Bayesian QAM demodulation and activity detection for multiuser communication systems

We consider overloaded (non-orthogonal) multiple access multiuser wireless communication systems with many transmitting devices and one central aggregation node, a typical scenario in e.g. machine-to-machine communications. The task of the central node is to detect the set of active devices and to separate and detect their data streams, whose number at any time instance is small compared to the total number of devices in the system. The payload bits are mapped to a quadrature amplitude modulation (QAM) symbol alphabet, transmitted by the active devices and received synchronously at the central node. The data detection can be cast as a compressed sensing (CS) problem due to the sparsity granted by the sporadic transmission of the typically low-complexity nodes. Separation of the real and imaginary parts of the measurement matrix, the unknown QAM symbols, and the received signal yields a group-sparsity problem. We utilize an efficient iterative Bayesian CS recovery scheme which, instead of separately solving for the real and imaginary parts, uses the Turbo principle to exchange and update parameters between the two solvers and thus comes to consensus regarding the sparsity structure. By tailoring this algorithm to QAM detection, joint activity detection, demodulation and data detection with high reliability is possible, even for very large-scale systems.

[1]  Marco Lops,et al.  Multiuser Detection in a Dynamic Environment– Part I: User Identification and Data Detection , 2007, IEEE Transactions on Information Theory.

[2]  Carsten Bockelmann,et al.  Compressive sensing based multi‐user detection for machine‐to‐machine communication , 2013, Trans. Emerg. Telecommun. Technol..

[3]  Andrea Montanari,et al.  Message-passing algorithms for compressed sensing , 2009, Proceedings of the National Academy of Sciences.

[4]  E. Candès,et al.  Stable signal recovery from incomplete and inaccurate measurements , 2005, math/0503066.

[5]  Alexander Jung,et al.  Joint channel estimation and activity detection for multiuser communication systems , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).

[6]  R. DeVore,et al.  A Simple Proof of the Restricted Isometry Property for Random Matrices , 2008 .

[7]  Byonghyo Shim,et al.  Multiuser Detection via Compressive Sensing , 2012, IEEE Communications Letters.

[8]  Georgios B. Giannakis,et al.  Exploiting Sparse User Activity in Multiuser Detection , 2011 .

[9]  Radford M. Neal Pattern Recognition and Machine Learning , 2007, Technometrics.

[10]  Norbert Goertz,et al.  Bayesian Optimal Approximate Message Passing to Recover Structured Sparse Signals , 2015, ArXiv.

[11]  R. O. Schmidt,et al.  Multiple emitter location and signal Parameter estimation , 1986 .

[12]  Andrea Montanari,et al.  Message passing algorithms for compressed sensing: I. motivation and construction , 2009, 2010 IEEE Information Theory Workshop on Information Theory (ITW 2010, Cairo).

[13]  Armin Dekorsy,et al.  Sparse Multi-User Detection for CDMA transmission using greedy algorithms , 2011, 2011 8th International Symposium on Wireless Communication Systems.

[14]  Yonina C. Eldar,et al.  Introduction to Compressed Sensing , 2022 .

[15]  D. Donoho,et al.  How to Design Message Passing Algorithms for Compressed Sensing , 2011 .

[16]  Kwang-Cheng Chen,et al.  Identification of active users in synchronous CDMA multiuser detection , 1998, IEEE J. Sel. Areas Commun..

[17]  Sergio Verdu,et al.  Multiuser Detection , 1998 .

[18]  Andrea Montanari,et al.  The dynamics of message passing on dense graphs, with applications to compressed sensing , 2010, ISIT.

[19]  Andrea Montanari,et al.  Message passing algorithms for compressed sensing: II. analysis and validation , 2009, 2010 IEEE Information Theory Workshop on Information Theory (ITW 2010, Cairo).

[20]  Carsten Bockelmann,et al.  Coping with CDMA Asynchronicity in Compressive Sensing Multi-User Detection , 2013, 2013 IEEE 77th Vehicular Technology Conference (VTC Spring).

[21]  Juan Hernández-Serrano,et al.  Low-Power Low-Rate Goes Long-Range: The Case for Secure and Cooperative Machine-to-Machine Communications , 2011, Networking Workshops.