Next Article in Journal
Large Deflection Analysis of Axially Symmetric Deformation of Prestressed Circular Membranes under Uniform Lateral Loads
Previous Article in Journal
Computational Properties of General Indices on Random Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Reduced Complexity Detection of Narrowband Secondary Synchronization Signal for NB-IoT Communication Systems

Department of Computer Engineering, Sejong University, Gwangjin-gu, Gunja-dong 98, Seoul 05006, Korea
Symmetry 2020, 12(8), 1342; https://doi.org/10.3390/sym12081342
Submission received: 1 July 2020 / Revised: 27 July 2020 / Accepted: 6 August 2020 / Published: 11 August 2020
(This article belongs to the Section Computer)

Abstract

:
Narrowband Internet of Things is one of the most promising technologies to support low cost, massive connection, deep coverage, and low power consumption. In this paper, a computationally efficient narrowband secondary synchronization signal detection method is proposed in the narrowband Internet of Things system. By decoupling the detection of complementary sequence and Zadoff–Chu sequence that make up the synchronization signal sequence, the search space of narrowband secondary synchronization signal hypotheses is reduced. Such a design strategy along with the use of the symmetric property of synchronization signals allows reduced-complexity synchronization signal detection in the narrowband Internet of Things system. Both theoretical and simulation results are provided to verify the usefulness of the proposed detector. It is shown via simulation results that the complexity of the proposed detection method is significantly reduced while producing some performance degradation, compared to the conventional detection method.

1. Introduction

With the rapid growth of the Internet of Things (IoT) industry, Low-Power Wide-Area (LPWA) technologies become more and more popular [1]. Recently, cellular LPWA solutions, such as enhanced Long Term Evolution for Machine-Type Communication (LTE-MTC), Extended Coverage-Global System for Mobile communications for the IoT (EC GSM-IoT), and Narrowband IoT (NB-IoT), have been envisaged as a promising technology for existing and future cellular networks [2,3,4,5]. Due to the various advantages, such as low cost, massive connectivity, and high reliability, NB-IoT can be used in a variety of vertical industries [6,7]. NB-IoT is a new rapid-growing wireless technology, which is designed primarily targeting ultra-low-end IoT applications including home automation, smart health, smart factory, and smart environment that demand low cost, high reliability, and ultra-low power [8,9]. Therefore, low complexity of implementation, deployment, and maintenance is one of the most demanding aspects of NB-IoT User Equipments (UEs) so that they can be installed on a huge scale and even in a disposable manner [10].
During initial power-on, a UE has to perform a series of processes of attaining timing and frequency synchronization and acquiring Physical Cell ID (PCID) information [11,12,13,14]. The process of selecting the best serving enhanced base station (eNodeB) by a UE is called an initial cell search. In doing so, the UE monitors two special signals transmitted from the eNodeB: Narrowband Primary Synchronization Signal (NPSS) and Narrowband Secondary Synchronization Signal (NSSS). During initial cell search procedure, the UE has no information on the system timing and the local frequency of the UE is not yet synchronized to the network [12,13]. Furthermore, most NB-IoT devices are designed with low-cost crystal oscillators leading to Carrier Frequency Offset (CFO) of as much as 20 parts per million (ppm) [14]. Thus, there may be a relatively large offset in both time and frequency, and such an uncertainty can substantially deteriorate initial synchronization performance.

1.1. Related Works

For NB-IoT, the frequency and timing offsets are estimated and compensated by using the NPSS, while the PCID detection is performed by NSSS. To establish a connection with the eNodeB, a coarse synchronization is performed before extracting the Cyclic Prefix (CP) in the time domain. The CP is then removed and a Fast Fourier Transform (FFT) unit transforms the signal to the frequency domain, wherein a post-FFT synchronization is applied. In the pre-FFT stage, the auto-correlation and cross-correlation methods are widely used for initial synchronization [13,14,15,16]. Once initial time and frequency synchronization has been accomplished using the NPSS in the time domain, frequency-domain samples are generated from the FFT unit and then the UE attempts to acquire the PCID by detecting the NSSS in the frequency domain. If NSSS detection fails, a full frequency scan has to be restarted and it increases power consumption, eventually reducing a battery life of an NB-IoT terminal [13]. Therefore, NSSS detection is a challenging problem which has been intensively developed in the NB-IoT system [14,15,16,17]. The exhaustive Maximum Likelihood (ML) search-based method attains an optimal detection performance with high computational burden because it compares all the potential combinations of Zadoff–Chu (ZC) and complementary sequences with the received NSSS sequence [14]. To solve this issue, a number of NSSS detection methods were studied for the NB-IoT system [15,16]. These methods exploit the property that the complementary sequences consisting of the NSSS are binary-modulated signals. By using the property of binary complementary sequences and repeated nature of ZC sequences, these detection methods significantly reduce the number of complex multiplication operations, when compared to the ML approach [14]. This is due to the fact that it only reverses the polarity of the received NPSS samples. However, the simplified methods developed in [15,16] no longer takes advantage of NSSS properties despite reducing their computational complexity. When considering other arithmetic operations, the complexity of these detection methods is still high due to a large number of hypotheses. In practice, NB-IoT needs to compare 4032 possible NSSS candidates since the NSSS is generated by both PCIDs and radio frame numbers. Accordingly, NSSS detection represents an important task of initial cell search procedure in the NB-IoT communication system. Furthermore, NB-IoT UEs are intended to extend up to 10 years battery life in certain scenarios and thus reducing a computational complexity is of paramount importance [8].

1.2. Contributions

In this paper, a complexity-effective NSSS detection method is presented for the cellular NB-IoT communication system. The main contributions of this paper include the following:
  • By decoupling the detection of a ZC sequence and a binary complementary sequence, a multi-dimensional detection problem is reduced to several low-dimensional problems.
  • With such a strategy, the PCID is obtained by sequentially identifying both ZC sequence and complementary sequence, which contributes to reducing the computational processing load.
  • To confirm the feasibility of the proposed NSSS detector, the probability of detection failure is analytically derived in a flat fading channel. It is shown via simulation results that the analytical analysis is very accurate.
  • Using simulations, we demonstrate that the computational load of the proposed NSSS detector can be incredibly reduced at the expense of some performance degradation, compared to the conventional NSSS detector.
The structure of this paper is as follows. Section 2 introduces the signal model and synchronization signal in the NB-IoT system. In Section 3, the reduced-complexity NSSS detector is proposed and the detection performance is numerically evaluated. In Section 4, we present the simulation results to prove the usefulness of the presented NSSS detection scheme. In Section 5, we draw some conclusions of this paper.

2. System Model

In this section, we briefly address the synchronization signal, cell search procedure, and signal model in the NB-IoT system. Throughout this paper, we use ( · ) * , | · | , [ · ] 2 , { · } , arg { · } , E { · } , and · for complex conjugation, absolute value, square, real part, argument, expectation, and floor operation of the enclosed quantity, respectively. Denote ( x mod y ) to be the remainder of x / y . The notation x CN ( μ , σ 2 ) means that a random variable x follows a complex Gaussian Probability Density Function (PDF) with mean μ and variance σ 2 .

2.1. Signal Model

Consider an OFDM system employing N-point FFT. After taking an N-point Inverse FFT (IFFT) on the complex data symbols, a CP with length of N g is placed in the beginning of the time-domain symbol. Consequently, one OFDM symbol with time duration of N t T s is created, where T s is the sampling time instant and N t = N + N g . Accordingly, the time-domain samples during the l-th period are given by
x l ( q ) = k = 0 N 1 X l ( k ) e j 2 π k q / N
where q = N g , N g + 1 , , N 1 denotes the time-domain sample index, k is the frequency-domain subcarrier index, and X l ( k ) is the transmitted k-th subcarrier symbol with symbol energy E X = E { | X l ( k ) | 2 } .
The transmitted signal is passed through a frequency-selective multipath fading channel and is distorted by Additive White Gaussian Noise (AWGN). At the receiver, the CFO is caused by the mismatch between the local oscillators in transmitter and receiver. In this scenario, the q-th time-domain sample during the l-th symbol period y l ( q ) is represented as
y l ( q ) = e j 2 π l ( ϵ i + ϵ f ) N t / N e j 2 π ( ϵ i + ϵ f ) ( q θ ) / N h l ( q ) x l ( q θ ) + z l ( q ) , q = N g , N g + 1 , , N 1
where ϵ i is the Integer CFO (IFO) normalized by subcarrier spacing Δ f , ϵ f is the Fractional CFO (FFO) normalized by Δ f , θ is the integer-valued Symbol Timing Offset (STO), h l ( q ) is the complex channel gain, ⊗ is the linear convolution operator, and z l ( q ) is the zero-mean AWGN with variance σ z 2 . At the receiver, the CFO denoted by ϵ can be decomposed to an integer part and a fractional part, leading to ϵ = ϵ i + ϵ f . Throughout this paper, the notation x ^ stands for the estimated value of parameter x. During initial timing and frequency detection procedure, the STO estimate θ ^ and the CFO estimate ϵ ^ = ϵ ^ i + ϵ ^ f are estimated and recovered from the received signal [15,16]. After performing initial time and frequency synchronization, there remain Residual CFO (RFO) and Residual STO (RTO) denoted by ζ = ϵ ϵ ^ and τ = θ θ ^ , respectively. After removing the CP and taking the FFT operation, the FFT output at the k-th subcarrier during the l-th OFDM block is expressed as [18,19]:
Y l ( k ) H l ( k ) X l ( k ) e j 2 π k τ / N e j 2 π ζ ( l ρ 1 + ρ 2 ) + I l ( k ) + Z l ( k )
where ρ 1 = N t / N , ρ 2 = N g / N , H q ( k ) is the channel transfer function with variance σ H 2 , I l ( k ) is the Inter-Carrier Interference (ICI) contribution with variance σ I 2 E { | X q ( k ) | 2 } σ H 2 ζ 2 π 2 / 3 , and Z l ( k ) is the AWGN contribution with Z q ( k ) CN ( 0 , σ Z 2 ) .

2.2. Synchronization Signal

Figure 1 depicts the radio frame structure in the NB-IoT system. The NB-IoT radio frame in downlink composes 10 subframes with duration 10 ms, leading to 20 slots in a radio frame. As shown in Figure 1, there are two downlink synchronization signals, called the NPSS and the NSSS, which facilitate the UE to perform time-frequency estimation and synchronize to the NB-IoT network. To this end, the NPSS is sent periodically in subframe 5 in every 10 ms frame, while the NSSS is present in subframe number 9 in every even-numbered radio frame. During initial cell search procedure, the NPSS is used by the UEs to correct the CFO and detect STO with respect to the subframe boundary. The NPSS sequence is fixed and thus carries no information about the cell. On the other hand, the NSSS helps to detect the PCID and frame timing within an ambiguity of 80 ms. In NB-IoT systems, there are 504 unique PCIDs indicated by the NSSS, which can be transmitted with four distinct phase shifts in every even-numbered frame to indicate 80 ms frame boundaries. Thus, the UE has to search for a total of 4032 hypotheses to detect the NSSS. The Narrowband Physical Broadcast Channel (NPBCH) can be used to convey the master information block, which indicates configuration information for the UE to operate in the NB-IoT cell.
Both NPSS and NSSS are based on ZC sequences in the frequency domain [20]. The NPSS is designed to cope with very large CFO and is constructed from length-11 ZC sequences according to
P l ( k ) = Q ( l ) e j 5 π k ( k + 1 ) / 11 , 0 k < 11 , 3 l < 14
where Q ( l ) is the 11-symbols cover sequence to resolve the timing ambiguity due to the NPSS repetitions given by { 1 , 1 , 1 , 1 , 1 , 1 , 1 , 1 , 1 , 1 , 1 } . In every fifth subframe, P l ( k ) is allocated to the last 11 consecutive OFDM symbols each comprising 12 subcarriers. In the frequency domain, the NSSS sequence is formulated by multiplying a ZC sequence and a binary complementary sequence, leading to
S ( g ) = c n ( g ) e j 2 π u g e j π v g ( g + 1 ) / ( M 1 ) , 0 g < M
where M = 132 is the length of NSSS sequence, n = v / 126 , g = ( g mod 128 ) , g = ( g mod 131 ) , v = ( v mod 126 ) + 3 , u = ( n f / 8 mod 4 ) , v { 0 , 1 , , 503 } is the PCID, n f is the Radio Frame Number (RFN), and c n ( g ) is one of the four length-M complementary sequences defined in [4]. The NSSS is assigned to all 12 subcarriers of the Positioning Reference Signal (PRS) leading to 132 Resource Elements (REs) in an NSSS subframe, as shown in Figure 1. For convenience of notation, S ( g ) is equally divided into 11 symbols and is sequentially allocated to 11 consecutive OFDM symbols, which are denoted by S l u , v ( k ) for 3 l 13 and 0 k < 12 . Therefore, the transmission bandwidth of the NPSS and NSSS is only one Resource Block (RB) consisting of 12 subcarriers.

2.3. Cell Search Procedure

In the NB-IoT network, the cell search procedure can be decomposed to pre-FFT stage and post-FFT stage. At the pre-FFT stage, an averaged auto-correlation metric is used to explore the NPSS structure repeated over 11 OFDM symbols [15]. In this stage, a coarse timing is jointly detected together with FFO. For this purpose, the N a -times average auto-correlation metric is simply formulated by
Ψ ( θ ) = i = 0 N a 1 q = θ + i N w θ + i N w + 10 N t 1 y ˜ l * ( q ) y ˜ l ( q + N t )
where N a is the number of radio frames used for average estimate in the pre-FFT stage, N w is the number of observation samples within one radio frame of 10 ms, and y ˜ l ( q ) is the modulation sequence compensated received signal. Based on this, the N a -times average estimate of θ and ϵ f is thus obtained by
θ ^ = arg   max θ | Ψ ( θ ) | and ϵ ^ f = 1 2 π ρ 1 arg { Ψ ( θ ^ ) }
where 0 θ < N w .
After coarse time and frequency offset compensation, a joint detection of the IFO and fine timing is carried out using NPSS matched filter. Using a coarse timing estimate θ ^ , the average cross-correlation between initially detected NPSS and local NPSS can be written by
Θ ( δ , η ) = i = 0 N a 1 q = θ ^ + η θ ^ + η + 11 N t 1 y ˜ l ( q + i N w ) p * ( q θ ^ η ) e j 2 π δ ( q θ ^ η ) / N
where δ { G , G + 1 , , G } is the hypothetical value of the true IFO, G is the maximum value of ϵ i , η { η m a x , η m a x + 1 , , η m a x } is the hypothetical value to refine the timing, η m a x is maximum value of η , and p ( q ) is the 11 N t -samples sequence representing the concatenated time-domain NPSS symbols. Consequently, the estimate of ( δ , η ) is obtained by finding the maximum of Θ ( δ , η ) , leading to
( ϵ ^ i , η ^ ) = arg   max ( δ , η ) | Θ ( δ , η ) | .
Once these tasks have been completed, the FFT unit is used to convert the received time-domain samples into the frequency domain. In the post-FFT step, the UE attempts to acquire the PCID and frame timing by detecting the NSSS, which is carried out either coherently or non-coherently [16]. Since NPSS and NSSS may be not transmitted on the same antenna port, we focus non-coherent NSSS detection method in this paper.

3. Proposed NSSS Detection Scheme for NB-IoT

In this section, a complexity-effective NSSS detection scheme is proposed for the NB-IoT communication system. Numerical analysis is presented to assess the feasibility of the presented NSSS detector. Figure 2 shows the block diagram of initial synchronization and cell search procedure. This paper focuses on the post-FFT processing including the PICD and RFN detections.

3.1. Sequential PCID and RFN Detection (SPRD) Method

For 3 l 13 and 0 k < 12 , let denote C l n ( k ) , D l u ( k ) and E l w ( k ) to be sequences derived from c n ( g ) , e j 2 π u g , and e j π w g ( g + 1 ) / 131 , respectively. Then, the NSSS sequence can be expressed as the product of the three sequences S l u , v ( k ) = C l n ( k ) D l u ( k ) E l w ( k ) for n = v / 126 { 0 , 1 , 2 , 3 } , u = ( n f / 8 mod 4 ) { 0 , 1 / 4 , 2 / 4 , 3 / 4 } , and w { 3 , 4 , , 128 } . Note that a PCID v is uniquely associated with a pair ( w , n ) . Referring to [4], one can see that C l n ( k ) consists of one of four complementary sequences and D l u ( k ) E l w ( k ) is common to four C l n ( k ) ’s, yielding total 2016 combinations. Using the relation that n = v / 126 and w = ( v mod 126 ) + 3 , a PCID v is uniquely obtained by combining a pair ( w , n ) such that v = w 3 + 126 n .
To reduce the search space of the NSSS hypothesis, we design an objective function that does not rely on knowledge of binary complementary sequences. To end this, we use the property [ C l n ( k ) ] 2 = E X regardless of l and n, which leads to a local NSSS template
S ¯ l u , w ( k ) = [ S l u , w ( k ) ] 2 = E X [ D l u ( k ) ] 2 [ E l w ( k ) ] 2
where [ D l u ( k ) ] 2 takes a value of 1 or −1 due to squaring operation. It is worthy mentioning that E X = | S ¯ l u , w ( k ) | 2 = | C l n ( k ) | 2 due to unit energy of D l u ( k ) and E l w ( k ) . For notational simplicity, consider S ¯ l a , b ( k ) = S ¯ l + N s a , b ( k ) for 3 l 13 , where N s stands for the number of OFDM symbols in one radio frame. Let us also denote u = u 0 + u 1 , where u 0 { 0 , 1 / 4 } and u 1 { 0 , 1 / 2 } .
Bearing this definition in mind, the objective function independent of binary complementary sequences within window i is formulated as
Φ 1 i ( a , b , c ) = l = c N s + 3 c N s + 13 k S [ Y l + i N s ( k ) ] 2 S ¯ l a , b ( k )
where a { 0 , 1 / 4 } is the the hypothetical value for u 0 due to squaring operation, b { 3 , 4 , , 128 } is the hypothetical value for w, c { 0 , 1 } is the hypothetical value for deciding the radio frame to which the NSSS belongs, and S = { k | 0 k < 12 } is the set of NSSS subcarriers whose cardinality is 13. Upon substituting Equations (3) and (10) into Equation (11), Φ 1 i ( a , b , c ) takes the form
Φ 1 i ( a , b , c ) = l = c N s + 3 c N s + 13 k S [ H l + i N s ( k ) ] 2 [ X l + i N s ( k ) ] 2 E X [ D l a ( k ) ] 2 [ E l b ( k ) ] 2 e j 4 π ζ ( ( l + i N s ) ρ 1 + ρ 2 ) + l = c N s + 3 c N s + 13 k S I ¯ l + i N s ( k ) + l = c N s + 3 c N s + 13 k S Z ¯ l + i N s ( k )
where I ¯ l ( k ) = 2 H l ( k ) X l ( k ) I l ( k ) S ¯ l a , b ( k ) e j 2 π ζ ( l ρ 1 + ρ 2 ) + 2 I l ( k ) Z l ( k ) S ¯ l a , b ( k ) + [ I l ( k ) ] 2 S ¯ l a , b ( k ) and Z ¯ l ( k ) = 2 H l ( k ) X l ( k ) Z l ( k ) S ¯ l a , b ( k ) e j 2 π ζ ( l ρ 1 + ρ 2 ) + [ Z l ( k ) ] 2 S ¯ l a , b ( k ) . For notational convenience, it is assumed that the timing estimation has been successfully performed at a previous step. However, the impact of imperfect timing estimation on the detection performance will be assesses through simulations. When hypothetical values exactly match corresponding actual values, i.e., ( a , b , c ) = ( u 0 , w , m ) , Equation (12) can be rewritten as
Φ 1 i ( a , b , c ) = l = c N s + 3 c N s + 13 k S [ H l + i N s ( k ) ] 2 E X 2 e j 4 π ζ ( ( l + i N s ) ρ 1 + ρ 2 ) + l = c N s + 3 c N s + 13 k S I ¯ l + i N s ( k ) + l = c N s + 3 c N s + 13 k S Z ¯ l + i N s ( k ) .
If we assume that the channel is frequency-flat and stationary over NSSS subframe, we arrange Equation (13) as
Φ 1 i ( a , b , c ) = k S [ H l + i N s ( k ) ] 2 E X 2 e j 4 π ζ ρ 2 l = c N s + 3 c N s + 13 e j 4 π ζ ( l + i N s ) ρ 1 + l = c N s + 3 c N s + 13 k S I ¯ l + i N s ( k ) + l = c N s + 3 c N s + 13 k S Z ¯ l + i N s ( k )
which is further derived as
Φ 1 i ( a , b , c ) = k S [ H l + i N s ( k ) ] 2 E X 2 S ( ζ ) e j 4 π ζ ( 5 ρ 1 + ( c N s + 3 ) ρ 1 + ρ 2 ) + l = c N s + 3 c N s + 13 k S I ¯ l + i N s ( k ) + l = c N s + 3 c N s + 13 k S Z ¯ l + i N s ( k )
where S ( ζ ) = sin ( 22 π ζ ρ 1 ) / sin ( 2 π ζ ρ 1 ) . It is worthy mentioning that S ( ζ ) 11 for small values of ζ and Φ ˜ 1 ( i a , b , c ) = Φ 1 i ( a , b , c ) e j 4 π ζ ( 5 ρ 1 + ( c N s + 3 ) ρ 1 + ρ 2 ) follows a complex Gaussian distribution. Under hypothesis that ( a , b , c ) ( u 0 , w , m ) , it follows from Equation (12) that [ X l ( k ) ] 2 = E X [ D l u ( k ) E l w ( k ) ] 2 for c = m , while [ X l ( k ) ] 2 is a random complex symbol in Narrowband Physical Downlink Shared Channel (NPDSCH) or Narrowband Physical Downlink Control Channel (NPDCCH) for c m , as illustrated in Figure 1. Based on such observations, the estimate of ( u 0 , w , m ) can be jointly obtained as
( u ^ 0 , w ^ , m ^ ) = arg   max ( a , b , c ) i = 1 N b | Φ 1 i ( a , b , c ) |
and N b is the number of radio frames used for average estimate in the post-FFT stage and Equation (16) requires only 504 hypotheses.
Once the estimates ( u ^ 0 , w ^ , m ^ ) have been obtained, ( n , u 1 ) have to be identified to fully detect the PCID and RFN, which can be accomplished by searching the maximum of the objective function within window i defined as
Φ 2 i ( d , e ) = l = m ^ N s + 3 m ^ N s + 13 k S Y l + i N s ( k ) C l d ( k ) D l u ^ 0 + e ( k ) E l w ^ ( k )
where d { 0 , 1 , 2 , 3 } is the hypothetical value for n and e { 0 , 1 / 2 } is the hypothetical value for u 1 . Substituting Equation (3) into Equation (17) yields
Φ 2 i ( d , e ) = l = m ^ N s + 3 m ^ N s + 13 k S H l + i N s ( k ) X l + i N s ( k ) C l d ( k ) D l u ^ 0 + e ( k ) E l w ^ ( k ) e j 2 π ζ ( ( l + i N s ) ρ 1 + ρ 2 ) + l = m ^ N s + 3 m ^ N s + 13 k S I ˜ l + i N s ( k ) + l = m ^ N s + 3 m ^ N s + 13 k S Z ˜ l + i N s ( k )
where I ˜ l ( k ) = I l ( k ) C l d ( k ) D l u ^ 0 + e ( k ) E l w ^ ( k ) and Z ˜ l ( k ) = Z l ( k ) C l d ( k ) D l u ^ 0 + e ( k ) E l w ^ ( k ) . If we assume that the received signal exactly coincides with the local NSSS sequence, i.e., ( a , b , c , d , e ) = ( u 0 , w , m , n , u 1 ) , Equation (18) can be simplified to
Φ 2 i ( d , e ) = k S H l + i N s ( k ) E X S ( ζ ) e j 2 π ζ ( 5 ρ 1 + ( m ^ N s + 3 ) ρ 1 + ρ 2 ) + l = m ^ N s + 3 m ^ N s + 13 k S I ˜ l + i N s ( k ) + l = m ^ N s + 3 m ^ N s + 13 k S Z ˜ l + i N s ( k ) .
Similarly, we can exploit Equation (19) to arrive at
( n ^ , u ^ 1 ) = arg   max ( d , e ) i = 1 N b | Φ 2 i ( d , e ) | .
Based upon such observations, the estimated PCID v ^ is uniquely obtained by combining the detected pair ( w ^ , n ^ ) and thus we obtain v ^ = w ^ 3 + 126 n ^ , while u ^ = u ^ 0 + u ^ 1 and thus combining with m ^ determines an RFN.

3.2. Detection Performance

We assume that the STO is perfectly estimated by using the NPSS in the pre-FFT stage. The probability of detection failure of the proposed SPRD method using N b = 1 is derived in a flat fading channel. Let us denote P f 0 = Prob { ( u ^ 0 , w ^ , m ^ ) ( u 0 , w , m ) } as the probability that ( u 0 , w , m ) is incorrectly detected in Equation (16). Under hypothesis H 1 that ( a , b , c ) = ( u 0 , w , m ) in Equation (15), conditioned on α = H l ( k ) , Φ ˜ 1 ( a , b , c ) CN ( μ , σ 1 2 ) with μ = M E X 2 α 2 and σ 1 2 M ( σ I ¯ 2 + σ Z ¯ 2 ) . Note that σ I ¯ 2 = 4 E X 3 σ I 2 | α | 2 + 4 σ I 2 σ Z 2 E X 2 + 3 σ I 4 E X 2 and σ Z ¯ 2 = 4 E X 3 σ Z 2 | α | 2 + 3 σ Z 4 E X 2 are variances of I ¯ l ( k ) and Z ¯ l ( k ) , respectively. Under hypothesis H 0 that ( a , b , c ) ( u 0 , w , m ) , Φ ˜ 1 ( a , b , c ) CN ( 0 , σ 0 2 ) with σ 0 2 = M E X 4 | α | 4 + σ 1 2 . Under hypothesis H 1 , z = | Φ ˜ 1 ( a , b , c ) | = | Φ 1 ( a , b , c ) | in Equation (16) obeys Rician distribution given by
f H 1 ( z ) = 2 z σ 1 2 e z 2 + μ 2 σ 1 2 I 0 ( 2 z μ σ 1 2 )
where I 0 ( · ) represents the modified Bessel function of zeroth order. When ( a , b , c ) ( u 0 , w , m ) , the PDF of | Φ 1 ( a , b , c ) | is Rayleigh distributed with distribution f H 0 ( z ) = 2 z / σ 0 2 e z 2 / σ 0 2 . Using these distributions, the probability that ( u 0 , w , m ) is erroneously detected conditioned on α is written by
P f 0 ( α ) = 1 0 f H 1 ( z ) [ F H 0 ( z ) ] 503 d z
where F H 0 ( z ) = 1 e z 2 / σ 0 2 denotes the cumulative density function of f H 0 ( z ) . Based on binomial expansion, Equation (22) becomes
P f 0 ( α ) = 1 e μ 2 σ 1 2 t = 0 503 ( 1 ) t ( 503 t ) 0 2 z σ 1 2 e ( z 2 σ 1 2 + t z 2 σ 0 2 ) I 0 ( 2 z μ σ 1 2 ) d z
which has a closed-form expression as
P f 0 ( α ) = 1 t = 0 503 ( 1 ) t ( 503 t ) 1 1 + t σ 1 2 / σ 0 2 e t σ 0 2 / μ 2 + t σ 1 2 / μ 2 .
In Equation (24), we get
μ 2 σ 1 2 = M 4 / γ z + 3 / γ z 2 + 4 / γ i + 4 / ( γ i γ z ) + 3 / γ i 2
and
μ 2 σ 0 2 = M 1 + 4 / γ z + 3 / γ z 2 + 4 / γ i + 4 / ( γ i γ z ) + 3 / γ i 2
where γ z = | α | 2 E X / σ Z 2 is the received Signal-to-Noise Ratio (SNR) and γ i = | α | 2 E X / σ I 2 denotes the received signal-to-ICI ratio. Without attempting to solve a closed-form expression, we resort to numerical integration P f 0 = 0 P f 0 ( x ) f α ( x ) d x , where f α ( x ) = ( 1 / σ H 2 ) e x / σ H 2 is the PDF of | α | 2 .
It is seen from Equation (18) that Φ ˜ 2 ( d , e ) CN ( M E X α , M ( σ I 2 + σ Z 2 ) E X ) when ( d , e ) = ( n , u 1 ) , while Φ ˜ 2 ( d , e ) N ( 0 , M ( σ I 2 + σ Z 2 ) E X ) under the hypothesis that ( d , e ) ( n , u 1 ) , which is because of good cross-correlation properties of the complementary sequence C l n ( k ) . If w is perfectly estimated, therefore, the conditional probability P f 1 ( α ) = Prob { ( n ^ , u ^ 1 ) ( n , u 1 ) | α } is similarly calculated by
P f 1 ( α ) = 1 t = 0 7 ( 1 ) t ( 7 t ) 1 1 + t e t M ( 1 + t ) ( 1 / γ i + 1 / γ z ) .
Therefore, the probability that the PCID and RFN are incorrectly recognized can be calculated as P f = Prob { ( u ^ , w ^ , m ^ , n ^ ) ( u , w , m , n ) } = P f 0 + ( 1 P f 0 ) P f 1 .

4. Simulation Results and Discussions

In this section, simulations were performed to verify the feasibility of the NSSS detector in the NB-IoT network. The performance of the PCID and RFN detection methods was evaluated in terms of the probability of detection failure observed in the estimation of each parameter of interest u and v. As a global performance measure, we also assessed the overall probability of detection failure defined as P f = Prob { ( u ^ , w ^ , m ^ , n ^ ) ( u , w , m , n ) } .

4.1. Simulation Settings

We used FFT of length N = 128 and CP of length N g = 10 . The sampling time instant was T s = 0.52 μ s, the subcarrier spacing Δ f was equal to 15 kHz, M = 132 , and N w = 19,320 samples. We adopted the Pedestrian A (PedA) and Vehicular A (VehA) channel models, which was characterized by a maximum channel delay spread of 0.41 μ s and 2.15 μ s [21]. Considering that the stability of common oscillators for IoT applications was assumed to be ± 20 ppm, a maximum initial CFO value was ± 18 kHz at 900 MHz carrier frequency, which amounted to putting ϵ = 1.2 . The NB-IoT terminal was considered to be almost static with a Doppler frequency equal to 1 Hz. Unless stated otherwise, initial CFO was set to ϵ = 1.2 .
As benchmark, we considered two existing schemes developed in [15,16]. One was a Joint PCID and RFN Detection (JPRD) scheme [15], whose objective function takes the form
Φ 3 i ( a , b , c , d ) = l = c N s + 3 c N s + 13 k S Y l + i N s ( k ) C l d ( k ) D l a ( k ) E l b ( k ) .
Using Equation (28), the JPRD method is formulated by
( u ^ , w ^ , m ^ , n ^ ) = arg   max ( a , b , c , d ) i = 1 N b | Φ 3 i ( a , b , c , d ) |
which requires 4032 hypotheses. The other was a reduced-complexity PCID and RFN Detection (RPRD) method presented in [16], which can be viewed as a low-complexity version of the JPRD method and is based on the same observation as Equation (28). For both approaches, the estimated PCID was v ^ = w ^ 3 + 126 n ^ , while an RFN was obtained by combining u ^ and m ^ . Comparing Equations (17) and (28), it was observed that | Φ 3 i ( a , b , c , d ) | was statistically equivalent to | Φ 2 i ( d , e ) | . Thus, the probability of detection failure of the JPRD and RPRD methods could be expressed in an identical form to Equation (27) replacing 7 with 4031.

4.2. Complexity Evaluation

In this section, the computational burden of the proposed SPRD approach was compared to that of the RPRD approach with respect to floating point operations (flops). In order to conduct a fair comparison, one complex multiplication, one complex addition, one complex squaring, and one complex magnitude were equivalent to six, two, five, and three flops, respectively [22]. It was assumed that the local template S ¯ l u , w ( k ) was a priori available at the receiver. For all presented methods, the elements { ± 1 , ± j } generated by C l n ( k ) and D l u ( k ) were assumed to be implemented without any multiplication.

4.2.1. Pre-FFT Processing

We considered a sliding window to implement an average operation. Then, θ ^ in Equation (11) required N w N a N t complex multiplications, 10 N t + 2 ( N w N a 10 N t ) + N w ( N a 1 ) complex additions, and N w complex magnitudes for all possible trials. The estimate ϵ ^ f required one additional flop. Thus, coarse STO and FFO estimates required 12 N w N a 26 N t 2 N w + 1 flops. To complete the IFO and fine STO detection, | Θ ( δ , η ) | required 11 N t N a complex multiplications, 11 N t N a 1 complex additions, and one complex magnitude for each trial. Thus, Equation (13) was computed with ( 88 N t N a + 2 ) ( 2 η m a x + 1 ) ( 2 G + 1 ) flops.

4.2.2. Post-FFT Processing

In the proposed SPRD method, computing [ Y l ( k ) ] 2 required M complex squaring operations. For each hypothesis, both quantities i = 1 N b | Φ 1 i ( a , b , c ) | and i = 1 N b | Φ 2 i ( d , e ) | required the same number of arithmetic operations, except for the squaring operation. Thus, both quantities required M N b / 2 complex multiplications, ( M 1 ) N b complex additions, N b 1 real additions, and one complex magnitude using the symmetric property of [ E l w ( k ) ] 2 . Therefore, 766 M N b + 1008 ( M 1 ) N b + 504 ( N b 1 ) + 1512 N b flops were required to obtain Equation (16) for 504 hypotheses, while Equation (20) required 3 M N b + 16 ( M 1 ) N b + 8 ( N b 1 ) + 24 N b flops for 8 hypotheses. As a result, the SPRD method required 769 M N b + 1024 ( M 1 ) N b + 6512 ( N b 1 ) + 1536 N b = 1793 M + 1024 N b 512 flops. In the case of the RPRD method, i = 1 N b | Φ 3 i ( a , b , c , d ) | was calculated with M N b complex multiplications, ( M 1 ) N b complex additions, N b 1 real additions, and one complex magnitude for each hypothesis. Considering 4032 hypotheses in Equation (29), the overall number of flops was equal to 1512 M N b + 8064 ( M 1 ) N b + 4023 ( N b 1 ) + 12096 N b = 9576 M N b + 8064 N b 4032 .
Table 1 compares the number of flops required to implement the conventional and proposed detection methods. For M = 132 , the overall computational burden of the SPRD method was remarkably decreased by 81.3 % regardless of N b , compared to the RPRD method. This is because that the number of flops used in both the RPRD and SPRD methods were almost linearly proportional to N b .

4.3. Performance Evaluation

Figure 3 presents P f of the proposed NSSS detection method in AWGN and flat fading channels. To verify the accuracy of the performance analysis, we considered the scenario where the STO was completely estimated at the pre-FFT synchronization step. As benchmark, the probability of detection failure of the JPRD method Equation (29) is also provided. The first behavior we observe from Figure 3 is that the simulation result (marker) exactly coincided with the theoretical analysis (line) in both AWGN and flat-fading channels. Although not shown in this figure, analytical curve of the RPRD method was the same to that of the JPRD method. As predicted, the presence of channel fading and RFO substantially deteriorates the accuracy of the JPRD and SPRD methods. In particular, the RFO caused an irreducible ICI as the SNR increased, leading to error floor phenomenon as observed in Figure 3b. Compared to the JPRD approach, it can be seen that the SPRD approach suffered from some performance loss, showing the performance versus complexity tradeoffs. This phenomenon is attributed to the reason that squaring operation in Equation (11) increased noise variance of the proposed SPRD method.
Figure 4 depicts the probability of detection failure of the RFN detector Prob { u ^ u } and the probability of detection failure of the PCID detector Prob { v ^ v } in the PedA channel. We considered the scenario where both STO and CFO were detected in the time domain adopting the method in Equations (7) and (9), wherein initial STO and CFO estimation was based on N a -times average autocorrelation metric of the NPSS. After initial STO and CFO compensation, the received signal was transformed to the frequency domain, leading to residual errors ζ = ϵ ϵ ^ and τ = θ θ ^ at the post-FFT stage. When compared to the RPRD method, the performance of the SPRD method came to approach that of ideal initial synchronization ( ζ = τ = 0 ) as N a increased, equivalently, initial STO and CFO estimation became more accurate. Another interesting remark is that Prob { v ^ v } was greater than Prob { u ^ u } due to the larger number of hypotheses associated with detecting the PCID. Based on such observation, it was expected that the overall probability P f was primarily determined by Prob { v ^ v } .
Figure 5 presents P f of the existing and proposed NSSS detection methods in the PedA channel. The simulation setting remained the same as in Figure 4. Immediately, we observed a similar trend to that in Figure 4, clearly indicating that accurate estimates of STO and CFO could improve the performance of the NSSS detectors. As predicted, the detection curves of the JPRD and RPRD methods almost overlapped due to using basically the same objective function. When compared to the result of ideal initial time-frequency estimation, a performance gap between the conventional and proposed schemes decreased, leading to the SNR loss within 2 dB. Based on this observation, the accuracy of initial synchronization has more impact on the performance of the conventional NSSS detectors. Therefore, it was concluded that the SPRD method effectively detected the NSSS with significantly reduced complexity in a more realistic situation where there still remained the RTO and RFO at the post-FFT stage.
In Figure 6 and Figure 7, we compared the performance of different detection methods as a function of the processing time equivalently N b when SNR = 5 dB and SNR = 10 dB, respectively. As a baseline, the ideal performance when ζ = τ = 0 was plotted. In the estimated case, the initial synchronization was based on 11-times average autocorrelation metric of Equations (7) and (9). The number of radio frames needed to attain 10% error probability was defined as N f , which is equivalent to the processing time of 10 N f ms. It was seen that an increased number of radio frames could average out the noise and enhance the detection capability of both the detection methods. When the SNR was equal to −5 dB, Figure 6b clearly indicates that both RPRD and SPRD methods required N f = 30 and 43, respectively, to achieve 10% error probability in the PedA channel. Considering the number of flops in Table 1, it can be seen that the complexity of the SPRD method using N f = 43 reduced by 73.2% at the cost of processing time delay, compared to that of the RPRD method using N f = 30 . On the other hand, the number of radio frames significantly decreased in the VehA channel so that N f = 14 and 20 were required for the RPRD and SPRD methods, respectively. Based on this observation, the same complexity reduction was expected in the case of the VehA channel. Basically, power consumption is proportional to the number of flops used to implement the detection algorithms [23]. Thus, it was intuitively expected that a reduced number of flops of the proposed method could improve the power consumption efficiency if other system parameters that determined the power consumption were the same. Consequently, both the RPRD and SPRD approaches achieved better performance in the VehA channel due to the increased multipath diversity. When the NB-IoT UE operated in the extended coverage with SNR = 10 dB, as shown in Figure 7, it required a large number of radio frames to attain a target error probability, eventually increasing the processing time for both methods. In the case of the PedA channel, the RPRD method achieved its target error probability with 120 radio frames of 10 ms each at the cost of computational complexity, while the SPRD method used 170 radio frames, which suffered from increased processing time. By adopting the proposed approach to the NB-IoT communication system, the computational burden of the initial synchronization receiver could be thus reduced, thus improving a battery life of NB-IoT UEs.

5. Conclusions

In this paper, a low-complexity NSSS detection method is suggested in the cellular NB-IoT communication system. Using the property of binary complementary sequence, the NSSS detection problem can be decoupled into sequential detection task of complementary sequence and ZC sequence, yielding a highly complexity-effective NSSS detection method. To prove the usefulness of the proposed detector, the probability of detection failure is analytically computed in the flat fading channel. It has been shown from simulation results that the proposed NSSS detector can save nearly one-fifth of the computational burden at the expense of some performance loss, compared to the conventional NSSS detector. Furthermore, the proposed NSSS detection method effectively performs in a realistic scenario where there remain the RTO and RFO. By using the proposed approach to the cellular NB-IoT communication system, it allows NB-IoT devices to synchronize robustly with less power during the initial cell search procedure and provides the useful information in designing a simple efficient NB-IoT synchronization receiver.

Funding

This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Education (NRF-2018R1D1A1B07048819) and this research was supported by Unmanned Vehicles Advanced Core Technology Research and Development Program through the National Research Foundation of Korea (NRF), Unmanned Vehicle Advanced Research Center (UVARC) funded by the Ministry of Science and ICT, the Republic of Korea (NRF-2017M1B3A2A01049997).

Conflicts of Interest

The author declares no conflict of interest.

References

  1. Ikpehai, A.; Adebisi, B.; Rabie, K.M.; Anoh, K.; Ande, R.E.; Hammoudeh, M.; Gacanin, H.; Mbanaso, U.M. Low-power wide area network technologies for Internet-of-Things: A comparative review. IEEE Internet Things J. 2019, 6, 2225–2240. [Google Scholar] [CrossRef] [Green Version]
  2. 3GPP. Study on Provision of Low-Cost Machine-Type Communications (MTC) User Equipments (UEs) Based on LTE; TR 36.888; 3GPP: Sophia Antipolis, France, 2013. [Google Scholar]
  3. Akpakwu, G.A.; Silva, B.J.; Hancke, G.P.; Abu-Mahfouz, A.M. A survey on 5G networks for the Internet of Things: Communication tchnologies and challenges. IEEE Access 2018, 6, 3619–3647. [Google Scholar] [CrossRef]
  4. 3GPP. Physical Channels and Modulation (Release 14); 3GPP TS 36.211; 3GPP: Sophia Antipolis, France, 2017. [Google Scholar]
  5. Popli, S.; Jha, R.K.; Jain, S. A survey on energy efficient narrowband Internet of Things (NBIoT): Architecture, application and challenges. IEEE Access 2019, 7, 16739–16776. [Google Scholar] [CrossRef]
  6. Xu, J.; Yao, J.; Wang, L.; Ming, Z.; Wu, K.; Chen, L. Narrowband internet of things: Evolutions, technologies, and open issues. IEEE Internet Things J. 2018, 5, 1449–1462. [Google Scholar] [CrossRef]
  7. Mwakwata, C.B.; Malik, H.; Alam, M.; Moullec, Y.; Parand, S.; Mumtaz, S. Narrowband internet of things (NB-IoT): From physical (PHY) and media access control (MAC) layers perspectives. Sensors 2019, 19, 2613. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  8. 3GPP. Cellular System Support for Ultra-Low Complexity and Low Throughput Internet of Things (CIoT); TR 45.820, V13.1.0; 3GPP: Sophia Antipolis, France, 2015. [Google Scholar]
  9. Sisinni, E.; Saifullah, A.; Han, S.; Jennehag, U.; Gidlund, M. Industrial Internet of Things: Challenges, opportunities, and directions. IEEE Trans. Ind. Inform. 2018, 14, 4724–4734. [Google Scholar] [CrossRef]
  10. Malik, H.; Pervaiz, H.; Alam, M.; Moullec, Y.; Kuusik, A.; Imran, M. Radio resource management scheme in NB-IoT systems. IEEE Access 2018, 6, 15051–15064. [Google Scholar] [CrossRef]
  11. Kroll, H.; Korb, M.; Weber, B.; Willi, S.; Huang, Q. Maximum-llikelihood detection for energy-efficient timing acquisition in NB-IoT. In Proceedings of the 2017 IEEE Wireless Communications and Networking Conference Workshops (WCNCW), San Francisco, CA, USA, 19–22 March 2017; pp. 1–5. [Google Scholar]
  12. Qiu, T.; Zhang, Y.; Qiao, D.; Zhang, X.; Wymore, M.; Sangaiah, A.K. A robust time synchronization scheme for industrial Internet of Things. IEEE Trans. Ind. Inform. 2018, 14, 3570–3580. [Google Scholar] [CrossRef]
  13. Yang, W.; Hua, M.; Zhang, J.; Xia, T.; Zou, J.; Jiang, C.; Wang, M. Enhanced system acquisition for NB-IoT. IEEE Access. 2017, 5, 13179–13191. [Google Scholar] [CrossRef]
  14. Intel Corporation. Synchronization and Cell Search in NB-IoT: Performance Evaluations; 3GPP TSG RAN WG1; R1-161898; Intel Corporation: Santa Clara, CA, USA, 2016. [Google Scholar]
  15. Ali, A.; Hamouda, W. On the cell search and initial synchronization for NB-IoT LTE systems. IEEE Commun. Lett. 2017, 21, 1843–1846. [Google Scholar] [CrossRef]
  16. Li, Y.; Chen, S.; Ye, W.; Lin, F. A joint low-power cell search and frequency tracking scheme in NB-IoT systems for green Internet of Things. Sensors 2018, 18, 3274. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  17. Magani, S.; Kuchi, K. Cell-search and tracking of residual time and frequency offsets in low power NB-IoT devices. CSI Trans. ICT 2019, 7, 27–34. [Google Scholar] [CrossRef]
  18. Hwang, J.-K.; Li, C.-F.; Ma, C. Efficient detection and synchronization for superimposed NB-IoT NPRACH preambles. IEEE Internet Things J. 2019, 6, 1173–1182. [Google Scholar] [CrossRef]
  19. Murin, Y.; Dabora, R. Low complexity estimation of carrier and sampling frequency offsets in burst-mode OFDM systems. Wirel. Commun. Mob. Comput. 2016, 16, 1018–1034. [Google Scholar] [CrossRef]
  20. Popovic, B.M. Generalized chirp-like polyphase sequences with optimum correlation properties. IEEE Trans. Inf. Theory 1992, 30, 769–777. [Google Scholar] [CrossRef]
  21. International Telecommunication Union. Guidelines for Evaluation of Radio Transmission Technologies for IMT-2000; ITU-R M. 1225-97; International Telecommunication Union: Geneva, Switzerland, 1997.
  22. Golub, G.H.; Loan, C.F.V. Matrix Computations; The Johns Hopkins University Press: Baltimore, MD, USA, 2013. [Google Scholar]
  23. Xiao, Z.; Zhao, J.; Liu, T.; Geng, L.; Zhang, F.; Tong, J. On the energy efficiency of massive MIMO systems with low-resolution ADCs and lattice reduction aided detectors. Symmetry 2020, 12, 406. [Google Scholar] [CrossRef] [Green Version]
Figure 1. Radio frame structure in NB-IoT systems.
Figure 1. Radio frame structure in NB-IoT systems.
Symmetry 12 01342 g001
Figure 2. Block diagram for the initial synchronization and cell search procedure.
Figure 2. Block diagram for the initial synchronization and cell search procedure.
Symmetry 12 01342 g002
Figure 3. Performance of the proposed Narrowband Secondary Synchronization Signal (NSSS) detector in Additive White Gaussian Noise (AWGN) and flat fading channels: (a) ζ = 0 ; (b) ζ = 0.05 .
Figure 3. Performance of the proposed Narrowband Secondary Synchronization Signal (NSSS) detector in Additive White Gaussian Noise (AWGN) and flat fading channels: (a) ζ = 0 ; (b) ζ = 0.05 .
Symmetry 12 01342 g003
Figure 4. Performance of the conventional and proposed NSSS detectors versus N a in Pedestrian A (PedA): (a) Radio Frame Number (RFN); (b) Physical Cell ID (PCID).
Figure 4. Performance of the conventional and proposed NSSS detectors versus N a in Pedestrian A (PedA): (a) Radio Frame Number (RFN); (b) Physical Cell ID (PCID).
Symmetry 12 01342 g004
Figure 5. Performance of the conventional and proposed NSSS detectors in the PedA channel: (a) N a = 3 ; (b) N a = 11 .
Figure 5. Performance of the conventional and proposed NSSS detectors in the PedA channel: (a) N a = 3 ; (b) N a = 11 .
Symmetry 12 01342 g005
Figure 6. Performance of the conventional and proposed NSSS detectors when Signal-to-Noise Ratio ( SNR ) = 5 dB: (a) ideal; (b) estimated.
Figure 6. Performance of the conventional and proposed NSSS detectors when Signal-to-Noise Ratio ( SNR ) = 5 dB: (a) ideal; (b) estimated.
Symmetry 12 01342 g006
Figure 7. Performance of the conventional and proposed NSSS detectors when SNR = 10 dB: (a) ideal; (b) estimated.
Figure 7. Performance of the conventional and proposed NSSS detectors when SNR = 10 dB: (a) ideal; (b) estimated.
Symmetry 12 01342 g007
Table 1. Complexity comparison of the conventional and proposed detection methods.
Table 1. Complexity comparison of the conventional and proposed detection methods.
Algorithm N b
20304050607080
RPRD25,437,88838,158,84850,879,80863,600,76876,321,72889,042,688101,763,648
SPRD4,753,4887,130,4889,507,48811,884,48814,261,48816,638,48819,015,488

Share and Cite

MDPI and ACS Style

You, Y.-H. Reduced Complexity Detection of Narrowband Secondary Synchronization Signal for NB-IoT Communication Systems. Symmetry 2020, 12, 1342. https://doi.org/10.3390/sym12081342

AMA Style

You Y-H. Reduced Complexity Detection of Narrowband Secondary Synchronization Signal for NB-IoT Communication Systems. Symmetry. 2020; 12(8):1342. https://doi.org/10.3390/sym12081342

Chicago/Turabian Style

You, Young-Hwan. 2020. "Reduced Complexity Detection of Narrowband Secondary Synchronization Signal for NB-IoT Communication Systems" Symmetry 12, no. 8: 1342. https://doi.org/10.3390/sym12081342

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop