Next Article in Journal
Design of SiC-Doped Piezoresistive Pressure Sensor for High-Temperature Applications
Next Article in Special Issue
Joint Optimization of Multi-Hop Broadcast Protocol and MAC Protocol in Vehicular Ad Hoc Networks
Previous Article in Journal
Application Combining VMD and ResNet101 in Intelligent Diagnosis of Motor Faults
Previous Article in Special Issue
Automated Driving with Cooperative Perception Based on CVFH and Millimeter-Wave V2I Communications for Safe and Efficient Passing through Intersections
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Carrier Diversity Incorporation to Low-Complexity Near-ML Detection for Multicarrier Systems over V2V Radio Channel

by
Jose Alberto Del Puerto-Flores
1,†,
Fernando Peña-Campos
2,†,
Ramón Parra-Michel
2 and
Carolina Del-Valle-Soto
1,*
1
Facultad de Ingeniería, Universidad Panamericana, Álvaro del Portillo 49, Zapopan, Jalisco 45010, Mexico
2
Department of Electrical Engineering, Communications Section, CINVESTAV-IPN, Guadalajara, Jalisco 45019, Mexico
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Sensors 2021, 21(18), 6067; https://doi.org/10.3390/s21186067
Submission received: 2 August 2021 / Revised: 2 September 2021 / Accepted: 6 September 2021 / Published: 10 September 2021
(This article belongs to the Special Issue Vehicle-to-Everything (V2X) Communications)

Abstract

:
Inter-carrier interference (ICI) in vehicle to vehicle (V2V) orthogonal frequency division multiplexing (OFDM) systems is a common problem that makes the process of detecting data a demanding task. Mitigation of the ICI in V2V systems has been addressed with linear and non-linear iterative receivers in the past; however, the former requires a high number of iterations to achieve good performance, while the latter does not exploit the channel’s frequency diversity. In this paper, a transmission and reception scheme for low complexity data detection in doubly selective highly time varying channels is proposed. The technique couples the discrete Fourier transform spreading with non-linear detection in order to collect the available channel frequency diversity and successfully achieving performance close to the optimal maximum likelihood (ML) detector. When compared with the iterative LMMSE detection, the proposed system achieves a higher performance in terms of bit error rate (BER), reducing the computational cost by a third-part when using 48 subcarriers, while in an OFDM system with 512 subcarriers, the computational cost is reduced by two orders of magnitude.

1. Introduction

The development of vehicle-to-vehicle (V2V) wireless communications has experienced a boom in recent years due to its main applications for traffic control and road safety, such as: reducing traffic in main avenues, collision prevention, autonomous vehicle development, remote tracking of vehicles, etc. Different measurement campaigns and channel sounding in the V2V environment [1,2] confirm the existence of high Doppler spread frequencies (above 600 Hz), which causes inter-carrier interference (ICI) to be one of the main problems that affect the receivers’ performance and greatly complicate the estimation and data detection tasks.
The specific problem of channel parameter estimation at the receiver is further complicated in V2V systems because the ICI also affects the pilot sub-carrier integrity required to properly carry out the channel estimation. Among the works that tackle this problem, the most relevant are [3,4]; these works propose an iterative receiver with a channel estimator based on a two-dimensional basis expansion model (2D-BEM). However, one problem with these approaches is that they only reconstruct the channel variations at an OFDM frame resolution, omitting the temporal variation of the channel within one OFDM symbol. In addition, these works employ a linear data detection scheme that is unable to mitigate ICI in highly time-variant channels. Furthermore, the iterative receivers in [3,4], require at least 5 iterations to deliver acceptable performance in terms of bit error rate (BER). In [5], channel estimation and tracking are performed by resolving dominant multipath components.
Approaches [6,7,8] make a substantial reduction in the computational complexity required in the data detection. This is achieved by approximating the original signal model using a reduced signal model in the frequency domain, based on the band equalization, where the channel matrix is truncated to keeping only a small number of bands. The approximate observation model described in [6,7,8] does not include the channel frequency diversity, which causes the linear detection the achieving of a lower performance compared to the detection carried out in the complete observation model. Furthermore, the approximate model described in [6,7,8] is not compatible with non-linear detectors when including the channel frequency diversity.
Works [9,10] presents systems with data estimators suitable to counteract the distortions produced by the ICI, achieving better performance than conventional receivers. However, they modify the physical layer of the 802.11p standard in order to introduce additional training sequences, which decreases the spectral efficiency of the system and represents an incompatibility problem with the 802.11p standard [11]. They also use channel estimators with an observation window that covers a large number of OFDM symbols, increasing the memory required for their implementation and the system’s latency.
Since data detection is the process with the greatest computational complexity in the receiver, the practical feasibility of any system designed to work in real-time in V2V channels depends mainly on the order of complexity required in the detection task. The computational complexity of the optimal detector of maximum likelihood (ML) is O ( N D Ω N D ) [12], being N D number of data subcarriers and Ω the constellation size. This complexity makes the real-time implementation to be less viable in comparison with linear detectors whose complexity is bounded in N D 3 .
Recently, a series of detectors have been proposed, which have lower complexity than the ML detector while maintaining similar performance. The spherical detector (SD) [13], which is based on tree-search algorithms, has been applied to multicarrier systems [14], yielding lower complexity than the ML detection [15], as it was expected. Some non-linear detection schemes are based on the M-algorithm, and the QR decomposition of the channel matrix [16,17]. Ordered successive iterative cancellation (OSIC) has been proposed recently in [18]. However, all the aforementioned non-linear detectors are applied to a system model that does not include the channel frequency diversity, as well as not exploiting an approximation of the band channel matrix during its QR decomposition. However, all the aforementioned non-linear detectors are applied to a system model that does not include the channel frequency diversity, as well as not exploiting an approximation of the band channel matrix during its QR decomposition.
An important factor that impacts the multicarrier system performance is the frequency selectivity of the channel. This characteristic of the broadband channel makes it difficult to recover some signals degraded by a deep fading of the channel. Because the non-linear data detection is carried out consecutively, the channel’s selectivity causes degradation in performance of the non-linear detection, even in conditions of high signal-to-noise ratio (SNR). The works mentioned above [3,4] tackle this problem through the inclusion of a stage for channel coding, with the consequent loss of spectral efficiency. In recent works [19,20,21], it is observed that low-density parity-check (LDPC) codes have a better performance on doubly selective channels compared to convolutional codes and turbo coding. In LDPC coded transmission schemes, the system parameters are usually optimized towards a particular scenario to achieve capacity-approaching performance. However, due to high mobility in V2V communications, several channel scenarios can be experienced within the narrow time window. In order to maintain the performance of the LDPC encoded transmission schemes, the system parameters must be individually optimized for different scenarios, which translates into an increase in the computational complexity of the system making real-time implementation difficult. Additionally, at the signal level, no schemes have been incorporated to effectively take advantage of the frequency selectivity in the form of diversity to achieve better performance in the non-linear detection without significantly affecting the system’s spectral efficiency.

1.1. Objectives and Contributions

This paper proposes a new detection algorithm that yields similar performance to that of ML with low computational complexity. A data precoding scheme is proposed that efficiently exploits the channel’s frequency diversity without affecting the system’s spectral efficiency. The proposed detector offers two main advantages:
  • It assimilates the linear data precoding stage so that the operation is obtained with equivalent channel matrices that maintain the band structure. This makes it possible to extract the channel diversity, which significantly improves performance while demanding low complexity;
  • It uses an improved search order that enables the decoder to find the optimal solution in fewer iterations. Furthermore, the detector’s maximum search size can be set to an amount of operations that will not have a significant impact on performance.
Finally, an iterative reception structure is proposed that makes it possible to eliminate ICI among data subcarriers. The performance achieved with this technique after one iteration comes close to that obtained in conditions of exact knowledge of the channel.

1.2. Abbreviations and Acronyms

Lower (upper) case letters refer to vectors (matrices); [ · ] T , ( · ) H , ( · ) N and [ · ] T are the transpose, Hermitian, circular shift modulo N and band truncation operators, respectively; ( · ) k refers to the k-th OFDM symbol being considered. The subscripts ( · ) P and ( · ) D are the sampled versions of the vectors in the pilot and data positions; and in the case of the matrices, the versions sampled in the rows and columns in the pilot and data positions.

1.3. Organization

This paper is organized as follows: The signal model used is described in Section 2. The proposed reception system with the incorporation of frequency dispersion is addressed in Section 3. The low complexity non-linear detection proposed is described in Section 4. The complete block structure of the transmitter and receiver is presented in Section 5. Computational complexity analysis is addressed in Section 6. The simulation results are presented in Section 7. Finally, the conclusions are stated in Section 8.

2. System Model

The frame structure in 802.11p consists of a preamble that contains 10 symbols, each one lasting 1.6 μ s, found at the beginning of the frame and used to synchronize the system. Subsequently, two long training symbols are transmitted, each one lasting 6.4 μ s, used for fine synchronization and channel estimation. The remaining part of the frame, which has a variable length, is used to transmit the payload. Depending on the different modulation and coding schemes used, IEEE 802.11p permits a number of data transmission speeds ranging from 3 to 27 Mbps [22]. The physical layer of 802.11p, shown in Figure 1, uses 64 subcarriers per OFDM symbol, including 48 data subcarriers, 4 pilot subcarriers located at the indexes [ 21 ,   7 ] , [ 7 ,   21 ] , 11 virtual subcarriers, and one subcarrier for direct current (DC) component.
Let x k [ n ] the k-th transmitted OFDM symbol of N b = N + N g samples, where N and N g are the number of subcarriers and the length of the cyclical prefix (CP), respectively. Assuming that the CP is long enough to absorb the channel impulse response (CIR), the k-th received symbol y k [ n ] after removing CP can be expressed in its complex baseband representation as:
y k [ n ] = l = 0 L 1 h k [ n , l ] x k [ ( n l ) N ] + w k [ n ] ,
where n = { 0 , , N 1 } , l = { 0 , , L 1 } , L denotes the CIR length, h [ n , l ] is the CIR for the k-th block in the n-th time instant for an impulse function introduced l samples earlier, and w [ n ] is the circular and symmetrical additive white Gaussian noise (AWGN), with zero mean and variance σ w 2 = N 0 / 2 .
The circular convolution between the CIR and x k [ n ] can be rewritten in matrix form as:
y k = H k x k + w k
where
y k = y k [ 0 ] y k [ 1 ] y k [ N 1 ] T , x k = x k [ 0 ] x k [ 1 ] x k [ N 1 ] T , w k = w k [ 0 ] w k [ 1 ] w k [ N 1 ] T ;
in addition, H k is an N × N matrix, indexed 0 , 1 , , N 1 on each dimension, whose elements are formed with the CIR coefficients as follows:
H k n , n = h k n , ( n n ) N ,
where n , n = { 0 , 1 , , N 1 } and CIR is assumed to be zero for ( n n ) N > L 1 . The OFDM symbol received in frequency domain (FD) is obtained by multiplying both sides of (2) by the matrix of the normalized discrete Fourier transform (DFT):
F n , n = 1 N e ( j 2 π n n / N ) ,
which gives the result:
u k = FH k x k + z k ,
where u k is the DFT of the y k and z k is the DFT of noise sequence. Since matrix F is unitary, Equation (5) can be expressed as:
u k = G k s k + z k ,
where s k = Fx k is the OFDM symbol transmitted in the frequency domain, consisting of the χ data vector with N D data symbols, the s P pilot vector with N P pilots symbols, and N G guard symbols. G = FHF H is the channel frequency matrix (CFM). When the Doppler propagation is insignificant, G is a diagonal matrix, and the system is ICI-free. In V2V environments, due to high mobility of both the transmitter and the receiver, the combined effect of Doppler shift for each of the individual received paths results in significant Doppler dispersion, causing the CIR to become time varying within an OFDM symbol and resulting in matrix G to have energy on the components outside of the diagonal, giving rise to ICI. An example of the case of the scattered matrix of the channel is shown in Figure 2.

3. Proposed Receiver

3.1. Channel Estimation

The reduced number of pilots in a single OFDM symbol and the fact that they experience ICI complicate the task of estimating the time-varying CIR. To counteract this, the observation model of the channel estimator is extended to a sliding window that includes adjacent OFDM symbols as follows:
[ u k 1 u k u k + 1 ] = [ G k 1 s k 1 G k s k G k + 1 s k + 1 ] + [ z k 1 z k z k + 1 ]
where the superscript of each variable represents the position relative to the current k symbol. In order to carry out the channel estimation with this observation model, the algorithm proposed in [23] is used, where BEM is applied so as to obtain a compact representation of the CIR in the interval of the three OFDM symbols as follows:
h [ n , l ] = r = 0 M τ 1 q = 0 M D 1 ρ q , r ϕ q I [ n ] ϕ r I I [ l ] + ε [ n , l ] ,
where ρ q , r are the coefficients of the expression, m = 0 , , 3 N b 1 , M τ and M D are the number of functions used to expand the delay time domain and the time domain, respectively, and { ϕ q I [ n ] , q [ 0 , M D 1 ] } , { ϕ r I I [ l ] , r [ 0 , M τ 1 ] } are the functions that expand the time domain and the delay time, respectively. Given that in V2V scenarios the Doppler and delay dispersion presents statistics within a very diverse set, the discrete prolate spheroidal sequences (DPSS) are used as base functions since they optimally concentrate the energy in a finite time and bandwidth window. The modeling error for this representation in subspace is concentrated in the term ε [ n , l ] .
To determine the number of functions needed in each of the CIR domains, we use the approach proposed in [24]:
M τ = F s τ m a x   +   1 ,
M D = 2 f D 3 N b / F s   +   1 .
where · denotes the upward rounding operator, F S is the system’s bandwidth, τ m a x is the maximum time delay spread and f D is the maximum frequency Doppler spread.
The information from the BEM of channel in the frequency and frequency Doppler domains are found compactly in the doubly-indexed matrix:
Φ q , r k = FB q , r k F H ,
with
B r , q k n , n = ϕ q I [ n + ( k + 1 ) ( N + N g ) ] ϕ r I I [ ( n n ) N ]
and the BEM coefficients given by:
ρ q , r = m = 0 3 N 1 l = 0 L 1 h [ m , l ] ϕ ¯ q I [ m ] ϕ ¯ r I I [ l ] .
Substituting the channel for its BEM in (6) yields the expression:
u k = q = 0 M D 1 r = 0 M τ ρ q , r Φ q , r k s k + z k ,
Annexing this representation of the channel to the Equation (7) and considering only the positions where the transmitted and received pilots are found, yields the following:
u P = Λ ρ + ϵ P ,
where:
Λ T = Λ k 1 T Λ k T Λ k + 1 T T ,
Λ k = Φ 1 , P k s P k Φ 2 , P k s P k Φ I , P k s P k ,
u P = u P k 1 T u P k T u P k + 1 T T ,
ρ = ρ 0 ρ 1 ρ i ρ I T ;
the subscript P refers to the sub-sample of the vectors and matrices in the rows and columns corresponding to the pilots’ position. For reasons of simplification in the notation, the indexed variable i = q + M D r 1 was used, where 0 r M τ and 0 q M D 1 . ϵ P is the vector that concentrates the noise contributions, modeling error and intersymbol interference in order to simplify the expressions.
It is assumed that the receiver has matrix Λ and the received vector u P , such that the calculation of the channel’s estimated coefficient vector can be obtained by the least-squares (LS) algorithm [23]:
ρ ^ = ( Λ H Λ ) 1 Λ u P .
Once these coefficients are obtained, any of the representations, such as the time-varying impulse response and the channel transfer function, can be calculated directly by computing the weighted sum of the base functions. In this way, the frequency-Doppler and frequency response matrix can be calculated by using the expression:
G ^ k = i = 0 I 1 ρ ^ i Φ i k .

3.2. DFT Dispersion

The V2V channel selectivity makes OFDM systems susceptible to detection errors because the instant power of some subcarriers can be low due to the deep fading, which makes it difficult to detect the transmitted data. To counteract this problem, the precoding by dispersion in frequency (Direct Fourier Transform Spreading: DFTS) technique is used in this work because it uniformly distributes each symbol’s energy over the entire bandwidth and because its implementation, by means of the Fast Fourier Transform (FFT), is low in complexity. This operation can be represented formally on the transmitter side as follows:
s D = F D χ .
This is to say, the elements transmitted in frequency in the data positions are built by applying the Fourier matrix to the data symbols in vector χ . The elements of the Fourier matrix are determined by:
[ F D ] d , d = 1 / N D e j 2 π d d / N D ,
where d , d = { 0 , 1 , , N D } . Due to the fact that the data detection will only be carried out in the data subcarrier indexes, the original signal model in (4) is reduced to the following expression:
u D = G D F D χ + G D , P s P + z D ,
where u D and z D are the received signal vector and the noise vector, respectively, each in the position of the data subcarriers. The G D matrix is obtained by taking the rows and columns of the data carrier positions. The term G D , P s P represents the interference in the carriers, with data from the pilot carriers.

3.3. Non-Linear Detection on DFTS-OFDM System

The main contribution in this paper is the efficient integration of the DFTS precoding in the non-linear data detection process in the receiver. This has to be emphasized: one of the problems when using DFTS in the receiver is the difficulty of applying the non-linear detection algorithms while maintaining low computational complexity, since the equivalent channel matrix G D F D does not conserve a band structure. One solution to this issue is to find an operator that, upon being applied to the received signal, re-establishes the equivalent channel matrix’s band structure. In this sense, the inverse Fourier transform F D H is used to complete the Cramer–Loève operator in the G D channel matrix. In mathematical terms, the vector received in the data position is obtained as:
F D H u D = F D H G D F D χ + F D H G D , P s P + F D H z D ,
v = K χ + F D H G D , P s P + z D ,
where v = F D H u D , χ = F D H s D and K = F D H G D F D is the equivalent channel matrix after applying the inverse Fourier transform to the received symbols in the data position with linear precoding. In order to simplify the notation, the noise vector z D = F D H z D maintains the same nomenclature since the orthonormal transforms does not affect its statistics. Notice that the correlation characteristics and quasi-band structure of matrix G D imply that matrix K also possess a quasiband structure after the transformation, as shown in Figure 3. This structure in particular allows detection algorithms to diminish their computational complexity, while performing close to the ML detector in terms of BER.

Maximum Likelihood Detection Criteria

The data detection using the maximum likelihood criterion can be determined from the Equation (26) by finding the vector χ that minimizes the following metrics:
χ ^ = argmin χ Ω N D v K χ 2 ,
where Ω is the constellation used for data modulation and Ω N D is the set containing all possible combinations of the symbols transmitted through the N D data subcarriers. This data detection method is highly computationally complex due to the exhaustive calculation of all of the Euclidean distances that are needed to estimate the vector χ ^ . In order to reduce the complexity required by the detection, it can be applied a truncation to the matrix K , keeping B non-zero diagonals. These are determined using the following equation:
B = 2 ( λ + λ c ) + 1 ,
where the B diagonals are distributed in 3 bands, one band is formed by the main diagonal and 2 λ adjacent diagonals, the second band is formed by the λ c diagonals located in the upper right corner, and the third band is formed by λ c diagonals located in the lower-left corner. The rest of the diagonals are truncated to zero. The structure of the truncated K matrix is shown in Figure 3.

3.4. ICI Mitigation

As in related works [3,23,25], an iterative receiver is proposed, in which the estimated data can be reused to perform interference cancellation in the data, attaining an improved channel estimation in the next iteration. Mathematically, the estimated data in a i t -th iteration can be described recursively as:
u i t k = u i t 1 k [ G ^ i t 1 k ] T s i t 1 k ,
where the sub-index i t = { 0 , 1 , 2 , } denotes the iteration number; u i t k is the k-th received signal, [ G ^ k ] T is the estimated channel matrix with null elements in the main diagonal and s i t 1 k the received signal of the previous iteration.

4. Low Complexity Non-Linear Detection

The solution in (27) of the proposed signal model (26), although optimal, is not practical for implementation due to its high computational complexity. This section describes a methodology for non-linear detection of linearly precoded data; suitable for the signal model described in (26). The detection process consists of two stages; first, the sorted QR decomposition of the channel matrix K is performed. Subsequently, with the help of this decomposition, the proposed non-linear detectors of low computational complexity are executed. Each of the above algorithms is now described.

4.1. Sorted QR Decomposition

QR decomposition is used to obtain the matrices Q and R from the channel matrix with precoding K . This decomposition must comply with the following relationship:
KP = QR ,
where Q is an orthonormal matrix that fulfils the property Q H Q = I , R is a superior triangular matrix, and P is a permutation matrix whose reordering depends on the signal to interference ratio. This decomposition can be accomplished using different methods; however, for this article, the method based on the Givens unit rotations is used [26]. In each step of the orthonormalization process for determining the Q matrix, permutations are taken in the position of the columns in order for the resulting rows in the R matrix to be ordered according to their signal to interference ratio. The K matrix’s quasi-band structure is exploited in order to reduce, as much as possible, the computational complexity in terms of the number of Givens rotations required for the calculation of the QR decomposition.
To accomplish the mentioned decomposition according to the zero-forcing (ZF) criterion, the following extended matrix is defined:
K ̲ = K | v ,
to which a sequence of unit rotations is applied. When the minimum mean square error (MMSE) criterion is used, the extended matrix is constructed including the noise statistics as follows:
K ̲ = K v σ w 2 I 0 .
The advantage of using unit rotations in the orthogonalization process to obtain the QR decomposition is that it conserves the original energy of all the elements of the original K matrix, maintaining a dynamic range of all the variables used in the process. This characteristic makes it easier to implement this method in devices in real-time using fixed-point arithmetic. To simplify the notation in the successive process of Givens rotations, the following notation:
X ( 0 ) = K ̲ ,
is defined. Each Givens rotation, described by matrix Θ j which is calculated to cancel a non-zero element of the X ( j 1 ) matrix, obtained in the previous iteration. Therefore, the process of generating the upper triangular matrix R requires a sequence of Givens rotations to be applied to the expanded matrices (31) and (32) as follows:
X ( N D ) = Θ N D Θ 1 X ( 0 ) .
which ultimately yields
X N D = R Q H v = R v ˜ ,
for the ZF criteria case; for the MMSE criterion the following representation is obtained:
X N D = R Q 1 H v 0 Q 2 H v = R v ˜ 0 v ˜ 1 .
The detailed description of the Sorted QR algorithm is described in [27], with the only difference of omitting the rotation when a null element is found in the truncated channel matrix K .

4.2. Two Approaches for Non-Linear Data Detection

Once the preprocessing of the received signal, and the QR decomposition of the estimated channel matrix, have been completed, the next step is to perform data detection. For accomplishing this task, this work considered the following two non-linear detectors:

4.2.1. OSIC Detection

The ordered successive interference cancellation (OSIC) algorithm is an effective method to carry out the cancellation of the ICI. This method is suitable to apply to the proposed model in Equation (26) combined with the QR decomposition described above, allowing the sub-optimal detection of the data with very low computational complexity. Substituting this decomposition in Equation (26), it results in:
v = QR P T χ + z D ;
pre-multiplying both sides of this equation by Q H leads to the following system of equations:
v ˜ = R P T χ + Q H z D ,
v ˜ = R χ ˜ + z D ;
where v ˜ = Q H v , and χ ˜ = P T χ is the vector of the precoded data, ordered in decreasing order with respect to its contained energy. The z D noise vector maintains its statistics due to the fact that Q is unitary. Due to the triangular structure of R , the v ˜ vector elements can be expressed individually as:
[ v ˜ ] j = [ R ] j , j [ χ ] j + i = j + 1 N D [ R ] j , i [ χ ] i + [ z ] j ;
where the notations [ · ] a and [ · ] a , b indicate the a-th element of the vector and the b-th element of the a-th row of the matrix, respectively. This way, the detection of each of the data signal can be obtained iteratively using the following expression:
[ χ ^ ] N D = Q [ v ˜ ] j [ R ] j , j ,
[ χ ^ ] j = Q [ v ˜ ] j i = j N D [ R ] j , i [ χ ^ ] i [ R ] j , j , j = { N D 1 , , 1 } ;
where the operator Q { · } is a decision operator that maps its arguments to the closest point in the constellation Ω used by the transmitter. Assuming that at each iteration, the previous decisions are correct, then the interference of the previously detected symbols can be subtracted from the current symbol to be detected.

4.2.2. Near ML Detection

The ML detection using QR decomposition can be reformulated in the following way:
χ ^ = argmin χ Ω N D v ˜ R χ 2 .
The search for the ML solution of the χ ^ vector based on the criterion established in Equation (43) can be reflected graphically in the construction of the tree shown in Figure 4. At the n-th level there are q = N c N D n + 1 possible candidates for [ χ ^ ] n , where n = N D , N D 1 , , 1 . The total minimum metric needed to determine the vector with the minimum distance in accordance to Equation (43) is defined as:
d ( χ ^ ) = j = 1 N D [ v ˜ ] j i = j N D [ R ] j , i [ χ ^ ] i 2 ,
where:
χ ^ = χ ^ 1 , χ ^ 2 , , χ ^ N D ,
corresponds to the trajectory that forms the nodes at the n levels of the tree. The trajectory minimizes the distance calculated in the Equation (44). The symbol vector χ is defined to the n-th level as:
χ = χ N D , , χ n ,
with N D n + 1 length. Adjusting the Equation (44) to calculate the partial metric for the χ vector, the modification is defined as:
d n ( χ ) = j = n N D [ v ˜ ] j i = j N D [ R ] j , i [ χ ] i 2 ,
where d n ( χ ) is the value obtained from the accumulated branch metric of the [ χ ] n node that has a [ χ ] N D , [ χ ] n + 1 as its predecessor nodes. This distance represents the addition of all of the branch metrics from the root ( N D node) to the node indicated at the n-th level.
The QRD-M algorithm based on the QR decomposition reaches a performance in terms of BER, similar to the ML detector [27]. The QRD-M algorithm is a transversal tree search algorithm. At the n-th level, the algorithm maintains M possible candidates before selecting the symbol. Subsequently, the decision of the χ ^ vector is performed once the N D levels have been processed. The search process in the QRD-M algorithm, used to detect the symbols, is run sequentially and is initiated at the last level ( n = N D ). The algorithm calculates the metric d n ( χ ) , defined in Equation (47), for all the possible values of χ i Ω . The distances and the nodes are then arranged in ascending order, and only the M nodes with the least distance are maintained while the rest are discarded. The same procedure is used for the next level and continues until the first level ( n = 1 ) is processed. The performance of the QRD-M algorithm depends on the established value of M N c ; a higher value makes it more probable that the optimal branch is included in the branches selected at the n-th level. In the search process at each one of the n-th levels, the tree extends to p = M N c branches, and their corresponding Euclidean distance is calculated in order to select the surviving M branches at the n-th level, as illustrated in Figure 5. This value is much lower than the number of branches q = N c N D k + 1 that are required in the ML algorithm. Additionally, in our proposal, we introduce heuristics so that the number of surviving M branches per level can be adapted. This value is adjusted during the search process run at each level of the tree. With this modification, the detector complexity is variable, and for a high signal to noise ratio the savings in computational complexity of the detector are significant, maintaining the detector’s performance close to that of the ML detector in terms of BER.
Exploiting the R matrix structure, the estimation of the last level [ χ ] N D does not depend on the symbols [ χ ] j , for 1 j N D 1 . An exhaustive search is done of [ χ ] N D , the distances are calculated using Equation (47) for the N c constellation points, such that [ χ ] N D ( β ) Ω for 1 β N c . It is defined d ( β ) = d ( [ χ ] N D ( β ) ) = [ v ˜ ] N D [ R ] N D , N D [ χ ] N D β 2 . The vector elements d ( β ) are arranged in ascending order and stored in the vector dist = [ d ] 1 [ d ] 2 [ d ] N c , where the smallest subindex corresponds to the least vector distance d ( β ) , which corresponds to the ordered set of symbols pos = χ N D ( 1 ) χ N D ( 2 ) χ N D ( N c ) in d ( β ) terms. The smallest super index in χ N D ( β ) indicates the constellation symbol Ω with the least distance in d ( β ) . The symbol search process is continued χ ^ 1 , , χ ^ N D 1 using the QRD-M algorithm described previously assuming that [ χ ] N D = χ N D ( 1 ) . The search result is stored in the vector χ ^ ( 1 ) = χ 1 ( 1 ) , , χ N D ( 1 ) , with a distance calculated using Equation (44), d ( 1 ) = j = 1 N D [ v ˜ ] j i = j N D [ R ] j , i [ χ ^ ( 1 ) ] i 2 , where the super indexes of d ( 1 ) and χ ^ ( 1 ) correspond to the assumption [ χ ] N D = χ N D ( 1 ) . A new search is run in the tree and [ χ ] N D = χ N D ( 2 ) is established only if it meets the following condition: [ d ] 2 < d ( 1 ) (the first phase demonstrates that d ( β * ) = d ( 1 ) ). In case it is not met the significant condition that this search has an initial distance greater than d ( β * ) . The complexity of the optimal vector search for χ ^ in the tree can be reduced further by calculating the partial distance metric to the n-th level defined in Equation (47) d n ( β ) = j = n N D [ v ˜ ] j i = j N D [ R ] j , i [ χ ] i 2 . Additionally, if d n ( β ) d ( β * ) is met, the search is cancelled at that level and restarted with the next phase assuming that [ χ ] N D = χ N D ( β + 1 ) . The algorithm finalizes the χ ^ optimal vector search process when d ( β * ) [ d ] β . A complete description of the Near ML V2V algorithm that includes the previously described procedure is presented in Algorithm 1.
Algorithm 1: Recursive near ML detector for V2V system.
Sensors 21 06067 g012

5. Computational Structure

The architecture of the transmitter and the receiver are summarized in Figure 6 and Figure 7, respectively. The transmitter conserves the structure of a conventional OFDM system for the standard 802.11p. The only difference is the DFTS block, applied to the data before the OFDM modulation is completed. The receiver is composed of four main stages. First, the conventional OFDM demodulation is executed with the help of the FFT block, followed by the demapping of the OFDM symbols. The second stage consists of estimating the channel with the use of the pilot symbols. The channel estimator block has the channel matrices G and K as output, necessary to carry out the ICI mitigation and data estimation, respectively. In the third stage, the D T truncation is carried out once the B bands of the matrix K are selected. Afterward, the QR decomposition of the truncated matrix K under the ZF or MMSE criterion is carried out. Next, the vector v ˜ is calculated by multiplying v and Q H . The following step is to carry out either OSIC or Near-ML non-linear detection. At the final stage, bit error correction is performed on the estimated vector χ ˚ . The estimated vector enters a feedback loop where ICI mitigation is performed for the data subcarriers. This process reduces the channel estimation error and improves the detection of the data. The process is repeated until the number of iterations configured in the receiver is executed.

6. Computational Complexity

The computation complexity is first presented for the QR decomposition; it is given in terms of O and verified by counting the number of complex operations, where Givens rotations are implemented using conventional arithmetic. The parameters considered for the system are:
  • An OFDM system with N D = 48 data subcarriers;
  • 4 Q A M modulation scheme with unitary average power per symbol;
  • N c = 4 is the maximum number of surviving branches per level in the Near ML V2V algorithm;
  • The dimensions of X N D is 48 × 49 for the ZF criterion and 96 × 49 for the MMSE criterion;
  • The algorithms were performed for 2000 channel realizations, and the complex operations employed were counted independently for each algorithm and finally averaged;
  • Based on simulations results, it was determined the number B = 27 bands for truncating matrix K ̲ .
As can be observed in Table 1, the complexity obtained in this proposal, in terms of complex operations, is in quadratic order with respect to the B number of bands and in linear order with respect to the N D number of data subcarriers. Systems with similar orders of complexity can be found in [8,14], but the work proposed in this paper provides a significant reduction in the complexity required for the conventional MMSE linear criterion, which is reported in the literature in O ( N D 3 ) order. A system that uses the real model and LDL decomposition with a complexity similar to O ( B 2 N D ) was proposed in [8] for an OFDM system in doubly dispersive channels. However, that work does not achieve to improving the performance in terms of BER when compared to the conventional MMSE detection. In the case of the OSIC and Near ML detector complexity, the necessary complex operations were assessed for the detection of N D symbols transmitted by the system. The number of required complex operations was counted depending on the signal-to-noise ratio, both for the ZF criterion and for the MMSE. The results of these simulations are presented in Figure 8.
Figure 8 demonstrates the complexity in terms of complex operations required for both proposed detectors. For the case of the OSIC detector the complexity, using the MMSE criterion in the calculation of the QR decomposition, significantly reduces the complexity of the data detection task. For the Near ML detector, none of the two mentioned criteria for QR decomposition is affecting the complexity of finding the optimal vector. The complexity in the OSIC detector is constant and it does not depend on the receiver’s SNR. This approach presents the lowest complexity but its performance is not the best, as shown in Figure 9. In the case of the Near ML detector, Figure 8 shows that its complexity tends towards a low constant value starting at an SNR of 15 dB, where it achieves a very similar value to the complexity obtained by the OSIC detector. On the other hand, its performance, in terms of BER, is quite close to the ML detector, as will be discussed in detail in the following section.
Table 2 summarizes the complexity required by the most representative detection algorithms used in doubly selective channels (DSC). The main objective is to provide the reader with an overview of the computational complexity of the compared approaches. Table 2 shows the closeness in computational cost of Near ML detection compared to Sorted OSIC detection. The LMMSE detection requires approximately three times the computational cost of the OSIC and Near ML detection. The proposed algorithms achieve a cost reduction in 10 25 order compared with the Full-ML detection.

7. Simulations Results

The numerical results presented below were obtained from a simulator implemented in Matlab-Simulink, replicating compatible simulation environments with the 802.11p link [11]. The blocks that describe the internal signal processing algorithms considered for the transmitter and the iterative receiver were discussed in Section 5.
The standard 802.11p uses a bandwidth of B W = 10 Mhz, a cyclic prefix containing CP = 16 samples, due to which the system can absorb a maximum tolerable delay of 1.6 μ s in the duration of the CIR from the V2V channel. Of the 64 subcarriers that compose an OFDM symbol, 48 are used for the data transmitting. This allows the use of eight modulation schemes which permit the handling of transmission speeds between 3 and 27 Mbps and a frame length of L F = 37 OFDM signals.
In this article, we present results using the following parameters: a 4-QAM modulation scheme, N c = 4 for the Near ML search tree, convolutional coding of length L c = 7 , a code rate of R c = 1 / 2 and B = 27 main diagonals, with λ = 8 , λ c = 5 . The channel was implemented using the filtered method explained in [28]. The channel power delay profile (PDP) consists of six uncorrelated paths defined by p ( τ ) = δ ( τ m τ 0 ) e τ 10 τ 0 where 0 < τ < 1.6 μ s , τ 0 = 0.1 μ s and m = { 0 , 1 , , } . The parameters that were used to generate the V2V channel are reported in [3], where V2V channel models consider vehicle velocities of v = 100 Km/h. The number of OFDM symbols transmitted by each evaluated SNR level is equal to 1.6 × 10 5 .
Figure 10 shows the BER vs. E b / N 0 , under a vehicular scenario with NLOS (no-line-of-sight). To emulate this scenario, a channel with Rayleigh fading was considered with a power delay profile, decreasing exponentially with root mean square (RMS) delay time τ R M S = 0.4 μ s and f D = 1 kHz. This model is similar to the one called “RTV-Expressway” described in [2]. The dotted lines show the system performance with linear detectors, using the pilot assignment shown in Figure 1 for the iterative estimation of the channel. The solid line is assigned to the performance of our proposed system with Near ML non-linear detection. The tests show that the linear detection approach needs at least three iterations in order for a floor error not to be found. In the case of the proposed Near ML non-linear detection, no iteration is needed to achieve this. It can be seen that the proposed Near ML detection largely surpasses the LMMSE detection approach proposed in [3].
In order to more clearly quantify the Near ML and OSIC detection performance with respect to the DFTS-OFDM-LMMSE detection, tests were completed without the use of the convolutional encoder. Additionally, both the OSIC and Near ML detection were evaluated using QR decomposition with ZF and MMSE as criteria. Figure 9 shows the BER vs. SNR comparison of the proposed algorithms that includes frequency dispersion. With the exception of the ZF-OSIC detection, the proposed algorithms present better performance compared with LMMSE detection with ideal channel. In one particular case above SNR = 15 dB, the MMSE-OSIC suboptimal detection and the MMSE-Near ML detection surpass the LMMSE detection by 2.5 and 5 dB, respectively. It is important to mention that the tendency shown by both proposed detectors does not exhibit the undesirable error floor.
Figure 11 shows the performance of the proposed iterative receiver. With just two iterations completed in the proposed receiver, a performance similar to the ideal channel, in terms of BER, is achieved. This represents a substantial decrease in the number of iterations required by the receivers reported in state of the art, which require at least five iterations to achieve a performance similar to the ICI-free condition.

8. Conclusions

This article has presented a low computational complexity receiver that achieves both the extraction of frequency diversity, as well as efficient ICI mitigation in V2V communication systems. It was shown that reception in challenging high-mobility environments can be achieved with the proposed scheme, also exhibiting a manageable computational complexity. The proposal consists of an efficient treatment of the data frequency dispersion, a time-varying channel estimation using the two dimensional basic expansion model, and sub-optimal non-linear detectors. The results show a performance close to the one obtained by the ML algorithm. Furthermore, with only two iterations, it was shown that with true low complexity, the proposed system performed equally or better, in terms of BER, than other approximations presented as the state of the art, confirming its capacity to exploit the available frequency diversity in doubly selective channels.

Author Contributions

Conceptualization, J.A.D.P.-F. and R.P.-M.; methodology, J.A.D.P.-F. and F.P.-C.; software, J.A.D.P.-F.; validation, F.P.-C., R.P.-M., and C.D.-V.-S.; formal analysis, J.A.D.P.-F. and F.P.-C.; investigation, J.A.D.P.-F., F.P.-C., R.P.-M., and C.D.-V.-S.; resources, J.A.D.P.-F., F.P.-C., R.P.-M., and C.D.-V.-S.; writing, original draft preparation, J.A.D.P.-F.; writing, review and editing, F.P.-C., R.P.-M., and C.D.-V.-S.; supervision, C.D.-V.-S.; project administration, J.A.D.P.-F. and F.P.-C.; funding acquisition, J.A.D.P.-F. and C.D.-V.-S. All authors read and agreed to the published version of the manuscript.

Funding

The authors would like to thank the founding from Universidad Panamericana.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data presented in this study are available on request from the corresponding author.

Acknowledgments

The authors would like to thank Joaquin Cortez (RIP) for his partitioning in the work.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Mecklenbrauker, C.F.; Molisch, A.F.; Karedal, J.; Tufvesson, F.; Paier, A.; Bernado, L.; Zemen, T.; Klemp, O.; Czink, N. Vehicular Channel Characterization and Its Implications for Wireless System Design and Performance. Proc. IEEE 2011, 99, 1189–1212. [Google Scholar] [CrossRef]
  2. Acosta-Marum, G.; Ingram, M.A. Six time- and frequency- selective empirical channel models for vehicular wireless LANs. IEEE Veh. Technol. Mag. 2007, 2, 4–11. [Google Scholar] [CrossRef] [Green Version]
  3. Zemen, T.; Bernado, L.; Czink, N.; Molisch, A.F. Iterative Time-Variant Channel Estimation for 802.11p Using Generalized Discrete Prolate Spheroidal Sequences. IEEE Trans. Veh. Technol. 2012, 61, 1222–1233. [Google Scholar] [CrossRef]
  4. Zemen, T.; Molisch, A.F. Adaptive Reduced-Rank Estimation of Nonstationary Time-Variant Channels Using Subspace Selection. IEEE Trans. Veh. Technol. 2012, 61, 4042–4056. [Google Scholar] [CrossRef]
  5. Ku, M.; Huang, C. A Refined Channel Estimation Method for STBC/OFDM Systems in High-Mobility Wireless Channels. IEEE Trans. Wirel. Commun. 2008, 7, 4312–4320. [Google Scholar] [CrossRef]
  6. Ahmed, S.; Sellathurai, M.; Lambotharan, S.; Chambers, J.A. Low-complexity iterative method of equalization for single carrier with cyclic prefix in doubly selective channels. IEEE Signal Process. Lett. 2006, 13, 5–8. [Google Scholar] [CrossRef] [Green Version]
  7. Tang, Z.; Leus, G. A novel receiver architecture for single-carrier transmission over time-varying channels. IEEE J. Sel. Areas Commun. 2008, 26, 366–377. [Google Scholar] [CrossRef] [Green Version]
  8. Rugini, L.; Banelli, P.; Leus, G. Simple equalization of time-varying channels for OFDM. IEEE Commun. Lett. 2005, 9, 619–621. [Google Scholar] [CrossRef]
  9. Kim, S.I.; Oh, H.S.; Choi, H.K. Mid-amble aided OFDM performance analysis in high mobility vehicular channel. In Proceedings of the 2008 IEEE Intelligent Vehicles Symposium, Eindhoven, The Netherlands, 4–6 June 2008; pp. 751–754. [Google Scholar] [CrossRef]
  10. Lin, C.S.; Sun, C.K.; Lin, J.C.; Chen, B.C. Performance evaluations of channel estimations in IEEE 802.11p environments. In Proceedings of the 2009 International Conference on Ultra Modern Telecommunications Workshops, St. Petersburg, Russia, 12–14 October 2009; pp. 1–5. [Google Scholar] [CrossRef]
  11. IEEE Draft Standard for Information Technology-Telecommunications and Information Exchange between Systems-Local and Metropolitan Area Networks-Specific Requirements-Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment: Wireless Access in Vehicular Environments; IEEE Unapproved Draft Std P802.11p /D11.0; IEEE: Piscataway, NJ, USA, 2010.
  12. Damen, M.O.; Gamal, H.E.; Caire, G. On maximum-likelihood detection and the search for the closest lattice point. IEEE Trans. Inf. Theory 2003, 49, 2389–2402. [Google Scholar] [CrossRef] [Green Version]
  13. Hassibi, B.; Vikalo, H. On the sphere-decoding algorithm I. Expected complexity. IEEE Trans. Signal Process. 2005, 53, 2806–2818. [Google Scholar] [CrossRef] [Green Version]
  14. Hwang, S.J.; Schniter, P. Efficient Sequence Detection of Multicarrier Transmissions over Doubly Dispersive Channels. EURASIP J. Adv. Signal Process. 2006, 2006, 093638. [Google Scholar] [CrossRef] [Green Version]
  15. Guo, Z.; Nilsson, P. Reduced complexity Schnorr-Euchner decoding algorithms for MIMO systems. IEEE Commun. Lett. 2004, 8, 286–288. [Google Scholar] [CrossRef]
  16. Moroga, H.; Yamamoto, T.; Adachi, F. Iterative Overlap TD-QRM-ML Block Signal Detection for Single-Carrier Transmission without CP Insertion. In Proceedings of the 2012 IEEE Vehicular Technology Conference (VTC Fall), Yokohama, Japan, 6–9 May 2012; pp. 1–5. [Google Scholar] [CrossRef]
  17. Temma, K.; Yamamoto, T.; Adachi, F. Improved 2-Step QRM-ML Block Signal Detection for Single-Carrier Transmission. In Proceedings of the 2011 IEEE Vehicular Technology Conference (VTC Fall), San Francisco, CA, USA, 5–8 September 2011; pp. 1–5. [Google Scholar] [CrossRef] [Green Version]
  18. Vlachos, E.; Lalos, A.S.; Berberidis, K. Low-Complexity OSIC Equalization for OFDM-Based Vehicular Communications. IEEE Trans. Veh. Technol. 2017, 66, 3765–3776. [Google Scholar] [CrossRef]
  19. Zhang, Y.; Peng, K.; Song, J.; Wu, Y. Quasi-Cyclic Spatially Coupled LDPC Code for Broadcasting. IEEE Trans. Broadcast. 2020, 66, 187–194. [Google Scholar] [CrossRef]
  20. Dai, L.; Fang, Y.; Yang, Z.; Chen, P.; Li, Y. Protograph LDPC-Coded BICM-ID with Irregular CSK Mapping in Visible Light Communication Systems. IEEE Trans. Veh. Technol. 2021. [Google Scholar] [CrossRef]
  21. Padala, S.K.; D’Souza, J. Performance of Spatially Coupled LDPC Codes over Underwater Acoustic Communication Channel. In Proceedings of the 2020 National Conference on Communications (NCC), Kharagpur, India, 21–23 February 2020; pp. 1–5. [Google Scholar] [CrossRef]
  22. Arena, F.; Pau, G.; Severino, A. A Review on IEEE 802.11p for Intelligent Transportation Systems. J. Sens. Actuator Netw. 2020, 9, 22. [Google Scholar] [CrossRef]
  23. Pena-Campos, F.; Carrasco-Alvarez, R.; Longoria-Gandara, O.; Parra-Michel, R. Estimation of Fast Time-Varying Channels in OFDM Systems Using Two-Dimensional Prolate. IEEE Trans. Wirel. Commun. 2013, 12, 898–907. [Google Scholar] [CrossRef]
  24. Slepian, D. Prolate spheroidal wave functions, Fourier analysis and uncertainty-IV: Extensions to many dimensions; generalized prolate spheroidal functions. Bell Syst. Tech. J. 1964, 43, 3009–3057. [Google Scholar] [CrossRef]
  25. Hijazi, H.; Ros, L. Joint data QR-detection and Kalman estimation for OFDM time-varying Rayleigh channel complex gains. IEEE Trans. Commun. 2010, 58, 170–178. [Google Scholar] [CrossRef] [Green Version]
  26. Golub, G.H.; Loan, C.F.V. Matrix Computations, 4th ed.; An Optional Note; Johns Hopkins University Press: Baltimore, MD, USA, 2016. [Google Scholar]
  27. Wu, K.; Sang, L.; Xiong, C.; Zhang, X.; Yang, D. Novel QRM-MLD algorithm for V-BLAST systems with permuted channel matrix. In Proceedings of the 2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications, Tokyo, Japan, 13–16 September 2009; pp. 2484–2488. [Google Scholar] [CrossRef]
  28. Parra-Michel, R.; Vázquez Castillo, J.; Vela-Garcia, L.R.; Kontorovich, V.; Peña-Campos, F. A Channel Model and Simulation Technique for Reproducing Channel Realizations with Predefined Stationary or Non-Stationary PSD. IEEE Trans. Wirel. Commun. 2018, 17, 5409–5424. [Google Scholar] [CrossRef]
Figure 1. Pilot pattern in an 802.11p OFDM frame.
Figure 1. Pilot pattern in an 802.11p OFDM frame.
Sensors 21 06067 g001
Figure 2. Example of the quasi-band structure of channel frequency matrix G 2 in dB, for a V2V scenario with RMS delay spread of 0.4 μ s and frequency Doppler spread of 1 kHz, modeling a Rayleigh fading NLOS scenario.
Figure 2. Example of the quasi-band structure of channel frequency matrix G 2 in dB, for a V2V scenario with RMS delay spread of 0.4 μ s and frequency Doppler spread of 1 kHz, modeling a Rayleigh fading NLOS scenario.
Sensors 21 06067 g002
Figure 3. Plot of an example of K 2 in dB, where the quasi-band structure of K in V2V-DSC allows application of a matrix truncation with λ + 1 strips.
Figure 3. Plot of an example of K 2 in dB, where the quasi-band structure of K in V2V-DSC allows application of a matrix truncation with λ + 1 strips.
Sensors 21 06067 g003
Figure 4. The tree-structured ML solution search.
Figure 4. The tree-structured ML solution search.
Sensors 21 06067 g004
Figure 5. The tree-structured Near ML search proposed.
Figure 5. The tree-structured Near ML search proposed.
Sensors 21 06067 g005
Figure 6. Model of the LP-OFDM transmitter.
Figure 6. Model of the LP-OFDM transmitter.
Sensors 21 06067 g006
Figure 7. Schematic structure of the 802.11p link-level receiver proposed with no-linear detection and iterative ICI cancellation.
Figure 7. Schematic structure of the 802.11p link-level receiver proposed with no-linear detection and iterative ICI cancellation.
Sensors 21 06067 g007
Figure 8. Computational complexity of OSIC and Near ML detectors.
Figure 8. Computational complexity of OSIC and Near ML detectors.
Sensors 21 06067 g008
Figure 9. BER vs. SNR comparison without convolutional encoder of the LMMSE with channel knowledge vs. the proposed OSIC and Near ML detections using QR decomposition with ZF and MMSE as criteria. The channel model uses a Jake’s Doppler profile for each channel tap. The power delay profile is exponentially decaying with RMS delay spread of 0.4 μ s and frequency Doppler spread of 1 kHz modeling a Rayleigh fading NLOS scenario.
Figure 9. BER vs. SNR comparison without convolutional encoder of the LMMSE with channel knowledge vs. the proposed OSIC and Near ML detections using QR decomposition with ZF and MMSE as criteria. The channel model uses a Jake’s Doppler profile for each channel tap. The power delay profile is exponentially decaying with RMS delay spread of 0.4 μ s and frequency Doppler spread of 1 kHz modeling a Rayleigh fading NLOS scenario.
Sensors 21 06067 g009
Figure 10. BER vs. Eb/No comparison of the Near ML detection proposed and LMMSE detection for a frame length L F = 37 and full 802.11p compliant (no postamble). The channel model uses a Jake’s Doppler profile for each channel tap. The power delay profile is exponentially decaying with RMS delay spread of 0.4 μ s and frequency Doppler spread of 1 kHz modeling a Rayleigh fading NLOS scenario.
Figure 10. BER vs. Eb/No comparison of the Near ML detection proposed and LMMSE detection for a frame length L F = 37 and full 802.11p compliant (no postamble). The channel model uses a Jake’s Doppler profile for each channel tap. The power delay profile is exponentially decaying with RMS delay spread of 0.4 μ s and frequency Doppler spread of 1 kHz modeling a Rayleigh fading NLOS scenario.
Sensors 21 06067 g010
Figure 11. BER vs. SNR for the iteration {1,2} of the Near-ML detection proposed without convolutional encoder, using QR decomposition with MMSE as criteria. The channel model uses a Jake’s Doppler profile for each channel tap. The power delay profile is exponentially decaying with RMS delay spread of 0.4 μ s and frequency Doppler spread of 1 kHz modeling a Rayleigh fading NLOS scenario.
Figure 11. BER vs. SNR for the iteration {1,2} of the Near-ML detection proposed without convolutional encoder, using QR decomposition with MMSE as criteria. The channel model uses a Jake’s Doppler profile for each channel tap. The power delay profile is exponentially decaying with RMS delay spread of 0.4 μ s and frequency Doppler spread of 1 kHz modeling a Rayleigh fading NLOS scenario.
Sensors 21 06067 g011
Table 1. Computational complexity required for sorted-QR decomposition.
Table 1. Computational complexity required for sorted-QR decomposition.
QR
Decomposition
Number of
Rotations with
Banded Matrix
Number of
Rotations with
Full Matrix
Complexity
ZF37,900114,020 O ( B 2 N D )
MMSE59,650172,780 O ( 2 B 2 N D )
Table 2. Computational complexity in terms of complex products per OFDM symbol required for signal detection, considering one iteration with N c = 4 , B = 27 , Ω = 4 , and SNR = 15 dB.
Table 2. Computational complexity in terms of complex products per OFDM symbol required for signal detection, considering one iteration with N c = 4 , B = 27 , Ω = 4 , and SNR = 15 dB.
MethodComplexityNormalized Cost
N D = 48 N D = 512
ML O ( Ω N D N D ) 5.43 × 10 25 Inf
LMMSE O ( N D 3 ) 1.5802179.7970
Near ML Proposed O ( ( 2 B 2 + N c 2 ) N D ) 1.01101.0110
OSIC Proposed O ( 2 B 2 N D ) 11
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Del Puerto-Flores, J.A.; Peña-Campos, F.; Parra-Michel, R.; Del-Valle-Soto, C. Carrier Diversity Incorporation to Low-Complexity Near-ML Detection for Multicarrier Systems over V2V Radio Channel. Sensors 2021, 21, 6067. https://doi.org/10.3390/s21186067

AMA Style

Del Puerto-Flores JA, Peña-Campos F, Parra-Michel R, Del-Valle-Soto C. Carrier Diversity Incorporation to Low-Complexity Near-ML Detection for Multicarrier Systems over V2V Radio Channel. Sensors. 2021; 21(18):6067. https://doi.org/10.3390/s21186067

Chicago/Turabian Style

Del Puerto-Flores, Jose Alberto, Fernando Peña-Campos, Ramón Parra-Michel, and Carolina Del-Valle-Soto. 2021. "Carrier Diversity Incorporation to Low-Complexity Near-ML Detection for Multicarrier Systems over V2V Radio Channel" Sensors 21, no. 18: 6067. https://doi.org/10.3390/s21186067

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop