification discussion of ρ is listed below and Figure 5 shows the transmission situations with different ρ .
  • 0 < ρ < 1 : the delay is within a symbol duration.
  • ρ = 0 , 1 , 2 , , N 1 : the delay is equal to an integer multiple of the symbol duration.
  • υ < ρ < μ ( υ = 1 , 2 , , N 1 , μ = υ + 1 ) : the delay is shifted υ symbol durations backward.
As shown in the diagram, situation 2 can be seen as a special case of situation 3, which is categorized into 3. The main difference between 1 and 3 is the first symbol where there is no interference of group 2 to group 1. However, if the first symbol is decoded, detection methods of the left symbols can be the same as 1. Without loss of generality, the following research is only discussed in light of situation 1. Figure 6 shows the complete transmission process.
The mathematical expression of the received signal in symbol-related form is represented below and the receiving structure is shown in Figure 7. Because of asynchronization, each symbol not only affects the current symbol but also affects the adjacent symbols [26]. For example, the second symbol of users in group 1 can be affected by the first and second symbol of users in group 2.
y k , g [ n ] = j = 1 d j h k , g ( j ) [ n ] × x g ( j ) [ n ] + g g ψ = 0 , ± 1 ξ g ψ × j = 1 d j h k , g ( j ) [ n + ψ ] × x g ( j ) [ n + ψ ] + w k [ n ] , n = 1 , N
ξ g 1 ψ = { 1 ρ , ψ = 0 ρ , ψ = 1 0 , ψ = 1
ξ g 2 ψ = { 1 ρ , ψ = 0 0 , ψ = 1 ρ , ψ = 1
n means the n t h symbol, ψ represents the subscript difference of adjacent symbols, which is 0 (current symbol), −1 (last symbol) or 1 (next symbol). ξ g 1 ψ and ξ g 2 ψ are functions of ρ and ψ . h k , g 1 ( d j ) and h k , g 2 ( d j ) represent the Rayleigh channel gain of user d j on the k t h resource block in group 1 and group 2. x g 1 ( d j ) and x g 2 ( d j ) mean the codeword sent by user d j and w k is the additive white Gaussian noise (AWGN), w k ~ C N ( 0 , σ 2 ) .

3. Asynchronous Detection Algorithm

This section describes two methods to detect information of users in two groups jointly. First, the traditional MPA method is revised and represented as the asynchronous scheme. Then, the SP-MPA method is proposed to improve the system performance.

3.1. MIMO-SCMA Scheme

Because the multi-user grouping model increases the number of accessed users, the number of interference terms will also increase, resulting in a high bit error rate in the system. In order to solve this problem, the multi-antenna-diversity effect can be used to increase transmission reliability and accuracy.
In the multi-antenna system, each antenna in the base station receives the same superimposed signal from the users. The joint factor graph is constructed, as in Figure 8. Each antenna can be converted into a virtual function node [27] and there are R × K function nodes in one group, which corresponded to R × K rows. Each resource block accommodates 2 × J users, which corresponded to 2 × J columns. The corresponding joint factor matrix is in Figure 9. It can be seen from the factor graph that the amount of information propagation increases as the number of antennas increases, which can improve system performance.

3.2. Asynchronous Log-MPA Method

MPA is an iterative algorithm based on factor graph. Through the calculation and propagation of edge probability between resource nodes and user nodes, the probability of each codeword is finally obtained. The final estimated bit stream is obtained by log likelihood ratio (LLR) decision.
In the synchronous detection method, each user obtains the codeword probability of each symbol through message transmission and the detection of each symbol is independent from each other. The traditional synchronization model can obtain more accurate results through the MPA algorithm. The model in this paper can also be detected by MPA. In order to reduce the exponential operation, log-MPA is used here.
First, the user codeword probability is initialized and then the message is passing according to the factor graph in Figure 8. Group 1 and Group 2 use the same factor graph, where FN refers to the frequency resource node and VN is the user node. The process of asynchronous log-MPA is illustrated as follows.
M j k 0 ( x ( j ) ) = P ( x ( j ) ) = log ( 1 M ) , j = 1 , , J , k H j
M k j t ( x ( j ) ) = max * { x ( i ) | i T k \ j } { 1 σ 2 y k , g [ n ] j T k h k , g ( j ) [ n ] × x g ( j ) [ n ] g g ψ = 0 , ± 1 ξ g ψ × j T k h k , g ( j ) [ n + ψ ] × x g ( j ) [ n + ψ ] 2 + i T k \ j M i k t 1 ( x ( i ) ) }
M j k t ( x ( j ) ) = log ( 1 M ) + i H j \ k M i j t 1 ( x ( i ) ) x ( i ) i H j \ k M i j t 1 ( x ( i ) )
log ( exp ( a 1 + + a n ) ) = max * ( a 1 , , a n ) = max ( a 1 , , a n ) + log ( 1 + i { 1 , , n } \ j exp ( | max ( a 1 , , a n ) a i | )
In the formulas, T k means the user set on the k t h resource block and H j means the resource set where the j t h user occupies. M k j t ( x ( j ) ) means the information passing from the k t h resource block to the j t h user node and M j k t ( x ( j ) ) means the information passing from the j t h user node to the k t h resource block. The updating process of M k j t ( x ( j ) ) is normalized and the definition of max * is listed in (9) [10]. Then, the LLR is conducted to recover the bit stream of users. Since the decision process is the same for each user group, the codeword probability Q ( x ( j ) ) and L L R ( b ( j ) ( i ) ) of users in two groups are represented in the same way. The whole process is listed in Algorithm 1.
Q ( x ( j ) ) = log ( 1 M ) + i H j M i j t max ( x ( j ) )
L L R ( b ( j ) ( i ) ) = log ( x ( j ) | b ( j ) ( i ) = 0 exp ( Q ( x ( j ) ) ) x ( j ) | b ( j ) ( i ) = 1 exp ( Q ( x ( j ) ) ) )
Algorithm 1. Asynchronous Log-MPA
Input:                 y , h , C g 1 , C g 2 , σ 2
Initialize:        P ( x ( j ) ) = log ( 1 / M ) , M j k 0 ( x ( j ) ) = P ( x ( j ) ) , M k j 0 ( x ( j ) ) = 0
1:                      forn = 1:N do
2:                           for t = 1: t max do
3:                                for k = 1 : R × K do
4:                                     use (7) to update M k j t ( x ( j ) )
5:                                end for
6:                                for j = 1 : J do
7:                                     use (8) to update M j k t ( x ( j ) )
8:                                end for
9:                           end for
10:                    for j = 1 : J do
11:                         use (10) to calculate the probability of codewords
12:                    end for
13:                    use (11) to conduct LLR decision
14:                    end for
Output:               b ( j ) [ n ] , n = 1 : N

3.3. SP-MPA Method

In the above asynchronous Log-MPA method, each time the iteration is performed, the prior probability starts from 1 / M . The probability information of the preceding signal is not involved in the calculation; that is, the asynchronous Log-MPA does not make good use of the previous decision information. Therefore, a message-passing algorithm based on Serial Propagation (SP-MPA) is proposed to fully utilize the known information to improve the system performance. The whole process is listed in Algorithm 2.
The received signal is detected according to the asynchronous transmission structure and formula of the received signal. The asynchronous transmission process reveals that y k , g 1 and y k , g 2 contain common information, which can be detected, respectively, to obtain more accurate information values. First, we perform MPA on y k , g 1 [ n ] and then perform MPA on y k , g 2 [ n ] . Because there exists the same symbol in y k , g 1 [ n ] and y k , g 2 [ n ] , the decoded information can be utilized for each other. For example, the final probability of the first symbol of users in Group 1 in the detection of y k , g 1 [ 1 ] can be used as the initial probability in the detection of y k , g 2 [ 1 ] .
Messages are passed between nodes and the node graph of the propagation process is shown in Figure 10. For clarity, only one user node shared on the first resource block is listed in the figure because each user on the same resource block has the same information updating mode. F g represents the likelihood probability of group g observed on the k t h resource block. Q 1 and Q 2 represent the output probability of codewords in Group 1 and Group 2 at the end of the iteration.
The propagation formulas are listed as follows. When detecting the first symbol, the initial probability has no reference, so that its value equals 1 / M . Then, the initial probability can be obtained from the last detection, which is propagated forward.
M j k 0 ( x g 1 ( j ) [ 1 ] ) = P ( x g 1 ( j ) [ 1 ] ) = log ( 1 M ) , j = 1 , , J , k H j
M j k 0 ( x g 2 ( j ) [ 1 ] ) = P ( x g 2 ( j ) [ 1 ] ) = log ( 1 M ) , j = 1 , , J , k H j
M j k , y g 1 [ n ] 0 ( x g 1 ( j ) [ n ] ) = M j k , y g 2 [ n - 1 ] t max ( x g 1 ( j ) [ n ] ) , n = 2 , 3 , N
M j k , y g 2 [ n ] 0 ( x g 2 ( j ) [ n ] ) = M j k , y g 1 [ n ] t max ( x g 2 ( j ) [ n ] ) , n = 2 , 3 , N
M k j t ( x ( j ) ) = max * { x ( i ) | i T k \ j } { 1 σ 2 y k , g [ n ] j T k h k , g ( j ) [ n ] × x g ( j ) [ n ] g g ψ = 0 , ± 1 ξ g ψ × j T k h k , g ( j ) [ n + ψ ] × x g ( j ) [ n + ψ ] 2 + i T k \ j M i k t 1 ( x ( i ) ) }
M j k t ( x ( j ) ) = log ( 1 M ) + i H j \ k M i j t 1 ( x ( i ) ) x ( i ) i H j \ k M i j t 1 ( x ( i ) )
Through the above algorithm, the previous information can be transmitted but the maximum number of iterations set by the traditional algorithm is not that accurate. Therefore, a precision is set to achieve a better convergence. If the difference between the codeword probability obtained by the previous iteration and the current iteration is smaller than the precision, the iteration is determined to be over. When the precision is bigger, it is easier for the difference in codewords to meet the precision and the iteration will end in advance, which reduces the complexity, but the accuracy will be reduced too.
Algorithm 2. SP-MPA
Input:               y , h , C g 1 , C g 2 , σ 2 , ε
Initialize:        P ( x ( j ) ) = log ( 1 / M ) , M j k 0 ( x ( j ) ) = P ( x ( j ) ) , M k j 0 ( x ( j ) ) = 0
                        conduct asynchronous Log-MPA to obtain the final probability of code-words
1:                    for n = 2 : N do
2:                          while | M j k t ( x ( j ) ) M j k t 1 ( x ( j ) ) | < ε
3:                                    use (14) and (15) to obtain the initial probability
4:                                for k = 1 : R × K do
5:                                    use (16) to update M k j t ( x ( j ) )
6:                                end for
7:                                for j = 1 : J do
8:                                    use (17) to update M j k t ( x ( j ) )
9:                                end for
10:                          end while
11:                    for j = 1 : J do
12:                          use (10) to calculate the probability of codewords
13:                    end for
14:                    use (11) to conduct LLR decision
15:                    end for
Output:               b ( j ) [ n ] , n = 1 : N

4. Partial Gaussian Approximation with Imperfect Synchronization in Group

The previous section described the asynchronous detection algorithms based on the model in Section 2. The delays in one group are assumed to be almost the same, which is the perfect synchronization. However, this hypothesis is ideal, which is hard to realize. Although we put the users with similar delays in one group, there still exists a difference between these users and the synchronization in one group is imperfect. The transmission process should be revised to Figure 11.

4.1. Imperfect Scheme

In Figure 11, the delays of users in the same set have a slight gap: α t s in T 1 k and β t s in T 2 k , remarked with oblique lines, which will affect the detection of subsequent symbols. For example, the second symbol of T 1 k ( 1 ) and the first symbol of T 2 k ( 1 ) and T 2 k ( 2 ) will be interfered by the first symbol of T 1 k ( 2 ) . Given that the users in the same group have similar delays, α and β are much smaller than ρ . Figure 12 illustrates the constellation distances of the two groups. For simplicity, only one point in Group 1 is drawn and the average distance between points in Group 1 and Group 2 is described as 1 ρ . In addition, the value of h k , g ( d j ) [ 1 ] is considered similar in one group to show constellations clearly. The pink squares are the first superimposed symbol of group 1 which should be detected, the green circles are the first superimposed symbol of group 2 which should be detected and the green squares are the final superimposed symbols of all users.
y k , g 1 [ 1 ] = j = 1 d j h k , g 1 ( 1 ) [ 1 ] × x g 1 ( j ) [ 1 ] + ( 1 ρ ) × j = 1 d j h k , g 1 ( 1 ) [ 1 ] × x g 1 ( j ) [ 1 ] + w k [ 1 ]
If the algorithms based on perfect asynchronization in a group are applied in this model, the symbols delayed will not be taken into consideration, causing a big performance loss. However, if all symbols are added into the iteration, the computing complexity will be raised to a higher level. Therefore, new algorithms should be proposed to balance the performance and the complexity.
y k , g [ n ] = { h k , g ( 1 ) [ n ] × x g ( 1 ) [ n ] + ψ 1 = 0 , ± 1 χ g ψ 1 h k , g ( 2 ) [ n + ψ 1 ] × x g ( 2 ) [ n + ψ 1 ] } + g g { ψ = 0 , ± 1 χ g ψ × h k , g ( 1 ) [ n + ψ ] × x g ( 1 ) [ n + ψ ] + ψ 2 = 0 , ± 1 χ g ψ 2 × h k , g ( 2 ) [ n + ψ 2 ] × x g ( 2 ) [ n + ψ 2 ] } + w k [ n ]
χ g 1 ψ 1 = { 1 α , ψ 1 = 0 α , ψ 1 = 1 0 , ψ 1 = 1   χ g 2 ψ = { 1 ρ , ψ = 0 ρ , ψ = 1 0 , ψ = 1   χ g 2 ψ 2 = { 1 ρ β , ψ 2 = 0 ρ + β , ψ 2 = 1 0 , ψ 2 = 1
χ g 2 ψ 1 = { 1 β , ψ 2 = 0 β , ψ 2 = 1 0 , ψ 2 = 1   χ g 1 ψ = { 1 ρ , ψ = 0 0 , ψ = 1 ρ , ψ = 1   χ g 1 ψ 2 = { 1 ρ + α , ψ 2 = 0 0 , ψ 2 = 1 ρ α , ψ 2 = 1
y k , g 1 [ n ] = { h k , g 1 ( 1 ) [ n ] × x g 1 ( 1 ) [ n ] + ψ 1 = 0 , + 1 χ g 1 ψ 1 h k , g 1 ( 2 ) [ n + ψ 1 ] × x g 1 ( 2 ) [ n + ψ 1 ] } + g g 1 { ψ = 0 , ± 1 χ g ψ × h k , g ( 1 ) [ n + ψ ] × x g ( 1 ) [ n + ψ ] + ψ 2 = 0 , ± 1 χ g ψ 2 × h k , g ( 2 ) [ n + ψ 2 ] × x g ( 2 ) [ n + ψ 2 ] } + { χ g 1 1 h k , g 1 ( 2 ) [ n 1 ] × x g 1 ( 2 ) [ n 1 ] + w k [ n ] } z k , g 1 [ n ]
Consider the received signal in symbol-related form in (3). The whole formula should be revised and written as (19). ψ means the difference in subscript difference of adjacent symbols. There are three kinds of delays: the first user in T 1 k and T 2 k , the second user in T 1 k and the second user in T 2 k , so there are three kinds of χ g ψ : χ g ψ 1 , χ g ψ 2 and χ g ψ .
Further, the formula can be represented with signals needed and signals that are considered as Gaussian noise. Take y k , g 1 [ n ] , for example. In y k , g 1 [ n ] , the last symbol of user 2 in Group 1 is the interference, which should be separated as the Gaussian noise. The last item in (22) includes the original Gaussian noise and the product of the last symbol of user 2 in Group 1 and its corresponding channel gain [28]. The formula of y k , g 2 [ n ] is derived in the same way, so only the process of y k , g 1 [ n ] is outlined.
z k , g 1 [ n ] is modeled as z k , g 1 [ n ] :   C N ( μ k [ n ] , σ 2 k [ n ] ) where μ k [ n ] and σ 2 k [ n ] are the mean and variance of z k , g 1 [ n ] , respectively, which are represented as follows. C g 1 , 2 ( k , m ) means the m t h codeword of user 2 on the k t h resource block in group 1. M 2 k t max ( x ( 2 ) = m ) means the probability of the m t h codeword of user 2 on the k t h resource block in Group 1, which is obtained from the last symbol detection.
Therefore, the message passing from the function node to the user node can be written as (25) and (26). The codeword probability Q ( x ( j ) ) and L L R ( b ( j ) ( i ) ) are the same as (10) and (11).
μ k [ n ] = h k , g 1 ( 2 ) [ n 1 ] m = 1 M C g 1 , 2 ( k , m ) M 2 k l a s t ( x ( 2 ) = m )
σ 2 k [ n ] = h k , g 1 ( 2 ) [ n 1 ] | 2 + { m = 1 M | C g 1 , 2 ( k , m ) | 2 M 2 k l a s t ( x ( 2 ) = m ) | μ k [ n ] | 2 } + σ 2
M k j t ( x ( j ) ) = max * { x ( i ) | i T k \ j } { 1 σ 2 k [ n ] y k , g [ n ] { h k , g 1 ( 1 ) [ n ] × x g 1 ( 1 ) [ n ] + ψ 1 = 0 , + 1 χ g 1 ψ 1 h k , g 1 ( 2 ) [ n + ψ 1 ] × x g 1 ( 2 ) [ n + ψ 1 ] } g g 1 { ψ = 0 , ± 1 χ g ψ × h k , g ( 1 ) [ n + ψ ] × x g ( 1 ) [ n + ψ ] + ψ 2 = 0 , ± 1 χ g ψ 2 × h k , g ( 2 ) [ n + ψ 2 ] × x g ( 2 ) [ n + ψ 2 ] } μ k [ n ] 2 + i T k \ j M i k t 1 ( x ( i ) ) }
M j k t ( x ( j ) ) = log ( 1 M ) + i H j \ k M i j t 1 ( x ( i ) ) x ( i ) i H j \ k M i j t 1 ( x ( i ) )
However, if the Gaussian approximation (GA) method is conducted on each resource block, the accuracy of detection will experience large degradation. To balance the detection performance and complexity, a partial Gaussian approximation (PGA) method [29] will be applied, in which only parts of resource blocks adopt the GA method with other blocks using Log-MPA. In Figure 13, for example, three resource blocks adopt PGA, which are marked with blue lines.
From the above PGA process, the imperfect synchronization in the group can be solved by regarding the interference as the Gaussian noise on resource blocks. At the same time, the complexity is reduced because the delayed symbol in one group is not computed in the iteration. The whole algorithm is listed in Algorithm 3.
Algorithm 3. PGA-MPA
Input:               y , h , C g 1 , C g 2 , σ 2 , ε
Initialize:        P ( x ( j ) ) = log ( 1 / M ) , M j k 0 ( x ( j ) ) = P ( x ( j ) ) , M k j 0 ( x ( j ) ) = 0
                        conduct asynchronous Log-MPA to obtain the final probability of code-words
1:                    for n = 2 : N do
2:                          while | M j k t ( x ( j ) ) M j k t 1 ( x ( j ) ) | < ε
3:                                   use (14) and (15) to obtain the initial probability
4:                                   use (23) and (24) to compute μ k [ n ] and σ 2 k [ n ]
5:                              for k = 1 : K 1 do
6:                                   use (25) to update M k j t ( x ( j ) )
7:                              end for
8:                              for j = 1 : J do
9:                                   use (26) to update M j k t ( x ( j ) )
10:                              end for
11:                          end while
12:                    for j = 1 : J do
13:                        use (10) to calculate the probability of codewords
14:                    end for
15:                    use (11) to conduct LLR decision
16:                    end for
Output:               b ( j ) [ n ] , n = 1 : N

4.2. Complexity Analysis

The complexity of the three algorithms mentioned before is listed in Table 1. Log-MPA and SP-MPA almost share the same complexity in the perfect scheme; the only difference is the number of iterations. From the simulation, the convergence ability is almost the same so the number of iterations is almost the same too.
In the imperfect scheme, SP-MPA (interference ignored) (SP-MPA (II)) has the lowest complexity, for it does not consider the interference and SP-MPA has the highest complexity, for it considers all symbols into iterations. In PGA-MPA, the complexity is reduced from M 3 × d j + 1 × R × K to M 3 × d j + 1 × K 1 + M 3 × d j × ( R × K K 1 ) exponentially.
In the perfect scheme, d j is smaller than that in the imperfect scheme, so the computing operations of these algorithms are also fewer than that in the imperfect scheme.

5. Simulation Results

In this section, simulation and numerical analysis are conducted in different schemes. The superiority of SP-MPA and PGA-MPA is verified in the grouped system. The parameters in this paper are listed in Table 2. The transmitting signal power is normalized to 1 in this paper.
Figure 14 shows the system-average BER performance of Log-MPA and SP-MPA, in which g 1 represents the near-user group and g 2 represents the far-user group. Using SP-MPA can greatly reduce the bit error rate and improve the system performance, especially under the condition of high signal-to-noise ratio. It can be seen from the figure that the downward trend of Log-MPA is not obvious with the bit error rate being at a high level, while the curve of SP- MPA begins to decline rapidly when Eb/N0 is greater than 15 dB and the bit error rate is close to 10 5 when Eb/N0 is 30 dB. When Eb/N0 is smaller (less than 15 dB), the incorrect probability of codewords in the previous detection will affect the next symbols; thus, the curve of SP-MPA is closer to that of log-MPA. When Eb/N0 is higher, the correct ability will become higher; thus, the gap between these two algorithms will become larger.
The reason is that the initial codeword probability of Log-MPA starts with 1 / M at each iteration, while SP-MPA retains the probability of the previous detection as the initial probability. Previous codeword probability has been fully calculated so it is not necessary to calculate from scratch in this detection.
Figure 15 illustrates the results with different numbers of users in two groups. When user activity is higher, more users share the same resource and the average BER would be increased quickly.
Figure 16 shows the bit error rate performance of the MIMO system with different numbers of receiving antennas at the base station. Increasing the number of receiving antennas is equivalent to increasing the number of virtual resource nodes. When the number of transmission paths increases, the reliability of code probability is improved. When Eb/N0 is 15 dB, the average bit error rate in Group 1 and Group 2 is 0.1079 and 0.2487, respectively, when R is 1. The average bit error rate is 0.0167 and 0.0873 when R is 2 and 0.0007 and 0.0141 when R is 4. It can be seen that the diversity effect of multiple antennas brings lower bit error rate and more reliable performance.
In the imperfect scheme, if the interference is ignored (SP-MPA (interference ignored), SP-MPA (II)), the decoding performance is too bad to obtain the correct signals sent by users. It can be seen from Figure 17 that the SP-MPA (II) curve is almost a straight line without falling down. PGA-MPA computes the mean value and variance in the delayed symbol, so the correctability is higher than SP-MPA (II). Its correctability is lower than SP-MPA, owing to the delayed symbol is not involved in the iterations but only taken as Gaussian noise.
The antennas can be equalized to virtual function nodes, which can perform PGA-MPA. In Figure 18, when K 1 increases, more blocks adopt GA and the BER increases because of the approximation. However, the complexity also drops because of the reduction in nodes involved in the iterations.
Figure 19 shows the complexity and bit error rate of each algorithm in different schemes and the specific values are listed in Table 3. In the perfect scheme, Log-MPA and SP-MPA have similar complexity. In the simulation of convergence in Figure 20, the iterations are almost the same, which means the complexity is decided mainly by the iterations inside. The values on the y-axis in Figure 20 are the posterior probability of codewords (QPSK modulated symbols) in log format during the soft decoding processing; thus, higher value leads to higher detection probability. Compared to SP-MPA, the complexity of PM-MPA in [7] is lower but the bit error rate is much higher, reducing the reliability of communication. In the imperfect scheme, SP-MPA(II) has the lowest complexity with the worst performance and SP-MPA has the highest complexity with the best performance. PGA-MPA decreases some exponential operations and it balances the complexity and performance. In Figure 19, K 1 is set as 1. In order to eliminate unrelated factors, the operations and time are normalized.
Figure 21 shows the bit error rate with groups, which have different delay gaps α in one group. Here, only α is compared, for β has the same impact. It can be seen that smaller α leads to a lower bit error rate because of the smaller interference of delayed symbol. Therefore, users with similar delays have to be grouped in the same collection.

6. Conclusions

In this paper, an asynchronous grouped MIMO-SCMA system model is presented and its related detection algorithms are studied. First, with a perfect case in one group, the SP-MPA is proposed to utilize the information of previous detection and reduce the bit error rate of the system. Secondly, to compensate the imperfect synchronization in one group, the PGA-MPA is proposed to approximate the interference on parts of the resource blocks, which balances the complexity and correct ability, achieving a better detecting result. However, only four transmit antennas are considered in this paper due to the complexity problem. The cases with more antennas should be studied further.

Author Contributions

Conceptualization and methodology, X.W., N.Z. and J.H.; software and validation, X.W., N.Z.; writing—original draft preparation, X.W.; writing—review and editing, X.W.; supervision and project administration, J.H. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by National Natural Science Foundation of China, grant number 62071319.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Andrews, J.G.; Buzzi, S.; Choi, W.; Hanly, S.V.; Lozano, A.; Soong, A.C.K.; Zhang, J.C. What Will 5G Be? IEEE J. Sel. Areas Commun. 2014, 32, 1065–1082. [Google Scholar] [CrossRef]
  2. Saito, Y.; Kishiyama, Y.; Benjebbour, A.; Nakamura, T.; Li, A.; Higuchi, K. Non-Orthogonal Multiple Access (NOMA) for Cellular Future Radio Access. In Proceedings of the 2013 IEEE 77th Vehicular Technology Conference (VTC Spring), Dresden, Germany, 2–5 June 2013; pp. 1–5. [Google Scholar]
  3. Chen, Y.; Bayesteh, A.; Wu, Y.; Ren, B.; Kang, S.; Sun, S.; Xiong, Q.; Qian, C.; Yu, B.; Ding, Z.; et al. Toward the Standardization of Non-Orthogonal Multiple Access for Next Generation Wireless Networks. IEEE Commun. Mag. 2018, 56, 19–27. [Google Scholar] [CrossRef]
  4. Wang, Y.; Ren, B.; Sun, S.; Kang, S.; Yue, X. Analysis of non-orthogonal multiple access for 5G. China Commun. 2016, 13, 52–66. [Google Scholar] [CrossRef]
  5. Jiang, D.; Cui, Y. ML Estimation and MAP Estimation for Device Activities in Grant-Free Random Access with Interference. In Proceedings of the 2020 IEEE Wireless Communications and Networking Conference (WCNC), Seoul, Korea, 25–28 May 2020; pp. 1–6. [Google Scholar]
  6. Tian, L.N.; Zhao, M.J.; Zhong, J.; Xiao, P.; Wen, L. A low complexity detector for downlink SCMA systems. IET Commun. 2017, 11, 2433–2439. [Google Scholar] [CrossRef] [Green Version]
  7. Mu, H.; Ma, Z.; Alhaji, M.; Fan, P.; Chen, D. A Fixed Low Complexity Message Pass Algorithm Detector for Up-Link SCMA System. IEEE Wirel. Commun. Lett. 2015, 4, 585–588. [Google Scholar] [CrossRef]
  8. Vameghestahbanati, M.; Marsland, I.; Gohary, R.H.; Yanikomeroglu, H. A Novel SD-Based Detection for Generalized SCMA Constellations. IEEE Trans. Veh. Technol. 2019, 68, 10278–10282. [Google Scholar] [CrossRef]
  9. Fu, X.; Ruyet, D.L.; Silva, B.F.D.; Uchôa-Filho, B.F. A Simplified Sphere Decoding-Based Detector for Generalized SCMA Codebooks. IEEE Access 2022, 10, 516–534. [Google Scholar] [CrossRef]
  10. Ameur, W.B.; Mary, P.; Dumay, M.; Hélard, J.F.; Schwoerer, J. Performance study of MPA, Log-MPA and MAX-Log-MPA for an uplink SCMA scenario. In Proceedings of the 2019 26th International Conference on Telecommunications (ICT), Hanoi, Vietnam, 8–10 April 2019; pp. 411–416. [Google Scholar]
  11. Zhang, C.; Yang, C.; Pang, X.; Song, W.; Xu, W.; Zhang, S.; Zhang, Z.; You, X. Efficient Sparse Code Multiple Access Decoder Based on Deterministic Message Passing Algorithm. IEEE Trans. Veh. Technol. 2020, 69, 3562–3574. [Google Scholar] [CrossRef] [Green Version]
  12. Du, Y.; Dong, B.; Chen, Z.; Wang, X.; Gao, P. Improved Serial Scheduling-Based Detection for Sparse Code Multiple Access Systems. IEEE Wirel. Commun. Lett. 2017, 6, 570–573. [Google Scholar] [CrossRef]
  13. Abebe, A.T.; Kang, C.G. Grant-Free Uplink Transmission with Multi-Codebook-Based Sparse Code Multiple Access (MC-SCMA). IEEE Access 2019, 7, 169853–169864. [Google Scholar] [CrossRef]
  14. Wei, F.; Chen, W.; Wu, Y.; Ma, J.; Tsiftsis, T.A. Message-Passing Receiver Design for Joint Channel Estimation and Data Decoding in Uplink Grant-Free SCMA Systems. IEEE Trans. Wirel. Commun. 2019, 18, 167–181. [Google Scholar] [CrossRef] [Green Version]
  15. Li, Y.; Wang, W.; Song, X.; Gao, X.; Wang, L.; Fettweis, G.P. Unified Iterative Receiver Design in Uplink Grant-Free Massive MIMO SCMA Systems. In Proceedings of the GLOBECOM 2020—2020 IEEE Global Communications Conference, Taipei, Taiwan, 7–11 December 2020; pp. 1–6. [Google Scholar]
  16. Bayesteh, A.; Yi, E.; Nikopour, H.; Baligh, H. Blind detection of SCMA for uplink grant-free multiple-access. In Proceedings of the 2014 11th International Symposium on Wireless Communications Systems (ISWCS), Barcelona, Spain, 26–29 August 2014; pp. 853–857. [Google Scholar]
  17. Sivalingam, T.; Ali, S.; Mahmood, N.H.; Rajatheva, N.; Latva-Aho, M. Deep Learning-Based Active User Detection for Grant-free SCMA Systems. In Proceedings of the 2021 IEEE 32nd Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Helsinki, Finland, 13–16 September 2021; pp. 635–641. [Google Scholar]
  18. Yu, Q.Y.; Li, H.Y.; Meng, W.X.; Xiang, W. Sparse Code Multiple Access Asynchronous Uplink Multiuser Detection Algorithm. IEEE Trans. Veh. Technol. 2019, 68, 5557–5569. [Google Scholar] [CrossRef]
  19. Silva, B.F.d.; Inácio, J.C.; Scharf, A.L.; Uchôa-Filho, B.F. Design of A Low-Complexity Receiver for Uplink SCMA with Multiple Receive Antennas. In Proceedings of the 2021 IEEE Statistical Signal Processing Workshop (SSP), Rio de Janeiro, Brazil, 11–14 July 2021; pp. 176–180. [Google Scholar]
  20. Mheich, Z.; Hemadeh, I.A.; Liu, Z.; Xiao, P. Low-Complexity Expectation Propagation Detection for Uplink MIMO-SCMA Systems. In Proceedings of the 2020 International Conference on UK-China Emerging Technologies (UCET), Glasgow, UK, 20–21 August 2020; pp. 1–4. [Google Scholar]
  21. Eltira, K.; Alawami, N.; Younis, A.; Mesleh, R. On the Theoretical Capacity of Cooperative Amplify and Forwards MIMO Sparse Code Multiple Access Systems. In Proceedings of the 2021 IEEE 1st International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and Computer Engineering MI-STA, Tripoli, Libya, 25–27 May 2021; pp. 639–646. [Google Scholar]
  22. Dai, J.; Chen, G.; Niu, K.; Lin, J. Partially Active Message Passing Receiver for MIMO-SCMA Systems. IEEE Wirel. Commun. Lett. 2018, 7, 222–225. [Google Scholar] [CrossRef]
  23. Pan, Z.; Liu, W.; Lei, J.; Luo, J.; Wen, L.; Tang, C. Multi-Dimensional Space-Time Block Coding Aided Downlink MIMO-SCMA. IEEE Trans. Veh. Technol. 2019, 68, 6657–6669. [Google Scholar] [CrossRef]
  24. Chen, Y.M.; Hsu, Y.C.; Wu, M.C.; Singh, R.; Chang, Y.C. On Near-optimal Codebook and Receiver Designs for MIMO-SCMA Schemes. IEEE Trans. Wirel. Commun. 2022, 1. [Google Scholar] [CrossRef]
  25. Pan, Z.; Luo, J.; Lei, J.; Wen, L.; Tang, C. Uplink Spatial Modulation SCMA System. IEEE Commun. Lett. 2019, 23, 184–187. [Google Scholar] [CrossRef]
  26. Haci, H.; Zhu, H.; Wang, J. Performance of Non-orthogonal Multiple Access with a Novel Asynchronous Interference Cancellation Technique. IEEE Trans. Commun. 2017, 65, 1319–1335. [Google Scholar] [CrossRef]
  27. Kang, G.M.; Kirn, H.M.; Shin, Y.; Shin, O.S. Multiple antenna MPA detection for uplink SCMA systems based on selective Gaussian approximation. In Proceedings of the 2017 23rd Asia-Pacific Conference on Communications (APCC), Perth, Australia, 11–13 December 2017; pp. 1–4. [Google Scholar]
  28. Dai, J.; Niu, K.; Lin, J. Iterative Gaussian-Approximated Message Passing Receiver for MIMO-SCMA System. IEEE J. Sel. Top. Signal Process. 2019, 13, 753–765. [Google Scholar] [CrossRef]
  29. Shang, Y.; Kim, S.; Kim, H.; Seo, J.; Hur, N.; Jung, T. Partial Gaussian-Approximation Soft Demapper for the Core Layer of MIMO-LDM in ATSC 3.0. IEEE Trans. Broadcast. 2022, 68, 123–131. [Google Scholar] [CrossRef]
Figure 1. Different delays in the detection of asynchronous multi-users.
Figure 1. Different delays in the detection of asynchronous multi-users.
Electronics 11 03536 g001
Figure 2. Multi-user grouped model.
Figure 2. Multi-user grouped model.
Electronics 11 03536 g002
Figure 3. Codebooks of multi-user group on the kth resource.
Figure 3. Codebooks of multi-user group on the kth resource.
Electronics 11 03536 g003
Figure 4. Uplink asynchronous MIMO-SCMA multi-user group system.
Figure 4. Uplink asynchronous MIMO-SCMA multi-user group system.
Electronics 11 03536 g004
Figure 5. Different transmission situations with different values of ρ .
Figure 5. Different transmission situations with different values of ρ .
Electronics 11 03536 g005
Figure 6. Diagram of two-group asynchronous transmission process.
Figure 6. Diagram of two-group asynchronous transmission process.
Electronics 11 03536 g006
Figure 7. Receiving signal structure.
Figure 7. Receiving signal structure.
Electronics 11 03536 g007
Figure 8. Joint factor graph.
Figure 8. Joint factor graph.
Electronics 11 03536 g008
Figure 9. Joint factor matrix.
Figure 9. Joint factor matrix.
Electronics 11 03536 g009
Figure 10. Node graph of the propagation process in SP-MPA.
Figure 10. Node graph of the propagation process in SP-MPA.
Electronics 11 03536 g010
Figure 11. Asynchronous transmission process with imperfect synchronization in group.
Figure 11. Asynchronous transmission process with imperfect synchronization in group.
Electronics 11 03536 g011
Figure 12. Constellation points of the first symbol.
Figure 12. Constellation points of the first symbol.
Electronics 11 03536 g012
Figure 13. Joint-factor graph with PGA.
Figure 13. Joint-factor graph with PGA.
Electronics 11 03536 g013
Figure 14. Average BER curves of log−MPA and SP−MPA.
Figure 14. Average BER curves of log−MPA and SP−MPA.
Electronics 11 03536 g014
Figure 15. Average BER of two groups with different numbers of users.
Figure 15. Average BER of two groups with different numbers of users.
Electronics 11 03536 g015
Figure 16. Average BER curves of SP−MPA in MIMO system.
Figure 16. Average BER curves of SP−MPA in MIMO system.
Electronics 11 03536 g016
Figure 17. Average BER curves in imperfect scheme.
Figure 17. Average BER curves in imperfect scheme.
Electronics 11 03536 g017
Figure 18. Impact of different K 1 in PGA−MPA.
Figure 18. Impact of different K 1 in PGA−MPA.
Electronics 11 03536 g018
Figure 19. Convergence of the codeword probability.
Figure 19. Convergence of the codeword probability.
Electronics 11 03536 g019
Figure 20. Normalized complexities of different algorithms.
Figure 20. Normalized complexities of different algorithms.
Electronics 11 03536 g020
Figure 21. Impact of different α in PGA−MPA.
Figure 21. Impact of different α in PGA−MPA.
Electronics 11 03536 g021
Table 1. Computing complexity in different schemes.
Table 1. Computing complexity in different schemes.
AlgorithmSchemeComplexity
Log-MPAPerfect scheme [ ( 3 × d j 1 ) × M 3 × d j × ( 3 × d j ) × R × K + d k × M × J ] × t max
SP-MPAPerfect scheme [ ( 3 × d j 1 ) × M 3 × d j × ( 3 × d j ) × R × K + d k × M × J ] × t f i n a l
SP-MPA (II)Imperfect scheme [ ( 3 × d j 1 ) × M 3 × d j × ( 3 × d j ) × R × K + d k × M × J ] × t max
SP-MPAImperfect scheme [ ( 3 × d j ) × M 3 × d j + 1 × ( 3 × d j + 1 ) × R × K + d k × M × J ] × t f i n a l
PGA-MPAImperfect scheme [ ( 3 × d j ) × M 3 × d j + 1 × ( 3 × d j + 1 ) × K 1 + ( 3 × d j 1 ) × M 3 × d j × 3 × d j × ( R × K K 1 ) + d k × M × J ] × t f i n a l
Table 2. Parameters and values in proposed algorithms.
Table 2. Parameters and values in proposed algorithms.
ParameterMeaningValue
K Number of resource blocks4
J Number of users in one group4
R Number of antennas of the base station1, 2, 4
d j Number of users on the same resource block2
d k Number of resource blocks occupied by the same user2
M The modulation order (QPSK)4
d g 1 The distance from the near group to the base station0.5 (km)
d g 2 The distance from the far group to the base station1.0 (km)
N Number of transmitted symbols20,000
t max The maximum number of iterations6
α delay gap in group 1[0.1–0.3]
β delay gap in group 2[0.1–0.3]
ρ delay gap between different groups[0.3–0.7]
P g 1 Normalized transmitting power of users in group 11
P g 2 Normalized transmitting power of users in group 20.8
Table 3. Complexity and bit error rate in different algorithms.
Table 3. Complexity and bit error rate in different algorithms.
AlgorithmSchemeComplexity (Normalized)Bit Error Rate (30 dB)
Log-MPAPerfect0.21222.1713 × 10−2
SP-MPAPerfect0.20972.0167 × 10−5
PM-MPAPerfect0.06446.6250 × 10−2
SP-MPA(II)Imperfect0.24014.5256 × 10−2
SP-MPAImperfect1.00001.8750 × 10−5
PGA-MPAImperfect0.78032.1056 × 10−2
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Wang, X.; Zhou, N.; Hou, J. Asynchronous Partial Gaussian Approximation Detection Algorithm for Uplink-Grouped MIMO-SCMA System. Electronics 2022, 11, 3536. https://doi.org/10.3390/electronics11213536

AMA Style

Wang X, Zhou N, Hou J. Asynchronous Partial Gaussian Approximation Detection Algorithm for Uplink-Grouped MIMO-SCMA System. Electronics. 2022; 11(21):3536. https://doi.org/10.3390/electronics11213536

Chicago/Turabian Style

Wang, Xue, Ninghao Zhou, and Jia Hou. 2022. "Asynchronous Partial Gaussian Approximation Detection Algorithm for Uplink-Grouped MIMO-SCMA System" Electronics 11, no. 21: 3536. https://doi.org/10.3390/electronics11213536

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop