 Research
 Open Access
 Published:
Reliabilityaware iterative detection scheme (RAID) for distributed IDM spacetime codes in relay systems
EURASIP Journal on Advances in Signal Processing volume 2013, Article number: 70 (2013)
Abstract
In this article, distributed interleavedivision multiplexing spacetime codes (dIDMSTCs) are applied for multiuser twohop decodeandforward (DF) relay networks. In case of decoding errors at the relays which propagate to the destination, severe performance degradations can occur as the original detection scheme for common IDMSTCs does not take any reliability information about the first hop into account. Here, a novel reliabilityaware iterative detection scheme (RAID) for dIDMSTCs is proposed. This new detection scheme takes the decoding reliability of the relays for each user into account for the detection at the destination. Performance evaluations show that the proposed RAID scheme clearly outperforms the original detection scheme and that in certain scenarios even a better performance than for adaptive relaying schemes can be achieved.
1 Introduction
During the last decade, cooperative communications and especially relaying has been a promising and constantly growing field of research. While, in the first place, the main purpose for introducing relays into wireless communication systems was the reduction of path losses between communicating nodes, relay systems also offer spatial diversity and, therefore, allow for the adoption of diversity exploiting techniques known from multiantenna (Multiple Input  Multiple Output, MIMO) systems. MIMO systems have been shown to allow for a significantly higher performance in terms of throughput or robustness against fading than their singleantenna counterparts, which is mainly due to the exploitation of space for further degrees of freedom in addition to time and frequency [1, 2].
In this study, we consider a twohop relaying system in which multiple sources transmit to one destination via a number of parallel relays. In such a system, the distributed relays can be grouped into a socalled Virtual Antenna Array (VAA), which can then be used to jointly process data, exploiting receive or transmit diversity [3]. Due to the distributed fashion of the VAA it can not be assumed that all nodes within the VAA can exchange arbitrarily much information as this would severely increase the signaling overhead and subsequently decrease the overall throughput. Hence, it is not possible to achieve perfect receive cooperation among all nodes within the VAA with justifiable effort. However, since the focus of this study is on the exploitation of transmit diversity, no receive cooperation at all is assumed and, thus, signaling among the relays is avoided. This means that each relay might estimate the source information differently. Furthermore, besides the limited exchange of information, it is also a challenging task to keep all nodes perfectly synchronous in terms of timing and frequency. Asynchronism among the nodes of the VAA or, in general, among different VAAs can lead to severe performance degradations for transmission schemes which require strict orthogonality among the transmitting nodes.
One of the most prominent transmit cooperation techniques applied to VAAs is SpaceTime Coding. SpaceTime Coding evolved in the context of MIMO systems and is a very efficient transmit diversity exploiting strategy if no Channel State Information (CSI) is available at the transmitter [4, 5]. The idea behind SpaceTime Coding is to exploit space and time as two dimensions for coding. The first applications of SpaceTime Codes (STCs) to relaying systems was done in [6] and later in [7]. Since these approaches were direct adoptions of Alamouti’s scheme and its corresponding generalization, they principally require perfect orthogonality among the relay signals. In [8, 9] a STC approach based on the nonorthogonal multiple access scheme InterleaveDivision Multiple Access (IDMA) [10] has been presented. This InterleaveDivision Multiplexing SpaceTime Code (IDMSTC) does not require any synchronization among the transmit antennas which makes it a promising technique for relay systems. Consequently, the IDMSTC has been applied to relay systems in a distributed fashion using uncoded transmission and the DecodeandForward (DF) relaying protocol [11]. In [12], the principles of distributed IDMSTCs (dIDMSTCs) have been extended to coded systems and further relay protocols like AmplifyandForward (AF) and DecodeEstimateandForward (DEF). It has been shown, that the dIDMSTC is in fact a good choice for relaying systems due to its flexibility regarding code rate and number of transmitting nodes and due to its robustness against asynchronisms. However, it was also pointed out that nonperfect decoding at the relays has to be taken into account at the destination as it leads to error propagation, which is a general problem of DF since it can severely degrade the overall performance.
One possibility to deal with erroneous decoding at the relays is to adaptively select only those relays to forward to the destination which have decoded correctly [7]. However, since erroneous relays may still contribute to the transmission, it does not seem reasonable to discard erroneously decoded messages. Instead, all relays should forward to the destination and the detector should handle the correct as well as the erroneous messages properly. In [13] a detector for uncoded DF was presented which applies a weighting of the relay messages according to the reliability of the whole sourcerelaydestination link. For that, all SRD links were modeled by equivalent Gaussian channels whose SNRs are dependent on the bit error probabilities on both hops. The messages over different SRD links were then weighted according to the respective equivalent SNR and finally combined. In [14, 15] distributed turbo codes in DF systems were investigated. In these studies, the first hop transmission was modeled using a Binary Symmetric Channel (BSC) with a crossover probability dependent on the first hop transmission quality, i.e., the bit error probability at the relay. The BSC model was then used in order to weight the exchanged information between the two constituent decoders at the destination. In [16] we presented a modified detection strategy for dIDMSTC, adopting the ideas from [13, 14] and incorporating the decoding reliability of the relays into the detection at the destination. This was achieved by estimating the decoding reliabilities at the relays and signaling this information to the destination. The reliability information of all relays was then used for a weighted combining of the relay messages. As a result, a significant performance improvement was achieved compared to the common detection scheme for dIDMSTC from [12]. However, it could also be seen that the actual usage of the available information at the destination was not yet optimal as the results indicated a performance gap compared to adaptive relaying schemes in which only correct relays forward to the destination.
In this article, we present a novel ReliabilityAware Iterative Detection scheme (RAID) for distributed IDMSTCs in DecodeandForward relay systems. The main idea of this scheme is to distinguish between the detection of the relay messages and the subsequent estimation of the source messages. First, a grouping of the relays is introduced and the relays are separated by their decoding success. While the signals from the successful relays are combined and jointly decoded, as for the common detector, the signals from the erroneous relays are all processed separately. The goal here is to firstly estimate the relay messages as good as possible. This approach is different to [16] where all relay signals were combined during the iterative detection, directly estimating the source information. After the final iteration of the iterative detection process, the estimates of the messages of the correct relays and the estimates of the messages of the erroneous relays are combined using a weighting operation similar to [16] in order to estimate the source messages. In contrast to [16], here the weighting is carried out after the iterative detection process, i.e., after firstly estimating the relay messages. While first ideas of this new detection scheme have been presented in [17], here the RAID scheme is extended to the multiuser case. We present more detailed derivations as in [17] and also give much further insight especially into the determination of the error probabilities at the relays. We will show that estimating the error probabilities in a practical system leads to almost no performance loss compared to a perfect knowledge. Moreover, extensive comparisons with other detection schemes like the common detection scheme or the adaptive scheme are given and discussed for singleuser as well as for multiuser systems. As will be shown, the proposed RAID scheme achieves significant performance improvements compared to the common detection and to the strategy in [16]. It even performs better than the adaptive relaying scheme in certain scenarios, as it also exploits information from erroneous relays which is not the case for the adaptive scheme.
The remainder of this article is structured as follows. In Section 2 the system model is presented and its components are discussed in detail. Section 3.1 discusses the common detection scheme and addresses the main problems which arise in the context of relay systems. Section 4 is dedicated to the new proposed RAID scheme. First, an equivalent transmission model for the source relay transmission is presented and discussed, which is the basis for the formulation of the new detector. Then, the new RAID scheme is presented in detail. In Section 6 numerical results are given and the RAID scheme is compared to the conventional IDMSTC detection scheme as well as to an adaptive scheme. In Section 7, finally, some conclusions are drawn.
The nomenclature for this article is as follows. Scalars are denoted by small letters a, while column vectors are denoted by bold letters a=[a _{1} … a _{ N }]^{T} and matrices by bold capital letters A=[a _{1,1} … a _{1,N }; … ;a _{ M,1} … a _{ M,N }]. Interleaved sequences are denoted by a dash a’ and double interleaved sequences by two dashes a”. Loglikelihoodratios (LLRs) of scalar a and of elements of a vector a are denoted by ${\mathit{\Lambda}}_{a}=log\phantom{\rule{0.3em}{0ex}}\left(\frac{\text{Pr}\{a=0\}}{\text{Pr}\{a=1\}}\right)$ and ${\mathit{\Lambda}}_{a}=\left[{\mathit{\Lambda}}_{{a}_{1}}\phantom{\rule{0.3em}{0ex}},\dots \phantom{\rule{0.3em}{0ex}},{\mathit{\Lambda}}_{{a}_{N}}\right]$, respectively. The expectation of a random process X is expressed as E{X} and its variance as ${\sigma}_{\mathrm{X}}^{2}$. The L_{2}norm of a vector a is denoted by ∥a∥ and ${\mathbb{F}}_{2}$ is the gallois field GF(2).
2 System model
2.1 Overview
A twohop relay system as depicted in Figure 1 is considered. Multiple sources S _{ m }, 1≤m≤M, communicate with one common destination D via N parallel relays R _{ n }, 1≤n≤N performing DecodeandForward. No direct links from sources to destination are assumed and the discretetime channel impulse responses from S _{ m } to R _{ n } and from R _{ n } to D are given by h _{ m,n } and g _{ n }, respectively. Frequencyselective block Rayleigh fading channels ${\stackrel{~}{\mathbf{h}}}_{m,n}$ and ${\stackrel{~}{\mathbf{g}}}_{n}$ with L _{h} and L _{g} i.i.d channel taps are assumed and the path loss on each hop is given by d ^{ε} such that
where d denotes the distance between the corresponding nodes and ε is the path loss exponent. The channel impulse responses are normalized such that the total received power depends only on the path loss but not on L _{h} and L _{g}, respectively, i.e., $\mathrm{E}\{\parallel {\stackrel{~}{\mathbf{h}}}_{m,n}{\parallel}^{2}\}=\mathrm{E}\{\parallel {\stackrel{~}{\mathbf{g}}}_{n}{\parallel}^{2}\}=1$. Also, each receiver, i.e., R _{ n } and D experiences additive white gaussian noise (AWGN) of power ${\sigma}_{\mathrm{n}}^{2}$. Due to the halfduplex constraint, the transmission time can be divided into a sourcerelay phase in which the sources broadcast their information to the relays and a relaydestination phase in which the relays simultaneously forward the processed information of all sources to the destination. Both phases are described in detail in the subsequent paragraphs.
2.2 Sourcerelay phase
In the first phase, the sources simultaneously broadcast their information to the relays applying IDMA [10]. Figure 2 shows the transmitter structure of the source S _{ m }, where the binary information sequence ${\mathbf{b}}_{m}\in {\mathbb{F}}_{2}^{{L}_{\mathrm{b}}}$ of length L _{b} is encoded by a code $\mathcal{C}$ of rate R _{c}=R _{c,conv}·R _{c,rep} consisting of a serial concatenation of a convolutional code ${\mathcal{C}}_{\text{conv}}$ of rate R _{c,conv} and a repetition code ${\mathcal{C}}_{\text{rep}}$ of rate R _{c,rep}. The resulting coded sequence ${\mathbf{c}}_{m}\in {\mathbb{F}}_{2}^{{L}_{\mathrm{c}}}$ of length L _{c} is interleaved by a user specific interleaver Π _{ m } resulting in the interleaved code sequence ${\mathbf{c}}_{m}^{\prime}\in {\mathbb{F}}_{2}^{{L}_{\mathrm{c}}}$. Finally, the interleaved code bits are mapped onto symbols from the normalized alphabet $\mathcal{A}$ resulting in the transmit sequence ${\mathbf{x}}_{m}\in {\mathcal{A}}^{{L}_{\mathrm{x}}}$ of length L _{x} with ${\sigma}_{\mathrm{x}}^{2}=1$. The symbols x _{ m } are then broadcasted to all relays.
The received signal y _{ n } at relay R _{ n } is given by the superposition of all source signals x _{ m } convolved with the corresponding channel impulse responses h _{ m,n } plus additive white gaussian noise${\mathbf{n}}_{n}\in {\u2102}^{{L}_{\mathrm{x}}+{L}_{\mathrm{h}}1}$ of power ${\sigma}_{\mathrm{n}}^{2}$ as
where${\mathbf{H}}_{m,n}\in {\u2102}^{({L}_{\mathrm{x}}+{L}_{\mathrm{h}}1)\times {L}_{\mathrm{x}}}$ is the convolutional matrix of h _{ m,n } . In Figure 3, the structure of relay R _{ n } is shown. First, in order to separate the user signals x _{ m } , IDMA multiuser detection (MUD) is performed using the iterative softRAKE algorithm [[10]]. Since for softRAKE detection all multipath propagations of each signal x _{ m } are resolved separately, in total M·L _{ h } different layers have to be resolved at each relay. As a useful measure for later investigations, the load on the first hop β _{ SR } is introduced. To account for the separate detection of all multipath propagations by the softRAKE detection, it is defined here in terms of layers as
By this definition, the load is not only dependent on the number of users M and the overall code rate R _{ c } , but also on the number of channel taps L _{ h } , i.e., the degree of frequency selectivity of the channel. An alternative to softRAKE detection is multilayer APP detection [[18]], which avoids gaussian approximation of multiuser interference and, hence, allows for higher bandwidth efficiencies. But since the complexity of multilayer APP detection grows exponentially with the number of users M and the number of channel taps L _{ h } , i.e., $\mathcal{O}\phantom{\rule{0.3em}{0ex}}\left({2}^{M{L}_{\mathrm{h}}}\right)$ , it is not suited for the investigated system.
The MUD at relay R _{ n } delivers LLRs ${\mathit{\Lambda}}_{{\mathrm{b}}_{m}}^{{R}_{n}}$ for the user information words b _{ m } . After hard decision, the estimates ${\widehat{\mathbf{b}}}_{m}^{{R}_{n}}=\mathcal{Q}\phantom{\rule{0.3em}{0ex}}\left({\mathit{\Lambda}}_{{\mathrm{b}}_{m}}^{{R}_{n}}\right)$ form the relay information words b _{ m,n } as
where b _{ m,n } denotes the relay message at relay R _{ n } with respect to source S _{ m } . Note that due to decoding errors at the relay, the information words b _{ m } and b _{ m,n } might be different from each other. To cope with this problem, the following strategies are possible:

Decoding errors at the relays are not detected and the decoding at the relays is assumed to be perfect. Subsequently, all M relay messages b _{ m,n } of relay R _{ n } are forwarded to the destination. This is done for the common dIDMSTC detection.

Decoding errors are detected by exploiting a cyclic redundancy check (CRC) code and only correct information words, i.e., b _{ m,n } = b _{ m } , are forwarded to the destination. This is done for adaptive relaying which is discussed in more detail in Section 3.2.

The decoding error probability at the relays is estimated, e.g., as described in Section 4.1, and the transmit power for the relay messages is adjusted according to the decoding error probability at the corresponding relay. That means, the higher the error probability at the relay, the lower the corresponding transmit power. This is done for adaptive relaying with power allocation. This scheme is not considered further in this study, as it basically has the same problems as the common dIDMSTC detection scheme, which are described in Section 3.1.

Decoding errors are detected as for the adaptive relaying scheme. However, in contrast to the adaptive scheme, erroneous decoding at the relays is handled by the detector at the destination and not by the relays. Hence, all M information words b _{ m,n } are transmitted with the same power to the destination, regardless of the decoding success. Additionally, the outcomes of the CRC checks w.r.t. the sources S _{ m } are signaled to the destination where they are used later on by the new proposed detection scheme.
For nonadaptive relaying, all relay information words b _{ m,n } are encoded using the same channel code $\mathcal{C}$ as the sources and interleaved by the user specific interleavers Π _{ m } . In addition to the user specific interleaving, the sequences ${\mathbf{c}}_{m,n}^{\prime}$ are additionally interleaved using a relay specific interleaver Π _{ r,n } , such that a unique interleaver tuple (Π _{ m };Π _{ r,n } ) is assigned to each of the M·N interleaved sequences${\mathbf{c}}_{m,n}^{\mathrm{\prime \prime}}$ across all N relays. These interleaved sequences are mapped onto symbols from the same alphabet$\mathcal{A}$ and summed up. Finally, a scaling by $\sqrt{{\alpha}_{n}}=\sqrt{\frac{1}{M}}$ ensures σ x_{ n } 2=1 independent of the number of supported users M, resulting in the relay transmit signal
2.3 Relaydestination phase
In the second phase, the transmit signals${\mathbf{x}}_{n}\in {\mathcal{A}}^{{L}_{\mathrm{x}}}$ of all relays are broadcasted simultaneously to the destination D. Under the assumption of perfect decoding at all relays, each user message b _{ m } is transmitted from all N relays and a distributed IDMSTC is formed across the N relays. The receive signal y at the destination consists of the superposition of the relay signals x _{ n } convolved with the corresponding channel impulse responses g _{ n } plus additive white gaussian noise $\mathbf{n}\in {\u2102}^{{L}_{\mathrm{x}}+{L}_{\mathrm{g}}1}$ as
where${\mathbf{G}}_{n}\in {\u2102}^{({L}_{\mathrm{x}}+{L}_{\mathrm{g}}1)\times {L}_{\mathrm{x}}}$ is the convolutional matrix of g _{ n } . Again, for later investigations the load on the second hop is defined similar to ( 3) as
Hence, under the assumption of equally long channel impulse responses on both hops, the load on the second hop is N times as large as on the first hop, i.e., β _{ RD } = N·β _{ SR } .
3 Common detection schemes
3.1 Common IDMSTC detector
In order to separate all M·N layers x _{ m,n } at the destination, an iterative turbo detection is applied [[8]]. Figure 4 depicts the part of the overall detector for the detection of message b _{ m } of source S _{ m } . After softRAKE based interference cancelation (IC) with respect to all M·N layers, relay specific interleaving is reversed${\Pi}_{\mathrm{r},n}^{\text{}1}$ , yielding the LLRs ${\mathit{\Lambda}}_{{\mathrm{c}}_{m,n}^{\prime}}^{\text{IC}}$ . Since the relays transmitted over statistically independent channels g _{ n } , the LLRs ${\mathit{\Lambda}}_{{\mathrm{c}}_{m,n}^{\prime}}^{\text{IC}}$ represent statistically independent observations of ${\mathbf{c}}_{m}^{\prime}$ and, hence, are summed up.
This deinterleaving and the subsequent summation (8) can be interpreted as the actual decoding of the dIDMSTC. The sum signal${\mathit{\Lambda}}_{{\mathrm{c}}_{m}^{\prime}}^{\text{IC}}$ is then deinterleaved using the user specific interleaver ${\Pi}_{m}^{\text{}1}$ , such that the deinterleaved LLRs for c _{ m } are given by
Using Λ c_{ m } IC, softinput softoutput channel decoding $\mathcal{D}$ is performed. The decoding consists of the decoding of the repetition code ${\mathcal{C}}_{\text{rep}}$ which is a summation of the corresponding LLRs, followed by the decoding of the convolutional code ${\mathcal{C}}_{\text{conv}}$ using the wellknown BCJR algorithm [[19]]. The BCJR delivers LLRs ${\mathit{\Lambda}}_{{\mathrm{b}}_{m}}$ for the information bits ${\mathbf{b}}_{m}$ as well as LLRs ${\mathit{\Lambda}}_{{\mathrm{c}}_{m}}$ for the code bits ${\mathbf{c}}_{m}$ . In order to obtain the extrinsic information generated by the decoder, the input LLRs ${\mathit{\Lambda}}_{{\mathrm{c}}_{m}}^{\text{IC}}$ are subtracted from the output LLRs, yielding
The extrinsic information${\mathit{\Lambda}}_{{\mathrm{c}}_{m}}^{\text{ext}}$ is then reinterleaved by the user specific interleaver Π _{ m } followed by the corresponding relay specific interleavers Π _{ r, n } and fed back as apriori information to the IC. At the same time, the LLRs ${\mathit{\Lambda}}_{{\mathrm{b}}_{m}}$ of the information bits ${\mathbf{b}}_{m}$ are hard quantized, leading to the hard estimates ${\widehat{\mathbf{b}}}_{m}=\mathcal{Q}\phantom{\rule{0.3em}{0ex}}\left({\mathit{\Lambda}}_{{\mathrm{b}}_{m}}\right)$ . This iterative process is repeated until the CRC check of ${\widehat{\mathbf{b}}}_{m}$ is correct or the maximum number of iterations N _{ it } is reached.
3.1.1 Issues
The major issue of the common detection scheme is that no information regarding the quality of the first hop transmission and the reliability of the decoding at the relays is taken into account. In contrast, it is inherently assumed that all detections at the relays are perfect, i.e., b _{ m,n } = b _{ m } , such that the first hop can be neglected for detection at the destination. Clearly, this assumption is not valid in practical systems as fading and noise lead to decoding errors at the relays which then propagate to the destination. The actual problems of the common detector with respect to erroneous decoding at the relays are twofold:

The summation (9) of the deinterleaved LLRs is dominated by the strongest LLRs${\mathit{\Lambda}}_{{\mathrm{c}}_{m,n}^{\mathrm{\prime \prime}}}^{\text{IC}}$ . This is especially a problem if one or more relays experience a weak channel on the first hop and a strong channel on the second hop, because the LLRs ${\mathit{\Lambda}}_{{\mathrm{c}}_{m,n}^{\mathrm{\prime \prime}}}^{\text{IC}}$ only depend on the quality of the second hop but not on the first hop. Due to the weak first hop these relays are very likely to generate errors due to erroneous decoding. However, at the same time these relays dominate other relays with a weaker second hop which may have decoded correctly.

The second issue is the loss of information about the individual relay signals x _{ n } due to the summation ( 9) and the subsequent joint decoding. The extrinsic information${\mathit{\Lambda}}_{{\mathrm{c}}_{m}}^{\text{ext}}$ generated by the decoder is used as apriori information for the next detection iteration for all relays. Thus, it is implicitly assumed that all relays transmitted the same codeword. If this is not the case, the feedback to the IC and the actual observations y are contradictory and the feedback may even degrade the performance of the IC. Hence, regarding the IC, it would be favorable to process each relay separately during the iterative detection.
3.2 Adaptive relaying
One possibility to overcome the aforementioned problems is to adaptively select only the correctly decoded messages at each relay to be forwarded to the destination while all erroneously decoded messages are not transmitted [7]]. That means, relay R _{ n } forwards only the messages of sources S _{ m } which were decoded correctly. The advantage of this strategy is that the common IDMSTC detection scheme could be applied with only marginal modifications to the system, e.g., the cyclic redundancy check (CRC) code has to be exploited by the relays in order to determine the decoding success and to adaptively select only the correctly decoded messages.
However, even erroneous relays may contribute to the overall transmission as their relay information words b _{ m,n } , depending on the number of erroneous bits, may still be highly correlated to the source information words b _{ m } . Therefore, it seems not reasonable to discard erroneously decoded messages but to forward them anyway and let the destination handle the correct as well as the erroneous messages properly. Such a detection scheme is presented in the next section.
4 Reliabilityaware iterative detection (RAID)
In order to consider decoding errors at the relays within the detector at the destination, a suitable model describing the overall transmission including the decoding reliabilities of the relays is required. On the one hand, this model should be accurate enough to actually improve the detection at the destination, on the other hand it should be simple enough to avoid an excessive increase in the complexity of the detector or in the signaling overhead.
4.1 Equivalent transmission model for 1st hop transmission
Based on the ideas presented in [14],[15]], decoding errors at the relays can be described using binary symmetric channels (BSCs) with a certain crossover probability. According to this description, the relay information word b _{ m,n } in ( 4) is modeled as
where q _{ m,n } is the bit error probability of the estimate ${\widehat{\mathbf{b}}}_{m}^{{R}_{n}}$ at relay R _{ n } regarding the source information word b _{ m } . This crossover probability is zero for perfect decoding at the relay and increases as the relay’s decoding reliability decreases. Using this description, an equivalent transmission model for the transmission from the sources over the first hop to the relays, including decoding at the relays, can be derived. Figure 5 depicts such an equivalent joint model for the transmission of b _{ m } via the relays R _{ 1 } up to R _{ n } . The correlation between the source information word b _{ m } and the relay information words b _{ m,n } is described by BSC _{ m,1} up to BSC _{ m,N } with error probabilities q _{ m,1} up to q _{ m,n } . These error probabilities q _{ m,n } are given by
where d _{ H } (·) denotes the Hamming distance and L _{ b } is the length of the information sequence b _{ m } . Obviously, the calculation ( 12) would require perfect knowledge of b _{ m } at the relays which is not the case in practical systems. However, an estimation of q _{ m,n } using the LLRs ${\mathit{\Lambda}}_{{\mathrm{b}}_{m}}^{{R}_{n}}$ of the information bits generated by the MUD at the relay is possible [[20]]. Denoting this estimate ${\widehat{q}}_{m,n}$ , it holds
where the expectation can be approximated by the time average due to the ergodic theorem. Note that${\widehat{q}}_{m,n}\ne 0$ even if the decoding at the relay was correct. Hence, in case of successful decoding at the relay ACK is signaled to the destination, while unsuccessful decoding leads to the signaling of a NAK in form of ${\widehat{q}}_{m,n}$ . The principle of this signaling is depicted in Figure 6, where CRC_{ m,n } denotes the CRC check at relay R _{ n } regarding b _{ m } . For a more detailed discussion of the signaling refer to [[16]].
4.2 RAID scheme
Based on the presented equivalent transmission model, the new RAID is proposed. This detection scheme takes the decoding success (CRC_{ m,n } =ACK/NAK) of the relays as well as the error probabilities ${\widehat{q}}_{m,n}$ into account in order to improve the detection quality compared to the common detection scheme discussed in Section 3.1. In the following, the components of the RAID scheme, i.e., the relay grouping, the detection process and the weighted combining are discussed in detail.
4.2.1 Relay grouping
To address the second issue of the common detection strategy, i.e., the loss of information about the individual relay signals x _{ m,n } , a user specific separation of the correct relays and all erroneous relays is introduced. Since all correct relays have transmitted the same code word c _{ m,n } = c _{ m } , their LLRs can be combined after relay specific deinterleaving. All erroneous relays, however, may have transmitted pairwise different code words and, hence, are all processed separately.
Based on the decoding success (CRC_{ m,n } =ACK/NAK) with respect to one specific source S _{ m } , each relay R _{ n } is assigned to one of two disjoint groups, the group of relays which have correctly decoded the source message, i.e., b _{ m,n } = b _{ m } , and the group of relays which have not correctly decoded the source message, i.e., b _{ m,n } ≠ b _{ m } . For the sake of notational simplicity, the set ${\mathcal{R}}_{m}$ of indices of the correct relays w.r.t. source S _{ m } and the set ${\stackrel{\u0304}{\mathcal{R}}}_{m}$ of indices of erroneous relays w.r.t. source S _{ m } are introduced
Obviously, the union of both sets is the set of the indices of all relays, i.e.,${\mathcal{R}}_{m}\cup {\stackrel{\u0304}{\mathcal{R}}}_{m}=\{1\phantom{\rule{0.3em}{0ex}},\dots N\}$ . Furthermore, two indexing functions ρ _{ m } and ${\stackrel{\u0304}{\rho}}_{m}$ are defined, such that
with ρ _{ m } (1)< ρ _{ m } (2)⋯< ρ _{ m } ( I _{ m } ) and ${\stackrel{\u0304}{\rho}}_{m}\left(1\right)<{\stackrel{\u0304}{\rho}}_{m}\left(2\right)<\cdots <{\stackrel{\u0304}{\rho}}_{m}\left({K}_{m}\right)$ . This means ρ _{ m } (1) up to ρ _{ m } ( I _{ m } ) represent the I _{ m } indices of the correct relays w.r.t S _{ m } and ${\stackrel{\u0304}{\rho}}_{m}\left(1\right)$ up to ${\stackrel{\u0304}{\rho}}_{m}\left({K}_{m}\right)$ represent the K _{ m } indices of the erroneous relays w.r.t S _{ m } , i.e.,
Figure 7 shows the part of the overall proposed detector which is relevant to the detection of b _{ m } . The LLRs from the IC are grouped based on the decoding success (ACK/NAK) at the relays. Since the correct relays have transmitted the same code word c _{ m } , their LLRs are summed up after relay specific deinterleaving, similar to the common detection scheme, i.e.,
and are then jointly deinterleaved by the user specific interleaver and jointly decoded (bottom part). The erroneous relays, however, have transmitted different code words and are, therefore, processed and decoded separately (top part). The goal of this first stage of the detection is the best possible estimation of the relay information words b _{ m,n } and not of the source information words b _{ m } . The estimation of the source information words is exclusively performed in the second stage of the detector.
Finally, after the last iteration, the K _{ m } +1 decoders $\mathcal{D}$ deliver LLRs ${\mathit{\Lambda}}_{{\mathrm{b}}_{m,{\rho}_{m}}}$ for the information words of the correct relays and LLRs ${\mathit{\Lambda}}_{{\mathrm{b}}_{m,\stackrel{\u0304}{\rho}\left(k\right)}}$ for the K _{ m } information words of the erroneous relays. The explicit decoding, hard decision and subsequent reencoding at the relays ensures that all relays actually transmitted a valid code word which is fundamental for the validity of the joint equivalent transmission model.
4.2.2 Weighted combining
Based on the estimates for the relay information words b _{ m,n } , now an overall estimate for the source information word b _{ m } should be determined. This estimate should not only include the LLRs from the correct relays, but also the LLRs from the erroneous relays as, depending on the error probabilities ${\widehat{q}}_{m,n}$ , the relay information of the erroneous relays is still correlated to the source information.
The question arises, how to obtain an estimate${\mathit{\Lambda}}_{{\mathrm{b}}_{m}}^{n}$ for the source information b _{ m } given the estimate ${\mathit{\Lambda}}_{{\mathrm{b}}_{m,n}}$ for a specific relay information word b _{ m,n } and the corresponding error probability ${\widehat{q}}_{m,n}$ . How does the BSC modeling of the first hop transmission translate to the LLRs for the relay information word and the source information word? Figure 8 illustrates this relationship, where the function$\mathcal{W}\phantom{\rule{0.3em}{0ex}}\phantom{\rule{0.3em}{0ex}}(\xb7)$ needs to be found, such that
with${\mathit{\Lambda}}_{{\mathrm{b}}_{m}}^{n}$ denoting the estimate for the source information b _{ m } taking only relay R _{ n } into account. In order to find this function, the estimate ${\mathit{\Lambda}}_{{\mathrm{b}}_{m}}^{n}$ for an arbitrary element b _{ m } of b _{ m } is written as
By using the law of total probabilities [21]], the probabilities of the source information b _{ m } can be written w.r.t. the probabilities of the relay information b _{ m,n } as
The probabilities of b _{ m } given b _{ m,n } solely depend on the crossover probability ${\widehat{q}}_{m,n}$ of the BSC,
such that the estimate${\mathit{\Lambda}}_{{\mathrm{b}}_{m}}^{n}$ can be rewritten as (25a). Expressing the probabilities by LLRs [[22]]
leads to (25b) and after some algebraic manipulations to (25c). Thus, the desired function$\mathcal{W}\phantom{\rule{0.3em}{0ex}}\phantom{\rule{0.3em}{0ex}}(\xb7)$ is finally found to be
where$\mathcal{W}\phantom{\rule{0.3em}{0ex}}\left({\mathit{\Lambda}}_{{\mathrm{b}}_{m,n}},{\widehat{q}}_{m,n}\right)$ is a shorthand notation for applying ( 25c) to every element of${\mathit{\Lambda}}_{{\mathrm{b}}_{m,n}}$ .
In (25c) the error probability${\widehat{q}}_{m,n}$ of the BSC obviously leads to a weighting of the estimates of the relay information word given by ${\mathit{\Lambda}}_{{\mathrm{b}}_{m,n}}$ . For completely uncorrelated b _{ m,n } and b _{ m } , i.e., ${\widehat{q}}_{m,n}=0.5$ , the relay transmitted no information regarding b _{ m } and, hence, Λ b_{ m } n=0. However, as${\widehat{q}}_{m,n}$ decreases, Λ b_{ m } n tends to${\mathit{\Lambda}}_{{\mathrm{b}}_{m,n}}$ giving an estimate of b _{ m } with respect to the information from relay R _{ n } .
Since all transmit channels are statistically independent, the observations from all relays can be summed up resulting in the estimate
where${\mathit{\Lambda}}_{{\mathrm{b}}_{m,{\rho}_{m}}}$ is the unweighted estimate from the correct relays. Finally, hard quantization leads to the overall estimate ${\widehat{\mathbf{b}}}_{m}=\mathcal{Q}\phantom{\rule{0.3em}{0ex}}\left({\mathit{\Lambda}}_{{\mathrm{b}}_{m}}\right)$ for the source message b _{ m }.
4.3 Pseudo code
In order to facilitate the comprehension of the proposed RAID scheme, a pseudo code for the overall detection process is given in Algorithm 1. The algorithm requires the set of all CRC check results {CRC_{ m,n } }, the set of all error probabilities $\left\{{\widehat{q}}_{m,n}\right\}$ , the set of all channel impulse responses from the relays to the destination { g _{ n } }, the sets of all relay specific and user specific interleavers { Π _{ r, n } } and { Π _{ n } } and the noise variance ${\sigma}_{\mathrm{n}}^{2}$.
5 Algorithm 1: The RAID algorithm
After the grouping, as described in Section 4.2.1 (lines 3–14), the iterative detection process is performed (lines 15–35). Besides some interleaving and deinterleaving operations, it mainly consists of the softRAKE detection (line 18), the combining of the information from the correct relays (line 22) and the APPdecoding (lines 27–28). Finally, after the detection, the weighting (line 37) and combining (line 39), as described in Section 4.2.2, is performed. The hard decision (line 41) leads to the hard estimates of the user information words${\widehat{\mathbf{b}}}_{m}$.
5.1 Computational complexity
The computational complexity of the presented detection schemes, i.e., cDF, aDF, and RAID, mainly differs in the number of APPdecodings per frame. Hence, the number of APPdecodings per frame is a useful measure in order the compare the complexity of the schemes. Table 1 gives an overview of the number of decodings per frame. As can be seen, for cDF and aDF one APPdecoding per user, frame and iteration is required, independent of the number of successful relays. For RAID, however, the number of APPdecodings depends on the number of successful relays. In the best case, i.e., all relays were successful, only one decoding operation per iteration and user is required, leading to the same complexity as cDF and aDF. In the worst case, every relay message is decoded separately, resulting in a complexity N times as high as for cDF and aDF. Note that the aDF scheme would fail in the worst case scenario, while cDF and RAID might still achieve correct decoding.
6 Numerical results
For numerical investigations, a twohop relay system with M sources S _{ m },N=4 parallel relays R _{ n } and one common destination D as depicted in Figure 1 is considered. The distance between the central source and the destination is normalized to d _{ SD } =1 and the interrelay distance is set so d _{ R } =0.2. Frequencyselective block Rayleigh fading with L=L _{ h } = L _{ g } i.i.d. channel taps is assumed on both hops and the path loss exponent is set to ε=3. For channel coding, a combination of the nonrecursive halfrate (5,7)_{ 8 } convolutional code and a repetition code of rate R _{ c,rep } is applied and the codeword length is set to L _{ c } =1024 codebits. The QPSK alphabet $\mathcal{A}$ with ${\sigma}_{\mathrm{x}}^{2}=1$ is chosen and the relay transmit signals are normalized such that σ x_{ n } 2=1 regardless of the number of supported users M. That way, all schemes have the same power cost for a given number of users M, making the comparisons fair. For detection at the relays and at the destination N _{ it } =10 iterations are performed. Initially, the error probabilities q _{ m,n } are assumed to be perfectly known at the destination.
6.1 Single user
First, a single user system is considered, i.e., M=1. Figure 9 depicts the frame error rate (FER) at the destination for the common detection scheme (cDF) and the proposed RAID scheme for different code rates R _{ c,rep } over flat ( L=1, solid) and frequency selective channels (L=4, dashed). As reference, also the adaptive relay system is given (aDF). Starting with the system without repetition coding, i.e., R _{ c,rep } =1, it can be seen, that the RAID scheme clearly outperforms the common scheme for flat, as well as for frequency selective channels. The adaptive scheme, however, performs significantly better than the RAID scheme. Also, all three detection schemes lead to an error floor for frequency selective channels.
Since softRAKEdetection is applied, overall N·L layers have to be separated at the destination. In case of L=4 this corresponds to a load of β _{ RD } =8. Hence, in this scenario, the system is eight times overloaded. Clearly, a separation of all layers fails at this high load even for high signaltonoise ratios (SNRs) resulting in the observed error floor. Even for flat fading the system is significantly overloaded, i.e., β _{ RD } =2. In this case, the adaptive scheme outperforms the RAID scheme, since the system is interference limited and adaptively switching erroneous relays off decreases the load and leads to a better separation of the layers at the destination.
Introducing a repetition code of rate${R}_{\text{c,rep}}=\frac{1}{2}$ , as depicted in Figure 9b, reduces the system load to β _{ RD } =1 for the flat fading case and β _{ RD } =4 for the frequency selective fading case. The RAID as well as the adaptive scheme now perform significantly better than the common scheme. As can be seen, the advantage of the adaptive scheme has vanished. For flat fading the RAID scheme even performs slightly better than the adaptive scheme. In this case, all layers can be successfully separated by the IC. However, while the adaptive scheme does not exploit erroneous relays, the proposed RAID scheme leads to a slightly better performance by also taking these relays into account. For the frequency selective channels, however, the load is still high, and the adaptive scheme leads to a marginally better performance than RAID.
Further decreasing the code rate of the repetition code to${R}_{\text{c,rep}}=\frac{1}{4}$ , as in Figure 9c, reduces the load to${\beta}_{\text{RD}}=\frac{1}{2}$ for flat fading and β _{ RD } =2 for frequency selective fading. Since the system is not interference limited anymore, this results in a better performance for RAID compared to the adaptive scheme even for the frequency selective case.
In Figure 10, the corresponding endtoend throughput η, assuming a selective repeat automatic repeat request (ARQ) protocol, is shown. For the given system parameters, i.e., QPSK modulation and a halfrate convolutional code, it reads
where$\left\mathcal{A}\right$ denotes the cardinality of $\mathcal{A}$ . While the system without repetition coding clearly leads to the worst performance in terms of FER for all three schemes, it outperforms the other systems in terms of throughput above approx. $\frac{1}{{\sigma}_{\text{n}}^{2}}=5\phantom{\rule{0.3em}{0ex}}\text{dB}$ for aDF and $\frac{1}{{\sigma}_{\text{n}}^{2}}=3\phantom{\rule{0.3em}{0ex}}\text{dB}$ to $\frac{1}{{\sigma}_{\text{n}}^{2}}=2\phantom{\rule{0.3em}{0ex}}\text{dB}$ for RAID and cDF. In the high SNR region the throughput clearly tends to the spectral efficiency R _{ c,rep } of the system. Interestingly, for R _{ c,rep } =1 and L=4 the common scheme achieves a higher throughput than RAID up to$\frac{1}{{\sigma}_{\text{n}}^{2}}=1\text{dB}$ . Again, the reason for this behavior is the high load in the system and the very low SNR per layer the detector experiences at this point. The LLRs delivered by the IC are, hence, very small. In this case, it is better to add all available LLRs up, trying to increase the signal level and achieve successful joint decoding than to separate the layers according to the decoding success of the relays and thereby keeping the signal levels low. Above $\frac{1}{{\sigma}_{\text{n}}^{2}}=1\phantom{\rule{0.3em}{0ex}}\text{dB}$ , the signal levels are sufficiently high and the RAID outperforms the common scheme. The same behavior can be seen for ${R}_{\mathrm{c},\mathit{\text{rep}}}=\frac{1}{2}$ and L=4 but with much smaller characteristic. This is due to the decoding of the repetition code, which corresponds to the summation of two subsequent LLRs. The signal levels after IC are hereby increased sufficiently and the RAID achieves almost the same performance as cDF in the lower SNR region up to approx.$\frac{1}{{\sigma}_{\text{n}}^{2}}=8\phantom{\rule{0.3em}{0ex}}\text{dB}$ . Above this SNR, again RAID clearly outperforms cDF. Finally, for ${R}_{\mathrm{c},\mathit{\text{rep}}}=\frac{1}{4}$ RAID always performs better than cDF, as the observed behavior is completely avoided for higher code rates R _{ c,rep }.
6.2 Estimation of error probability q _{ m,n }
While the previously shown results for the RAID scheme were all based on perfect knowledge of q _{ m,n } , subsequently the impact of the usage of its estimation ${\widehat{q}}_{m,n}$ given in ( 13) is investigated. Figure 11 shows samples of the bit error probability q _{ m,n } and its estimate ${\widehat{q}}_{m,n}$ for different frame sizes L _{ b } in a double logarithmic representation. These samples were obtained by Monte Carlo simulations, i.e., for transmissions at varying SNR the resulting q _{ m,n } and the corresponding ${\widehat{q}}_{m,n}$ were calculated and plotted. The solid line indicates equality, while a mark above the line means a too high and a mark below the line a too low estimate. First, in the plots the quantized nature of q _{ m,n } can be seen. Since only integer numbers of erroneous bits can occur, q _{ m,n } is limited to the values $\frac{1}{{L}_{\mathrm{b}}},\frac{2}{{L}_{\mathrm{b}}},\dots .$ For L _{ b } =64, e.g., this is 0.0156,0.0312,…, which corresponds to the marks in the plot. Clearly, for larger frame lengths L _{ b } , lower error probabilities are possible, e.g., $\frac{1}{256}=0.0039$ for L _{ b } =256 and $\frac{1}{2560}=0.004$ for L _{ b } =2560. In addition, the size of the quantization steps gets smaller, as it is also given by $\frac{1}{{L}_{\mathrm{b}}}$ . On the other hand, the estimate ${\widehat{q}}_{m,n}$ is continuously distributed as the LLRs ${\mathit{\Lambda}}_{{\mathrm{b}}_{m}}^{{R}_{n}}$ the estimate is based on, are continuously distributed.
Apparently, also the quality of the estimate strongly depends on the frame size. While for a frame size of L _{ b } =64 information bits the estimate already significantly deviates from the true value for error rates of 10 ^{1} , the estimate improves for larger frame lengths. The reason for this behavior is the approximation in ( 13). Since the expectation can only be estimated using the mean over all LLRs within one frame, the estimate clearly improves as the frame length increases.
Another interesting observation is the behavior of the estimates${\widehat{q}}_{m,n}$ for small error probabilities. The lower the error probability q _{ m,n } is, the stronger deviates the estimate ${\widehat{q}}_{m,n}$ from q _{ m,n } . Again, the reason for this is the approximation in ( 13). Strictly speaking, the expectation has to be calculated with respect to the overall distribution of${\mathit{\Lambda}}_{{\mathrm{b}}_{m}}^{{R}_{n}}$, i.e., all events which lead to one specific q _{ m,n } need to be taken into account in order to obtain a valid estimation. However, since only one frame with a specific channel realization is available at the relay, the influences of the channel are neglected in the approximation of the estimate, leading to the observed deviation for single events. Clearly, this is also true for larger error rates q _{ m,n } . However, due to the logarithmic representation, the relative deviation is much smaller.
Finally, it can be seen from Figure 11, that for very high error probabilities, (13) leads to an underestimation, while for lower error probabilities q _{ m,n } is slightly overestimated. This leads to an overall more conservative behavior of the system due to the weighting ( 27).
In Figure 12, the achieved FERs at the destination using RAID with q _{ m,n } or its estimate ${\widehat{q}}_{m,n}$ are depicted. Figure 12a) shows the FERs for both cases for flat (L=1, solid) and frequency selective (L=4, dashed) fading channels. While both methods lead to very similar results, using the estimate${\widehat{q}}_{m,n}$ instead of q _{ m,n } results in a small performance degradation. In Figure 12b, the same results are plotted again using a double logarithmic representation, i.e., each mark denotes the achieved FER for both methods at one specific SNR. All marks tend to lay above the equality line, indicating slightly higher FERs using the estimate${\widehat{q}}_{m,n}$ compared to q _{ m,n } . In Figure 12c) the same comparison is drawn using frames of L _{ b } =256 information bits, corresponding to L _{ c } =1024 code bits. Obviously, although the estimate ${\widehat{q}}_{m,n}$ still significantly deviates from the true q _{ m,n } for this frame size, the estimation ( 13) is sufficiently accurate as both methods lead to almost exactly the same error rates at the destination.
6.3 Multiple users
Finally, the performance evaluations are extended to multiuser scenarios. Specifically, the given topology is extended to M=2 and M=4 sources, respectively, with an intersource spacing of d _{ S } =0.1. Figure 13 shows the results for a system with a repetition code of rate${R}_{\text{c,rep}}=\frac{1}{4}$ . As a benchmark, the FERs at the destination for genie relays are given, i.e., the relays always decode perfectly and errors only occur on the second hop. For the genie relays, an increase of number of sources M from 1 to 2 and from 2 to 4, respectively, basically results in a SNR loss of 3 dB as the relay power is independent of the number of supported users M and, hence, a doubling of the number of users M leads to a halving of the power per user and relay. For L=4 and M=4 users, as depicted in Figure 13b, an error floor due to the high load of β _{ RD } = M·N·L·R _{ c } =8 can be observed. For cDF and RAID the gaps between the curves for different user numbers are significantly smaller than 3 dB. This indicates that the overall performance is primarily dominated by the performance on the first hop and, hence, by the decoding at the relays. In fact, for cDF and L=1 a typical IDMA behavior [10]] as applied on the first hop, can be observed. With increasing system load the performance of the system gets worse but still converges to the single user bound above a certain SNR threshold.
In Figure 14, a nonoverloaded multiuser system with a repetition code of rate${R}_{\text{c,rep}}=\frac{1}{32}$ is given. Principally, for this system the same observations as for the system in Figure 13 can be made. However, even for M=4 users and frequency selective fading (L=4), corresponding to a load of β _{ RD } =1, no error floor occurs. For both systems the RAID scheme clearly outperforms the common scheme. But as the number of users increases, the overall performance is more and more dominated by the detection at the relays leading to a decreasing performance gap between both schemes.
As could be seen, frequency selectivity has a strong impact on the overall performance. While for given system parameters convergence of the detection process may be successful for flat channels, it might fail for frequency selective channels. This behavior could be observed in, e.g., Figure 9a and is mainly caused by the use of softRAKE detection. To overcome these drawbacks, the code rate of the repetition code can be decreased as it was done in Figure 9b,c. However, a lower code rate leads to a lower spectral efficiency which is not always desirable. Another possibility is the application of a different interference cancelation scheme like minimum mean square error (MMSE) based Interference Cancelation. In contrast to softRAKE detection, the MMSE detection resolves all multipath propagations of each signal jointly and, thus, does not suffer from frequency selectivity. However, since the MMSE based Interference Cancelation requires matrix inversions, its complexity is much higher than the complexity of the softRAKE detection [23]. Finally, a third possibility which avoids the drawbacks of both aforementioned methods is the combination of IDMSTCs and OFDM as it was investigated in [16]. The resulting OFDMIDMSTCs allow for softRAKE detection in frequency domain independent of the number of channel taps. Since the detection of OFDMIDMSTCs only requires a modification of the Interference Cancelation compared to the detection of IDMSTCs, the principles of the new proposed RAID scheme can directly be adopted for detection of OFDMIDMSTCs.
7 Conclusions
In this article, distributed interleavedivision multiplexing spacetime codes (dIDMSTC) have been applied for multiuser twohop relay systems. After introducing an equivalent transmission model for the sourcerelay transmission, the novel reliabilityaware iterative detection scheme (RAID) was presented which explicitly takes the decoding success as well as the decoding reliabilities of the relays into account for detection at the destination. The proposed RAID scheme was shown to achieve substantial performance gains compared to the common detection scheme which neglects the reliability of the transmission on the first hop and implicitly assumes perfect decoding at the relays. Due to the optimal exploitation of all available information from the correct as well as from the erroneous relays, RAID was shown to even outperform the adaptive relay scheme in nonoverloaded systems. Moreover, the impact of the estimation of the bit error probabilities at the relays using LLRs was investigated. It was shown that using these estimates for the RAID leads to almost the same endtoend performance than the usage of perfect knowledge. Only for small frame sizes slightly higher frame error rates using the estimates could be observed, but for larger frames, practically no differences in terms of frame error rates could be seen. Finally, the combination of IDMSTCs and OFDM was suggested to better cope with frequency selectivity. For the resulting OFDMIDMSTCs the principles of the RAID scheme can directly be applied in frequency domain.
References
 1.
Foschini G, Gans M: On limits of wireless communications in a fading environment when using multiple antennas. Wirel. Personal Commun 1998, 6(3):311335. 10.1023/A:1008889222784
 2.
Telatar E: Capacity of multiantenna Gaussian channels. Eur. Trans. Telecommun 1999, 10(6):585595. 10.1002/ett.4460100604
 3.
Dohler M: Virtual Antenna Arrays, PhD thesis, University of London. 2003.
 4.
Alamouti S: A simple transmit diversity technique for wireless communications. IEEE. J. Sel. Areas Commun 1998, 16(8):14511458. 10.1109/49.730453
 5.
Tarokh V, Seshadri N, Calderbank A: Spacetime codes for high data rate wireless communication: performance criterion and code construction. IEEE Trans. Inf. Theory 1998, 44(2):744765. 10.1109/18.661517
 6.
Dohler M, Lefranc E, Aghvami H: Spacetime block codes for virtual antenna arrays. In IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC). Portugal: Lisbon; 2002:414417.
 7.
Laneman J, Wornell G: Distributed spacetimecoded protocols for exploiting cooperative diversity in wireless networks. IEEE Trans. Inf. Theory 2003, 49(10):24152425. 10.1109/TIT.2003.817829
 8.
Leung W, Wu K, Ping L: Interleavedivisionmultiplexing spacetime codes. In IEEE Vehicular Technology Conference (VTCSpring). South Korea: Jeju; 2003:10941098.
 9.
Wu K, Ping L: A quasirandom approach to spacetime codes. IEEE Trans. Inf. Theory 2008, 54(3):10731085.
 10.
Ping L, Liu L, Wu K, Leung W: Interleavedivision multipleaccess. IEEE Trans. Wirel. Commun 2006, 5(4):938947.
 11.
Fang Z, Li L, Wang Z: An interleaverbased asynchronous cooperative diversity scheme for wireless relay networks. In IEEE International Conference on Communications (ICC). China: Beijing; 2008:49884991.
 12.
Weitkemper P, Wübben P, Kammeyer KD: Distributed interleavedivision multiplexing spacetime codes for coded relay networks. In IEEE International Symposium on Wireless Communication Systems 2009 (ISWCS). Italy: Siena; 2009:488492.
 13.
Wang T, Cano A, Giannakis G, Laneman J: Highperformance cooperative demodulation with decodeandforward relays. IEEE Trans. Commun 2007, 55(7):14271438.
 14.
Thobaben R: On distributed codes with noisy relays. In Asilomar Conference on Signals, Systems and Computers. CA, USA: Pacific Grove; 2008:10101014.
 15.
Sneessens H, Louveaux J, Vandendorpe L: Turbocoded decodeandforward strategy resilient to relay errors. In IEEE International Conference on Acoustics, Speech and Sinal Processing (ICASSP). NV, USA: Las Vegas; 2008:32133216.
 16.
Lenkeit F, Bockelmann C, Wübben D, Dekorsy A: OFDMIDM spacetime coding in twohop relaysystems with errorprone relays. In 16th International ITG Workshop on Smart Antennas (WSA). Germany: Dresden; 2012:97104.
 17.
Lenkeit F, Wübben D, Dekorsy A: An improved detection scheme for distributed IDMSTCs in relaysystems. In IEEE 76th International Vehicular Technology Conference (VTCFall). Canada: Québec; 2012:15.
 18.
Noemm M, Wo T, Hoeher P: Mutilayer APP detection for IDM. Electron. Lett 2010, 46: 9697. 10.1049/el.2010.1755
 19.
Bahl L, Cocke J, Jelinek F, Raviv J: Optimal decoding of linear codes for minimizing symbol error rate. IEEE Trans. Inf. Theory 1974, 20(2):284287.
 20.
Land I: Reliability information in channel decoding. PhD thesis, Kiel, Germany. 2005.
 21.
Papoulis A, Pillai S: Probability, Random Variables, and Stochastic Processes. New York: Mc Graw Hill; 2002.
 22.
Hagenauer J, Offer E, Papke L: Iterative decoding of binary block and convolutional codes. IEEE Trans. Inf. Theory 1996, 42(2):429445. 10.1109/18.485714
 23.
Kusume K, Bauch G, Utschick W: IDMA versus CDMA: detectors, performance and complexity. In IEEE Global Telecommunications Conference (Globecom). USA: Honolulu, HI; 2009:18.
Acknowledgements
This study was supported in part by the German Research Foundation (DFG) under grant KA 841/202.
Author information
Affiliations
Corresponding author
Additional information
Competing interests
The authors declare that they have no competing interests.
Authors’ original submitted files for images
Below are the links to the authors’ original submitted files for images.
Rights and permissions
Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
About this article
Cite this article
Lenkeit, F., Wübben, D. & Dekorsy, A. Reliabilityaware iterative detection scheme (RAID) for distributed IDM spacetime codes in relay systems. EURASIP J. Adv. Signal Process. 2013, 70 (2013). https://doi.org/10.1186/16876180201370
Received:
Accepted:
Published:
Keywords
 Minimum Mean Square Error
 Convolutional Code
 Channel Impulse Response
 Frame Error Rate
 Repetition Code