LDPC Coded Massive MIMO Systems

We design a coded massive multiple-input multiple-output (MIMO) system using low-density parity-check (LDPC) codes and iterative joint detection and decoding (JDD) algorithm employing a low complexity detection. We introduce the factor graph representation of the LDPC coded massive MIMO system, based on which the message updating rule in the JDD is defined. We devise a tool for analyzing extrinsic information transfer (EXIT) characteristics of messages flowing in the JDD and the three-dimensional (3-D) EXIT chart provides a visualization of the JDD behavior. Based on the proposed 3-D EXIT analysis, we design jointly the degree distribution of irregular LDPC codes and the JDD strategy for the coded massive MIMO system. The JDD strategy was determined to achieve a higher error correction capability with a given amount of computational complexity. It was observed that the coded massive MIMO system equipped with the proposed LDPC codes and the proposed JDD strategy has lower bit error rate than conventional LDPC coded massive MIMO systems.

Recovering multiplexed data from signals received by many antennas in an optimal manner requires tremendously high amount of computations, so the reduction of detection complexity has been a great concern for utilizing the massive MIMO technique in practical communication systems [3,4]. As an approach to reduce the detection complexity, suboptimal linear detection algorithms have been intensively studied [7,[16][17][18][19][20][21][22][23][24][25][26], where matched filter (MF) detection, zero forcing (ZF) detection and minimum mean squared error (MMSE) detection are well known examples. Nevertheless, these linear detection schemes cannot lower the computational complexity of the massive MIMO receiver to an acceptable level because the inversion of high dimensional matrices is still required. Then, low complexity detection algorithms based on approximate matrix inversion [18,19], low complexity factor graph (FG) based belief propagation (BP) algorithms [20][21][22] and pairwise Markov random fields (MRF) based MIMO detection algorithms [20,21] have been proposed. Tree-searching soft-input soft-output (SISO) MIMO detection algorithms have also been proposed in various forms [23][24][25][26]. The FG based BP detection with Gaussian approximation of interference (GAI), called FG-GAI BP detector, was proposed as one of the promising solutions to reduce the computational complexity of the massive MIMO receiver to the practically allowable level [21,22].
Low-density parity-check (LDPC) codes have been widely used in various communication systems thanks to the powerful error correction capability [27][28][29]. It is well known that LDPC codes can be efficiently designed by using the density evolution algorithm [29,30] or the extrinsic information transfer (EXIT) chart [31]. There have been many research activities regarding the analysis and design of LDPC coded MIMO systems with various forms of detection and decoding mechanisms [32][33][34][35][36]. It is a natural approach to apply LDPC codes to the massive MIMO system to improve the transmission reliability, where a joint detection and decoding (JDD) algorithm of low complexity, of course, needs to be considered. In [37], non-binary LDPC codes are designed for coded massive MIMO systems considering modified MMSE and MF soft-output detectors. In [22,38], binary LDPC codes and non-binary LDPC codes, respectively, are designed by considering the FG-GAI BP detection algorithm through the degree distribution optimization based on the EXIT chart analysis.
To make the LDPC coded massive MIMO technology more applicable in practical communication systems, the convergence of JDD has to be sped up for a given amount of computational complexity. Note that the faster JDD convergence results in the lower BER if the computational complexity is limited to finite amount. In [39], a modified FG-GAI BP detection algorithm is proposed to improve the convergence rate of JDD in LDPC coded massive MIMO systems at the cost of increased computational complexity. It is notable that one JDD iteration can be composed of multiple detection iterations followed by multiple decoding iterations. Thus, the JDD strategy, specified by the ratio of the number of detection iterations and the number of decoding iterations composing one JDD iteration, can be used as a design parameter to obtain a good trade-off between the error correction performance and the computational complexity. However, there do not exist many research works on developing a systematic way to determine the JDD strategy improving the BER performance with a given amount of computational complexity and an efficient way to design LDPC codes depending on the structure of JDD strategy. Thus, there exist strong needs for a systematic and efficient design procedure of LDPC codes and JDD strategy for coded massive MIMO systems.
In this paper, we design the LDPC coded massive MIMO system with an iterative JDD algorithm, where the suboptimal FG-GAI BP detection is considered. We represent the LDPC coded massive MIMO system by a factor graph composed of observation nodes, middle nodes, variable nodes and check nodes connected through edges, and we define iterative updating rules for messages flowing over the factor graph of JDD. We propose an analysis tool for investigating the EXIT behavior of JDD, by which the density evolution of messages is analyzed and a 3-D (three-dimensional) EXIT chart visualization is obtained. Based on the proposed EXIT analysis, we design jointly irregular LDPC codes and the JDD strategy for the coded massive MIMO system to attain the lowest BER with a given amount of computational complexity. In the LDPC code design, we include an additional constraint regarding the placement of edges between variable nodes and check nodes in a practical point of view. It is observed that the coded massive MIMO system equipped with the proposed LDPC codes and the proposed JDD strategy has a lower BER performance than that equipped with conventional LDPC codes and conventional JDD strategy. The performance gain of the proposed scheme over conventional schemes are noticeable, especially when a low amount of computational complexity is allowed for the receiver of the coded massive MIMO system. This paper is organized as follows. In Section 2, we present the model for coded massive MIMO system. In Section 3, we introduce the operation of JDD, propose the EXIT analysis tool for JDD, and analyze the EXIT behavior of JDD of the LDPC coded massive MIMO system. In Section 4, we design LDPC codes and the JDD strategy by using the proposed EXIT analysis tool. In Section 5, we present BER performances of the proposed LDPC coded massive MIMO system in various points of view and compare those with conventional ones. Finally, we conclude this paper in Section 6.

Notations
Received signal vector at the lth channel use, where y (l) ∈ C n R ×1 . • w (l) : Additive noise vector at the lth channel use, where w (l) ∈ C n R ×1 . • H (l) : MIMO channel gain matrix at the lth channel use, where H (l) ∈ C n R ×n T . •x (l) ,ȳ (l) ,w (l) ,H (l) : Real-valued representations of x (l) , y (l) , w (l) and H (l) , respectively, wherē

Modeling of LDPC Coded Massive MIMO System
Consider a massive MIMO system with n T transmit antennas and n R receive antennas. A K-bit information sequence b is encoded to a N-bit LDPC codeword u with the code rate of R = K/N. Then, N coded bits are modulated as M o -ary QAM symbols to be transmitted by n T transmit antennas using a spatial multiplexing over N ch channel uses. Note that n T symbols are transmitted at each channel use resulting in N ch = N n T log 2 M o . The MIMO channel at the lth channel use is expressed as where entries of w (l) are independent and identically distributed (i.i.d.) zero-mean circular symmetric complex white Gaussian with variance of σ 2 , and entries of H (l) are i.i.d. circular symmetric complex Gaussian with zero mean and unit variance. The real-valued representation of Equation (1) is written bȳ The receiver of massive MIMO system with the real-valued representation given in Equation (2) can be expressed by a bipartite graph shown in Figure 1. The receiver consists of a detector and a decoder which exchange messages with each other iteratively by joint detection and decoding. The detector is composed of N ch detector nodes, DET l , l = 1, · · · , N ch , while the decoder is composed of N variable nodes, v 1 , · · · , v N , and N − K check nodes, c 1 , · · · , c N−K . Each detector node DET l is composed of 2n R observation nodes, o 2n R , and 2n T middle nodes, m (l) 2n T , connected through edges. Each middle node is connected to log 2 √ M o variable nodes, where each real-valued symbol is generated from log 2 √ M o bits. We define variable super-nodes, v 1 , · · · , v N ch , each of which is a group of variable nodes associated with symbols transmitted at each channel use. Signalsȳ (1) , · · · , y (N ch ) received over N ch channel uses are input to detector nodes DET 1 , · · · , DET N ch , respectively.

Operation of Joint Detection and Decoding
We consider an iterative JDD process employing a low-complexity detection algorithm based on FG-GAI BP [22] and a sum-product decoding algorithm. One JDD iteration is composed of N det detection iterations followed by N dec decoding iterations, where we call a JDD iteration as a global iteration. Let us consider the lth channel use. Then, Equation (2) can be written as Each observation node o (l) i obtains the information ofx i by regarding terms associated withx i as the interference plus noise when detecting the symbolx (l) k and rewrite Equation (3) as In the case of using a massive number of transmit antennas, we can approximate z ik as a Gaussian random variable [22] with the mean µ z (l) ik and the variance σ 2 and The likelihood ofx i is approximately obtained by using the Gaussian approximation of z where s ∈Ā. Note that µ and where where κ is a constant. As simple notations, we let α ki (s) denote the likelihood and the extrinsic probability, respectively, ofx In the iterative process, the extrinsic probability replaces the role of a priori probability. In other (8) and (9) are replaced by β based on Equations (7)-(9) and delivered to the middle node m (10), and delivered to the observation node o ki (s) are updated in a recursive manner through detection iterations.
At the end of detection iterations, the log-likelihood ratios (LLR) of coded bits are computed at middle nodes in the following manner and delivered to the decoder. We suppose that a variable node v = v r represents the tth bit in the bit-stream generatingx Then, the LLR of the coded bit u r corresponding to the variable node v r is defined by L v r = log Pr{u r =0} Pr{u r =1} and obtained at the middle node m where S − t = {s| is the tth bit of a bit-stream generating a symbol s is 0} and S + t = {s| is the tth bit of a bit-stream generating a symbol s is 1}. In the last equality of Equation (11), we use Pr{x The messages L v r obtained at middle nodes are delivered to the decoder to be used in the sum-product decoding.
Next, consider the operation of sum-product decoding. Let L v r c and L cv r denote the message flowing from the variable node v r to the check node c and the message flowing from the check node c to the variable node v r , respectively. These messages are updated in an iterative manner by [29,30] and where exp(x)−1 ). Note that C v r \c denotes the set of check nodes except c connected to the variable node v r and V c \v r denotes the set of variable nodes except v r connected to the check node c. At the end of decoding iterations, the LLR message of the tth bit in the bit-stream generatingx (l) k is computed as L (l) k (t) = ∑ c∈C vr L cv r and delivered to the middle node m (l) k in the detector. At the beginning of the next detection iteration, the probability Pr{x and used in the detector as in Equation (10), where s(t) denotes the value of the tth bit in the bit-stream generating a symbol s. After N g global iterations, the decision on bits is made such that the coded bit u r is estimated , ∀l, k, s, and L cv = 0, ∀c, v.
Perform FG-GAI BP detection (see Algorithm 2). 5 Compute L v , ∀v, by Equation (11). 6 for l = 1 to N dec do 7 Update L vc and L cv , ∀v, c, by Equation (12) and (13), respectively. 8 Compute Pr{x (l) k = s}, ∀l, k, s, by Equation (14). 9 Determine the value of coded bit corresponding to v, ∀v Algorithm 2: FG-GAI BP detection. Let us think about the computational complexity of FG-GAI BP detection in terms of the number of multiplications. We focus on one detection iteration for one channel use with a given modulation. It is easily inferred from Algorithm 2 that the FG-GAI BP detection requires a computational complexity of O (n T n R ). For a brief comparison, we consider some other SISO MIMO detectors such as BP detector [21], SISO MMSE detector, tree-searching detector such as sphere decoding (SD) aided max-log method [26] and subspace marginalization with interference suppression (SUMIS) detector [26]. These detectors require computational complexities of O n 2 T n R . It is clear that the FG-GAI-BP detector requires lower computational complexity than other SISO MIMO detectors under comparison.

Analysis of Joint Detection and Decoding
We analyze the behavior of JDD in the receiver of coded massive MIMO system in terms of mutual information transfer characteristics, so-called EXIT characteristics, in component units. We focus on the mutual information between coded bits generating transmit symbols and corresponding message variables. In fact, α     ik (t), respectively, for all k, i, t, and let U denote the corresponding coded bit. We suppose all LLR messages are independent and normally distributed. For each observation node, we define I OA = I(U; L in o ) and I OE = I(U; L out o ). We define I VA = I(U; L cv ) and I VE = I(U; L vc ) at variable nodes, where L cv and L vc are incoming and outgoing messages at variable nodes, respectively. We also define I CA = I(U; L vc ) and I CE = I(U; L cv ) at check nodes, where L vc and L cv are incoming and outgoing messages at check nodes, respectively. Allowing slight abuse of notation, we use I VA (d c ) and I CE (d c ) to denote the mutual information between U and L cv delivered from degree-d c check nodes to a variable node. We also use I VE (d v ) and I CA (d v ) to denote the mutual information between U and L vc delivered from degree-d v variable nodes to a check node. We depict the resultant iterative JDD process represented by transfer blocks of mutual information as in Figure 3. Consider a degree-d v variable node that is connected to d v check nodes and 2n R observation nodes via a corresponding middle node. The variable node sums up all incoming messages except one from a target node and sends the result to the target node. Thus, L in o is obtained by summing up 2n R − 1 copies of L out o and d v copies of L cv . It follows that the variance of L in o is obtained by adding the variance of L out o multiplied by 2n R − 1 and the variance of L cv multiplied by d v . By defining J(σ X ) as [33] J(σ X ) we obtain I(U; X) = J(σ X ), where σ 2 X is the variance of a normally distributed random variable X. Then, I OA is obtained as a function of d v as is the average of I VA (d c ) over d c , ρ d c denotes the fraction of edges that are connected to check nodes of degree d c , and d c,max denotes the maximum degree of check node. Let us define the EXIT function between I OA and I OE as where I OE is also a function of d v due to the dependency of I OA on d v . Note that f O (·) is obtained by Monte Carlo simulation [33]. The LLR message L vc sent from the variable node to check nodes is obtained by summing up 2n R copies of L out o and d v − 1 copies of L cv . Then, the variance of L vc is obtained by adding the variance of L out o multiplied by 2n R and the variance of L cv multiplied by d v − 1. It follows that In the case of irregular distribution of d v , we define averages of I VE (d v ) and I OE (d v ) over d v as respectively, where λ d v denotes the fraction of edges that are connected to variable nodes of degree d v and d v,max denotes the maximum degree of variable node. Let us consider a degree-d c check node and define the EXIT function fromĪ CA to I CE as [33] In the case of irregular distribution of d c , we define the average of I CE (d c ) over d c as The density evolution of messages flowing in the JDD process in terms of EXIT characteristics is summarized in Algorithm 3.
We can obtain the 3-D EXIT chart of JDD process by using Equations (16)- (22). The EXIT surface for variable nodes is obtained by using Equations (18)- (20). The EXIT surface for check nodes is obtained by stretching along theĪ OE -axis the 2-D EXIT function fromĪ CA toĪ CE obtained by Equations (21) and (22). As an example, we plot in Figure 4 the 3-D EXIT chart of JDD process for (3, 6)-regular LDPC coded massive MIMO systems with N det = 1 and N dec = 1, where coded bits are 4-QAM modulated and transmitted over 16 × 16 MIMO channel. We also plot in Figure 4 the JDD trajectory obtained by Algorithm 3, where the update forĪ OE is computed by Equations (16), (17) and (20). It is observed that the JDD trajectory is formed between two EXIT surfaces. If the JDD trajectory approaches a point withĪ VE = 1 at a certain E b /N 0 , this implies that the JDD converges and the decoding succeeds at this E b /N 0 . The minimum value of E b /N 0 resulting in the JDD trajectory approachingĪ VE = 1 is called the threshold. We can find the threshold value of LDPC coded massive MIMO system by using Algorithm 3 and visualize the JDD behavior by using the 3-D EXIT chart.
Algorithm 3: Density evolution in terms of EXIT characteristics.

Design of LDPC Coded Massive MIMO System
In general, LDPC codes are designed through two steps: the optimization of degree distributions and the placement of edges between variable nodes and check nodes. Degree distributions of variable nodes and check nodes from the edge perspective are represented in the form of polynomials as [29] λ(x) = respectively. Then, the code rate R is given by [29] R(λ, ρ) where λ = {λ 2 , · · · , λ d v,max } and ρ = {ρ 2 , · · · , ρ d c,max }. In the first step of designing LDPC codes, we first determine degree distributions to maximize the code rate guaranteeing the convergence of JDD at a given E b /N 0 by using the density evolution algorithm. By repeating the same procedure for various values of E b /N 0 , we find the smallest E b /N 0 resulting in the maximum code rate exceeding the target code rate. Such E b /N 0 is called the threshold, and the corresponding degree distributions are considered optimal. In the second step of LDPC code design, we place edges between variable nodes and check nodes based on given optimal degree distributions to satisfy the following criteria [29]: (a) Avoid short cycles involving only degree-2 variable nodes.
(b) Length-4 cycles need to be avoided.
These criteria can be satisfied by using the progressive edge growth (PEG) algorithm [40]. When we construct finite-length LDPC codes, the following criterion needs to be satisfied additionally: (c) All degree-2 variable nodes need to represent only non-systematic bits.
Let Λ 2 denote the number of degree-2 variable nodes. Then, Λ 2 ≤ N − K, or equivalently, is a necessary condition to satisfy Criterion (c). Thus, we need to take into consideration the condition in Equation (25) when determining degree distributions in the first step of LDPC code design. Since the computational complexity is a major concern, we need to design the coded massive MIMO system such that the error correction capability is maximized with a given amount of computational complexity. As introduced above, one global iteration of JDD consists of N det detection iterations and N dec decoding iterations. We can speed up the convergence of JDD by controlling the ratio of N det and N dec in one global iteration. In Table 1, we list the approximate numbers of multiplications and additions required to compute various messages in the JDD process, where we assume that exp(·), log(·) and φ(·) are obtained in a look-up-table manner. Total approximate numbers of operations required by N g global iterations of JDD are listed in Table 2, which are also approximated as functions of N if N is large enough. We obtain JDD trajectories of LDPC coded massive MIMO system by using Algorithm 3 for different combinations of N det and N dec , and plot the results in Figure 5, where M o = 4 and n T = n R = 16. For each trajectory, we specify the approximate number of required multiplications. It is observed that JDD trajectories may converge to the same values ofĪ VE andĪ CE , resulting in the same BER performance, with different computational complexities depending on the combination of N det and N dec . This verifies the importance of the JDD strategy represented by N det and N dec to operate the JDD efficiently.  Table 2. Total approximate number of operations required for overall JDD.

Operation Total Approximate Number of Operations
Addition  Let us focus on the number of multiplications for a simple analysis of computational complexity. It is clear from Table 2 that the number of multiplications required for detection is much higher than that for decoding, especially with large n T and n R . Thus, increasing N det results in much higher computational complexity than increasing N dec . It follows that increasing N det results in the significant decrease of N g to maintain the total amount of computational complexity. With a small N g , the JDD does not converge sufficiently so that a low value of threshold is not attained. As a result, we fix N det = 1 and adjust N dec to design the JDD strategy, where N g is determined by N dec with other parameters given. We call the JDD with N det = N dec = 1 the global iteration only (GIO) JDD.
Consider a LDPC coded massive MIMO system using GIO JDD with N g = N GIO g as a reference system. The degree distributions of LDPC codes and the JDD strategy in a proposed coded massive MIMO system are determined in the following manner. First, we choose candidate values of N dec resulting in the number of multiplications equivalent to that of GIO JDD. For each E b /N 0 , we perform the following optimization for all candidate values of N dec : , ρ) s.t.Ī VE = 1 after running Algorithm 3, where the first constraint guarantees the convergence of JDD and the second constraint is used to satisfy Criterion (c) introduced above. The lowest E b /N 0 , at which there exist N dec such that the maximum R(λ, ρ) exceeds the target rate, is called the threshold and denoted by (E b /N 0 ) * . Degree distributions and N dec resulting in the lowest threshold are determined as optimal parameters of LDPC codes and the JDD strategy, respectively. Then, we construct the parity check matrix of LDPC codes based on optimally determined degree distributions by using the PEG algorithm.

Numerical Results
We considered LDPC coded massive MIMO systems over 16 × 16, 64 × 64 and 256 × 256 channels with code rates of R = 0.5 and 0.75. Coded bits were mapped to 4-QAM transmit symbols by Gray-mapping. We considered a coded massive MIMO system using GIO JDD with an arbitrary N GIO g as a reference system, based on which the number of multiplications was evaluated as a function of N from Table 2. Then, we chose candidate values of N dec of the proposed JDD strategy such that the total number of multiplications with N det = 1 was equivalent to that of GIO JDD, where N g was determined by N dec with other given parameters. We solved the optimization problem in Equation (26) for each E b /N 0 and N dec by using the differential evolution algorithm [41]. We found degree distributions and the value of N dec resulting in the smallest threshold and the rate exceeding the target rate. Note that, in determining degree distributions of LDPC codes, we used the concentrated check node degree distribution [30], i.e., ρ(x) = ρ d c x d c + (1 − ρ d c )x d c +1 . We constructed the parity check matrix of LDPC codes by using the degree distribution and the PEG algorithm. Then, we generated LDPC codes from the obtained parity check matrix and performed BER simulations.

Convergence Speed of JDD Strategy
We show the benefit of using the proposed JDD strategy in view of the threshold with respect to the amount of computational complexity. In Figure 6, we plot the threshold (E b /N 0 ) * obtained by the density evolution algorithm given in Algorithm 3 for the proposed JDD strategy and GIO JDD over 16 × 16 channel with various numbers of multiplications. It was observed that the proposed JDD strategy converged to the lowest threshold faster than GIO JDD. It was also observed that the proposed JDD strategy resulted in a lower threshold than GIO JDD for a given amount of computational complexity.

Performance Comparison without Complexity Constraint
We next considered the JDD without constraint on the amount of computational complexity. We investigated the threshold and BER obtained with different values of N dec , where the case of N dec = 1 corresponded to the reference system using GIO JDD. In Table 3, we list optimal degree distributions of LDPC codes and resultant thresholds for some values of R, N dec and d v,max with n T = n R = 16. It was observed that the proposed JDD strategy and the GIO JDD resulted in the same threshold for given d v,max and R.
In Figure 7, we plot BER performances of coded massive MIMO systems with N = 64,000 over 16 × 16 channel for some values of N dec and sufficiently large N g . The degree distributions listed in Table 3 corresponding to d v,max = 24 and d v,max = 20 for R = 0.5 and R = 0.75, respectively, were used for generating LDPC codes. We used N g = 200 and N g = 85 for N dec = 1 and N dec = 15, respectively, when R = 0.5 and we used N g = 100 and N g = 90 for N dec = 1 and N dec = 5, respectively, when R = 0.75. It was observed that the proposed JDD strategy and GIO JDD showed similar BER performances if a sufficiently high amount of computational complexity was allowed. This result agreed with the threshold analysis presented in Figure 6 and Table 3.

Performance Comparison with Complexity Constraint
We then considered the JDD with the finite amount of computational complexity. In Tables 4  and 5, we list optimal degree distributions of LDPC codes in the reference system (GIO JDD) and the proposed system. It was observed that the proposed JDD strategy resulted in a lower threshold than GIO JDD. We performed BER simulations of rate-0.5 LDPC codes with N = 4096 and rate-0.75 LDPC codes with N = 10,240, which were constructed from the degree distributions presented in Tables 4 and  5, respectively. When R = 0.5, we used degree distributions and N dec corresponding to d v,max = 24 for both GIO JDD and the proposed JDD strategy. When R = 0.75, we used degree distributions and N dec corresponding to d v,max = 3 and d v,max = 20 for GIO JDD and the proposed JDD strategy, respectively. In Figure 8, we plot BER performances of the LDPC coded massive MIMO system equipped with the proposed JDD strategy and with GIO JDD over 16 × 16 channel. It was observed that using the proposed JDD strategy resulted in a lower BER than using GIO JDD. This result agreed with the threshold analysis presented in Tables 4 and 5. Consequently, the jointly designed LDPC codes and JDD strategy could result in the lower BER of coded massive MIMO system by using the equivalent amount of computational complexity.   As shown in Figures 9 and 10, we compared BER performances of the proposed LDPC coded massive MIMO system and the conventional system with various numbers of antennas, where the conventional system was equipped with the conventional LDPC codes and GIO JDD [38]. As the proposed system, we constructed the rate-0.5 LDPC codes with N = 4096 using the degree distribution corresponding to d v,max = 24 in Table 4 and the rate-0.75 LDPC codes with N = 2048 using the degree distribution corresponding to d v,max = 3 in Table 5. It was observed (Figures 9 and 10) that the coding gain of the proposed system over the conventional one at the BER of 10 −5 over 16 × 16 channel was about 2.3 dB and 1.4 dB for R = 0.5 and R = 0.75, respectively.

Conclusions
In this study, we designed the LDPC coded massive MIMO system equipped with an iterative JDD algorithm using the low-complexity FG-GAI BP detection and the sum-product decoding. We defined a factor graph representation of the LDPC coded massive MIMO system and defined updating rules for messages flowing in the JDD process. We proposed a 3-D EXIT analysis as an engineering tool for investigating the behavior of iterative JDD algorithm of coded massive MIMO receiver. Based on the EXIT analysis, we designed jointly irregular LDPC codes through the optimization of degree distributions and the JDD strategy to achieve the lowest BER with a given amount of computational complexity. The proposed 3-D EXIT analysis enables the efficient design of LDPC codes and JDD strategy for coded massive MIMO system in a joint manner. We observed that the JDD strategy and corresponding LDPC codes designed appropriately by using the proposed EXIT analysis shows a faster convergence rate than a conventional JDD algorithm. Thus, the proposed scheme results in the improved BER performance over the conventional one with the equivalent amount of computational complexity. This result is meaningful especially when the computational complexity of coded massive MIMO receiver is constrained to finite amount, which is a practical situation.
In addition to the results presented in this paper, we plan to work on the following issues as future works.

•
We will perform 3-D EXIT analysis for coded massive MIMO system equipped with various kinds of MIMO detectors. Based on this, we plan to optimize the JDD strategy for each SISO MIMO detector under consideration and correspondingly design LDPC codes. Then, we will compare BER performances of coded massive MIMO systems using different MIMO detectors.

•
We will study and analyze the influence of imperfect channel estimation on the performance of LDPC coded massive MIMO system. It is hard to obtain the perfect channel estimation in practice, so we need to investigate this issue thoroughly to utilize the proposed scheme in practical communication systems.
• We will work on the finite-length analysis of LDPC coded massive MIMO system. It is well known that using channel codes with short to medium blocklength results in a gentle waterfall in the BER curve [42][43][44][45]. Since practical communication systems use finite-length channel codes, we need to study this issue as a future work for the practical application of the coded massive MIMO technology.