Next Article in Journal
Modeling and Evaluation of an Energy-Saving Backpack with Adjustable Stiffness
Previous Article in Journal
Research on Centrifugal Pump Speed Measurement Based on Vibration Measurement
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Efficient Quantized Message Passing Receiver Design for SCMA Systems

by
Hao Cheng
1,2,
Min Zhang
1 and
Ruoyu Su
1,*
1
School of Internet of Things, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
2
National Mobile Communications Research Laboratory, Southeast University, Nanjing 210096, China
*
Author to whom correspondence should be addressed.
Sensors 2025, 25(10), 3098; https://doi.org/10.3390/s25103098
Submission received: 17 April 2025 / Revised: 13 May 2025 / Accepted: 13 May 2025 / Published: 14 May 2025

Abstract

:
Sparse code multiple access (SCMA) has been considered as an efficient technique to provide both massive connectivity and high spectrum efficiency for future machine-type wireless networks. However, the conventional uniform quantization of the message passing algorithm (MPA) for the SCMA detection induces a significant bit error ratio (BER) performance degradation. In this sense, we propose a new quasi-uniform quantization scheme that can efficiently handle the dynamic range in the exchange of messages. To accelerate the convergence of conventional Max-log MPA, the Sub-log MPA is considered by using the latest updating messages at the current iteration. Simulation results show that the proposed quasi-uniform quantization method can significantly improve the BER performance of the SCMA decoder without modifying the resource nodes’ and variable nodes’ update rules in both the additive white Gaussian noise and the Rayleigh frequency selective channels, as compared to the uniform quantizer.

1. Introduction

The upcoming beyond fifth-generation and six-generation wireless networks [1,2] are expected to support hundreds of billions of nodes in the Internet of Things (IoT) [3,4,5], such as the cognitive sensors as well as those found in remote driving [6] and virtual reality, to mention a few. To satisfy the demands of massive connectivity, high throughput and low latency in this IoT scenario, non-orthogonal multiple access (NOMA) [7,8,9,10] has been identified as one of the key physical layer technology to provide higher spectral efficiency and support more connectivities, compared to traditional orthogonal multiple access schemes adopted in the existing 5G systems. The philosophy of NOMA is to allow the simultaneous data transmission for multiple nodes at the same time and frequency resources, and it can be roughly divided into two categories, that is, power domain NOMA (PD-NOMA) and code domain NOMA [11,12,13,14]. In PD-NOMA, distinct transmit power levels are assigned to active users, followed by the superposition coding to multiplex, and the successive interference cancellation technology is applied to eliminate the interference from users with higher power levels in order to detect the transmit symbols of the intended user. Sparse code multiple access (SCMA) [15,16,17,18], multiple user shared access, pattern division multiple access, and interleave division multiple access are several typical schemes of the code domain NOMA [19,20]. In the past decade, significant attention has been directed toward the SCMA, which can be overloaded to enable massive connectivity and achieve high spectrum efficiency. The fundamental principle of SCMA involves mapping the information bits of each user to complex muti-dimensional sparse codewords from its pre-allocated unique codebook and decoding the transmit bits of different users by using the factor-graph-based message passing algorithm (MPA) detector [21].
In communication systems, it has been verified that SCMA can achieve a better sum rate [18] and bit error ratio (BER) [22] performance than PD-NOMA due to the shaping gain of its codewords at the cost of more computational complexity. In this way, various efforts have been made to explore low complexity MPA detectors for SCMA. The original MPA exchanges the message of resource nodes and variable nodes until the maximum number of iterations, which involves redundant calculations. To this end, the authors in [23] present a threshold-based scheme where the reliability of every codeword is computed in each iteration to judge whether the belief threshold is reached. Based on partial marginalization (PM), a fixed low complexity SCMA detector is proposed in [24], in which t symbols are fixed in the m-th iteration and the computations corresponding to these t symbols are not required in the rest iterative calculations. To further reduce its computational complexity, an improved PM-MPA detector [25] is proposed by updating the message more efficiently than the original PM-MPA [24] to obtain reliable codewords. To accelerate its convergence, a shuffled MPA has been proposed in [26] by immediately propagating the updated message between resource nodes and variable nodes in the current iteration. In addition, the authors in [27] also provide a residual-aided message exchanging procedure for scheduling messages in the asynchronous message passing algorithm detector by exploiting the message with the largest residual. The ascending order of the above serial scheduling strategy is not the best selection. In this way, an improved serial scheduling-based MPA method [28] is provided by taking advantage of the most reliable message updates in a timely manner. To address the computational cost challenge in the design of downlink multiple-input multiple-output SCMA systems, the parallel and serial schedules are considered to strike a balance between detector complexity and latency [29]. To enhance the bit error ratio (BER) performance of the SCMA, a scaling factor is introduced to compress likelihood messages [30] to solve the overestimation problem of the iterative multiuser SCMA receiver. By using the lookup table, two variances of the original MPA are provided [31], and these can balance a trade-off between computational complexity and BER performance. The idea of stochastic computing has been introduced into MPA [32] to design novel stochastic logic architectures by carrying out complex computations with very simple logics. In practical, it is essential to integrate SCMA with multi-carrier waveforms to investigate its effectiveness [33,34]. To tackle the peak-to-average power ratio of SCMA combined with orthogonal frequency division multiplexing, a novel clipping noise aided MPA has been taken into consideration for decoding more accurately [33]. By means of the frequency domain implementation of the generalized frequency-division multiplexing (GFDM), a low complexity detection for SCMA-GFDM [34] has been established by applying the discrete Fourier transform operation.
Apart from many solutions for reducing the computational complexity of the conventional MPA, there are several other approaches developed for SCMA detection. By utilizing the lattice structure of its codewords, a low-complexity list sphere decoding has been proposed by avoiding the exhaustive search for all possible hypotheses [35]. Inspired by the Tikhonov regularization, a reduced-complexity optimal modified sphere decoding scheme is provided in [36] by exploiting the sparse structure of the SCMA codebook. The authors in [37] put forward a novel low complexity solution for SCMA detection by adopting an appropriate parameter to narrow down the range of believable superposed constellation points. By sorting the channel matrix and computing a non-zero low bound before searching [38], the proposed modified single tree search-based SCMA detection scheme has lower computational complexity but achieves nearly the same BER performance as compared to the original MPA. However, the above mentioned sphere-decoding-based detectors can only be applied to SCMA with a certain structure of constellations. To address this issue, an improved sphere decoding scheme for SCMA has been provided, and this can serve any arbitrary regular or irregular constellations with the same BER performance as an optimal maximum likelihood detector [39]. Efforts to address the integration of SCMA with other physical techniques, such as multiple-input multiple-output, orthogonal time frequency space, and satellite communications, can be found in [40,41,42,43,44].
Despite many solutions for floating-point SCMA detectors, this paradigm has just emerged for a fixed-point SCMA system [45,46,47], which is more practical for hardware design and implementation. The pioneering work in [45] designs a unified quantization scheme independent of signal-to-noise ratios where the resource nodes’ and variable nodes’ message exchanging are processed synchronously to converge faster. A low complexity attempt has been reported in [46] in the sense that domain changing, probability approximation, early termination, adaptive decoding, and initial noise reduction are employed for SCMA detection, which generates the deterministic message passing algorithm. Moreover, a row-layered message passing algorithm has been provided in [47], which offers a good trade-off between the hardware implementation and BER performance. However, the above structures only consider the uniform quantization strategy, which suffers high complexity or BER degradation in implementations. In particular, the quantization precision is relatively high in order to achieve considerable BER performance; otherwise, the BER suffers a large degradation when using low quantization precision.
To this end, we propose a new quasi-uniform quantizer for the SCMA system instead of the standard uniform one. This quasi-uniform quantizer can efficiently increase the dynamic range of messages and improve the BER performance under the same quantization precision without additional complexity in symbol detection. In other words, the quasi-uniform quantizer can achieve the same BER performance as the uniform one with less quantization bits. The main contributions of this paper are summarized as follows:
  • The Sub-log MPA is considered in order to accelerate the convergence of conventional Max-log MPA by splitting the factor graph into two parts and utilizing the latest updating messages at the current iteration.
  • Instead of the additive white Gaussian noise (AWGN) channel considered in [45,46,47], we investigate a more general Rayleigh fading channel to describe the standard uniform quantizer.
  • To improve the BER performance of SCMA systems, a new quasi-uniform quantizer is formulated without increasing the decoding complexity compared to the traditional one. To the best of our knowledge, this is the first attempt to apply the non-uniform quantizer to the SCMA system.
  • Simulation results confirm the validity of our proposed quasi-uniform quantizer, which can significantly reduce the computational complexity to achieve the same BER as the standard one; in other words, it can improve the BER performance as compared to the uniform quantizer by using identical quantization bits.
The rest of the paper is organized as follows. Section 2 introduces the system model for SCMA systems and the conventional log-domain MPA detector. In Section 3, we propose a quasi-uniform quantizer to overcome the limitations of the traditional uniform one. Numerical results are provided in Section 4, followed by conclusions in Section 5.

2. System Model

In this section, we first briefly introduce the model of the SCMA system and then describe the framework of the conventional MPA decoder.

2.1. SCMA System Description

We consider a typical downlink SCMA system with K orthogonal resource nodes (RNs), where J randomly distributed users are served by a base station. In general, the SCMA system works in a overloaded manner to achieve better spectral efficiency, and the overloading factor is defined as λ = J / K > 1 . A unique codebook with cardinality M is assigned to each user. At the SCMA modulator, the information bits of the j-th user are sequentially mapped into K-dimensional complex-valued codewords x j = [ x 1 , j , x 2 , j , , x K , j ] T . Specifically, this codeword x j is sparse with d v < K nonzero elements, which enables MPA detection for SCMA. In the transmitter, the codeworks x j , where j = 1 , 2 , , J , from all the J users are superimposed and propagate into the air interface. In this way, the received signal y j = [ y 1 , j , y 2 , j , , y K , j ] T at the j-th user can be described as [48]
y j = diag ( h j ) i = 1 J x i + n j ,
where h j = [ h 1 , j , h 2 , j , , h K , j ] T represents the channel gain vector between the base station and the j-th user, diag ( h j ) refers to the diagonal matrix, with the elements in the first diagonal being the components present in h j , and n j = [ n 1 , j , n 2 , j , , n K , j ] T is the Gaussian noise vector with its elements being modeled as independent and identically distributed CN ( 0 , σ 2 ) . Thanks to the sparsity of codewords, the sparse structure of SCMA can be represented by a K × J binary indicator matrix F . The element f k , j corresponds to the k-th row and j-th column of F , and f k , j = 1 if and only if the k-th RN is connected to the j-th variable node (VN). In the matrix F , there are d v and d c nonzero elements in each row and column, corresponding to the the number of RNs multiplexed by each VN and the number of VNs accessing each RN. In this sense, we define two sets
R j = { k | f k , j = 1 } , j = 1 , 2 , , J ,
and
V k = { j | f k , j = 1 } , k = 1 , 2 , , K ,
to denote the set of RNs occupied by the j-th VN and the set of VNs collided over the k-th RN. In this work, two typical indicator matrices for the SCMA system are considered, which support J = 6 and J = 10 users, respectively, given by [48]
F 4 × 6 = 1 1 1 0 0 0 1 0 0 1 1 0 0 1 0 1 0 1 0 0 1 0 1 1 ,
and
F 5 × 10 = 1 1 1 1 0 0 0 0 0 0 1 0 0 0 1 1 1 0 0 0 0 1 0 0 1 0 0 1 1 0 0 0 1 0 0 1 0 1 0 1 0 0 0 1 0 0 1 0 1 1 .
The overloading factor of F 4 × 6 and F 5 × 10 are λ = 150 % and λ = 200 % , respectively. The weights of each column and each row of F 4 × 6 are d v = 2 and d c = 3 , while each VN’s degree and each FN’s degree are d v = 2 and d c = 4 for F 5 × 10 , respectively. The factor graph to visualize the SCMA configuration in (5) is depicted in Figure 1.

2.2. Conventional Log-MPA

The computational load of the conventional MPA probability domain involves a great amount of exponentiation calculation and high storage burden, which limits its implementation in hardware design. To this end, the log domain MPA has been introduced to translate the exponentiation into addition, referred as Log-MPA. This Log-MPA is a bipartite factor-graph-based iterative procedure by exchanging the codeword likelihood messages between variable nodes and resource nodes to achieve a near optimal performance. By defining R j k t and V k j t as the belief propagated to the k-th resource node from the j-th variable node and the belief propagated to the j-th variable node from the k-th resource node at the t-th iteration, respectively, the procedure of standard Log-MPA can be described as follows [31].
(1) Initialization: Set t = 1 and the maximum iteration number T. The normalized a priori log-likelihood probability of each j-th user’s codeword is assumed to be equal, i.e., R j k 0 = log 1 / M . Initialize the log-domain conditional probability of different codeword combinations for the j-th user as
P k , j ( x ) = 1 2 σ 2 y k , j h k , j m V k x k , m 2 ,
where x = { x m } , m V k .
(2) Resource Node Updating: The belief propagated to the j-th variable node from the k-th resource node at the t-th iteration can be calculated as
V k j t ( x j ) = max x u : u V k j * P k , j ( x ) + u V k j R u k t 1 ( x u ) ,
where V k j represents the d c 1 VNs associating with the k-th RN with the j-th VN excluded, and
max * ( a 1 , a 2 , , a n ) = ln ( e a 1 + e a 2 + + e a n ) .
(3) Variable Node Updating: Resource nodes transmit the updated information obtained from extrinsic information to their neighboring variable nodes, given by
R j k t ( x j ) = m R j k V m j t 1 ( x j ) ,
where R j k represents the d v 1 RNs associating with the k-th VN with the j-th RN excluded.
(4) Probability Calculating and Symbol Judging: When the maximum number of iterations is reached, the final probabilities of each codeword for each user are output. The final probabilities of codeword x j for VN j are the sum of all the messages from its neighboring RNs, which can be computed as
R j ( x j ) = m R j V m j T ( x j ) .
The final estimated transmit codeword x j ^ of user j is the one which maximizes R j ( x j ) .

3. Proposed Quasi-Uniform Quantizer for SCMA System

In this section, we first present the Max-log MPA detector by utilizing the Jacobi formula. The sub-factor-graph-based Max-log MPA scheme (Sub-log MPA) is then introduced by splitting the factor graph into two parts to accelerate its convergence. Next, we describe the standard uniform quantizer for the SCMA system. Finally, the quasi-uniform quantizer is proposed to enhance the range and precision of the quantized messages during iteration.

3.1. Max-Log MPA Detector for the SCMA System

Observe (7), it is obvious that the computational complexity of Log-MPA mainly lies in the exponential operation within max * ( · ) in the VN message updating. Note that
max * { a 1 , a 2 } = ln ( e a 1 + e a 2 ) = max { a 1 , a 2 } + ln ( 1 + e | a 1 a 2 | ) ,
where max { · } is the maximum operation, ln ( 1 + e | a 1 a 2 | ) is the correction element, and this element can be eliminated. For the case with more than two numbers, by recursively applying this equation, the Jacobian approximation [49,50] can be obtained as
max * { a 1 , a 2 , , a n } max { a 1 , a 2 , , a n } .
By using the Jacobian approximation above, the resource node updating in (7) can be simplified as [31]
V k j t ( x j ) max x u : u V k j P k , j ( x ) + u V k j R u k t 1 ( x u ) .
In this sense, we achieve the low complexity implementation of Max-log MPA for SCMA detection.

3.2. Sub-Log MPA Detector for the SCMA System

As discussed above, Max-log MPA can avoid exponent calculation compared to the conventional probability domain MPA, which significantly reduces the computational cost and makes the hardware implementation feasible. However, the number of iterations required to achieve convergence in Max-log MPA is relatively large, which limits the hardware performance and makes the decoding latency high. Moreover, based on (9) and (13), it is obvious that both the RN and VN message exchanging at the i-th iteration use the probabilities obtained from the i 1 -th iteration. However, the latest probabilities from the current iteration’s updating of the VNs can be immediately utilized to take part in the message propagation of the remaining RNs. In this way, it utilizes more reliable probabilities in the message iteration than the Max-Log algorithm at the same iteration, which can efficiently accelerate the convergence behavior. To achieve this, the indicator matrix can be divided into two parts, where the first part only uses the probabilities obtained from the i 1 -th iteration, while the second part can immediately use the more reliable probabilities in the current iteration from the first part. This operation reduces the switch between the RN and VN message propagation, and subsequently decreases the difficulty of hardware design. As depicted in Figure 2, the indicator matrix F 5 × 10 can be divided into F 5 × 10 1 and F 5 × 10 2 , and the sub factor graph are also illustrated. In this way, the message exchanging between RNs and VNs at the i-th iteration can be split into two steps, corresponding to the F 5 × 10 1 and F 5 × 10 2 , respectively. The first step to conduct RN and VN updating at the i-th iteration can be formulated as
V k j t ( x j ) = max x u : u V k j , j [ 1 , J / 2 ] P k , j ( x ) + u V k j R u k t 1 ( x u ) , j [ 1 , J / 2 ] ,
and
R j k t ( x j ) = m R j k V m j t 1 ( x j ) , j [ 1 , J / 2 ] .
The probabilities corresponding to the remaining variable nodes of the second factor graph are then updated as
V k j t ( x j ) = max x u : u V k j , j [ J / 2 + 1 , J ] P k , j ( x ) + u V k j R u k t 1 ( x u ) , j [ J / 2 + 1 , J ] ,
and
R j k t ( x j ) = m R j k V m j t 1 ( x j ) , j [ J / 2 + 1 , J ] .
The implementation of the proposed Sub-log MPA detector for the SCMA system is summarized in Algorithm 1. Note that, different from the parallel and serial schedules adopted in [29], where all the nodes pass new messages to their neighbors, this Sub-log MPA detector only exchanges the new messages to the second sub factor graph, which is more effective in hardware design by exchanging the probabilities among the two sub factor graphs.
Algorithm 1: The iterative implementation of Sub-log MPA
Input: y j , h j , σ 2 , T
  1
Initialization
  2
Initialize the log-domain conditional probability of different codeword
  combinations for the j-th user as (6).
  3
Iteration
  4
for  t = 1 : T  do
  5
      Conduct RN and VN updating at the i-th iteration for the first sub factor graph
        according to (14) and (15)
  6
      Update the probabilities corresponding to the remaining variable nodes
        according to (16) and (17).
  7
end (
  8
Probability Calculation
  9
for  j = 1 : J  do (
10
      When the maximum number of iterations T is reached, the final probabilities of
        each codeword for each user are computed according to (10).
11
end (

3.3. Complexity Analysis

From the above discussion, it is obvious that the difference between the original Log-MPA and the Max-log MPA lies on the resource node updating, i.e., Equations (8) and (12). It is straightforward that the message exchange in (8) consists of a large number of exponential and logarithmic operations, while the RN updating in (12) only contains a comparison operation, which significantly reduces the computational cost of the original SCMA detector. On the other hand, the computational complexity of the Max-log MPA is identical to that of the Sub-log MPA in each iteration. However, the Sub-log MPA in Section 3.2 needs a lower number of iterations to converge due to its utilization of the latest updating messages in the current iteration, which subsequently reduces the computational cost of the Max-log MPA. Based on (14) and (16), it is clear that the storage overhead of the Sub-log MPA is identical to that of the Max-log MPA.

3.4. The Standard Uniform Quantizer for SCMA

By defining the quantization step Δ , for a real number a, the quantizer can be described as
Q ( a , Δ ) = s i g n ( a ) Δ | a | Δ + 0.5 ,
where s i g n ( a ) determines the sign of a real number a and a outputs an integer not larger than a. It is obvious that the output of Q ( a , Δ ) in (18) obeys the form of l Δ , where l is an integer. For a q-bit standard uniform quantizer, the quantization results can be expressed as
Q ( a , Δ ) = L Δ , a ( L 0.5 ) Δ l Δ , ( l 0.5 ) Δ a < ( l + 0.5 ) Δ , 0 < l < L 0 , Δ / 2 < a < Δ / 2 l Δ , ( l 0.5 ) Δ < a ( l + 0.5 ) Δ , L < l < 0 L Δ , a L Δ + Δ / 2 ,
where L = 2 q 1 1 and its output alphabet contains 2 L + 1 = 2 q 1 number of elements, given by
{ L Δ , ( L + 1 ) Δ , , Δ , 0 , Δ , , ( L 1 ) Δ , L Δ } .
Note that the q binary bits are composed of (q − 1) bits to apply binary representation and one sign bit with a value of 0 when l is positive, otherwise with a value of 1.

3.5. The Proposed Quasi-Uniform Quantizer for SCMA

In the aforementioned standard uniform quantizer, there are two approaches to enhance the performance of the SCMA detector. One is to increase the quantization precision without changing the quantization step Δ , i.e., increase the value of q, which put forward higher requirements for the hardware implementation. Another method is to increase the quantization step Δ , which can expand the range of quantized probabilities, which scarifies the precision in application. To solve these problems, we aim to design a quasi-uniform quantizer that can handle the conditions below.
  • A large dynamic range of the probabilities is allowed.
  • The quantization precision is less than the standard uniform quantizer; i.e., the quasi-uniform quantizer can achieve the same BER performance as the standard uniform quantizer with less quantized bits.
  • The hardware implementation complexity can be controlled; in fact, the proposed quasi-uniform quantizer has the same hardware implementation complexity as the standard uniform one. The difference between the quasi-uniform and uniform quantizers lies in the quantization thresholds, i.e., the quantization thresholds of the uniform quantizer is uniformly distributed, while it becomes non-uniformly distributed for the quasi-uniform quantizer.
To this end, we propose a quasi-uniform quantizer for SCMA detection, where the uniform quantization role is adopted at the low region of the probabilities and the nonuniform quantizer is applied at the high region of the messages. To describe this quantizer, we call it the q + 1 -bit quasi-uniform quantizer. Specifically, for the input values μ L Δ < a < μ L Δ , the uniform quantizer in (19) is used, while for the values in the intervals ( , μ L Δ ] and [ μ L Δ , + ) , the outputs of this quasi-uniform quantizer are in the form of ± μ m L Δ , i.e., the corresponding intervals increase exponentially in length with growth rate μ . Note that 1 m L + 1 ; that is to say, there are 2 ( L + 1 ) = 2 q values in the form of μ m L Δ , which can expand the range of the quantized probabilities efficiently. In this way, the q + 1 -bit quasi-uniform quantizer can be defined as follows.
Q n ( a , Δ ) = μ L + 1 L Δ , a μ L + 1 L Δ , μ m L Δ , μ m L Δ a < μ m + 1 L Δ , 1 m L L Δ , ( L 0.5 ) Δ a < μ L Δ l Δ , ( l 0.5 ) Δ a < ( l + 0.5 ) Δ , 0 < l < L 0 , Δ / 2 < a < Δ / 2 l Δ , ( l 0.5 ) Δ < a ( l + 0.5 ) Δ , L < l < 0 L Δ , a L Δ + Δ / 2 μ m L Δ , μ m + 1 L Δ < a μ m L Δ , 1 m L μ L + 1 L Δ , a μ L + 1 L Δ
Note that the q + 1 binary bits are composed of q bits to apply binary representation and one sign bit. For a comprehensive treatment of the qusi-uniform quantizer, the example of ( 4 + 1 ) -bit quasi-uniform quantization with Δ = 0.5 , q = 3 , μ = 2 is shown in Table 1. To simplify the representation, only non-negative inputs are considered in Table 1, where the first bit is the sign bit. Based on Table 1, the proposed ( 4 + 1 ) -bit quasi-uniform quantizer operates the same as the 4-bit uniform quantizer in the interval [ 0 , 8 ) , while it works in the exponentially increasing way when a 8 .

4. Simulation Results

In this section, we provide the BER performance of different SCMA detectors and different quantized bits under various signal-to-noise ratios (SNRs). Both the additive white Gaussian noise (AWGN) and Rayleigh channels are investigated. In our simulations, two factor graphs are considered, and the corresponding index matrices, F 4 × 6 and F 5 × 10 , are given in (4) and (5), respectively. The channel gain h j was modeled as an independently and identically distributed circularly symmetric complex-valued Gaussian random vector with zero mean and covariance σ 2 I .

4.1. BER Evolution for AWGN Channel

In this subsection, we examine the validity of our proposed quasi-uniform quantizer for the SCMA system over the AWGN channel. In Figure 3, the bit error ratio (BER) performance of different SCMA detectors under the AWGN channel was observed for K = 4 and K = 5 , respectively. The steps of the Sub-log MPA detector have been summarized in Algorithm 1, and the iteration number is set to 10. It is obvious that the BER performance gap between the original Log-MPA and the Max-log MPA can be neglected, but the Max-log MPA can achieve less computational complexity, which is essential to practical implementation. Note that the curve of the Sub-log MPA is overlapped with the Max-log MPA in bot cases, which in return verifies the effectiveness of the proposed Sub-log MPA.
In the next stage, the convergence behavior of different SCMA detectors is shown in Figure 4 and Figure 5 for K = 4 , J = 6 and K = 5 , J = 10 , respectively, over the AWGN channel in the context of different SNRs. For the case of K = 4 , SNR = 6 dB and SNR = 10 dB are taken into account, while SNR = 8 dB and SNR = 12 dB are considered. Based on Figure 4 and Figure 5, it is obvious that both the original Log-MPA and the Max-log MPA need six iterations to converge, while only four iterations are enough for the Sub-log MPA. This is because the Sub-log MPA uses the latest updating message in the current iteration to exchange probabilities.
In the last set of simulations, we investigated the BER performance of different quantized schemes under the AWGN channel for K = 4 and K = 5 , as shown in Figure 6 and Figure 7, respectively, in terms of the Max-log MPA detector. The parameters of the quasi-uniform quantizer were set to Δ = 0.25 and μ = 1.3 . The uniform and quasi-uniform quantizer were obtained according to Equations (19) and (21). Based on Figure 6 and Figure 7, it is obvious that the BER performance suffers great degradation when the 4-bit, 5-bit, and 6-bit quantizers were considered. This is because the range of quantized messages is limited with the fixed step size Δ . Notably, the 8-bit uniform quantization of the messages can achieve almost the same BER performance as compared to the floating Max-log MPA, while the (5 + 1)-bit quasi-uniform quantization have nearly the same BER performance as that of the 8-bit uniform quantization. Moreover, the BER performance of the (5 + 1)-bit quasi-uniform quantizer under the AWGN channel for K = 4 and the Max-log MPA detector, under different combinations of Δ and μ , was investigated in Figure 8. Figure 8 shows that it achieves better BER performance when Δ = 0.25 and μ = 1.3 , as compared to other cases. In general, the values of Δ and μ should be selected according to the simulation results when the number of J and K becomes larger. All the simulations above verify the robustness of our proposed quasi-uniform quantizer.

4.2. Ber Evolution for the Rayleigh Channel

In this subsection, numerical results were conducted for different SCMA detectors for the Rayleigh channel. Figure 9 illustrated the BER performance of different SCMA detectors under the Rayleigh channel for K = 4 and K = 5 , respectively. The effectiveness of the Max-log MPA and Sub-log MPA can be observed. Specifically, the BER curves of Max-log MPA and Sub-log MPA are overlapped, and their robust performance can be inferred from a close match to the original Log-MPA detector. Next, we investigated the convergence behavior of different SCMA detectors for the Rayleigh channel in Figure 10 and Figure 11 in terms of K = 4 and K = 5 , respectively. It can observed that the Sub-log MPA only needs four iterations to converge, while six are needed both in the Log-MPA and Max-log MPA schemes.
We also compared the BER performance of different quantized schemes under the Rayleigh channel for K = 4 and K = 5 in Figure 12 and Figure 13, respectively, in terms of the Max-log MPA detector. The 4-bit, 5-bit, 6-bit, 7-bit, and 8-bit uniform quantization schemes were considered, where the 8-bit case can achieve nearly the same BER performance as compared to the original Log-MPA. An important observation is that the (5 + 1)-bit quasi-uniform quantization has almost the same BER performance as the 8-bit uniform quantization scheme, which makes the proposed quasi-uniform quantizer more suitable for practical implementation.

5. Conclusions

This work proposes the Sub-log MPA detector for the SCMA system by using the latest probabilities at the current iteration to update the messages of the remaining nodes, which reduces both the number of iterations to converge and the cost of hardware design. Next, we describe the conventional uniform quantizer for the SCMA system, whose range of the probabilities is limited. To address this problem, we propose a novel quasi-uniform quantizer, which can effectively extend the dynamic range of the quantizer without modifying the RN and the VN message exchange steps. Simulation results confirmed the robustness of the proposed Sub-log MPA detector and the quasi-uniform quantizer for both the AWGN and Rayleigh channels. Future works may focus on more practical issues such as the quantization of multiple-input multiple-output SCMA and low-density parity-check-coded SCMA systems.

Author Contributions

Conceptualization, H.C., M.Z. and R.S.; methodology, H.C.; writing-original draft preparation, H.C.; writing-review and editing, H.C., M.Z. and R.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by the National Natural Science Foundation of China under Grants 62301271 and 62401290, the open research fund of the National Mobile Communications Research Laboratory, Southeast University (No. 2025D13), and the Natural Science Research Start-up Foundation of Recruiting Talents of Nanjing University of Posts and Telecommunications under Grants No. NY222083 and No. NY222082.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Wang, C.; You, X.; Gao, X.; Zhu, X.; Li, Z.; Zhang, C.; Wang, H.; Huang, Y.; Chen, Y.; Haas, H.; et al. On the Road to 6G: Visions, Requirements, Key Technologies, and Testbeds. IEEE Commun. Surv. Tuts. 2023, 25, 905–974. [Google Scholar] [CrossRef]
  2. Chafii, M.; Bariah, L.; Muhaidat, S.; Debbah, M. Twelve Scientific Challenges for 6G: Rethinking the Foundations of Communications Theory. IEEE Commun. Surv. Tuts. 2023, 25, 868–904. [Google Scholar] [CrossRef]
  3. Atzori, L.; Iera, A.; Morabito, G. The Internet of Things: A survey. Comput. Netw. 2010, 54, 2787–2805. [Google Scholar] [CrossRef]
  4. Zanella, A.; Bui, N.; Castellani, A.; Vangelista, L.; Zorzi, M. Internet of Things for smart cities. IEEE Internet Things J. 2014, 1, 22–32. [Google Scholar] [CrossRef]
  5. Zhong, Y.; Dutkiewicz, E.; Yang, Y.; Zhu, X.; Zhou, Z.; Jiang, T. Internet of mission-critical things: Human and animal classification-A device-free sensing approach. IEEE Internet Things J. 2018, 5, 3369–3377. [Google Scholar] [CrossRef]
  6. Ji, B.; Zhang, X.; Mumtaz, S.; Han, C.; Li, C.; Wen, H.; Wang, D. Survey on the internet of vehicles: Network architectures and applications. IEEE Commun. Stand. Mag. 2020, 4, 34–41. [Google Scholar] [CrossRef]
  7. Al-Dulaimi, O.M.K.; Al-Dulaimi, A.M.K.; Alexandra, M.O.; Al-Dulaimi, M.K.H. Strategy for Non-Orthogonal Multiple Access and Performance in 5G and 6G Networks. Sensors 2023, 23, 1705. [Google Scholar] [CrossRef]
  8. Wang, D.; Wu, M.; He, Y.; Pang, L.; Xu, Q.; Zhang, R. An HAP and UAVs Collaboration Framework for Uplink Secure Rate Maximization in NOMA-Enabled IoT Networks. Remote Sens. 2022, 14, 4501. [Google Scholar] [CrossRef]
  9. Liu, Y.; Gao, H.; Cheng, H.; Xia, Y.; Pei, W. Outage Performance Analysis of Improper Gaussian Signaling for Two-User Downlink NOMA Systems with Imperfect Successive Interference Cancellation. Entropy 2023, 25, 1172. [Google Scholar] [CrossRef]
  10. Vidal-Beltrán, S.; López-Bonilla, J.L. Improving Spectral Efficiency in the SCMA Uplink Channel. Mathematics 2021, 9, 651. [Google Scholar] [CrossRef]
  11. Sultana, A.; Woungang, I.; Anpalagan, A.; Zhao, L.; Ferdouse, L. Efficient resource allocation in SCMA-enabled device-to-device communication for 5G networks. IEEE Trans. Veh. Technol. 2020, 69, 5343–5354. [Google Scholar] [CrossRef]
  12. Yu, L.; Liu, Z.; Wen, M.; Cai, D.; Dang, S.; Wang, Y.; Xiao, P. Sparse code multiple access for 6G wireless communication networks: Recent advances and future directions. IEEE Commun. Stand. Mag. 2021, 5, 92–99. [Google Scholar] [CrossRef]
  13. Islam, S.M.R.; Avazov, N.; Dobre, O.A.; Kwak, K. Power-domain non-orthogonal multiple access (NOMA) in 5G systems: Potentials and challenges. IEEE Commun. Surv. Tut. 2017, 19, 721–742. [Google Scholar] [CrossRef]
  14. Wang, P.; Ye, N.; Li, J.; Di, B.; Wang, A. Asynchronous Multi-User Detection for Code-Domain NOMA: Expectation Propagation Over 3D Factor-Graph. IEEE Trans. Veh. Technol. 2022, 71, 10770–10781. [Google Scholar] [CrossRef]
  15. Nikopour, H.; Baligh, H. Sparse code multiple access. In Proceedings of the 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), London, UK, 8–11 September 2013. [Google Scholar]
  16. Wei, F.; Chen, W.; Wu, Y.; Ma, J.; Tsiftsis, T.A. Message-passing receiver design for joint channel estimation and data decoding in uplink grant-free SCMAsystems. IEEE Trans. Wirel. Commun. 2019, 18, 167–181. [Google Scholar] [CrossRef]
  17. Bao, J.; Ma, Z.; Xiao, M.; Ding, Z.; Zhu, Z. Performance analysis of uplink SCMA with receiver diversity and randomly deployed users. IEEE Trans. Veh. Technol. 2018, 67, 2792–2797. [Google Scholar] [CrossRef]
  18. Moltafet, M.; Yamchi, N.M.; Javan, M.R.; Azmi, P. Comparison study between PD-NOMA and SCMA. IEEE Trans. Veh. Technol. 2018, 67, 1830–1834. [Google Scholar] [CrossRef]
  19. Dai, L.; Wang, B.; Yuan, Y.; Han, S.; Chih-lin, I.; Wang, Z. Non-orthogonal multiple access for 5G: Solutions, challenges, opportunities, and future research trends. IEEE Commun. Mag. 2015, 53, 74–81. [Google Scholar] [CrossRef]
  20. Li, S.; Feng, Y.; Sun, Y.; Xia, Z. A Low-Complexity Detector for Uplink SCMA by Exploiting Dynamical Superior User Removal Algorithm. Electronics 2022, 11, 1020. [Google Scholar] [CrossRef]
  21. Ye, N.; Miao, S.; Pan, J.; Xiang, Y.; Mumtaz, S. Dancing With Chains: Spaceborne Distributed Multi-User Detection Under Inter-Satellite Link Constraints. IEEE J. Sel. Top. Signal Process. 2025, 19, 430–446. [Google Scholar] [CrossRef]
  22. Luo, Q.; Gao, P.; Liu, Z.; Xiao, L.; Mheich, Z.; Xiao, P. An error rate comparison of power domain non-orthogonal multiple access and sparse code multiple access. IEEE Open J. Commun. Soc. 2021, 2, 500–511. [Google Scholar] [CrossRef]
  23. Yang, L.; Liu, Y.; Siu, Y. Low Complexity Message Passing Algorithm for SCMA System. IEEE Commun. Lett. 2016, 20, 2466–2469. [Google Scholar] [CrossRef]
  24. Mu, H.; Ma, Z.; Alhaji, M.; Fan, P.; Chen, D. A Fixed Low Complexity Message Pass Algorithm Detector for Up-Link SCMA System. IEEE Wirel. Commun. Lett. 2015, 4, 585–588. [Google Scholar] [CrossRef]
  25. Jia, M.; Wang, L.; Guo, Q.; Gu, X.; Xiang, W. A Low Complexity Detection Algorithm for Fixed Up-Link SCMA System in Mission Critical Scenario. IEEE Internet Things J. 2018, 5, 3289–3298. [Google Scholar] [CrossRef]
  26. Du, Y.; Dong, B.; Chen, Z.; Fang, J.; Yang, L. Shuffled Multiuser Detection Schemes for Uplink Sparse Code Multiple Access Systems. IEEE Commun. Lett. 2016, 20, 1231–1234. [Google Scholar] [CrossRef]
  27. Du, Y.; Dong, B.; Chen, Z.; Fang, J.; Wang, X. A Fast Convergence Multiuser Detection Scheme for Uplink SCMA Systems. IEEE Wirel. Commun. Lett. 2016, 25, 388–391. [Google Scholar] [CrossRef]
  28. Du, Y.; Dong, B.; Chen, Z.; Wang, X.; Gao, P. Improved Serial Scheduling-Based Detection for Sparse Code Multiple Access Systems. IEEE Wirel. Commun. Lett. 2017, 6, 570–573. [Google Scholar] [CrossRef]
  29. Du, Y.; Dong, B.; Chen, Z.; Gao, P.; Fang, J. Joint Sparse Graph-Detector Design for Downlink MIMO-SCMA Systems. IEEE Wirel. Commun. Lett. 2017, 6, 14–17. [Google Scholar] [CrossRef]
  30. Dai, J.; Niu, K.; Dong, C.; Lin, J. Scaling Factor Aided Iterative Multiuser Receiver for Sparse Code Multiple Access. IEEE Commun. Lett. 2017, 21, 1273–1276. [Google Scholar] [CrossRef]
  31. Dai, J.; Niu, K.; Dong, C.; Lin, J. Improved Message Passing Algorithms for Sparse Code Multiple Access. IEEE Trans. Veh. Technol. 2017, 66, 9986–9999. [Google Scholar] [CrossRef]
  32. Han, K.; Hu, J.; Chen, J.; Lu, H. A Low Complexity Sparse Code Multiple Access Detector Based on Stochastic Computing. IEEE Trans. Circuits Syst. I Reg. Papers 2018, 65, 769–782. [Google Scholar] [CrossRef]
  33. Yang, L.; Lin, X.; Ma, X.; Song, K. Clipping Noise-Aided Message Passing Algorithm for SCMA-OFDM System. IEEE Commun. Lett. 2018, 22, 2156–2159. [Google Scholar] [CrossRef]
  34. Cheng, H.; Zhang, M.; Zhang, C.; Zhang, H.; Huang, Y.; Wang, B. Low Complexity Message Passing Receiver Design for SCMA-GFDM System. IEEE Trans. Veh. Technol. 2024, 73, 18755–18768. [Google Scholar] [CrossRef]
  35. Wei, F.; Chen, W. Low Complexity Iterative Receiver Design for Sparse Code Multiple Access. IEEE Trans. Commun. 2017, 65, 621–634. [Google Scholar] [CrossRef]
  36. Vameghestahbanati, M.; Bedeer, E.; Marsland, I.; Gohary, R.H.; Yanikomeroglu, H. Enabling Sphere Decoding for SCMA. IEEE Commun. Lett. 2017, 21, 2750–2753. [Google Scholar] [CrossRef]
  37. Yang, L.; Ma, X.; Siu, Y. Low Complexity MPA Detector Based on Sphere Decoding for SCMA. IEEE Commun. Lett. 2017, 21, 1855–1858. [Google Scholar] [CrossRef]
  38. Li, L.; Wen, J.; Tang, X.; Tellambura, C. Modified Sphere Decoding for Sparse Code Multiple Access. IEEE Commun. Lett. 2018, 22, 1544–1547. [Google Scholar] [CrossRef]
  39. Vameghestahbanati, M.; Marsland, I.; Gohary, R.H.; Yanikomeroglu, H. A Novel SD-Based Detection for Generalized SCMA Constellations. IEEE Trans. Veh. Technol. 2019, 68, 10278–10282. [Google Scholar] [CrossRef]
  40. Cheng, H.; Zhang, C.; Huang, Y.; Yang, L. Efficient Message Passing Receivers for Downlink MIMO-SCMA Systems. IEEE Trans. Veh. Technol. 2022, 71, 5073–5086. [Google Scholar] [CrossRef]
  41. Liu, Y.; Zhang, C.; Hu, J.; Chen, J.; Yang, K. Low-Complexity MIMO-SCMA Detection for LEO Satellite Communications. IEEE Trans. Veh. Technol. 2025, 74, 5253–5258. [Google Scholar] [CrossRef]
  42. Deka, K.; Thomas, A.; Sharma, S. OTFS-SCMA: A Code-Domain NOMA Approach for Orthogonal Time Frequency Space Modulation. IEEE Trans. Commun. 2021, 69, 5043–5058. [Google Scholar] [CrossRef]
  43. Li, Q.; Liu, G.; Zhao, Y.; Liu, C.; Xu, F. Deep Learning-Based Downlink OTFS-SCMA. IEEE Wirel. Commun. Lett. 2024, 13, 3434–3438. [Google Scholar] [CrossRef]
  44. Zhao, L.; Wang, C.; Pang, M.; Wang, W.; Wang, W.; Jiang, F.; Xu, L. A Novel Spherical Codebook Design for Uplink SCMA in Satellite Communications. In Proceedings of the 2024 IEEE 99th Vehicular Technology Conference (VTC2024-Spring), Singapore, 24–27 June 2024. [Google Scholar]
  45. Wu, Y.; Dai, J.; Niu, K.; Dong, C.; Bian, X. Hardware Design and Implementation of Sparse Code Multiple Access. In Proceedings of the 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall), Toronto, ON, Canada, 24–27 September 2017. [Google Scholar]
  46. Zhang, C.; Yang, C.; Pang, X.; Song, W.; Xu, W.; Zhang, S.; Zhang, Z.; You, X. Efficient Sparse Code Multiple Access Decoder Based on Deterministic Message Passing Algorithm. IEEE Trans. Veh. Technol. 2020, 69, 3562–3574. [Google Scholar] [CrossRef]
  47. Pang, X.; Song, W.; Shen, Y.; You, X.; Zhang, C. Efficient Row-Layered Decoder for Sparse Code Multiple Access. IEEE Trans. Circuits Syst. I Reg. Papers 2021, 68, 3495–3507. [Google Scholar] [CrossRef]
  48. Li, X.; Gao, Z.; Gui, Y.; Liu, Z.; Xiao, P.; Yu, L. Design of Power-Imbalanced SCMA Codebook. IEEE Trans. Veh. Technol. 2022, 71, 2140–2145. [Google Scholar] [CrossRef]
  49. Robertson, P.; Villebrun, E.; Hoeher, P. A comparison of optimal and sub-optimal MAP decoding algorithms operating in the log domain. In Proceedings of the 1995 IEEE International Conference on Communications (ICC), Seattle, WA, USA, 18–22 June 1995. [Google Scholar]
  50. Chen, J.; Dholakia, A.; Eleftheriou, E.; Fossorier, M.P.C.; Hu, X.-Y. Reduced-complexity decoding of LDPC codes. IEEE Trans. Commun. 2005, 53, 1288–1299. [Google Scholar] [CrossRef]
Figure 1. The SCMA factor graph for K = 5 and J = 10 .
Figure 1. The SCMA factor graph for K = 5 and J = 10 .
Sensors 25 03098 g001
Figure 2. The SCMA sub factor graph for K = 5 and J = 10 .
Figure 2. The SCMA sub factor graph for K = 5 and J = 10 .
Sensors 25 03098 g002
Figure 3. The BER performance of different SCMA detectors under the AWGN channel for K = 4 and K = 5 , respectively.
Figure 3. The BER performance of different SCMA detectors under the AWGN channel for K = 4 and K = 5 , respectively.
Sensors 25 03098 g003
Figure 4. The convergence behavior of different SCMA detectors under the AWGN channel for K = 4 .
Figure 4. The convergence behavior of different SCMA detectors under the AWGN channel for K = 4 .
Sensors 25 03098 g004
Figure 5. The convergence behavior of different SCMA detectors under the AWGN channel for K = 5 .
Figure 5. The convergence behavior of different SCMA detectors under the AWGN channel for K = 5 .
Sensors 25 03098 g005
Figure 6. The BER performance of different quantized schemes under the AWGN channel for K = 4 and the Max-log MPA detector.
Figure 6. The BER performance of different quantized schemes under the AWGN channel for K = 4 and the Max-log MPA detector.
Sensors 25 03098 g006
Figure 7. The BER performance of different quantized schemes under the AWGN channel for K = 5 and the Max-log MPA detector.
Figure 7. The BER performance of different quantized schemes under the AWGN channel for K = 5 and the Max-log MPA detector.
Sensors 25 03098 g007
Figure 8. The BER performance of the (5+1)-bit quasi-uniform quantizer under the AWGN channel for K = 4 and the Max-log MPA detector, under different combinations of Δ and μ .
Figure 8. The BER performance of the (5+1)-bit quasi-uniform quantizer under the AWGN channel for K = 4 and the Max-log MPA detector, under different combinations of Δ and μ .
Sensors 25 03098 g008
Figure 9. The BER performance of different SCMA detectors under the Rayleigh channel for K = 4 and K = 5 , respectively.
Figure 9. The BER performance of different SCMA detectors under the Rayleigh channel for K = 4 and K = 5 , respectively.
Sensors 25 03098 g009
Figure 10. The convergence behavior of different SCMA detectors under the Rayleigh channel for K = 4 .
Figure 10. The convergence behavior of different SCMA detectors under the Rayleigh channel for K = 4 .
Sensors 25 03098 g010
Figure 11. The convergence behavior of different SCMA detectors under the Rayleigh channel for K = 5 .
Figure 11. The convergence behavior of different SCMA detectors under the Rayleigh channel for K = 5 .
Sensors 25 03098 g011
Figure 12. The BER performance of different quantized schemes under the Rayleigh channel for K = 4 and the Max-log MPA detector.
Figure 12. The BER performance of different quantized schemes under the Rayleigh channel for K = 4 and the Max-log MPA detector.
Sensors 25 03098 g012
Figure 13. The BER performance of different quantized schemes under the Rayleigh channel for K = 5 and the Max-log MPA detector.
Figure 13. The BER performance of different quantized schemes under the Rayleigh channel for K = 5 and the Max-log MPA detector.
Sensors 25 03098 g013
Table 1. ( 4 + 1 ) -bit qusi-uniform quantization with Δ = 0.5 , q = 3 , μ = 2 .
Table 1. ( 4 + 1 ) -bit qusi-uniform quantization with Δ = 0.5 , q = 3 , μ = 2 .
Input RangeQuantized Value (Decimal)Binary Form
[ 0 , 0.25 ) 000000
[ 0.25 , 0.75 ) 0.500001
[ 0.75 , 1.25 ) 100010
[ 1.25 , 1.75 ) 1.500011
[ 1.75 , 2.25 ) 200100
[ 2.25 , 2.75 ) 2.500101
[ 2.75 , 3.25 ) 300110
[ 3.25 , 3.75 ) 3.500111
[ 3.75 , 8 ) 401000
[ 8 , 16 ) 801001
[ 16 , 32 ) 1601010
[ 32 , 64 ) 3201011
[ 64 , 128 ) 6401100
[ 128 , 256 ) 12801101
[ 256 , 512 ) 25601110
[ 512 , + ) 51201111
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Cheng, H.; Zhang, M.; Su, R. An Efficient Quantized Message Passing Receiver Design for SCMA Systems. Sensors 2025, 25, 3098. https://doi.org/10.3390/s25103098

AMA Style

Cheng H, Zhang M, Su R. An Efficient Quantized Message Passing Receiver Design for SCMA Systems. Sensors. 2025; 25(10):3098. https://doi.org/10.3390/s25103098

Chicago/Turabian Style

Cheng, Hao, Min Zhang, and Ruoyu Su. 2025. "An Efficient Quantized Message Passing Receiver Design for SCMA Systems" Sensors 25, no. 10: 3098. https://doi.org/10.3390/s25103098

APA Style

Cheng, H., Zhang, M., & Su, R. (2025). An Efficient Quantized Message Passing Receiver Design for SCMA Systems. Sensors, 25(10), 3098. https://doi.org/10.3390/s25103098

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop