Skip to main content

Scale effect analysis of early-termination fixed-complexity sphere detector

Abstract

In this paper, we show that the early-termination fixed-complexity sphere detector (ET-FSD) has a scale effect when being employed in multi-antenna systems that have to detect signals of multiple users under the constraint of sum complexity. The so-called scale effect stands for a kind of effect in which the complexity per user can be reduced as the number of users increases without loss of diversity order. The main contributions of this study are as follows: (1) we establish a mathematical model based on the large deviation principle to apply the concept of scale effect to ET-FSD; (2) we prove the existence of the scale effect of ET-FSD in a multi-user scenario; and (3) we demonstrate that within multi-user systems, the scale effect can be exploited to realize ET-FSD that has the optimal performance in the point view of diversity order under polynomial complexity constraint per user.

1 Introduction

1.1 Research on MIMO detection

Consider a spatial-multiplexing multiple-input multiple-output (MIMO) system with n T transmit and n R receive antennas, with the channel represented by the matrix H=[ h 1 h 2 h n T ] n R × n T , where h i is the i th column of H. All entries of the channel matrix H are independent and identically distributed (i.i.d.) zero-mean complex Gaussian random variables with unit variance. Let the entries of the vector s= [ s 1 s 2 s n T ] T n T × 1 be the transmit symbols, with each s i belonging to the constellation set D with size m. The signal model of the MIMO system is given by

y = H s + v = i = 1 n T h i s i + v ,

where y is the received signal vector, and v is the zero-mean circularly symmetric complex Gaussian noise with covariance matrix E(v v H )= σ 2 I n R , n R . We suppose that H is perfectly known at the receiver. Let E s denote the energy at the transmitter per symbol period, i.e., E s =E(| s i | 2 ). Without loss of generality, we assume that E s =1/n T and n Rn T. Under these conditions, the optimal scheme of MIMO detection that minimizes the average error probability is the maximum-likelihood (ML) detector expressed by

s ~ ML =arg min s ~ D n T yH s ~ F 2 .
(1)

In the context of high signal/noise ratio (SNR), the optimality of the ML detector can be interpreted as the full diversity which means that the detector is capable of achieving the diversity order n R[1]. Despite the optimal performance, however, the ML detector is not a promising scheme of MIMO detection in practice because of its extremely high complexity. It is evident from (1) that the ML detector has to perform an exhaustive search of m n T possible candidates and, thus, has the exponential complexitya C ML =O( m n T ).

Ever since MIMO techniques became widely accepted as among the few emerging key technologies for wireless communications, realizing the performance of the optimal or near-optimal MIMO detection without exhaustive search has been an interesting topic for decades [29]. It is known from [27] that the problem of Equation 1 can be formulated as a lattice search problem [24], an integer-least-squares problem [5], a semidefinite relaxation problem [6], and a shortest path problem [7] which are shown to have their own efficient solution methods (algorithms). Many low-complexity strategies can also be used to restrict computational complexity or make the search more efficient, including restricting the search or invoking early termination. Even in recent years, MIMO detection has remained an attractive topic [1015].

A lot of prior works have been done. However, to the authors’ knowledge, it is still hard to realize the MIMO detector with optimal performance (regarding both error probability and diversity order) with the polynomial complexity constraintb. It is shown in [5] that, for integer-least-squares problem with small problem size, the expected complexity of the sphere decoder (SD) at high SNR can be approximated by a polynomial function. The closet-lattice search and shortest path algorithm can efficiently cut down the complexity of solving the integer-least-squares problem [4, 7]. However, there does not exist a polynomial upper bound on SD complexity [16], closet-lattice search, or shortest path algorithm for any fixed SNR. With some fixed performance degradation (14) [16], the SD has an exponential complexity (in both the worst and the average cases) of C SD =O( m γ n T ) with γ(0,1] [16]. The fixed-complexity sphere decoder (FSD) is proved to maintain full diversity with a complexity of C FSD =O( m n T ) that is ‘subexponential’ [17]. On the other hand, the linear receivers, e.g., zero-forcing (ZF) and minimum mean square error schemes, have low complexity but quite poor diversity order n Rn T+1 [1]. The situation is discouraging as several profound studies show that many MIMO detectors have their own inherent limitations [16, 18, 19]. Under this situation, the authors believe that exploiting more potential positive factors in MIMO detectors might be one of the appropriate ideas to make the next breakthrough. In this paper, we focus on exploiting the potential positive factor of MIMO detection in a multi-user scenario.

1.2 MIMO detection in a multi-user scenario

It can be found that most studies on the complexity of MIMO detection are under a single-user assumption [213], while this study focuses on the complexity of MIMO detection in a multi-user scenario. To understand the motivation behind, one can think of the factor that MIMO receivers in base stations would have to detect signals from multiple-access users. In previous studies [20, 21], the scale effect-oriented MIMO detector (SEOD) was developed for multi-user system, which was also shown to have a kind of effect called the scale effect in which the complexity per user can be reduced as the number of users increases without loss of diversity order. Moreover, from [21], we know that scale effect would play an important role in a cloud base station because the cloud base station is a large-scale multi-user system where the baseband processes of a great number of base stations (each could have a lot of accessed users) are performed together within a virtual base station pool under the limit of overall run-time.

However, a big question left to us is whether the scale effect only exists in SEOD. If the answer is ‘yes’, it will mean that the scale effect has limited practical meanings since the SEOD is a very special MIMO detection scheme which has been carefully designed. Whereas if other schemes of MIMO detection also have the scale effect, we would expect that the scale effect could become an important feature of MIMO detection in multi-user scenarios.

1.3 Contributions

In this study, we focus on investigating the early-termination fixed-complexity sphere detector (ET-FSD) that is an extended version of FSD by incorporating early-termination mechanism. The existence of scale effect in ET-FSD is proven (Theorems 2 and 3). Due to the scale effect, the complexity per user of ET-FSD can be kept under a polynomial constraint while maintaining full-diversity performance (Theorem 3). We note that the original FSD has no scale effect; thus, in a multi-user case, it still achieves full diversity with subexponential complexity. This result implies that the scale effect not only exists in SEOD but also in ET-FSD and, thus, encourages us to extend and deepen the studies on scale effect in the future. Moreover, an analytical framework based on the large deviation principle is established to investigatethe scale effect in this paper, while [20] does not provide such a framework.

1.4 Organization

The rest of this paper is organized as follows: In Section 2, the ET-FSD scheme is specified, and its underlying mathematical model is presented. In Section 3, we prove that the ET-FSD in a single-user scenario is able to achieve full diversity; meanwhile, the complexity behavior of ET-FSD is studied considering both single-user and multi-user scenarios. With respect to the multi-user scenario, the scale effect of ET-FSD is rigorously defined, which in Section 4 is proven to exist. Consequently, the numerical results are provided in Section 5. We conclude our paper in Section VI.

2 Early-termination fixed-complexity sphere decoder

2.1 ET-FSD scheme

Among the existing MIMO detectors, the FSD [9] is an attractive scheme; it is highly suitable for hardware implementation due to its fixed complexity and parallel-computing-friendly features. By simply incorporating an early-termination mechanism into the FSD, we can establish the ET-FSD scheme. The main process of the ET-FSD is a constrained tree search through a tree with n T levels where m branches originate from each node. The whole tree search can be realized in two stages: full expansion (FE) and single expansion (SE) search stages, which can be summarized as follows:

  • The first stage is the FE search in which a full search is performed in p levels, expanding all m branches per node. In this stage, the transmit symbol with larger noise amplification appears at an earlier level of the tree. Note that a larger noise amplification can also be understood as a smaller post-processing SNR.

  • The second stage is the SE search in which a single search needs to be performed in the remaining n Tp levels. Analogous in principle to previous studies (such as in [17, 22]), the SE search expands one branch per node followed by the ZF estimate.

Besides the constrained tree search, the complete realization of the ET-FSD also includes the preprocessing of the channel matrix (as FSD [9, 17, 22] does), which determines the detection order of the transmit symbols and has two stages as well: the preprocessing for the FE search and that for the SE search. To be specific, the preprocessing of the channel matrix can be expressed by Algorithm 1 using the following notations. (·) denotes the Moore-Penrose pseudoinverse. FlagET is a flag that determines whether the early termination is enabled in the algorithm or not, i.e., FlagET = True means enabled, otherwise disabled. The function denoted by find(bx) finds the indices of the elements of the vector b that do not equal x. The preprocessing is realized iteratively, and within the j th iteration, the effective channel matrix H j is reconstructed by removing some column from H j−1, where the initialization condition is H 0=H. Accordingly, P j denotes the Moore-Penrose pseudoinverse of H j. Algorithm 1 returns a as the ordered indices of the transmit symbols. The elements of a with indices 1 to p are the indices of the transmit symbols to be detected in the FE search. Then the remaining n Tp elements of a are the indices of the transmit symbols to be detected in the SE search. Furthermore, b=[ b 1 , b 2 ,, b ( n T j ) ] is just an intermediate vector with its elements satisfying { b 1 , b 2 ,, b ( n T j ) }={1,2,, n T }{ a 1 , a 2 ,, a j }. Also, ρ n T E s / σ 2 =1/ σ 2 is the average SNR at the receiver (a.k.a. the average receive SNR), and γ(0,1) is a real value.

Algorithm 1 (a,p) = CHANNELPREPROCESSING(H,p,n T , FlagET,γ)

Compared with the channel preprocessing algorithm of the FSD [9, 17, 22], Algorithm 1 of the ET-FSD has a newly introduced functionality, as seen in lines 9 to 12, which can terminate early the loop of the preprocessing for the FE search depending on the channel matrix and update p before breaking the loop when FlagET := True is set. Moreover, we have p ¯ as one input of Algorithm 1 to guarantee full diversity. Early termination implies that the number of levels of the FE search stage could be less than p ¯ . If we set FlagET := False, Algorithm 1 would execute identically as [17, 22]. Thus, FSD could be considered as a special case of ET-FSD. In line 7, the index of the largest diagonal entry of P j(P j)H, i max, is found. In fact, the diagonal entries of P j(P j)H reflect the post-processing noise amplification (see (5) as well). In line 8, the original index of the transmit symbol, a (j+1), is obtained based on i max. It is clear that in the j th iteration of channel preprocessing, the a (j+1)th transmit symbol has the largest noise amplification. In this work, for both the convenience of mathematical analysis and the reduction of computational complexity, ZF is employed in the SE stage. Thus, the preprocessing for the SE stage is performed as in line 17.

The constrained tree search of the ET-FSD utilizes a and p, which are generated from the preprocessing of the channel matrix as the two most significant parameters. Analogous to the FSD, the tree search of the ET-FSD consists of two stages and can be illustrated as in Figure 1. On the other hand, we can express such tree search by Algorithm 2, which is in the iterative fashion. Before the details are examined, the required notation can be given as follows: D(k) is the k th element of constellation set D; ZF(·,·) denotes the functionality of zero-forcing estimate; s ~ SE [ s ~ a p + 1 , s ~ a ( p + 2 ) , , s ~ a n T ] T ; H SE [ h a ( p + 1 ) , h a ( p + 2 ) ,, h a n T ]; y j is the intermediate vector in the j th iteration; and s ~ a ( j + 1 ) is the a (j+1)th element of s ~ . The initial input of Algorithm 2 includes y 0: = y, j: = 0, d max: = + and s ~ :=[0,0,,0]. We note that, similar to most previous works [9, 22], the complexity spent on the preprocessing of channel matrix is ignored in our further analysis.

Figure 1
figure 1

Parallel-computing model of Algorithm 2. It is an example that has n T=n R=8 and m=4. The number of levels of the FE stage p= n T 1.

Algorithm 2 ( s ~ FSD ,d max ) = TREESEARCHFSD(y j, p ̄ ,j,d max , s ~ )

2.2 Mathematical model of the ET-FSD

Here we introduce the underlying mathematical model of the ET-FSD. Lines 2 to 6 of Algorithm 2 correspond to the manipulation of the FE search stage, while line 5 recursively invokes TREESEARCHFSD. After the final iteration of the FE search, the signal model becomes

y p = i { a ( p + 1 ) , a ( p + 2 ) , , a n T } h i s i + k { a 1 , a 2 , , a p } h k ( s k s ~ k ) w + v ,

where w is the interference caused by the difference between the symbols of s ~ FE and those of the transmit vector. Thus, the signal model left for the SE search is

y p = h a ( p + 1 ) h a ( p + 2 ) h a n T s a ( p + 1 ) s a ( p + 2 ) s a n T + w + v = H SE s a ( p + 1 ) s a ( p + 2 ) s a n T + w + v .
(2)

Applying the ZF estimate to (2), s ~ SE would be obtained as s ~ SE = ( H SE ) y p .

Herein we consider the path which is perfectly canceled at the FE search and satisfies s k s ~ k =0 for all k{a 1,a 2,,a p } such that w= [ 0,0,,0]. We can simplify the signal model left for the SE search as

y p = i { a ( p + 1 ) , a ( p + 2 ) , , a n T } h i s i + v .

Under such signal model, it should be clear that after the ZF estimate in the SE stage, s ~ SE = s SE + ( H SE ) v, where s SE = [ s a ( p + 1 ) , s a ( p + 2 ) , , s a n T ] T .

Meanwhile, lines 8 to 13 of Algorithm 2 perform the SE search in which m p candidate paths would be equalized by the ZF estimate, while one path with minimum Euclidean distance from y that corresponds to s ~ FSD is returned as the detected vector. In line 11, a specifies the indices of the elements of s ~ FSD .

2.3 A first look at the complexity of ET-FSD

Let us keep in mind that the FE search of ET-FSD has p levels, where p is determined by Algorithm 1. By referring to [17, 22], we know that the complexity of the SE search in ET-FSD does not dominate the overall complexity, but the FE search does. Thus, the overall complexity of the ET-FSD is dominated by p as ζ p =O(m p), where ζ p , for the convenience of expression, is defined as the overall complexity of the ET-FSD when the FE search stage has p levels. Obviously, ζ p is determined by p. We should also be aware that the ET-FSD can maintain full diversity as the ML detector as long asp p ¯ , where p ¯ is the least integer that satisfies

( n R n T )( p ¯ +1)+ ( p ¯ + 1 ) 2 n R ,
(3)

because it is proven in [17, 22] that setting the number of the FE stage to p ¯ is a sufficient condition for the FSD to achieve full diversity.

3 ET-FSD in a single-user scenario

3.1 Error probability analysis

The error probability of the proposed ET-FSD with disabled early termination (in this case the ET-FSD is actually identical to the FSD), which in general is defined as the probability of the error event s ~ FSD s averaged over the channel matrix, the additive noise, and the transmitted codewords, has the relation as (see Equations 4 to 7 of [22]) p e FSD P( s ~ FSD s) p e ML + p e SE , where p e ML is the error probability of the ML detector and p e SE is the probability of the error event s ~ SE s SE [22]. Analogously, with enabled early termination, the error probability of the proposed ET-FSD algorithm is defined and bounded as (see Equations 4 to 7 of [22] as well)

p e ET FSD P( s ~ ET FSD s) p e ML + p e ET SE ,
(4)

where p e ET−SE is the probability of the error event s ~ SE s SE with FlagET = True.

Recall from Algorithm 1 that the smallest post-processing SNR (related to the largest noise amplification) of the transmit symbols in the j th iteration of the preprocessing for the FE search stage, given the effective channel matrix H j, can be written as

η ( j + 1 ) = min 1 i ( n T j ) ρ n T 1 P j ( P j ) H i , i .
(5)

Otherwise, equivalently, we have [23]

max 1 i ( n T j ) P j ( P j ) H i , i = ρ n T η ( j + 1 ) .
(6)

Similar to the derivations in (32) and (33) of [24], since the largest eigenvalue is not less than any diagonal term of a Hermitian matrix (see Section 5.3.1 of [25]), (5) yields η ( j + 1 ) ρ n T 1 λ max P j ( P j ) H , where λ max (·) denotes the maximum eigenvalue of a square matrix. On the other hand, P j(P j)H=((H j)H H j)−1such that λ max (P j(P j ) H)=1/λ 1 ((H j)H H j), and we can get

η ( j + 1 ) ρ n T λ 1 ( H j ) H H j ,
(7)

where λ k (·) is the k th smallest eigenvalue of the matrix.

According to Algorithm 1 and (6), early termination occurs when

ρ n T η ( j + 1 ) 1 n T ρ ( 1 γ ) ,
(8)

with 0<γ<1. It then means that the event η (j+1)ρ γ is identical to the early-termination event. We will see later why the judging criterion for early termination is set as (8). Given (7), the probability of no early termination satisfies

P ( η ( j + 1 ) < ρ γ ) P λ 1 ( H j ) H H j < n T ρ ( γ 1 ) P n T j 1 λ ( j + 1 ) H H H < n T ρ ( γ 1 ) β n T j n T ρ ( γ 1 ) ( n R n T ) ( j + 1 ) + ( j + 1 ) 2 ,
(9)

where the second and third inequalities are derived by following Equations 17 and 14 of [22], respectively, and β is some real constant according to [26].

Let A j be the no early termination event that is identical to the event below

η ( j + 1 ) < ρ γ .
(10)

Thus, the complementary event A ¯ j is equivalent to η (j+1)ρ γ.

Lemma 1

For the event A j , it holds that

lim ρ + P( A j )=0,j0.
(11)

Proof

Taking both the relation of (9) and the definition of A j as (10) into consideration, as γ−1<0, (11) can be obtained directly. □

In addition, let E SE and E ET−SE denote the event that s ~ SE s SE where s SE consists of the symbols of the transmit vector, which are detected in the SE search stage with the early termination disabled and enabled, respectively. Hence, p e SE=P(E SE ) and p e ET−SE=P(E ET−SE ).

Lemma 2

In considering the error probability of the ET-FSD, we can first get p e ET SE p( n T p) N ¯ e exp ρ γ d min 2 4 + p e SE . Thus, recalling from (4), we are further able to obtain p e ET FSD p( n T p) N ¯ e exp ρ γ d min 2 4 + p e SE + p e ML , where N ¯ e and d min are constants that can be found in the proof of this lemma.

Proof

See Appendix 1. □

3.2 Diversity order analysis

To simplify the expression, evaluation of the performance of MIMO detectors makes use of diversity order, which is a metric constructed from the error probability and average received SNR [27] (an introduction to the diversity order metric and its associated properties can be found in Appendix 2).

Consequently, we define

d ET FSD lim ρ + log p e ET FSD log ρ , d ML lim ρ + log p e ML log ρ , d ET SE lim ρ + log p e ET SE log ρ ,
(12)

where d ET−FSD and d ML denote the diversity order of the ET-FSD and the ML detector, respectively. Herein (12) can be interpreted as

p e ET FSD ρ d ET FSD , p e ML ρ d ML , p e ET SE ρ d ET SE .
(13)

Based on the above discussion, for the diversity order of the ET-FSD in a single-user scenario, we can obtain the following theorem.

Theorem 1

As the condition of triggering the early termination is appropriately constructed, i.e., η (j+1) ρ γ with 0<γ<1, the ET-FSD specified by Algorithms 1 and 2 retains full diversity, i.e., d ET−FSD =n R .

Proof

See Appendix 3. □

3.3 Complexity behavior

Recalling from Algorithm 1, one should be aware that the number of FE search of the ET-FSD, p, varies with the channel matrix H. Thus, in the reminder of the paper, we will use p(H) to denote p so as to emphasize that p(H) is a function of H. Due to the early termination, the complexity of the ET-FSD, ζ p(H), is a random variable when the channel matrix is random. For any p(H), it fulfills that ζ p ( H ) { ζ 0 , ζ 1 ,, ζ p ¯ }, where ζ i =O(m i),0i p ¯ . Thus, ζ 0 =O(1). Note that m i implies the number of all possible candidates of s. This complexity measure is the same as in a previous study [17]. We now investigate the properties of ζ p(H) in terms of the probability and expectation of ζ p(H).

Lemma 3

There exist the relations

lim ρ + P( ζ p ( H ) ζ 0 )= lim ρ + P( A 1 )=0,
(14)

in particular,

P( ζ p ( H ) ζ 0 )=P( A 1 ) ̇ ρ ( 1 γ ) ( n R n T + 1 ) ,
(15)

and

lim ρ + E( ζ p ( H ) )= ζ 0 ,
(16)

where ̇ is defined similarly as in Appendix 2.

Proof

See Appendix 4. □

It is apparent that, given Lemma 3, in the high-SNR regime, the early termination employed by the ET-FSD can efficiently reduce the expected complexity (compared with the FSD) but seems to have no improvement on the worst-case complexity, which is more significant for practical hardware implementation.

4 Scale effect of ET-FSD

As a long run concept in microeconomics, ‘economies of scale’ refers to reductions in unit cost as the size of a facility and the usage levels of other inputs increase [28]. In previous studies [20, 21], we proposed extracting the scale effect so as to realize the reductions in complexity per user of SEOD as the number of users increases. In this section, we investigate the scale effect of ET-FSD with a large deviation principle-based analytical framework. For notational brevity, we use SCC-ET-FSD to represent the sum complexity constrained ET-FSD in a multi-user scenario.

4.1 Complexity behavior in a multi-user scenario

In the point of view of worst-case complexity, this study will show that in a multi-user scenarioc>, the scale effect is one positive factor that should be beneficial to the realization of the ET-FSD (the corresponding analysis can be found in the next subsection). Since the scale effect exists in a multi-user scenario, we now focus on discussing the complexity behavior of the ET-FSD in a multi-user scenario where the MIMO receiver has to detect the signals of n users with the ET-FSD performed for each user.

To simplify the analysis, we assume that different users in a multi-user scenario suffer i.i.d. channel fading and have the same average received SNR. Therefore, if we let the random variable, ζ p(H),j , denote the complexity of the ET-FSD of the j th user, we will naturally get that ζ p(H),j and ζ p(H),k are i.i.d. random variables as long as jk. This assumption should be reasonable in practice. For instance, different users within a base station might stay in different locations, and the wireless channels they encounter could have no spatial correlation. Moreover, current base station systems always employ the open-loop power control; hence, the average received SNR of each user at the base station side can be adjusted to an identical value.

Definition 1

In a multi-user scenario, we define S n j = 1 n ζ p ( H ) , j as the sum complexity of the ET-FSD of n users, while 1 n S n is just the complexity per user.

Obviously, S n and 1 n S n are not constants but random variables.

Assumption 1

We assume that, due to the run-time limit, the MIMO receiver is only capable of performing the ET-FSD for n users with the sum complexity being less than C n , i.e.,

S n < C n ,
(17)

where C n is called the sum complexity constraint and its subscript n denotes the number of users. Besides, we assume thatn ζ 0 < C n <n ζ p ¯ , which means that the sum complexity constraint is less than the worst-case sum complexityn ζ p ¯ while larger than n ζ 0 that is the minimum possible value of the sum complexity of ET-FSD with n users.

Because the run-time limit is always demanding, we are interested in how the ET-FSD behaves in a multi-user scenario with the sum complexity constraint C n that satisfiesn ζ 0 < C n <n ζ p ¯ . Sincen ζ 0 < C n <n ζ p ¯ , S n shall exceed C n with certain probability. Once S n C n occurs, to meet the run-time limit, the ET-FSD of some users will have to unconditionally quit before completely executing the tree search of Algorithm 2, which can be seen as a detection outage that would cause performance degradation to the corresponding users. Such detection outage is undesirable; however, it is inevitable. The performance impact brought by the outage event due to the occurrence of S n C n to the ET-FSD of each user will be quantified by means of diversity order loss. The probability P(S n C n ) attracts us because it can reveal the complexity behavior of the ET-FSD in a multi-user scenario. To make a fair comparison between the results derived in a multi-user scenario and those traditionally in a single-user scenario, it is better for us to focus the analysis on the behavior of complexity per user. Therefore, we will restrict our attention to studyingP( 1 n S n 1 n C n ).

To conveniently make use of the large deviation principle, the random variables below are introduced

X p ( H ) , j ζ 0 , if ζ p ( H ) , j = ζ 0 ζ p ¯ , if ζ p ( H ) , j ζ 0 ,
(18)

where P(X p(H),j =ζ 0 )=P(η 1 ρ γ) andP( X p ( H ) , j = ζ p ¯ )=P( ζ p ( H ) , j ζ 0 )=P( η 1 < ρ γ ). Observing that X p(H),j ζ p(H),j , we can further define and get

S ¯ n j = 1 n X p ( H ) , j S n .
(19)

In the following, we will firstly investigateP( 1 n S ¯ n 1 n C n ) and then extend to derive an upper bound of P( 1 n S n 1 n C n ) by using (19). Several theoretical results could be derived as follows.

Lemma 4 (Cramer’s theorem for empirical average [29])

Since X p(H),j satisfies

φ(t)E e t X p ( H ) , j <+,t,
(20)

it holds for all δ>0 that

lim n + 1 n log P 1 n S ¯ n E ( X p ( H ) , j ) + δ = I E X p ( H ) , j + δ ,
(21)

where

I(z)= sup t zt log φ ( t ) .
(22)

Lemma 5

ForI E X p ( H ) , j + δ in (21), its closed-form expression can be given by

I E X p ( H ) , j + δ = P ( A 1 ) + δ ζ × log δ [ 1 P ( A 1 ) ] + ζ P ( A 1 ) [ 1 P ( A 1 ) ] ζ P ( A 1 ) [ 1 P ( A 1 ) ] δP ( A 1 ) log ζ [ 1 P ( A 1 ) ] ζ [ 1 P ( A 1 ) ] δ ,

where ζ ζ p ¯ ζ 0 , and P(A 1 )=1−P(X p(H),j =ζ 0 )=1−P(ζ p(H),j =ζ 0 ).

Proof

See Appendix 5. □

To make the result of Lemma 5 more comprehensible, we investigateI E X p ( H ) , j + δ in both high-SNR regime. When SNR ρ grows to +, P(A 1 )→0 and 1−P(A 1 )→1,I E X p ( H ) , j + δ can thus be approximated byI E X p ( H ) , j + δ δ ζ log δ ζ δ δ ζ logP( A 1 )log( ζ ζ δ ) . Hence, it is reasonable to conclude that at high SNR, I E X p ( H ) , j + δ is a positive number dominated by δlogP( A 1 )/ ζ .

Furthermore, by utilizing Lemma 3, it can be obtained that lim ρ + I E X p ( H ) , j + δ log ρ δ ( 1 γ ) ( n R n T + 1 ) ζ . Assuming that g(n) is a function of n, we use the expression g(n)e nγ with the specific symbol to represent the mathematic meaning that, for any ε>0, there exists a number N with which e n(γ+ε)<g(n)<e n(γε),nN.

Lemma 6

From (19) and (21), it follows thatP 1 n S ¯ n E ( X p ( H ) , j ) + δ e nI E X p ( H ) , j + δ , where the exact expression of I E X p ( H ) , j + δ is given in Lemma 5.

For any ε>0, the relationship in Lemma 6 allows us to calculate

lim ρ + n [ I E X p ( H ) , j + δ ε ] log ρ lim ρ + log P 1 n S ¯ n E ( X p ( H ) , j ) + δ log ρ lim ρ + n [ I E X p ( H ) , j + δ + ε ] log ρ ,

which further yields

lim ρ + log P 1 n S ¯ n E ( X p ( H ) , j ) + δ log ρ = lim ρ + nI E X p ( H ) , j + δ log ρ ( 1 γ ) ( n R n T + 1 ) ζ .

The above also implies

P 1 n S ¯ n E ( X p ( H ) , j ) + δ ̇ ρ ( 1 γ ) ( n R n T + 1 ) / ζ .
(23)

We can observe from Lemma 6 that, asI E X p ( H ) , j + δ is independent of n, the larger n is, the smaller the probabilityP 1 n S ¯ n E ( X p ( H ) , j ) + δ will be. Furthermore, given both relations in (19) and (23), it can be obtained thatP( 1 n S n E( X p ( H ) , j )+δ) is upper bounded by P( 1 n S ¯ n E( X p ( H ) , j )+δ), andP( 1 n S n E( X p ( H ) , j )+δ) decays as n increases with speed faster than ρ ( 1 γ ) ( n R n T + 1 ) / ζ , i.e.,

P 1 n S n E ( X p ( H ) , j ) + δ ̇ ρ ( 1 γ ) ( n R n T + 1 ) / ζ .
(24)

4.2 The existence of the scale effect

Assume that the sum complexity of the SCC-ET-FSD is restricted by the constraint condition in (17). Since the event 1 n S n < 1 n C n is identical to S n <C n , 1 n C n can be regarded as the complexity constraint imposed on every user.

Definition 2

If there exits C n that satisfies 1 n C n < ζ p ¯ , the scale effect is said to exist if the SCC-ET-FSD for each user can maintain full diversity.

It should be stressed here that to prove the existence of the scale effect, we at same time need to think about the sufficient condition for the existence of scale effect regarding C n . We are inspired by (24) to assume that C n satisfies

C n =nE( X p ( H ) , j )+nδ.
(25)

Then let us continue to explore the diversity order of the SCC-ET-FSD in the presence of the constraint as in (25).

Analogous to Lemma 3, we can get

lim ρ + E( X p ( H ) , j )= ζ 0 .
(26)

The meaning behind (25) is that the complexity per user, 1 n S n , would have the worst-case value 1 n C n =E( X p ( H ) , j )+δ that tends to ζ 0 +δ at an adequately high SNR.

Consequently, let A n denote the event of S n that violates the constraint of (25) as

A n = S n 1 n S n 1 n C n = S n 1 n S n E ( X p ( H ) , j ) + δ = S n S n C n ,
(27)

which could lead to the detection outage. Moreover, let A ¯ n be the complement of A n such that A ¯ n = S n A n .

It is assumed that, without any sum complexity constraint, E ET−FSD,k is the error event of the ET-FSD for the k th user, which satisfies

P ( E ET FSD , k ) = P E ET FSD , k | S n A n P S n A n + P E ET FSD , k | S n A ¯ n P S n A ¯ n .
(28)

Next, under the constraint of (25), let E SCC ET FSD , k be the error event of the SCC-ET-FSD for the k th user, which can be expressed as

P ( E SCC ET FSD , k ) = P E SCC ET FSD , k | S n A n P S n A n + P E SCC ET FSD , k | S n A ¯ n P S n A ¯ n ,
(29)

where the probabilityP E SCC ET FSD , k | S n A n is directly affected by the detection outage.

Lemma 7

Let d E SCC ET FSD , k be the diversity order corresponding toP( E SCC ET FSD , k )such thatP( E SCC ET FSD , k ) ρ d E SCC ET FSD , k .

It can be obtained that

min n R , ( 1 γ ) ( n R n T + 1 ) ζ d E SCC ET FSD , k n R .
(30)

Proof

See Appendix 6. □

Moreover, according to the proof procedure of Lemma 7, we find that, if ( 1 γ ) ( n R n T + 1 ) ζ n R , the detection outage due to the occurrence of event S n C n might cause diversity order loss to the SCC-ET-FSD for every user; otherwise no loss of diversity order would happen. Therefore, one of the most important results of this study can be obtained as follows.

Theorem 2

We can expect d E SCC ET FSD , k = n R , i.e., the SCC-ET-FSD in the presence of the constraint of (25) maintains full diversity for every user as long as n is sufficiently large such that

n> n R ζ δ ( 1 γ ) ( n R n T + 1 ) .
(31)

Proof

Theorem 2 stems from Lemma 7 in a straightforward manner. □

It should be noted here that Theorem 2 shows one sufficient condition for the SCC-ET-FSD to achieve the scale effect, which at same time validates the existence of the scale effect in the SCC-ET-FSD. However, C n in the form of (25) implicitly varies with ρ, which then is neither fixed nor intuitive enough. This motivates us to think of other better sufficient condition for the existence of scale effect with respect to the sum complexity constraint C n . Thus, we simply assume that C n satisfies

C n =,
(32)

whereτ( ζ 0 , ζ p ¯ ) is fixed, regardless of ρ or other system parameters.

Then let n denote n = S n 1 n S n 1 n C n = S n 1 n S n τ , and correspondingly, let ¯ n be the complement of n , i.e., ¯ n = S n n .

Hereafter, we would like to let E SCC ET FSD , k be the error event of the SCC-ET-FSD for the k th user under the constraint of (32), which can be written as

P ( E SCC ET FSD , k ) = P E SCC ET FSD , k | S n n P S n n + P E SCC ET FSD , k | S n ¯ n P S n ¯ n ,
(33)

where the detection outage impactsP( E SCC ET FSD , k ) by affecting the probabilityP E SCC ET FSD , k | S n n .

By applying the approach of analyzing the vanishing gap to the ML performance developed in [13], the performance gap between the SCC-ET-FSD with the constraint in (32) and the ML detector can be defined in the quantified form as

g k ( ρ ) P ( E SCC ET FSD , k ) p e ML ,

where generally g k ρ)≥1 since the ML detector has the optimal performance. Furthermore, g k (ρ) has the relation as (34).

If we take (33) into consideration, let δ τ = 1 2 (τ ζ 0 ) for any τ and then let A n τ = S n 1 n S n E ( X p ( H ) , j ) + δ τ . It should be clear according to (26) thatE( X p ( H ) , j )+ δ τ tends to be less than τ eventually with increasing ρ. This implies that lim ρ + P S n n p e ML lim ρ + P S n A n τ p e ML .

g k ( ρ ) = P E SCC ET FSD , k | S n n P S n n p e ML + P E SCC ET FSD , k | S n ¯ n P S n ¯ n p e ML P S n n p e ML + P E SCC ET FSD , k | S n ¯ n P S n ¯ n p e ML .
(34)

As long as the number of users, n, satisfies (31) in which caseP S n A n τ < ̇ ρ n R , the above will lead to lim ρ + P S n n p e ML =0 sinceP S n n tends to zero at a faster rate than p e ML.

On the other hand, similar in essence to (56), it holds that

lim ρ + P E SCC ET FSD , k | S n ¯ n P S n ¯ n p e ML lim ρ + P ( E ET FSD , k ) p e ML = 1 .

Therefore, our derivation would arrive at

lim ρ + g k (ρ)=1.
(35)

This means that by following the analytical framework of [13],P( E SCC ET FSD , k )has a vanishing gap to p e ML. To be more specific, the performance degradation caused by the detection outage due to the occurrence of the event S n n is insignificant in comparison with the error probability of the ML decoder.

Theorem 3 (Extension of (35))

Given the sum complexity constraint in the form C n = (see (32) as well), let d E SCC ET FSD , k denote the diversity order related toP( E SCC ET FSD , k ), i.e.,P( E SCC ET FSD , k ) ρ d E SCC ET FSD , k . It would hold that d E SCC ET FSD , k = n R if n is sufficiently large to meet (31).

Both Theorems 2 and 3 show the existence of the scale effect. Moreover, from Theorem 3, one shall find that if the complexity per user of the SCC-ET-FSD is limited by some fixedτ( ζ 0 , ζ p ¯ ), since ζ 0 =O (1) is polynomial complexity, τ can be chosen as close as possible to ζ 0 such that the complexity constraint per user of the SCC-ET-FSD could have a polynomial d value while each user of the SCC-ET-FSD still maintains full diversity.

4.3 The benefit of scale effect

It is not easy to (theoretically) ensure full-diversity MIMO detection with polynomial complexity, while in a multi-user scenario, we propose to take advantage of the scale effect as a positive factor to improve MIMO detection. How can the scale effect improve MIMO detection? Theorems 2 and 3 give us the answer. Especially, in view of Theorem 2, the diversity order of the SCC-ET-FSD is affected by n as (30). As long as n is large enough to meet (31), the SCC-ET-FSD can maintain full diversity under the constraint of (25), C n , that tends to n ζ 0 +n δ when the average received SNR approaches +. Furthermore, in view of Theorem 3, when the sum complexity constraint of the SCC-ET-FSD satisfies C n = as (32), the detection outage incurs performance degradation that vanishes considerably fast with increasing ρ, in which case the error probabilities of the SCC-ET-FSD for each user and the ML detector have a vanishing gap as (35). Herein, τ is fixed and can arbitrarily approach ζ 0 where ζ 0 =O(1) is polynomial. It is also obvious that, under the constraints of both (25) and (32), the scale effect can always be exploited.

5 Numerical results

This section is devoted to presenting numerical results that help make the analytic outcomes achieved above more intuitive. Throughout the rest of this section, without loss of generality, we assume that the complexity of a single ET-FSD is ζ p if the initial number of levels of the FE stage is p. Meanwhile, the specification of MIMO system can be referred to Section 1.1 such that the path between each transmitter and receiver antenna suffers Rayleigh fading. Within the Monte Carlo simulation, 106 realizations of channel are used.

5.1 Diversity order of ET-FSD

The development of the ET-FSD starts the theoretic analysis of the scale effects, where the ET-FSD is proven by Theorem 1 to possess full diversity under the condition specified by line 9 of Algorithm 1. In Figure 2, the error probabilities of the (original) FSD [9] and the ET-FSD are compared with each other under three system deployments. We can observe that there is no evident degradation in performance caused by the introduction of early termination. At this point, it is ensured that the ET-FSD still has full diversity as announced in Theorem 1.

Figure 2
figure 2

The curves of error probability. The modulation scheme used is QPSK. The number of levels of the FE stage isp= n T 1 for FSD, and the initial number of levels of the FE stage is p ̄ = n T 1 for ET-FSD. This figure shows the numerical result for Theorem 1.

5.2 Asymptotic behavior of P(A 1 )

According to Lemma 3, P(A 1 ) tends to 0 as ρ→+, which decays faster than ρ ( 1 γ ) ( n R n T + 1 ) . Several results of this study (including Lemma 6 and Theorems 2 and 3) are directly or indirectly affected by the asymptotic behavior of P(A 1 ). Hence, we pay special attention to the numerical results of P(A 1 ). In the upper subgraph of Figure 3, the curves of −10 log10(P(A 1 )) against 10 log10(ρ) are shown for three system deployments, the slopes of which grow large and converge at some constant values as the average SNR ρ increases within the regime 0 to 60 of 10 log10(ρ). Next, we apply the Matlab tools of polynomial curve fitting to acquire the fitting curves for −10 log10(P(A 1 )) against 10 log10(ρ), as may be seen in the upper subgraph of Figure 3 as well. Then by computing the slopes of the fitting curves via the derivative of the functions associated with the fitting curves, the approximate slopes can be plotted as the lower subgraph of Figure 3, which approach but are not larger than (1−γ)(n T n R +1)=1/2. When lim ρ + log 10 P ( A 1 ) log 10 ρ exists, the slope of the curve of −10 log10(P(A 1 )) against 10 log10(ρ) shall be asymptotic to log 10 P ( A 1 ) log 10 ρ as ρ→+. Since in the lower subgraph of Figure 3 the slopes are already shown to converge at a constant value 1/2, it implies that lim ρ + log 10 P ( A 1 ) log 10 ρ would also converge at 1/2. This is in accordance with what we can expect from Lemma 3.

Figure 3
figure 3

The curves show the asymptotic behavior of P(A 1 ) with the event A 1 defined as (10). The modulation scheme used is QPSK. γ is set to 1/2. The initial number of levels of the FE stage is p ̄ = n T 1 for ET-FSD. This figure shows the numerical result for Lemma 3.

5.3 Asymptotic behavior of E ( X p ( H ) )

As we can see in (26),E( X p ( H ) , j ) ζ 0 as ρ→+. Now it is verified again via Figure 4 that (26) holds true. Given this asymptotic behavior ofE( X p ( H ) ), we would also be aware that the constraint of sum complexity, C n , which is set as (25), converges at n ζ 0 +n δ at high SNR. In other words, 1 n C n ζ 0 +δ as ρ→+. Thus, in this case, we can expect that the complexity constraint per user tends to ζ 0 +δ as ρ increases.

Figure 4
figure 4

The expectation of X p (H) , E( X p ( H ) ) against 10 log10(ρ) . The initial number of levels of the FE stage is p ̄ = n T 1 . Note that X p(H),j is defined in (18). This figure shows the numerical result for (26).

5.4 Statistics of P 1 n S ¯ n E ( X p ( H ) , j ) + δ

Based on (19) and (27), it can be found thatP S n A n P 1 n S ¯ n E ( X p ( H ) , j ) + δ , whereP S n A n affects the error probability of the SCC-ET-FSD for each user as (29). Lemma 6 reveals the property ofP 1 n S ¯ n E ( X p ( H ) , j ) + δ which is a key point to prove the existence of the scale effect. Therefore, we present herein the results produced by computer simulations in Figures 5 and 6, where for the purpose of notational simplification, it is defined as P P 1 n S ¯ n E ( X p ( H ) , j ) + δ and P ′′ e nI E X p ( H ) , j + δ . In Figure 5, if 20≤10 log10(ρ)≤90, the value of P is mostly less than P ′′ under the same system configuration with the same ρ since in all the considered system configurations n T =n R such thatΔζ= ζ p ¯ ζ 0 grows as n R increases, which might be why we see both P and P ′′ of n T =n R =8 system as the largest among the three systems. In any case, from Figure 5, P =P 1 n S ¯ n E ( X p ( H ) , j ) + δ seems to be less than P ′′ = e nI E X p ( H ) , j + δ . In Figure 6, by setting n=32, 64, or 160, the curves of P =P 1 n S ¯ n E ( X p ( H ) , j ) + δ , P ′′ = e nI E X p ( H ) , j + δ , and e log e P ( A 1 ) / Δζ become closer as n increases. This is coincident with the theoretical results derived earlier.

Figure 5
figure 5

P P 1 n S ¯ n E ( X p ( H ) , j ) + δ

and P ′′ e nI E X p ( H ) , j + δ against10 log10(ρ) with n=16 . The initial number of levels of the FE stage is p ̄ = n T 1 for ET-FSD.

Figure 6
figure 6

P P 1 n S ¯ n E ( X p ( H ) , j ) + δ , P ′′ e nI E X p ( H ) , j + δ and e log e P ( A 1 ) / Δζ against − logeP(A 1 ) . The initial number of levels of the FE stage is p ̄ = n T 1 for ET-FSD. This figure shows the numerical result for Lemma 6.

6 Conclusion

This paper provides the insights into the scale effect of ET-FSD. Under the scale effect, the worst-case complexity per user of ET-FSD could decrease as the number of users increases without loss of the diversity order. Within the study, the large deviation principle is used as an appropriate and powerful tool to prove the existence of the scale effect.

Endnotes

a Within this study, unless otherwise stated, the complexity of MIMO detection is measured by the number of all possible candidates of s.

b The polynomial complexity constraint stands for the complexity constraint of MIMO detection being no more than a polynomial function in either n T or m.

c For the multi-user scenario of MIMO system, we assume that all users have the same number of antennas and different users operate on orthogonal resources via time division multiple access or frequency division multiple sccess technologies.

d Even if we take the length of s candidate or the complexity of ZF estimate into consideration, the complexity related to ζ 0 is still polynomial.

Appendices

Appendix 1

Proof of Lemma 2

Proof

It should be emphasized that, for 0≤jp−1, A 0 A 1 A ¯ j can represent the event wherein Algorithm 1 encounters early termination in the j th iteration. Meanwhile, the event wherein no early termination happens in Algorithm 1 can be denoted by A 0 A 1 A (p−2) A (p−1). Moreover, the events A 0 A 1 A ¯ j with 0≤jp−1 and A 0 A 1 A ( p −2) A ( p −1) are mutually exclusive. Then, it follows from [30] that

p e SE = P ( E SE , A ¯ 0 ) + P ( E SE , A 0 A ¯ 1 ) + + P E SE , A 0 A 1 A ( p 2 ) A ¯ ( p 1 ) + P E SE , A 0 A 1 A ( p 2 ) A ( p 1 ) ,
(36)

and

p e ET SE = P ( E ET SE , A ¯ 0 ) + P ( E ET SE , A 0 A ¯ 1 ) + + P E ET SE , A 0 A 1 A ( p 2 ) A ¯ ( p 1 ) + P E ET SE , A 0 A 1 A ( p 2 ) A ( p 1 ) ,
(37)

where P(·,·) denotes the joint probability of two joint events.

Concerning the items in (36) and (37), it follows that

P E ET SE , A 0 A 1 A ( p 2 ) A ( p 1 ) = P ( E SE , A 0 A 1 A ( p 2 ) A ( p 1 ) ) < p e SE .
(38)

Given that Proposition 4.2 of Section 2 in [31] states that if one event is contained in another, then the probability of the former is no larger than the probability of the latter, (37) leads to

p e ET SE P E ET SE , A ¯ 0 + P ( E ET SE , A ¯ 1 ) + + P E ET SE , A ¯ ( p 1 ) + P E ET SE , A 0 A 1 A ( p 2 ) A ( p 1 ) ,
(39)

where because of E ET SE = i = p + 1 n T { s ~ a i s a i },

P ( E ET SE , A ¯ j ) i = p + 1 n T P ( s ~ a i s a i , η ( j + 1 ) ρ γ ) .
(40)

In the above, with p+1≤in T , s ~ a i is the element of s ~ SE , while the corresponding s a i is the element of s SE .

If A 0 A 1 A (j−1) happens and the ET-FSD meets η (j+1)ρ γ, the event A ¯ j will occur and p will be set to j by Algorithm 1 before quitting the loop of preprocessing for the SE stage, i.e., p:=j. Then with p+1≤in T , let η a i denote the post-processing SNR of the ZF estimate for the a i th transmit symbol, s a i , in the SE search stage under the condition η (j+1)=x with xρ γ. In this case, due to the definition of η (j+1) as (5), it should be known that η (j+1)=η (p+1)η a i ′. Hence, there exist some x x such thatP( s ~ a i s a i | η ( j + 1 ) =x)=P( s ~ a i s a i | η a i = x ). Herein for each transmit symbol, the ZF estimate in the SE search always utilizes the ML symbol detection. Therefore, it satisfies that

P s ~ a i s a i | η ( j + 1 ) = x = P s ~ a i s a i | η a i = x = N ¯ e Q x d min 2 2 N ¯ e exp x d min 2 4 N ¯ e exp x d min 2 4 ,
(41)

where N ¯ e and d min are the number of nearest neighbors and the minimum distance of separation of the underlying scale constellation, respectively [1],[30]. To obtain the inequality of (41), the Chernoff bound has been used, i.e., Q(x)≤ exp(−x 2/2). Therefore, we can have

P s ~ a i s a i , η ( j + 1 ) ρ γ = ρ γ + P ( s ~ a i s a i | η ( j + 1 ) = x ) f η ( j + 1 ) ( x ) dx N ¯ e exp ρ γ d min 2 4 ρ γ + f η ( j + 1 ) ( x ) dx N ¯ e exp ρ γ d min 2 4 .
(42)

In view of (42), the relation of (40) may also be expressed as

P( E ET SE , A ¯ j )( n T p) N ¯ e exp ρ γ d min 2 4 .
(43)

Moreover, the combination of (43) with (38) and (39) leads to

p e ET SE p ( n T p ) N ¯ e exp ρ γ d min 2 4 + P ( E ET SE , A 0 A 1 A ( p 2 ) A ( p 1 ) ) p ( n T p ) N ¯ e exp ρ γ d min 2 4 + p e SE .
(44)

By combining (9) and (44), we can conclude that setting the judging criterion for early termination as (8) is reasonable since ρ γ with 0<γ<1 can make the relations in (9) and (44) able to simultaneously establish tight upper bounds (which decay rapidly as ρ increases) for the associated probabilities, P(η (j+1)<ρ γ) and p e ET−SE.

Therefore, Lemma 2 is verified. □

Appendix 2

Background knowledge of diversity order

Definition 3

Suppose there is a function f(ρ). The symbol is always employed to simplify the expressions of exponential equality asf(ρ) ρ d lim ρ + log f ( ρ ) log ρ =d. If f(ρ) is the error probability of some MIMO detector and ρ denotes average received SNR, d will be the diversity order [27].

Meanwhile, the notation ̇ and < ̇ follow after replacing = with ≤ and < in above the definition, respectively.

Lemma 8

With the functions f 1 (ρ) ρ d 1 and f 2 (ρ) ρ d 2 , for f(ρ)=f 1 (ρ)+f 2 (ρ), it is established that

f(ρ) ρ min ( d 1 , d 2 ) ,
(45)

where min(·,·) returns the minimum of two inputs.

Proof

Without loss of generality, we assume d 1 d 2 . Thus,

lim ρ + log f ( ρ ) log ρ = lim ρ + log ( f 1 ( ρ ) + f 2 ( ρ ) ) log ρ = lim ρ + log f 2 ( ρ ) log ρ + lim ρ + log ( 1 + f 1 ( ρ ) / f 2 ( ρ ) ) log ρ = d 2 = min ( d 1 , d 2 ) .

Lemma 9

Having f 1 (ρ) ρ d 1 and f 2 (ρ) ρ d 2 , if f 1 (ρ)≤f 2 (ρ) for 0<ρ<+, it will hold true that

d 1 d 2 .
(46)
Proof

We can prove (46) by d 1 = lim ρ + log f 1 ( ρ ) log ρ lim ρ + log f 2 ( ρ ) log ρ = d 2 . □

Appendix 3

Proof of Theorem 1

Proof

Recalling from (4), keeping (13) in mind and utilizing (45) and (46), we get

min( d ML , d ET SE ) d ET FSD d ML = n R ,
(47)

where d ET−FSD d ML is true because the ML detector has the optimal performance. Thus, the diversity order of the ET-FSD will not go beyond that of the ML detector.

Once more applying (45) and (46) to (44), the following can be obtained:

d ET SE min(+, lim ρ + log p e SE log ρ ).
(48)

Since p e SE corresponds to the probability of the error event s ~ SE s SE in the FSD (or equivalently, the ET-FSD without early termination), by referring to [9], we get lim ρ + log p e SE log ρ =( n R n T )( p ¯ +1)+ ( p ¯ + 1 ) 2 . With the special setting of p ¯ as (3), it is true that( n R n T )( p ¯ +1)+ ( p ¯ + 1 ) 2 n R .

Therefore, (48) yields d ET−SE n R , and (47) finally reduces to

d ET FSD = n R .
(49)

We can conclude that the ET-FSD is able to achieve full diversity. □

Appendix 4

Proof of Lemma 3

Proof

For (14), as the event ζ p(H)=ζ 0 is identical to another event η 1 ρ γ according to (10), we can getP( ζ p ( H ) = ζ 0 )=P( A ¯ 1 )=1P( A 1 ). Due to Lemma 1, P(A 1 )→0 orP( A ¯ 1 )1as ρ→+.

Then taking the logarithm of (9) and then dividing by logρ, we could derive (15).

For (16), the expectation of ζ p(H) can be given by

E ζ p ( H ) = P A ¯ 0 ζ 0 + P A 0 A ¯ 1 ζ 1 + + P A 0 A 1 A ( p 2 ) A ¯ ( p 1 ) ζ ( p 1 ) + P A 0 A 1 A ( p 2 ) A ( p 1 ) ζ p P A ¯ 0 ζ 0 + P ( A 0 ) ζ 1 + + P ( A ( p 2 ) ) ζ ( p 1 ) + P ( A ( p 1 ) ) ζ p .

Then by applying Lemma 1, (16) can be verified.

This completes the proof of Lemma 3. □

Appendix 5

Proof of Lemma 5

Proof

Given the definition of (18) and (20), we get

φ(t)=P( X p ( H ) , j = ζ 0 ) e t ζ 0 +P( X p ( H ) , j = ζ p ¯ ) e t ζ p ¯ .
(50)

Also, we can have P(X p(H),j =ζ 0)=1−P(A 1). As a consequence, (50) becomes

φ(t)=[1P( A 1 )] e t ζ 0 +P( A 1 ) e t ζ p ¯ .
(51)

Define

f(t) E ( X p ( H ) , j ) + δ tlogφ(t),
(52)

where E( X p ( H ) , j )=[1P( A 1 )] ζ 0 +P( A 1 ) ζ p ¯ . With the first derivative of f(t), we can compute the critical point of f(t) through the equation as

f (t)=[1P( A 1 )] ζ 0 +P( A 1 ) ζ p ¯ +δ φ ( t ) φ ( t ) =0.
(53)

Incorporating φ(t) of (51) into (53) and organizing the items, we have δ[1P( A 1 )]+δP( A 1 ) e t ( ζ p ¯ ζ 0 ) =P( A 1 )[1P( A 1 )]( ζ p ¯ ζ 0 )(1 e t ( ζ p ¯ ζ 0 ) ).

Having ζ = ζ p ¯ ζ 0 , the above equation results in e t ζ = δ [ 1 P ( A 1 ) ] + ζ P ( A 1 ) [ 1 P ( A 1 ) ] ζ P ( A 1 ) [ 1 P ( A 1 ) ] δP ( A 1 ) , from which the critical point of f(t) can be computed as

t cp = 1 ζ log δ [ 1 P ( A 1 ) ] + ζ P ( A 1 ) [ 1 P ( A 1 ) ] ζ P ( A 1 ) [ 1 P ( A 1 ) ] δP ( A 1 ) .
(54)

Investigating the second derivative of f(t), it can be obtained that

f ′′ ( t ) = φ ( t ) φ ( t ) = φ ′′ ( t ) φ ( t ) + φ ( t ) φ ( t ) 2 = P ( A 1 ) [ 1 P ( A 1 ) ] e t ( ζ 0 + ζ p ¯ ) ( ζ 0 ζ p ¯ ) 2 ( φ ( t ) ) 2 < 0 .

Hence, it is apparent that the critical point obtained by (54) yields the maximum value of f(t), which can be written as (55).

f max = f 1 ζ log δ [ 1 P ( A 1 ) ] + ζ P ( A 1 ) [ 1 P ( A 1 ) ] ζ P ( A 1 ) [ 1 P ( A 1 ) ] δP ( A 1 ) = [ 1 P ( A 1 ) ] ζ 0 t + P ( A 1 ) ζ p ¯ t + δt ζ 0 t log ( [ 1 P ( A 1 ) ] + P ( A 1 ) e t ζ ) t = 1 ζ log δ [ 1 P ( A 1 ) ] + ζ P ( A 1 ) [ 1 P ( A 1 ) ] ζ P ( A 1 ) [ 1 P ( A 1 ) ] δP ( A 1 ) = [ P ( A 1 ) + δ ζ ] × log δ [ 1 P ( A 1 ) ] + ζ P ( A 1 ) [ 1 P ( A 1 ) ] ζ P ( A 1 ) [ 1 P ( A 1 ) ] δP ( A 1 ) log ζ [ 1 P ( A 1 ) ] ζ [ 1 P ( A 1 ) ] δ .
(55)

It should be clear from a look at the items on the right-hand side of the second equality in (55) that [1P( A 1 )] ζ 0 t+P( A 1 ) ζ p ¯ t+δt=P( A 1 )( ζ p ¯ ζ 0 )t+ ζ 0 t+δt.

It can also be observed that log [ 1 P ( A 1 ) ] +P( A 1 ) e t ζ =log 1 + P ( A 1 ) ( e t ζ 1 ) .

By replacing t with the critical point of (54), we get log([1P( A 1 )]+P( A 1 ) e t cp ζ )=log( ζ [ 1 P ( A 1 ) ] ζ [ 1 P ( A 1 ) ] δ ).

Therefore, the exact expression of the maximum value of f(t), i.e., f max, is eventually obtained by (55). By recalling (22), (52), and (55), we obtain I E X p ( H ) , j + δ = f max .

Thus, the validation of Lemma 5 is established. □

Appendix 6

Proof of Lemma 7

Proof

Based on the conclusion of (49), it follows that P( E ET FSD , k ) ρ n R .

Then in view of (28), (45), and (46), it suffices to show that P E ET FSD , k | S n A ¯ n P S n A ¯ n ̇ ρ n R .

Provided that, when S n A ¯ n , no detection outage occurs, which means that the sum complexity constraint has no effect on the detected result, it is true that P E ET FSD , k | S n A ¯ n P S n A ¯ n =P E SCC ET FSD , k | S n A ¯ n P S n A ¯ n .

Thus,

P E SCC ET FSD , k | S n A ¯ n P S n A ¯ n ̇ ρ n R .
(56)

For P S n A n , by referring to (19), we can get

P S n A n = P 1 n S n E ( X p ( H ) , j ) + δ P 1 n S ¯ n E ( X p ( H ) , j ) + δ .
(57)

As P E SCC ET FSD , k | S n A n 1, together with (23) and (57), it is established that

P E SCC ET FSD , k | S n A n P S n A n ̇ P S n A n ̇ P 1 n S ¯ n E ( X p ( H ) , j ) + δ ̇ ρ ( 1 γ ) ( n R n T + 1 ) / ζ .
(58)

Therefore, by combining (56) with (58) while having (45), the proof of Lemma 7 is complete. □

References

  1. Paulraj A, Nabar R, Gore D: Introduction to Space-Time Wireless Communications. Cambridge: Cambridge University Press; 2003.

    Google Scholar 

  2. Fincke U, Pohst M: Improved methods for calculating vectors of short length in a lattice, including a complexity analysis. Math. Comp 1985, 44: 463-471. 10.1090/S0025-5718-1985-0777278-8

    Article  MathSciNet  Google Scholar 

  3. Viterbo E, Boutros J: A universal lattice code decoder for fading channels. IEEE Trans. Inform. Theory 1999, 45(5):1639-1642. 10.1109/18.771234

    Article  MathSciNet  Google Scholar 

  4. Agrell E, Eriksson T, Vardy A, Zeger K: Closest point search in lattice. IEEE Trans. Inform. Theory 2002, 48(8):2201-2214. 10.1109/TIT.2002.800499

    Article  MathSciNet  Google Scholar 

  5. Hassibi B, Vikalo H: On the sphere-decoding algorithm I. Expected complexity. IEEE Trans. Signal Process 2005, 53: 2806-2818.

    Article  MathSciNet  Google Scholar 

  6. Wiesel A, Eldar YC, Shamai S: Semidefinite relaxation for detection of 16-QAM signaling in MIMO channels. IEEE Signal Process. Lett 2005, 12(9):653-656.

    Article  Google Scholar 

  7. Lee K, Chun J: ML symbol detection based on the shortest path algorithm for MIMO systems. IEEE Trans. Signal Process 2007, 55(11):5477-5484.

    Article  MathSciNet  Google Scholar 

  8. Guo Z, Nilsson P: Algorithm and implementation of the K-best sphere decoding for MIMO detection. IEEE J. Select. Areas Commun 2006, 24(3):491-503.

    Article  Google Scholar 

  9. Barbero LG, Thompson JS: Performance analysis of a fixed-complexity sphere decoder in high-dimensional MIMO systems. In Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing 2006. New York: IEEE; 2006:14-19.

    Google Scholar 

  10. Gestner B, Ma X, Anderson DV: Incremental lattice reduction: motivation, theory, and practical implementation. IEEE Trans. Wireless. Communi 2012, 11(1):188-198.

    Article  Google Scholar 

  11. Wubben D, Seethaler D, Jalden J, Matz G: Lattice reduction. IEEE Trans. Wireless. Communi 2011, 28(3):70-91.

    Google Scholar 

  12. Choi JW, Shim B, Singer AC, Cho NI: Low-complexity decoding via reduced dimension maximum-likelihood search. IEEE Trans. Signal Process 2010, 58(3):1780-1793.

    Article  MathSciNet  Google Scholar 

  13. Jalden J, Elia P: Sphere decoding complexity exponent for decoding full rate codes over the quasi-static MIMO channel. IEEE Trans. Inform. Theory 2012, 58: 5785-5803.

    Article  MathSciNet  Google Scholar 

  14. Abediseid W, Damen M: Lattice sequential decoder for coded MIMO channel: performance and complexity analysis. IEEE Trans. Inform. Theory 2010. http://dx.doi.org/10.1109/ISIT.2010.5513497

    Google Scholar 

  15. Goldberger J, Leshem A: MIMO detection for high-order QAM based on a Gaussian tree approximation. IEEE Trans. Inform. Theory 2011, 57(8):4973-4982.

    Article  MathSciNet  Google Scholar 

  16. Jalden J, Ottersten B: On the complexity of sphere decoding in digital communications. IEEE Trans. Signal Process 2005, 53(4):1474-1484.

    Article  MathSciNet  Google Scholar 

  17. Jalden J, Barbero LG, Ottersten B, Thompson JS: The error probability of the fixed-complexity sphere decoder. IEEE Trans. Signal Process 2009, 57(7):2711-2720.

    Article  MathSciNet  Google Scholar 

  18. Jalden J, Ottersten B: On the limits of sphere decoding. In Proceedings of International Symposium on Information Theory 2005. New York: IEEE; 2005:1691-1695.

    Chapter  Google Scholar 

  19. Taherzadeh M, Khandani AK: On the limitations of the naive lattice decoding. IEEE Trans. Inform. Theory 2010, 56(10):4820-4826.

    Article  MathSciNet  Google Scholar 

  20. Qian R, Qi Y, Peng T, Wang W, Yang J: On the scale effects oriented MIMO detector: diversity order, worst-case unit complexity and scale effects. Elsevier Signal Process 2013, 93(1):277-287. 10.1016/j.sigpro.2012.08.006

    Article  Google Scholar 

  21. Qian R, Qi Y, Peng T, Wang W: Exploiting scalar effects of MIMO detection in cloud base-station: feasible scheme and universal significance. In Proceedings of the IEEE Globecom 2012 Workshop on Cloud Base-Station and Large-Scale Cooperative Communications. New York: IEEE; 2012:216-221.

    Google Scholar 

  22. Jalden J, Barbero L G, Ottersten B, Thompson JS: Full diversity detection in MIMO systems with a fixed-complexity sphere decoder. In Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processin 2007. New York: IEEE; 2007:III-49.

    Google Scholar 

  23. Gore D, Heath Jr. RW, Paulraj A: On performance of the zero forcing receiver in presence of transmit correlation. In Proceedings of the IEEE International Symposium on Information Theory 2002. New York: IEEE; 2002:159-159.

    Google Scholar 

  24. Narasimhan R: Spatial multiplexing with transmit antenna and constellation selection for correlated MIMO fading channels. IEEE Trans. Signal Process 2003, 51(11):2829-2838. 10.1109/TSP.2003.818205

    Article  Google Scholar 

  25. Lutkepohl H: Handbook of Matrices. Chichester: Wiley; 1996.

    Google Scholar 

  26. Khoshnevis A, Sabharwal A: On diversity and multiplexing gain of multiple antenna systems with transmitter channel information. In Proceedings of the Allerton Conference on Communication, Control and Computing. Monticello: University of Illinois; 2004.

    Google Scholar 

  27. Zheng L, Tse D: Diversity and multiplexing: a fundamental tradeoff in multiple-antenna channels. IEEE Trans. Inform. Theory 2003, 49(5):1073-1096. 10.1109/TIT.2003.810646

    Article  Google Scholar 

  28. Economies of scale Wikipedia; 2013.http://en.wikipedia.org/wiki/Economies_of_scale . Accessed 1 Feb 2013

  29. Hollander F: Large Deviations. Providence: American Mathematical Society; 2008.

    Google Scholar 

  30. Proakis J G: Digital Communications. New York: McGraw-Hill; 1995.

    Google Scholar 

  31. Ross SM: A First Course in Probability. Upper Saddle River: Pearson Education; 2009.

    Google Scholar 

Download references

Acknowledgements

The authors wish to thank the anonymous reviewers for their helpful comments and their thoughtful reviews. They greatly improved the quality of the paper. A short version of this paper was presented at the IEEE PIMRC 2012. This work is sponsored by the BUPT Innovative Funds for Young Scholars (2012RC0507 and 2013RC0210), National Science and Technology Major Projects under grants 2012ZX03003011, 2012ZX03003007 and 2013ZX03003012, National Natural Science Foundation of China under grant nos. 60572120, 61001117, and 60602058, the National Key Basic Research Program of China (973 Program) under grant no. 2009CB320400, and the Joint Funds of NSFC-Guangdong under grant U1035001.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuan Qi.

Additional information

Competing interests

The authors declare that they have no competing interests.

Authors’ original submitted files for images

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Reprints and permissions

About this article

Cite this article

Qian, R., Qi, Y., Peng, T. et al. Scale effect analysis of early-termination fixed-complexity sphere detector. EURASIP J. Adv. Signal Process. 2013, 125 (2013). https://doi.org/10.1186/1687-6180-2013-125

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/1687-6180-2013-125

Keywords