Next Article in Journal
Composite Harmonic Source Detection with Multi-Label Approach Using Advanced Fusion Method
Previous Article in Journal
Research on Compliance Control of Electro-Hydraulic Loading Experimental System
Previous Article in Special Issue
Energy-Efficient RIS-Enabled SISO-OFDMA Communication via Lower Bound Optimization
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Energy Efficient Wireless Signal Detection: A Revisit through the Lens of Approximate Computing

by
Abhinav Kulkarni
*,
Messaoud Ahmed Ouameur
and
Daniel Massicotte
*
Electrical and Computer Engineering Department, Université du Québec à Trois-Rivières, Trois-Rivières, QC G9A 5H7, Canada
*
Authors to whom correspondence should be addressed.
Electronics 2024, 13(7), 1274; https://doi.org/10.3390/electronics13071274
Submission received: 28 February 2024 / Revised: 21 March 2024 / Accepted: 26 March 2024 / Published: 29 March 2024
(This article belongs to the Special Issue Advances in Future Wireless Networks)

Abstract

:
In the pursuit of energy efficiency in next-generation communication systems, approximate computing is emerging as a promising technique. In the proposed work, efforts are made to address the challenge of bridging the gap between the level of approximation and the Quality-of-Service (QoS) of the system. The application of approximate multiplication to wireless signal detection is explored systematically, illustrated by employing Truncated Multiplication (TM) on Quadrature Phase Shift Keying (QPSK) Minimum Mean Square Error (MMSE) detection. The irregularities induced by approximation in the multiplication operation employed in wireless signal detection are captured by the Approximate Multiplication Noise (AMN) model, which aids in the analysis of signal fidelity and resiliency of the system. The energy efficiency gains through approximation are highlighted in the approximation analysis. Signal fidelity analysis provides the capability to predict system output for varying levels of approximation, which aids in improving the stability of the system. The higher approximation levels are advantageous in low Signal-to-Noise Ratio (SNR) regimes, whereas lower approximation levels prove beneficial in high SNR regimes.

1. Introduction

The explosive growth of mobile traffic, driven by the emergence of new services and applications [1] is propelling the development of next-generation communication systems. This surge in mobile traffic necessitates an increase in the communication system capability [2]. Crucial enabling technologies for next-generation communication systems operate at the spectrum-level, protocol-level, and infrastructure-level [3]. On the spectrum level, efforts are concentrated on increasing carrier frequencies, while at the protocol level, gains are projected through adjustments in data packet packaging. Infrastructure-level advancements in hardware technology play a pivotal role in enabling next-generation communication systems, where energy consumption is a key design factor impacting the scalability of the system [4].
The work [5] emphasizes the increasing importance of energy efficiency in system design, aligning it with considerations of spectral efficiency and spatial reuse. In wireless communication systems, energy consumption at Base Station (BS) and core networks became a noteworthy concern due to the imperative for extensive coverage, heightened BS density in populated areas, and management of data. Remarkably, a substantial portion, ranging from 60% to 80%, of the overall energy consumption is attributed solely to BS [6]. This energy consumption in active mode at the physical layer of BS is linked to baseband processing, RF processing, and signal power amplification. The average baseband energy consumption for a 4G LTE and 5G NR BS is approximately 150 and 220 Watts, respectively, constituting up to 5–15% of the total BS energy consumption [7]. Moreover, the energy efficiency of RF and power amplification is influenced by the efficiency of baseband processing [8].
The work [9] underscores the importance of integrating energy-efficient techniques into the design of baseband processing, addressing both operational costs and environmental concerns related to BS operation. Enhancing the energy efficiency of baseband processing, which plays a crucial role in BS operation, has a cascading effect on the overall energy consumption of the BS. Likewise, since wireless signal detection is fundamental to baseband signal processing, enhancing the energy efficiency of the former leads to an improvement in the energy efficiency of the latter. Going further, a system-wide perspective needs to include a real-time assessment and control of the energy consumption for wireless signal detection to cater to the incorporation of future technologies.
The following contributions are presented in this work:
  • Modeling of a constant noise model for wireless signal detection to evaluate the impact of irregularities caused by approximate multiplication. AMN is a novel constant noise model that effectively captures irregularities of TM for QPSK MMSE signal detection.
  • Gauging the effect of TM on Symbol Error Rate (SER) of QPSK MMSE signal detection. The derived analytical expression computes SER by using AMN.
  • Proposition of resiliency metrics to provide insights into resilient TM configurations for QPSK MMSE signal detection. A TM configuration characterized by a low level of approximation proves advantageous in high SNR regimes, whereas one with a high level of approximation is preferable in low SNR regimes.
In Section 1, the motivation for the work is established, and the contributions of the proposed work are laid out. Section 2 outlines the related work. In Section 3, the methodology is detailed, utilizing components to derive entities and primary metrics for the proposed work. Section 4 presents the derivation of secondary metrics and analysis. Finally, in Section 5, the conclusion of the proposed work is presented.

2. Related Work

QoS in wireless communication encompasses a set of components that collectively define and manage the level of service quality. Bit Error Rate (BER), SER, and Frame Error Rate (FER) are key factors in ensuring the QoS, directly impacting received signal fidelity [10]. Monitoring and controlling these factors is crucial for maintaining the reliability and stability of communication systems, especially in accuracy-sensitive applications. Several efforts are made in integrating energy efficiency with QoS. Energy awareness has been induced at the algorithmic level for Internet-of-Things (IoT) application and analyzed as a QoS factor in the work [11]. The work [12] highlights the integrated approach of QoS parameters including energy efficiency and their influence on the dynamic network condition and mobility of wireless sensor nodes. The work [13] explores the development of an optimal radio resource allocation method in 5G LTE networks based on adaptive selection of channel bandwidth depending on the QoS requirements.
As there has been a recent outburst to employ Artificial Intelligence (AI) techniques for intelligent automation, this approach has also been explored to achieve energy efficiency in communication systems [14,15]. However, the direct application of this approach at the physical layer of communication systems can incur additional computational overheads [16] related to ancillary data processing, which could potentially negate the energy efficiency benefits obtained at the foremost. Moreover, baseband processing of the physical layer is also being incorporated into resource-constrained edge computing devices, where the power budget is very stringent, but the performance constraints might be relaxed. The work [17] underscores the challenges of meeting the commercial budget requirements of power consumption of communication systems designed for THz frequency, which limits their operating frequency.
Approximate computing intentionally introduces errors into systems to enhance energy and resource consumption efficiency, albeit at the expense of tunable accuracy loss [18,19]. This methodology relies on the error-resilient nature of applications and employs disciplined methods for inserting errors into the system. The approach spans hardware, software, and cross-layer methodologies across diverse application domains to achieve efficiency improvements [20]. The work [21] delves into approximate computing techniques, exploring security issues and analyzing the impact of application level on neural network processing, as well as image, speech, and baseband signal processing. The work [22] specifically investigates the analysis of the impact of approximate computing on application quality through a three-step process involving error characterization, error propagation, and linking errors with the quality metric of the application. The work [23] explores the integration of approximation techniques with conventional computing tasks to enhance the efficient utilization of computational infrastructure. By characterizing a library of approximated operators, the work [24] proposes a Bayesian model for predicting error propagation. Their work demonstrates improved accuracy evaluations and computational efficiency, positioning it as a valuable tool for design space exploration in approximate computing.
In the context of next-generation communication systems, which prioritize flexible performance targets for enhanced energy efficiency [5,25], the use of approximate computing techniques becomes relevant, which is another approach for improving energy efficiency. These techniques allow a controlled trade-off in system performance, contributing to improved efficiency in communication systems. A comprehensive survey [26] on the potential of approximate computing techniques for existing and future B5G communication highlights SER as a crucial Key Performance Indicator (KPI) for channel-related problems while energy efficiency as a prime KPI for resource allocation. By employing approximate computing techniques within a fixed power budget for communication systems, it becomes possible to reduce overall system power consumption. This reduction in power consumption consequently frees up additional capacity for system scaling within the same power budget.
Recent advancements in approximate computing techniques for communication systems are summarized in Table 1. The decoder based on the Successive Cancellation (SC) algorithm enhances the Forward Error Correction (FEC) performance of polar codes; however, it limits the throughput of its hardware implementations. To tackle this challenge, configurable approximation units are introduced in optimized computation function blocks used in the SC algorithm to improve the throughput of the decoder in the work [27]. The work in [28] harnesses the error-resilient nature of the inherent Fast Fourier Transform (FFT) operation in the industrial wireless communication system to demonstrate the potential of approximate computing. The exact add/subtract operators in the butterfly structure of the FFT are replaced with approximate adders, and the impact of the modified FFT operations is analyzed at the system level. Additionally, the work emphasizes the challenges related to system reliability and suitable error metrics, stressing the need to establish a connection between the characteristics of approximate adders and system performance. The work in [29] explores the application of approximate computing in the expectation propagation algorithm used for the Sparse Code Multiple Access (SCMA) receiver. By employing approximation techniques, the complexity of the algorithm is reduced, which is characterized by the number of arithmetic operations. Approximations are incorporated into the expectation propagation algorithm at the variable and function node updates, as well as the log-likelihood ratio calculation, to decrease algorithmic complexity. Moreover, parameter optimizations are proposed to strike a balance between detection performance and algorithm complexity. In the work [30], exact computing units are substituted with approximate ones in Root Raised Cosine (RRC) Finite Impulse Response (FIR) filters used for pulse shaping at the BS and decoders/equalizers at the User Equipment (UE) in Single Input Single Output (SISO) and Multiple Input Multiple Output (MIMO) 6G downlink operations. The BER performance of the proposed approximate computing-empowered 6G SISO downlink is superior to its MIMO counterpart, where the induced approximations achieve substantial power savings. The BER performance degradation is more pronounced in the high SNR regime compared to the low/medium SNR regime. The work in [31] exploits gradient bounds to propose a novel encoding scheme for Quadrature Amplitude Modulation (QAM) mapping in the communication system required for a federated learning model. The results highlight the significance of quantifying the effects of approximation on the overall application. In a fixed SNR scenario, the test accuracy of the model deteriorates as the QAM modulation order increases.
While approximation techniques can enhance performance at the expense of reduced accuracy, their application tends to diminish the reliability of the system. In the work [32], strategies for testing approximate circuits are delineated, emphasizing the critical role of reliability in the application of approximation techniques to any system. To address the reliability challenge, it is necessary to precisely estimate the accuracy of the approximate system in correlation to the level of induced approximation. The work [33] delves into approximation techniques grounded in the determinism of system accuracy and the granularity control provided by these techniques. The objective is to bolster the reliability of approximate systems by accurately estimating system accuracy reflecting the level of approximation.
Multiplication operations are pivotal in communication systems, influencing overall processing capability and the efficiency of handling complex mathematical transformations. Precision in these operations is vital for maintaining system accuracy, directly impacting signal fidelity during reception. Moreover, the resource-intensive nature of multiplication operations consumes substantial computational resources. In the context of energy efficient communication system design, particularly in environments with resource constraints and battery-powered devices, optimizing the efficiency of multiplication operations becomes paramount. Therefore, the introduction of approximations in multiplication operations presents an opportunity to improve the overall energy efficiency of communication systems.
Arithmetic functional units performing operations like multiplication inherently function as nonlinear static systems and approximating them introduces irregularities in the system. The challenge lies in the insufficient capacity of current statistical metrics to fully capture these irregularities arising from approximation, creating a barrier to the widespread adoption of approximate arithmetic units as concerns about system reliability emerge. In one such attempt, the work [34] seeks to assess the impact of a nonlinear approximate adder on the application using statistical metrics. Accurately measuring the irregularities introduced in the computing system due to approximation is essential for enhancing the reliability of approximated systems and making more informed choices regarding the selection of approximation techniques.
Noise models are prevalent to model the cause of irregularities in the system, which may be deterministic or non-deterministic [35]. The peak value evaluation error method in wireless receivers was studied in the work [36] for urban noise impulses using past experimental data for different frequency bands, modulation schemes, and bit rates. Non-Gaussian noise was statistically modeled in the work [37] for signal processing applications. The work [38] provides an overview of impulse noise and its models, highlighting their similarities and differences in communication systems and by comparing the performance of single-carrier and multi-carrier communication systems under impulse noise. A computationally intensive Gaussian mixture model is employed to model the impulsive noise for computing analytical expression of SER [39].
In the systematic analysis depicted in Figure 1, the preliminary entities are derived from components. These entities are utilized to formulate primary metrics, while secondary metrics are derived from the primary ones. All analyses are conducted using primary and secondary metrics. The proposed work introduces an AMN model to characterize irregularities resulting from the approximate multiplication operation in wireless signal detection as shown in Figure 2. The TM structure is used as an approximate multiplication technique, while the MMSE technique is utilized for signal detection in the proposed work. Utilizing the AMN, a closed-loop expression for the SER is derived for QPSK MMSE signal detection with TM. This expression serves to assess the resilience of various configurations of TM for MMSE detection.

3. Methodology

3.1. Preliminary

The notation | . | signifies the absolute value, while E denotes the expectation operator. The symbols ℜ and ℑ represent the real and imaginary components, respectively. P { G } denotes the probability of occurrence of any event G . [ . ] 2 denotes integer values represented in two’s complement form. The Probablity Distribution Function (PDF) of normal distribution with mean μ and variance σ 2 is represented as N ( μ , σ ) = 1 σ 2 π exp 1 2 x μ σ 2 , where exp(.) is the exponential function. Adding a constant k to N ( μ , σ ) results in a new distribution, N ( k + μ , σ ) . Multiplying a normal distribution by k yields new normal distribution N ( k μ , k σ ) . For two normal distributions N ( μ 1 , σ 1 ) and N ( μ 2 , σ 2 ) , the resultant normal distribution is given as N ( μ 1 , σ 1 ) + N ( μ 2 , σ 2 ) = N ( μ 1 + μ 2 , σ 1 2 + σ 2 2 ) . The complementary error function, erfc ( . ) , evaluates to 0 as ∞ is approached and to 2 as is approached. Using the symmetry property of erfc(.), it can be inferred that erfc ( x ) = 2 erfc ( x ) . The integration of a normal distribution within the interval [ a , b ] is expressed as the definite integral [40]:
a b N ( μ , σ ) = 1 2 erfc a μ σ 2 erfc b μ σ 2
Cov(.) represents the covariance operation. The linear operations performed on a complex random variable apply to its real and imaginary components. The symbol × is used to denote the approximate multiplication of two operands.

3.2. Truncated Multiplication

Consider bit signals a i , b i , ϕ i { 0 , 1 } for i = 0 , 1 , , N 1 . In the context of signed multiplication, the N-bit multiplicand and multiplier operands are represented in two’s complement form as [ A ] 2 = a N 1 2 N 1 + i = 0 N 2 a i 2 i and [ B ] 2 = b N 1 2 N 1 + i = 0 N 2 b i 2 i , respectively. The multiplication product is denoted as [ P ] 2 = ϕ 2 N 1 2 2 N 1 + i = 0 2 N 2 ϕ i 2 i . In the Radix-4 Booth algorithm for encoding the multiplier [41], the multiplication product [ P ] 2 is computed using the Algorithm 1.
Algorithm 1 Signed multiplication using Radix-4 Booth algorithm.
  1:
[ A ] 2 and [ B ] 2 are N-bit multiplicand and multiplier.
  2:
procedure ( [ A ] 2 , [ B ] 2 , N )
  3:
      Initialize product [ P ] 2 as 0 with 2 N bits.
  4:
      Initialize b 1 as 0.
  5:
      for  i 0 to N / 2 1  do                 ▹ N 2 clock cycles
  6:
            if  b 2 i + 1 b 2 i b 2 i 1 = 001  or  b 2 i + 1 b 2 i b 2 i 1 = 010  then
  7:
                  [ P ] 2 [ P ] 2 + ( [ A ] 2 2 i )            ▹ 2 N clock cycles
  8:
            else if  b 2 i + 1 b 2 i b 2 i 1 = 101  or  b 2 i + 1 b 2 i b 2 i 1 = 110  then
  9:
                  [ P ] 2 [ P ] 2 ( [ A ] 2 2 i )            ▹ 2 N clock cycles
10:
            else if  b 2 i + 1 b 2 i b 2 i 1 = 011  then
11:
                  [ P ] 2 [ P ] 2 + ( [ A ] 2 4 i )            ▹ 2 N clock cycles
12:
            else if  b 2 i + 1 b 2 i b 2 i 1 = 100  then
13:
                  [ P ] 2 [ P ] 2 ( [ A ] 2 4 i )            ▹ 2 N clock cycles
14:
            end if
15:
      end for
16:
      return  [ P ] 2
17:
end procedure
The multiplication operation is approximated for TM by truncating the M least significant bits of every partial product generated by the multiplication operation, as illustrated in Figure 3. Thus, a TM configuration is decided by M. The TM product is obtained as [ P ^ ] 2 = ϕ 2 N 1 2 2 N 1 + i = M 2 N 2 ϕ i 2 i .
However, the operands used in baseband processing are rational numbers with a fractional part. Therefore, N-bit signed multiplication with fixed-point representation is considered for baseband processing, with N / 2 bits allocated for the integer part and N / 2 bits for the fractional part. Consequently, the operands for baseband processing are scaled by a factor of 2 N / 2 to convert them into two’s complement form. The multiplication product is then converted back to fixed-point representation from two’s complement form by using a scaling factor of 2 N . With operands [ A ] 2 = A · 2 N / 2 and [ B ] 2 = B · 2 N / 2 , the accurate multiplication is represented as P = ( [ A ] 2 [ B ] 2 ) 2 N , while the TM product is represented as P ^ = ( [ A ] 2 × [ B ] 2 ) 2 N .
The mean of the error between accurate multiplication and TM is given by μ P ^ = E { [ A ] 2 [ B ] 2 } E { [ A ] 2 × [ B ] 2 } . Considering the two’s complement form of operands, the exact value of μ P ^ is obtained through exhaustive simulation of all possible multiplication values for a particular N, as given in Table 2. For exhaustive simulation, all integer values from range [ 2 N 1 , 2 N 1 1 ) are considered for multiplicand and multiplier operand. However, when it is not feasible to perform exhaustive simulation for a particular N, μ P ^ is point estimated with selective multiplication values. For point estimating μ P ^ , K N samples from range [ 2 N 1 , 2 N 1 1 ) are considered for multiplicand and multiplier operand with an equal step size of 2 N 1 1 K N / 2 1 = 2 N 2 K N 2 . The mean of the error for fixed-point representation is given by:
ν P ^ = E { P P ^ } = E { P } E { P ^ } = μ P ^ 2 N

3.2.1. Regression Estimate for P ^

The P ^ values are obtained through the operation of TM. To derive an analytical expression for the SER, there is a necessity for a mathematical model representing P ^ . The P ^ values exhibit slight deviation from the P values for a specific operand pair. This relationship between approximate and accurate multiplication values is depicted in Figure 4 for N = 8 , where P and P ^ values display linear co-variation. This inference can be extended to other values of N without loss of generality. Utilizing this sufficient statistical information about covariance, it is possible to estimate P ^ from P as the predictor variable in a linear regression model [42].
Consider a linear regression model P ^ = β 0 + β 1 P + ϵ , where β 0 and β 1 are regression coefficients and ϵ N ( 0 , σ 2 ) is the error term. The estimated regression model is given as P ^ β 0 + β 1 P and the values of estimated regression coefficients β 0 ^ and β 1 ^ are calculated as follows:
β 1 ^ = Cov ( P ^ , P ) Cov ( P , P )
and
β 0 ^ = E { P ^ } β 1 ^ E { P }
Since Cov ( P ^ , P ) Cov ( P , P ) as inferred from Figure 4, it implies that β 1 ^ 1 ; hence, β 0 ^ can be evaluated from Equation (4) and Equation (2) as follows:
β 0 ^ = E { P ^ } E { P } = ν P ^
The estimated regression model can be calculated as follows:
P ^ P ν P ^
The linear regression model for P ^ in Equation (6) provides a crude estimate of the multiplication product values of TM, which will be used for SER computation.

3.2.2. Energy Efficiency

The energy efficiency of TM for a particular N and M is computed with respect to the accurate multiplication. For the analysis of energy efficiency, an approximate expression is computed henceforth. For any multiplication operation performed using a digital logic processor, the total power consumed can be expressed as E · # multiplication/sec, where E is the average energy consumed per multiplication operation. The latency T of the multiplication operation is computed as the product of total clock cycles and the processor clock frequency. The number of multiplication operations per second is thus 1 T . Low E signifies a more energy-efficient multiplication operation.
For accurate multiplication operation using the Radix-4 Booth algorithm, the total clock cycles consumed by the multiplication operation stem from the steps outlined in Algorithm 1. Primarily, every partial product computation consumes about 2 N clock cycles for a typical ripple carry addition operation. As there are N / 2 partial products to be computed, the total clock cycles consumed are about N / 2 ( 2 N ) = N 2 . In the case of TM as shown in Figure 3, the operand bit-width for partial product addition is 2 N M . Hence, the total clock cycles for TM are:
N 2 ( 2 N M ) = N 2 N M 2
For a processor operating at a clock frequency of F Hz, the latency of accurate multiplication and TM is computed as:
T P = N 2 F , T P ^ = N 2 N M 2 F
For a power budget of Q Joule intended for multiplication operation on the processor, consider both accurate multiplication and TM for a specific task. Then, the relation between energy per operation for accurate multiplication denoted as E P and E P ^ for TM can be derived as follows:
Q = E P T P , Q = E P ^ T P ^ E P T P = E P ^ T P ^
To quantify the reduction in average energy consumed per multiplication operation, the fractional gain due to approximation caused by TM can be computed as approximation gain as follows:
Approximation Gain = E P E P ^ = T P T P ^ = N 2 F N 2 N M 2 F = 2 N 2 N M
The relative change in E P ^ with respect to E P is calculated as:
E P E P ^ E P = 1 E P ^ E P
Expressing Equation (11) in terms of N and M as:
Energy Efficiency = E P E P ^ E P = M 2 N
The expressions for approximation gain and energy efficiency enable us to compare the gains achieved due to approximation for multiplication operation with accurate multiplication and TM.

3.3. SER Expression

For the QPSK constellation of symbols with each symbol represented by 2 bits, the alphabets for symbols are represented by set X = 1 j 1 , 1 + j 1 , 1 j 1 , 1 + j 1 . Let x be the signal representing the transmit symbol such that x X considering Additive White Gaussian Noise (AWGN) channel and constant fading channel h. E s represents the energy per symbol. AWGN for the receiver system is represented by w and the random variable W is used to represent the values of w such that W CN ( 0 , σ n 2 ) , where σ n 2 = N 0 and N 0 being the Noise Spectral Density (NSD). E s / N 0 is used to denote the SNR. The noise variance is evenly distributed between real and imaginary components of the symbol such that the variance per component is σ n 2 2 . The scaling factor for energy normalization for x is given as S = E s 2 .
The received signal is represented as:
y = S h x + w
Consider AMN as δ = δ + j δ . The received signal with AMN:
y ¯ = S h x + w + δ = y + δ
MMSE detection [43] is a signal detection technique derived using optimization of the mean square error between transmit and receive symbols. MMSE detection achieves near-optimal performance while maintaining low computational complexity, rendering it highly suitable for implementation across a wide array of computing platforms, particularly those with limited computing resources. Additionally, MMSE detection exhibits high robustness across various SNR conditions, particularly in scenarios characterized by low SNR levels. This robustness enhances error resilience within the system, which enables expansion of the scope for approximation with high reliability.
The transmit symbol is estimated using MMSE at the receiver represented by x ^ such that:
x ^ = 1 S E { | x | 2 } E { | x | 2 } | h | 2 + N 0 h * y = h * S | h | 2 y
as E { | x | 2 } | h | 2 N 0 .

3.3.1. AMN Model

The MMSE computes x ^ for transmit symbol x; however, by employing TM at the detection stage, an approximated x ^ is obtained. To compute expression for δ , the signal x ^ approximated by using TM at the receiver as shown in Figure 2a is equated to equivalent model of x ^ approximated by employing AMN and accurate multiplication as shown in Figure 2b. The approximate value of x ^ using TM at the receiver is computed as follows:
x ^ h * S | h | 2 × y = 1 S | h | 2 h × y + h × y + j S | h | 2 h × y h × y h S | h | 2 y + h S | h | 2 y 2 ν P ^ S | h | 2 + j h S | h | 2 y h S | h | 2 y
The approximate value of x ^ using accurate multiplication by employing AMN is computed as follows:
x ^ h * S | h | 2 y ¯ = h S | h | 2 y ¯ + h S | h | 2 y ¯ + j h S | h | 2 y ¯ h S | h | 2 y ¯ h S | h | 2 y + h S | h | 2 y + h δ + h δ S | h | 2 + j h S | h | 2 y h S | h | 2 y + h δ h δ S | h | 2
Equating Equations (16) and (17):
h δ + h δ = 2 ν P ^
and
h δ h δ = 0
From Equations (18) and (19), the values of δ , δ and eventually δ can be evaluated as:
δ = 2 ν P ^ h | h | 2 j 2 ν P ^ h | h | 2 = 2 h ν P ^ | h | 2
AMN facilitates use of signal y ¯ in x ^ detection.

3.3.2. SER Evaluation Using AMN

With signal x, consider the approximate detection of x ^ using MMSE detection by using signal y ¯ . For AWGN channel, the random variable for y ¯ is modeled as Y ¯ = S h x + W + δ . Separating Y ¯ into real and imaginary components Y ¯ N ( S h x S h x + δ , σ n / 2 ) and Y ¯ N ( S h x + S h x + δ , σ n / 2 ) . Hence,
x ^ h * S | h | 2 y ¯ X ^ h * S | h | 2 Y ¯
X ^ h S | h | 2 Y ¯ + h S | h | 2 Y ¯ + j h S | h | 2 Y ¯ h S | h | 2 Y ¯
The linear combination of two random variables also results in a random variable [44]. Using the PDF for Y ¯ and Y ¯ in Equation (22) and δ , the PDF expressions for real and imaginary parts for X ^ are evaluated as follows.
f X ^ 1 S | h | 2 N h ( S h x S h x + δ ) + h ( S h x + S h x + δ ) , σ n 2 h 2 + h 2 1 S | h | 2 N x S ( h 2 + h 2 ) 2 ν P ^ , σ n 2 | h | N x 2 ν P ^ S | h | 2 , σ n 2 S | h |
f X ^ 1 S | h | 2 N h ( S h x + S h x + δ ) h ( S h x S h x + δ ) , σ n 2 h 2 + h 2 1 S | h | 2 N x S ( h 2 + h 2 ) , σ n 2 h 2 + h 2 N x , σ n 2 S | h |
To compute the area under the inference regions for QPSK as shown in Figure 5, consider integrals I 1 , I 2 , I 3 , and I 4 . Using f X ^ and f X ^ when x , x = ± 1 , these integrals are computed as follows:
I 1 = 0 f X ^ x = 1 = 0 N 1 2 ν P ^ S | h | 2 , σ n 2 S | h | = 1 2 erfc S | h | 2 + 2 ν P ^ σ n | h |
I 2 = 0 f X ^ x = 1 = 0 N 1 2 ν P ^ S | h | 2 , σ n 2 S | h | = 1 2 2 erfc S | h | 2 + 2 ν P ^ σ n | h | = 1 2 erfc S | h | 2 2 ν P ^ σ n | h |
I 3 = 0 f X ^ x = 1 = 0 N 1 , σ n 2 S | h | = 1 2 erfc S | h | σ n
I 4 = 0 f X ^ x = 1 = 0 N 1 , σ n 2 S | h | = 1 2 2 erfc S | h | σ n = 1 2 erfc S | h | σ n
These integrals are used in evaluating the probability of correct symbol detection by the receiver for every symbol in X . The SER for QPSK is computed by evaluating the union probability that each of the symbols in X is transmitted and received correctly at the receiver [45]. The SER expression is computed as follows:
S E R = 1 1 4 i = 1 4 P ( x ^ = s i | x = s i ) = 1 1 4 ( I 1 I 3 + I 2 I 3 + I 2 I 4 + I 1 I 4 ) = 1 1 4 ( I 3 + I 4 ) ( I 1 + I 2 )
= 1 1 8 erfc S | h | σ n erfc S | h | 2 + 2 ν P ^ σ n | h | + erfc S | h | 2 2 ν P ^ σ n | h |
Substituting the values of S and σ n , = 1 1 8 erfc | h | E s 2 N 0 erfc | h | 2 E s + 2 2 ν P ^ | h | 2 N 0 +
erfc | h | 2 E s 2 2 ν P ^ | h | 2 N 0
SER is computed by simulation in Figure 2a using 5000 symbols in Python. The analytical expression of Equation (30) tracks SER obtained using simulation for N = 8 , 16 as shown in Figure 6. It can be observed that for both N = 8 and N = 16 , the SER starts increasing with an increase in SNR after M = N / 2 .

4. Analysis

4.1. Signal Fidelity Analysis

The SER of the QPSK MMSE signal detection using TM is evaluated in Figure 7 under varying channel gain conditions. The SER for a specific N, a specific channel gain and a specific SNR is bounded within an interval. The SER exhibits resilience for a range of M, forming the lower bound and begins to degrade thereafter with an increase in M. Furthermore, after a certain value of M, it becomes constant with a further increase in M, establishing the upper bound of SER.
For a given channel gain, the bound interval increases with an increase in SNR. Although the lower bound of SER decreases with an increase in channel gain, the bound interval increases significantly. This implies that approximation causes more degradation of SER for high channel gain. However, the resiliency is sustained for higher values of M when channel gain is increased for the same SNR. Additionally, resiliency is maintained for lower values of M, when SNR is increased for the same channel gain.

4.2. Approximation Analysis

TM configurations for N = 8 , 12 , 16 and 20 are analyzed for approximation gain and energy efficiency in Figure 8. Approximation gain is assessed using Equation (10) and energy efficiency is evaluated using Equation (12). Both approximation gain and energy efficiency increase with an augmentation in M for all values of N. However, the rate of increase in approximation gain and energy efficiency decreases as N increases. This observation implies that the approximation gain and energy efficiency are lower for higher values of N for a specific value of M.

4.3. Resiliency Analysis

For achieving high energy efficiency of the TM configuration in QPSK MMSE signal detection, it is crucial to choose a configuration that exhibits a high approximation gain for high energy efficiency. However, high approximation gain necessitates a corresponding increase in the value of M, resulting in a rise in the SER. Balancing a high approximation gain and minimizing the SER is key to achieving optimal performance when utilizing a TM for QPSK MMSE signal detection. The resiliency of TM configuration can be considered high if it provides high approximation gain without degrading much of the SER.
The Resiliency Ratio (RR) serves as a metric to quantify the resiliency of TM operation for QPSK MMSE detection for a specific combination of M, SNR and channel gain computed as follows:
RR | SNR , | h | 2 = Approximation Gain S E R | SNR , | h | 2
The Normalized Resiliency Ratio (NRR), defined as the ratio of RR to the maximum RR for a given h and SNR across all values of M scales the RR in range of [ 0 , 1 ] and is computed as follows:
NRR | SNR , | h | 2 = RR | SNR , | h | 2 max M N RR | SNR , | h | 2
While the NRR is a useful metric to analyze resiliency, it depends on SNR and channel gain. Hence, Average Normalized Resiliency Ratio (ANRR) provides insights into overall resiliency of the TM and is computed by averaging NRR values for K SNR samples of SNR in range [ 10 , 10 ) and K | h | samples of channel gain in range of [ 0 , 1 ) as follows:
ANRR = 1 K SNR K | h | | h | = 0 1 SNR = 10 10 NRR | SNR , | h | 2
The graph of NRR and ANRR exhibits a distinct resiliency dip, commencing at the resiliency crest and concluding at the resiliency trough. An examination of Figure 9 reveals that for lower values of M, NRR tends to be lower for lower SNR regime, as depicted in Figure 9a,d, in contrast to its behavior in high SNR regime seen in Figure 9c,f. Conversely, at higher values of M, NRR significantly rises at low SNR compared to its performance at high SNR. The resilience of approximations with low M is more pronounced in the high SNR regime, while those with high M are more resilient in the low SNR regime. The extent of the resiliency dips expands with an increase in both SNR and channel gain. Also, the value of M required to reach the resiliency crest rises with SNR.
In the lower SNR regime, NRR experiences low resiliency dips, while dips begin to form with an increase in channel gain. NRR approaches 0 after the resiliency trough for high M in high SNR regime and high channel gain. The resiliency trough decreases with an increase in SNR for all values of N. After a resiliency dip, surpassing the NRR beyond the resiliency crest towards 1 becomes increasingly difficult with an increase in SNR and channel gain. Until the resiliency crest is achieved, the rate of increase of NRR amplifies with an increase in both SNR and channel gain. Approximation with higher M is advantageous in low SNR regime, while that with lower M is advantageous in high SNR regime.
From the ANRR analysis presented in Figure 10 using K SNR = 20 and K | h | = 100 , it is evident that the rate of increase in ANRR diminishes with an increase in N. Resiliency dips for ANRR intensify with an increase in N and the resiliency trough decreases with an increase in N.

5. Conclusions

The proposed work systematically investigates the impact of employing approximate multiplication, represented by TM, on wireless signal detection, represented by QPSK MMSE detection. It aims to address the challenge of linking approximation level with QoS of the system through analyses of signal fidelity, resilience, and approximation. The study evaluates the AMN model to understand the effects of irregularities induced in the system by approximation and derives an analytical expression for the SER using the AMN model for signal fidelity analysis. A summary of all the simulations conducted for the proposed work is depicted in Table 3.
Signal fidelity analysis forecasts system output at different approximation levels, thereby enhancing the stability of the system. Energy efficiency increases with higher levels of approximation in TM. However, an increase in TM approximation leads to degradation of SER, and system reliability begins to decline after error resilience has been exhausted beyond a certain level of approximation. Resilience metrics capture this phenomenon and provide insights into reliable approximate configurations. Higher levels of approximation exhibit more resilience in low SNR scenarios, while lower levels of approximation are more resilient in high SNR scenarios. In the context of the proposed work, future avenues for exploration include extending the AMN model to accommodate high modulation schemes, diverse channel models, a variety of approximate multiplication schemes, and alternative receiver techniques.

Author Contributions

Conceptualization, A.K.; methodology, A.K.; software, A.K.; validation, A.K.; formal analysis, A.K.; investigation, A.K.; resources, M.A.O. and D.M.; data curation, A.K.; writing—original draft preparation, A.K.; writing—review and editing, M.A.O. and D.M.; visualization, A.K.; supervision, M.A.O. and D.M.; project administration, M.A.O.; funding acquisition, D.M. All authors have read and agreed to the published version of the manuscript.

Funding

The research was funded in part by Natural Sciences and Engineering Research Council of Canada (NSERC): CRSNG-RDCPJ 514758-17, in part by Prompt, in part by Canadian Foundation for Innovation (CFI), in part by CMC Microsystems, in part by Opal-RT Technologies Inc. and in part by Hydro-Québec.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript; or in the decision to publish the results.

References

  1. Jiang, W.; Han, B.; Habibi, M.A.; Schotten, H.D. The Road Towards 6G: A Comprehensive Survey. IEEE Open J. Commun. Soc. 2021, 2, 334–366. [Google Scholar] [CrossRef]
  2. Chowdhury, M.Z.; Shahjalal, M.; Ahmed, S.; Jang, Y.M. 6G Wireless Communication Systems: Applications, Requirements, Technologies, Challenges, and Research Directions. IEEE Open J. Commun. Soc. 2020, 1, 957–975. [Google Scholar] [CrossRef]
  3. Rajatheva, N.; Atzeni, I.; Bjornson, E.; Bourdoux, A.; Buzzi, S.; Dore, J.B.; Erkucuk, S.; Fuentes, M.; Guan, K.; Hu, Y.; et al. White paper on broadband connectivity in 6G. arXiv 2020, arXiv:2004.14247. [Google Scholar]
  4. Andersson, C.; Bengtsson, J.; Byström, G.; Frenger, P.; Jading, Y.; Nordenström, M. Improving energy performance in 5G networks and beyond. Ericsson Technol. Rev. 2022, 2022, 2–11. [Google Scholar] [CrossRef]
  5. Viswanathan, H.; Mogensen, P.E. Communications in the 6G era. IEEE Access 2020, 8, 57063–57074. [Google Scholar] [CrossRef]
  6. López-Pérez, D.; De Domenico, A.; Piovesan, N.; Xinli, G.; Bao, H.; Qitao, S.; Debbah, M. A survey on 5G radio access network energy efficiency: Massive MIMO, lean carrier design, sleep modes, and machine learning. IEEE Commun. Surv. Tutor. 2022, 24, 653–697. [Google Scholar] [CrossRef]
  7. Chih-Lin, I.; Han, S.; Bian, S. Energy-efficient 5G for a greener future. Nat. Electron. 2020, 3, 182–184. [Google Scholar]
  8. Seskar, I.; Patwary, M.; Dutta, A.; Chaparadza, R.; Elkotab, M. INGR Roadmap. In Proceedings of the 2022 IEEE Future Networks World Forum (FNWF), Montreal, QC, Canada, 10–14 October 2022; pp. 1–38. [Google Scholar] [CrossRef]
  9. Cheng, X.; Hu, Y.; Varga, L. 5G network deployment and the associated energy consumption in the UK: A complex systems’ exploration. Technol. Forecast. Soc. Chang. 2022, 180, 121672. [Google Scholar] [CrossRef]
  10. Khalili, R.; Salamatian, K. A new analytic approach to evaluation of packet error rate in wireless networks. In Proceedings of the 3rd Annual Communication Networks and Services Research Conference (CNSR’05), Halifax, NS, Canada, 16–18 May 2005; pp. 333–338. [Google Scholar]
  11. Sodhro, A.H.; Obaidat, M.S.; Abbasi, Q.H.; Pace, P.; Pirbhulal, S.; Fortino, G.; Imran, M.A.; Qaraqe, M. Quality of service optimization in an IoT-driven intelligent transportation system. IEEE Wirel. Commun. 2019, 26, 10–17. [Google Scholar] [CrossRef]
  12. Pundir, M.; Sandhu, J.K. A systematic review of quality of service in wireless sensor networks using machine learning: Recent trend and future vision. J. Netw. Comput. Appl. 2021, 188, 103084. [Google Scholar] [CrossRef]
  13. Beshley, H.; Beshley, M.; Medvetskyi, M.; Pyrih, J. QoS-aware optimal radio resource allocation method for machine-type communications in 5G LTE and beyond cellular networks. Wirel. Commun. Mob. Comput. 2021, 2021, 9966366. [Google Scholar] [CrossRef]
  14. Bertin, E.; Crespi, N.; Magedanz, T. Shaping Future 6G Networks: Needs, Impacts, and Technologies; John Wiley & Sons: Hoboken, NJ, USA, 2021. [Google Scholar]
  15. Chochliouros, I.P.; Kourtis, M.A.; Spiliopoulou, A.S.; Lazaridis, P.; Zaharis, Z.; Zarakovitis, C.; Kourtis, A. Energy efficiency concerns and trends in future 5G network infrastructures. Energies 2021, 14, 5392. [Google Scholar] [CrossRef]
  16. He, S.; Zhang, Y.; Wang, J.; Zhang, J.; Ren, J.; Zhang, Y.; Zhuang, W.; Shen, X. A survey of millimeter-wave communication: Physical-layer technology specifications and enabling transmission technologies. Proc. IEEE 2021, 109, 1666–1705. [Google Scholar] [CrossRef]
  17. Wang, Z.; Du, Y.; Wei, K.; Han, K.; Xu, X.; Wei, G.; Tong, W.; Zhu, P.; Ma, J.; Wang, J.; et al. Vision, application scenarios, and key technology trends for 6G mobile communications. Sci. China Inf. Sci. 2022, 65, 151301. [Google Scholar] [CrossRef]
  18. Leon, V.; Hanif, M.A.; Armeniakos, G.; Jiao, X.; Shafique, M.; Pekmestzi, K.; Soudris, D. Approximate Computing Survey, Part II: Application-Specific & Architectural Approximation Techniques and Applications. arXiv 2023, arXiv:2307.11128. [Google Scholar]
  19. Mittal, S. A Survey of Techniques for Approximate Computing. ACM Comput. Surv. 2016, 48, 62. [Google Scholar] [CrossRef]
  20. Que, H.H.; Jin, Y.; Wang, T.; Liu, M.K.; Yang, X.H.; Qiao, F. A Survey of Approximate Computing: From Arithmetic Units Design to High-Level Applications. J. Comput. Sci. Technol. 2023, 38, 251–272. [Google Scholar] [CrossRef]
  21. Liu, W.; Lombardi, F. Approximate Computing; Springer: Berlin/Heidelberg, Germany, 2022. [Google Scholar]
  22. Bosio, A.; Ménard, D.; Sentieys, O. Approximate Computing Techniques: From Component-to Application-Level; Springer International Publishing: Cham, Switzerland, 2022. [Google Scholar]
  23. Zamani, A.R.; Petri, I.; Diaz-Montes, J.; Rana, O.; Parashar, M. Edge-supported approximate analysis for long running computations. In Proceedings of the 2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud), Prague, Czech Republic, 21–23 August 2017; pp. 321–328. [Google Scholar]
  24. Traiola, M.; Savino, A.; Di Carlo, S. Probabilistic estimation of the application-level impact of precision scaling in approximate computing applications. Microelectron. Reliab. 2019, 102, 113309. [Google Scholar] [CrossRef]
  25. Damsgaard, H.J.; Ometov, A.; Nurmi, J. Approximation Opportunities in Edge Computing Hardware: A Systematic Literature Review. ACM Comput. Surv. 2023, 55, 1–49. [Google Scholar] [CrossRef]
  26. Damsgaard, H.J.; Ometov, A.; Mowla, M.M.; Flizikowski, A.; Nurmi, J. Approximate computing in B5G and 6G wireless systems: A survey and future outlook. Comput. Netw. 2023, 233, 109872. [Google Scholar] [CrossRef]
  27. Zhou, Y.; Chen, Z.; Lin, J.; Wang, Z. A high-speed successive-cancellation decoder for polar codes using approximate computing. IEEE Trans. Circuits Syst. II Express Briefs 2018, 66, 227–231. [Google Scholar] [CrossRef]
  28. Hao, M.; Najafi, A.; García-Ortiz, A.; Karsthof, L.; Paul, S.; Rust, J. Reliability of an industrial wireless communication system using approximate units. In Proceedings of the 2019 29th International Symposium on Power and Timing Modeling, Optimization and Simulation (PATMOS), Rhodes, Greece, 1–3 July 2019; pp. 87–90. [Google Scholar]
  29. Xiao, J.; Hu, J.; Han, K. Low complexity expectation propagation detection for SCMA using approximate computing. In Proceedings of the 2019 IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, 9–13 December 2019; pp. 1–6. [Google Scholar]
  30. Idrees, M.; Maqbool, M.M.; Bhatti, M.K.; Rahman, M.M.U.; Hafiz, R.; Shafique, M. An approximate-computing empowered green 6G downlink. Phys. Commun. 2021, 49, 101444. [Google Scholar] [CrossRef]
  31. Ma, X.; Sun, H.; Hu, R.Q.; Qian, Y. Approximate Wireless Communication for Federated Learning. arXiv 2023, arXiv:2304.03359. [Google Scholar]
  32. Anghel, L.; Benabdenbi, M.; Bosio, A.; Traiola, M.; Vatajelu, E.I. Test and reliability in approximate computing. J. Electron. Test. 2018, 34, 375–387. [Google Scholar] [CrossRef]
  33. Wyse, M.; Baixo, A.; Moreau, T.; Zorn, B.; Sampson, A.; Bornholt, J.; Ceze, L.; Oskin, M. Mapping and Modeling Approximate Computing Techniques. Available online: https://homes.cs.washington.edu/~luisceze/approx-darpa-report.pdf (accessed on 4 December 2023).
  34. Bruestel, M.; Kumar, A. Accounting for systematic errors in approximate computing. In Proceedings of the Design, Automation & Test in Europe Conference & Exhibition (DATE), Lausanne, Switzerland, 27–31 March 2017; pp. 298–301. [Google Scholar]
  35. Scales, J.A.; Snieder, R. What is noise? Geophysics 1998, 63, 1122–1124. [Google Scholar] [CrossRef]
  36. Nakamura, S. A study of errors caused by impulsive noise and a simple estimation method for digital mobile communications. IEEE Trans. Veh. Technol. 1996, 45, 310–317. [Google Scholar] [CrossRef]
  37. Middleton, D. Non-Gaussian noise models in signal processing for telecommunications: New methods an results for class A and class B noise models. IEEE Trans. Inf. Theory 1999, 45, 1129–1149. [Google Scholar] [CrossRef]
  38. Shongwe, T.; Vinck, A.H.; Ferreira, H.C. A study on impulse noise and its models. SAIEE Afr. Res. J. 2015, 106, 119–131. [Google Scholar] [CrossRef]
  39. Rozic, N.; Banelli, P.; Begusic, D.; Radic, J. GMM-Based Symbol Error Rate Analysis for Multicarrier Systems with Impulsive Noise Suppression. IEEE Trans. Veh. Technol. 2022, 71, 13060–13076. [Google Scholar] [CrossRef]
  40. Abramowitz, M. Abramowitz and Stegun: Handbook of Mathematical Functions; United States Department of Commerce: Washington, DC, USA, 1972; Volume 10. [Google Scholar]
  41. Bewick, G.W. Fast Multiplication: Algorithms and Implementation. Ph.D. Thesis, Stanford University, Stanford, CA, USA, 1994. [Google Scholar]
  42. Seber, G.A.; Lee, A.J. Linear Regression Analysis; John Wiley & Sons: Hoboken, NJ, USA, 2003; Volume 330. [Google Scholar]
  43. Tse, D.; Viswanath, P. Fundamentals of Wireless Communication; Cambridge University Press: Cambridge, UK, 2005. [Google Scholar]
  44. Springer, M.D. The Algebra of Random Variables; Wiley: Hoboken, NJ, USA, 1979. [Google Scholar]
  45. Haykin, S. Digital Communications; Wiley: New York, NY, USA, 1988. [Google Scholar]
Figure 1. System analysis for energy-efficient wireless signal detection using approximate multiplication circuit. The relationship between entities, metrics, and analysis with components is explicitly demonstrated.
Figure 1. System analysis for energy-efficient wireless signal detection using approximate multiplication circuit. The relationship between entities, metrics, and analysis with components is explicitly demonstrated.
Electronics 13 01274 g001
Figure 2. (a) MMSE detection using approximate multiplication. (b) Equivalent model for computing x ^ using AMN and accurate multiplication.
Figure 2. (a) MMSE detection using approximate multiplication. (b) Equivalent model for computing x ^ using AMN and accurate multiplication.
Electronics 13 01274 g002
Figure 3. TM implemented using Radix-4 Booth algorithm for signed N bit operands [ A ] 2 and [ B ] 2 .
Figure 3. TM implemented using Radix-4 Booth algorithm for signed N bit operands [ A ] 2 and [ B ] 2 .
Electronics 13 01274 g003
Figure 4. Variance of accurate multiplication values P and TM values P ^ for N = 8 for varying M. P and P ^ have linear covariance.
Figure 4. Variance of accurate multiplication values P and TM values P ^ for N = 8 for varying M. P and P ^ have linear covariance.
Electronics 13 01274 g004
Figure 5. Inference regions for the QPSK constellation.
Figure 5. Inference regions for the QPSK constellation.
Electronics 13 01274 g005
Figure 6. Comparison of SER for N = 8 , 16 with channel gain | h | 2 = 0.25 for varying M calculated analytically using Equation (30) and by simulation for (a) N = 8 ; (b) N = 16 .
Figure 6. Comparison of SER for N = 8 , 16 with channel gain | h | 2 = 0.25 for varying M calculated analytically using Equation (30) and by simulation for (a) N = 8 ; (b) N = 16 .
Electronics 13 01274 g006
Figure 7. Signal fidelity analysis for QPSK MMSE signal detection using TM for varying M for N = 8 , 16 , 12 and 20 for channel gain (a) | h | 2 = 0.25 ; (b) | h | 2 = 1 .
Figure 7. Signal fidelity analysis for QPSK MMSE signal detection using TM for varying M for N = 8 , 16 , 12 and 20 for channel gain (a) | h | 2 = 0.25 ; (b) | h | 2 = 1 .
Electronics 13 01274 g007
Figure 8. Approximation analysis with varying M truncation bits: (a) Approximation Gain; (b) Energy efficiency.
Figure 8. Approximation analysis with varying M truncation bits: (a) Approximation Gain; (b) Energy efficiency.
Electronics 13 01274 g008
Figure 9. NRR analysis for QPSK MMSE signal detection using TM for varying M. NRR evaluated for (a) | h | 2 = 0.25 , E s / N 0 ( d B ) = 10 ; (b) | h | 2 = 0.25 , E s / N 0 ( d B ) = 0 ; (c) | h | 2 = 0.25 , E s / N 0 ( d B ) = 10 ; (d) | h | 2 = 1 , E s / N 0 ( d B ) = 10 ; (e) | h | 2 = 1 , E s / N 0 ( d B ) = 0 ; (f) | h | 2 = 1 , E s / N 0 ( d B ) = 10 .
Figure 9. NRR analysis for QPSK MMSE signal detection using TM for varying M. NRR evaluated for (a) | h | 2 = 0.25 , E s / N 0 ( d B ) = 10 ; (b) | h | 2 = 0.25 , E s / N 0 ( d B ) = 0 ; (c) | h | 2 = 0.25 , E s / N 0 ( d B ) = 10 ; (d) | h | 2 = 1 , E s / N 0 ( d B ) = 10 ; (e) | h | 2 = 1 , E s / N 0 ( d B ) = 0 ; (f) | h | 2 = 1 , E s / N 0 ( d B ) = 10 .
Electronics 13 01274 g009
Figure 10. ANRR analysis for QPSK MMSE signal detection using TM for varying M with K SNR = 20 and K | h | = 100 .
Figure 10. ANRR analysis for QPSK MMSE signal detection using TM for varying M with K SNR = 20 and K | h | = 100 .
Electronics 13 01274 g010
Table 1. Approximate computing techniques for communication systems.
Table 1. Approximate computing techniques for communication systems.
WorkDescriptionApproximationModulationQoS
Zhou (2018) [27]Throughput improvement by utilizing approximate computation blocks for decoding FEC polar codes.SC decoder.-FER
Hao (2019) [28]Reliability assessment on utilizing approximate adders for industrial wireless communication.FFT.QPSKFER
Xiao (2019) [29]Complexity reduction of expectation propagation algorithm utilized for SCMA.Variable and functional node update, log likelihood ratio computation.-BER
Idrees (2021) [30]Gains by utilizing approximate computing units in digital signal processing filters in 6G downlink operation.FIR filter at pulse shaping/equalization/decoding.BPSK, QPSK, 8-PSKBER (link), Structural Similarity Index and Correlation Coefficient (Image transmission)
Ma (2023) [31]Approximate communication scheme for federated learning application.Gradients.QPSK, 16-QAM, 256-QAMTest accuracy
Table 2. Error mean ν P ^ values for N = 8 , 12 , 16 , 20 . ν P ^ values for N = 8 , 12 are calculated with exhaustive simulation of operands, while ν P ^ values for N = 16 , 20 are point estimated using K N = 4096 and represented by †.
Table 2. Error mean ν P ^ values for N = 8 , 12 , 16 , 20 . ν P ^ values for N = 8 , 12 are calculated with exhaustive simulation of operands, while ν P ^ values for N = 16 , 20 are point estimated using K N = 4096 and represented by †.
ν P ^
M N = 8 N = 12 N = 16 N = 20
1 9.77 × 10 4 6.10 × 10 5 3.81 × 10 6 2.38 × 10 7
2 3.91 × 10 3 2.44 × 10 4 1.57 × 10 5 9.56 × 10 7
3 1.37 × 10 2 8.54 × 10 4 5.64 × 10 5 3.35 × 10 6
4 3.71 × 10 2 2.32 × 10 3 1.55 × 10 4 9.09 × 10 6
5 9.96 × 10 2 6.23 × 10 3 4.13 × 10 4 2.44 × 10 5
6 2.40 × 10 1 1.50 × 10 2 9.88 × 10 4 5.89 × 10 5
7 5.84 × 10 1 3.65 × 10 2 2.38 × 10 3 1.43 × 10 4
8 1.33 × 10 0 8.34 × 10 2 5.41 × 10 3 3.27 × 10 4
9- 1.93 × 10 1 1.24 × 10 2 7.56 × 10 4
10- 4.27 × 10 1 2.75 × 10 2 1.67 × 10 3
11- 9.58 × 10 1 6.15 × 10 2 3.76 × 10 3
12- 2.08 × 10 0 1.33 × 10 1 8.16 × 10 3
13-- 2.93 × 10 1 1.80 × 10 2
14-- 6.27 × 10 1 3.85 × 10 2
15-- 1.36 × 10 0 8.35 × 10 2
16-- 2.88 × 10 0 1.77 × 10 1
17--- 3.81 × 10 1
18--- 8.04 × 10 1
19--- 1.71 × 10 0
20--- 3.59 × 10 0
Table 3. Simulation Summary.
Table 3. Simulation Summary.
AnalysisMetricParameterDescription
Entities
Computation ν P ^ N = 8 , 12 ; M = 1 N ; K N = 2 N ; Operand range [ 2 N 1 , 2 N 1 1 ) As given in Table 2, ν P ^ values are computed by exhaustive simulation.
Computation ν P ^ N = 16 , 20 ; M = 1 N ; K N = 4096 ; Operand range: [ 2 N 1 , 2 N 1 1 ) ;
step size = 2 N 2 K N 2
As given in Table 2, ν P ^ values are computed by point estimation.
CovarianceP, P ^ N = 8 ; M = 1 N ; K N = 2 N ;
Operand range [ 2 N 1 , 2 N 1 1 )
As depicted in Figure 4, P and P ^ have linear covariance.
Verification S E R N = 8 , 16 ; M = 1 N ; | h | 2 = 0.25 ,
5000 symbols per E s / N 0 ( d B )
As depicted in Figure 6, the analytical expression for SER tracks the SER computed by simulation.
System
Signal Fidelity S E R N = 8 , 12 , 16 , 20 ; M = 1 N ;
| h | 2 = 0.25 , 1 ; E s / N 0 ( d B ) = 10 , 0 , 10
As depicted in Figure 7, the bound interval increases with both the SNR and channel gain, which indicates a greater degradation in SER.
ApproximationApproximation Gain N = 8 , 12 , 16 , 20 ; M = 1 N As shown in Figure 8a, approximation gain increases with M for all N, while the rate of increase decreases with N.
ApproximationEnergy Efficiency N = 8 , 12 , 16 , 20 ; M = 1 N As shown in Figure 8b, energy efficiency increases with M for all N, while the rate of increase decreases with N.
ResiliencyNRR N = 8 , 12 , 16 , 20 ; M = 1 N ;
| h | 2 = 0.25 , 1 ; E s / N 0 ( d B ) = 10 , 0 , 10
As shown in Figure 9, high NRR is achieved by low M in high SNR regime and high M in low SNR regime.
ResiliencyANRR N = 8 , 12 , 16 , 20 ; M = 1 N ;
K SNR = 20 ; K | h | = 100
As shown in Figure 10, rate of increase in ANRR decreases with N and resiliency dips increase with N.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Kulkarni, A.; Ouameur, M.A.; Massicotte, D. Energy Efficient Wireless Signal Detection: A Revisit through the Lens of Approximate Computing. Electronics 2024, 13, 1274. https://doi.org/10.3390/electronics13071274

AMA Style

Kulkarni A, Ouameur MA, Massicotte D. Energy Efficient Wireless Signal Detection: A Revisit through the Lens of Approximate Computing. Electronics. 2024; 13(7):1274. https://doi.org/10.3390/electronics13071274

Chicago/Turabian Style

Kulkarni, Abhinav, Messaoud Ahmed Ouameur, and Daniel Massicotte. 2024. "Energy Efficient Wireless Signal Detection: A Revisit through the Lens of Approximate Computing" Electronics 13, no. 7: 1274. https://doi.org/10.3390/electronics13071274

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop